Consumer choices for goods and services have grown exponentially upon the advent of the digital age. E-commerce, content distribution networks, and other communication technologies have enabled customers to choose from many more goods than were previously available to them. However, navigating the sheer number products now available can prove daunting and ultimately discourage some customers from making purchases using these new means. Recommendation systems have been developed in order to provide customers with some assistance when choosing new products. A recommendation system may provide feedback or recommended items to a customer so that the customer may make a more informed decision as to whether or not an item may be a good purchase.
In order to create effective item recommendation systems, large amounts of past behavior of customers may be tracked and maintained. This customer data may be maintained according to a particular user account or user profile and analyzed in order to make suggestions of items that, for example, other similar customers have purchased. In order to provide good item recommendations, however, customer data may need to be accurately attributed to the correct user account. However, some fulfillment systems or services may be susceptible to inaccurate attribution as it may depend upon a user to ensure that the correct user account is identified. In scenarios where multiple users may utilize a common system or device to make purchases, selections, or provide other behavioral input that is tracked, accurate attribution of tracked data may be difficult when relying upon manual switching between user accounts.
While embodiments are described herein by way of example for several embodiments and illustrative drawings, those skilled in the art will recognize that the embodiments are not limited to the embodiments or drawings described. It should be understood, that the drawings and detailed description thereto are not intended to limit embodiments to the particular form disclosed, but on the contrary, the intention is to cover all modifications, equivalents and alternatives falling within the spirit and scope as defined by the appended claims. The headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description or the claims. As used throughout this application, the word “may” is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). The words “include,” “including,” and “includes” indicate open-ended relationships and therefore mean including, but not limited to. Similarly, the words “have,” “having,” and “has” also indicate open-ended relationships, and thus mean having, but not limited to. The terms “first,” “second,” “third,” and so forth as used herein are used as labels for nouns that they precede, and do not imply any type of ordering (e.g., spatial, temporal, logical, etc.) unless such an ordering is otherwise explicitly indicated.
Various components may be described as “configured to” perform a task or tasks. In such contexts, “configured to” is a broad recitation generally meaning “having structure that” performs the task or tasks during operation. As such, the component can be configured to perform the task even when the component is not currently performing that task (e.g., a computer system may be configured to perform operations even when the operations are not currently being performed). In some contexts, “configured to” may be a broad recitation of structure generally meaning “having circuitry that” performs the task or tasks during operation. As such, the component can be configured to perform the task even when the component is not currently on. In general, the circuitry that forms the structure corresponding to “configured to” may include hardware circuits.
Various components may be described as performing a task or tasks, for convenience in the description. Such descriptions should be interpreted as including the phrase “configured to.” Reciting a component that is configured to perform one or more tasks is expressly intended not to invoke 35 U.S.C. § 112, (f), interpretation for that component.
“Based On.” As used herein, this term is used to describe one or more factors that affect a determination. This term does not foreclose additional factors that may affect a determination. That is, a determination may be solely based on those factors or based, at least in part, on those factors. Consider the phrase “determine A based on B.” While B may be a factor that affects the determination of A, such a phrase does not foreclose the determination of A from also being based on C. In other instances, A may be determined based solely on B.
The scope of the present disclosure includes any feature or combination of features disclosed herein (either explicitly or implicitly), or any generalization thereof, whether or not it mitigates any or all of the problems addressed herein. Accordingly, new claims may be formulated during prosecution of this application (or an application claiming priority thereto) to any such combination of features. In particular, with reference to the appended claims, features from dependent claims may be combined with those of the independent claims and features from respective independent claims may be combined in any appropriate manner and not merely in the specific combinations enumerated in the appended claims.
Various embodiments of device-enabled identification for automated user detection are described herein. User accounts (or user profiles) may provide a point of organization for different systems, services, and/or devices that provide content (e.g., audio, visual, interactive, etc.) to provide access to the content for a user. Different rights, authorizations, agreements, controls, settings, and other information used to access content may be associated with particular user accounts so that a content consumption device (e.g., a content streaming device or other device that obtains and makes content available to a user) may provide content access to a user according to a user account. Additionally, various user experience optimizations may be implemented based on information, such as historical behavioral data associated with a user account, in order to provide content recommendations and other tailored information to a user.
Some content consumption devices may be utilized by multiple different users. For example, a single content consumption device implemented as part of an entertainment system, displaying audio, visual, and interactive content via a display (e.g., a television) may be utilized by multiple different users. Respective user accounts may be setup for the different users. However, typically, users themselves may have to manually enter account information in order to switch between different user accounts at the content consumption device. If user account switching is not accurately performed, then behavioral data collected may be misattributed to an incorrect user account (which may reduce the effectiveness of user experience optimizations such as content recommendations). Device-enabled identification for automated user detection may automatically select user accounts, providing an accurate and automated mechanism to switch between user accounts.
Based on the device information 120, detection-enabled content consumption device 100 may be configured to determine whether identifying device 110 is within consumption proximity of detection-enabled content consumption system 100. Consumption proximity may, in various embodiments, identify a location, area, or range in which content may be consumed. For instance, in
In response to determining that identifying device 110 is within consumption proximity, detection-enabled content consumption system 100 may be configured to select a user account linked to or associated with the identifying device. For example, mapping information may be maintained that links identifying devices to user accounts. Once a user account is selected, access to content may be provided according to the selected user account automatically, without requiring any manual identification input from a user. Various content recommendations, settings, actions, permissions, or other user optimizations or experiences may be provided in accordance within information associated with the identified user account.
