The described embodiments relate to techniques for providing incentive-based advertising to a unique verified individual.
Digital advertising that is provided via networks, such as the Internet or World Wide Web (WWW), has become a large source of revenue for companies. Moreover, behaviors or activities of individuals are routinely used to subsequently target advertising to the individuals. For example, information about the web pages or websites visited by an individual, online purchases by the individual (or e-commerce), and physical locations of an electronic device of the individual provide a digital signature of the individual that can be used to dynamically target digital advertising to the individual (such as in advertising embedded in a window in a web page).
However, the targeting of advertisements in existing digital advertising approaches is often hindered by uncertainty in the digital signatures, such as whether or not a monitored activity or behavior is actually associated with a particular individual. Instead, digital signatures typically include information that is probabilistically associated with individuals, which means that targeted advertising is often provided in error and, thus, may be ineffective. Such mistargeted advertisements increase costs for advertisers. These challenges have been compounded by the removal of cookie-based tracking and the use of dynamic network addresses (such as randomization of a media access control or MAC address of an electronic device), which have increased the association uncertainty in digital signatures.
Furthermore, even when a targeted advertisement is provided to the correct individual at an opportune time, it can be difficult to accurately assess the impact of the targeted advertisement. Notably, it is often challenging to determine whether subsequent purchasing behavior by the individual was, in fact, in response to or motivated by the targeted advertisement. This attribution problem increases errors in the targeting of advertisements, and thus can also increase costs for advertisers.
A computer system that selectively provides a credit described. This computer system includes: an interface circuit; a computation device coupled to the interface circuit; and memory, coupled to the computation device, storing program instructions. During operation, the computer system obtains information specifying a unique verified individual. Then, the computer system determines an interest of the unique verified individual. Moreover, the computer system provides, addressed to an electronic device associated with the unique verified individual, an advertisement based at least in part on the determined interest, where the advertisement is intended for the unique verified individual, and the advertisement is associated with a provider of a product or a service. Next, the computer system receives, associated with the electronic device or a computer, a response associated with the advertisement. Furthermore, when the response indicates the electronic device accessed a location associated with the provider of the product or the service, accepted an offer associated with the provider of the product or the service, or purchased the product or the service, the computer system provides the credit to an account associated with the unique verified individual.
Note that an identity of the unique verified individual, while unknown to the computer system, may be confirmed and may not be associated with another individual.
Moreover, the obtaining may include receiving, associated with the electronic device, the information.
Furthermore, the determining may include receiving, associated with a second computer, second information specifying or corresponding to the interest of the unique verified individual. Alternatively or additionally, the determining may include receiving, associated with the electronic device, the second information. In some embodiments, the second information may be based at least in part on selections from predefined categories of interests. Note that the second information may be based at least in part on behaviors or activities of the unique verified individual, e.g., when using the electronic device.
Moreover, the advertisement may be provided based at least in part on advertisement parameters associated with the provider of the product or the service.
Furthermore, the computer may be associated with the provider of the product or the service.
Additionally, the location may include a web page or a website.
In some embodiments, the credit may include a cryptographic token or may be associated with another type of financial instrument.
Note that the account may include a digital wallet associated with the unique verified individual.
Moreover, an identity of the unique verified individual may remain unknown to the computer system during operations performed by the computer system.
Furthermore, the response may include or may correspond to proof of purchase of the product or the service.
Additionally, the credit may include a portion of a financial value of the advertisement.
Another embodiment provides the electronic device, which performs counterpart operations to at least some of the aforementioned operations.
Another embodiment provides the computer, which performs counterpart operations to at least some of the aforementioned operations.
Another embodiment provides a computer-readable storage medium for use with the computer system, the electronic device or the computer. When executed by the computer system, the electronic device or the computer, this computer-readable storage medium causes the computer system, the electronic device or the computer to perform at least some of the aforementioned operations or counterparts to at least some of the aforementioned operations.
