The present invention is related generally to computer communications and, more particularly, to messaging with human beings.
As personal communications devices (e.g., cell phones) are developed to support greater and greater functionality, people are using them to do much more than talk. As is well known, these devices now usually allow their users to access web sites, to run web-based applications, to create media files (e.g., by taking a picture or by recording a video using a camera on the device), and to download media files from remote servers (via a web interface supported by the device). In the course of pursuing these activities, a user generates an enormous amount of information about his preferences and behaviors. Some of this information is explicitly generated when the user sets preferences in a profile. Other information may be implicit, such as the frequency with which the user runs a particular application.
Advertisers and other commercial entities are beginning to realize how valuable this information, both explicit and implicit, can be. As advertisers look beyond “traditional” media (e.g., magazines and television) to “new media” (e.g., online and mobile services) in order to increase the effectiveness of their advertising campaigns, the advertisers would like to personalize messages directed to a particular user. If the personalization is based on real information about the user's likes and dislikes, then, in theory at least, the personalized message can be more meaningful to the user than the traditional generic messages broadcast to everyone. For example, a retailer could direct messages to a user who is actively searching for information about products similar to ones that the retailer sells. This allows the retailer to tap into the needs of people prepared to buy rather than, as in the traditional approach, blindly sending advertisements to people who are simply watching television or reading a print medium.
However, users are already becoming wary of sharing their behavioral and preference information, especially with commercial entities. Some people are afraid of scams that leverage sensitive user information and of being overwhelmed with targeted advertising. There is evidence that even well-intentioned personalized messages, if they are “too” personalized, may make a user feel that his privacy has been violated. Some users may be so sensitive about their privacy that they shun new technologies and services. These users intentionally limit the spread of their personal information and thus reduce the effectiveness of those services and campaigns that depend upon such information. In certain cases, an advertiser may, in the user's opinion, “step over the line” with a highly targeted advertisement which leads the user to reject that advertisement and possibly even the context (e.g., the television show or retail environment) in which it was delivered. This specific advertisement has harmed, rather than helped, the sponsor of the advertisement.
The above considerations, and others, are addressed by the present invention, which can be understood by referring to the specification, drawings, and claims. For each potential message recipient, that recipient's “privacy sensitivity” is estimated. A “message broker” personalizes messages (which can be of any type and delivered by any means) based on the recipient's estimated sensitivity. By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. (Note that a recipient can be a human being but need not be: A group of people, such as a social group, could be one recipient.)
In a first set of embodiments of the present invention, messages are sent to a recipient, and information about the recipient's responses to the messages (actually, information about any recipient activities made after receipt of the messages) is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. If, for example, the recipient's response is positive, then the estimated sensitivity level may be lowered a bit, leading to more personalized messages (e.g., messages that include more information specific to the situation of the recipient) or messages with more sensitive information in the future. If, on the other hand, the response is negative, then the estimated sensitivity level is increased, and the level of personalization or information sensitivity is lowered, at least for a while. After repeating the cycle of sending messages and analyzing responses, the estimate of the sensitivity level can become quite accurate. As the cycle continues, the estimated sensitivity level follows the recipient's actual sensitivity level up and down.
In a second set of embodiments, the message broker uses the estimated sensitivity to control the collection of valuable information associated with the recipient. Messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. If the recipient accepts the offer, then the incentive is given, and the recipient information is accessed. As in the first embodiment, the sensitivity estimation is continually updated message-by-message based on the recipient's responses to the offers. If, for example, the recipient's sensitivity is estimated to be very low, then the value of the incentive may be decreased in the future, or the value of the requested information increased, or the requested level of access can be changed. (For example, aggregating the recipient's information along with information of other individuals in a large, randomized statistical sample is a lower level of access when compared to using the same information to specifically target advertising to the recipient.)
In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information. It is believed that once the message broker gains the trust of a recipient, that recipient will become more and more comfortable with allowing the broker to access the recipient's information. As before, the sensitivity level is constantly re-estimated based on the recipient's behavior.
Any of these embodiments can begin with an initial estimate of the recipient's sensitivity level based on information about the recipient such as demographic information, social-networking information, web-site usage patterns, purchase patterns and preferences, and the like.
While the appended claims set forth the features of the present invention with particularity, the invention, together with its objects and advantages, may be best understood from the following detailed description taken in conjunction with the accompanying drawings of which:
a and 3b together form a flowchart of a first embodiment of the present invention;
a and 4b together form a flowchart of a second embodiment of the present invention; and
a and 5b together form a flowchart of a third embodiment of the present invention.