Please note,
The specification next describes an example content consumption device which may implement device-enabled identification for automated user detection and a network-based content service which may provide content for the content consumption device. The specification then describes various flowcharts for implementing different techniques to provide device-enabled identification for automated user detection. An example computer system upon which the described systems, devices, and techniques may be implemented is then described.
In some embodiments, detection-enabled content consumption device 200 may implement automatic user detection module 203 which may be configured to perform the various techniques described below with regard to
In some embodiments, detection-enabled content consumption device 200 may implement account management module 205 to manage user account operations (e.g., creation, changes, or deletion). For example, user accounts may have various associated information, profile information, settings or permissions, purchasing information (e.g., financial account information), or other information that informs the access to and consumption of content via the content consumption device. In some embodiments, a particular user account may be blocked from certain actions (e.g., consuming certain content or purchasing certain items) and/or controlled by another user account (e.g., a parental account or owner account may set up subordinate user accounts to the owner account, such as children accounts). In some embodiments, detection-enabled content consumption device 200 may implement content recommendation module 207 to provide content recommendations specific to a user account based, at least in part, on historical account access data (e.g., content selections, ratings, qualities, etc. . . . ) specific to a user account. In some embodiments, some or all of account management 205 and content recommendation 207 functionalities may be provided by a content service, such as network-based content service 300 in
The systems described herein may, in some embodiments, implement a network-based content service that provides content to customers or clients (which may be users). The content may be used, purchased, rented, or otherwise consumed. Selection of content may correspond to one of these actions and/or rating or reviewing particular content. Some embodiments of a network-based content service are illustrated in
In various embodiments, the components illustrated in
Generally speaking, clients 350 may encompass any type of client or other component configurable to submit network-based requests to network-based content service 300 via network 360, including requests to select particular content offered. In some embodiments, clients may receive and consume content directly (without a content consumption device). For example, a given client 350 may include a suitable version of a web browser, or may include a plug-in module or other type of code module configured to execute as an extension to or within an execution environment provided by a web browser. For example, selection of content for purchase and submitting payment information may be conveyed via the web browser. Alternatively, a client 350 (e.g., a gaming client) may encompass a detection-enabled content consumption device, configured to perform various interactions as described below in
Clients 350 may convey network-based requests (e.g., content selection requests, device registration requests, etc.) to and receive responses from network-based content service 300 via network 360. In various embodiments, network 360 may encompass any suitable combination of networking hardware and protocols necessary to establish network-based-based communications between client 350 and network-based content service 300 (and/or enterprise interface 310). For example, network 360 may generally encompass the various telecommunications networks and service providers that collectively implement the Internet. Network 360 may also include private networks such as local area networks (LANs) or wide area networks (WANs) as well as public or private wireless networks. For example, both a given client 350 and network-based content service 300 may be respectively provisioned within enterprises having their own internal networks. In such an embodiment, network 360 may include the hardware (e.g., modems, routers, switches, load balancers, proxy servers, etc.) and software (e.g., protocol stacks, accounting software, firewall/security software, etc.) necessary to establish a networking link between given client 350 and the Internet as well as between the Internet and network-based content service 300. It is noted that in some embodiments, client 350 may communicate with network-based content service 300 using a private network rather than the public Internet. For example, client 350 may via a private network as part of selecting and receiving digital items offered by network-based content service 300. In such a case, clients 350 may communicate with service 300 entirely through a private network 360 (e.g., a LAN or WAN that may use Internet-based communication protocols but which is not publicly accessible).
Generally speaking, network-based content service 300 may be configured to implement interface 310 which may be configured to receive and process network-based requests, such as requests to select, browse, access, or otherwise interact with content offered, retrieve content, access user account data, and/or get content recommendations. For example, interface 310 may include hardware and/or software configured to implement a network-based site, such that a web browser or other component implemented on client 350 may be configured to receive information via the network-based site. In some embodiments, interface 310 may include an Application Programming Interface, which may allow a client 350, such as a content consumption device, to programmatically communicate with network-based content service 310, such as described below with regard to
Control plane 320 may be configured to facilitate the operations of network-based content service 300. For example, control plane 320 may coordinate the purchase, rental, access, sharing, metering and/or accounting of client usage/selection of content, which may be services, physical products, or digital media, in various embodiments. In at least some embodiments, network-based content service 300 may be a streaming content service (e.g. streaming audio or video content). Control plane 320 may implement financial accounting and billing systems, or may maintain a database of usage data that may be queried and processed by external systems for reporting and billing of customer activity. In certain embodiments, control plane 320 may be configured to collect, monitor and/or aggregate a variety of operational metrics, such as metrics reflecting the rates and types of requests received from customers 350, bandwidth utilized by such requests, system processing latency for such requests, system component utilization (e.g., network bandwidth and/or storage utilization within the network-based content service), rates and types of errors resulting from requests or any other suitable metrics. In some embodiments such metrics may be used by system administrators to tune and maintain system components, while in other embodiments such metrics (or relevant portions of such metrics) may be exposed to clients 350 to enable such customers to monitor their usage of services/items. Control plane may also implement various user and/or customer account functions which may be responsible for updating or maintaining customer/user account information. User information, such as a unique user identifier, may be linked to or associated with user account data 332 for customers/users maintained in data store 330.
