This invention relates generally to systems and methods for efficiently delivering online advertisements.
An online advertising (“ad”) network includes a server system that connects advertisers or advertising networks (“demand sources”) to publishers (“supply sources”) that want to display advertisements on connected screen devices such as personal computers (PCs), smartphones, Connected (Smart) Television (CTV or Smart TV), computer tablets, etc., that are connected to the Internet. A key function of an ad network is to aggregate ad space supply (“inventory”) of publishers and to match the inventory with advertiser demand.
A publisher has multiple ways to monetize their inventory. There are programmatic demand sources (such as Demand Side Platforms and trading desks) or non-programmatic demand sources (such direct sales, outsourced direct sales). A publisher/publisher network may not know the performance (revenue) that various demand sources might bring a priori.
A publisher ad platform (used to monetize ad inventory for a number of publishers) has the capability of routing ad requests to various demand sources depending on predetermined policies. However, in such routing tends to be inefficient in that it involves one or more intermediaries such as ad networks, ad exchanges, etc. (which are instances of “core routers”) rather than being routed more directly to routers near the ultimate demand sources. This loading of the core ad system is inefficient in that it takes additional time to process the ad requests and is expensive due to fees charged by the core routers.
These and other limitations of the prior art will become apparent to those of skill in the art upon a reading of the following descriptions and a study of the several figures of the drawing.
Various examples are set forth herein for the purpose of illustrating various combinations of elements and acts within the scope of the disclosures of the specification and drawings. As will be apparent to those of skill in the art, other combinations of elements and acts, and variations thereof, are also supported herein.
In an embodiment, set forth by way of example and not limitation, a policy-based, Supply-Side Ad Request (SSAR) edge router includes a policy plane including one or more policies and a data plane which implements the policies of the policy plane. An ad request from a supply is processed through the data plane to provide efficient, supply-side routing of the ad request.
In an embodiment, set forth by way of example and not limitation, a policy-based, supply-side ad request edge router includes a processor, a network interface coupled to the processor, and non-transitory computer-readable media including code segments executable on the processor for: providing a policy plane including a plurality of policies P1 . . . PN; providing a data plane; receiving an ad request from a supply source via the network interface; imposing the policy plane on the data plane; and sending the ad request to at least one demand source based upon at least one of the plurality of policies.
In an embodiment, set forth by way of example and not limitation, a method for operating a policy-based, supply-side ad request edge router including a processor and a network interface includes: providing a policy plane including a plurality of policies P1 . . . PN, providing a data plane, receiving an ad request from a supply source via the network interface, imposing the policy plane on the data plane, and sending the ad request to at least one demand source based upon at least one of the plurality of policies.
In an embodiment, set forth by way of example and not limitation, an online advertisement delivery system includes a supply source server coupled to the internet, a demand source server coupled to the interne, and a policy-based, supply-side ad request edge router coupled to the internet including: a processor, a network interface coupled to the processor, and non-transitory computer-readable media including code segments executable on the processor for: providing a policy plane including a plurality of policies P1 . . . PN; providing a data plane; receiving an ad request from a supply source via the network interface; imposing the policy plane on the data plane; and sending the ad request to at least one demand source based upon at least one of the plurality of policies.
It will be appreciated from the foregoing descriptions that a SSAR edge router includes many advantages for a publisher network. For example, a publisher network can assign a grade to certain subsets of inventory and then apply this grading policy to all ad requests for routing purposes; e.g. certain sites in certain geographies might yield better revenue if routed to non-programmatic demand sources). As another example, a publisher network may deem certain publisher(s) in its network as strategic and hence allocate a lion share of certain type of demand during certain specific time periods of the year to such publisher(s). Still further, a publisher network can apply a fraud detection policy applied to a subset of domains; e.g. certain APAC domains having a more aggressive fraud detection and containment policy than certain EU domains).
An advantage of certain example embodiments of a SSAR edge router include the ability to scale the overall ad platform to perform real-time ad decisions with respect to potentially billions of requests; front loading the mediation of ad requests to external destinations to prevent load on core ad infrastructure; detecting, characterizing and containing fraudulent ad requests at the edge of the ad infrastructure and performing remediation actions at the edge of the system (such as quarantine, blacklist, greylist etc.); providing an extensible policy framework to plug new business policies at publisher and publisher network level; and the provision of a high-level declarative DSL (domain specific language) to specify policies for different business tasks.
An advantage of example embodiments is that the SSAR edge router is capable of routing ad requests without impacting core ad routers of the advertising system. The results in the faster routing of ad requests to the proper demand sources and lowers costs by eliminating unnecessary intermediaries.
These and other examples of combinations of elements and acts supported herein as well as advantages thereof will become apparent to those of skill in the art upon a reading of the following descriptions and a study of the several figures of the drawing.
Several examples will now be described with reference to the drawings, wherein like elements and/or acts are provided with like reference numerals. The examples are intended to illustrate, not limit, concepts disclosed herein. The drawings include the following figures:
In this non-limiting example, the SSAR edge router 12 receives an ad request from publisher 11 and then routes the request according to a set of policies. For example, policies can be from the Publisher 11, Public Network Policies 18, from the Mediation Policies 19 and/or from Fraud Policies 20.
