Web sites in a wide area network, such as the Internet, which offer merchandise and/or services are visited by net surfers (herein after visitors) looking for the merchandise or service offered by these sites. The mere fact that a certain visitor has visited a certain web site constitutes information characterizing the visitor with respect to the merchandise or service offered by the visited web site. The visited web site may instruct the visitor's surfing program, such as a WEB browser, to store indication of this information in the visitor's computer or other platform used by the visitor, for example by ‘planting’ a cookie or cookies on storage means of the visitor's computer. This characterizing information is valuable for advertisers, who may target their advertisement better using this user's characterizing information. Thus, this valuable information, or data may be traded between a visited web site, herein after a data provider, and advertiser or advertisers who wish to rely on this data for targeted advertising. Similarly advertising network or networks and advertising agencies may be interested in such data. Advertisers and advertising networks and agencies will be referred to herein after as data buyers.
Several schemes may be used for rewarding a data provider for the data he provides. Such schemes may correlate this reward, or profit, to the number of visitors who access the data provider site, the number of visitors that request advertisement content after visiting the data provider's sites or the actual number of clicks that those visitors clicked on advertisements they were exposed to, etc. The term ‘click’ herein after may refer to any action taken by a user while responding to an optional content within an Internet page (as provided by the data buyer) or to activate an optional action in an Internet page (that was displayed to the visitor as result), or the like. Further, advertising campaigns relying on this data may use one or more of several schemes such as the number of times an advertisement is to be presented in a certain web site during a defined period of time; the blend of a certain advertisement within other advertisements which is presented in a certain web site to a certain user, etc.
Further, a data provider may be interested in ensuring that data provided by him is not used against his business interests, for example by presenting advertisements of business competitors in response to data provided by him. A list of entities that are considered such competitors is usually denoted as a “black-list”.
Considering the above, a data provider may find it rather complicated to verify the fulfillment of the agreement, or contract, he has with the data buyer in two aspects. First, if he is properly rewarded for the data he provided to a data buyer. The difficulties to verify a proper reward to a data provider may be due to the fact that the parameters used for calculating the reward are usually not available to a data provider. Second, in cases where the data provider has asserted ‘negative conditions’ for the use of the data provided by him, for example, preventing the use of such data to invoke advertisements of his or her competitors (defined as part of the ‘black list’ as described above). There is a need for tools that will enable verifying or evaluating the above
According to embodiment of the present invention a method is disclosed comprising emulating by a monitor service a network user accessing a first Internet web site belonging to a first group of web sites, said accessing invoking recordal of a tag in said emulated network user, said tag to indicate history of accessing into web sites of certain character, said Internet web site is associated with said certain character; emulating by said monitor service said network user accessing a second Internet web site belonging to a second group of web sites and, said second Internet web site presenting advertising content, said advertising content provided by an advertisements providing service, and recording the received advertisements content and associated meta data and saving said received advertisements content as a first advertisement exposure indicator; emulating by said monitor service a second network user accessing an Internet web site belonging to said second group of web sites, said second Internet web site presenting advertising content, said advertising content provided by said advertisements providing service and recording the received advertisements content and meta data and saving said received advertisements content as a second advertisement exposure indicator; analyzing said first advertisement exposure indicator and said second advertisement exposure indicator, and issuing indication of the effect of said tagging on the difference between said first advertisement exposure indicator and said second advertisement exposure indicator based on said analyzing and on a predefined alert policy.
The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features, and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanying drawings in which:
It will be appreciated that for simplicity and clarity of illustration, elements shown in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity. Further, where considered appropriate, reference numerals may be repeated among the figures to indicate corresponding or analogous elements.
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, and components have not been described in detail so as not to obscure the present invention.
Reference is made now to
Targeted publisher 18A, 18B is engaged in a contract with at least one data buyer. Such contracting engagement may be embodied via a third party, such as behavioral targeting exchange module 16. According to the contract, targeted publisher 18A, 1813 enable writing data in cookie or cookies saved on the storage means of a web visitor, such as web visitors 22A, 22B. A network user, such as web visitor 22A, 2213, whose cookies are written or modified as a result of a visit to targeted publisher 18A, 18B, will be denoted herein after as a “tagged user”. The data written in these cookies may indicate data such as: that this visitor has visited that web site once or more; whether this visit establishes compliance with one or more behavioral classifications as dictated by the details of the contract, etc. It will be noted that when targeted publisher 18A, 18B is engaged with more than one data buyer, the cookies for each data buyer are modified separately, according to parameters, data format and other features that may be dictated by each data buyer. Thus, a classifying cookie for one data buyer may include indications of first group of trends, behavioral characteristics and possibly history of previous visits while a classifying cookie or cookies of a second data buyer may include indications of a second group of classifying characteristics.
In some embodiments the execution of policy with respect to how cookies of a web visitor should be modified per a visit of a certain web visitor in a certain media site so that the required classifications are indicated in information stored in the cookies may be done by a software program that may be installed and running under the control of behavioral targeting exchange module 16. Behavioral targeting exchange module 16 is in active communication with ad networks 14A, 14B and targeted publishers 18A, 18B, so as to ensure that the information written in cookies of a web visitor upon any visit to any one of targeted publishers 18A, 18B, etc. reflects the respective requirements and definitions set in a contract that was signed between the respective targeted publisher and the respective advertising network.
As seen in
The profit that a targeted publisher may expect is subject to the values of several parameters such as number of visitors marked as visited in a web site (web visitor 22A, 22B browsed into the web site of targeted publisher 18A, 18B); number of entrances (visits) to web site 20A, 20B by a web visitor which previously visited targeted publisher 18A, 18B; of those—number of visitors which responded to advertising content (e.g. by clicking a certain advertisement content); and of those—visitors which actively used provided services of that web site such as purchased service or goods, registered to a service or list, and the like, etc.
Targeted publisher 18A, 18B may have interest in knowing whether the profit he receives correlates to the actual value of the data he provided, according to the respective contract. Targeted publisher 18A, 18B may further have interest in knowing that contractual definitions relating to advertisement presentation are followed, such as advertisements defined as not-to-be-presented are actually not presented, proper advertisements blending is used. However, since this data is not available to targeted publisher 18, method and system for otherwise verifying it need to be established.
System 10 further comprising ad-guard monitor service 23 which comprises storage means 23A, where cookies may be written, stored, modified and read. Ad-guard monitor service 23 may be embodied as a program running on a dedicated computer, or on a computer running also other programs, or on a server or servers connected to system 10, or the like. Ad-guard monitor service 23 is in active communication with targeted publishers 18A, 18B and with media sites 20A, 20B. Ad-guard monitor service 23 is adapted to simulate web visitors 22A, 22B by appearing in system 10 as a certain web visitor at any given time. Ad-guard monitor service 23 is adapted to emulate said certain web visitor using different characterizing situations of said certain web visitor, such as web visitor 22A, 22B who visited media site 20A, 20B without previously visiting targeted publisher 18A, 18B, after visiting targeted publisher 18A, 18B one time, after visiting targeted publisher 18A, 18B two times, etc. Emulation of a web visitor visiting targeted publisher 18A, 1813 a variable number of times before ad-guard service 23 emulates a visit to media site 20A, 20B may effect the content of a cookie indicative of the history of visits of said web visitor and thus effect analyses of said emulated visits, as is discussed in details below. Ad-guard monitor service 23 may emulate one of a plurality of web visitors, as may be required. Ad-guard monitor service 23 is further adapted to invoke controlled visits to monitored targeted publishers 18A, 18B and to a controlled list of media sites 20A, 20B. Said controlled visits to monitored targeted publishers 18A, 18B and the list of media sites 20A, 20B may be in a controlled order. Further, the time frame within which the emulated visits of web visitor 22A, 22B to media sites 20A, 20B in the various configurations relative to visiting targeted publisher 18A, 18B described above, and the controlled list of media sites 20A, 20B. Said controlled visits to monitored targeted publishers 18A, 18B and the list of media sites 20A, 20B are performed may be controlled, for example to have a definable value. It would be appreciated by those skilled in the art that the characteristics of this time frame may have an implication on the meaning of tests performed according to embodiments of the present invention, as will be described in more details below. Ad-guard monitor service 23 is further adapted to collect and analyze advertisement related information received during browsing into media site 20A, 20B.
Targeted publisher 18A, 18B may define a set of tests to check and verify the fulfillment of the contract signed with ad networks 14A, 14B. Those tests will check whether the reward he receives correlates to the actual value of the data he provided, according to the respective contract and further whether the contractual definitions relating to advertisement presentation are followed (including content blending aspects, black-list limitation and so). Those tests may be performed by invoking a plurality of web visitors' accessing targeted publishers 18A, 18B and media sites 20A, 20B, according to sets of test parameters. These test parameters may include geographical related information (such as origin country, simulated by using IP address belonging to the simulated origin country), time-of-day, day-of-week, number of visits to be emulated in targeted and in non-targeted publishers, scheduling of the visits—how often and when, flow of the order of visits (e.g. whether the emulated visitor previously visited targeted publisher site once or more, and how often, etc.), the type of browser and the like.
Testing scenario will be defined as a set of testing parameters having each a certain value. Testing scenario may include one or more visits to targeted publishers 18A, 1813 and/or media sites 20A, 20B. Thus, two different testing scenarios may differ from each other by having at least one parameter with different value in each. Testing session will be defined as a set of testing scenarios performed with a certain set of parameters. A single test will include one or more test sessions with optionally with varying parameter values.
Reference is made now also to
Once the process of blocks 60-62 is over or if the scenario does not emulate a tagged user, system 10 emulates a call to media site 20A, 20B (block 64) and gets advertisements content result of that call (block 66). The resulting received advertisement content is documented (block 68). Documentation of the resulting advertisements data, referred herein after “meta data”, includes recordation of the list of redirection links that leads to visual content that will be displayed to the user and the list of the redirection links that will occur once the emulator will emulate a user's click on that content. Documentation may further include recordation of the visual content itself When the test scenario is done (block 70) if other scenarios are to be performed on this session the next (78) test scenario will begin (block 56).
Otherwise, if other test sessions are to be performed on this test the next (80) test session will begin (block 54).
Otherwise, ad-guard monitor service 23 will start analyzing (block 74) the collected data as documented during the entire test (block 68). During the analysis process, the monitor will compare the advertisement content displayed to the user in the different scenarios and sessions. Analyzing of the results will begin with association of advertisements with respective advertisers and campaigns. Received advertisements will be surveyed and based on the survey will be grouped per each campaign. The survey may be performed automatically and/or manually by a user. For example automatic grouping may be performed by binary comparison of the visual content data and/or by analyzing the associated link(s) and/or by using automated graphical comparison tools. Additionally or alternatively system 10 may allow the user to manually define and group content into campaigns. Once the grouping into campaigns is done, ad-guard monitor service 23 may conclude one or more of the following conclusions.
A first conclusion may evaluate the effect of the tagging of users accessing media sites 20A, 20B. For example, when the differences between the resulting campaigns relating to scenarios of tagged and non-tagged users (made within the same timeframe) yield in a very low significance value it may indicate a problem in usage of the purchased data or a low relevance inventory of advertisements. Another example is when the frequency of displaying targeted content to a user exceeds a defined limit. Yet another example is when the total number of targeted content displayed to a user within a defined period of time exceeds a defined limit, defined as over use of advertisements. In such case, based on the user definitions, ad-guard monitor service 23 may issue an alert to this effect.
A second conclusion may indicate the repetition scheme of advertisement content to the tagged user. For example, exposing of a tagged user to too high percentage of targeted content, in excess of the allowed exposure scheme, as defined by the user. In such case, based on the user definitions, ad-guard monitor service 23 may issue an alert to this effect.
A third conclusion may indicate that advertisement content leads or associated with media site that was defined in the black-list. This may be done by analyzing each one of the URLs (Uniform Resource Locator) links resulting from the click on the advertisement content, and parsing the URLs contained in them, that are associated with sites on the black-list. In such case, based on the user definitions, ad-guard monitor service 23 may issue an alert to this effect.
A fourth conclusion may indicate relative exposures and volumes amongst different campaigns. This information may be used to evaluate the volumes of users exposed to advertisement content and missing income from certain campaigns as compared to reported campaigns. In such case, based on the user definitions, ad-guard monitor service 23 may issue an alert to this effect.
Reference is made now to
Test execution module 112 establishes and executes test sessions and test scenarios, as detailed above with respect to
Ad-categorization module 118 is adapted to automatically group advertisements content stored in result ad images 120 into common campaign definition and store this information on result meta data 114, as partially described with respect to block 74 of
Result analysis module 124 analyzes the test execution results as defined in block 74 of
Alerts module 126 dispatches the alerts to the user as defined in alert policy 110.
Control and monitor module 116 allows the user monitor and control the execution of the tests including stopping or suspending the test process, monitoring of the actual execution of the test process, view issued alerts and initiate an on-demand tests. Additionally monitor module 116 enables the user to view the accumulating results, the statistical analysis of same and the probability of a certain advertisement campaign to be presented to a user having certain characteristics.
The various functionalities and operations of the modules of sub-system 100 may be executed on one or more computers or servers which may be located in different physical locations which may be spaced apart. Similarly, the storage of the various data entities may be on one or more storage mediums using one or more computers or servers, which may be located in different physical locations and may be spaced apart.
While certain features of the invention have been illustrated and described herein, many modifications, substitutions, changes, and equivalents will now occur to those of ordinary skill in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.
This Application claims the benefit of U.S. Provisional Application Ser. No. 61/235,375, filed Aug. 20, 2009, which is hereby incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5848396 | Gerace | Dec 1998 | A |
5948061 | Merriman et al. | Sep 1999 | A |
5991735 | Gerace | Nov 1999 | A |
6026368 | Brown et al. | Feb 2000 | A |
6134532 | Lazarus et al. | Oct 2000 | A |
6594691 | McCollum et al. | Jul 2003 | B1 |
6662215 | Moskowitz et al. | Dec 2003 | B1 |
6904461 | Randhava et al. | Jun 2005 | B1 |
6925440 | Shkedi | Aug 2005 | B1 |
6973436 | Shkedi | Dec 2005 | B1 |
6983379 | Spalink et al. | Jan 2006 | B1 |
7039599 | Merriman et al. | May 2006 | B2 |
7062510 | Eldering | Jun 2006 | B1 |
7072853 | Shkedi | Jul 2006 | B2 |
7089195 | Rosenberg | Aug 2006 | B2 |
7162522 | Adar et al. | Jan 2007 | B2 |
7428493 | Shkedi | Sep 2008 | B2 |
7454364 | Shkedi | Nov 2008 | B2 |
7496943 | Goldberg et al. | Feb 2009 | B1 |
7533012 | Walsh et al. | May 2009 | B2 |
7617122 | Kumar et al. | Nov 2009 | B2 |
7991800 | Lawrence et al. | Aug 2011 | B2 |
8019777 | Hauser | Sep 2011 | B2 |
8024323 | Nayfeh | Sep 2011 | B1 |
8027879 | Ramer et al. | Sep 2011 | B2 |
8073738 | Protheroe et al. | Dec 2011 | B2 |
8108245 | Hosea et al. | Jan 2012 | B1 |
8234166 | Filice et al. | Jul 2012 | B2 |
8296643 | Vasilik | Oct 2012 | B1 |
8321273 | Briggs | Nov 2012 | B2 |
8327271 | Miller | Dec 2012 | B2 |
20020116258 | Stamatelatos et al. | Aug 2002 | A1 |
20030014304 | Calvert et al. | Jan 2003 | A1 |
20030033196 | Tomlin | Feb 2003 | A1 |
20030036949 | Kaddeche et al. | Feb 2003 | A1 |
20030088485 | Feinberg | May 2003 | A1 |
20030135460 | Talegon | Jul 2003 | A1 |
20030167212 | Monteverde | Sep 2003 | A1 |
20040003036 | Eagle et al. | Jan 2004 | A1 |
20040015397 | Barry et al. | Jan 2004 | A1 |
20040024632 | Perry | Feb 2004 | A1 |
20040117460 | Walsh et al. | Jun 2004 | A1 |
20040117486 | Bourne et al. | Jun 2004 | A1 |
20040199397 | Dresden | Oct 2004 | A1 |
20050165643 | Wilson et al. | Jul 2005 | A1 |
20050166233 | Beyda et al. | Jul 2005 | A1 |
20050187818 | Zito et al. | Aug 2005 | A1 |
20050193020 | Shkedi | Sep 2005 | A1 |
20050222901 | Agarwal et al. | Oct 2005 | A1 |
20050235030 | Lauckhart et al. | Oct 2005 | A1 |
20050246736 | Beyda et al. | Nov 2005 | A1 |
20060026061 | Collins | Feb 2006 | A1 |
20060041562 | Paczkowski et al. | Feb 2006 | A1 |
20060059042 | Zohar | Mar 2006 | A1 |
20060212349 | Brady | Sep 2006 | A1 |
20060212350 | Ellis et al. | Sep 2006 | A1 |
20060242267 | Grossman | Oct 2006 | A1 |
20060282328 | Gerace et al. | Dec 2006 | A1 |
20070022009 | Cataldi et al. | Jan 2007 | A1 |
20070061195 | Liu et al. | Mar 2007 | A1 |
20070067215 | Agarwal et al. | Mar 2007 | A1 |
20070088609 | Reller et al. | Apr 2007 | A1 |
20070168506 | Douglas et al. | Jul 2007 | A1 |
20070294401 | Shkedi | Dec 2007 | A1 |
20080010155 | Shkedi | Jan 2008 | A1 |
20080040175 | Dellovo | Feb 2008 | A1 |
20080140479 | Mello et al. | Jun 2008 | A1 |
20080183561 | Zohar et al. | Jul 2008 | A1 |
20080195462 | Magdon-Ismail et al. | Aug 2008 | A1 |
20080209037 | Zernik et al. | Aug 2008 | A1 |
20080243531 | Hyder et al. | Oct 2008 | A1 |
20080243592 | Song et al. | Oct 2008 | A1 |
20080263627 | Berteau et al. | Oct 2008 | A1 |
20080275980 | Hansen | Nov 2008 | A1 |
20090006363 | Canny et al. | Jan 2009 | A1 |
20090024546 | Ficcaglia et al. | Jan 2009 | A1 |
20090055332 | Lee | Feb 2009 | A1 |
20090063250 | Burgess et al. | Mar 2009 | A1 |
20090063268 | Burgess et al. | Mar 2009 | A1 |
20090106296 | Sickmiller et al. | Apr 2009 | A1 |
20090125398 | Cochran et al. | May 2009 | A1 |
20090150126 | Sellamanickam et al. | Jun 2009 | A1 |
20100082507 | Ganapathi et al. | Apr 2010 | A1 |
20100082808 | Vaynblat et al. | Apr 2010 | A1 |
20100088177 | Lu et al. | Apr 2010 | A1 |
20100100415 | Plummer et al. | Apr 2010 | A1 |
20100179855 | Chen et al. | Jul 2010 | A1 |
20100228595 | Dempster et al. | Sep 2010 | A1 |
20100241510 | Zhang | Sep 2010 | A1 |
20100332426 | Van Bemmel | Dec 2010 | A1 |
20110125587 | Netzer et al. | May 2011 | A1 |
20110131099 | Shields et al. | Jun 2011 | A1 |
20110166927 | Bandi et al. | Jul 2011 | A1 |
20110173063 | Bhatia et al. | Jul 2011 | A1 |
20110173071 | Meyer et al. | Jul 2011 | A1 |
20110187717 | Jagannath et al. | Aug 2011 | A1 |
20110191169 | Cui et al. | Aug 2011 | A1 |
20110191170 | Zhang et al. | Aug 2011 | A1 |
20110191191 | Bax et al. | Aug 2011 | A1 |
20110208591 | Chen et al. | Aug 2011 | A1 |
20110218866 | Wilson | Sep 2011 | A1 |
20110231242 | Dilling et al. | Sep 2011 | A1 |
20110231244 | Bhatia et al. | Sep 2011 | A1 |
20110231245 | Bhatia et al. | Sep 2011 | A1 |
20110231246 | Bhatia et al. | Sep 2011 | A1 |
20110231253 | Crawford et al. | Sep 2011 | A1 |
20110238468 | Shen et al. | Sep 2011 | A1 |
20110246285 | Ratnaparkhi et al. | Oct 2011 | A1 |
20110258052 | Kakade et al. | Oct 2011 | A1 |
20110258054 | Pandey et al. | Oct 2011 | A1 |
20110270670 | Leathern | Nov 2011 | A1 |
20110270686 | Patwa et al. | Nov 2011 | A1 |
20110276391 | Hillard et al. | Nov 2011 | A1 |
20110282732 | Bax et al. | Nov 2011 | A1 |
20110282815 | Thomas | Nov 2011 | A1 |
20110310891 | Howe et al. | Dec 2011 | A1 |
20120004979 | Bhatia et al. | Jan 2012 | A1 |
20120004980 | Bhatia et al. | Jan 2012 | A1 |
20120004981 | Bhatia et al. | Jan 2012 | A1 |
20120010942 | Bax et al. | Jan 2012 | A1 |
20120022952 | Cetin et al. | Jan 2012 | A1 |
20120023043 | Cetin et al. | Jan 2012 | A1 |
20120036007 | Robertson et al. | Feb 2012 | A1 |
20120036008 | Robertson et al. | Feb 2012 | A1 |
20120066072 | Kanigsberg et al. | Mar 2012 | A1 |
20120078705 | Megdal | Mar 2012 | A1 |
20120078709 | Dunham et al. | Mar 2012 | A1 |
20120078711 | Mehta et al. | Mar 2012 | A1 |
20120084149 | Gaudiano et al. | Apr 2012 | A1 |
20120095845 | Shani | Apr 2012 | A1 |
20120095848 | Chan | Apr 2012 | A1 |
20120095985 | Shen et al. | Apr 2012 | A1 |
20120109745 | Bhamidipati | May 2012 | A1 |
20120116885 | Krishnamoorthy | May 2012 | A1 |
20120123851 | Bax et al. | May 2012 | A1 |
20120123859 | Gupta | May 2012 | A1 |
20120123863 | Kaul et al. | May 2012 | A1 |
20120150641 | Dobbs et al. | Jun 2012 | A1 |
20120166272 | Wiley et al. | Jun 2012 | A1 |
20120166520 | Lindsay et al. | Jun 2012 | A1 |
20120173326 | Tao et al. | Jul 2012 | A1 |
20120191528 | Bax et al. | Jul 2012 | A1 |
20120203642 | Park et al. | Aug 2012 | A1 |
20120253928 | Jackson et al. | Oct 2012 | A1 |
20120278158 | Farahat | Nov 2012 | A1 |
20120290403 | Galitzky et al. | Nov 2012 | A1 |
Entry |
---|
“Nielsen Bridges Online and Offline Behaviors with Innovative Cross-Platform Offering,” The Nielsen Company, 2012, Retrieved from the internet: Aug. 14, 2012, pp. 1-2. |
“Online Advertising,” Fresh Patents.com, Retrieved from the internet: Nov. 20, 2012, pp. 1-2, http://tgs.freshpatents.com/Online-Advertising-bx1.phphttp://tgs.freshpatents.com/Online-Advertising-bx1.php , retrieved on Nov. 20, 2012. |
LaRue, “eXelate, Nielsen Catalina Solutions Partner to Bring CPG Data Online,” Adotas, Jan. 31, 2012, Retrieved from the internet: Aug. 14, 2012, pp. 1-2. |
Lykou et al., “Sparse CCA using a Lasso with positivity constraints,” Computational Statistics and Data Analysis, 2010 vol. 54, pp. 3144-3157. |
Soltani et al., “Flash Cookies and Privacy,” 2009, Summer Undergraduate Program in Engineering Research at Berkeley (SUPERB), pp. 158-163. |
Stage et al., “Measuring Similarity in Nearest Neighbor Imputation: Some New Alternatives,” Proceedings of the Symposium on Statistics and Information technology in Forestry, 2003, pp. 1-6 |
Witten et al., “A penalized matrix decomposition, with applications to sparse principal components and canonical correlation analysis,” Biostatistics, 2009, vol. 10, No. 3, pp. 515-534. |
Number | Date | Country | |
---|---|---|---|
20110072131 A1 | Mar 2011 | US |
Number | Date | Country | |
---|---|---|---|
61235375 | Aug 2009 | US |