In some embodiments, control plane 320 may also implement user authentication and access control procedures. For example, for a given network-based request to access a particular content, control plane 320 may be configured to ascertain whether the client 350 associated with the request is authorized to access the particular item. Control plane 320 may determine such authorization by, for example, evaluating an identity, password or other credential against credentials associated with the particular item, or evaluating the requested access to the particular item against an access control list for the particular item. Various access control policies may be stored as records or lists of access control information by control plane 320. In some embodiments, these access control policies may be implemented to accept or deny access to content offered by network-based content service 300 (e.g., some or all of streaming videos).
Data store 330 may be one or more storage nodes, systems, or servers configured to persistently store data for enterprise data store, such as the aforementioned user account data 332 and/or content recommendation data 334 (e.g., a content recommendation model). Various durability and/or security techniques may be implemented to ensure safe and reliable storage of sensitive information, such as payment information, accounts, or passwords.
Content fulfillment 340 may be one or more systems or devices configured to provide selected content to clients 350 that are offered by network-based content service 300. In some embodiments, content fulfillment 340 may be application servers, content distribution networks, application, gaming or other media platforms that provide access to or a copy of digital media selected by clients 350. For example, movies, television shows, or other audio/visual media may be streamed or downloaded to clients 350 for consumption as part of a network-based video streaming or gaming service. If access to or rights to an item is limited, content fulfillment 340 may be configured to enforce digital rights management (DRM) or other controls to enforce the policies of the items and their respective offers (e.g., rental or borrow of digital media for certain time periods).
As illustrated in
As discussed above with regard to
Content access input 430 may be received at detection-enabled content consumption device 410, in some embodiments. Content access input 430 may be various kinds of input to access content via detection-enabled content consumption device 410. For example, the access input may be to activate or turn on detection-enabled content consumption device (e.g., device 410 may handle device information 426 and request user information 428 while in an inactive state, in some embodiments). The access input may be to select content, browse content, query content, or request content recommendations. In order to handle the various content access input 430, detection-enabled content consumption device 410 may access a local store of data maintaining account specific data for the user account (e.g., account settings, privileges, controls, behavioral history, etc.) to perform various actions, such as changing account settings, or generating content recommendations. In some embodiments, content, recommendations, and/or data 432 may be requested and received from network-based content service 420 in order to provide identified user content, recommendations, and/or account-specific data 434 to a user.
The various embodiments of a content consumption device and/or a network-based service implementing device-enabled identification for automated user detection described with regard to
As indicated at 510, an identifying device may be detected within consumption proximity of a content consumption device, in various embodiments. Identifying devices may act as a proxy for the presence of a user/owner/operator/possessor of the identifying devices. An identifying device may be any mobile computing device, wearable computing device, or other device capable of communicating device information that may be wirelessly received at a content consumption device. For example, an identifying device may be a mobile phone, a tablet computer, laptop or smartwatch configured to actively broadcast device information. In some embodiments, an identifying device may not be active, but may passively provide device information (e.g., in response to a request signal or other communication from a content consumption device). For example, passive Radio Frequency Identification (RFID) tags may be embedded or implemented on various items which may be carried by user (e.g., credit cards with embedded RFID tags).
In at least some embodiments, device information may be received at a content consumption device via one or more wireless communications from an identifying device. For example, various types of radio wave communication protocols and techniques (e.g., Bluetooth, Bluetooth Low Energy (BLE), Z-Wave, ZigBee, XBee), infrared communications, Wi-Fi communications, or any other Wireless Personal Area Network (WPAN) communications may be utilized to provide device information between identifying devices and a content consumption device. Identifying devices may, in some embodiments, be configured to broadcast device information (e.g., an application or component implemented on an identifying device may be configured to proactively advertise the device over wireless communication protocols), or provide device information in response to requests from a content consumption device. In at least some embodiments, proximity sensing may be performed based upon the device information to determine a distance between a content consumption device and an identifying device. For example, signal strength of device information communicated between the content consumption device and the identifying device may be measured to determine the distance (e.g., a Received Signal Strength Indicator (RSSI) value). Content consumption devices may be any device configured to provide access to content according to a user account for the content (e.g., various content streaming systems or devices, specially configured computing resources, fixed position or mobile devices, such as system 1000 in
In at least some embodiments, a determination may be made as to whether identifying devices are within a consumption proximity of the content consumption device. Consumption proximity may indicate a distance range, or other location or area (e.g., defined by a geofence) within which a user may consume (e.g., play, listen to, view, interact with) content. As content may be various forms of media, static or interactive (e.g., games, applications, videos, music, etc.), the consumption proximity may be based on the form of content to which access is provided. For example, if the content is video or audio content, then consumption proximity may defined to include locations in the same room as the content consumption device (e.g., a room where a television or other content output device is located). Consumption proximity determinations may, in some embodiments, be made according to whether an identifying device is located within the area defined by consumption proximity (e.g., whether an identifying is located within a certain distance from the content consumption device). In at least some embodiments, multiple different locality rule(s) may be evaluated and/or applied to device information to determine whether a device is within consumption proximity. For example, in addition to the proximity or distance between the identifying device and the content consumption device, information about the device, such as identifying device state (e.g., on, inactive, charging) may be received. Locality rule(s) may describe valid or invalid device states, indicating those devices which may be within a described range or location but are to be ignored due to current state, for example. Applying locality rule(s) to device information may be performed according to various weightings or hierarchies, such that certain locality rules may be applied in the event of conflicting results for a consumption proximity determination.