Another embodiment provides a method, which may be performed by the computer system, the electronic device or the computer. This method includes at least some of the aforementioned operations or counterparts to at least some of the aforementioned operations.
This Summary is provided for purposes of illustrating some exemplary embodiments, so as to provide a basic understanding of some aspects of the subject matter described herein. Accordingly, it will be appreciated that the above-described features are examples and should not be construed to narrow the scope or spirit of the subject matter described herein in any way. Other features, aspects, and advantages of the subject matter described herein will become apparent from the following Detailed Description, Figures, and Claims.
Note that like reference numerals refer to corresponding parts throughout the drawings. Moreover, multiple instances of the same part are designated by a common prefix separated from an instance number by a dash.
During operation, a computer system may obtain information specifying a unique verified individual. Then, the computer system may determine an interest of the unique verified individual. Moreover, the computer system may provide, addressed to an electronic device associated with the unique verified individual, an advertisement based at least in part on the determined interest, where the advertisement is intended for the unique verified individual, and the advertisement is associated with a provider of a product or a service. Next, the computer system may receive, associated with the electronic device or a computer, a response associated with the advertisement. Furthermore, when the response indicates the electronic device accessed a location associated with the provider of the product or the service, accepted an offer associated with the provider of the product or the service, or purchased the product or the service, the computer system may provide a credit to an account associated with the unique verified individual.
By providing the advertisement to the unique verified individual and selectively providing the credit, these advertising techniques may allow advertising to be accurately targeted and may incentivize participation of the individual in the advertising techniques. Notably, by sharing a portion of the revenue associated with successful advertising as a credit to the individual, the advertising techniques may incentivize the individual to enroll in the advertising technique, and thus to provide or to authorize the providing of the information. Moreover, the advertising techniques may allow the unique verified individual to remain anonymous to the computer system, thereby protecting the individual's privacy while allowing the individual to benefit from the targeted advertisement. Consequently, the advertising techniques may significantly increase the accuracy of targeted advertising, may reduce costs of advertisers (such as the provider of the service or the product) by reducing or eliminated mistargeted advertisements, and/or may reduce or eliminate the attribution problem. Therefore, the advertising techniques may increase the satisfaction or the user experience of the individual and advertisers, such as the provider of the service or the product.
In the discussion that follows, an individual or a user of the advertising techniques may be a person. Also, or instead, the advertising techniques may be used by any type of organization, such as a business (which should be understood to include for-profit corporations), non-profit corporations, groups (or cohorts) of individuals, sole proprietorships, government agencies, partnerships, etc.
In the discussion that follows, electronic devices or components in a system communicate packets in accordance with a wireless communication protocol, such as: a wireless communication protocol that is compatible with an IEEE 802.11 standard (which is sometimes referred to as ‘Wi-Fi,’ from the Wi-Fi Alliance of Austin, Texas), Bluetooth or Bluetooth low energy or BLE (from the Bluetooth Special Interest Group of Kirkland, Washington), a cellular-telephone network or data network communication protocol (such as a third generation or 3G communication protocol, a fourth generation or 4G communication protocol, e.g., Long Term Evolution or LTE (from the 3rd Generation Partnership Project of Sophia Antipolis, Valbonne, France), LTE Advanced or LTE-A, a fifth generation or 5G communication protocol, or other present or future developed advanced cellular communication protocol), and/or another type of wireless interface (such as another wireless-local-area-network interface). For example, an IEEE 802.11 standard may include one or more of: IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11-2007, IEEE 802.11n, IEEE 802.11-2012, IEEE 802.11-2016, IEEE 802.11ac, IEEE 802.11ax, IEEE 802.11ba, IEEE 802.11be, or other present or future developed IEEE 802.11 technologies. Moreover, an access point, a radio node, a base station or a switch in the wireless network may communicate with a local or remotely located computer or computer system using a wired communication protocol, such as a wired communication protocol that is compatible with an IEEE 802.3 standard (which is sometimes referred to as ‘Ethernet’), e.g., an Ethernet II standard and/or another type of wired interface. However, a wide variety of communication protocols may be used in the system, including wired and/or wireless communication. In the discussion that follows, Wi-Fi and Ethernet are used as illustrative examples.
