A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
The invention relates to information processing methods and apparatus for providing information through applications and functions in a distributed information technology system to users at potentially many different networked locations.
The demand by users for information, resulting from applications and functions provided by networked information technology systems (including computing, telephony, storage, display and other information systems of all types) has grown at an astounding pace. Many aspects of life now depend upon such information technology systems to provide information needed and wanted in everyday activities. The providing of information to users, and the applications and functions that create that information, is done at entities and enterprises of all sizes from major corporations and other large enterprises down to small businesses and individuals. Individual users have increasing demands for information technology systems whether or not such individual users are associated with any particular enterprise.
The architecture of information processing systems is changing to meet the demands of enterprises and individual users by providing greater access to information. Users are mobile and want information that is available wherever the users are located. This demand has surfaced with a large growth in wirelessly networked (“wireless fidelity” or “Wi-Fi”) computers. Frequently, the computers are small portable computers running full operating systems such as Microsoft Windows or equivalents. Increasingly, the computers are thin clients without full operating systems and without full hardware or may also be Personal Digital Assistants (“PDA's”), mobile phones, or other web-enabled devices.
If a user visits locations within a single enterprise or a user visits hotels, airport lounges, coffee shops or other locations at multiple enterprises, the availability of an Internet connection is frequently provided by one or more enterprises. Wayport, T-Mobile and Boingo are popular Internet access providers that operate at many different locations. Wireless connections are becoming available on a region-wide basis without requirement for being located on the premises of any particular enterprise.
While Internet access is becoming wide spread, the functions demanded by users are not satisfied by merely providing access to networks alone. Users want and increasingly are demanding computer program applications such as Microsoft Office, Open Office, web browsers, Adobe Reader, voice over IP (internet protocol), soft phone telephony and many other functions. Such other functions in addition to such applications include print/copy/fax/scan operations, directory listing and file organization operations, storage and retrieval operations and other information processing and information technology operations of all kinds. These functions are desirably available wherever the user is located and whenever the user wants access to the functions.
The distributed availability of application programs has been offered by a number of vendors such as Citrix Systems, Inc. The Citrix system is generally described in patent U.S. Pat. No. 6,785,726 B1 ('726 patent). The '726 patent describes client/server systems in which the server executes one or more applications for a client. The client/server system is commercially available as the WINFRAME system from Citrix Systems, Inc and includes a number of application servers. Each application server can support multi-tasking of several applications that may be requested by a user at a workstation or other user device remotely located from the server.
In order to minimize response time, maximize system throughput, and generally give the appearance that the user's application program is executing at the client, an administrator will often provide a user with access to a number of application servers that host the desired applications that are capable of servicing the user's requests. However, in order for such a system to operate efficiently, the application servers must dynamically coordinate access to system resources shared among the application servers as well as coordinate access to the application servers by the user. One way in which this coordination is done is by selecting one server from the group to act as the “master server” where the master server is responsible for keeping track of resource usage both by users and application servers. In other embodiments, multiple master servers are employed or no master server is employed and the coordination is distributed among the servers.
The '726 patent relates to a method and apparatus for delivering events to local and remote servers. In the '726 patent, different groups are formed by a plurality of servers where the servers of a group are connected by an event bus. The system posts local events on the local event bus and remote events go to a remote event bus.
Server-based computing is alternatively referred to as server-centric, centralized, mainframe, application-server, or client-server computing. In such server-based computing, applications are resident, executed and supported at the server as distinguished from at the user device. Similarly, in server-based computing systems, data is stored on the server and need not be permanently stored at the user device. After a session on a user device is terminated in a server-based computing system, any new session that follows on a user device requires that data be re-accessed at the server. User device operations (including key strokes, mouse clicks, and screen images) are communicated over the network between user device and server. The user device can be a terminal, work station, Mac, PC, terminal emulation software, thin client, handheld computer, PDA or other user device.
Computers and other user devices support a large increase in delivery of information to users. Information is delivered through web browsing, e-mail, voice, video and other ways. The information is in any form and often is a notice such as an advertisement. Many advertisers deliver ads over browsers to users and the practice has become widespread and commercially important. In response to the proliferation of such notices and advertisements, many software products and services have become available to block unwanted intrusion of ads and other notices to users.