Turning to the drawings, wherein like reference numerals refer to like elements, the invention is illustrated as being implemented in a suitable environment. The following description is based on embodiments of the invention and should not be taken as limiting the invention with regard to alternative embodiments that are not explicitly described herein.
Aspects of the present invention may be practiced in the representative communications environment 100 of
This information can be of interest to numerous commercial and private entities. For example, an advertiser may like to use this information in order to tailor an advertising campaign to the specific needs and preferences of the user 102. A restaurant owner may wish to recommend restaurants that lie near a route that the user 102 often drives. A research company may wish to understand trends associated with large groups of people by analyzing very private information (e.g., prescriptions used). Politicians and pollsters could use this information to drive campaign strategies. Information is valuable.
The “message broker” function 106 mediates between the user 102 with his valuable information and the commercial (or other) entities that may be interested in accessing that information. In general, the message broker 106 negotiates with the user 102 to gain access to the information associated with the user 102. (Particular aspects of this function 106 are discussed below in conjunction with
In step 306 of
The intended recipient 102 of the communication of step 306 is often a human being such but need not be. The communication could be directed to a group of people thought to share some important values, such as a self-selected social group with common interests or a group defined by shared demographic characteristics.
The sender of the communication of step 306 may simply be identified as the message broker function 106, but it is more likely that each communication will be identified with a particular sponsor or “agent.” That is, one communication can be a grocery purchase recommendation identified as sent by a local grocery store, another can be a survey associated with a commercial entity interested in gathering marketing information, yet another can be sent by a non-governmental agency trying to determine the effectiveness of a social program, for example. While each such entity could implement its own message broker function 106, a unified broker 106 working for several different agents can develop its own particular strengths, as discussed below.
After sending the communication in step 306, the message broker function 106 collects (step 308) and analyzes (step 310) information after the response of the recipient 102 to the communication. This information is used, in step 312, to estimate the privacy sensitivity of the recipient 102.
As a first example of collected information, the recipient 102 may explicitly respond by replying to the communication in either a positive or negative manner. Some communications, such as a survey message, invite such an explicit response with an interactive menu. Questions can be asked soliciting feedback from the recipient 102 about the product or service associated with the communication. The recipient 102 can also be asked to respond directly about his privacy concerns (e.g., “Is this advertisement uncomfortably direct?”). In many cases, the recipient 102 can send a reply to the communication or simply ignore it (a “null” response).
The recipient's response can also include implicit actions such as (1) viewing the entire communication rather than viewing only a part of it, or (2) viewing a web page for a product advertised in the communication, or (3) cancelling a service associated with the communication, or (4) placing a complaint with the agent associated with the communication. The recipient 102 may post a positive or negative message on a blog that can be interpreted as an indirect response to the communication. Other recipient behaviors may be known, by statistical analysis of a demographic group, to correlate with a greater or lesser privacy sensitivity. Users that frequently share personal information on social-networking sites may, for example, have a low privacy sensitivity. The sum of the recipient's responses may be partly positive and partly negative. In general, any change in the recipient's behavior associated with a product, service, or content that is associated with either the communication itself or the agent associated with the communication can be considered to be a response to the communication.
The monitoring can be accomplished in a variety of ways. The recipient's viewing can be monitored. All calls to support centers can be monitored. In some instances, the recipient 102 might post on a social networking site or use a distribution service such as Twitter to express an opinion. These are potential additional means for monitoring the recipient 102, depending on the exact context of the response. Some or all of these may be used, as available and appropriate.
In many instances, it is impossible to determine whether the activities of the recipient 102 monitored in steps 308 and 310 are actually made “in response to” the communication of step 306. For example, the communications device 104 of the recipient 102 may categorize a particular communication as spam and automatically discard it. In this case, certain activities of the recipient 102 made shortly after the receipt of the communication may seem to be relevant to the communication (e.g., the recipient 102 buys a product advertised in the communication), but are in fact not made “in response to” the communication. This lack of perfect information on the part of the message broker function 106 is not considered to be a real problem, because the message broker 106 becomes stronger as it gathers more and more information, and small deviations due to mischaracterizing any one action of the recipient 102 as triggered by the communication should be drowned out by the trends of more reliable information. In general, the more information that the message broker function 106 can analyze in step 310, the better will be the results it produces in step 314 of
In step 312 of
It may seem that the previous paragraph assumes that the recipient's response to the communication is based entirely on his sensitivity, i.e., on whether or not the communication is perceived by him to be so directly focused on his particular preferences or behaviors that it invades his privacy. Of course, that is too simplistic. There are many reasons for responding negatively (or positively) to a particular communication. For instance, the communication can advertise a product that the recipient 102 dislikes for reasons that go beyond the content and context of the communication.
