The invention relates generally to content delivery and monitoring, and more particularly to highly flexible techniques for monitoring audience enjoyment of content for delivery of complimentary content and/or services.
The field of content delivery has evolved greatly over recent years. From traditional print and broadcast media, new arrangements have been developed for delivery of content in many forms, including in written, audio, video, still pictures, and so forth. These developments have resulted in a myriad of different delivery channels, business and commercial arrangements, devices for the enjoyment of content, and so forth. Not only has this enhanced the flexibility of audiences in terms of taste and timing, but it has introduced much greater potential for adapting content and services for particular consumers.
There is considerable interest in, and the field has focused on, the ability to offer additional content and/or services to particular audiences, or even to particular individuals based upon observed interests, as indicated, for example, by content that is consumed. In general, such content may be consumed by viewing, listening, reading, or any activity that is appropriate to the form of delivery. Moreover, the content may be consumed during a broadcast (to multiple consumers at once), during limited or subscription transmissions, during transmission by individualized digital means (e.g., via the Internet), “on-demand” content (via the Internet, cable or another medium) or in many recorded forms (e.g., e-books, recorded movies and television shows, from electronic recordings on various supports, and so forth). Based upon knowledge of such interests, additional content and/or services may be offered to the audience, advertisements may be adapted, or additional information may simply be provided that may enhance the audience experience.
A continuing difficulty in such delivery schemes is the highly fractured nature of the industry, and particularly the great variety of content owners, content providers, delivery channels, delivery media and technologies, and consumption devices. For example, different content owners or licensees, or the providers who deliver their content are typically interested in ensuring delivery of their own content, and may be in a position to monitor consumption of that content, although often to a very limited extent. Consumers, on the other hand, are prone to turn to many different content owners and providers, and may be completely unconcerned and even unaware of the particular originator of the content. Moreover, audiences may switch often and rapidly between particular content, particularly audio and video content. Such flexibility, which is highly valued by audiences, may thwart systems designed to provide complementary content and/or services.
For example, a television viewer be interested in a particular program, and during viewing of that program, a content owner or provider may be able to detect the content being viewed, devices available to the viewer, viewer taste, and other relevant information, and provide offerings based upon it. When the viewer changes to a different program, however, the new program may be offered by a different content owner, or even a different provider. This is particularly true as consumer electronic devices (such as televisions, set-top boxes, mobile devices, computers, tablets and the like) become capable of receiving content from different media and by different technologies (e.g., broadcast, satellite, cable, mobile networks, the Internet, and other networks). Due to the vertically integrated nature of the detection and complementary content delivery systems currently contemplated, such systems are simply incapable of serving audiences in a consistent manner over the range of possible audience options available.
There is a need in the field for improved techniques for monitoring consumption of digital content, and for channeling information related to the appropriate entities that may provide complementary content and/or services.
The present invention provides novel systems and methods designed to respond to such needs. The techniques offered may be implemented in a range of environments, with a wide range of media and content, as well as with any suitable delivery mechanisms, technology and devices. The techniques allow for a tiered approach to identifying content being received or played by consumer electronic devices, and then passing along such information to stakeholders who, in a separate “tier” may process and/or act on the information, such as to direct complementary content to the same or other devices. Such activities may, in turn, be performed by a further tier. The approach substantially frees the content owners, distributors, aggregators, rights holders, and providers from the need to vertically integrate the content identification function, and allows for much broader adaptability of content identification to serve a range of content owners, controllers and providers. It also allows for specialization of content and service providers, who may offer their technologies in tiers that serve the owners, controllers and providers of the underlying content and/or any complementary content or services. The techniques also allow for much more comprehensive identification of content, as well as monitoring of audience interest, reporting of interest or use, advertising effectiveness, and so forth.
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Turning to the drawings,
As discussed below, the system will allow for identification of the content 14. In certain embodiments, to facilitate such identification, particular code may be provided that can be embedded into the content, as indicated by reference numeral 18. This code may originate with the provider 16, or could be provided by a separate entity. Various types of identification code or data may be utilized, and such data may be carried by various mechanism (e.g., mechanisms sometimes be referred to as “watermarks”) and the technologies for their creation and embedding are generally known in the art.