When a user is web browsing, the control of the information on the desktop of a user device is by on-line media companies (“web content portals”) such as MSN, Yahoo, AOL and Google as well as by the servers of the direct web pages accessed by user request. Many different types of ads appear on the user's desktop during web browsing and these ads are at times appealing to users, but at other times ads are annoying to users. The serving of ads to users can be beneficial to users when information of interest to users is delivered to users. The cost of providing information to users is supported by ad revenue derived from advertisers.
The process of delivery of ads that are acceptable to and welcomed by users needs improvement. Currently online ad-serving engines examine web page content and deliver advertisements (“ads”) based on the respective web page content. As a result ads are not targeted to a particular end-user nor are they relevant to applications or content beyond that particular web page. Ads that are of no interest to a user are annoying. Ads that are coupled with valued services to users are more welcomed by the users. Advertisers have a great interest in improved advertising delivery and quality through increased targeting, improved ad relevancy and application independence. Such advertising represents greater revenue to advertisers.
The display and serving of ads, notices or other information usually occurs only when a user is actively web browsing. Whenever a user device is being used for other purposes such as computer program applications (for example, word processing or other office programs), no ad-serving occurs. It has been estimated that as much as 75 percent or more of a user's time on a user device occurs when the user device is in a non-ad-serving mode. Hence, from the perspective of advertisers, a large amount of untapped user time is unavailable for advertising.
While the delivery of information through server-based applications and other functions is increasing, there is a need for improved server systems and user devices.
The present invention is an information technology system for providing functions to users at user devices connected at times by a network. A server connected to the network delivers functions and targeted information to the users. The server includes multiple item sources for providing items and includes a targeting module receiving the items for selecting the targeted information. A plurality of user devices are each connected to the network where each user device displays a portal to enable users to request the functions from the server. Each user device displays multiple regions in the portal including a first region for display of function information from one or more of the functions and including one or more second regions, lockable by the server to prevent changes by users, for display of the server-controlled information.
In one embodiment, the central server provides distributed availability of application programs to the user devices. One or more of the applications displays in the first region under control of a user interacting with the user device. A navigation bar in one of the second regions presents navigation choices to users. Other second regions include a top bar and a side bar under exclusive control of the server. In one embodiment, the top bar and the side bar are used for displaying ads or other information under control of the server and lockable by the server to prevent changes by users. Regardless of which application is being used and controlled by the user, ads or other notification information is served under control of the server.
In embodiments where, at times, the user device does not have network connection to a server, local application portal operation occurs where information in the regions controlled exclusively by the server is provided by a cache that stores a history of ads or other server information down-loaded from the server when networked operation was present
In embodiments where security is of interest, information exchanged between the user device and the server is stored exclusively in a single protected directory on the user device and the server and user device cooperate to guarantee the security of information in the protected directory.
In the present invention, the display and serving of ads, notices or other information may occur up to 100 percent of the time that a user is actively using a user device. Since the user in some embodiments cannot alter the display of the server-controlled regions, a large increase in the amount of time that ads or other notices are served occurs. Accordingly, the present invention greatly enhances the amount of time for serving ads or other notices to users and the quality and relevance of ads served.
The present invention provides these and other features that will be apparent from the following description.
Each of the user devices 5 is connectable or disconnectable to the servers 9 through connection or disconnection by connector 1 over the network 10. The central servers 9 operate using a server control system 20 which may include a server-centric system similar to those from Citrix Systems, Inc, Provision Networks, Tarantella or others. The server control system 20 includes a processor 24 for executing, at a server 9, applications and other functions for each of the network-connected user devices 5. The server control system 20 may or may not include storage 26 for storing data for user devices 5. The server control system 20 is able to perform all of the operations at the server 9 site that are often performed locally by full (“fat”) user devices 5. Such applications are typically any of the applications available from Microsoft such as the applications of Microsoft Office (Word, Outlook, Excel, PowerPoint and so forth), Microsoft Visio and applications available from other vendors such as Open Office, Adobe Acrobat and in general, any application available from any vendor.
