1. Technical Field
The present disclosure relates to electronic content delivery and more specifically to intelligent targeting of invitational content to a user based on the user's previous activities.
2. Introduction
Targeted content delivery has long been an accepted means of conveying a desired message to an audience. Instead of creating a single message and delivering it to every member of the general public, content providers will attempt to identify the intended audience and shape the message so that it appeals to that audience. Once the content provider determines the intended audience they can target that audience by selecting the best content delivery channels. For example, if their intended audience is the residents of a particular city then delivering the message through the local newspaper or on a billboard in the city may be the appropriate channel. However, if their audience is a smaller subset of the population or is more geographically diverse such a delivery channel will be suboptimal. Content providers will also often target the content delivery by sculpting the content and appearance of the message for the intended audience. These techniques enable content providers to optimize their resources.
The development of digital content has enabled new techniques of targeting content to an audience. However, these techniques are often overly simplistic because targets are often selected based on a limited number of inputs. For example, if a user purchases a particular item on a website, additional related items can be suggested, or if a user visits a travel website, travel related content can be presented. Such methods are overly simplistic and fail to consider other important factors when targeting content to an audience.
Additional features and advantages of the disclosure will be set forth in the description which follows, and in part will be obvious from the description, or can be learned by practice of the herein disclosed principles. The features and advantages of the disclosure can be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other features of the disclosure will become more fully apparent from the following description and appended claims, or can be learned by the practice of the principles set forth herein.
The presently disclosed technology intelligently retargets invitational content to a user, and in some specific embodiments the user is a user of a device configured to communicate via a mobile network, i.e., a device that can be characterized in part by its use of a non-persistent connection, or multiple connections. It does so by first identifying a user on a network and analyzing usage data associated with that user. The usage data includes data describing contextual characteristics, which can be any data related to the user's network usage in one or more contexts such as usage data with respect to a presented item of invitational content, usage data with respect to favorite content, usage data with respect to temporal considerations, and other data which is more fully described herein.
The collective data can be used to create one or more user profiles, which can be analyzed and used to allow a content delivery system to more intelligently select content for a user. In some embodiments, the more intelligently selected the content is, the more efficient it is at eliciting a desired user response. For example, data can be collected regarding a user's responsiveness to a presented item of invitational content, and based on an analysis of that data, and the other data in the user profile, the item of invitational content can be re-presented to the user in a modified form or different context and accordingly, be more likely to elicit the invited response.
In one example, an item of invitational content that was previously presented and failed to gain the desired response can be re-presented on a different channel, e.g. website, application, groups of websites or applications having similar content, a device used to present content, or any other hardware or software used to present content to a user. In such examples, the different channel can be a channel on which the user previously converted a different item of invitational content; the channel can be a favorite channel which the user visits/uses more often; the channel can be one which is associated with a content category for which the user is known to have previously converted an item of invitational content; and the channel can be one which other users have been more likely to convert the same or a different item of invitational content.
In another example, an item of invitational content that was previously presented and failed to gain the desired response can be re-presented in a modified form. In such examples, the modified form comprises a different color scheme; the modified form comprises an incentive to accept the terms of the invitation; the modified form comprises less onerous requirements to perform a conversion action; the modified form can include other changes to the requested action by the user; and the modified form can include a modified product offering, etc.
In another example, an item of invitational content that was previously presented and failed to gain the desired response can be re-presented at a different time or when the user is in a different place. In such examples, the different time can be a time when it is more likely that the user will consider the invitational content, such as perhaps the weekend as opposed to working hours. The different place likewise can be a place where it is more likely that the user will consider the invitational content, such as on a train or bus or at home as opposed to while driving or at work.
The examples provided above are merely illustrative of some of the ways in which the user's profile is used to inform decisions to retarget content such as invitational content.
In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only exemplary embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:
Various embodiments of the disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the disclosure. The present disclosure addresses the need in the art for improved methods of selecting invitational content presented to a user based on the user's interactions with previously presented invitational content.
The presently disclosed system and method is particularly useful for assembling and delivering targeted content to a user. An exemplary system configuration 100 is illustrated in
In system 100, a content package is delivered to user terminals 1021 . . . 102n (collectively “102”) connected to a network 104 by direct and/or indirect communications with a content delivery system 106. In particular, the content delivery system 106 receives a request for an electronic content, such as a web page, an application, or media, etc., from one of user terminals 102. Thereafter, the content delivery system 106 assembles a content package in response to the request and transmits the assembled content package to the requesting one of user terminals 102. In some embodiments, the server has preassembled the content package before the request is received. The content in the assembled content package can include text, graphics, audio, video, executable code or any combination thereof. Further, the assembled content packages can include invitational content designed to inform or elicit a pre-defined response from the user and that can vary over time. The content delivery system can include a communications interface 107 to facilitate communications with the user terminals 102 and any other components familiar to those of ordinary skill in the art.
The content delivery system 106 includes a content management module 108 that facilitates generation of the assembled content package that includes invitational content. Specifically, the content management module can combine content from one or more primary content providers 1101 . . . 110n (collectively “110”) and content from one or more secondary content providers 1141 . . . 114n (collectively “114”) to generate the assembled content package for the user terminals 102. In some embodiments, the content management module can create a package from only secondary content, or only secondary content. The package need not contain both primary and secondary content.
Although, primary and secondary providers 110, 114 are presented herein as discrete, separate entities, this is for illustrative purposes only. In some cases, the primary and secondary providers 110, 114 can be the same entity. Thus, a single entity may define and provide both primary and secondary content. Although, both the primary and secondary content can comprise invitational content, in most instances, the secondary content will comprise the invitational content portion.
For example, in the case of a web page delivered to a requesting one of user terminals 102, the content management module 108 can assemble a content package by requesting the data for the web page from one of the primary content providers 110 maintaining the web page. Then the time-varying invitational content on the web page, which is provided by the secondary content providers 114, is obtained according to the arrangement between the primary and secondary content providers 110 and 114. For example, the invitational content from the secondary providers 114 can be selected based on a guaranteed number of impressions. Alternatively, the invitational content from the secondary providers 114 can be selected based on the context of the web page. In another example arrangement, the primary content can be sent separately, from a source other than the content delivery system disclosed here, or the primary content can have been previously downloaded and cached on the user terminal 102 requesting the content. In such instances, the content delivery system can send a content package containing time-varying invitational content for use, or display with, or related to, the primary content. However, any other arrangements and configuration for selecting invitational content from the secondary providers 110 can also be used.
Although the content management module 108 can be configured to request that data be sent directly from content providers 110 and 114, a cached arrangement can also be used to improve performance of the content delivery system 106 and improve overall user experience. That is, the content delivery system 106 can include a content database 112 for locally storing/caching content maintained by content providers 110 and 114. The data in the content database 112 can be refreshed or updated on a regular basis to ensure that the content in the database 112 is up to date at the time of a request from a user terminal. However, in some cases, the content management module 108 can be configured to retrieve data directly from content providers 110 and 114 if the metadata associated with the data in content database 112 appears to be outdated or corrupted.