The device 10, or a component associated with the device (e.g., set-top box, playback device, etc.) may extract information 20 that can be used to identify the content 14 then being played on the device. The present techniques are extremely flexible, however, in terms of the type of information that may be used to identify the content. For example, where the content contains identifying data carriers (e.g., watermarks), such data may be extracted, or information based on such data may be generated in the device 10. Where such data is not available, other mechanisms, such as digital fingerprints, may be used for identification purposes. Such fingerprints, and the mechanism for their generation are generally known in the art. Such identifiers may, for example, be based on analysis of digital code for particular scenes in still images and video content, sections of audio content, and so forth. Similarly, certain content may itself include metadata that may permit its identification. In certain implementations, the information 20 may simply include a sample of the content that can itself be analyzed by a tier 1 entity as described below. This may be the case, for example, where the device 10 is not itself capable of extraction of the desired information.
It should be noted that reference is made in the present discussion to “playing” content on electronic devices. When used, that term is intended to extend broadly to rendering, reproducing, displaying or running content. Depending upon the application and the distribution technology, such content may be played in real time or near real time, and or may be stored on the electronic device or elsewhere for later playing. Such playing may consist of reproducing audio components, video components, textual components or any combination of these or any other form of content. The term is not intended to relate to simple display of electronic messages, however, such as email, although it may extend to playing audio, video or multimedia attachments to such transmissions.
It should also be noted that while, as mentioned, the tier 1 entity is advantageously adapted to use multiple techniques (e.g., watermarks, fingerprints, embedded code) for the identification of the content and the device, a combination of such techniques may be used to glean additional, complementary or confirmatory information from the content. For example, to service certain tier 2 entities, as discussed below, the tier 1 entity may desire to identify not only the content and device, but the originator (e.g., television channel, cable provider, etc.), and such information may be available from such other data.
The information 20 thus includes this data that can be used as a basis for identifying the content 14, as well as data identifying the device 10. The latter data may originate in the device itself, or may be associated with the device by virtue of any subscriptions to which the device is party, networks on which the device operates, and so forth. In certain implementations, the data may be associated with the device permanently or temporarily stored on the device or for the device, such as cookies, session identifiers, and so forth.
The information 20 is provided to a tier 1 entity 22. This entity will consist of and utilize appropriately programmed computers and servers adapted for identifying the content and device, based upon the received information. The tier 1 entity may, in some implementations, comprise a number of different processing locations, or may be centralized. The entity 22 thus includes an automatic content recognition (ACR) manager 24, which itself will typically comprise one or more programmed computers or servers that receive the information 20, and that identify the content and device. The information may be transmitted to the tier 1 entity 22 by any suitable means, such as wired and wireless connections, cable and satellite links, cellular networks, and so forth. Indeed, the media and transmission mechanisms may be the same as those used to deliver the content 14 to the device, or different from these.
Based upon the received information, the ACR manager 24 identifies the content by reference to stored information, such as a database 26. This information may reference one or more of the watermarks, signatures, metadata, or any other data associated with the content. In practice, it may be difficult or impossible for all available content to be identified, although the present approach is designed to allow cooperation between many different content owners, controllers and providers, each of whom may communicate any useful identifying data to the tier 1 entity for identification purposes. It should also be noted that the database 26 need not be monolithic, but could include a number of resources both internal to and external from the tier 1 entity.
Based upon the identification, as indicated by reference numeral 28, the tier 1 entity 22 sends the identification data, and any device-identifying data, represented collectively by reference numeral 30, to any one of multiple tier 2 entities 32, 34 and 36. Such entities may be, for example, owners, distributors, aggregators, rights holders, or upstream providers of the content 14. In general, each of the entities may be anyone having a need or desire to monitor the content 14 played on the device 10. While any of the tier 2 entities may also carry out the functionality of the tier 1 entity, the present approach contemplates a much more dynamic, flexible and powerful arrangement in which the tier 1 entity acts as a clearinghouse for the content identification, while the tier 2 entities may be co-contracting parties to whom the tier 1 entity provides the identification service. Similarly, as illustrated, it is contemplated that any number of tier 1 entities may participate in the system, each possibly serving its own tier 2 entities, or serving the same, or some of the same tier 2 entities.
It should also be noted that the approach represented by the tier 1 and tier 2 entities makes possible new and extremely useful data processing and business cases. That is, tier 2 entities that may not be interested or capable of the sophisticated processing performed by the tier 1 entity may contract or otherwise participate in the identification and monitoring process, and offer additional content and/or services. Similarly, tier 2 entities may comprise companies that in some ways compete with one another and that may not otherwise be comfortable sharing information with other tier 2 entities needed for identification of their own content. The use of the tier 1 entity, then, permits a buffer between such tier 2 entities, perhaps enhancing the opportunities for all in participating in the system. Still further, the particular activities of the tier 2 entities may vary widely, depending upon the type of business plan, product or service offerings, and so forth envisioned by the tier 2 entities. Indeed, the particular use of the identification data need not be shared with the tier 1 entity, and may change over time.