Referring to
The control elements 21 include additional elements to those found in the server control system 20 such as enhanced functions, authentication, compliance and security. The network connection 22 provides network connections to network 10 and the user devices 5. The server portal control 23 functions to control the application portals 31 on each of the user devices 5. The content source 25 provides content such as targeted information (in the form or advertisements, notices and other information), under control of server 9. In addition, the server portal control 23 provides application content to the user devices 5 under control of the server control system 20 and the processor 24. The server control system 20 may or may not include storage 26. The databases 18 provide database information for use by the targeting module 21-5 in selecting targeted information for the user devices 5. Collectively, the content source 25, the server portal control 23 and the databases 18 are multiple item sources of different types providing items used by the targeting module 21-5 in selecting and targeting of information for one or more users of the user devices 5.
Full client user devices include desktop computers, laptop computers, PC's, MAC's and other information technology systems that typically have disk drives and full operating systems. Most PC's use a windows operating system which currently is typically the XP Operating System from Microsoft Corporation. Full clients generally have the capacity to modify the operating system and have tended to be easily corrupted. In order to reduce the security risks inherent in full clients, extensive security software is essential to guard against viruses, hacker tools, trojans, malware, spyware, malicious programs, harmful scripts and other elements presenting security risks.
Thin clients are computer processors designed to be small and simple, usually without a disk drive, so that the bulk of the information processing for the user occurs on the network-connected server 9. User devices 5 that are thin clients in the distributed service system 2 typically do not have all of the capabilities of PCs or other full-client devices. Thin clients in server-based computing systems most commonly do not have persistent storage devices for client data and do not execute programs. Thin clients typically run simplified operating systems. Typically, the thin client does not have the capability of modifying the operating system configuration. Although thin clients as user devices 5 are not as easily corrupted as full clients, thin clients still must be operated so as to prevent security risks.
The
The device control 30 includes a plurality of modules 33 (MOD) including modules 33-1, 33-2, . . . , 33-M for controlling the application portal 31 and other operation of the user device 5. When the user device 5 is network connected to the server 9 of
In
The server top bar 34-3, in one example, is used for displaying banner ads and can be used to display other information deemed desirable by the server 9. The server navigation bar 34-4, in one example, is used for displaying navigation icons, navigation links and other controls for use by a user in selecting and controlling the application 34-6 of interest to the user. Each application 34-6 is an example of a function executed by the server 9 of
The application portal 31 of
In the application portal 31 environment, any number of server-installed and licensed application programs can be executed remotely by the user under control of the application portal 31. Such applications are typically any of the applications available from Microsoft such as the applications of Microsoft Office (Word, Excel, PowerPoint and so forth), Microsoft Visio, Adobe Acrobat and any other application made available by the server 9.
In an environment where the user device 5 is a thin client, then only virtual mode operation is available to the user. Virtual mode operation is operation where substantially all of the operating system functions are executed on the server rather than on the local user device 5. In an environment where the user device 5 is not connected by a network to server 9, then only execution under the local desktop 32 is available. However, in some embodiments, in order to avoid unnecessary complexity to a user, local desktop operation is performed with a pseudo-virtual display that appears as the virtual mode application portal display while actual execution is mapped to local desktop operation. Under normal virtual mode application portal operation, storage of information occurs on the server 9, while in local mode operation, information is cached in storage cache 28 on the user device 5. When caching is used on the user device 5, synchronization between the user device cache 28 and the server 9 storage 26 of
In one preferred embodiment, virtual mode operation using application portal 31 is preferred whereby the user is relieved of many responsibilities with respect to installation, configuration, licensing, updating, upgrading, security and other matters normally the responsibility of a user. Also, the server 9 normally has processing power that exceeds the processing power of a user device 5 and hence greater performance is expected from the virtual mode operation provided that the bandwidth of the network link through network 10 between the user device 5 and the server 9 is adequate.