We now describe some embodiments of the disclosed techniques.
Note that access points 116 and/or radio nodes 118 may communicate with each other, a computer system 130 and/or an optional controller 112 (which may be a local or a cloud-based controller that manages and/or configures access points 116, radio nodes 118 and/or a computer network device or CND 128, such as a switch or a router) using a wired communication protocol (such as Ethernet) via network 120 and/or 122. Moreover, computer system 130 may include one or more computers 132. However, in some embodiments, access points 116 and/or radio nodes 118 may communicate with each other and/or the controller using wireless communication (such as Wi-Fi, Bluetooth and/or another wireless communication protocols), e.g., one of access points 116 may be a mesh access point in a mesh network. Note that networks 120 and 122 may be the same or different networks. For example, networks 120 and/or 122 may an LAN, an intra-net or the Internet. In some embodiments, wireless communication between at least pairs of components in
As described further below with reference to
During the communication in
As can be seen in
In the described embodiments, processing a packet or a frame in access points 116 and/or radio nodes 118 and electronic devices 110 may include: receiving the wireless signals with the packet or the frame; decoding/extracting the packet or the frame from the received wireless signals to acquire the packet or the frame; and processing the packet or the frame to determine information contained in the payload of the packet or the frame.
Note that the wireless communication in
In some embodiments, wireless communication between components in
Although we describe the network environment shown in
As discussed previously, it can be difficult to target advertisements to individuals. Moreover, as discussed below with reference to
In some embodiments, the profile may be established using a registration process, which may be performed by the individual using electronic device 110-1 and by interacting with computer system 130 (or a computer) that establishes the profile of the individual. For example, the registration process may include a know your customer (KYC) process or verification service in which the individual provides identifying information, such as an image of their driver's license, a Social Security number, etc. to the computer system 130.
In addition to registering the individual, during the registration process the individual may provide, to computer system 130, information about the interests of the individual, such as activities, products or services the individual likes or dislikes. For example, the individual may select their interests from predefined categories of interests using a user interface (e.g., which may be provided by computer system 130 and rendered in a Browser on electronic device 110-1, using an application associated with computer system 130 and installed on electronic device 110-1, and/or by interaction with a web page or website associated with computer system 130). Alternatively or additionally, the information about the interests of the individual may be indirectly provided or specified, such as by having the individual select or provide socio-demographic information (e.g., age, gender, income, marital status, etc.), address information, academic information, professional information (e.g., a type of job of the individual), hobbies, activities, behaviors and/or another type of information that corresponds to the interests of the individual.
Moreover, during the registration process, the individual may provide or specify a financial account of or associated with the individual. For example, the financial account may be associated with a digital currency, such as a digital wallet of the individual that is based on a digital representation of a physical currency or a cryptographic token (such as cryptographic currency based on blockchain, e.g., a decentralized anonymous organization (DAO) token). However, in general, the financial account of the individual may be based on another type of financial instrument, such as a credit card or a debit card, or another type of incentive or reward.
As noted previously, in some embodiments the registration process may be performed via: a web page or a website that the individual navigates to, a browser plugin, or an application that is installed on and that executes in an environment of electronic device 110-1 (such as the operating system).
After the registration process, the individual (who is sometimes referred to as a ‘unique verified individual’) may provide to computer system 130 or authorize computer system 130 to provide information specifying them as the unique verified individual in the profile. For example, the unique verified individual may instruct electronic device 110-1 to provide the information to computer system 130 or an optional computer system 134 (which includes one or more computers 136) that implements the advertising techniques, which may be the same as or different from computer system 130 that establishes the profile of the unique verified individual. In the discussion that follows, the advertising technique is illustrated using computer system 134. In some embodiments, the unique verified individual is identified by a unique identifier that is generated using a secure or cryptographic (one-way) hash from an identifier of the unique verified individual (and/or an identifier of electronic device 110-1, which is used by the unique verified individual). Alternatively or additionally, the unique verified individual may be identified using blockchain, which uniquely identifies the individual while maintaining their anonymity.