In the various embodiments, the content delivery system 106 can also include a unique user identifier (UUID) database 115 that can be used for managing sessions with the various user terminal devices 102. The UUID database 115 can be used with a variety of session management techniques. For example, the content delivery system 106 can implement an HTTP cookie or any other conventional session management method (e.g., IP address tracking, URL query strings, hidden form fields, window name tracking, authentication methods, and local shared objects) for user terminals 102 connected to content delivery system 106 via a substantially persistent network session. However, other methods can be used as well. For example, in the case of handheld communications devices, e.g. mobile phones, smart phones, tablets, or other types of user terminals connecting using multiple or non-persistent network sessions, multiple requests for content from such devices may be assigned to a same entry in the UUID database 115. Such an assignment can be provided by analyzing requesting device attributes in order to determine whether such requests can be attributed to the same device. Such attributes can include device or group-specific attributes.
As described above, content maintained by the content providers 110 and 114 can be combined and/or presented according a predefined arrangement between the two content providers, which can be embodied as a set of rules. In an arrangement where the content delivery system assembles the content package from multiple content providers, these rules can be stored in a rules database 116 in content delivery system 106 and content management module 108 can be configured to assemble the content package for user terminals 102 based on these rules. The rules can specify how to select content from secondary content providers 114 and the primary content providers 110 in response to a request from one of user terminals 102. For example, in the case of a web page maintained by one of primary providers 110 and including variable advertisement portions, the rules database 116 can specify rules for selecting one of the secondary providers 114. The rules can also specify how to select specific content from the selected one of secondary providers 114 to be combined with the content provided by one of primary providers 110. Once assembled, the assembled content package can be sent to a requesting one of user terminals. However, the content package is not limited to the content from content providers 110 and 114. Rather, the content package can include other data generated at the content delivery system 106.
As described above, arrangements between the content providers 110 and 114 can result in content from one of primary content providers 110 being combined with invitational content from multiple ones of secondary content providers 114, based on the rules database 116. Although the rules database 116 can be accessed each time a request is received from one of user terminals 102, such a configuration can limit performance. Therefore, in many cases, the rules in rules database 116 are used to define at least one pool of invitational content from the secondary providers 114. Thus, when the content management module 108 assembles a content package, the content management module 108 first constructs and/or retrieves the pool. Thereafter, the content management module 108 can select an invitational content from one of the secondary content providers from the pool and form the assembled content package.
As used herein, the term “contextual characteristics” refers to the characteristics of a particular content package as related to a particular audience in the network 104 associated with one or more of user terminals 102. Contextual characteristics can include channel characteristics, demographic characteristics, behavioral characteristics, and spatial-temporal characteristics. Channel characteristics can define the specific delivery channel being used to deliver a content package. For example, channel characteristics can include a type of electronic content, a type of device or user terminal, a carrier or network provider, or any other characteristic that defines a specific delivery channel for the content package. Spatial-temporal characteristics can define a location, a date, a time, or any other characteristic that defines a geographic location and/or a time for delivery of the content package. Demographic characteristics can define personal and/or socio-economic characteristics of the user requesting the content package. Behavioral characteristics can define user behaviors for one or more different types of content, separately or in combination with any other contextual characteristics. That is, different behavioral characteristics may be associated with different channel, demographic, or spatial temporal characteristics. For example, users may be associated with higher conversion or response rates for some types of delivery channels.
One concern with the arrangements typically entered into by secondary content providers 114 is that they can result in invitational content of little or no interest being presented to users many times. As a result, even though a desired number of impressions can be achieved, the rate of response to such invitational content may be low and/or the resulting targeted audience may be incorrect or suboptimal. As a result, content providers 110 and 114 can be negatively impacted. For example, if the primary content providers 110 receive compensation based on the number or rate of conversions of invitational content provided by secondary content providers 114, the resulting low conversion rate will result in lower revenues for the primary content providers 110. At the same time, the lower number or rate of conversions of invitational content can result in lower exposure or sales for the secondary content provider 114. In the case of an arrangement based on the number of impressions, the primary content provider 110 would be compensated, but the lower number or rate of conversions of invitational content can result in lower exposure or sales for the secondary content provider 114. As a result, such secondary content providers 114 may opt to pursue relationships with other primary content providers 110, resulting in potential loss of revenues for some primary content providers 110.
The various embodiments therefore provide systems and methods for improving audience targeting by managing the presentation of invitational content from such secondary content providers 114. In particular, systems and methods are provided for adjusting invitational content within content delivery system 106 in order to provide invitational content at a user terminal that is of greater interest to an associated user. As a result, improved targeting of users is provided, which generally correlates to an increase in desired responses or conversions. In the various embodiments, the invitational content is adjusted based on the user's interactions with previously presented invitational content. As a result, the invitational content is presented in a manner and/or at a time that will likely elicit greater response from the requesting user.
In some embodiments, delivery system 106 can provide an invitational content retargeting module 128 for retargeting invitational content previously presented. The invitational content retargeting module 128 receives the invitational content, a context associated with a request, and identifying information for the user associated with the request. For example, such information can be received from the content management module 108 or other components in system 100. Thereafter, the invitational content retargeting module 128 can access a user profile database 124 to retrieve a user profile of previously presented invitational content and adjust the invitational content accordingly. The retargeted invitational content can then be provided, for example, to the content management module 108, which can thereafter assemble and deliver a content package to the requesting user terminal. Such a method is described in greater detail below with respect to
In operation, delivery system 106 can provide a pool processing module 122 for creating a user-specific pool of invitational content. A pool-processing module 122 receives contextual characteristics and identifying information for the user associated with the request. Such information can be received from the content management module 108 or other components in system 100. The pool-processing module 122 operates on a pool of invitational content. The pool-processing module 122 can receive the pool along with the content and user identification or, alternatively, it can construct the pool. The pool processing module 122 can construct the pool by retrieving invitational content from the content database 112, the content management module 108, or directly from content providers 110 and 114. If the pool of invitational content has not already been adjusted to eliminate content not applicable to the contextual characteristics, the pool-processing module 122 can make this adjustment. Thereafter, the pool-processing module 122 can access a user-profile database 124, which can be constructed based at least in part on recorded contextual characteristics related to the user, to retrieve a user profile of previously presented invitational content to create the user-specific pool. The user-specific pool can then be provided, for example, to the content management module 108, which can thereafter assemble and deliver a content package to the requesting user terminal. Such a method is described in greater detail below with respect to
In the various embodiments, the user-profile database 124 can be updated using a user-profile-update module 126. In some cases, the user-profile-update-module 126 can be configured to add additional profile data to the profile database 124. However, in other cases, an extended profile of user interactions with invitational content may not accurately reflect a current interest of users. Accordingly, update module 126 can also be configured to maintain the profile database 124 to include only more recently acquired data. For example, the update module 126 can be configured to maintain the profile database 124 to include only data from the last two to three months. However, the update module 126 can be configured to adjust the data in profile database 124 to cover any span of time. In some instances the update module 126 can update the profile database 124 in real-time. In some instances, the update module 126 can update the profile database 124 at least every week, or every day.
In the various embodiments, the system can include one or more additional databases implemented using various data structures such as, but not limited to, a relational database (RDB) 130, a graph database 132, a hierarchical database 134, a key/values stores database 136, and a distributed stores database 140.
