Attempts to create targeted delivery of advertising using Internet-based servers is known. U.S. Pat. No. 5,948,061 discloses compiling statistics on individual users and networks on an Internet-based server to permit targeting of advertisements to individual users. The disclosure includes formulas describing a satisfaction Index which is used to calculate run schedules for advertising.
As discussed in the above-mentioned patent, current art Internet-based advertising uses information collected about a user by capturing user interaction with web sites. Search queries and click through data is used to formulate a user profile for use in selecting targeted advertisements.
Other prior art service providers, such as Internet service providers and e-mail providers, have offered free or reduced charge services when users are willing to accept advertising in a portion of the window space allocated to the process supporting that service. Advertising delivery was restricted to the time when a user was connected to the particular service and only on display elements, such as a browser window, associated with that service.
According to one aspect of the disclosure, a service provider such as a telephone company, an Internet service provider, or a leasing company may provide computer systems or components to users at a reduced charge or for free in exchange for targeted advertising delivery. Resources on the computer system itself, such as the operating system, identify user characteristics and interests based on information stored on the computer. A user profile may be developed using information such as music preference, language, and game usage. User profile data may be shared with an advertising provider, either directly, or through the service provider, to allow development of targeted advertising for presentation on the computer system when the computer system is both online and off-line.
In an alternate embodiment, only certain information about the user may be shared. Only data such as geography and music preference may be shared, protecting the user's identity and personal information. The advertising provider may then deliver to the computer a focused database of potential advertisements. Targeted ads may then be selected from the database by an advertising delivery module running locally on the computer system using the full complement of user profile data. Because specific personal data may not need to be shared outside the local computer, privacy concerns can be minimized.
According to another embodiment, no information about the user is shared with the advertising provider and an untargeted database of advertisements may be downloaded to the computer system. The advertising delivery module, using the same full complement of user profile data may then select from this database to deliver targeted ads to the user. Because no information was provided about the user, the database may be quite large to accommodate a range of possible users. But, because the users personal information is not shared, accepting a large database may be viewed as an acceptable, if not desirable, trade-off.
Viewing or other interaction with advertisements may be reported to the service provider or the advertising provider to satisfy a contractual obligation associated with receiving the computer system at a reduced price or for free. The service provider, by selling targeted ads to advertisers, may recover the cost of the computer and associated resources, such as peripherals, the operating system, and application software.
According to another aspect of the disclosure less than the entire computer system may be provided by the service provider. For example, an operating system may be provided by an operating system developer for free. Users may then receive advertisements for use of the free operating system. User who do not wish to view advertisements may purchase a full license. Users willing to receive ads but desire less obtrusive advertising delivery, may opt to purchase a limited license or subscription for the operating system.
Although the following text sets forth a detailed description of numerous different embodiments, it should be understood that the legal scope of the description is defined by the words of the claims set forth at the end of this disclosure. The detailed description is to be construed as exemplary only and does not describe every possible embodiment since describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims.
It should also be understood that, unless a term is expressly defined in this patent using the sentence “As used herein, the term ‘______ ’ is hereby defined to mean . . . ” or a similar sentence, there is no intent to limit the meaning of that term, either expressly or by implication, beyond its plain or ordinary meaning, and such term should not be interpreted to be limited in scope based on any statement made in any section of this patent (other than the language of the claims). To the extent that any term recited in the claims at the end of this patent is referred to in this patent in a manner consistent with a single meaning, that is done for sake of clarity only so as to not confuse the reader, and it is not intended that such claim term by limited, by implication or otherwise, to that single meaning. Finally, unless a claim element is defined by reciting the word “means” and a function without the recital of any structure, it is not intended that the scope of any claim element be interpreted based on the application of 35 U.S.C. §112, sixth paragraph.
Much of the inventive functionality and many of the inventive principles are best implemented with or in software programs or instructions and integrated circuits (ICs) such as application specific ICs. It is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation. Therefore, in the interest of brevity and minimization of any risk of obscuring the principles and concepts in accordance to the present invention, further discussion of such software and ICs, if any, will be limited to the essentials with respect to the principles and concepts of the preferred embodiments.
The computer 110 may also include a cryptographic unit 125. Briefly, the cryptographic unit 125 has a calculation function that may be used to verify digital signatures, calculate hashes, digitally sign hash values, and encrypt or decrypt data. The cryptographic unit 125 may also have a protected memory for storing keys and other secret data. In addition, the cryptographic unit 125 may include an RNG (random number generator) which is used to provide random numbers. In other embodiments, the functions of the cryptographic unit may be instantiated in software or firmware and may run via the operating system or on a device.