It should be noted that reference is made in this discussion to certain “services, “products” and related “functions” that may be performed by the various tier entities. When used, these terms should be understood broadly. That is, services, products and functions may include new product and/or service offerings, the provision of existing or enhanced products and/or services, the provision of information that may be of interest to users of the electronic devices, or the provision of service and/or products or offers for these to other devices in any way associated with the electronic devices identified (e.g., having the same owner or user, on the same network, in the same geographic or demographic segment, having similarities with the electronic device information sufficient to support the provision of the service and/or product function). This aspect of the system and its operation may include opt-in and opt-out functionality (in which a user may express a desire to receive or not to receive additional information, products and/or services), and may or may not be interactive (supporting two-way exchange of data). The particular form and process of this provision of product and/or service functions may, of course, follow the type of electronic device identified and its capabilities for accepting and/or responding to the information or functions. Finally, in some contexts, it may be useful and desirable to craft the functions performed by one or more tiers based on information known or discernable from the identification of the content, or the device, or both, or based upon data or metadata associated with these. That is, for example, if the gender or particular preferences of a user are known, the functions performed may be particularly directed to that category or class of users in a targeted manner.
Each tier 2 entity will typically comprise a data owner controller 38 (illustrated as an owner “A” controller for the first tier 2 entity 32 in
It should be noted that various approaches may be employed for cooperation between the tier 1 entity and the tier 2 entities. For example, as noted above, data may simply be passed from the tier 1 entity to the tier 2 entities. However, other techniques, such as a session hand-off may be employed, in which the tier 2 entity simply takes over communication with the device 10 once the content and device are identified. It should also be noted that communications may, of course, take place between various tier 2 entities, depending upon their relationship, their business interests, their mutually agreed functions, and so forth.
Based upon the logic implemented by the tier 2 entity, then, further tiers may be invoked by passing along data or instructions 42 to one or more tier 3 entities. Here again, the data may include identification of the content 14, and the device 10. Additional information may be included in the instructions 42, such as particular activities to be carried out by the tier 3 entity. In certain implementations, the tier 2 entity may itself perform such functions, although the embodiment illustrated in
In the illustrated embodiment, the tier 3 entity 44 includes a targeted companion content insertion distribution server 46. This server may draw from additional content, such as informational content, offerings, promotions, and so forth, that may be sent to the device 10, or to another device 12 based upon the identification of content 14 and device 10. By way of example only, information may be inserted into the content 14 (e.g., played with, overlayed, interleaved with the content). Moreover, the present techniques also contemplate such activities as ad replacement, in which a scheduled advertising slot in content 14 may be filled with a different ad by server 46, depending upon the identified content, the device, and the possible interests of the device user. In the case of other devices 12, the additional content may be sent to any such device, such as telephones, computers, handheld devices, and so forth, for presentation to the user or for interactive data exchange. It should also be noted that any such transmissions may be made by the same or different media as that used to receive content 14. Indeed, as noted above, content 14 need not be played at the time received by the device 10, but may be stored, time shifted, and so forth. The activities executed by the tier 2 and tier 3 entities may thus be free of any particular broadcast schedule, data transmission timing, and so forth.
As also illustrated in
In addition to the use scenarios discussed above, it should also be noted that the techniques, and particularly the multi-tiered approach, may be used in conjunction with social networking applications as well. For example, cooperating users on of such applications or sites may wish to know and even follow what content they are each viewing or otherwise consuming. The content recognition functions of the tier 1 entity may allow for content to be identified that one user is viewing, for example, and then by cooperation with the entities of other tiers, other connected users may be informed of the user/content activity (e.g., “Did you know that your friend is watching XXX. Do you want to chat with her?”). Similarly, one user may inquire via an application whether any associated users are currently watching the same content, and receive a response based upon the content recognition functions carried out by the tier 1 entity.
As noted above, further tiers may be invoked or spawned, as indicated by reference numerals 54 and 56. Such other tiers may correspond to specialized entities that offer or provide additional content, products and/or services to the device 10, devices 12, or to the same or other users. This invocation may occur based, for example, upon identification that the user has such other devices, that the user is on-line or otherwise available on such devices, and so forth. As with the relationships between the tier 1, tier 2 and tier 3 entities, then, the system offers many possible arrangements for cooperation between entities that may need or want to communicate and/or cooperate with device 10 or any other devices 12, typically for a targeted user or audience.