Meanwhile, the content delivery system 106 collects data descriptive of the user's interaction with one or more other items of invitational content within the network (204). The collected data can include any number of characteristics associated with a user's interaction with invitational content or any contextual characteristics such as channel, demographic, behavioral, and/or special-temporal characteristics. For example, the information can include where on the conversion continuum the user abandoned the process: did the user take the first step of maybe clicking on a supplied link or did the user make it all the way to placing an item in their electronic shopping cart. Additionally, information can be collected about the invitational content itself, e.g. colors, size, font, or what was actually offered. Alternatively, the system can make use of the relationship between the primary and secondary content, e.g. were the two tightly related or completed unrelated. The information can further include the channel, the device the user was using, the time of day, and/or day of week. A more extensive data set, both in terms of what is collected and for how many items of invitational content, can lead to more effective retargeting.
As discussed above, the delivery system 106 includes a user profile database 124. In some embodiments, the collected data can be stored in the user profile database 124. The delivery system 106 can receive a direct request to update one or more user profiles. The update request can come directly from the user or any other device capable of communicating with the delivery system 106, such as other content delivery networks or websites. The update request can occur at any time. The update request can include any of the collected data described above such as characteristics of one or more user's interaction with invitational content and/or contextual characteristics. Alternatively, the request for a content package can include the collected data. Once received, the collected data can be supplied to the user-profile-update module 126, which will update the user profiles for the users identified in the request.
The content delivery system 106 retargets the first item of invitational content previously presented based on an analysis of the collected data (206). In some embodiments, the collected data along with either the invitational content or a description of the invitational content is supplied to the invitational content retargeting module 128. The retargeting module 128 analyzes the data and reformulates the invitational content such that when presented to the user, the user is more likely to complete the associated conversion action. The reformulation can include such actions as altering the presentation of the content, e.g. changing the colors, fonts, etc.; adding to the invitational content; switching the invitational content for one that is similar; or switching the invitational content for one that is entirely different. Once retargeted, the invitational content can be used in the content package presented to the user.
In some embodiments, the content delivery system 106 retargets invitational content by re-presenting the first item of invitational content on a channel that that the user is known to have previously converted other items of invitational content. Often users are more likely to complete a conversion on invitational content presented through one channel rather than another. For example, a user may be more likely to purchase an advertised item when it is presented to them on a social networking site, but will not click the link for the item when it is presented to them on a news site. However, that same user may be willing to fill out an informational survey on the news site, but not the social networking site. An analysis of the collected data could reveal this propensity, thus, the user can be retargeted in a channel where the user is more likely to complete a conversion for the type of invitational content being offered.
In some embodiments, the content delivery system 106 retargets invitational content by re-presenting the first item of invitational content with an added incentive to complete the associated conversion action. For example, in many cases users will be presented with an advertisement to purchase a particular item only to abandon the purchase just prior to completing the transaction. In some cases this may occur because the user decided to comparison shop. An analysis of the collected data could reveal that the failed conversion resulted from comparison shopping. Based on this information the secondary content provider can retarget the user with an advertisement for the same item, but now the advertisement could include a discount or a bonus item.
In some embodiments, the content delivery system 106 retargets invitational content by re-presenting the first item of invitational content at a time when the user is more likely to complete the associated conversion action. Some items of invitational content can be timing sensitive. That is, content which when presented during a specific time of day or on a specific day of the week is more likely to fail to result in a conversion. However, if the very same item of invitational content is presented at a different time or on a different day, the rate of conversion is significantly higher. For example, if the user is presented with an invitation to watch a sporting event during their workday, they are unlikely to complete the conversion. However, if the user was presented with the same invitational content outside of their workday, e.g. in the evening, their rate of conversion increases. Furthermore, their rate of conversion may still further increase if the same invitational content is presented on their weekend. This limitation of presenting invitational content could be addressed by assuming a conventional workweek. However, more accurate retargeting can be achieved through the presently disclosed method by analyzing the collected data.
In some embodiments, the content delivery system 106 retargets invitational content by presenting a similar item of invitational content that has a lower conversion value than the first item of invitational content. For example, initially the user was presented with an offer to purchase the full version of a mobile phone application. At the time of the initial offer, the user may not have been convinced that the application would be worth the cost. In this situation, the content delivery system 106 can retarget the user by presenting a lite version of the application at either a reduced cost or for free. Additionally, whether the lite version is offered at a reduced cost or for free could be based on an analysis of the collected data.
Retargeting at a lower conversion value can also take the form of a conversion that requires less user action. For example, a possible conversion action could be getting a user to complete a form that requests a variety of contact information such as name, address, phone number, email address, etc. The user may be unwilling to complete such an extensive form either because of the amount of time required to complete the form or because they do not want to provide that much personal information. Analysis of the collected data could indicate that the user would likely complete the conversion if only required to supply a name and email address. This can have a lower conversion value for the secondary content provider, but a greater value than a completely failed conversion.
In some embodiments, the content delivery system 106 retargets invitational content by presenting a similar item of invitational content that has a higher conversion value than the first item of invitational content. For example, initially the user was presented with an offer for a lite version of a mobile phone application either for free or for a reduced price in comparison with the full version of the application. At the time of the initial offer, the user installed the lite version of the application. Analysis of the collected data could indicate first that the user downloaded and installed the lite version and second whether the user has used the lite version of the application. If so, the content delivery system 106 can retarget the user by presenting a full version of the application.
The content delivery system 106 obtains a pool of invitational content as candidates for distribution to the user (304). The pool can consist of the actual invitational content and/or references to invitational content. This pool of content can be obtained in a number of ways. For example, as described above, the delivery system 106 can include a content database 112 where content is locally stored/cached. Alternatively, the content management module 108 can be configured to retrieve data directly from content providers 110 and 114.
In one embodiment, the obtained pool could contain all invitational content known by the delivery system 106. Alternatively, the obtained pool could be a subset of all invitational content based on contextual characteristics such as channel, demographic, behavioral, and/or spatial-temporal characteristics. As described above, when the delivery system 106 receives a request for a content package the request can include contextual characteristics. Then these characteristics can be used by the content management module to select only content applicable to the contextual characteristics from the content database 112 or to only retrieve data from one or more of content providers 110 and 114 that are associated with the contextual characteristics. For example, if the primary content can only be packaged with invitational content from a single secondary content provider, then the initial pool would only include invitational content supplied by that secondary content provider. Alternatively, if invitational content is designed to target particular demographics of users then only content matching the demographic of the user would be included.
Meanwhile, the delivery system 106 records completed conversion actions by the user associated with at least one of the invitational content (306). As described above, the delivery system 106 includes a user-profile database 124. In some embodiments, the delivery system 106 can receive a direct request to update one or more user profiles. The update request can come directly from the user or any other device capable of communicating with the delivery system 106, such as other content delivery networks or websites. The update request can occur at any time with respect to the conversion. For example, as the conversion occurs an update request can be sent or one or more completed conversions can be stored and sent at a later time. The request can include a record of completed conversion actions for the specified users. Alternatively, the request for a content package can include a record of completed conversion actions by the requesting user. The record of completed conversion actions can be supplied to the user-profile-update module 126, which will update the user profiles for the users identified in the request.