The virtual mode operation when provided as a service also has the advantage that the server 9 controls the application portal display in the regions of bars 34-1, 34-2, 34-3, 34-4, 34-5 and 34-6 while leaving control of the application 34-6 to the user. The manner in which the server 9 controls the application portal display in the regions of regions of bars 34-1, 34-2, 34-3, 34-4, 34-5 and 34-6 is a function of the type of virtual mode service offered to users. In one typical example, a low price (or free) service is provided to users of the application portal 31 and the user devices, in exchange for a low price, display ads in the server top bar 34-3 and the server side bar 34-5 during all operations of an application or applications in the application region 34-6. In another typical example, the virtual mode operation, virtual mode service is purchased by either an individual or an employer for multiple employees and the employer elects to serve employee-relevant notices or other information in the bars 34-3 and 34-5. In such an example, the employer may chose to hide the bars 34-3 and 34-5, or allow the user to hide the bars 34-3 and 34-5, under certain circumstances. Under other circumstances, such as an employer-wide, department-wide, or individual employee notices, the server 9 operates to direct notices or other information directly to the bars 34-3 and 34-5 of the relevant ones of the employees using the virtual mode operation without the ability of the user to hide the information. Many different types of notices or other information may be served. For example, as described, employee notices including meeting announcements, company policies, alerts whether of an emergency nature or otherwise, company news, job openings and so forth.
In
In addition to the application region for application 34-6, the
The server navigation bar 34-4, in one example, is used for displaying navigation icons, navigation links and other controls for use by a user in selecting and controlling the application 34-6 of interest to the user. The server navigation bar 34-4 can be used to display other information deemed desirable by the server 9.
In
In
There are a number of different methods for delivering ads, notices and other information in the server-controlled regions 34-3, 34-4 and 34-5 of the application portal 31. These include banners, buttons, pop-up (pop-down, pop-side, pop-under) windows, text lines having hyperlinks to web sites or links to other locations. Various different technologies are available for delivering ads including images and Flash. Typically, images are either in GIF or JPEG format. In general, GIF images are better for ads containing text and JPEG images are better for pictures. Flash is a vector-based animation which allows advertisements or other notices to have rich graphics and animation in a relatively small file size.
The larger the file size of an ad, the longer it takes to display the ad. Marketing reports have shown slower ads have lower click-thru rates. The same reports have also shown that ad effectiveness increases as the size of the ad increases. The use of rich media in banner ads increases ad effectiveness. Animated ads are more effective then static GIF/JPEG images.
For some embodiments of an application portal, image ads are grouped into three sizes, small, medium and large. Typically, the file size of an image ad is about 15 KB to 20 KB and the file size of a Flash animation is 1 MB. The following TABLE 1 summarizes the industry standards for image ads:
After the algorithms of logon module 60-1 are executed,
In module 60-2, the count is set equal to 1 and the navigation bar 34-4 is drawn by the draw_bar module 60-3 as shown in detail in
In module 60-4, the count is tested and if equal to 1, the “Yes” leg is selected and the module 60-5 populates the navigation bar 34-4 with the icons and other components as indicated in
The sequence is then returned to the count path and is examined in module 60-7 to determine if the count is equal to 2 and the first time through is not so the “No” leg is selected. The count path continues and is examined in module 60-10 to determine if the count is equal to 3 and the first time through is not so the “No” leg is selected. The count path continues and the count is incremented by 1 in module 60-12 to a count of 2. Next the count is examined in module 60-13 to determine if the count is less than 4 and the first time through is, so the “Yes” leg is selected returning to the draw_bar module 60-3.
The draw_bar module 60-3 then draws the bar 34-5 as shown in detail in
The sequence is then returned to the count path and is examined in module 60-10 to determine if the count is equal to 3 and the second time through is not so the “No” leg is selected. The count path continues and the count is incremented by 1 in module 60-12 to a count of 3. Next the count is examined in module 60-13 to determine if the count is less than 4 and the second time through is less than 3 and the “Yes” leg is selected returning to the draw_bar module 60-3.