Then, computer system 134 may determine an interest of the unique verified individual. For example, the determining may include receiving, associated with computer system 130, second information specifying or corresponding to the interest of the unique verified individual (such as an interest that was specified by the individual during the enrollment process). Alternatively or additionally, the determining may include receiving, associated with electronic device 110-1, the second information (such as by having the unique verified individual directly provide the second information to computer system 134, instead of via computer system 130). As noted previously, in some embodiments, the second information may be based at least in part on selections by the unique verified individual from predefined categories of interests. Note that the second information may be based at least in part on behaviors or activities of the unique verified individual, e.g., when using electronic device 110-1 (such as when navigating to and viewing web pages or websites, performing e-commerce, etc.). Thus, in some embodiments, the second information may be dynamically determined by computer system 134 based at least in part on actions and/or activities of the unique verified individual.
Moreover, computer system 134 may provide, addressed to electronic device 110-1, an advertisement based at least in part on the determined interest, where the advertisement is intended for the unique verified individual, and the advertisement is associated with a provider of a product or a service (which is sometimes referred to as an ‘advertiser’). Note that the advertisement may be provided based at least in part on advertisement parameters associated with the provider of the product or the service. For example, the provider of the product or the service may have previously provided the advertising parameters to computer system 134 via another computer or another computer system (not shown). In some embodiments, computer system 134 indirectly provides the advertisement to electronic device 110-1, e.g., via a demand site provider (not shown) that brokers advertising.
Next, computer system 134 may receive, associated with electronic device 110-1 or a computer (not shown) (which may or may not be included in computer system 130 or computer system 134, e.g., which may be associated with a party that is different from a provider of the advertising techniques, such as a retailer or the provider of the product or the service), a response associated with the advertisement. For example, the unique verified individual may, via electronic device 110-1, provide the response that includes or corresponds to proof of purchase of the product or the service, such as a receipt or an image of a receipt for the product or the service.
Furthermore, when the response indicates electronic device 110-1 accessed a location (such as a web page or a website) associated with the provider of the product or the service, accepted an offer associated with the provider of the product or the service, or purchased the product or the service, computer system 134 may provide a credit to the account associated with the unique verified individual (such as to an account managed by computer system 138, which includes one or more computers 140). For example, the credit may include a financial incentive to the unique verified individual, such as a portion of the revenue associated with the advertisement, which may be paid by the provider of the product or the service to a provider of computer system 134 or the advertising techniques. Thus, the credit may include a portion of a financial value of the advertisement, such as 51% of the financial value.
In some embodiments, there may be different tiers or categories of credit that are provided to the account. For example, there may be different rewards for an impression or viewing of the advertisement by the unique verified individual, clicking through or activating a link associated with the advertisement, and conversion, such as downloading or purchasing the product or the service.
In these ways, the advertising techniques may incentivize the unique verified individual to participate, thereby improving the accuracy of targeted advertising, such as the advertisement. Moreover, the advertising techniques may also allow the unique verified individual to maintain their privacy. Notably, computer system 134 may not know the identity of the unique verified individual during the advertising technique (thus, the identity of the unique verified individual may be obfuscated). However, computer system 134 may be able to confirm that the unique verified individual is not another individual (and, thus, that the individual is the unique verified individual), which may allow information about the unique verified individual to be collected or aggregated, so that advertising can be accurately targeted to the unique verified individual. Furthermore, by selectively providing the credit after the efficacy of the advertisement has been confirmed, the advertising techniques may address the attribution problem, thereby further improving the accuracy of targeted advertising by closing the loop and confirming whether a give targeted advertisement was effective in modifying the activity or the behavior of the unique verified individual.