The content delivery system 106 designates the invitational content that has a completed conversion associated therewith as exempt from distribution to the user (308). In one embodiment this can be performed by the pool-processing module 122. As described above, the pool-processing module 122 receives a context and identifying information for the user associated with the request. The pool-processing module 122 also either receives or creates a pool of invitational content. The pool-processing module accesses the user profile database 124 to retrieve the most up to date user profile of completed conversion actions for previously presented invitational content. The pool-processing module 122 examines the invitational content and if the user profile indicates a completed conversion for any particular invitational content then it excludes the content from the user-specific pool. The user-specific pool can be the same pool as the original candidate pool where the invitational content is marked as included and/or excluded. For example, the processing pool module 122 could check, for each invitational content in the pool, the user profile for a completed conversion. If the profile indicates a completed conversion, the invitational content is designated excluded. Once the pool-processing module 122 designates all invitational content for which the user has completed the conversion action as excluded, any of the non-designated invitational content can be used in the content package presented to the user. Alternatively, the user-specific pool can be an entirely separate pool that only includes invitational content for which the user has yet to complete the conversion action. Then any of the invitational content in the resulting user-specific pool can be used in the content package presented to the user.
In some embodiments, invitational content that was previously excluded from the user-specific pool can be re-included. The user-profile-update module 126 can be configured to adjust the data in user-profile database 124 so that a completed conversion expires after a specified period of time. That is, even if the user has completed the conversion action for the invitational content, after a specified period of time it is considered that the user has yet to complete the conversion. In some embodiments, rather than relying on expiring conversions, the user-profile-update module can learn directly from the user terminal 102 or a content provider that the conversion has been reversed. This can happen, for example, if a conversion required download of a program, but the user uninstalled the program.
When a completed conversion action is noted as reversed, the pool-processing module 122 can either update the user-specific pool or create a new user-specific pool. For example, if the user-specific pool is simply the original-invitational-content pool with the content marked as excluded, then the pool-processing module 122 can update the pool by removing the exclude designation. Alternatively, if the user-specific pool is a completely separate pool then the pool-processing module 122 can update the user-specific pool by adding in the invitational content that is no longer considered to have a completed conversion action.
The disclosure now turns to an illustrative example of selecting an invitational content when audience exclusion is enabled. In this illustration, the invitational content takes the form of an advertisement.
The user of mobile phone 402 visits the website of primary content provider 406. When this occurs, a request is sent to the content delivery system 410 for a content package. The request includes a set of criteria that specifies the known information about the user 402 and the contextual characteristics. Based on the supplied context, the delivery system obtains the pool of advertisements supplied by content provider 404 from the content database. Because there are multiple possible advertisements, the delivery system obtains the user profile for user 402 from the user profile database. The user profile indicates that user 402 has yet to complete any of the conversion actions associated with the possible advertisements. Thus, the pool processing module makes no changes to the pool of candidate advertisements. Content provider 404 supplied a usage criteria for this scenario to instruct the delivery system 410 to select a general advertisement for the content provider 404's e-commerce website.
The selected advertisement is presented to the user 402 in the form of a banner ad on primary content provider 406's website. The user 402, sees the advertisement, clicks on it, and is redirected to content provider 404's website. Once at content provider 404's website, the user 402 ultimately completes a conversion by purchasing the offered mobile phone. Upon completing the conversion action associated with the advertisement, an update request is sent to the delivery system 410 instructing it to update the user profile for the user 402, which is handled by the user profile update module.
After purchasing the mobile phone, the user 402 navigates to the website for primary content provider 408. As with content provider 406, a request for an advertisement is sent to the delivery system 410 that includes the content and the known information about the user 402. Again the system content delivery system 410 obtains the pool of possible advertisements for content provider 404 from the content database. This time when the delivery system 410 checks the user profile for the user 402, it discovers the mobile phone purchase conversion. Based on this information, the pool processing module removes the advertisements that have an associated conversion action of mobile phone purchase from the pool of possible advertisements. The delivery system 410 then selects an advertisement from the remaining pool of candidate advertisements, which in this case is a general advertisement for accessories for content provider 404's mobile phone. The selected advertisement is presented to the user 402 on content provider 408's website.
With reference to
The system bus 510 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. A basic input/output (BIOS) stored in ROM 540 or the like, may provide the basic routine that helps to transfer information between elements within the computing device 500, such as during start-up. The computing device 500 further includes storage devices 560 such as a hard disk drive, a magnetic disk drive, an optical disk drive, tape drive or the like. The storage device 560 can include software modules 562, 564, 566 for controlling the processor 520. Other hardware or software modules are contemplated. The storage device 560 is connected to the system bus 510 by a drive interface. The drives and the associated computer readable storage media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for the computing device 500. In one aspect, a hardware module that performs a particular function includes the software component stored in a non-transitory computer-readable medium in connection with the necessary hardware components, such as the processor 520, bus 510, display 570, and so forth, to carry out the function. The basic components are known to those of skill in the art and appropriate variations are contemplated depending on the type of device, such as whether the device 500 is a small, handheld computing device, a desktop computer, or a computer server.
Although the exemplary embodiment described herein employs the hard disk 560, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, digital versatile disks, cartridges, random access memories (RAMs) 550, read only memory (ROM) 540, a cable or wireless signal containing a bit stream and the like, may also be used in the exemplary operating environment. Non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
To enable user interaction with the computing device 500, an input device 590 represents any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. An output device 570 can also be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems enable a user to provide multiple types of input to communicate with the computing device 500. The communications interface 580 generally governs and manages the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed.
For clarity of explanation, the illustrative system embodiment is presented as including individual functional blocks including functional blocks labeled as a “processor” or processor 520. The functions these blocks represent may be provided through the use of either shared or dedicated hardware, including, but not limited to, hardware capable of executing software and hardware, such as a processor 520, that is purpose-built to operate as an equivalent to software executing on a general purpose processor. For example the functions of one or more processors presented in
The logical operations of the various embodiments are implemented as: (1) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a general use computer, (2) a sequence of computer implemented steps, operations, or procedures running on a specific-use programmable circuit; and/or (3) interconnected machine modules or program engines within the programmable circuits. The system 500 shown in
Embodiments within the scope of the present disclosure may also include tangible and/or non-transitory computer-readable storage media for carrying or having computer-executable instructions or data structures stored thereon. Such non-transitory computer-readable storage media can be any available media that can be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor as discussed above. By way of example, and not limitation, such non-transitory computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions, data structures, or processor chip design. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or combination thereof) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable media.
Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.
Those of skill in the art will appreciate that other embodiments of the disclosure may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
The various embodiments described above are provided by way of illustration only and should not be construed to limit the scope of the disclosure. Those skilled in the art will readily recognize various modifications and changes that may be made to the principles described herein without following the example embodiments and applications illustrated and described herein, and without departing from the spirit and scope of the disclosure.