The draw_bar module 60-3 then draws the bar 34-3 as shown in detail in
The sequence is then examined in module 60-10 to determine if the count is equal to 3 and the third time through is equal to 3 and the “Yes” leg is selected. The module 60-11 operates to start serving the server top bar 34-3 with banner ads under control of the ads supplied by the content source 25 of
The count path continues and the count is incremented by 1 in module 60-12 to a count of 4. Next the count is examined in module 60-13 to determine if the count is less than 4 and after the third time through is equal to 4 and the “No” leg is selected passing execution to the module 60-14 that permits a user to select an application for execution. For each of the “Yes” legs of the modules 60-4, 60-7 and 60-10, the
In
The sequence of
The algorithm described in
Using the methods inherent in
Moreover, since all the bars (Ads bar, Notification bar, etc) are painted in a browser window, only primitive windows libraries are needed such as, for example, DefWindowProc( ), GetWindowDC( ) to get a hdc (handle to device context) that allows drawing anywhere in the window. Thereafter, the primitive operating systems function DrawCaption( ) is used to draw the caption.
Advertising Bars and Information Bars. The system 2 of
The delivery of ads on the application portal 31 is application independent, unlike systems which deliver ads based on web page content alone, and delivery of ads occurs during execution of essentially all applications (including, for example, Microsoft Outlook, Word, Excel, PowerPoint or any other application or function). The serving server-controlled information is not under the control of the user. The serving of server-controlled information is remotely controlled by the server 9. The ads are controlled by the server 9 and hence are, if the server desires, independent of any user control and can always be displayed on top. Typically, users enter into an agreement to receive ads under favorable terms and items acceptable to and desired by the user.
A user having an account connects through user device 5 to the remote service provided by server 9 and then the server 9 deploys the application portal 31 with the Application Desktop Toolbars (“Appbars”) such as bars 34-1, 34-2, 34-3, 34-4 and 34-5 as described in connection with
An appbar is a particular kind of windows application that is typically aligned to the right or left edge, or top or bottom, of the screen display, and when it is docked, if some other window is maximized, the appbar is still visible because the system controls the rest of the windows to operate in a smaller working area. An example of an appbar is the windows TaskBar 34-7, that is, the bar with the list of opened applications that is typically present in every Windows Desktop. The TaskBar 34-7 is under user control and can be displayed or hidden by the user.
Upon initial user log on (see module 60-1 of
The implementation of the Ads Serving Regions as described in
The Ads Serving Regions communicate with the windows operating system through the API function called SHAppBarMessage. This function has two parameters, the first is the message to be sent to the operating system, and the second parameter is a structure data type containing additional information regarding the message to be sent. An example is the following TABLE 3.
Note that the parameter dwMessage is the message being sent and it can be one of the following enumerating values of TABLE 4
Using the aforementioned API SHAppBarMessage( ) a function such as module 70-1 in
After creating the bar serving region, code for the module 70-2 of
After setting the proposed bar region size and location, the resulting rectangle is checked with a query by the module 70-3 of
After the resulting rectangle is checked with a query by the module 70-3 of
The function of the module 70-6 of
The module 70-6 of
The operation of the modules of
The Ads Serving Regions using the bars created by the
Ads Caching. Referring to
The ads cache 27 of
TABLE 11 functions as a cache for storing server-controlled information such as ads, wherein when one or more of the user devices 5, disconnectable from said server 9, is disconnected, the user device 5 operates under local control. Under local control, the user devices 5 execute the display processes and sequentially displays the n stored values of server-controlled information. Whenever a user device 5 is connected to the server 9, the cache 28 through TABLE 11 operation is refreshed with up to the latest n stored values of server-controlled information from the content source 25 of
In
The databases 18-1, 18-2, . . . , 18-D are created, for example, using an SQL script. In TABLE 12, an SQL script is provided as a typical embodiment for creating the user database 18-1 (USERSDB) containing the fields for individual users 5. In TABLE 13, an SQL script is provided as a typical embodiment for creating the entity database 18-2 (BUSENT) containing the fields for different entities. The scripts of TABLE 12 and TABLE 13 are run, for example, in the server control system 20 of
“osql -E -i FilenameOfTheScript.sql”.