The present approach also offers highly valuable tools for monitoring the content 14 and evaluating the audience for such content. For example, as indicated by reference numeral 58, a reporting function may be carried out by the tier 1 entity. Here again, the tier 1 entity need not have a particular stake in the success of the content, or upon any offers or provision of content, products and/or services, but may simply report to others content-related parameters, such as audience size, audience demographics, audience interest, and so forth. By way of example, before, during or after the cooperative relationship between a tier 2 entity and the tier 1 entity, the tier 1 entity may report on the number and quality of content identifications made, activities performed, and so forth. Such reports may serve to allow the tier 2 entity to determine whether to initiate the relationship with the tier 1 entity, whether to continue the relationship, or whether to alter the type and focus of the relationship (e.g., the number and designations of the particular content monitored by the tier 1 entity). It should be noted that entities at all tiers may be designed to carry out such reporting functions as well. Such reporting may enable reporting for both up and downstream tiers, as well as tracking of the effectiveness of that tier entity's own activities.
It should be noted that similar reporting functions may be carried out by other tiers in the system. Such reporting may include “reporting up” to upstream tiers (i.e., those that receive information and provide direction to others for action) and “reporting down” to downstream tiers (i.e., those that follow the direction for action from others). The reporting may be performed internally within a tier as well, both within a single entity and between entities (“peers” or competitors) at a particular level. It should also be noted that reporting may be performed between tiers, bearing in mind that one entity may function as “upstream” to another on one context or function, or as “downstream” or at a “peer” level in another context or function. As noted in the present discussion, such reporting may focus on measurement of such factors as content interest (e.g., number of times the content is played by a device or audience), rather than or in addition to actions taken by one or more tier entities.
Based upon this data, the tier 1 entity identifies the content as indicated at step 66. Here again, the tier 1 entity may be adapted to utilize more than one, and potentially many different techniques, depending upon the data available for content identification. These may be specified by the tier 1 entity, specified by the tier 2 entity, or dictated by the content or content type. The tier 1 entity then notifies the stakeholder (e.g., the content owner, controller, provider, or any other interested tier 2 entity) as noted at step 70. Here again, this notification may be performed in real or near-real time (i.e., during the play of the content) or in the form of reports. In the former case, which may be more useful for most tier 2 (and downstream tier) entities, activities defined by the tier 2 (and downstream tier entities) may be performed while the content is played on the device or later.
As indicated by steps 72 and 74, then, various interactive operations may be performed between the tier 1 entity and the appropriate tier 2 entities. These may include, for example, simple transfer of data identifying the content and device. In other contexts, sessions may be handed off from the tier 1 entity to the tier 2 entity.
Once the tier 2 entity has been informed of the content and device, the tier 2 entity may perform any operations it deems useful, as determined by the logic it implements, its business interests, the particular content identified, the device identified, and any other information considered by the tier 2 entity (e.g., current offers, demographics, history of interests of the device or user, etc.). The tier 2 entity may then proceed with such activities, or may order the activities to be performed by other, tier 3 entities, as indicated by step 78. In either case, the activity will be performed at step 80 as discussed above. As also discussed above, the activity may involve transmitting content, initiating interactive data exchange or otherwise communicating with the same device, or with a different device, as indicated by blocks 82 and 84. Moreover, as also noted above, the activity may call for invoking one or more additional tier, as indicated by block 86, such as to allow entities at such tiers to perform activities of their own based upon the identified content, the device, and any other data considered by an entity at any one of the tiers.
By way of example, a television network may cooperate with various advertisers that each act as (or contract with) its own tier 3 entity. Such advertisers may, then, receive “live user” data or a connection from the tier 2 network, and each advertiser may choose to offer highly dynamic and targeted offers to the users, thereby creating a dynamic ad campaign that suits their individual business interests. Today, such campaigns are typically run in close coordination with television networks, and not independently in this novel manner. Such specialization and adaptability may continue to further levels, such as to local supply and commercial establishments, which may be considered to constitute tier 4 entities, and so on.
While only certain features of the invention have been illustrated and described herein, many modifications and changes will occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.
This application is a Non provisional of U.S. Provisional Patent Application No. 61/471,583, entitled “Multi-Tiered Automatic Content Recognition and Processing”, filed Apr. 4, 2011, which is herein incorporated by reference.
Number | Date | Country | |
---|---|---|---|
61471583 | Apr 2011 | US |