To account for this, the estimated sensitivity of step 312 in a preferred embodiment is created by a sophisticated data-analytics program that analyzes various dimensions of a particular recipient's behaviors and preferences. The resulting sensitivity can be a multi-dimensional structure with various fields, some of which apply only in various contexts. The recipient 102 may exhibit one level of privacy sensitivity in one context, and another level in another context. A recipient's preferences for, say, media downloads can depend upon whether the recipient 102 is currently driving to work or at home watching television or even upon the people around the recipient 102 at the time of the communication. Such issues about context specificity are already being addressed in the realm of social-networking research, and those results can be applied to make steps 308 through 312 as sophisticated as necessary.
In any case, the estimated sensitivity of step 312 is used in step 314 of
The danger is that if the personalization of step 314 comes “too close to home,” then the recipient 102 will feel that his privacy has been violated (how did they know that I have diabetes?) and may respond negatively. Studies show that some privacy-sensitive people will even resist using a new service if they believe that using the service could invade their privacy. The sensitivity estimate is an attempt to personalize communications for the recipient 102 to the greatest extent compatible with the recipient's acceptance of that personalization. Personalization less than this amount reduces the effectiveness of the communications which could become too generic and “spam-like.” Personalization more than this amount offends the recipient 102 and potentially scares him away from the products or services associated with the communication. An ideal level of personalization increases both the recipient's satisfaction with the communications and the usefulness of the system to the senders of the communications.
There are many possible ways to increase (or decrease, as appropriate) the personalization of the communications. In addition to including (or excluding) information specific to the recipient 102, a frequency of communications can be altered. Thus, the message broker function 106 may only occasionally send communications to a very sensitive recipient 102, while a less sensitive recipient 102 may receive them more frequently. The order of communications may be altered to suit the recipient's sensitivity, or the agent associated with the communications can be set to an entity believed to be more trusted by the recipient 102. For a recipient 102 whose sensitivity depends upon his context, communications can be sent only when their context would make them more likely to be acceptable to the recipient 102.
Note that the communications can be of any type, and that the personalized communication sent in step 314 may be of a very different type from that sent in step 306 of
As another example of personalization, the recipient 102 can be allowed to choose which advertisements he watches or could be allowed to schedule when advertisements are watched. The set of advertisements from which to choose can be created based on the recipient's estimated sensitivity. Sensitivity-based advertisements should be more acceptable to the recipient 102 and thus more effective from the agent's point of view.
The next communication, created in step 314 to be either more or less personal as deemed appropriate, is sent to the recipient in step 316.
The cycle then continues at step 308 of
The power of the method of
The message broker function 106 grows in power with the repetitions for one recipient 102, but its power grows even faster as it collects data from multiple recipients 102 in multiple situations. A vast amount of collected data may point out social trends that may be difficult to detect from the responses of a single recipient 102. Thus, there could be a great advantage to having one message broker 106 represent multiple agents in dealing with multiple recipients 102.
Returning to
If no preliminary information is available for steps 300 through 304, then the first communication of step 306 can be made very generic so as not to offend a very sensitive new recipient 102. Then, the method of
The method of
The embodiment of
Note the use of the phrase “information associated with the recipient.” This is meant to be more general than “information controlled by the recipient.” With data-privacy becoming more highly protected by the law, it is anticipated that the message broker function 106 will need the recipient's permission to access certain types of data, even when the message broker 106 does not need to get the information directly from the recipient 102 himself. For example, the message broker 106 may be able to receive, from various retailers, information about the shopping habits of the recipient 102 but may not be allowed to use such information in a targeted advertising campaign without the recipient's permission.
The offer can request any type of access to any type of information. For example, product preferences are useful to retailers, while future travel plans might be used by a planning agent to coordinate a vacation package.
Incentives can also vary widely and will depend, in part, on the type of information access requested as well as on the estimated sensitivity level of the recipient 102. A discount can be offered for a product or service if the recipient 102 fills out a marketing survey. A recipient 102 who often responds positively to information requests can become a “preferred customer” and can be given special improvements to a service, or extra functionality in a game, or “insider” information about upcoming products or events. Removing a certain disincentive can be, of course, one type of incentive.