Number | Name | Date | Kind |
---|---|---|---|
5408519 | Pierce et al. | Apr 1995 | A |
5613213 | Naddell et al. | Mar 1997 | A |
5640590 | Luther | Jun 1997 | A |
5697844 | Von Kohorn | Dec 1997 | A |
5892451 | May | Apr 1999 | A |
5978775 | Chen | Nov 1999 | A |
5978833 | Pashley et al. | Nov 1999 | A |
6009458 | Hawkins | Dec 1999 | A |
6023700 | Owens et al. | Feb 2000 | A |
6038591 | Wolfe | Mar 2000 | A |
6043818 | Nakano | Mar 2000 | A |
6097942 | Laiho | Aug 2000 | A |
6205432 | Gabbard | Mar 2001 | B1 |
6212545 | Ohtani et al. | Apr 2001 | B1 |
6222925 | Shiels et al. | Apr 2001 | B1 |
6269361 | Davis et al. | Jul 2001 | B1 |
6286005 | Cannon | Sep 2001 | B1 |
6334145 | Adams et al. | Dec 2001 | B1 |
6338044 | Cook et al. | Jan 2002 | B1 |
6345279 | Li et al. | Feb 2002 | B1 |
6381465 | Chern et al. | Apr 2002 | B1 |
6389278 | Singh | May 2002 | B1 |
6405243 | Nielsen | Jun 2002 | B1 |
6408309 | Agarwal | Jun 2002 | B1 |
6438557 | Dent | Aug 2002 | B1 |
6516416 | Gregg et al. | Feb 2003 | B2 |
6628247 | Toffolo | Sep 2003 | B2 |
6633318 | Kim et al. | Oct 2003 | B1 |
6646657 | Rouser | Nov 2003 | B1 |
6684249 | Frerichs et al. | Jan 2004 | B1 |
6718551 | Swix et al. | Apr 2004 | B1 |
6816724 | Asikainen | Nov 2004 | B1 |
6826572 | Colace et al. | Nov 2004 | B2 |
6920326 | Agarwal et al. | Jul 2005 | B2 |
7031932 | Lipsky et al. | Apr 2006 | B1 |
7035812 | Meisel et al. | Apr 2006 | B2 |
7058696 | Phillips et al. | Jun 2006 | B1 |
7072947 | Knox et al. | Jul 2006 | B1 |
7136903 | Phillips et al. | Nov 2006 | B1 |
7149537 | Kupsh et al. | Dec 2006 | B1 |
7174309 | Niwa | Feb 2007 | B2 |
7181415 | Blaser et al. | Feb 2007 | B2 |
7188085 | Pelletier | Mar 2007 | B2 |
7222105 | Romansky | May 2007 | B1 |
7225342 | Takao | May 2007 | B2 |
7296158 | Staddon et al. | Nov 2007 | B2 |
7328343 | Caronni | Feb 2008 | B2 |
7360084 | Hardjono | Apr 2008 | B1 |
7383329 | Erickson | Jun 2008 | B2 |
7383586 | Cross et al. | Jun 2008 | B2 |
7455590 | Hansen et al. | Nov 2008 | B2 |
7457946 | Hind | Nov 2008 | B2 |
7492371 | Jeffrey | Feb 2009 | B2 |
7558559 | Alston | Jul 2009 | B2 |
7581101 | Ahtisaari | Aug 2009 | B2 |
7690026 | Zhu et al. | Mar 2010 | B2 |
7882543 | Mousseau | Feb 2011 | B2 |
7945660 | Goyal et al. | May 2011 | B2 |
8239889 | Wong et al. | Aug 2012 | B2 |
8346709 | Silverman et al. | Jan 2013 | B2 |
8459551 | Lee et al. | Jun 2013 | B2 |
8577732 | Martin et al. | Nov 2013 | B1 |
8650081 | Basel et al. | Feb 2014 | B2 |
8671016 | Little | Mar 2014 | B2 |
8782691 | Noble | Jul 2014 | B1 |
20010042017 | Matsukawa | Nov 2001 | A1 |
20010047272 | Frietas et al. | Nov 2001 | A1 |
20010051925 | Kang | Dec 2001 | A1 |
20020002510 | Sharp et al. | Jan 2002 | A1 |
20020004413 | Nobuhiro | Jan 2002 | A1 |
20020004743 | Kutaragi | Jan 2002 | A1 |
20020006803 | Mendiola et al. | Jan 2002 | A1 |
20020016736 | Cannon et al. | Feb 2002 | A1 |
20020019829 | Shapiro | Feb 2002 | A1 |
20020052754 | Joyce et al. | May 2002 | A1 |
20020059379 | Harvey et al. | May 2002 | A1 |
20020061743 | Hutcheson | May 2002 | A1 |
20020065720 | Carswell et al. | May 2002 | A1 |
20020073210 | Low et al. | Jun 2002 | A1 |
20020075305 | Beaton et al. | Jun 2002 | A1 |
20020077130 | Owensby | Jun 2002 | A1 |
20020078006 | Shteyn | Jun 2002 | A1 |
20020082923 | Merriman et al. | Jun 2002 | A1 |
20020083411 | Bouthers et al. | Jun 2002 | A1 |
20020095330 | Berkowitz et al. | Jul 2002 | A1 |
20020111177 | Castres et al. | Aug 2002 | A1 |
20020116258 | Stamatelatos et al. | Aug 2002 | A1 |
20020128029 | Nishikawa | Sep 2002 | A1 |
20020137507 | Winkler | Sep 2002 | A1 |
20020138291 | Vaidyanathan et al. | Sep 2002 | A1 |
20020141403 | Akahane et al. | Oct 2002 | A1 |
20020164962 | Mankins | Nov 2002 | A1 |
20020174430 | Ellis et al. | Nov 2002 | A1 |
20020183045 | Emmerson et al. | Dec 2002 | A1 |
20030003929 | Himmel et al. | Jan 2003 | A1 |
20030003935 | Vesikivi et al. | Jan 2003 | A1 |
20030037068 | Thomas et al. | Feb 2003 | A1 |
20030040297 | Pecen et al. | Feb 2003 | A1 |
20030040300 | Bodic et al. | Feb 2003 | A1 |
20030064757 | Yamadera et al. | Apr 2003 | A1 |
20030083108 | King et al. | May 2003 | A1 |
20030101126 | Cheung et al. | May 2003 | A1 |
20030126015 | Chan et al. | Jul 2003 | A1 |
20030130887 | Nathaniel | Jul 2003 | A1 |
20030144022 | Hatch | Jul 2003 | A1 |
20030154300 | Mostafa | Aug 2003 | A1 |
20030163369 | Arr | Aug 2003 | A1 |
20030182567 | Barton et al. | Sep 2003 | A1 |
20030185356 | Katz | Oct 2003 | A1 |
20030188017 | Nomura | Oct 2003 | A1 |
20030191689 | Bosarge et al. | Oct 2003 | A1 |
20030195039 | Orr | Oct 2003 | A1 |
20030197719 | Lincke et al. | Oct 2003 | A1 |
20030203731 | King | Oct 2003 | A1 |
20030220866 | Pisaris-Henderson et al. | Nov 2003 | A1 |
20040003398 | Donian et al. | Jan 2004 | A1 |
20040032393 | Brandenberg | Feb 2004 | A1 |
20040032434 | Pinsky et al. | Feb 2004 | A1 |
20040043777 | Brouwer et al. | Mar 2004 | A1 |
20040043790 | Ben-David | Mar 2004 | A1 |
20040045029 | Matsuura | Mar 2004 | A1 |
20040045030 | Reynolds | Mar 2004 | A1 |
20040054576 | Kanerva et al. | Mar 2004 | A1 |
20040063449 | Fostick | Apr 2004 | A1 |
20040068460 | Feeley | Apr 2004 | A1 |
20040092248 | Kelkar et al. | May 2004 | A1 |