For an identifying device that is detected within consumption proximity to a content consumption device, a determination may be made as to whether a user account is linked to or associated with the identifying device, as indicated at 520. For example, a local data store, such as an index, may be maintained, which contains mappings between identifying devices (e.g., device identifiers) and user accounts. Similarly, as discussed above with regard to
If one or more user account(s) are determined to be linked to or associated with the identifying device, as indicated by the positive exit from 520, then selection of a user account linked to or associated with the identifying device may be made. For example, as illustrated by the negative exit from 530, if only a single user account is linked to or associated with the identifying device, then the single user account may be automatically selected. In this way, identifying devices that are personal or unique to a particular user may provide automated user account selection at a content consumption device. Once selected, access to content via the content consumption device may be provided according to the selected user account, as indicated at 542. For instance, access privileges, content restrictions, payment information, historical content access data, and other information specific to the selected user account may be utilized to provide content access. In at least some embodiments, content recommendations (e.g., video recommendations, game recommendations, application recommendations, or audio recommendations) may be provided via the content consumption device (e.g., visually or audibly presented) that are based on historical content access data specific to the user account (e.g., past content selected/consumed, content reviews associated with the user account, etc.). In some embodiments, some content may be blocked, or otherwise prevent from access, according content controls or settings specific to the user account. For example, parental controls may impose content rating limitations to block user accounts for minor users from accessing mature content. Access may be provided, in some embodiments, without further manual input from a user. User account information may be automatically displayed or provided. In some embodiments, other detected devices (event if not in consumption proximity) may be displayed or otherwise indicated.
In some embodiments, as indicated by the positive exit from 530, multiple user accounts may be linked to or associated with an identifying device. For example, a household laptop or tablet computing device may be utilized by multiple different users. In this scenario, a user account selection interface may be provided, as indicated at 532. For example an interface may display list of user accounts, prompting the selection of one of the user accounts. Other forms of account selection may include voice or visual recognition of a user (e.g., via audio/visual sensors) or some other form of identification. In some embodiments, the user selection interface may be provided at the identifying device (e.g., on a tablet display). A selection of a user account may be received via the user account selection interface, as indicated at 534. Once selected, access to content via the content consumption device may be provided as discussed above.
In some scenarios, other users may be present within consumption proximity of a consumption device, as indicated by the positive exit from 540. These other users may be detected according to the various techniques described above based on an identifying device. However, user accounts may also be manually entered as opposed to being automatically selected in some embodiments. Thus access may be provided for content consumption via the content consumption device according to the user account and the other user accounts, as indicated at 550. For example, content recommendations may be provided based analyzing on historical data content access data for each of the selected user accounts, in some embodiments. Content restrictions, for example, may be enforced even if only required for one of the detected user accounts. By providing content access according to multiple detected user accounts, content access may dynamically adjust according to the presence of users in the room without manual input. For instance, if a user account for an adult with unrestricted access is selected, and a child user account is detected upon a child possessing an identifying device entering the room containing the content consumption device, then the content consumption device may automatically modify content recommendations displayed to account for content restricts associated with the child user account. In some embodiments, a social graph or association between user accounts detected as present at the same time may be created (e.g., creating a group profile). In some embodiments, a content consumption device may interface or communicate with other control systems or device to indicate the presence of a user at particular location (e.g., notify a lighting control system that a user is present in the room and to turn on the lights in the room). In some embodiments, a master, owner, or parental user account may be detected which may allow the owner account to control other detected devices (even if the other detected devices are not within consumption proximity). For example, a detected user account that is a parental account may utilize content consumption system to disable or block detected child identifying devices from current and/or future actions (e.g., disabling devices for an evening).
In some embodiments, the techniques described above with regard to
Device-enabled identification for automated user identification may be implemented to reduce user burdens from manually providing information whenever a user wishes to access content via a content consumption device according to a particular user profile. A similar burden may be incurred when a user no longer wishes to access content or moves out of consumption proximity. Therefore, similar techniques to detect when users are no longer accessing content or moving out of consumption proximity may be implemented.
As indicated at 610 an identifying device may be detected leaving consumption proximity of a content consumption device, in some embodiments. For example, a user with an identifying device on his person (e.g., a mobile phone in a pocket, an RFID-enabled credit card, or a smartwatch) may leave a room, walk away from a content output (e.g., media display or speakers), or otherwise move the identifying device outside of consumption proximity. Just as detecting identifying devices within consumption proximity may be performed, in some embodiments, by applying locality rule(s) so too the locality rule(s) may be applied to determine when an identifying device is outside consumption proximity. Consider the above example, where the identifying device is moved, a range or distance boundary between the identifying device and the content consumption device as described in a locality rule may be exceeded. Some locality rules may be specific to determining that an identifying device is not within consumption proximity. For instance, if a device is in a charging, sleeping, or powered off state, then the identification device may be considered outside consumption proximity. As discussed above with regard to
Users may be present within consumption proximity alone, or may only utilize a single user account to access content. Thus, as indicated by the negative exit from 620, in some embodiments, a responsive action to change content access may be performed in response to detecting that the identifying device left consumption proximity, as indicated at 630. For example, content access may be halted or paused (e.g., an ongoing video may be paused) in response to detecting that the identifying device is no longer within consumption proximity (inferring that a user is not currently listening, watching, interacting or otherwise consuming the content). In some embodiments, the user account linked to or associated with the identifying device may be logged out, removed, or otherwise no longer be used to provide content access. If, for example, the user account is logged out, then no additional purchases, rentals, views, downloads, or other access inputs may be authorized or allowed without logging into a valid account. A default account, profile, or other means of access to content via the content consumption device may be selected as a responsive action, in some embodiments.