Note that by improving the targeting of advertising, the advertising techniques may reduce the use of resources in computer system 134, such as processing, memory, network bandwidth, etc. For example, the advertising techniques may reduce mistargeted advertisements. Thus, the advertising techniques may improve the efficiency of computer system 134.
While
We now describe embodiments of methods associated with the advertising techniques.
Then, the computer system may determine an interest (operation 212) of the unique verified individual. For example, the determining may include receiving, associated with a second computer, second information specifying or corresponding to the interest of the unique verified individual. Alternatively or additionally, the determining may include receiving, associated with the electronic device, the second information. In some embodiments, the second information may be based at least in part on selections from predefined categories of interests. Note that the second information may be based at least in part on behaviors and/or activities of the unique verified individual, e.g., when using the electronic device (such as navigation to and/or interaction with one or more web pages or websites, a location of the electronic device, etc.).
Moreover, the computer system may provide, addressed to the electronic device, an advertisement (operation 214) based at least in part on the determined interest, where the advertisement is intended for the unique verified individual, and the advertisement is associated with a provider of a product or a service. For example, one or more attributes or characteristics associated with the advertisement may match one or more attributes or characteristics of the determined interest. Notably, the one or more attributes or characteristics of the determined interest may be input to a pretrained predictive model (such as a supervised machine-learning model, e.g., the supervised machine-learning model may have been obtained from a training dataset using a support vector machine technique, a classification and regression tree technique, logistic regression, LASSO, linear regression, a neural network technique, e.g., a convolutional neural network technique, a generative adversarial network or another type of neural network technique, and/or another linear or nonlinear supervised machine-learning technique), which outputs or selects the advertisement. Thus, the advertisement may be dynamically generated for the unique verified individual or may be a predefined or predetermined advertisement that is selected for the unique verified individual. Note that the advertisement may be provided based at least in part on advertisement parameters associated with the provider of the product or the service. In some embodiments, providing the advertisement (operation 214) may include providing a pointer or a location (such as a server) that provides the advertisement.
Next, the computer system may receive, associated with the electronic device or a second computer, a response (operation 216) associated with the advertisement. For example, the response may indicate activation of a link included in the advertisement. In some embodiments, the response may include or may correspond to proof of purchase of the product or the service. Note that the second computer may be associated with the provider of the product or the service.
Furthermore, when the response indicates acceptance of an offer associated with the product or the service (operation 218), such as when the electronic device accessed a location (such as a location of a web page or a website, e.g., an Internet Protocol address, a Uniform Resource Locator or URL, or a Uniform Resource Indicator or URI) associated with the provider of the product or the service, accepted an offer associated with the provider of the product or the service, or purchased the product or the service, the computer system may provide the credit (operation 220) to an account associated with the unique verified individual. Otherwise (operation 218), the computer system may not take an action (operation 222).
In some embodiments, the credit may include a cryptographic token or may be associated with another type of financial instrument. Additionally, the credit may include a portion of a financial value of the advertisement. Note that the account may include a digital wallet associated with the unique verified individual.
Moreover, an identity of the unique verified individual may remain unknown to the computer system at least during operations performed by the computer system or globally (e.g., the computer system may never know the identity of the unique verified individual).
In some embodiments of method 200, there may be additional or fewer operations. Furthermore, the order of the operations may be changed, and/or two or more operations may be combined into a single operation.
Embodiments of the advertising techniques are further illustrated in
Moreover, interface circuit 320 may monitor activity 324 and/or location 326 of electronic device 110-1 by interacting with interface circuit 328 in electronic device 110-1. For example, activity 324 may include navigation and/or interaction with a web page or a website by the unique verified individual. Alternatively or additionally, location 326 may include a physical location of electronic device 110-1, such as Global Positioning System or GPS coordinates, a location determined by triangulation and/or trilateration, etc. Interface circuit 320 may provide activity 324 and/or location 326 to processor 322.