20040093289 | Bodin | May 2004 | A1 |
20040136358 | Hind et al. | Jul 2004 | A1 |
20040137987 | Nguyen et al. | Jul 2004 | A1 |
20040143667 | Jerome | Jul 2004 | A1 |
20040152518 | Kugo | Aug 2004 | A1 |
20040185883 | Rukman | Sep 2004 | A1 |
20040186789 | Nakashima | Sep 2004 | A1 |
20040192359 | McRaild et al. | Sep 2004 | A1 |
20040198403 | Pedersen et al. | Oct 2004 | A1 |
20040203761 | Baba et al. | Oct 2004 | A1 |
20040203851 | Vetro et al. | Oct 2004 | A1 |
20040204133 | Andrew et al. | Oct 2004 | A1 |
20040204145 | Shoichi | Oct 2004 | A1 |
20040209649 | Lord | Oct 2004 | A1 |
20040215793 | Ryan et al. | Oct 2004 | A1 |
20040233224 | Akio | Nov 2004 | A1 |
20040240649 | Goel | Dec 2004 | A1 |
20040240861 | Yeend et al. | Dec 2004 | A1 |
20040259526 | Goris et al. | Dec 2004 | A1 |
20050010641 | Staack | Jan 2005 | A1 |
20050018853 | Lain et al. | Jan 2005 | A1 |
20050021395 | Luu | Jan 2005 | A1 |
20050021397 | Cui et al. | Jan 2005 | A1 |
20050033700 | Vogler | Feb 2005 | A1 |
20050050208 | Chatani | Mar 2005 | A1 |
20050060425 | Yeh et al. | Mar 2005 | A1 |
20050086105 | McFadden et al. | Apr 2005 | A1 |
20050086697 | Haseltine | Apr 2005 | A1 |
20050091381 | Sunder | Apr 2005 | A1 |
20050119936 | Buchanan | Jun 2005 | A1 |
20050125397 | Gross et al. | Jun 2005 | A1 |
20050138369 | Lebovitz | Jun 2005 | A1 |
20050216341 | Agarwal | Sep 2005 | A1 |
20050228680 | Malik | Oct 2005 | A1 |
20050239504 | Ishii et al. | Oct 2005 | A1 |
20050249216 | Jones | Nov 2005 | A1 |
20050273465 | Kimura | Dec 2005 | A1 |
20050289113 | Bookstaff | Dec 2005 | A1 |
20060031164 | Jea-Un | Feb 2006 | A1 |
20060031327 | Kredo | Feb 2006 | A1 |
20060037039 | Aaltonen | Feb 2006 | A1 |
20060048059 | Etkin | Mar 2006 | A1 |
20060059044 | Chan | Mar 2006 | A1 |
20060059495 | Spector | Mar 2006 | A1 |
20060068845 | Muller et al. | Mar 2006 | A1 |
20060075019 | Donovan et al. | Apr 2006 | A1 |
20060075425 | Koch et al. | Apr 2006 | A1 |
20060095511 | Munarriz et al. | May 2006 | A1 |
20060106936 | De Luca | May 2006 | A1 |
20060117378 | Tam et al. | Jun 2006 | A1 |
20060123014 | Ng | Jun 2006 | A1 |
20060129455 | Shah | Jun 2006 | A1 |
20060135232 | Willis | Jun 2006 | A1 |
20060141923 | Goss | Jun 2006 | A1 |
20060155732 | Momose | Jul 2006 | A1 |
20060168616 | Candelore | Jul 2006 | A1 |
20060194595 | Myllynen et al. | Aug 2006 | A1 |
20060200460 | Meyerzon et al. | Sep 2006 | A1 |
20060200461 | Lucas et al. | Sep 2006 | A1 |
20060204601 | Palu | Sep 2006 | A1 |
20060206586 | Ling et al. | Sep 2006 | A1 |
20060229941 | Gupta | Oct 2006 | A1 |
20060242129 | Libes | Oct 2006 | A1 |
20060276170 | Radhakrishnan et al. | Dec 2006 | A1 |
20060276213 | Gottschalk et al. | Dec 2006 | A1 |
20060282328 | Gerace et al. | Dec 2006 | A1 |
20060286963 | Koskinen et al. | Dec 2006 | A1 |
20060286964 | Polanski et al. | Dec 2006 | A1 |
20060288124 | Kraft et al. | Dec 2006 | A1 |
20070003064 | Wiseman | Jan 2007 | A1 |
20070004333 | Kavanti | Jan 2007 | A1 |
20070022010 | Blaser et al. | Jan 2007 | A1 |
20070022442 | Gil | Jan 2007 | A1 |
20070047523 | Jiang | Mar 2007 | A1 |
20070055439 | Denker | Mar 2007 | A1 |
20070055440 | Denker | Mar 2007 | A1 |
20070061568 | Lee | Mar 2007 | A1 |
20070072631 | Mock et al. | Mar 2007 | A1 |
20070074262 | Kikkoji et al. | Mar 2007 | A1 |
20070083602 | Heggenhougen et al. | Apr 2007 | A1 |
20070088687 | Bromm et al. | Apr 2007 | A1 |
20070088801 | Levkovitz et al. | Apr 2007 | A1 |
20070088851 | Levkovitz et al. | Apr 2007 | A1 |
20070100805 | Ramer et al. | May 2007 | A1 |
20070105536 | Tingo, Jr. | May 2007 | A1 |
20070106899 | Hideyuki | May 2007 | A1 |
20070113243 | Brey | May 2007 | A1 |
20070117571 | Musial | May 2007 | A1 |
20070149208 | Syrbe et al. | Jun 2007 | A1 |
20070157247 | Cordray et al. | Jul 2007 | A1 |
20070202922 | Myllynen | Aug 2007 | A1 |
20070204061 | Chen | Aug 2007 | A1 |
20070239527 | Nazer et al. | Oct 2007 | A1 |
20070255614 | Ourednik et al. | Nov 2007 | A1 |
20070290787 | Fiatal et al. | Dec 2007 | A1 |
20080004046 | Mumick et al. | Jan 2008 | A1 |
20080013537 | Dewey et al. | Jan 2008 | A1 |
20080032703 | Krumm et al. | Feb 2008 | A1 |
20080032717 | Sawada et al. | Feb 2008 | A1 |
20080057917 | Oria | Mar 2008 | A1 |
20080070579 | Kankar et al. | Mar 2008 | A1 |
20080071875 | Koff et al. | Mar 2008 | A1 |
20080082686 | Schmidt et al. | Apr 2008 | A1 |
20080123856 | Won | May 2008 | A1 |
20080130547 | Won | Jun 2008 | A1 |
20080132215 | Soderstrom et al. | Jun 2008 | A1 |
20080195468 | Malik | Aug 2008 | A1 |
20080215418 | Kolve | Sep 2008 | A1 |
20080243619 | Sharman et al. | Oct 2008 | A1 |
20080294523 | Little | Nov 2008 | A1 |
20080301303 | Matsuoka | Dec 2008 | A1 |
20090132368 | Cotter | May 2009 | A1 |
20090239661 | Acres | Sep 2009 | A1 |
20090275315 | Alston | Nov 2009 | A1 |
20090299840 | Smith | Dec 2009 | A1 |
20100262464 | Monteforte et al. | Oct 2010 | A1 |
20110022475 | Inbar et al. | Jan 2011 | A1 |
20110066497 | Gopinath et al. | Mar 2011 | A1 |
20110258039 | Patwa et al. | Oct 2011 | A1 |
20110258049 | Ramer et al. | Oct 2011 | A1 |
20110282739 | Mashinsky et al. | Nov 2011 | A1 |
Number | Date | Country |
---|---|---|
1015704 | Jul 2005 | BE |
19941461 | Mar 2001 | DE |