As indicated by the positive exit from 620, other identifying device(s) may remain within consumption proximity of the content consumption device, in some embodiments. Therefore, as indicated at 640, content access may be provided according to user account(s) linked to or associated with the remaining identifying device(s), in some embodiments. For example, as discussed above with regard to
The methods described herein may in various embodiments be implemented by any combination of hardware and software. For example, in one embodiment, the methods may be implemented by a computer system (e.g., a computer system as in
Computer system 1000 includes one or more processors 1010 (any of which may include multiple cores, which may be single or multi-threaded) coupled to a system memory 1020 via an input/output (I/O) interface 1030. Computer system 1000 further includes a network interface 1040 coupled to I/O interface 1030. In various embodiments, computer system 1000 may be a uniprocessor system including one processor 1010, or a multiprocessor system including several processors 1010 (e.g., two, four, eight, or another suitable number). Processors 1010 may be any suitable processors capable of executing instructions. For example, in various embodiments, processors 1010 may be general-purpose or embedded processors implementing any of a variety of instruction set architectures (ISAs), such as the x86, PowerPC, SPARC, or MIPS ISAs, or any other suitable ISA. In multiprocessor systems, each of processors 1010 may commonly, but not necessarily, implement the same ISA. The computer system 1000 also includes one or more network communication devices (e.g., network interface 1040) for communicating with other systems and/or components over a communications network (e.g. Internet, LAN, etc.). For example, a client application executing on system 1000 may use network interface 1040 to communicate with a server application executing on a single server or on a cluster of servers that implement one or more of the components of the database systems described herein. In another example, an instance of a server application executing on computer system 1000 may use network interface 1040 to communicate with other instances of the server application (or another server application) that may be implemented on other computer systems (e.g., computer systems 1090).
In the illustrated embodiment, computer system 1000 also includes one or more persistent storage devices 1060 and/or one or more I/O devices 1080. In various embodiments, persistent storage devices 1060 may correspond to disk drives, tape drives, solid state memory, other mass storage devices, or any other persistent storage device. Computer system 1000 (or a distributed application or operating system operating thereon) may store instructions and/or data in persistent storage devices 1060, as desired, and may retrieve the stored instruction and/or data as needed. For example, in some embodiments, computer system 1000 may host a storage system server node, and persistent storage 1060 may include the SSDs attached to that server node.
Computer system 1000 includes one or more system memories 1020 that are configured to store instructions and data accessible by processor(s) 1010. In various embodiments, system memories 1020 may be implemented using any suitable memory technology, (e.g., one or more of cache, static random access memory (SRAM), DRAM, RDRAM, EDO RAM, DDR 10 RAM, synchronous dynamic RAM (SDRAM), Rambus RAM, EEPROM, non-volatile/Flash-type memory, or any other type of memory). System memory 1020 may contain program instructions 1025 that are executable by processor(s) 1010 to implement the methods and techniques described herein. In various embodiments, program instructions 1025 may be encoded in platform native binary, any interpreted language such as Java™ byte-code, or in any other language such as C/C++, Java™, etc., or in any combination thereof. For example, in the illustrated embodiment, program instructions 1025 include program instructions executable to implement the functionality of a real-time item recommendation engine (or module or component thereof), one or more computing systems, servers or nodes implementing a network-based content service, or storage systems that store the item selection data and/or the item recommendation model, in different embodiments. In some embodiments, program instructions 1025 may implement multiple separate clients, server nodes, and/or other components.
In some embodiments, program instructions 1025 may include instructions executable to implement an operating system (not shown), which may be any of various operating systems, such as UNIX, LINUX, Solaris™, MacOS™, Windows™, etc. Any or all of program instructions 1025 may be provided as a computer program product, or software, that may include a non-transitory computer-readable storage medium having stored thereon instructions, which may be used to program a computer system (or other electronic devices) to perform a process according to various embodiments. A non-transitory computer-readable storage medium may include any mechanism for storing information in a form (e.g., software, processing application) readable by a machine (e.g., a computer). Generally speaking, a non-transitory computer-accessible medium may include computer-readable storage media or memory media such as magnetic or optical media, e.g., disk or DVD/CD-ROM coupled to computer system 1000 via I/O interface 1030. A non-transitory computer-readable storage medium may also include any volatile or non-volatile media such as RAM (e.g. SDRAM, DDR SDRAM, RDRAM, SRAM, etc.), ROM, etc., that may be included in some embodiments of computer system 1000 as system memory 1020 or another type of memory. In other embodiments, program instructions may be communicated using optical, acoustical or other form of propagated signal (e.g., carrier waves, infrared signals, digital signals, etc.) conveyed via a communication medium such as a network and/or a wireless link, such as may be implemented via network interface 1040.
In some embodiments, system memory 1020 may include data store 1045, which may be configured as described herein. For example, the information described herein as being stored by persistent storage, such as the item selection data or the item recommendation model described herein may be stored in data store 1045 or in another portion of system memory 1020 on one or more nodes, in persistent storage 1060, and/or on one or more remote storage devices 1070, at different times and in various embodiments. In general, system memory 1020 (e.g., data store 1045 within system memory 1020), persistent storage 1060, and/or remote storage 1070 may store data blocks, replicas of data blocks, metadata associated with data blocks and/or their state, data storage configuration information, and/or any other information usable in implementing the methods and techniques described herein.