The recipient's response to the offer is analyzed in step 408. In particular, if the recipient 102 accepts the offer, then the terms of the offer are fulfilled in step 410. Some offers allow a more nuanced response than merely an acceptance or rejection: The recipient 102 may grant only a reduced level of access to his information in exchange for a reduced incentive. The recipient 102 may even make a counter-offer which is considered both in estimating the recipient's sensitivity (step 412) and in crafting the next offer (step 414 of
The sensitivity estimate comes into play because requests vary widely in their level of sensitivity. The use of the recipient's health history in a statistical survey does not reveal anything specific about the recipient 102 to the general population, and is thus a “low sensitivity” request. Of much higher sensitivity is a request to publish the recipient's particular birth-control preferences for use in an advertising campaign.
Based on the estimated sensitivity level (and possibly on the estimated sensitivities of other recipients situated like this recipient 102), another offer is personalized in step 414 and sent in step 416. The process continues sending offers, analyzing responses, and using the responses to refine the estimate of the recipient's privacy sensitivity. Generally, if the recipient's responses are positive, then requests can be made for more sensitive data for reduced incentives. The opposite situation can also hold.
Setting the proper incentive level for a particular offer is important to the offeror. A higher incentive may be necessary (1) to gain access to potentially valuable information, (2) to gain access to particularly sensitive information, or (3) to gain access to information associated with a recipient 102 who has a high privacy sensitivity. The sensitivity level estimated in step 412 helps the message broker function 106 in carefully aligning the incentive with the requested access so that the offered exchange is accepted by the recipient 102 at a low enough incentive cost to be worthwhile to the agent of the message broker 106.
The level of incentive in the personalized offer of step 414 can change over time for many reasons. The recipient's data may become less valuable to the agent as his behavior becomes more predictable (although even repeated observations have some value in showing the strength of a trend in the recipient's behavior). The incentive level can change to match information gathered from other recipients 102. At some point, a particular recipient 102 may no longer be of interest to a particular agent (e.g., an agent representing a diaper service may not be interested in recipients 102 older than a certain age), and that agent, at least, would stop sponsoring offers for the recipient 102.
Several advantages accrue to the agents of the message broker function 106 by repeating the offer/exchange cycle of
Third, the recipient 102 can become “desensitized” to the offer/exchange process. Because the exchanges are voluntary, the recipient 102 always has control over his data. With time, the recipient 102 becomes familiar with a particular agent of the message broker function 106. If the agent shows a level of professionalism, then the recipient 102 begins to trust the agent to safeguard the recipient's information, as appropriate, and the recipient 102 becomes more comfortable in granting access to certain information, usually in exchange for a lower incentive.
This allows the sensitivity of the recipient 102 to be altered by using a careful trajectory of offers. As the recipient 102 begins to trust an agent, the agent can request higher levels of access to the recipient's data.
A third exemplary embodiment is illustrated in
The first communication is sent in step 506. Here, this communication is called a “request” because it explicitly asks the recipient 102 for access to data associated with him, but, unlike in the embodiment of
While the communication in step 506 is a “request” rather than an “offer,” implicit incentives can be tied to the response of the recipient 102. For example, a higher level of service, frequent money-saving offers, and other perquisites could be given to recipients 102 who often respond to data-access requests, even though a particular response is not tied to a particular request.
The remainder of the method of
To be optimally effective, the message broker function 106 can use all of the methods illustrated above for a given recipient 102. Each interaction generates more data characterizing the recipient's preferences and behaviors. While only some of that collected data could be useful in personalizing further communications sent to the recipient 102, all of the data can be useful for other reasons. Also, the more recipients 102 that a given message broker 106 accesses, the wider its collection of data, and the more effective it can be. It is also recognized that the sensitivity level, carefully estimated through numerous rounds of communications and analyzed responses, may serve for purposes beyond that of personalizing the next communication.
In view of the many possible embodiments to which the principles of the present invention may be applied, it should be recognized that the embodiments described herein with respect to the drawing figures are meant to be illustrative only and should not be taken as limiting the scope of the invention. For example, other means of communications (e.g., other message types) are contemplated along with other incentives and other means of collected response data. Sophisticated data-analytics programs, as used with social-networking data, can be used to produce sophisticated estimates of privacy sensitivity of persons and of groups. Therefore, the invention as described herein contemplates all such embodiments as may come within the scope of the following claims and equivalents thereof.
The present application is related to U.S. Patent Applications (Motorola Docket Numbers CML07590 and CS38880), filed on an even date herewith.