10061984 | Jun 2002 | DE |
0831629 | Mar 1998 | EP |
1043905 | Oct 2000 | EP |
1073293 | Jan 2001 | EP |
1 083 504 | Mar 2001 | EP |
1107137 | Jun 2001 | EP |
1109371 | Jun 2001 | EP |
1195701 | Apr 2002 | EP |
1220132 | Jul 2002 | EP |
1239392 | Sep 2002 | EP |
1280087 | Jan 2003 | EP |
1320214 | Jun 2003 | EP |
1365604 | Nov 2003 | EP |
1408705 | Apr 2004 | EP |
1455511 | Sep 2004 | EP |
1509024 | Feb 2005 | EP |
1528827 | May 2005 | EP |
1542482 | Jun 2005 | EP |
1587332 | Oct 2005 | EP |
1615455 | Jan 2006 | EP |
1633100 | Mar 2006 | EP |
1677475 | Jul 2006 | EP |
1772822 | Apr 2007 | EP |
2369218 | May 2002 | GB |
2372867 | Sep 2002 | GB |
2380364 | Apr 2003 | GB |
2386509 | Sep 2003 | GB |
2406996 | Apr 2005 | GB |
2414621 | Nov 2005 | GB |
2416887 | Feb 2006 | GB |
2424546 | Sep 2006 | GB |
2002140272 | May 2002 | JP |
2007-087138 | Apr 2007 | JP |
2007-199821 | Aug 2007 | JP |
8910610 | Nov 1989 | WO |
9624213 | Aug 1996 | WO |
0044151 | Jul 2000 | WO |
0070848 | Nov 2000 | WO |
0122748 | Mar 2001 | WO |
0131497 | May 2001 | WO |
0144977 | Jun 2001 | WO |
0150703 | Jul 2001 | WO |
0152161 | Jul 2001 | WO |
0157705 | Aug 2001 | WO |
0158178 | Aug 2001 | WO |
0163423 | Aug 2001 | WO |
0165411 | Sep 2001 | WO |
0169406 | Sep 2001 | WO |
0171949 | Sep 2001 | WO |
0172063 | Sep 2001 | WO |
0191400 | Nov 2001 | WO |
0193551 | Dec 2001 | WO |
0197539 | Dec 2001 | WO |
0209431 | Jan 2002 | WO |
0223489 | Mar 2002 | WO |
0231624 | Apr 2002 | WO |
0235324 | May 2002 | WO |
0244989 | Jun 2002 | WO |
0250632 | Jun 2002 | WO |
02054803 | Jul 2002 | WO |
02069585 | Sep 2002 | WO |
02069651 | Sep 2002 | WO |
02075574 | Sep 2002 | WO |
02084895 | Oct 2002 | WO |
02086664 | Oct 2002 | WO |
02091238 | Nov 2002 | WO |
02096056 | Nov 2002 | WO |
02100121 | Dec 2002 | WO |
03015430 | Feb 2003 | WO |
03019845 | Mar 2003 | WO |
03019913 | Mar 2003 | WO |
03024136 | Mar 2003 | WO |
03049461 | Jun 2003 | WO |
03088690 | Oct 2003 | WO |
2004057578 | Jul 2004 | WO |
2004084532 | Sep 2004 | WO |
2004086791 | Oct 2004 | WO |
2004093044 | Oct 2004 | WO |
2004100470 | Nov 2004 | WO |
2004100521 | Nov 2004 | WO |
2004102993 | Nov 2004 | WO |
2004104867 | Dec 2004 | WO |
2005020578 | Mar 2005 | WO |
2005029769 | Mar 2005 | WO |
2005073863 | Aug 2005 | WO |
2005076650 | Aug 2005 | WO |
2006002869 | Jan 2006 | WO |
2006005001 | Jan 2006 | WO |
2006016189 | Feb 2006 | WO |
2006024003 | Mar 2006 | WO |
2006027407 | Mar 2006 | WO |
2006040749 | Apr 2006 | WO |
2006093284 | Sep 2006 | WO |
2006104895 | Oct 2006 | WO |
2006119481 | Nov 2006 | WO |
2007001118 | Jan 2007 | WO |
2007002025 | Jan 2007 | WO |
2007060451 | May 2007 | WO |
2007091089 | Aug 2007 | WO |
2008013437 | Jan 2008 | WO |
2008024852 | Feb 2008 | WO |
2008045867 | Apr 2008 | WO |
2008147919 | Dec 2008 | WO |
2009088554 | Jul 2009 | WO |
2009088554 | Jul 2009 | WO |
WO2009088554 | Jul 2009 | WO |
Entry |
---|
“Baugher et al”, The Secure Real-Time Transport Protocol (SRTP) , Mar. 2004, Network Working Group Request for Comments:3711, p. 1-53. |
“Communication Pursuant to Article 94(3) EPC dated Oct. 19, 2009”, European Patent Application No. 08 153 258.2 (5 pages), Oct. 19, 2009. |
“Communication Pursuant to Article 94(3) EPC dated Feb. 10, 2009”, European Patent Office in related European Patent Application No. 07 118 601.9 (3 pages), Feb. 10, 2009. |
“Communication Pursuant to Article 94(3) EPC issued Jun. 25, 2009”, European Patent Application No. 08 159 331.1 (3 pages), Jun. 25, 2009. |
“Digital Rights Management in the Mobile Environment”, Y.Raivio &S. Luukkainen, Proceedings of the International Conference on E-Business and Telecommunication, ICETE 2006, Aug. 7, 2006. |
“DRM Architecture Approved Version 2.0”, OMA-AD-DRM-V2—0-20060303-A (Open Mobile Alliance, Ltd.), Mar. 3, 2006. |
“English translation of First Office Action issued by State Intellectual Property Office of People's Republic of China”, Chinese Application No. 200480033236.X (8pages), Dec. 4, 2009. |
“English Translation of First Office Action issued by the Chinese Patent Office”, Chinese Application No. 200480019404.X, Aug. 19, 2008. |
“European Examination Report dated Nov. 3, 2008”, European Patent Application EP 08159333.7, Nov. 3, 2008. |
“European Examination Report dated Nov. 3, 2008”, European Patent Application No. EP 08159331.1, Nov. 3, 2008. |
“European Search Report Nov. 5, 2008”, European Patent Application No. EP 08159331.1, Nov. 5, 2008. |
“European Search Report Jul. 22, 2008 issued by European Patent Office”, EPO Application No. EP 08153651.8, Jul. 22, 2008. |
“European Search Report dated Nov. 5, 2008”, European Patent Application No. EP 08159333.7, Nov. 5, 2008. |
“European Search Report dated Apr. 7, 2010”, European Patent Application No. EP 10153358.6 (6 pages). |
“European Search Report dated Jul. 18, 2008”, European Patent Office in related EPO Application No. 08 15 3658, Jul. 18, 2008. |
“European Search Report dated Jul. 18, 2008”, European Patent Office in related EPO Application No. EP 08 15 3656, Jul. 18, 2008. |
“European Search Report dated Jul. 22, 2008”, European Patent Office in related EPO Application No. EP 08153651.8, Jul. 22, 2008. |
“European Search Report dated Jul. 23, 2008”, European Patent Office in related EPO Application No. EP 08153654.2, Jul. 23, 2008. |