In one embodiment, I/O interface 1030 may be configured to coordinate I/O traffic between processor 1010, system memory 1020 and any peripheral devices in the system, including through network interface 1040 or other peripheral interfaces. In some embodiments, I/O interface 1030 may perform any necessary protocol, timing or other data transformations to convert data signals from one component (e.g., system memory 1020) into a format suitable for use by another component (e.g., processor 1010). In some embodiments, I/O interface 1030 may include support for devices attached through various types of peripheral buses, such as a variant of the Peripheral Component Interconnect (PCI) bus standard or the Universal Serial Bus (USB) standard, for example. In some embodiments, the function of I/O interface 1030 may be split into two or more separate components, such as a north bridge and a south bridge, for example. Also, in some embodiments, some or all of the functionality of I/O interface 1030, such as an interface to system memory 1020, may be incorporated directly into processor 1010.
Network interface 1040 may be configured to allow data to be exchanged between computer system 1000 and other devices attached to a network, such as other computer systems 1090 (which may implement one or more storage system server nodes, enterprise system nodes, and/or clients of the network-based content service systems described herein), for example. In addition, network interface 1040 may be configured to allow communication between computer system 1000 and various I/O devices 1050 and/or remote storage 1070. Input/output devices 1050 may, in some embodiments, include one or more display terminals, keyboards, keypads, touchpads, scanning devices, voice or optical recognition devices, or any other devices suitable for entering or retrieving data by one or more computer systems 1000. Multiple input/output devices 1050 may be present in computer system 1000 or may be distributed on various nodes of a distributed system that includes computer system 1000. In some embodiments, similar input/output devices may be separate from computer system 1000 and may interact with one or more nodes of a distributed system that includes computer system 1000 through a wired or wireless connection, such as over network interface 1040. Network interface 1040 may commonly support one or more wireless networking protocols (e.g., Wi-Fi/IEEE 802.11, or another wireless networking standard). However, in various embodiments, network interface 1040 may support communication via any suitable wired or wireless general data networks, such as other types of Ethernet networks, for example. Additionally, network interface 1040 may support communication via telecommunications/telephony networks such as analog voice networks or digital fiber communications networks, via storage area networks such as Fibre Channel SANs, or via any other suitable type of network and/or protocol. In various embodiments, computer system 1000 may include more, fewer, or different components than those illustrated in
It is noted that any of the system embodiments described herein, or any of their components, may be implemented as one or more network-based services, which may or may not be distributed. For example, a real-time item recommendation may be implemented an a network-based content service that employs the systems described herein to clients as network-based services. In some embodiments, a network-based service may be implemented by a software and/or hardware system designed to support interoperable machine-to-machine interaction over a network. A network-based service may have an interface described in a machine-processable format, such as the Web Services Description Language (WSDL). Other systems may interact with the network-based service in a manner prescribed by the description of the network-based service's interface. For example, the network-based service may define various operations that other systems may invoke, and may define a particular application programming interface (API) to which other systems may be expected to conform when requesting the various operations. though
In various embodiments, a network-based service may be requested or invoked through the use of a message that includes parameters and/or data associated with the network-based services request. Such a message may be formatted according to a particular markup language such as Extensible Markup Language (XML), and/or may be encapsulated using a protocol such as Simple Object Access Protocol (SOAP). To perform a network-based services request, a network-based services client may assemble a message including the request and convey the message to an addressable endpoint (e.g., a Uniform Resource Locator (URL)) corresponding to the network-based service, using an Internet-based application layer transfer protocol such as Hypertext Transfer Protocol (HTTP).
In some embodiments, network-based services may be implemented using Representational State Transfer (“RESTful”) techniques rather than message-based techniques. For example, a network-based service implemented according to a RESTful technique may be invoked through parameters included within an HTTP method such as PUT, GET, or DELETE, rather than encapsulated within a SOAP message.
Although the embodiments above have been described in considerable detail, numerous variations and modifications may be made as would become apparent to those skilled in the art once the above disclosure is fully appreciated. It is intended that the following claims be interpreted to embrace all such modifications and changes and, accordingly, the above description to be regarded in an illustrative rather than a restrictive sense.