In
In
In one embodiment, the data mining module 23-2 uses association rules to find key patterns about users in order to target users for deliver of the most suitable Ads or other information. The server portal control typically has access to registration data and the content of applications run by users. The use of association rules helps find sets of products/services, for example, that a user is likely to purchase.
An example of an association rule is a rule is as follows:
An association rule expresses an association between (sets of) items, composed by the user's registration data and the application content the user is running, and the (set of) target ads that with confidence, quantified by a percentage, that the user will be interested in selecting (clicking on).
The targeting module 21-5 is able to analyze the user application content, because the server-centric architecture makes user content available to the server 9 that controls the user device 5 when connected to the service via the network 10 (internet). When the client user device 5 is not connected to the server 9, user device 5 in an optional embodiment is served with optimal Ads set using a software off-line module 30-1 running off-line in the user device 5 that the central server has deployed and installed into the client user device 5.
The targeting module 21-5 is confronted with potentially highly complex items since there are a large number of possible rules. For example, in a Word document can have several thousands of different significant KEYWORDS that will trigger billions of possible association rules. Such a vast number of rules cannot be efficiently processed by inspecting each rule in a serial manner. Therefore, efficient algorithms are included in the targeting module 21-5 that restrict the search space and select only a subset of rules as the important rules to be used for targeting.
In one embodiment, the targeting module 21-5 uses a measure to assess association rules based on the confidence of a rule. Therefore, the targeting module 21-5 searches for “good” rules, that is, rules that are “expressive” and “reliable”. In order to characterize what is meant by the term confidence of a rule, the concepts of “items set” and “support” of an item set are introduced.
An “items set”, I, is the set of all products <pl> selected by one user together with the user's profile information (registration data) <rm> and applications' keywords <an> that are associated with (are relevant to) the purchase decision of those particular products, set forth in symbols in the following Eq. (1):
I={<pl>, <rm>, <an>|lε L, m εM, n εN} Eq. (1)
where:
L, M and N are given index sets,
l, m and n are the indexes to L, M and N, respectively,
<pl> is prior selections by a user,
<rm> is user profile information (registration data)
<an> is application content (K
As an example of Eq. (1),
I={<diamond ring, travel to Venice>, <married, good level of household income>, <Word document: “wife”, Outlook Calendar: “anniversary”>}
Let be the transactions superset composed of all item sets I under consideration and, on a given day, the “support” of an item set S, support(S), is the percentage of those sets in
which contain S.
As an example, let,
S={<Ferrari>, <high level of income, expensive hobbies>, <Word document: “buy”, Word document: “new car”>}
For example, if there are 100 item sets and 5 of them contains S, then support(S)=5%.
The system includes a plurality of item sets, I, that form a superset of item sets under consideration and the rule, R, is of the form A and B→C where A, B and C are components of an item set, S.
The confidence of the rule, R, is given as follows:
confidence(R)=(support({A, B, C})/support({A, B}))*100%
where support(({A, B, C})=(|U1|/||)*100%
and support(({A, B})=(|U2|/||)*100%
and U1={xε |{A, B, C} ⊂x}, x indicating a generic element of
,
and U2={yε |{A, B} ⊂y}, y indicating a generic element of
.
More intuitively, the confidence of a rule is the number of cases in which the rule is correct relative to the number of cases in which it is applicable.
For example, let
R=“{user lives in San Francisco, vegetarian cooking as an hobby} and {“guests list”}→“vegetarian products from stores in the San Francisco area”.
If a user has specified in the user's profile (registration data) that the user lives in San Francisco, likes vegetarian cooking and the user is using keywords such as “guests list” in the content of a user application being used by the user, then the rule is applicable and indicates that the user can be expected to buy vegetarian products (meals) from stores in the San Francisco area. The targeting module will display ads or notices relevant to these rule parameters.
If the user does not live in San Francisco or the user is not a vegetarian or the user application does not contain the keyword “guests list”, then the rule is not applicable and thus does not indicate anything about this particular user and therefore no ads or notices are displayed relative to these rule parameters.