Computer 110 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 110 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, FLASH memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by computer 110. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
The system memory 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132. A basic input/output system 133 (BIOS), containing the basic routines that help to transfer information between elements within computer 110, such as during start-up, is typically stored in ROM 131. RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 120. By way of example, and not limitation,
The computer 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only,
The drives and their associated computer storage media discussed above and illustrated in
The computer 110 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 180. The remote computer 180 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 110, although only a memory storage device 181 has been illustrated in
When used in a LAN networking environment, the computer 110 is connected to the LAN. 171 through a network interface or adapter 170. When used in a WAN networking environment, the computer 110 typically includes a modem 172 or other means for establishing communications over the WAN 173, such as the Internet. The modem 172, which may be internal or external, may be connected to the system bus 121 via the input interface 160, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 110, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
The communications connections 170172 allow the device to communicate with other devices. The communications connections 170172 are an example of communication media. The communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. A “modulated data signal” may be a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Computer readable media may include both storage media and communication media.
Referring to
In operation, the user profiling module 404 may collect information about a user from a variety of internal sources including, but not limited to, operating system settings, e-mail content, music files, system hardware configuration data, usage patterns, application software, and application settings. Operating system settings may include language, time zone, display themes or styles, and display settings. E-mail content may be examined for keywords such as business names. Music files may be analyzed for favorite artists or music style preferences. System hardware configuration data may be used to indicate computer system preferences, peripherals, computer age, and manufacturer, for example. Usage patterns may indicate activity patterns at different times of the day or different days of the week. Application software and settings may be examined to determine the age of applications and the kind of work or leisure activities performed on the computer. Because it is not necessary in every case to share user profile data with any outside entity, profile data may be requested or extracted beyond that normally tracked. For example, education level, expertise at various computer-based tasks, or user reaction to specific ads may be captured or analyzed. In another embodiment, a camera, such as camera 163, may capture images of the user which may be analyzed to determine characteristics about the user, such as gender and age. The camera 163 may also be used to determine when a user is present during the display of a targeted advertisement 412. Presence of a user may be a factor in determining the value associated with presentation of a targeted ad 412.
Once a user profile has been developed, the user profiling module 404 may then store the user profile data 406 in a database. An advertising delivery module 408 may use the user profile data 406 to select an advertisement from ad database 410 by matching user profile data 406 to ad classification data 314. The ad database 410 may be periodically refreshed from the advertising database 422. The update of the ad database 410 may be done online, for example, when reporting advertising activity. In an alternate embodiment, the ad database 410 may be part of an update to another portion of the computer 110, for example, the ad database 410 may be included in an operating system patch or update. The latter update method allows changes to be incorporated to the ad database 410 even when the computer's connectivity is limited or nonexistent by including the ad database 410 on distribution media containing the update, for example, a CD or DVD. In another embodiment, the ad database 410 may be delivered separately, as a standalone delivery or update, either via a data connection or removable media.
Because the delivery of a targeted ad 412 does not rely on connectivity to an Internet site or a web browser interface, the targeted ad 412 may be delivered any time the associated modules are available. For example, advertising may be delivered during login operations, document editing, printing, or other activities when online connectivity may not be required, or even available. The targeted ad 412 may be a pop-up, a border, a side pane, a game or any advertising display technique.
An opt-in module 416 may supply data to the advertising delivery module 408 specifying ad content and delivery format. The opt-in module 416 is discussed in more detail below. The selected targeted ad 412 may be delivered to a display controller module 414. As discussed in the priority application Ser. No. 11/092,041, the display controller module 414 may verify the advertising data 302 using information from the metadata 306, such as, the digital signature 312.
When the delivery of an ad is confirmed, for example by the display controller modules 414, a signal may be sent to a provider 420 confirming the delivery of the targeted ad 412. In one embodiment, and delivery confirmation may be cached, or grouped, and sent periodically, for example, at low traffic periods or in the case of a computer that is mostly off-line, when connectivity exists. The confirmation may be used by the provider 420 to signal the advertiser 428 that an ad has been delivered and that an agreed to value may be transferred to the provider's value account 430. In other embodiments, the exact financial transactions may vary.
In an alternate embodiment, the display controller 414 may be able to use the value packet 314 to determine a base value associated with the advertisement, as well as any corollary factors, such as time of day, click through, number of plays, or user demographic. The final value may be calculated and processed by the local value account module 424 and added to a local value account 426. To provide an incentive to users, the final value may be displayed during or after the processing by the local account value module.
The provider 420 may share user profile data 406 with the advertiser 428. The advertiser 428 may use this information to populate the advertising database 422. Similarly, the advertiser 428 may share information with the provider 420 related to the value associated with particular targeted ads 412 and particular user profiles. The advertiser 428 may also provide criteria for advertising selection that may be downloaded to the advertising delivery module 408.