As will be appreciated by those of skill in the art, a router operates at the third layer of the OSI (Open System Interconnect) Model, which is named the network layer. A router differentiates different networks to implement interconnection and isolation between networks and keep the independence of the individual networks. Most IP networks are of a layered architecture, i.e. all contain a packet-based core network and various types of access networks in order to achieve good manageability, stability and extensibility. The core network routes and switches packets in high speed, having high reliability and redundancy. An edge router locates at the egress of an access network and the ingress of a core network. A multiservice edge router typically has the capabilities of flow classification, traffic control (including metering, marking, dropping/shaping and queuing) and traffic aggregation.
Most routers have a plurality of stages of operation referred to as “planes.” In a control plane, a router maintains a routing table that lists which route should be used to forward a data packet, and through which physical interface connection. It does this using internal and pre-configured directives called static routes, or by learning routes using a dynamic routing protocol. Static and dynamic routes are stored in a Routing Information Base (RIB). The control plane logic strips the RIB from non-essential directives and builds a Forwarding Information Base (FIB) to be used by a forwarding or “data” plane.
A router forwards data packets between incoming and outgoing interface connections. It routes them to the correct network type using information contained in the packet headers and data recorded in the routing table control plane. The data plane defines the part of a router's architecture that decides what to do with packets arriving on an inbound interface. Most commonly, it refers to a table in which the router looks up the destination address of the incoming packet and retrieves the information necessary to determine the path from the receiving element, through the internal forwarding table of the router, and to the proper outgoing interface(s).
As will be appreciated by those of skill in the art, SSAR edge router 12 is a specialized form of edge router configured for advertising networks, e.g. one that is located at the edge of advertising network to connect, for example, with core ad routers of the advertising network. In the non-limiting example of
In the example of
As noted above, there are a number of policy types that can be included in the policy plane of a SSAR edge router 12. For example, Mediation Policies 19 can include a recommendation engine, such as one that is disclosed in U.S. Ser. No. 61/900954, filed Nov. 6, 2013, entitled Mediation Recommendation Systems for Multiple Video Advertisement Demand Sources, which is incorporated herein by reference. As another example, Fraud Policies 20 can include spam IP databases, fraud IP databases, user identification databases, etc. which can be used to route, or block, ad requests appropriately. Also, information pertaining to individuals, households and network terminal identification can be provide as disclosed in U.S. Ser. No. 61/900,951 entitled Systems and Methods for Identifying Household Users of Electronic Screen Devices, and U.S. Ser. No. 61/900,955 entitled Methods and Systems for Network Terminal Identification, both filed on Nov. 6, 2013 and which are incorporated herein by reference.
Mediation Policies Source 19, for example, can include a reporting module and a recommendation module. A database can be used to store the outputs of the reporting model and the recommendation module for access by a mediation console. The database can also be used by a mediated target placement cache for targeted placements. The mediation module, in this non-limiting example, is coupled to the mediated target placement cache and to a mediation enablement front/back cache.
Example recommendation systems have a number of properties including: user preference; prediction accuracy; coverage (e.g. publisher/demand source); confidence; trust (e.g. show recommendation for few demand sources that a publisher already knows and likes to build trust in the recommendation system); novelty; serendipity (e.g. a measure of how surprising the successful recommendation is); diversity; utility (e.g. many e-commerce sites employ in order to improve revenue, but also can be diversity or serendipity); risk (e.g. expected revenue but also minimize risk); robustness (e.g., can the system be gamed?); privacy (e.g. do the publisher's preferences remain private?); adaptability; and scalability (e.g. can it scale to thousands of publishers and tens of demand sources per publisher). The recommendation system can therefore be used to implement Publisher Policies in a myriad of ways.
The use of policies utilizing the identification, by way of non-limiting examples, of individuals, groups and terminal devices can be very useful. For example, databases including household information can be used to implement certain policies on the SSAR edge router 12. By “household” it is generally meant a residential household including at least one, but often several, resident(s), although the term “household” can sometimes refer to other social groups, e.g. businesses or organizations which can include multiple screens and multiple members. Therefore, a “household” is a group of people that are socially related in some fashion. As another example, terminal information that can form the basis of a “fingerprint” for that terminal can be used in one or more policies of the SSAR edge router 12. By “terminal” it is meant a user device connected to the interne (“connected platform”), e.g. a personal computer, laptop, smartphone, tablet, etc. A “terminal fingerprint” can include a homogeneous set of fields that describe a specific user device at a specific point in time. In this example, the fields can be collected via a variety of mechanism. In certain embodiments, missing fields can be considered part of the fingerprint.
Although various embodiments have been described using specific terms and devices, such description is for illustrative purposes only. The words used are words of description rather than of limitation. It is to be understood that changes and variations may be made by those of ordinary skill in the art without departing from the spirit or the scope of various inventions supported by the written disclosure and the drawings. In addition, it should be understood that aspects of various other embodiments may be interchanged either in whole or in part. It is therefore intended that the claims be interpreted in accordance with the true spirit and scope of the invention without limitation or estoppel.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US15/17401 | 2/24/2015 | WO | 00 |
Number | Date | Country | |
---|---|---|---|
61943673 | Feb 2014 | US |