Then, processor 322 (or a computation device) may determine an interest 330 of the unique verified individual. For example, activity 324 and/or location 326 may be input to a pretrained predictive model (such as a supervised machine-learning model) that is executed by processor 322, and interest 330 may be output by the pretrained predictive model.
Moreover, processor 322 may compute or dynamically generate advertisement 332 based at least in part on interest 330. For example, interest 330 may be input to a second pretrained predictive model (such as a second supervised machine-learning model), and advertisement 332 may be output by the second pretrained predictive model. Alternatively, advertisement 332 may be output or selected from a set of predefined advertisements based at least in part on interest 330. Notably, processor 322 may rank the predefined advertisements based at least in part on matches between one or more attributes or characteristics of the predefined advertisements and one or more attributes or characteristics associated with interest 330.
Next, processor 322 may instruct 334 interface circuit 320 to provide to electronic device 110-1 with advertisement 332 (or information specifying advertisement 332). This advertisement may be intended for the unique verified individual, and advertisement 332 may be associated with a provider of a product or a service.
After receiving advertisement 332, interface circuit 328 may provide advertisement 332 to processor 336 in electronic device 110-1. Moreover, processor 336 may display advertisement 332 on a display 338 (and//or may output audio associated with advertisement 332 using one or more speakers) in or associated with electronic device 110-1. Then, the unique verified individual may accept advertisement 332, e.g., by activating 342 a link in or associated with advertisement 332 using a user-interface device (UID) 340 (such as a touch-sensitive display) in electronic device 110-1. In response to activating 342 the link, processor 336 may instruct 344 interface circuit 328 to inform 346 computer system 134 (or a computer system that is associated with the provider of the product or the service, and which may inform computer system 134 that advertisement 332 was accepted).
After receiving the information, interface circuit 320 may provide an associated response 348 to processor 322. Furthermore, when response 348 indicates electronic device 110-1 accessed a location associated with the provider of the product or the service, accepted an offer associated with the provider of the product or the service, or purchased the product or the service, processor 322 may instruct 350 interface circuit 320 to provide a credit 352 to computer system 138 that manages an account associated with the unique verified individual. In response to receiving credit 352, computer system 138 may apply credit 352 to the account of the unique verified individual.
While
In some embodiments of the advertising techniques, a user may provide information to a KYC verification service, including one or more of: an identifier of the user (which may include visual confirmation, such as a photograph of the user, e.g., a driver's license or passport), location, marital status, income, age, gender, education, job title, dream job, hobbies, current car, next or future car, dream car, current watch, next or future watch, dream watch, current sound system, next or future sound system, dream sound system, planned purchases in the next 6 or 12 months, other aspirations, etc.
Moreover, personal identifiable information (PII) and authentication, the user may have an opaque key on a computer system (such as computer system 130 or 134 in
Furthermore, regarding interests/targetable attributes, these may be associated with the opaque user identifier and may be stored securely. An authorized user may be able to view, update and/or change their interests.
Note that the association of interest categories and demographics for the purposes of targeting may occur via an intermediary identifier. When a user of a certain age, gender and location expresses an interest, e.g., in watches, this interest may be stored with their data (so the user can view, update and/or change it, as needed).
The advertising techniques may also store a targeting key that is cryptographically generated based at least in part on a universal unique identifier (UUID) and the advertising targeting specification (which may also have a second UUID). In this way, advertisements matching this specification may need to be queried with the intermediary identifier in order to be presented on a user's electronic device(s). Data and actions taken by the user (such as clicking on an advertisement, converting or purchasing a product in response to the advertisement, and/or viewing an advertisement or product) may be pushed by the user account into the system using the intermediary identifier. This means that it may be impossible to identify users from an advertisement target specification, even if the specification is made so specific that there is only one user targeted.