The opt-in module 416 may give the user the ability to make at least three selections that influence delivery of advertisements or other downloaded media. The first selection is a choice whether to pay for the provided hardware or software or service. In one exemplary embodiment, if the user chooses not to pay, they may be required to receive advertisements and may not have a choice regarding how the ads are displayed. Should the user choose to pay, but pay less than the full license price, they may be given more choices, e.g. they may be allowed to select ad display characteristics or frequency. For example, when no license 418 is present the opt-in module 416 may specify that a banner ad should be present on the screen at all times, but if a limited license 418 is present a banner ad may be presented only when a new window is activated and for a limited time. If the user chooses to pay the full license price, they may be allowed to eliminate targeted advertising entirely.
The second selection may be a choice of how much personal information to share, that, in turn, may influence the quality of the ad targeting and may also determine the value placed on viewing the targeted ads. When a user chooses to not share any user profile data 406 and the provider 420 may have little or no information regarding the user's preferences, a large quantity of advertisements may be downloaded from advertising database 422 to the local ad database 410. When the user chooses to share more information, such as language and geographic location, a smaller, more focused, database of advertisements may be downloaded to ad database 410. Should the user choose to share all their personal data from the user profile data 406, only a small local database 410 may be downloaded. In another embodiment, a local advertising database 410 may not be required at all, and targeted advertisements 412 may be downloaded in real-time.
The third selection that may be made using the opt-in module 416 may be a choice of how much data to share about what ads are actually selected and displayed. Particularly when a user has chosen not to share personal data, the user may also choose not to share what ads are selected from the local ad database 410. An advertiser 428 and, in turn, the advertising provider 420 may be willing to increase the amount paid for a targeted ad when feedback is sent regarding the ad, for example, what ad was displayed, when, and what criteria were used to select the ad.
A program, for example, the operating system 144, may collect 504 user profile data as described above. Advertising, or other presentation media, may be stored 506 on the computer 110. The nature and type of the advertising stored 506 on the computer 110 may correspond to the type and quantity of user profile data 406 shared with an advertising provider such as provider 420. As described above, more detailed user profile data 406 may allow smaller, more targeted advertising data to be stored 506 on the computer 110.
The program may then analyze the user profile data 406 and select 508 a targeted ad 412 according to a match between ad classification data 314 and user profile data 406. The presentation of the targeted ad 412 may be monitored 510. Monitoring 510 may include verification that the actual targeted ad 412 presented is the targeted ad prescribed by an advertiser 428. This may be done by confirming a digital signature 312 or another method such as an analysis of steganographic information embedded in the targeted ad 412. Monitoring 510 helps reduce fraud associated with displaying substitute media content for the targeted ad 412. Monitoring 510 may also include generation of data corresponding to display factors such as size of the displayed ad, the amount of time on the screen, and when using a camera, whether a user was actually present. More sophisticated monitoring may include determine the identity of an observer or that the observer's identity matches the current user profile.
The presentation of the targeted ad 412 may be reported 512 to an interested party, such as, provider 420. Reporting 512 the presentation of the targeted ad 412 may be linked to compensation from an advertiser 428. When the advertiser 428 receives an indication that the targeted ad was actually observed, depending on contractual terms, the advertiser 428 may compensate 514 the advertising provider 420. When the advertising provider 420 is not the same as an underwriter of the computer or the computer asset, the advertising provider. 420 and may, in turn, credit 516 at least a portion of the advertising revenue to the underwriter. In one exemplary embodiment, the underwriter may then credit 518 the user's account to allow the user to ultimately “purchase” the computer, or the computer asset:
By following a process such as that described above, not only is the user given an opportunity to choose between free use of computer resources by receiving and viewing advertising or making a payment to reduce advertising, but software developers and other providers are given an opportunity to recoup some costs that are currently associated with pirated software.
Although the forgoing text sets forth a detailed description of numerous different embodiments of the invention, it should be understood that the scope of the invention is defined by the words of the claims set forth at the end of this patent. The detailed description is to be construed as exemplary only and does not describe every possibly embodiment of the invention because describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims defining the invention.
Thus, many modifications and variations may be made in the techniques and structures described and illustrated herein without departing from the spirit and scope of the present invention. Accordingly, it should be understood that the methods and apparatus described herein are illustrative only and are not limiting upon the scope of the invention.
This application is a continuation-in-part of U.S. patent application Ser. No. 11/092041, filed Mar. 29, 2005 and is a continuation-in-part of U.S. patent application Ser. No. 11/006,837 filed Dec. 8, 2004 which is a continuation-in-part of U.S. patent application Ser. No. 10/989,122 filed Nov. 15, 2004, all of which are incorporated by reference for all purposes.
Number | Date | Country | |
---|---|---|---|
Parent | 11092041 | Mar 2005 | US |
Child | 11150001 | Jun 2005 | US |
Parent | 11006837 | Dec 2004 | US |
Child | 11150001 | Jun 2005 | US |
Parent | 10989122 | Nov 2004 | US |
Child | 11006837 | Dec 2004 | US |