“European Search Report dated Apr. 18, 2008”, European Patent Application No. 08101188.4, Apr. 18, 2008. |
“European Search Report dated Mar. 19, 2008”, European Patent Office in counterpart European Application No. EP 07 11 8601, Mar. 19, 2008. |
“Extended European Search Report dated Dec. 2, 2008”, European Patent Office in counterpart EPO Application No. EP 07120620.5, Dec. 2, 2008. |
“Extended European Search Report dated Dec. 29, 2008”, European Patent Office in counterpart EPO Application No. EP 07120480.4, Dec. 29, 2008. |
“Ghassan Chaddoud, et al.”, Dynamic Group Communication Security, pp. 49-56, IEEE 2001, 2001. |
“International Search Report and Written Opinion of the International Search Authority”, International Patent Application No. PCT/EP2008/051229, May 8, 2008. |
“International Search Report and Written Opinion of the International Searching Authority”, International Application PCT/EP2008/054911, Nov. 11, 2008. |
“International Search Report for International Application”, PCT/FI2006/050467, dated Jul. 25, 2007. |
“International Search Report in PCT Application No. PCT/GB2004/003890”, Apr. 5, 2005. |
“Office Action”, U.S. Appl. No. 12/002,452 (20 pages), Apr. 9, 2009. |
“Office Action (Notice of Allowance)”, USPTO dated Jun. 11, 2009 in U.S. Appl. No. 12/079,312 (5 pages). |
“Office Action dated Jan. 28, 2009 in U.S. Appl. No. 10/571,709”, Jan. 28, 2009. |
“Office Action dated Mar. 22, 2010”, U.S. Appl. No. 12/431,961 (19 pages), Mar. 22, 2010. |
“Office Action dated Apr. 6, 2009 in related U.S. Appl. No. 12/156,335 (17 pages)”, Apr. 6, 2009. |
“Office Action dated Jun. 21, 2010”, U.S. Appl. No. 10/555,543 (17 pages), Jun. 21, 2010. |
“Office Action dated Apr. 6, 2009”, U.S. Appl. No. 10/555,543 (14 pages), Apr. 6, 2009. |
“Office Action dated Feb. 5, 2009”, U.S. Appl. No. 12/079,312 (12 pages), Feb. 5, 2009. |
“Office Action dated Mar. 9, 2011”, Issued in related U.S. Appl. No. 12/477,766 (27 pages). |
“Office Action from British Intellectual Property Office”, British Application No. GB0712281.5 (5 pages), Oct. 9, 2008. |
“Office Action issued Apr. 22, 2010”, U.S. Appl. No. 12/156,335 (16 pages), Apr. 22, 2010. |
“Office Action issued by USPTO dated Nov. 20, 2009”, U.S. Appl. No. 10/571,709 (20 pages), Nov. 20, 2009. |
“Office Action issued from the USPTO dated Nov. 4, 2010”, U.S. Appl. No. 12/431,961 (22 pages), Nov. 4, 2010. |
“Office Action issued from the USPTO dated Aug. 14, 2009”, U.S. Appl. No. 12/431,961 (12 pages), Aug. 14, 2009. |
“Office Action issued from the USPTO dated Sep. 23, 2009”, U.S. Appl. No. 12/156,335 (19 pages), Sep. 23, 2009. |
“Office Action issued from USPTO”, in related U.S. Appl. No. 10/555,543 (29 pages), Oct. 20, 2009. |
“Office Action Issued from USPTO dated Oct. 5, 2009”, U.S. Appl. No. 10/571,709 (26 pages), Oct. 5, 2009. |
“Office Action Issued Jan. 12, 2011 by the USPTO”, U.S. Appl. No. 12/484,454 (10 pages). |
“Office Action Issued Mar. 29, 2011 by the USPTO”, U.S. Appl. No. 10/555,543 (17 pages), Mar. 29, 2011. |
“Office Action Mar. 24, 2009”, U.S. Appl. No. 12/156,335, Mar. 24, 2009. |
“Official Action from the European Patent Office”, European Application No. 08 717 428.0 (4 pages), Apr. 1, 2009. |
“PCT International Preliminary Report on Patentability and Written Opinion”, Issued by the International Bureau of WIPO EP2008/054911, dated Oct. 27, 2009 (1 page), Oct. 27, 2009. |
“PCT International Search Report (Form PCT/ISA/210)”, International Application PCT/EP2008/052678, Jul. 4, 2008. |
“PCT International Search Report issued by PCT International Searching Authority”, International Searching Authority in connection with the related PCT International Application No. PCT/NL2004/000335 (2 pages), Sep. 24, 2004. |
“Schulzrinne et al, “RTP: A Transport Protocol for Real-Time Applications””, Network Working Group Request for Comments: 3550, p. 1-98, Jul. 1, 2003. |
“Search Report under Section 17 dated May 20, 2008”, British Patent Office in counterpart UK Application No. GB0807153.2, May 20, 2008. |
“Text of Second Office Action (English Translation)”, Jun. 12, 2009 in corresponding Chinese Patent Application No. 200480019404.X (2 pages). |
“U.K. Combined Search and Examination Report under Sections 17 and 18(3)”, U.K. Application No. GB0802177.6, May 13, 2008. |
“U.K. Further Search Report under Section 17”, U.K. Application No. GB0710853.3, Dec. 5, 2007. |
“U.K. Patent Office Examination Report under Section 18(3)”, U.K Application No. GB0315984.5, Mar. 29, 2006. |
“U.K. Search Report under Section 17”, U.K. Application No. GB0710853.3, Oct. 3, 2007. |
“U.K. Search Report under Section 17 dated Mar. 3, 2005”, U.K Application Serial No. GB0420339.4, Mar. 3, 2005. |
“United Kingdom Search Report under Section 17”, GB 0712281.5 (2 pages), Oct. 24, 2007. |
“Wallner et al., “Key Management for Multicast: Issues and Architectures””, National Security Agency Network Working Group Request for Comments: 2627, p. 1-22, Jun. 1, 1999. |
Levine, Robert , “New Model For Sharing: Free Music with Ads”, The New York Times (On-Line Edition), Apr. 23, 2007. |
Number | Date | Country | |
---|---|---|---|
20110295997 A1 | Dec 2011 | US |