Unlike many other approaches, the disclosed advertising techniques may be able to report one-to-one on online sales generated by digital advertisements (even when cookies are not used).
In other approaches, user privacy may be protected by continuously limiting the targeting capabilities for advertisers. This may inflate the cost per milles (CPMs) and may necessitate the use of machine learning or artificial intelligence targeting to identify relevant users for each and every advertiser. However, these approaches are stochastic in nature and may not have the same targeting or accuracy that is available in the disclosed advertising techniques.
We now describe embodiments of an electronic device, which may perform at least some of the operations in the advertising techniques.
Memory subsystem 412 includes one or more devices for storing data and/or instructions for processing subsystem 410 and networking subsystem 414. For example, memory subsystem 412 can include dynamic random access memory (DRAM), static random access memory (SRAM), and/or other types of memory. In some embodiments, instructions for processing subsystem 410 in memory subsystem 412 include: program instructions or sets of instructions (such as program instructions 422 or operating system 424), which may be executed by processing subsystem 410. Note that the one or more computer programs or program instructions may constitute a computer-program mechanism. Moreover, instructions in the various program instructions in memory subsystem 412 may be implemented in: a high-level procedural language, an object-oriented programming language, and/or in an assembly or machine language. Furthermore, the programming language may be compiled or interpreted, e.g., configurable or configured (which may be used interchangeably in this discussion), to be executed by processing subsystem 410.
In addition, memory subsystem 412 can include mechanisms for controlling access to the memory. In some embodiments, memory subsystem 412 includes a memory hierarchy that comprises one or more caches coupled to a memory in electronic device 400. In some of these embodiments, one or more of the caches is located in processing subsystem 410.
In some embodiments, memory subsystem 412 is coupled to one or more high-capacity mass-storage devices (not shown). For example, memory subsystem 412 can be coupled to a magnetic or optical drive, a solid-state drive, or another type of mass-storage device. In these embodiments, memory subsystem 412 can be used by electronic device 400 as fast-access storage for often-used data, while the mass-storage device is used to store less frequently used data.
Networking subsystem 414 includes one or more devices configured to couple to and communicate on a wired and/or wireless network (i.e., to perform network operations), including: control logic 416, an interface circuit 418 and one or more antennas 420 (or antenna elements). (While
Networking subsystem 414 includes processors, controllers, radios/antennas, sockets/plugs, and/or other devices used for coupling to, communicating on, and handling data and events for each supported networking system. Note that mechanisms used for coupling to, communicating on, and handling data and events on the network for each network system are sometimes collectively referred to as a ‘network interface’ for the network system. Moreover, in some embodiments a ‘network’ or a ‘connection’ between electronic devices does not yet exist. Therefore, electronic device 400 may use the mechanisms in networking subsystem 414 for performing simple wireless communication between electronic devices, e.g., transmitting advertising or beacon frames and/or scanning for advertising frames transmitted by other electronic devices.
Within electronic device 400, processing subsystem 410, memory subsystem 412, and networking subsystem 414 are coupled together using bus 428. Bus 428 may include an electrical, optical, and/or electro-optical connection that the subsystems can use to communicate commands and data among one another. Although only one bus 428 is shown for clarity, different embodiments can include a different number or configuration of electrical, optical, and/or electro-optical connections among the subsystems.
In some embodiments, electronic device 400 includes a display subsystem 426 for displaying information on a display, which may include a display driver and the display, such as a liquid-crystal display, a multi-touch touchscreen, etc. Moreover, electronic device 400 may include a user-interface subsystem 430, such as: a mouse, a keyboard, a trackpad, a stylus, a voice-recognition interface, and/or another human-machine interface.
Electronic device 400 can be (or can be included in) any electronic device with at least one network interface. For example, electronic device 400 can be (or can be included in): a desktop computer, a laptop computer, a subnotebook/netbook, a server, a supercomputer, a tablet computer, a smartphone, a smartwatch, a cellular telephone, a consumer-electronic device, a portable computing device, communication equipment, a monitoring device and/or another electronic device.