This application is a continuation of U.S. patent application Ser. No. 14/637,175, filed Mar. 3, 2015, which is hereby incorporated by reference herein its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5867561 | Strasser | Feb 1999 | A |
6438579 | Hosken | Aug 2002 | B1 |
6675384 | Block et al. | Jan 2004 | B1 |
6934748 | Louviere et al. | Aug 2005 | B1 |
7640272 | Mahajan et al. | Dec 2009 | B2 |
7644400 | Harris et al. | Jan 2010 | B2 |
7751909 | Ramsey et al. | Jul 2010 | B2 |
8079042 | Foti et al. | Dec 2011 | B2 |
8218080 | Xu et al. | Jul 2012 | B2 |
8301770 | van Coppenolle et al. | Oct 2012 | B2 |
8384555 | Rosen | Feb 2013 | B2 |
8396452 | Matsuoka | Mar 2013 | B1 |
8630741 | Matsuoka et al. | Jan 2014 | B1 |
8754992 | Schulze | Jun 2014 | B1 |
8798323 | Soderstrom | Aug 2014 | B2 |
8914837 | Ahmed et al. | Dec 2014 | B2 |
8934748 | Rice et al. | Jan 2015 | B2 |
9113317 | Sagayaraj et al. | Aug 2015 | B2 |
9241187 | Ricci | Jan 2016 | B2 |
9288387 | Keller | Mar 2016 | B1 |
9380039 | Wildermuth | Jun 2016 | B2 |
9729551 | Karunakaran | Aug 2017 | B1 |
10382964 | Azam | Aug 2019 | B2 |
10757216 | Van Vliet et al. | Aug 2020 | B1 |
11363460 | Van Vliet et al. | Jun 2022 | B1 |
20030066071 | Gutta et al. | Apr 2003 | A1 |
20030100315 | Rankin | May 2003 | A1 |
20040003392 | Trajkovic et al. | Jan 2004 | A1 |
20040081144 | Martin et al. | Apr 2004 | A1 |
20040117442 | Thielen | Jun 2004 | A1 |
20050060157 | Daugherty et al. | Mar 2005 | A1 |
20050097595 | Lipsanen et al. | May 2005 | A1 |
20060005256 | Cox | Jan 2006 | A1 |
20060023915 | Aalbu et al. | Feb 2006 | A1 |
20060087554 | Boyd et al. | Apr 2006 | A1 |
20060107281 | Dunton | May 2006 | A1 |
20060236097 | Prologo et al. | Oct 2006 | A1 |
20070111748 | Risbood | May 2007 | A1 |
20070122111 | Yamamoto et al. | May 2007 | A1 |
20070126884 | Xu et al. | Jun 2007 | A1 |
20070162971 | Blom et al. | Jul 2007 | A1 |
20070165812 | Lee et al. | Jul 2007 | A1 |
20070180485 | Dua | Aug 2007 | A1 |
20070213100 | Osann, Jr. | Sep 2007 | A1 |
20070297112 | Gilbert | Dec 2007 | A1 |
20080039205 | Ackley et al. | Feb 2008 | A1 |
20080133334 | Ullah | Jun 2008 | A1 |
20080141293 | Blanchard et al. | Jun 2008 | A1 |
20080160984 | Benes et al. | Jul 2008 | A1 |
20080174551 | Ishibashi | Jul 2008 | A1 |
20080214145 | Howard et al. | Sep 2008 | A1 |
20080235739 | Coebergh Van Den Braak | Sep 2008 | A1 |
20080313548 | Krzyzanowski | Dec 2008 | A1 |
20090044225 | Lin et al. | Feb 2009 | A1 |
20090125971 | Belz et al. | May 2009 | A1 |
20090133051 | Hildreth | May 2009 | A1 |
20090135051 | Bishop | May 2009 | A1 |
20090138805 | Hildreth | May 2009 | A1 |
20090161871 | Chaudhry | Jun 2009 | A1 |
20090176509 | Davis et al. | Jul 2009 | A1 |
20090209293 | Louch | Aug 2009 | A1 |
20090217356 | Scott et al. | Aug 2009 | A1 |
20090248607 | Eggink et al. | Oct 2009 | A1 |
20090285492 | Ramanujapuram et al. | Nov 2009 | A1 |
20100080414 | Nonaka | Apr 2010 | A1 |
20100130182 | Rosen | May 2010 | A1 |
20100180009 | Callahan | Jul 2010 | A1 |
20100190481 | Nath et al. | Jul 2010 | A1 |
20100199105 | Lee | Aug 2010 | A1 |
20100250327 | Relyea, Jr. et al. | Sep 2010 | A1 |
20100262712 | Kim et al. | Oct 2010 | A1 |
20100268821 | Pau et al. | Oct 2010 | A1 |
20100315279 | Hamai | Dec 2010 | A1 |
20100325194 | Williamson et al. | Dec 2010 | A1 |
20110003582 | Park et al. | Jan 2011 | A1 |
20110022447 | Pelaic | Jan 2011 | A1 |
20110062794 | Vergoossen et al. | Mar 2011 | A1 |
20110320380 | Zahn et al. | Mar 2011 | A1 |
20110125777 | Begeja et al. | May 2011 | A1 |
20110141114 | Chen et al. | Jun 2011 | A1 |
20110145648 | Garcia-Tobin | Jun 2011 | A1 |
20110173229 | Choudhury et al. | Jul 2011 | A1 |
20110201280 | Dolfini | Aug 2011 | A1 |
20110207440 | Ruuspakka et al. | Aug 2011 | A1 |
20110237324 | Clavin et al. | Sep 2011 | A1 |
20120060176 | Chai et al. | Mar 2012 | A1 |
20120071132 | Carlander | Mar 2012 | A1 |
20120131098 | Wood | May 2012 | A1 |
20120134548 | Rhoads | May 2012 | A1 |
20120158775 | Choi et al. | Jun 2012 | A1 |
20120191726 | Markus et al. | Jul 2012 | A1 |
20120280901 | Kim | Nov 2012 | A1 |
20120330544 | Joong et al. | Dec 2012 | A1 |
20130007874 | Purvis | Jan 2013 | A1 |
20130081081 | Wang | Mar 2013 | A1 |
20130082662 | Carre | Apr 2013 | A1 |