If the rule is applicable, the rule indicates that the user is more likely to buy products from local vegetarian shops in the area. Therefore, the targeting module will display ads or notices relevant to these parameters and will afford the user the opportunity to select (click on) a product to purchase the product.
The user may or may not make such a purchase, that is, the rule may or may not be correct. Of course, there is an interest in how “good” the rule is, that is, how often does the rule predict that the user will buy products from local vegetarian shops?
The rule confidence measures how “good” the rule is, that is, the confidence indicates the percentage of cases in which the rule is correct. The confidence computes the percentage relative to the number of cases in which the antecedent holds, since these are the cases in which the rule makes a prediction that can be true or false. If the antecedent does not hold, then the rule does not make a prediction, so these cases are excluded.
With this measure, a rule is selected if its confidence exceeds or is equal to a given lower confidence limit. The targeting module 21-5 selects rules that have a high probability of being true, that is selects “good” rules which make correct (or very often correct) predictions.
In some embodiments, the targeting module 21-5 uses artificial intelligence components in selecting the “good” Ads. In order to optimize the search for the best Ads to serve to the user device 5, the targeting module 21-5 uses artificial intelligence based not only on the confidence level of a rule (see “TrainSet(Cset)”) but also on the past success rate statistics (see “TrainSet(PastSucc)”) of delivered Ads and external databases information (see “TrainSet(Dbinputs)”).
In one particular embodiment, the confidence level of a rule defines the centroid associated with the most likely to succeed targeting Ads. This information together with the past successful served Ads and the relevant information coming from additional external databases are used as a learning set to build a Feed-Forward Back Propagation Artificial Neural Network. Neural networks are a form of multiprocessor computer system, with simple processing elements, a high degree of interconnection, simple scalar messages and adaptive interaction between elements.
Like its counterpart in the biological nervous system, a neural network can learn, and therefore can be trained to find solutions, recognize patterns, classify data, and forecast future events. The behavior of a neural network is defined by the way its individual computing elements are connected and by the strength of those connections, or weights. The weights are automatically adjusted by training the network according to a specified learning rule until it performs the desired task correctly.
A biological neuron may have as many as 10,000 different inputs, and may send its output (the presence or absence of a short-duration spike) to many other neurons. Neurons are wired up in a 3-dimensional pattern. Real brains, however, are believed to be orders of magnitude more complex than any artificial neural network so far developed.
The targeting module 21-5 in one embodiment uses a neural network to “learn” from the rules' confidence level, the past success rates and the information coming from additional databases to form “knowledge” embedded in the strength (weights) of the synapses connecting the individual neurons of the network. In order to avoid the well-known overtraining problem, controlled noise is injected into the system.
The following TABLE 14 and TABLE 15 include one embodiment of the code, including an artificial intelligence algorithm (see “TrainSet”), for the targeting module 21-5 of
The benefits of multi-item targeting of the present invention enable relevant messages (such as Ads) to be targeted to sets of users, where the sets range in size from as small as an individual user to groups of users of any size, where the messages are delivered at appropriate times.
Examples of four different entities attempting to provide messages to four different end-user sets are described in connection with
In
In
In
In
Some targeting engines have been based on criteria including such as IP address for geography and/or zip code but does little, if anything, to determine specific demographic information unique to specific users. For example, specific user information includes whether or not the actual user is male or female, an adult or a minor or in any particular age group. For example, if intended targets are people in family households of four, two adults and two children, targeting engines from web page advertising are unable to gather sufficient data to determine which ones of the four household members is addressed at any given moment.
Typical targeting technologies (for example, a Google web portal) can target ads based on web pages that an individual user is viewing. These methodologies rely on web page content only and are user indifferent. Similar to the above user example, the targeting engine does not know which member of the household is viewing the particular web page. Furthermore, the targeting engine is limited to scanning content on a particular web page and not across other applications (e.g.: Word document) to further refine its message targeting for increased relevancy.
The multi item targeting engine of the present invention is able to leverage user-specific demographic information, absent in the above examples, cross referenced with application independent components. Additionally, an artificial intelligence algorithm provides correlations to improve targeting and relevance to an individual user, or user groups, at a specific time.