Although specific components are used to describe electronic device 400, in alternative embodiments, different components and/or subsystems may be present in electronic device 400. For example, electronic device 400 may include one or more additional processing subsystems, memory subsystems, networking subsystems, and/or display subsystems. Additionally, one or more of the subsystems may not be present in electronic device 400. Moreover, in some embodiments, electronic device 400 may include one or more additional subsystems that are not shown in
Moreover, the circuits and components in electronic device 400 may be implemented using any combination of analog and/or digital circuitry, including: bipolar, PMOS and/or NMOS gates or transistors. Furthermore, signals in these embodiments may include digital signals that have approximately discrete values and/or analog signals that have continuous values. Additionally, components and circuits may be single-ended or differential, and power supplies may be unipolar or bipolar.
An integrated circuit may implement some or all of the functionality of networking subsystem 414 and/or electronic device 400. The integrated circuit may include hardware and/or software mechanisms that are used for transmitting signals from electronic device 400 and receiving signals at electronic device 400 from other electronic devices. Aside from the mechanisms herein described, radios are generally known in the art and hence are not described in detail. In general, networking subsystem 414 and/or the integrated circuit may include one or more radios.
In some embodiments, an output of a process for designing the integrated circuit, or a portion of the integrated circuit, which includes one or more of the circuits described herein may be a computer-readable medium such as, for example, a magnetic tape or an optical or magnetic disk or solid state disk. The computer-readable medium may be encoded with data structures or other information describing circuitry that may be physically instantiated as the integrated circuit or the portion of the integrated circuit. Although various formats may be used for such encoding, these data structures are commonly written in: Caltech Intermediate Format (CIF), Calma GDS II Stream Format (GDSII), Electronic Design Interchange Format (EDIF), OpenAccess (OA), or Open Artwork System Interchange Standard (OASIS). Those of skill in the art of integrated circuit design can develop such data structures from schematics of the type detailed above and the corresponding descriptions and encode the data structures on the computer-readable medium. Those of skill in the art of integrated circuit fabrication can use such encoded data to fabricate integrated circuits that include one or more of the circuits described herein.
While some of the operations in the preceding embodiments were implemented in hardware or software, in general the operations in the preceding embodiments can be implemented in a wide variety of configurations and architectures. Therefore, some or all of the operations in the preceding embodiments may be performed in hardware, in software or both. For example, at least some of the operations in the advertising techniques may be implemented using program instructions 422, operating system 424 (such as a driver for interface circuit 418) or in firmware in interface circuit 418. Thus, the advertising techniques may be implemented at runtime of program instructions 422. Alternatively or additionally, at least some of the operations in the advertising techniques may be implemented in a physical layer, such as hardware in interface circuit 418.
In the preceding description, we refer to ‘some embodiments’. Note that ‘some embodiments’ describes a subset of all of the possible embodiments, but does not always specify the same subset of embodiments. Moreover, note that the numerical values provided are intended as illustrations of the advertising techniques. In other embodiments, the numerical values can be modified or changed.
The foregoing description is intended to enable any person skilled in the art to make and use the disclosure, and is provided in the context of a particular application and its requirements. Moreover, the foregoing descriptions of embodiments of the present disclosure have been presented for purposes of illustration and description only. They are not intended to be exhaustive or to limit the present disclosure to the forms disclosed. Accordingly, many modifications and variations will be apparent to practitioners skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present disclosure. Additionally, the discussion of the preceding embodiments is not intended to limit the present disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
This application claims priority under 35 U.S.C. 119(e) to U.S. Provisional Application Ser. No. 63/396,931, entitled “Incentive-Based Advertising for a Unique Verified Individual,” by Constantin Florin Murariu, filed on Aug. 10, 2022, the contents of both of which are herein incorporated by reference.
Number | Date | Country | |
---|---|---|---|
63396931 | Aug 2022 | US |