20130097101 | Ortiz | Apr 2013 | A1 |
20130117381 | Garcia et al. | May 2013 | A1 |
20130130669 | Xiao et al. | May 2013 | A1 |
20130157607 | Paek et al. | Jun 2013 | A1 |
20130174223 | Dykeman et al. | Jul 2013 | A1 |
20130218905 | Sankarasubramaniam et al. | Aug 2013 | A1 |
20130339991 | Ricci | Oct 2013 | A1 |
20130297706 | Arme et al. | Nov 2013 | A1 |
20130324160 | Sabatellil et al. | Dec 2013 | A1 |
20130325655 | Wouhaybi et al. | Dec 2013 | A1 |
20140007205 | Oikonomou | Jan 2014 | A1 |
20140026201 | Srinivasan et al. | Jan 2014 | A1 |
20140040989 | Davis | Feb 2014 | A1 |
20140068645 | Badros et al. | Mar 2014 | A1 |
20140082147 | Pazos | Mar 2014 | A1 |
20140082208 | Ojanpera | Mar 2014 | A1 |
20140096180 | Negi et al. | Apr 2014 | A1 |
20140109184 | Parker, II | Apr 2014 | A1 |
20140123257 | Gordon et al. | May 2014 | A1 |
20140172691 | Raman | Jun 2014 | A1 |
20140173051 | Sagayaraj et al. | Jun 2014 | A1 |
20140181535 | Smith et al. | Jun 2014 | A1 |
20140181910 | Fingal | Jun 2014 | A1 |
20140223467 | Hayton et al. | Aug 2014 | A1 |
20140230018 | Anantharaman | Aug 2014 | A1 |
20140232903 | Oshima et al. | Aug 2014 | A1 |
20140244009 | Mestas | Aug 2014 | A1 |
20140274007 | Detter et al. | Sep 2014 | A1 |
20140274185 | Luna et al. | Sep 2014 | A1 |
20140359647 | Shoemake et al. | Dec 2014 | A1 |
20140372228 | Paz-Pujalt | Dec 2014 | A1 |
20150036573 | Malik | Feb 2015 | A1 |
20150039748 | Draznin et al. | Feb 2015 | A1 |
20150067714 | Bhogal et al. | Mar 2015 | A1 |
20150074800 | Farraro | Mar 2015 | A1 |
20150088253 | Doll | Mar 2015 | A1 |
20150095933 | Blackburn | Apr 2015 | A1 |
20150149366 | Schafer | May 2015 | A1 |
20150177939 | Anderson et al. | Jun 2015 | A1 |
20150178769 | Mirisola | Jun 2015 | A1 |
20150186535 | Patil et al. | Jul 2015 | A1 |
20150189426 | Pang | Jul 2015 | A1 |
20150195675 | Larkin et al. | Jul 2015 | A1 |
20150281302 | Winston et al. | Oct 2015 | A1 |
20150281767 | Adimatyam et al. | Oct 2015 | A1 |
20150382047 | Van Os et al. | Dec 2015 | A1 |
20160005003 | Norris et al. | Jan 2016 | A1 |
20160005012 | Goetz et al. | Jan 2016 | A1 |
20160036939 | Freund et al. | Feb 2016 | A1 |
20160044385 | Kareeson et al. | Feb 2016 | A1 |
20160088358 | Garcia Navarro | Mar 2016 | A1 |
20160094939 | Guy | Mar 2016 | A1 |
20160121161 | Mountain | May 2016 | A1 |
20160142783 | Bagga et al. | May 2016 | A1 |
20160173929 | Klappert et al. | Jun 2016 | A1 |
20160182502 | Smith et al. | Jun 2016 | A1 |
20160205344 | Suzuki et al. | Jul 2016 | A1 |
20170372228 | Daly et al. | Dec 2017 | A1 |
20200150735 | Agrawal et al. | May 2020 | A1 |
Number | Date | Country |
---|---|---|
105894721 | Aug 2016 | CN |
2004274849 | Sep 2004 | JP |
2006339866 | Dec 2006 | JP |
WO-2006053324 | May 2006 | WO |
2007009252 | Jan 2007 | WO |
Entry |
---|
Puttaswamy, Krishna PN, Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, Amr El Abbadi, Christopher Kruegel, and Ben Y. Zhao. “Preserving location privacy in geosocial applications.” IEEE Transactions on Mobile Computing 13, No. 1 (2012): 159-173. (Year: 2012). |
Knappmeyer, Michael, Saad Liaquat Kiani, Eike Steffen Reetz, Nigel Baker, and Ralf Tonjes. “Survey of context provisioning middleware.” IEEE Communications Surveys & Tutorials 15, No. 3 (2013): 1492-1519. (Year: 2013). |
De Vleeschauwer, Danny, Chris Hawinkel, and Yannick Le Louédec. “Determining leaders and clusters in video consumption.” In Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), pp. 382-385. IEEE, 2013. (Year: 2013). |
Lima, Joao Carlos D., Cristiano C. Rocha, and Iara Augustin. “A context-aware recommendation system to behavioral based authentication in mobile and pervasive environments.” In 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing, pp. 312-319. IEEE, 2011. (Year: 2011). |
Otebolaku, Abayomi Moradeyo, and Maria Teresa Andrade. “Supporting context-aware cloud-based media recommendations for smartphones.” In 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp. 109-116. IEEE, 2014. (Year: 2014). |
Dedrick, “Interactive Electronic Advertising”, IEEE, 1994, pp. 55-66. |
Number | Date | Country | |
---|---|---|---|
20220303774 A1 | Sep 2022 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14637175 | Mar 2015 | US |
Child | 17806411 | US |