As an example, consider the following targeting:
A targeting that only relies on an anonymous user searching auto related content on a web page to serve an automobile message or ad, perhaps under a luxury classification provides inadequate targeting. Such method would not take into account whether or not the user was over 50, or whether or not that user was seeking a luxury type auto, or whether or not the user was seeking to lease or buy. The multi item targeting engine of the present invention, however, has in its user database the relevant demographic information to determine the age and income level of a user. The content the user was seeking, for example, from an auto loan application in Excel, Word, or Adobe Professional, would provide additional detail as to the users current desire and provide an advertisement relevant and targeted to that individual user at the time it was most appropriate for the user. Having the right information is critical to conducting successful, profitable marketing. The more that is known about a prospect or user, the easier it is to tailor a message to user needs and, ultimately, make sales.
The multiple item targeting engine of the present invention is an example of a new marketing automation technology which makes it easier to segment users and prospects based on their actions, and, in turn, create new and more powerful rule-based marketing campaigns.
Rules-based marketing allows timely delivery of relevant and consistent communications to prospects or users via e-mail, on-line advertising, direct mail, telemarketing or other communication channels. Through rules-based marketing, “rules” are created that guide marketing campaigns and govern what information is sent out and when, which messages go to whom, which prospects or users fall into which categories, and so on. These marketing campaigns can be as simple as a sequence of communications that are triggered by a specific event—such as when a user fills out an online form—or they can be highly sophisticated, involving multiple tracks of information, dynamic content and new rule sets that take effect after each communication.
In the past, a major stumbling block to rules-based marketing was audience segmentation. Historically, segmentation was limited to relatively basic demographic, geographic or firm information. Faced with intense competition, a downward trend in response rates, tight marketing budgets and more accountability for measurable results, today's marketer needs more segmentation and targeting relevancy.
Behavior-based segmentation allows audiences to be segmented and messages tailored to many different audience segments based on actual behaviors of prospects. A big advantage to behavior-based segmentation is that it increases relevancy because the information sent is triggered as a result of real actions taken by the user audience. As many different segmentation rules as needed can be created and integrated into a business process utilizing neural networks and other efficient targeting algorithms.
Behavior-based segmentation generally falls into three categories:
Behavior-based segmentation meets rules-based marketing. Assume a prospect responds to a white paper offer of a product and indicates that the prospect's firm is looking to purchase new software within the next 9-12 months. By responding favorably to the offer, the prospect has shown a willingness to consider purchasing your product. Better yet, the prospect has provided an actual timeframe for doing so.
This information, coupled with the multiple item targeting engine of the present invention, allows an improved rules-based marketing delivery of the right message at the right time. With this information, it is known precisely when to send additional marketing information about the product, when to pass this information along to the sales department and when to have a member of sales staff call on the prospect.
An automated marketing solution that provides the right information can help tailor the organization's marketing efforts to those individuals or groups with high propensity to buy—ensuring future sales and continued profitability.
Rules-based marketing meets marketing automation. When rules-based marketing is combined with the multiple items targeting engine of the present invention, the gap between initial user interest and readiness to make a decision is bridged. Using the multiple item targeting engine of the present invention as a new marketing automation technology, a company can quickly design workflows that automatically execute the steps necessary to run an effective rules-based marketing campaign. These automated workflows allow more sophisticated marketing to be done with fewer resources. Therefore, automation eliminates slow, costly and error-prone human intervention and helps ensure that even the most complex multi-step, multi-channel campaigns are quickly implemented, consistently and on schedule.
An example of the registration data employed for a typical user, Jim Smith, appears in the following TABLE 16.
The targeting module looks at the registration data for Jim Smith and correlates the registration data with the content of the Microsoft application Outlook, in particular, the Calendar and e-mails.
In particular, the registration data is as follows:
In particular, the application content data is as follows:
As a result of the targeting module correlation, the user, Jim Smith, is served targeted information in the form of Ads featuring diamond rings and a trip to Venice, Italy.
While the invention has been particularly shown and described with reference to preferred embodiments thereof it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention.