US20090298514A1 - Real world behavior measurement using identifiers specific to mobile devices - Google Patents

Real world behavior measurement using identifiers specific to mobile devices Download PDF

Info

Publication number
US20090298514A1
US20090298514A1 US12/357,295 US35729509A US2009298514A1 US 20090298514 A1 US20090298514 A1 US 20090298514A1 US 35729509 A US35729509 A US 35729509A US 2009298514 A1 US2009298514 A1 US 2009298514A1
Authority
US
United States
Prior art keywords
user
mobile
content
network
dsi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/357,295
Inventor
Shah Ullah
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/855,122 external-priority patent/US20080108308A1/en
Priority claimed from US11/855,820 external-priority patent/US20080133327A1/en
Priority claimed from US11/855,685 external-priority patent/US20080109888A1/en
Priority claimed from US11/855,811 external-priority patent/US20080220760A1/en
Application filed by Individual filed Critical Individual
Priority to US12/357,295 priority Critical patent/US20090298514A1/en
Publication of US20090298514A1 publication Critical patent/US20090298514A1/en
Priority to US13/594,360 priority patent/US20120323685A1/en
Priority to US13/651,097 priority patent/US9445353B2/en
Priority to US13/904,151 priority patent/US9204376B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/38Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Definitions

  • This application relates to wireless communication and more specifically to mobile device identification and authentication for access to and presentation of targeted content.
  • content-targeting methods face various challenges, depending on the users and devices to which content is targeted.
  • television and radio advertisements are often directed to a mass audience, with little information about specific users.
  • Internet advertisements targeting a user may be based on data stored on a user's network-connected device that corresponds to sets of information that indicate that a user is returning to a particular site, but targeting based on this and similar mechanisms are subject to limitations, among them being that multiple users may access the Internet through the same device.
  • Mobile content may be targeted more easily to a specific user, such as based on information about the user in a database maintained by a wireless carrier or based on the user's interaction with content on the mobile handset, but the more limited range of content that is typically accessed by mobile devices means that profiles based on that usage are often targeting limited and sometimes misleading. Accordingly, a need exists for better methods of gathering user-specific profile information across all types of network-enabled devices and as well as targeting content to users of all types of network-connected devices.
  • Methods and systems are disclosed herein for delivering content, including advertising content, to various network-connected devices.
  • methods and systems take advantage of capabilities and information available in various networking domains to deliver more targeted content to each of those domains, including using the collective capabilities and information derived from multiple domains to deliver content to each domain.
  • a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target television content, including advertisements, to the user.
  • the network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices.
  • a device-specific identifier (DSI) of a mobile device owned by a user may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device.
  • network content such as web sites
  • activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities.
  • activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded.
  • activity may be derived from more than one user of the same device
  • patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device.
  • activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity.
  • a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains.
  • targeting techniques such as behavioral targeting, hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the television of the user.
  • use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management.
  • a short-distance wireless connection between a mobile handset and another network-enabled device allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device.
  • a user's proximity to a television screen can be determined by using a short-distance wireless protocol to access the MAC address, or other mobile device-specific identifier (DSI) of the handset.
  • DSI mobile device-specific identifier
  • proximity can be used for various purposes, including tracking what the user (or other nearby users) view on the television screen, such as for ratings purposes, managing (including with digital rights management techniques) the content the user is allowed to view on the screen (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the screen), and targeting the content directed to the user on the screen, including advertising, for which a user-specific profile which includes the activities performed on a multitude of network-connected devices may be referenced.
  • the methods and systems disclosed herein allow for user-specific control of content delivered to the screen the user is watching, based on proximity of the user's (or set of users') mobile handset(s) to the screen.
  • a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target audio content, including advertisements, to the user.
  • the network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices.
  • a device-specific identifier (DSI) of a mobile device owned by a user may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device.
  • network content such as web sites
  • activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities.
  • activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded.
  • activity may be derived from more than one user of the same device
  • patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device.
  • activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity.
  • a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains.
  • targeting techniques such as behavioral targeting, hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the audio-enabled devices, such as Internet radios, of the user.
  • use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management.
  • a short-distance wireless connection between a mobile handset and another network-enabled device such as an Internet-radio, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol
  • an Internet-radio such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol
  • a user's proximity to an Internet radio can be determined by using a short-distance wireless protocol to access the MAC address, or other mobile-specific identifier (DSI) of the handset.
  • DSI mobile-specific identifier
  • proximity can be used for various purposes, including tracking what the user (or other nearby users) listen to on the audio-enabled device, such as for ratings purposes, managing (including with digital rights management techniques) the content the user is allowed to listen to on the audio-enabled device (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the audio-enabled device), and targeting the content directed to the user on the audio-enabled device, including advertising.
  • the methods and systems disclosed herein allow for user-specific control of content delivered to the audio-enabled device to which the user is listening, based on proximity of the user's mobile handset to the audio-enabled device.
  • a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target point-of-presence content, including advertisements, to the user.
  • the network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices.
  • a device-specific identifier (DSI) of a mobile device owned by a user may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device.
  • network content such as web sites
  • activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities.
  • activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded.
  • activity may be derived from more than one user of the same device
  • patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device.
  • activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity.
  • a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains.
  • targeting techniques such as behavioral targeting, hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to a point-of-presence device, such as a screen or audio-enabled device, that is in proximity to the user.
  • use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management.
  • a short-distance wireless connection between a mobile handset and another network-enabled device such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device, in this case a point-of-presence device such as a screen at a live event, a point-of-sale screen, or a point-of-presence audio-enabled device.
  • a user's proximity to such a point-of-presence device can be determined by using a short-distance wireless protocol to access the MAC address, or other mobile-specific identifier (DSI) of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) view on a screen or hear on an audio-enabled device, such as for ratings purposes, tracking the effectiveness of advertising, managing (including with digital rights management techniques) the content the user is allowed to view on the screen (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the screen), and targeting the content directed to the user on the screen, including advertising.
  • the methods and systems disclosed herein allow for user-specific control of content delivered to the screen or audio-enabled device the user is watching, based on proximity of the user's mobile handset to the screen or audio-enabled device.
  • a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target Internet web-page-based or Internet portal-based content, including advertisements, to the user.
  • the network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices.
  • a device-specific identifier (DSI) of a mobile device owned by a user may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device.
  • network content such as web sites
  • activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities.
  • activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded.
  • activity may be derived from more than one user of the same device
  • patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device.
  • activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity.
  • a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains.
  • targeting techniques such as hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the Internet-connected device of the user.
  • use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management.
  • a short-distance wireless connection between a mobile handset and another network-enabled device allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device.
  • a user's proximity to an Internet-connected device can be determined by using a short-distance wireless protocol to access the MAC address or other DSI of the handset.
  • proximity can be used for various purposes, including tracking what the user (or other nearby users) view on the Internet-connected device, such as for ratings purposes, managing (including with digital rights management techniques) the content the user is allowed to view or listen on the device (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the device), and targeting the content directed to the user on the device, including advertising.
  • the methods and systems disclosed herein allow for user-specific control of content delivered to the screen the user is watching or the audio-device to which the user is listening, based on proximity of the user's mobile handset to the Internet-connected device.
  • a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target television content, including advertisements, to the user.
  • the network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices.
  • a device-specific identifier (DSI) of a mobile device owned by a user may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device.
  • network content such as web sites
  • activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities.
  • activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded.
  • activity may be derived from more than one user of the same device
  • patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device.
  • activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity.
  • a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains.
  • targeting techniques such as hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the mobile device of the user.
  • use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management.
  • a short-distance wireless connection between a mobile handset and another network-enabled device allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to another mobile device.
  • a user's proximity to a mobile device can be determined by using a short-distance wireless protocol to access the MAC address or other DSI of the handset.
  • proximity is determined or verified, it can be used for various purposes, including managing (including with digital rights management techniques) the content another user is allowed to access on another mobile device (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the other user's device), and targeting the content directed to the user on the other device, including advertising.
  • One advantage of the methods and systems herein is they enable a drastic improvement in the television advertising industry. There are certain technology and business drivers for a higher penetration of more advanced set-top boxes, or televisions integrated with Internet-connection capability that may be associated with improvements in television advertising.
  • DVDs may become a technological non-necessity in a few years. Users may consume video via a direct feed/download via an Internet-protocol based connection to a content serving database. This video data will need to go through a data network utility in the home that may route not only video, but other data streams such as voice and Internet data inside the home. As a result, even viewers that will not subscribe to premium television channels will likely have an advanced set-top box or television with Internet-connection capabilities for the consumption of non-premium television channels and for watching movies.
  • FMC Fixed-Mobile-Convergence
  • Using the mobile device is potentially the only way to attain a real-time, live assessment of who is watching the television and tailor the advertisements delivered to the unique combinations of viewers.
  • a father and son watching television content together represent two very unique advertising markets.
  • the server-side software which facilitates the creation of user-specific profiles rooted in the mobile DSI but which also take into consideration all network-connected devices, is a technology that may but will not necessarily, provide the same value as a real-time user-specific advertising network for Internet websites, blog publishers, or Internet retailers allowing them access to the best available user-specific Internet usage metrics so they can serve the best possible ads on available ad inventory or in the case of an Internet retailer, promote the best products suited for visitors to the given Internet retailer's website.
  • fees may be collected by a provider of a mobile DSI identification/authentication service, such as for video, unlimited viewing, extending the content on a given Internet platform to another platform such as television content, portable/flexible electronic screens used to make digital text portable, radio, and the like.
  • a provider of a mobile DSI identification/authentication service such as for video, unlimited viewing, extending the content on a given Internet platform to another platform such as television content, portable/flexible electronic screens used to make digital text portable, radio, and the like.
  • mobile carriers are rapidly seeking ways to monetize their high subscriber penetrations through advertising. From business processes which rely upon the methods and systems disclosed herein, mobile carriers may receive a portion of advertising revenue from various sources of advertising, including television which accounts for 34% of all advertising dollars in the US or $72 billion in 2006. As video on the internet becomes more prevalent, advertising related revenue may grow and through technological advances, television and internet advertising and content delivery will benefit.
  • Digital Rights Management synergies with content producers are enabled by the methods and systems herein.
  • Content production companies such as News Corporation may enjoy digital rights management services to protect their premium for-pay content while using the methods and systems herein to aid in the serving of highly-precise, targeted ads, such as by using DSI based identification/authentication profiles.
  • DSI device-specific identification
  • Placing an emphasis on a mobile handset's device-specific identification (DSI) as a base for a user-specific profile generated from activity performed on various network-connected devices may be based on an understanding that it is essentially carried on a given user's person and thus is very individual-specific. Additionally, since it is carried on a given user's person, it follows the user in many places where other devices such as a PC/laptop might not, thus allowing user-specific profiles created with specific dependencies and ties to the mobile handset, to be portable by virtue of the inherent portability of mobile handset.
  • the mobile DSI may facilitate the aggregation by enabling the use of clues or information associated with the mobile handset DSI and the associated user to determine what other information, found as a result of Internet usage on other network-connected devices associated with the same user, to aggregate with it.
  • a fixed position, or multi-user device such as a PC, a television, or other stationary Internet-enabled device presents user identification challenges that the mobile handset does not. These challenges are mainly rooted on the basis that such devices may, and often, have multiple regular users. Therefore the mobile handset may serve as a primary identification device for a scenario in which the methods and systems herein (e.g.
  • identification or authentication could be applied for advertising, content/software as a service-authentication, and the like.
  • the mobile handset is widely regarded as becoming the most frequently used computing interface, making it ideal for user authentication purposes.
  • the methods and systems described herein do not all require a mobile component, and therefore, for the purposes of the unique methods and systems described herein, they can be associated with mechanisms that do include a mobile component.
  • methods and systems may include using a personal device to detect a proximity of a wireless device identifier; determining a duration of the detected proximity; generating a measure of real-world behavior by associating the detected wireless device identifier with at least one of a real world product, service, product category, retail store aisle, and retail store; and updating a usage profile that is associated with a user of the personal device with the real world behavior.
  • the wireless device identifier may include at least one of an RFID device and a WiFi device.
  • updating a usage profile may include using a device specific identifier associated with the personal device to determine the usage profile to update.
  • the measure of real world behavior may include GPS location data received from the personal device.
  • methods and systems may include detecting a proximity of a personal device to a plurality of wireless device identifiers; determining a duration of proximity for each of wireless device identifiers, providing a dwell event for each of the plurality of wireless device identifiers; and analyzing the plurality of dwell events and a usage profile associated with a user of the personal device to determine a measure of user interest in an item associated with at least one of the plurality of wireless device identifiers.
  • Another aspect further may include facilitating delivering to the personal device an offer based on the measure of user interest.
  • the measure of user interest may indicate that the user has acquired the item
  • a device specific identifier of the personal device may be used to identify the usage profile for analysis.
  • the usage profile may include usage data associated with a plurality of network-enabled devices.
  • the dwell event may include GPS location data received from the personal device.
  • the GPS location data may be used to determine a retailer associated with the wireless device identifiers.
  • methods and systems may include receiving dwell event data representing a real-world proximity of a plurality of personal devices to a wireless device identifier; using a device specific identifier associated with each of the plurality of personal devices to identify a usage profile of a user of each of the personal devices; comparing the dwell event data with each usage profile to determine a measure of user interest in an item associated with the wireless device identifier; and updating each usage profile based on the measure of user interest.
  • substantially identical dwell event data for a first personal device and a second personal device may result in a measure of user interest for a user associated with the first device that is different from a measure of user interest for a user associated with the second device, wherein the difference in user interest is provided by comparing the dwell event data with each of the usage profile of the first device and the usage profile of the second device.
  • methods and systems may include receiving a GPS location of a first network-enabled device; receiving a device specific identifier of the first network-enabled device; and authorizing the delivery of content to a second network-enabled device based on the GPS location of the first network-enabled device.
  • the content may be an advertisement that is targeted to a user of the second network-enabled device.
  • the advertisement may be based on a usage profile associated with at least one of the first network-enabled device and the second network-enabled device.
  • authorizing the delivery may be further based on a GPS location of the second network-enabled device.
  • the first network-enabled device may be on a different network from the second network-enabled device.
  • the first network-enabled device may be connected to a cellular network and the second network-enabled device is connected to the Internet.
  • methods and systems may include detecting a latency of communication between a first network-enabled device and a second network-enabled device; calculating a distance between the first and second network-enabled devices based at least in part on the detected latency; and updating a usage profile based on network activity data collected from the second network-enabled device, wherein the usage profile is identified by a device specific identifier of the first network-enabled device, and wherein the updating is based on the calculated distance.
  • methods and systems may include receiving a measure of latency of communication between a first network-enabled device and a second network-enabled device; receiving network activity associated with at least the second network-enabled device; receiving a device specific identifier of the first network-enabled device; identifying a usage profile based on the device specific identifier; calculating a distance between the first and second network-enabled devices based at least in part on the measure of latency; and updating the usage profile based on the received network activity data, wherein the updating is based on the calculated distance.
  • methods and systems may include receiving a GPS location data of a first network-enabled device and a second network-enabled device; receiving a device specific identifier of the first network-enabled device; and authorizing the delivery of content to the second network-enabled device based on the device specific identifier and the GPS location data.
  • the first and second network-enabled devices may be located remotely to each other.
  • the first and second network-enabled devices are not communicating by short haul wireless communications.
  • the GPS location data may be one of a specific location, a proximity to a location, one of a plurality of locations, and not within range of certain locations.
  • the GPS location of the first network-enabled device is the same as the GPS location of the second network-enabled device.
  • the GPS location of the first network-enabled device may be nearby to the GPS location of the second network-enabled device.
  • the GPS location of the first network-enabled device may be compared to the GPS location of the second network-enabled device to determine a proximity of a user of the first network-enabled device to the second network-enabled device.
  • the device specific identifier of a first network-enabled device may be retrieved from a GPS locating system.
  • street address referenced GPS data may be combined with the GPS location data to facilitate selecting a usage profile.
  • the street address referenced GPS data may be combined with the GPS location data to facilitate at least one of digital rights management, access to content, sharing of content, storing of content, targeting of content, developing a user-specific authentication/identification profile, associating devices to a user-specific authentication/ identification profile, associating web surfing with a user history, and associating an electronic communication activity with a user history.
  • GPS location of the first network-enabled device may be combined with a determination of network communication latency between the second network-enabled device and the first network-enabled device to calculate a proximity of the first and second network-enabled devices.
  • authorizing the delivery may be based on the calculated proximity.
  • methods and systems may include providing geo-location data from a GPS enabled personal device to a media capture device; marking media created by the media capture device with the geo-location data; and transferring the marked media to a server.
  • methods and systems may include receiving media from a media capture device over a short haul wireless network; marking the media with a geo-location; and transferring the geo-location marked media over a network.
  • methods and systems may include forwarding media received by a personal device over a short haul wireless network from a media capture device and a geo-location of the personal device over a long haul wireless network, wherein the forwarded media is associated with the geo-location.
  • FIG. 1 depicts a DSI-based authentication/identification platform.
  • FIG. 2 depicts using a mobile handset DSI to facilitate delivery of targeted television advertising.
  • FIG. 3 depicts providing recent historical usage information (internet browser cache data) from a mobile device to a server on the internet
  • FIG. 4 depicts determining a presence and a location of mobile handsets in proximity to a set-top box and/or an Internet-connection capable television.
  • FIG. 5 depicts determining a presence and a location of mobile handsets in proximity to a set-top box and/or an Internet-connection capable television in order to determine a presence of viewers by virtue of the presence of their mobile handsets.
  • FIG. 6 depicts uploading DSI or browser cache data over the internet to a host and the processing there.
  • FIG. 7 depicts a typical wireless network device gaining access to internet resources.
  • FIG. 8 depicts a very simplified embodiment of the internet with a plurality of web sites and servers.
  • FIG. 9 depicts the delivery of client side software by a server to a mobile handset.
  • FIG. 10 depicts client side software communicating the device identifier or device-specific identification (DSI) over the internet.
  • DSI device-specific identification
  • FIG. 11 depicts the creation of DSI-specific logs being facilitated by a server's server-side software once it has obtained a mobile handset's DSI.
  • FIG. 12 depicts a device other than a mobile device providing a DSI for the creation of DSI-specific logs facilitated by a server's server-side software once it has obtained a mobile handset's DSI.
  • FIG. 13 depicts a plurality of devices, submitting their respective DSIs to servers, for the production of DSI-specific usage logs.
  • FIG. 14 depicts formation of user-specific authentication/identification profiles as a result of DSI and username aggregation and compilation of usage logs associated therewith
  • FIG. 15 depicts real-time audience tracking of embedded web objects that may be a distribution method for super distributed content in association with DSI-based audience tracking.
  • FIG. 16 depicts filtering user information as DSI-based logs and usage data is passed to servers on the internet.
  • FIG. 17 depicts delivering authentication protected content in a DSI-enabled digital rights management/content authentication system.
  • FIG. 18 depicts layered targeted advertising based on one user profile.
  • FIG. 19 depicts layered targeted advertising based on two user profiles.
  • FIG. 20 depicts dynamic content placement in association with layered targeted advertising based on two user profiles.
  • FIG. 21 depicts using a mobile handset to interact with an interactive targeted advertisement presented by a television connected to a set-top box and/or an Internet-connection capable television
  • FIG. 22 depicts the embodiment of FIG. 21 wherein the advertisement is presented on a personal computer.
  • FIG. 23 depicts the embodiment of FIG. 21 wherein the advertisement is presented on an electronic multimedia screen.
  • FIG. 24 depicts an alternate embodiment of FIG. 21 wherein the advertisement is presented on a flexible electronic presentation media.
  • FIG. 25 depicts a timeline representing real-time accumulation of usage data impacting targeted advertising.
  • FIG. 26 depicts contact sharing between DSI-enabled wireless mobile handsets and uploading the contact to a social networking site.
  • FIG. 27 shows methods and systems for automatic mobile contact information exchange and synchronization with a social network.
  • FIG. 28 shows steps for a mobile aware, automatic social networking tool.
  • FIG. 29 shows additional details relevant to a mobile aware, automatic social networking tool.
  • FIG. 30 shows components for a mobile aware, automatic, social networking system.
  • FIG. 31 shows methods and systems for managing content based on a device-specific identifier of a client.
  • FIG. 32 shows steps for integration of content in the playback software of a user device.
  • FIG. 33 shows downloading and integration of content into playback software of a user device.
  • FIG. 34 shows geocoding media using the methods and systems of device specific identification and user profiling.
  • FIG. 35 shows a real world wireless device identifier dwell event.
  • the following disclosure relates generally to mobile device identification and authentication for access to and presentation of targeted content.
  • the terms “comprises,” “comprising,” “includes,” “including,” “has,” “having” or any other variation thereof, are intended to cover a non-exclusive inclusion.
  • a process, method, article, or apparatus that comprises a list of elements is not necessarily limited to only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
  • “or” is intended to mean “and/or” unless otherwise stated to the contrary.
  • use of the “a” or “an” are employed to describe elements and components of the invention.
  • a DSI-based authentication/identification platform 100 may include profile aggregation 124 , content tagging 122 , user identification 120 , authentication 114 , usage logging 112 , a standards facility 118 , a short haul wireless port 110 , a profile database 130 , an internet port 128 , client software 102 , device MAC addresses 104 , and a device username 108 .
  • a mobile device 202 may include some portions and functionality of the platform 100 . The mobile device 202 may also be connected to the platform 100 through the short haul wireless port 110 and/or through the Internet port 128 .
  • FIG. 2 depicts using a mobile handset DSI to facilitate delivery of targeted television advertising 218 .
  • a mobile handset 202 may be in communication with a set-top box 204 or other Internet-connected device that is controlling a television 208 .
  • the mobile handset 202 may be in communication with the set-top box 204 through a wireless interface 214 , such as short distance wireless interfaces including WiFi, Bluetooth, WUSB, UWB and the like.
  • the mobile handset 202 may include location technology such as a GPS receiver/cellular/radio wave triangulation to further assist locating the relative position of the handset user and the television 208 .
  • the set-top box 204 may be connected to one or more host servers 210 , such as through the internet, to communicate content related to functions of the set-top box 204 .
  • the host server 210 may include functionality to support the identification and selection of content, such as advertisements 218 , based the mobile handset 202 device-specific identification (DSI).
  • DSI device-specific identification
  • a viewer who may be carrying the mobile handset 202 on his person may sit down in front of a television that is connected to the Internet.
  • the Internet connection may be via the set-top box 204 , which may be one provided by a cable company, satellite company, internet service provider, etc.
  • the set-top box 204 may also be separate from the ones provided by the providers of television/internet data services (e.g. Microsoft's X-box, AppleTV, and the like).
  • the television 208 may provide internet communication.
  • the set-top box 204 may extract the mobile handset DSI 212 by employing a short-distance wireless technology (WiFi, Bluetooth, WUSB, UWB, and the like) to locate mobile handsets within viewing proximity of the television 208 .
  • the mobile handset DSI 212 (also known as mobile DSI or just DSI) may then be uploaded from the set-top box 204 over the internet to the host 210 for matching to a user-specific authentication/identification profile (a user profile) that corresponds to the uploaded DSI 212 .
  • the servers 210 may be servers associated with the DSI platform 100 , or may be associated with partners or affiliates of the platform 100 .
  • the server 210 may mine data across an uploaded user authentication/identification profile that corresponds to the extracted mobile DSI 212 and use the information for precision advertisement targeting.
  • location based technology such as GPS/cellular/radio wave triangulation
  • a more precise location for the user may be determined so that advertising for a user viewing the television may be presented on the television 208 .
  • the location based technology information may be retrieved from the mobile handset 202 , such as by querying the mobile handset 202 or the location information may be included in the initial extraction of the DSI 212 by the set-top box 204 .
  • the host server(s) 210 may then find the most appropriate advertisement 218 and distribute the advertisement back to the set-top box 204 for display on the television 208 .
  • advertisements 218 may come in the form of dynamic, embedded content advertisements 218 . Interactivity during the period of display of the advertisement can be monitored and recorded by the servers 210 for the purposes of adding more data to the corresponding user authentication/identification profile.
  • FIG. 3 An alternative embodiment for delivering targeted advertising 218 to a television that may be viewed by a user of a mobile handset is depicted in FIG. 3 .
  • recent historical information 302 from the mobile handset 202 web browser or other user interface software may be retrieved by the set-top box 204 and forwarded to the servers 210 .
  • the servers 210 may prepare a query that is passed to the handset 202 by the set-top box 204 and the recent historical information 302 may be included in a response to the query.
  • the set-top box 204 may extract information, in its entirety or derived from the mobile handset's Internet browser cache and forward it to the servers 210 .
  • the extracted internet recent historical information 302 such as represented by a internet browser cache, may be combined with a user profile or usage profile corresponding to the DSI 212 to determine relevant analysis about the historical information 302 .
  • the recent historical information 302 may be analyzed alone.
  • the information may be analyzed for demographic, interests, trends, and the like that may facilitate the servers 210 determining an appropriate offer or advertisement 218 to present on the television 208 that the user of the mobile handset 202 may be viewing.
  • presence of a mobile phone may be used to identify the users who are present/within viewable proximity in front of a television or other electronic display by virtue of the distance of their mobile handsets from the television or other electronic display.
  • Communication with a mobile phone or mobile handset 202 may include using short-distance wireless technologies, such as WiFi, Bluetooth, WUSB, and UWB to identify nearby mobile handsets 202 .
  • Precise user location may further be determined via device-specific GPS/cellular/radio wave triangulation alignment. Such detection may be used to derive real-time and accurate content audience ratings.
  • FIGS. 4 and 5 each depict determining a presence and a location of mobile handsets in proximity to a set-top box.
  • the set-top box may determine a distance and a direction of mobile handset 202 .
  • the set-top box 204 and/or internet television 208 may determine if the presence and distance of detected mobile handsets 202 can support an assumption that the detected mobile handsets 202 represent individuals 502 within viewing proximity 508 of the television, or viewers 504 outside a viewing proximity 508 of the television 208 . This will allow the set-top or the television to determine individuals within viewing proximity of the television by virtue of the presence of their mobile handsets.
  • Individual handsets 202 may be detected uniquely by retrieving the handset DSI 402 and, when available, a GPS/cellular/radio wave triangulation coordinate 404 for the handset. By associating the DSI 402 with a user identification as described in reference to FIG. 2 , an identity of the viewers or listeners in detectable proximity to the television 208 may be determined.
  • the methods and systems herein may facilitate real-time television or other electronic display audience rating/headcount via use of mobile DSI and/or mobile handset internet browser cache.
  • the methods and systems herein may include using the mobile DSIs of the given mobile handsets (and profiles of usage associated therewith, including usage of non-mobile devices) for the purposes of retrieving a real-time, audience ratings/headcount, which pertains to various demographic categories/metrics. This may involve the use of Internet usage profiles associated with the mobile DSI but also may take into consideration usage activity from non-mobile devices. Usage profiles provide a way of tracking of Internet activity which can result in strong assumptions of real-time, viewer-specific demographic data.
  • real-time viewer attendance may be determined through the extraction of each proximate mobile handset's Internet browser cache, in place of extraction of the mobile DSI, which can also effectively report real-time viewer demographical data as determined by the Internet usage patterns which can be recognized by analyzing the mobile handset's Internet browser cache contents.
  • the set-top box 204 or the television 208 uploads the detected mobile device DSIs to host servers 210 .
  • the servers 210 compare the extracted Mobile DSI 212 across a database, or more generally a data store of user-specific authentication/identification profiles 602 to find the profiles which correspond to the extracted mobile DSIs (resulting in a corresponding profile 604 ). Using information from the corresponding user-specific authentication/identification profiles 604 , servers 210 may make demographic assumptions.
  • demographics and audience classification may be determined by analyzing an internet browser cache 302 associated with the proximate mobile handsets.
  • Information such as historical browsing data, queries, locations, communication such as texting, email, and the like may be analyzed by the servers 210 to determine real-time viewing audience aspects.
  • a mobile handset may effectively allow for the creation of real-time audience ratings which include various demographics determined by identifying the participants in a viewing audience as well as relative Internet usage metrics.
  • the derived or measured real-time viewing information may be provided in a report to broadcasters, advertisers, and the like to become part of a broadcast or programming business process.
  • User-specific authentication/identification profiles may be based on mobile device or personal device device-specific identifications (DSIs), such as for the purposes of user-specific multi-device internet usage tracking and profiling.
  • DSIs personal device device-specific identifications
  • User-specific authentication/identification profiles may include a user identity, usage tracking, and the like. Establishing user-specific profiles may involve tracking of activities associated with user names that are linked or tied to the mobile DSI; and linking those usernames to other (non-mobile) DSIs to aggregate user-specific activities regardless of which device(s) the activities take place.
  • One useful purpose for this aggregation of mobile and non-mobile activity tracking is targeted advertising.
  • Defining, extracting, and using mobile device specific identifiers may make use of server-side and/or client-side software.
  • Server-side software may reside on the servers 210 or may reside elsewhere and be executed on the servers 210 .
  • Client-side software may be downloaded onto or otherwise configured into mobile and/or stationary devices used by end users.
  • the client-side and server-side software may be used when a mobile device user visits a website in order to gain access to content residing on servers that require authentication and/or user identification.
  • One or more of the client-side and the server-side software may include creating and updating logs associated with a mobile device DSI once a known visitor has gained access to servers providing access to the requested authentication protected content.
  • DSI based logs may differ from other logging methodologies in that DSI logs may have the ability to completely mask the real world identities of users as their user-specific authentication/identification profiles can be created with a process that results in the complete morphing or excluding of anything that renders the user identifiable in the real world. Additionally, the DSI specific logs are initiated, conducted, and managed on the server side rather than on the device with which the user is in direct contact with and/or uses to input/request network content. Also, client-side software may provide capabilities that pertain to uploading device-specific information and existing information already contained in the mobile device prior to engagement with the server 210 or with the website a given user is attempting to access. This results in an important difference from information/behavioral software existing today that log behavioral activity on the client device.
  • FIG. 7 depicts a typical wireless network device gaining access to internet resources.
  • Mobile handheld device 202 communicates through a wireless provider's network that may comprise cellular phone towers 702 for cellular connections such as CDMA, GSM, or IP-based WiMax connections.
  • the wireless provider's network may include an access point to the internet through which a mobile handset 202 may send and receive information over the internet
  • the same mobile device 202 may also communicate through a wireless IP-based interface, such as WiMax, or WiFi, and other wireless protocols such as Bluetooth, WUSB, or UWB and the like 704 .
  • the WiFi router 704 may interface to the internet through a WiFi Back-Haul 708 such as through T 3 , Cable, DSL, or any other broadband connection.
  • This exemplary network connection scheme may provide an access path from the mobile handset 202 to the internet and servers such as a host server 210 herein described.
  • FIG. 8 depicts a very simplified embodiment of the internet with a plurality of web sites and servers, wherein some web sites require authentication and/or identification, and other web sites may often provide a fulfilling web experience without the collection of usernames/passwords normally associated with authentication.
  • Web sites represented by servers 802 and 804 such as servers, may, based on a need for user authentication/identification operate server-side software 808 associated with the systems and methods herein described.
  • server-side software 808 associated with the systems and methods herein described.
  • servers 802 execute the herein described server-side software 808 , and servers 804 do not.
  • websites 802 may require a username/password to be input by visitors for a more personalized experience (e.g. social networks, email, and the like).
  • FIG. 9 depicts when a mobile handset 202 identifies itself to a server 802 , such as through the network described in any of FIGS. 1 through 7 and server-side software 808 executing on the server may run a check on the mobile device 202 to see if it has the most current client-side software 902 . If the mobile device does not have the most current client-side software 902 , the user may be asked to download it to gain access to content on the authenticated website. Downloading of the client-side software 902 onto the mobile handset 202 may be facilitated by the server-side software 808 residing on a website's servers. Alternatively, the latest client-side software 902 maybe automatically downloaded to a device 202 that has identified itself to the server 802 .
  • client-side software 902 may begin executing on the mobile device 202 .
  • the client-side software 902 may be responsible or collecting relevant and necessary information from and about the mobile device, such as a MAC address, username, password, browser cache settings, and the like to provide a DSI 212 .
  • the client-side software 902 may deliver the DSI 212 to a web site/internet server contemporaneously with a first access to the web site/internet server 802 .
  • a web site server 802 that is executing the server-side software 808 may collect the DSI 212 during authentication, or if authentication is not required, the server 802 may also collect the DSI 212 .
  • Information stored on the mobile device 202 may be transmitted to the server 802 to update information related to the device DSI 212 .
  • the client-side software 902 will not monitor the device related activities of the user, rather just identify of the device (mobile or non-mobile) that is currently connected to the server 802 along with existing properties of that device is recorded.
  • past behavior may be included in the information uploaded to the server 802 , such as data derived from an Internet browser cache on the device, logging of the activities once the device has been connected to a given website server 802 will be done by the server-side software 808 , not the client side software 902 .
  • FIGS. 11 and 12 upon receipt of a DSI 212 , a server 802 executing server-side software 808 may begin tracking usage of the website supported by the server 802 in a DSI specific log 1102 .
  • FIG. 11 depicts a configuration with a mobile device 202 providing the DSI 212 ; whereas FIG. 12 depicts a device other than a mobile handset providing a DSI 1202 , such as a PC, providing the DSI 212 .
  • Information collected from the mobile device 202 or the non-mobile handset device 1202 may include the device identifier (e.g. the MAC address), username, password, GPS/cellular/radio wave triangulation data, browser cache data, and the like. The information collected may be stored in association with the mobile device DSI log 1102 as shown in FIG. 11 or with the non-mobile handset device DSI log 1204 as shown in FIG. 12 .
  • FIG. 13 depicts a configuration wherein at least two devices and a plurality of servers are embodying the methods and systems herein described.
  • the embodiment of FIG. 13 includes a mobile device 212 , a device that is not a mobile handset may be a wired PC, a laptop with WiFi, or any other Internet-enabled device that is not a mobile handset. 1202 , a plurality of servers 802 executing server-side software 808 and recording a usage log ( 1102 , 1204 ) for each device ( 202 , 1202 ).
  • the DSI information and the usage logs may be forwarded onto a host server 210 for the purposes of analyzing and relating the various information to provide usage or user profiles.
  • FIG. 14 depicts a host server 210 accessing the information collected from the mobile or non-mobile handset and the corresponding usage logs to determine associations between them.
  • the host server 210 may determine that two different DSIs and corresponding usage logs may be associated with a single user or a single entity, such as a business.
  • a host server 210 may associate a username that may have been provided by a user of a DSI enabled device to access authentication protected internet content with the same or related DSIs collected by other servers 802 and reported to the host server 210 .
  • three usage logs from three different servers are analyzed to associate a username to a DSI and its corresponding usage data.
  • the host server 210 may also search through a data store of existing DSIs, usage logs, and usernames to determine such an association.
  • the data store of existing DSIs and usernames may be derived from data provided by servers 802 connected to the internet and is not restricted to the three server log configuration depicted in FIG. 14 .
  • the host server 210 may create user profiles, such as user authentication/identification profiles that may be useful for purposes such as targeted advertising, while enabling the protection of the privacy of the individual associated with the user profile through morphing the identifying information so that third parties, such as advertisers, cannot determine the user's identity.
  • the host server 210 may also provide privacy protection by requiring the advertisers to target advertisements to users through the host server 210 .
  • the user authentication/identification profile may be provided to third parties, such as advertisers or web sites so that one or more devices identified by DSIs associated with the user profile may be targeted to receive advertising.
  • third parties such as advertisers or web sites so that one or more devices identified by DSIs associated with the user profile may be targeted to receive advertising.
  • the host server may anonymously create user-specific profiles across various devices. In this way, even the host server does not have the information necessary to find the real world identity of the user associated with the user profile.
  • host server 210 accesses usage logs from at least three servers. Usage logs that directly contain common user names are aggregated into a user authentication profile 1404 .
  • usage logs 1102 , 1204 and 1102 A can be identified by the host server 210 as having common usernames.
  • Usage log 1204 A does not have a username that matches those aggregated into profile 1404 so it is compared to a data store 1402 of usernames and associated DSIs that includes historical data as well as usage data being provided by other servers to the host server 210 .
  • Usage log 1204 B is associated with user profile 1408 , while usage log 1102 B is compared to the data store 1402 .
  • the lookup of the usernames and/or DSIs from usage logs 1102 B and 1204 A through data store 1402 results in usage log 1102 B being aggregated with user profile 1404 and usage log 1204 A being aggregated with user profile 1408 .
  • DSIs in usage logs may also be checked in a similar way.
  • a usage log that contains a DSI but does not contain a username may be aggregated with a user profile by associating the DSI in the usage log with the information in the data store 1402 to determine an appropriate user profile for aggregating the usage log data.
  • a user profile may be created for the DSI so that all usage associated with that DSI may be aggregated under the DSI specific user profile. In this way, user authentication/identification profiles may be established and used even without a username or other personal identifying information associated with the profile.
  • time analysis of logs may facilitate determining user names for DSI log entries for which a user name is not required by the server generating the DSI log. If activity associated with a DSI is logged by a website that requires a username login, and another site that doesn't require a username logs activity from the same DSI at nearly the same time, such as shortly before or after the website requiring login, it can be determined that for those particular sessions of activity, the visitor is likely to be the same.
  • the host server may analyze the usage related data to determine associations that may allow the formation of a user profile associated with the different DSIs.
  • FIG. 15 is a depiction of the methods and systems herein applied to embedded web objects for real-time audience tracking of super distributed content.
  • Software residing on website servers which allows embedded objects e.g. widgets, flash objects, videos, music, and the like
  • embedded objects e.g. widgets, flash objects, videos, music, and the like
  • This information may be sent to the embedded object's point of origination, the visited website's own point of origination, and/or one or more host servers 210 . This will aid in the process of attaining real-time audience ratings for music, video, and other interactive objects that are embedded across several websites (often known as super-distribution).
  • This method of audience gauging makes irrelevant which website the embedded object was accessed from or through what device it was accessed with because the viewer information can be collected without having to rely on a specific website. Additionally, using the methods and systems herein described, it is possible for embedded content, regardless of which website it is hosted on, to have audience ratings that do not rely upon statistics generated for or by the website on which the embedded content is hosted. Instead, the audience ratings may be obtained from user-specific authentication/identification profiles.
  • a plurality of users of mobile devices 202 may be in close proximity to a viewing or listening device 1502 (such as a screen, computer, radio, and the like) on which a website with embedded objects 1504 is being presented.
  • the DSI of the device 1502 and all proximate mobile devices 202 may be collected and delivered to a server 802 providing the web site content and the embedded objects 1504 .
  • the server 802 may collect DSI usage logs 1512 and forward the collected DSIs and usage logs 1512 to the host server 210 through the server-side software 808 .
  • the host server may package the collected usage data and relate it to each embedded object 1504 , perhaps along with demographic information of all collected DSIs (as may be determined from the user profiles corresponding to the collected DSIs by accessing the user profile data store 1402 ) to provide audience ratings 1508 for the embedded objects 1504 .
  • the determined audience ratings 1508 may also be sent to the embedded objects' 1504 originating server 1510 for correlation and further audience analysis.
  • the methods and systems may enable ensuring privacy of select user-specific profile/profile activity data via server-to-server data morphing and data exclusion.
  • the methods and systems herein may include the ability to morph or exclude specific parts of the user-specific authentication/identification profile or specific activity associated with a given profile for the purpose of making certain the real world identity associated with the given user-specific identification profile remains private. The result is a highly individualized profiling system that successfully leaves private, the real world identity of those being profiled.
  • both the protected individual and the public advertiser may benefit without creating a conflict between the private user and the targeted advertising provider.
  • a host server 210 passes information from a user-specific authentication/identification profile 1602 , select information, as determined by the purpose of the data exchange, (targeted advertising or content digital rights management, etc) such as name, address, credit card information, etc can be filtered out by a filtering module 1604 that, for example, finds common patterns in computer code.
  • a filtering module 1604 that, for example, finds common patterns in computer code.
  • data fields containing variations of the form “Name” indicating the next field of user-inputted information to be user's real world name
  • Credit Card and the like can be searched via pre-designed algorithms so such information does NOT pass coherently from the host server 210 to another server, such as a third party advertiser 1608 or service provider 1610 .
  • a server 802 may pass DSI based usage logs through a privacy filter 1612 (that may be embodied as a portion of server-side software 808 ) to ensure information deemed private or protection-worthy by the server 802 , or as specified as such by the user is not delivered to the host server 210 . Filtering techniques may be applied throughout the transfer of DSI based information before and after the formation of a user profile.
  • a mobile device-specific identification such as a DSI
  • another nearby device such as another mobile device or an internet connected device
  • the mobile device-specific identification may be used to secure content that is presented (e.g. displayed, stored, played, and the like) on the other device.
  • the mobile DSI may be used to secure content presented on another device
  • Examples wherein the mobile DSI may be used to secure content presented on another device include authentication for digital rights management and content sharing.
  • An example of content sharing may include playing music, movies, shows, and the like authenticated by a mobile device DSI, such as a mobile phone, while the phone is in proximity to the sharing device—but only while the phone is in proximity. When the phone is no longer in proximity, the content sharing device may be denied access to present the authenticated content.
  • Digital rights/authentication could be associated with the authentication/identification profile corresponding to the mobile phone DSI. This authentication/identification profile may also be used for targeted advertising. However digital rights management data that is transferred to third parties may include an interface that is more transparent of the specific individual, such as by keeping other data (e.g. surfing habits) out of view or filtered from the third party.
  • content authentication may include tagging a representation of the authenticated mobile DSI onto the protected content/service prior to distributing the protected content/service to a device which is providing the sharing or presentation capability.
  • client-side software associated with the sharing or presenting device may ensure that the authenticated DSI mobile device remains in proximity to the sharing device. When such proximity is no longer detected, the tagged content may be invalidated, deleted, or otherwise blocked from access by the sharing/presenting device.
  • authentication protected streamed data 1702 such as text, data tables, embedded pictures, music, video and the like, can be tagged with the mobile DSI of the mobile handset 202 , providing a DSI authentication tagged content 1704 , so that only the authorized user, as determined by the mobile handset 202 that matches the mobile DSI stamped onto the content during stream or download, will be able to access the tagged content 1704 .
  • Tagging the protected content 1702 may prevent other users on wireless networks, or in the vicinity, from maliciously or accidentally intercepting the data in coherent form as it will be tagged with the authorized user's mobile DSI. Such tagging may render the content invalid for correct playback unless the authenticated user mobile device DSI is detected within proximity.
  • the tagged content may be incoherent to any device other than the device containing the authenticated DSI.
  • Tagging may be performed by the server 802 by communicating with an authentication entity 1710 , such as through the server-side software 808 .
  • the authentication entity 1710 may provide an authentication DSI 1708 that may be converted into a tag and combined with the protected content 1702 to provide tagged protected content 1704 .
  • protected content may be streamed to another device via short distance wireless communication (e.g., WiFi, Bluetooth, WUSB, or UWB) during which time playback software on the receiving device may temporarily play content as it is transmitted from the mobile handset to the receiving device.
  • the receiving device may then, such as using client-side software installed on the receiving device, upload a tag for the protected content (such as a tag that is or is associated with the DSI of the sending handset) for authentication on a host server.
  • a DSI of the receiving handset and a DSI of the sending handset may be used to manage rights of the users to play the content.
  • the authentication entity such as the DSI platform 100
  • the rightful distributor of the protection enabled content only information that is necessary for authentication may be submitted to the authentication entity.
  • Limiting the information sent to the authentication entity may restrict what the authentication entity knows about the user's digital rights.
  • authentication deal terms are solely on a transaction percentage/fixed fee basis. Therefore, information transferred to an authentication entity may only include financial transaction information related to the authentication entities fee structure. As such, each time a transaction takes place in which the authentication entity is entitled to a fee, the authentication entity would be notified only of that specific information which allows the authentication entity to determine and verify the revenue owed to the authentication entity.
  • the authentication entity has a financial institution as a partner website.
  • the authentication company and the financial institution will work out a deal such that for each user that the financial institution wishes to authenticate to access their account information, the authentication company will charge 10 cents annually.
  • the authentication company would receive data pertaining to each time a user account is created and each time one is deleted. No other information would flow from the financial institution to the authentication entity.
  • the authentication entity has a completely non-financial deal with an online site that provides content to registered users (e.g. a social networking site, an online version of a newspaper that charges for subscription, a pure-online newspaper, a content provider to registered users, and the like).
  • the authentication entity may receive user information, such as the user's real name and identity or a user identity determined from a mobile DSI associated with the authentication request.
  • the information might include entertainment interests, demographic information, and the like.
  • the selected user information can be used in a multitude of ways and can be a set of market data, the value of which could be further enhanced through operational combinations using processes described herein.
  • Mobile DSI-enabled personal online account digital rights management may be associated with the methods and systems herein described.
  • Users may be allowed, on their own discretion, to limit access to an online facility, such as certain personal online accounts (e.g. email, social network, bank, brokerage, etc.) so that those accounts may only be accessed if a mobile handset, which users assign at their own discretion, is nearby the device through which access is attempted to one of the personal accounts.
  • Users may identify specific DSIs or specific users that may be associated with a mobile handset DSI.
  • the specified users or DSIs may be maintained by an authentication entity so that requests to access to a DSI protected account may be authenticated based on proximity of one or more user specified mobile handsets to the device through which the request to access the online facility is made.
  • An authentication response may be provided from authentication functionality embodied in the authentication entity, or in an entity associated with the DSI protected account. Based on the response, access to the online facility may be allowed or denied. In addition, the user may specify DSIs that must not be in proximity to the requesting device to enable authenticated access to the account.
  • the methods and systems herein may allow users, on their own discretion, to limit access to certain personal content (e.g. documents, pictures, video, and the like) accessible through an online facility so that the protected personal content, wherever it resides (e.g. an online social network, online photo album, online video server) may only be accessed by a user as assigned by the personal content publisher/owner.
  • personal content e.g. documents, pictures, video, and the like
  • Mary allows her mom and her brother to view online photo album X while allowing her brother to access online photo album X and online video Y.
  • Mary's mother and brother seek access to online photo album X, they are granted access when one or more of the mobile DSIs associated with Mary's mother or brother are in proximity to the device requesting access.
  • DSI authentication methods may include an authentication server, an authentication, tagging of protected content, and the like.
  • Authentication may include matching the DSIs of devices in proximity to a list of authorized users by determining a user associated with each DSI to be matched. The matching may be performed by an authentication entity.
  • the server-side software may receive a list of authorized DSIs (such as from an authentication entity) and may perform the matching.
  • Personal authentication services may be offered to individuals for a fee, may be provided as part of a DSI based digital rights management protection package, or may be provided free of charge to individuals. Alternatively, content providers or servers may pay a fee to use DSI-based authentication services.
  • DSI-based user identification and profiling may allow layered viewer-specific advertising.
  • Layered user-specific television, radio, and/or internet advertising support another layer of advertising within an existing advertising space. This may be embodied as multiple configurable or selectable images essentially in a stack that is selectable by the user or by display device software based DSIs of devices that are in proximity to the display device.
  • Layered user-specific advertising may include the ability to split up each advertisement frame among multiple ads or among various categories of ads so that a reconstituted advertisement based on the user-specific identification/ authentication profiles of the viewers who are in front of the display device (or audio device) can be presented to the user(s). Layering may enable various portions of an advertisement to be customized and targeted to the viewers local to a presentation device.
  • Layered user-specific advertisements may also include a concept of a blanket advertisement that is targeted using general demographics based on the user profiles determined from the DSIs in viewing proximity.
  • the blanket advertisement may be replaceable by the presentation device by an advertisement that is targeted to specific viewers.
  • two families viewing the same television program through two different set-top boxes may see different advertisements.
  • One family may have viewers with no mobile devices in proximity to the set-top box (or with devices providing DSIs that have no determinable association to targeted advertising) so that family may view the blanket advertisement.
  • the other family may include viewers who are carrying mobile devices that present DSIs that can be determined to satisfy a requirement for a targeted advertisement. This family may not be presented the blanket commercial. Instead the set-top box (or server connected to the set-top box) may present a targeted advertisement in place of the blanket advertisement. While this concept supports layering of entire advertisements, it also extends to layering portions of an advertisement.
  • An advertisement may be composed of layers, frames, regions, elements, primitives, and the like that may be customizable through a targeting process. One or more of these layered portions of an advertisement may be customized with targeted content based on the determined viewers of the advertisement.
  • a sporting goods store advertisement may allow targeting various individuals by allowing products included in the advertisement to be user specific. While a base of the advertisement may be common to all presentations of the advertisement, a viewer with a usage profile that indicates the user has an interest in golf may be presented with golf product promotions, whereas a viewer determined to have an interest or have expressed an interest in basketball may be presented with basketball related product promotions within the advertisement, such as during the same advertisement on the same internet-enabled device such as a television connected to an internet-enabled set-top box.
  • an advertisement for a sports drink may include images of a person active in a sport who needs a sport drink to be refreshed.
  • the sport images may be targeted to one of the viewers, and the sport drink may be targeted to another of the viewers, thereby presenting an advertisement with relevance to both viewers.
  • FIGS. 18 and 19 depict layered user-specific advertisements.
  • FIG. 18 depicts a single determined viewer receiving targeted layered advertising.
  • a host server 1802 may determine information about the viewer by accessing the corresponding user-specific authentication/identification profile and usage data 1804 . From the profile data 1804 and other information from the device such as location information 1808 (which may be derived from GPS receiver/cellular/radio wave triangulation certain advertisement targeting criteria may be established, such as age assumptions 1810 , social network affiliations 1812 , and search activity 1814 .
  • location information 1808 which may be derived from GPS receiver/cellular/radio wave triangulation
  • certain advertisement targeting criteria may be established, such as age assumptions 1810 , social network affiliations 1812 , and search activity 1814 .
  • the embodiments are exemplary of some categories of information. The categories of information or where that information is from, or how it is categorized is not bounded or limited by these examples.
  • the advertisement targeting criteria may influence what information is presented in the layered portions of the advertisement 1818 .
  • the advertisement 1818 may reflect a composition as determined by the internet-enabled device and the various media formats it may receive (e.g. the set-top may receive video, images, audio; the radio may receive audio; the outdoor LCD may receive video, images and the like . . . )
  • the layered objects may represent the finished, delivered components of the advertisement 1818 as determined by the various targeting mechanisms described here such as by passing targeting information through the internet to the display or audio device 1820 on which the targeted advertisement 1818 is to be presented.
  • age assumptions 1810 may be used to determine the main advertisement 1822 to be presented.
  • Age assumptions 1810 and current location 1808 may determine which local establishment 1824 to present, and current location 1808 combined with search activity 1814 may determine which product or service 1828 associated with the local establishment 1824 to present.
  • FIG. 19 depicts targeting layered advertisements based on more than one viewer.
  • age assumptions 1810 and 1910 from the different viewers contribute to determining the main advertisement 1922 to be presented.
  • Social networking 1812 from a first viewer may determine which local establishment 1924 to present, and search activity 1814 if the first viewer may be combined with social networking 1912 of the second viewer to determine which product or service 1928 associated with the local establishment 1924 to present.
  • FIG. 20 depicts a targeted advertising scenario in which portions of content, such as a movie, television show, video, or other non-advertisement specific content may support creating dynamic embedded content advertising.
  • Product placement in movie production is a high value market that can be significantly enhanced through targeting the product placement.
  • specific items within the content being viewed such as a soda bottle, a store sign may be dynamic and may be configurable to suit the viewer-specific audience as determined by the viewer's corresponding user-specific authentication/identification profiles derived from the viewer's DSI-based identity.
  • three gentlemen walk into a restaurant.
  • the storefront of the restaurant may change to reflect an actual local restaurant nearby the physical location of the viewers.
  • This may further allow for interactivity that allows the viewer(s) to reference this actual local restaurant's current menus to proceed towards a transaction for a delivery of food, a reservation for a meal, and the like.
  • a character is drinking for a soda bottle. If the viewer has a demonstrated interest in drinks other than soda, the soda bottle may change to be a branded water bottle, a protein-drink, and the like.
  • age assumptions 1820 and 1910 of the two viewers may identify a portion 2002 of the content in which the product placement may occur.
  • a first product placement 2004 may be determined based on the first user age assumptions 1810 and online social networking 1812 .
  • a second product placement 2008 may be determined based on a second user's social networking 1912 and search activity 1914 .
  • the mobile device providing the DSI may be used as an interactive controller, such as a remote control or user input device to interact with the user-specific targeted advertisements.
  • Data inputted by the viewers may be anticipated using predictive algorithms that may take into consideration the user-specific authentication/identification profile that may be retrieved once the mobile DSI is extracted.
  • the range of interactivity may be based on aspects of the user-specific authentication/identification profile corresponding to the extracted mobile DSI.
  • Advertising interactivity may allow a viewer to respond to a television, electronic multimedia display, radio advertisement, and the like via inputting information into the mobile handset which is then wirelessly transmitted to the device controlling the presentation of the advertisement.
  • Another way of connecting the user inputted responses to the interactive advertisement is by interfacing the mobile handset to the device controlling the interactive advertisement through a network such as a cellular network and the Internet.
  • Example use of a mobile handset interacting with an interactive targeted advertisement may include book marking advertisements, referring advertisements to friends, responding to interactive games, polls, chat services, and the like.
  • the storefront of the restaurant may change to reflect an actual local restaurant nearby the physical location of the viewers. This may further allow for interactivity which allows the viewer(s) to reference this actual local restaurant's current menus to proceed towards a transaction for a delivery of food, a reservation for a meal, etc
  • User actions may be predicted based on a combination of the presented targeted content, such as an advertisement and aspects of the user-specific authentication/identification profile.
  • usage data associated with a viewer may indicate that the viewer may be likely to forward relevant content to one or more members of his social network. Based on this usage data and based on the content of the targeted advertisement, a list of likely recipients of the content may be prepared so that the viewer may easily interact through the mobile handset to forward the content to the likely recipients. The list of likely recipients may be based on usage data - such as based on frequency of including one or more recipients in prior forwarded advertisements. The list may be based on an association of aspects of the targeted content to user-specific profiles of users in the viewer's online social network. Many other associations are possible in determining what type of interaction may be predicted for the viewer of targeted advertising.
  • FIG. 21 depicts a mobile handset 202 interacting with an interactive targeted advertisement 2112 by wirelessly transmitting a command 2110 to an internet connected device that may control the presentation of the interactive targeted advertisement 2112 .
  • the interactive targeted advertisement 2112 may include interactive portions 2102 and 2104 that maybe configured to present predicted interactions as described herein.
  • the interactive targeted advertisement 2112 may also include one or more interactive portions 2108 that may not be predicted interactions. Alternatively portions 2108 may be based on aspects of the user profile 1804 and may not be interactive.
  • FIG. 22 depicts an internet connected computer 2202 that may receive and present advertisements that are interactive targeted, layered, embedded or a combination of these and the like for a viewer determined on the proximity of mobile handset 202 .
  • FIG. 23 depicts an internet connected electronic multimedia display 2302 , such as an outdoor display, a window display, a display at a supermarket checkout, a point of sale display, a kiosk (e.g. in an airport), a display in an airplane, a display in a taxi or public transportation, and the like.
  • the interactive electronic multimedia display 2302 may support interactive targeted advertising, gaming, shopping, social networking, and the like.
  • the predictive interactions presented on the electronic multimedia display 2302 may provide opportunities to engage the viewer on a temporary basis, such as when the viewer passes by a store display window, or when the viewer is riding in a taxi, and the like.
  • FIG. 24 depicts flexible electronic presentation media 2402 (flexible active-matrix display modules for ‘take anywhere, read anywhere’ electronic reading), such as products available from Plastic Logic Limited connected to the internet and interacting with a mobile handset 202 .
  • the flexible electronic presentation media 2402 may be a handheld, portable replacement for the internet connected electronic multimedia display 2302 depicted in FIG. 23 .
  • the flexible electronic presentation media 2402 may not include an independent internet connection connected directly to the device 2402 or the device 2402 may use an existing nearby internet connection, such as a WiMax or other cellular Internet connection that is available through the mobile handset 202 .
  • the relaying of the Internet connection from a nearby internet-connected device such as the mobile handset may be facilitated through short distance wireless communication (such as WiFi, Bluetooth, WUSB, UWB, and the like) between the device 2402 and the nearby internet-connected device such as the mobile handset.
  • short distance wireless communication such as WiFi, Bluetooth, WUSB, UWB, and the like
  • the content, such as targeted advertisements, presented by the flexible electronic presentation media 2402 may be transmitted from a host 1802 through the internet to the mobile handset 202 and to the media 2402 .
  • the features and characteristics described herein that may be associated with more than one mobile handset being detected within a viewing proximity of a device, such as the flexible electronic presentation media 2402 may be applied to the embodiment of FIG. 24 .
  • the presentation devices depicted in FIGS. 21-24 may alternatively be audio only playback devices, such as an internet connected radio, digital music player, and the like. Audio content, including audio advertisements may be targeted to be played for a listener within listening range of the device much like advertisements may be targeted to a viewer in appropriate proximity to the presentation devices of FIGS. 21-24 . An appropriate proximity may partially be determined by the content being displayed to the presentation device which may further be determined by the capabilities of the internet-enabled device. Interactive targeted audio advertisements may be played and interacted with through the user's mobile handset by providing interactive signals such as an announcement to press a button on the handset.
  • FIG. 25 depicts a timeline of internet interactions or usage that maybe associated with a user so that the cumulative user interaction experience may be applied to targeted advertising and other services through the timeline.
  • interactions occurring at time 2504 may impact advertising targeting, interaction prediction and the like at times 2508 , 2510 , and 2512 .
  • FIG. 25 a user engages various Internet-connected devices throughout several periods.
  • the cumulative and real-time nature of the user-specific authentication/identification profiles allows advertisements sent to the user via different platforms to reflect all of the user's past recognized Internet usage activities.
  • FIG. 25 depicts how a time-sensitive, device-agnostic internet protocol-based reactive relaying advertising platform may operate.
  • the platform may operate so that while a user is watching content on a television, if the user also demonstrates interest in a particular product or product category of a DSI tracking enabled website (e.g. prior to or simultaneously with watching content on a television, an advertisement could be delivered on the television in immediate response to his Internet usage activity.
  • the user may receive an advertisement that is derived from information from his Internet usage on his mobile device, such as a website that the user is currently visiting.
  • a user engages a PC 2502 with the Internet.
  • the user engages a television 2518 with an internet-connected set-top box 2514 .
  • Advertisement targeting provided at time 2508 may include usage from time 2504 .
  • a user engages his mobile handset 202 and targeted advertising assumes usage from times 2504 and 2508 .
  • a user's mobile handset's DSI is wirelessly extracted by an Internet-connected Electronic Display 2520 .
  • Targeted ads sent to user at time 2512 may include usage from times 2504 , 2508 , and 2510 . This may be accomplished by host server 210 updating user-specific authentication/id profiles in real-time, such as after every recognized Internet engagement.
  • a user of a mobile handset 202 may initiate contact information exchange with another individual with a mobile handset 2602 who is located in close proximity to the user. After verifying that the individual wishes to exchange contact information, the two mobile handsets 202 and 2602 may exchange contact information via the short range wireless connection.
  • an initiator 202 my request a receiver 2602 to accept the initiator's contact information.
  • the initiator 202 may request the receiver 2602 to send the initiator 202 the receiver's contact information.
  • the initiator 202 may request the receiver 2602 to mutually swap contact information.
  • Automatic exchange of contact information in the physical person, as described above and in FIG. 26 may be supplemented by uploading the contact information 2604 to a DSI-based authentication required online social networking platform 2608 .
  • the online social networking platform 2602 may not require DSI-based authentication.
  • John meets Sarah at a company sponsored networking event and they exchange contact information. John immediately categorizes Sarah under a “coworkers” group. The next time Sarah signs on to her social network, she will see exactly what John's other contacts under his coworkers group sees, or what he wishes her to see specifically.
  • a first step may include one of John requesting Sarah for her contact information, John accepting Sarah's request to receiver her contact information, or John and Sarah both accepting a mutual swap of contact information.
  • a second step involves John categorizing Sarah under a pre-made group of coworkers thereby assigning her accessibility rights to his social networking profile.
  • FIG. 27 shows methods and systems for automatic mobile contact information exchange and synchronization with a social network.
  • a user receives a request for contact information from another user within close physical proximity.
  • a sending handset's DSI may be included in the data packet with the request for contact information exchange.
  • the receiving mobile user may approve the contact information exchange, in which case the recipient handset DSI may be included in the return data packet.
  • a social networking profile may be linked to each mobile handset and may be updated to reflect the contact information exchange.
  • a method and system of mobile-aware, automatic, mobile social networking may alert a user of individuals who fall into one or more pre-defined social network categories or groups who are in proximity to the user.
  • Short distance wireless communications e.g. WiFi, Bluetooth, WUSB, or UWB
  • GPS/cellular/radio wave triangulation data may be combined with DSI-based authentication/identification to identify a distance between a user and individuals of potential interest and thereby alert a user accordingly.
  • a user who wishes to meet someone of a given background, similar hobbies or interest, or any other pre-defined category can be alerted once he is within a pre-defined physical proximity of such persons, if such persons allow it.
  • a handset may emit a mobile DSI via a short-distance protocol.
  • mobile handset within range may accept a mobile DSI of a nearby handset.
  • a common social network may check the in-proximity DSIs to determine whether there are matching interests of the handset users and notify the users.
  • the users may interact, either using the handsets or in a live, in-person interaction.
  • Alerting a user to the presence of a mobile handset user meeting one or more classifications, categorizations, or interest pools may be determined through a DSI based authentication process.
  • software executing on a recipient mobile handset that receives a DSI from another mobile handset seeking to be alerted may run a check to see if the user of the seeking mobile handset is of any interest to the recipient. If so, the recipient may acknowledge the DSI by exchanging information such as messages, pictures, current GPS/cellular/radio wave triangulated location, and the like.
  • a handset may emit a DSI at a step 2902 , along with a limited social networking profile.
  • a recipient handset may accept the mobile DSI and receive the limited profile.
  • social networking software on the mobile handset may determine whether there is a match between the profile of the first mobile handset and a profile associated with the recipient handset, in which case both users may be notified.
  • users may interact.
  • social networking management software on a given mobile handset may monitor a GPS/cellular/radio wave triangulated location of surrounding mobile DSI-enabled handsets.
  • the DSI of each of the surrounding mobile handsets and its corresponding social networking profile may be analyzed to determine aspects of the users of the surrounding handsets, such as interest categories, to facilitate the user of the GPS/cellular/radio wave triangulation monitoring device determining if any of the surrounding users may be of particular interest. If so, contact exchange requests may be initiated between the two mobile handsets using the short distance wireless interface or through a network such as text messaging or mobile emails is conducted today.
  • Physical person social networking may be facilitated by software executing on a mobile handset that transmits a limited social networking profile associated with the user of the mobile handset so that it can be received by surrounding mobile handsets.
  • Software running on the surrounding mobile handsets may perform checks against categories, and the like as described above to determine if contact information exchange may be beneficial. If so, requests for contact exchange may be performed between proximate DSI-based mobile handsets as described in reference to FIG. 26 .
  • file-less (non-file based) content that is stamped with a mobile DSI may enable digital rights management for safe content streaming while prohibiting content transfers between mobile handsets or other computing devices.
  • Content to be downloaded to a mobile device may be tagged with signal that represents the mobile DSI of the device to which the download is directed.
  • the tagged content may be directly downloaded into a mobile handset and integrated with the software used to present (playback) the tagged content.
  • the mobile DSI tag representation may be integrated with the content's metadata (or data within the content which is used to describe the content, examples include content title, copyright information, production year, etc).
  • the downloaded tagged content may become an integral part of content that a user-specific authentication/identification profile may access. Because the content is integrated into an adapted playback application on the mobile handset, the tagged downloaded content cannot be moved to another device permanently.
  • some access to the tagged content may be provided by the adapted playback software but may include time limitations on access to the content by the receiving device.
  • the receiving or secondary device may upload the mobile DSI through the Internet onto an authentication server for the purposes of verifying if content playback is within the legal limits of its use.
  • downloaded protected content cannot be copied from the mobile device and moved somewhere else, but using content playback software the user may stream the content to a more desirable platform or nearby device 3302 , such as a nearby larger electronic display (such as a network-enabled television screen), a better audio system, or the like.
  • GPS location, cellular, radio wave triangulation, and other earth surface and near earth location detection techniques may facilitate managing, securing, and targeting content as herein described, and the like.
  • These device location techniques may allow, for example, presentation of targeted advertising on a first device based on a GPS location of a second device, even if the two devices are remote from one another. Therefore, device related information such as a DSI may be collected from a device that is not in range for short haul wireless communication with another device and still allow the DSI and associated user profile information to determine access to and/or targeting for content on the other device.
  • the detection of a user device at a specific GPS location, within a proximity to a GPS location, at one of a range of GPS locations, or when a user is not within a range of GPS locations (for example) may indicate that content may be presented on, delivered to, made accessible to, be stored on, and the like a different networked device.
  • a GPS enabled mobile device that is in proximity of a short haul wireless communication (ex: Bluetooth) with a display device, however the user has turned off Bluetooth communication in the device
  • the GPS location of the device could indicate that the user is in proximity to the display and targeted advertising may be presented on the display.
  • the GPS location is used as an alternate locating method.
  • Using GPS or other device locating methods facilitates devices on separate networks sharing information associated with or contributing to a user-specific authentication/identification profile.
  • a user may be carrying a GPS enabled mobile phone that is connected only to a cellular communication network.
  • An outdoor display may be connected to a proprietary advertising communication network.
  • the user device GPS information may be transmitted through the cellular network to a server or other network interconnecting facility to eventually reach a computing facility on the proprietary advertising communication network.
  • targeted advertising for example
  • a user GPS device enabled to provide DSI related information may only be connected to a GPS network.
  • the GPS location of the user device may be communicated from the GPS network as described above so that advertising or other content can be presented to the user.
  • a hiker may carry a GPS locating device that detects and transmits its GPS location over a GPS network.
  • the GPS location of the hiker being related to the GPS location of the kiosk may result in a map of the area with trails marked that the hiker has already hiked being displayed.
  • the user-specific authentication/identification profile associated with the GPS device is accessed and associated with a hiking history collected, perhaps automatically, from a GPS device associated with the user profile.
  • Such techniques may also be used for field sales so that sales people can gain access to information related to the location of their mobile device through its GPS location.
  • a sales visitation log may be accessed based on the user-specific authentication/identification profile that is associated with the GPS located device and indicate, perhaps by GPS location, key clients that have not been visited in the current quarter.
  • Device locating techniques such as GPS, cellular/radio signal triangulation, and the like, may be combined with other location information, such as street address to facilitate an association between a user-specific authentication/ identification profile and one or more devices.
  • GPS and other device physical location information, and other geospatial location information may be associated with, for example, DSI information to facilitate digital rights management, access to content, sharing of content, storing of content, targeting of content, developing a user-specific authentication/identification profile, associating devices to a user-specific authentication/identification profile, associating web surfing and other communication activity (e.g. email, texting, SMS, messaging) with a user history, and the like.
  • DSI information to facilitate digital rights management, access to content, sharing of content, storing of content, targeting of content, developing a user-specific authentication/identification profile, associating devices to a user-specific authentication/identification profile, associating web surfing and other communication activity (e.g. email, texting, SMS, messaging) with a user history, and the like.
  • a margin of error associated with a GPS position derived from GPS satellites is typically +/ ⁇ 50 feet.
  • Finer grained proximity data may be derived by examining network latency from one IP enabled device (e.g., mobile handset, laptop, and the like) to another IP enabled media device (e.g., set-top box/IP capable television, and the like). This data may be used to identify user behavior and proximity to IP enabled media devices.
  • a virtual map of a location can be assembled by examining the various latencies in a specific location. For example, network latency analysis may facilitate identifying loose physical boundaries of a location by collecting and analyzing the network latencies around a building or home.
  • This data may be used to facilitate associating detected activity that is associated with network devices (e.g. network activity, movement of a mobile device, dwell time at a fine grained position, and the like) with a user profile. This may further facilitate identifying behavioral traits of the user. . In an example, if a device is determined to be within 30 feet of a television, yet not in the detected “docking position for the device”, the television is turned on, and the content being viewed is consistent with the user's profile based behavior or preferences, it may be reasonable to determine that the user is watching television.
  • network devices e.g. network activity, movement of a mobile device, dwell time at a fine grained position, and the like
  • Network latency within a specific location can be determined to at least a few tenths of milliseconds.
  • the latency from a wireless laptop to a wireless router within a room is approximately 1.7 milliseconds (based on 64 byte packets).
  • the latency from the same laptop to the same wireless router in an adjoining room may be 1.9 milliseconds.
  • Network changes may be detected by examining historical latency data.
  • devices must be considered individually as network latencies can be characteristic of processing speeds of the device.
  • the DSI may facilitate device identification and therefore may further facilitate determining network latency associated with the device.
  • the CPU of a mobile handheld will typically process network traffic slower than a laptop CPU.
  • FIG. 34 depicts various embodiments of using the methods and systems described herein for geocoding newly created media.
  • the methods and systems described here of device specific identifier, short-haul wireless communication, proximity detection, content communication through a mobile device to a media device, and the like may be associated with automatic geocoding of media created by a media creation or collection device, such as a camera, audio recorder, content generation device, and the like.
  • a media creation or collection device such as a camera, audio recorder, content generation device, and the like.
  • GPS location, cellular triangulation, and other near earth location information determination technology and methods may be associated with the above described methods and geocoding.
  • a GPS enabled mobile device may be used in proximity to a media or content creation device as herein described and location related information determined in the mobile device may be associated with the created media or content.
  • At least the mobile device and the media creation device may be connected to a Personal Area Network (PAN) that may be a wireless short-haul network or a wired network of a combination thereof.
  • PAN Personal Area Network
  • the location information may be associated with the created content by transferring the location information from the mobile device to the media creation device contemporaneously with the creation of the media or content for geocoding the created media.
  • the created content may be transferred from the media creation device through the mobile device, taking advantage of the mobile device network connection (e.g. WiFi, and the like) and the transferred content may be geocoded with the device determined location.
  • the transferred geocoded content may be stored in a network accessible remote data store or database.
  • both the location information and the created content may be transferred to a network connected device through a short-haul wireless (or wired) connection to a network enabled device for geocoding and network communication of the newly created geocoded content, such as for storing the geocoded content in a network accessible, remote data store or database.
  • the newly created content may be transferred without a geocode over the PAN to a mobile device that supports GPS or other location determination methods.
  • Both the location information and the transferred created media may be individually sent to a common remote server by the mobile device via the mobile device's internet connection. Merging of the location information with the created media (to produce geocoded media) may be performed by the server or other networked processor.
  • Geocoded content that is produced using the methods described herein and other equivalent PAN-based approaches may be identified so that the initial geocoding and/or subsequent use or access to this geocoded content may facilitate collection of a royalty for the use of thereof.
  • a search engine delivers content geocoded as herein described
  • a royalty may be payable for presentation of the geocoded content to a user.
  • This and other royalty collection techniques associated with presentation of geocoded media are hereby included in the scope of the methods and systems of this specification.
  • a content provider may provide content that has been created using the geocoding methods and systems herein described.
  • the content may be owned by a third party.
  • the content provider may be required to pay a royalty to both the content owner and to the geocoding facilitator for the use of the content.
  • FIG. 35 depicts a real world wireless device identification dwell event in which wireless identification facilities, such as an RFID device (e.g. chip), WiFi device (e.g. chip) , other wireless components and the like are being used throughout consumer and business commerce for identification/categorization of physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store, and the like even when such aforementioned products, product categories, and environments are not readily visible or easily accessible.
  • wireless identification facilities such as an RFID device (e.g. chip), WiFi device (e.g. chip) , other wireless components and the like are being used throughout consumer and business commerce for identification/categorization of physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store, and the like even when such aforementioned products, product categories, and environments are not readily visible or easily accessible.
  • RFID device e.g. chip
  • WiFi device e.g. chip
  • the RFID/WiFi or other potential wireless identification/categorization-enabling signal of a product on display in a store front window may be detected by a mobile handset's embedded wireless components as a user of the mobile handset walks past the window at certain proximity ranges.
  • a measure of user interest in the given product may be estimated based on a measure of dwell time of the mobile handset remaining in certain proximities to the RFID/WiFi or other potential wireless identification/categorization-enabling signal.
  • a store front may have five products in a store window, each generating its own RFID/WiFi or other potential wireless identification/categorization-enabling signal.
  • the dwell time associated with each RFID/WiFi or other potential wireless identification/categorization-enabling signal that is detected by the user's mobile handset can be measured and captured, such as through the embedded wireless capabilities supported by the mobile handset of the user.
  • the measured dwell time associated with each RFID/WiFi or other potential wireless identification/categorization-enabling signal may be used to estimate a user's ‘real-world’ preferences, interests, and other behavioral aspects.
  • the raw data, and/or data derived from an analysis of the data may be associated with a user-specific authentication/identification profile that may be associated with the mobile handset, such as through the DSI of the mobile handset. Further, the user-specific authentication/identification profile may be associated with several other mobile and non-mobile devices and those devices' associated DSIs.
  • a dwell event When combined with location specific information, such as GPS coordinates of the mobile handset during the measured dwell time, it may be possible to associate a dwell event with a retailer or other provider of the product or feature that characterizes the dwell event. By associating this information together, it is possible to determine which physical retail store, physical product, services offered or marketed, product category or aisle in a retail store, and the like the user may be interested in.
  • a user may access the internet through a networked device, such as a set-top box, and may search for retailers in their area for a product. This information may be recorded or analyzed and data derived from the analysis of this internet access event may be associated with the user's authentication/identification profile.
  • the user may, before or after the internet access event, visit the retailer and shop for the product (a dwell event) associated with the internet access event.
  • Such actions may be determined by comparing the data aggregated from the RFID/WiFi or other potential wireless identification/categorization-enabling signal collected by the embedded wireless components of the mobile handset of the user with the given user's historical internet behavior which together, in turn, may be associated with the given user's user-specific authentication/identification profile.
  • the dwell event occurred within the location of the store
  • the user did acquire the item e.g. the dwell event started within the location of the store and continued outside the store, such as to the user's home or the dwell event was initiated within an aisle of the store and the given item's RFID/WiFi or other potential wireless identification/categorization-enabling signal was utilized to deem the given item as purchased within the store's POS [point-of-sales] area.
  • target content such as advertisements.
  • This targeting of content may be used when the user is consuming networked content such as video, audio, digital print, potentially through an Internet Protocol network. If it is determined that the user did not purchase the item at the retailer, information about the availability and price of the item at other local retailers or electronic, or online retailers may be delivered to the user's mobile handset. Alternatively, the user may receive an email, text message, or other electronic offer and the like with an invitation to purchase the item through the internet or alternative physical retail location (presumably at a cost lower than the most recent physical retailer from which the given item's RFID/WiFi or other potential wireless identification/categorization-enabling signal and associated item detail/pricing information was first received by the user's mobile handset's embedded wireless components and associated capabilities).
  • short distance wireless communication between a mobile handset and a wireless identifier representing physical goods, services, retail environments, etc. such as a RFID/WiFi or other potential wireless identification/categorization-enabling signals associated with physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store and the like (e.g. a UPC or other serialized identifier, and the like) may take place.
  • the mobile handset may upload the data specific to a RFID/WiFi or other potential wireless identification/categorization-enabling signals associated with physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store to a data store.
  • the signal-specific data may be matched to physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store, and the like and thus be used to facilitate the determining of ‘real world’ behavioral data of the mobile handset user.
  • This behavioral data can then be aggregated and further refined to be incorporated into a user-specific authentication/identification profile which may be associated with at least the DSI of the mobile handset which may further be tied to the DSI of several networked devices such as personal computers, televisions, audio devices, digital print devices, which in turn, may be connected to an electronic network such as an Internet Protocol network.
  • a device's MAC address which is a standard unique identification assigned to every WiFi/WiMax adapter and Ethernet card (fixed—for facilitating a wired broadband internet connection) as a basis for a device-specific identification (DSI) in a wireless protocol is one alternative combination.
  • a device's MAC address which is a standard unique identification assigned to every WiFi/WiMax adapter and Ethernet card (fixed—for facilitating a wired broadband internet connection)
  • DSI device-specific identification
  • another alternative may include the wireless protocol being based on Bluetooth, WUSB, UWB, and the like, instead of being based on WiFi/WiMax/Ethernet connection which may or may not require a different DSI.
  • the methods and systems disclosed herein identify and/or authenticate use of Internet-connected devices (mobile handsets - including cellular phones), PCs/laptops, television set-top boxes, Internet-connection capable televisions, and the like) using, primarily but not limited to, a variety of device-specific identification (DSI) types and techniques associated with various wireless protocols.
  • DSI device-specific identification
  • This objective may be associated with WiFi and WiMax (both of which may utilize MAC addresses), WUSB (Wireless USB), UWB (Ultra-wide Band), Bluetooth (e.g. Bluetooth 3.0), and other forms of device-specific identifiers.
  • Other forms of DSI may be derived from an identification not necessarily associated with a wireless protocol.
  • the methods and systems herein may facilitate building privacy-sensitive and device-specific user identification and/or authentication profiles.
  • the methods and systems may allow aggregation of various DSIs that belong to a number of different devices that may include any combination of devices (i.e. 1 mobile handset, 1 PC, 1 set-top box and 2 laptops OR 2 mobile handsets, 3 PCs, 1 laptop, 1 internet-connection capable television etc.) and may tie it to specific users WITHOUT necessarily revealing a given user's “real world” identity (e.g. to non-affiliated third parties).
  • a mobile handset's DSI is an example of a source of DSI used in the creation of identification/authentication profiles.
  • the mobile handset's DSI may be the primary or base DSI associated with the identification/authentication profile.
  • Other device DSIs may become associated with a profile based on usage from those devices being associated with the usernames/surfing habits associated with the mobile handset's DSI.
  • the methods and systems herein provide mechanisms that may transparently monitor the flow of device-specific or profile-specific information, such as a user-profile, while enabling a user's “real world” identity to be scrambled or encrypted (herein referred to as morphed) such that providers or facilitators who have access to the communications within the process would be not be capable of deriving the user's real world identity.
  • morphed Such morphing of real world identities may occur by creating unique algorithms that scramble a DSI or username-specific profile as the information associated with that profile is transferred from a partner's server (a partner may include but is not limited to internet search and content companies such as Google, MySpace, internet email sites such gmail.com or mail.yahoo.com, retail websites such as Amazon.com, and the like.)
  • Targeted advertising may include delivering targeted advertising across various media forms including but not limited to internet websites, television, internet television, outdoor advertising, mobile handset advertising, portable LCD-advertising, Internet radio, and the like. Mechanisms for delivering targeted advertisements across each media form may vary but may benefit from the core concepts of the methods and systems herein.
  • the methods and systems herein may facilitate creating content authentication and management systems or digital rights management systems using a mobile DSI, such as authenticating and managing access rights to and management of content (e.g. free content or content provided for a fee) and Internet software-as-a-service information content such as Lexis Nexus, Gartner, IDC, digital textbooks, and other digital media/digital information providers that grant conditional access (for payment, or otherwise).
  • a mobile DSI such as authenticating and managing access rights to and management of content (e.g. free content or content provided for a fee) and Internet software-as-a-service information content such as Lexis Nexus, Gartner, IDC, digital textbooks, and other digital media/digital information providers that grant conditional access (for payment, or otherwise).
  • a mobile DSI may provide a higher level of accuracy and flexibility than using a system in which access to content is tied to a particular PC/laptop, set-top box, and the like.
  • the latter is a system that is commonly used in many current digital rights management schemes.
  • a user may essentially carry all of his online digital rights with him as it is rooted in a DSI from his mobile handset.
  • content may be exchanged with the user's mobile handset through other devices, (e.g.
  • the mobile handset DSI provides the means for authentication—independent of any other device in the content transfer chain. This is beneficial in that the other device(s) in the content transfer chain may have multiple users, may not be secure, may not support digital rights management and most importantly may be stationary in its location and thus not allowing the authenticated user to carry his digital rights with him. Make the comparison to a DVD? You bought it so you can take it with you. Not being able to do that for digital content is a step backwards, not forward.
  • a user attempts to access a Mobile DSI-protected online account through a PC/laptop, or other internet-connected device
  • short distance communication would take place between the user's mobile handset and the internet-connected device at which point the user's mobile DSI would be passed to internet servers for authentication.
  • the server at which the protected account exists may then attempt to match an entered username/password combination against a pre-registered mobile DSI.
  • the username/password may be collected at the time a user's account is registered or at the time of an update/replacement of a mobile DSI for the user's account). If the username/password combination matches up with the mobile DSI, then the user will be granted access to the mobile DSI-protected account. If the mobile DSI does not match the username/password of the account, the user will not be granted access.
  • Standard mechanisms for lost passwords or for resetting a password may also be applied, such as the use of pre-registered secret password questions.
  • Mobile handsets provide a variety of device-specific identification types on which a DSI may be based.
  • a mobile handset that is WiFi or WiMax enabled will have a MAC address, this MAC address may serve as a DSI.
  • a mobile handset that is Bluetooth-enabled will have a Bluetooth Device Address. This Bluetooth Device Address may serve as a DSI.
  • a unique identification, potentially a serial code that identifies a mobile handset's central processing unit (CPU) may serve as a DSI.
  • a unique identification, potentially a serial code, that identifies a mobile handset's WUSB (wireless USB) or UWB (Ultra Wide-band) chipset may serve as a DSI.
  • a mobile telephone number that is used to dial a voice connection or send a TXT message to a mobile handset may serve as a DSI.
  • GSM phones use the International Mobile Equipment Identity or IMEI that may serve as a DSI.
  • CDMA phones use Mobile Equipment Identifiers or MEIDs that may serve as a DSI.
  • MEIDs Mobile Equipment Identifiers
  • Other similar device-specific identifications that are unique to a single physical mobile handset may serve as a mobile DSI.
  • PC/laptops When connected wired or wirelessly, PC/laptops may contribute device-specific information that may be used as a basis for a DSI.
  • a PC/laptop that has a fixed wired connection via an Ethernet card will have a MAC address, this MAC address may serve as a DSI.
  • a PC/laptop that is WiFi or WiMax enabled will have a MAC address, this MAC address may serve as a DSI.
  • a PC/laptop that is Bluetooth-enabled will have a Bluetooth Device Address. This Bluetooth Device Address may serve as a DSI.
  • a unique identification, potentially a serial code, which identifies a PC/laptop's central processing unit (CPU) may serve as a DSI.
  • a unique identification, potentially a serial code, which identifies a PC/laptop's WUSB (wireless USB) or UWB (Ultra Wide-band) connection may serve as a DSI.
  • consumer electronic devices that can be connected to an electronic network such as the Internet may also have DSI. If the consumer electronic device is capable of accessing an electronic network such as the Internet, it may do so using a wired Ethernet connection using a Ethernet card, or a wireless connection using a WiFi/WiMax connection, in both such scenarios, the device should have a MAC address that will be used as its DSI>. Examples of such consumer electronic devices capable of being connected to an electronic network include Television set-top boxes, Televisions, LCDs fixated outdoors, within retail stores, taxi cabs, other public transportation, Radio devices that are Internet-enabled, car radio devices that are Internet-enabled, and the like. These other consumer electronic devices may use many of the same or similar DSIs as mentioned above for mobile handsets or PCs/laptops including the MAC address as a DSI if it's available.
  • IPv4 and v6 may require unique treatment.
  • IPv4 Internet Protocol version 4, or IPv4
  • IPv6 IP Address of a given device is 32 bits long and is assigned without embedding the device's unique, permanent, MAC-address.
  • IPv6 IP address of a device is intended to be embedded into a device's IP Address.
  • IPv6 addresses Public sources of information regarding the difference of the IPv6 address and its relevance to MAC-addresses describe IPv6 addresses as typically composed of two logical parts: a 64-bit sub-network prefix, and a 64-bit host part, which is either automatically generated from the interface's MAC address or assigned sequentially. Because the globally unique MAC addresses offer an opportunity to track user equipment, and so users, across time and TPv6 address changes, RFC 3041 (http://tools.ietforg/html/rfc 3041 ) was developed to reduce the prospect of user identity being permanently tied to an TPv6 address, thus restoring some of the possibilities of anonymity existing at IPv4. RFC 3041 (http://tools.ietforg/html/rfc 3041 ) specifies a mechanism by which time-varying random bit strings can be used as interface circuit identifiers, replacing unchanging and traceable MAC addresses
  • IPv6 the possibility arises, that since the IP address includes the MAC address, that the IP address may become an easier and quicker way to derive a device-specific identification.
  • the methods and systems herein support methodologies using IPv6 and IPv4.
  • IPv6 IP Address or a MAC-address suited for IPv6 may facilitate determining and using a DSI. It is anticipated that while IPv4 is the popular standard today, a transition to IPv6 is imminent.
  • Targeted television advertising may be associated with personal devices, such as through mobile DSI-enabled identification or with mobile device internet browser cache/history content. Advertisement targeting may be improved through the use of mobile DSI device detection within proximity of a front of a television.
  • Mobile DSI as herein described, may uniquely identify an individual through an association of a user profile with the Mobile DSI. By detecting a mobile device (through Mobile DSI detection) that is positioned within viewing distance of a television and identifying advertisements targeted to the user of the detected mobile device, the targeted advertisement may be presented to the television, or a set-top box controlling the television, and displayed for the user. The advertisement may be targeted based on a variety of factors associated with the mobile DSI including a user profile associated with the mobile DSI.
  • Advertisements may be targeted to and presented to a user based on the user's mobile DSI through a process that includes: gathering the device identifier or device-specific identification (DSI) from the user's mobile device, associating the gathered DSI with a user identity to provide a usage profile that may include usage tracking of content interaction through the mobile device and other internet enabled devices, using the usage profile to identify an advertisement or offer, determining which screen provides a good proximity to the user based on the relative distance of the user's mobile DSI device from a screen, and displaying the advertisement or offer on the screen.
  • DSI device-specific identification
  • PC and/or laptops can have wired connections, whereas for mobile devices this is typically not the case.
  • referring to a wire connected PC/laptop MAC address is the equivalent of a wireless PC/Laptop/Mobile Handset's WiFi MAC address.
  • DSIs device-specific identifications, including those which are associated with wired or wireless technologies, are collectively referred to as DSIs.
  • the methods or processes described above, and steps thereof, may be realized in hardware, software, or any combination of these suitable for a particular application.
  • the hardware may include a general-purpose computer and/or dedicated computing device.
  • the processes may be realized in one or more microprocessors, microcontrollers, embedded microcontrollers, programmable digital signal processors or other programmable device, along with internal and/or external memory.
  • the processes may also, or instead, be embodied in an application specific integrated circuit, a programmable gate array, programmable array logic, or any other device or combination of devices that may be configured to process electronic signals.
  • one or more of the processes may be realized as computer executable code created using a structured programming language such as C, an object oriented programming language such as C++, or any other high-level or low-level programming language (including assembly languages, hardware description languages, and database programming languages and technologies) that may be stored, compiled or interpreted to run on one of the above devices, as well as heterogeneous combinations of processors, processor architectures, or combinations of different hardware and software.
  • a structured programming language such as C
  • an object oriented programming language such as C++
  • any other high-level or low-level programming language including assembly languages, hardware description languages, and database programming languages and technologies
  • each method described above and combinations thereof may be embodied in computer executable code that, when executing on one or more computing devices, performs the steps thereof.
  • the methods may be embodied in systems that perform the steps thereof, and may be distributed across devices in a number of ways, or all of the functionality may be integrated into a dedicated, standalone device or other hardware.
  • means for performing the steps associated with the processes described above may include any of the hardware and/or software described above. All such permutations and combinations are intended to fall within the scope of the present disclosure.

Abstract

Methods and systems are disclosed herein for determining real world behavior from proximity-time measurements of a user carrying a personal device and a wireless device identifier. Determining real world behavior and managing usage profiles associated with the real world behavior can be enhanced by the use of GPS location data derived from the personal device, another network enabled device, a wireless device identifier, and the like.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of the following U.S. Provisional Applications, each of which is hereby incorporated by reference in its entirety: U.S. Prov. App. No. 61/022,483 filed on Jan. 21, 2008 and U.S. Prov. App. No. 61/030,214 filed on Feb. 20, 2008.
  • This application is a continuation-in-part of the following U.S. Applications, each of which is hereby incorporated by reference in its entirety: U.S. application Ser. No. 11/855,122 filed Sep. 13, 2007 which claims the benefit of U.S. Prov. App. No. 60/825,708 filed Sep. 14, 2006; U.S. application Ser. No. 11/855,685 filed Sep. 14, 2007; U.S. application Ser. No. 11/855,811 filed Sep. 14, 2007; U.S. application Ser. No. 11/855,820 filed Sep. 14, 2007; and U.S. application Ser. No. 11/925,967 filed Oct. 28, 2007.
  • This application claims priority to international patent application Ser. No. PCT/US07/78519 filed Sep. 14, 2007.
  • BACKGROUND
  • 1. Field
  • This application relates to wireless communication and more specifically to mobile device identification and authentication for access to and presentation of targeted content.
  • 2. Description of the Related Art
  • Methods and systems exist for targeting content, including advertising content, directed to users of network-connected devices, such as televisions, mobile handsets, computers, radios, advertising screens and the like. Such content-targeting methods face various challenges, depending on the users and devices to which content is targeted. For example, television and radio advertisements are often directed to a mass audience, with little information about specific users. Internet advertisements targeting a user may be based on data stored on a user's network-connected device that corresponds to sets of information that indicate that a user is returning to a particular site, but targeting based on this and similar mechanisms are subject to limitations, among them being that multiple users may access the Internet through the same device. Mobile content may be targeted more easily to a specific user, such as based on information about the user in a database maintained by a wireless carrier or based on the user's interaction with content on the mobile handset, but the more limited range of content that is typically accessed by mobile devices means that profiles based on that usage are often targeting limited and sometimes misleading. Accordingly, a need exists for better methods of gathering user-specific profile information across all types of network-enabled devices and as well as targeting content to users of all types of network-connected devices.
  • SUMMARY
  • Methods and systems are disclosed herein for delivering content, including advertising content, to various network-connected devices. In various embodiments disclosed herein, methods and systems take advantage of capabilities and information available in various networking domains to deliver more targeted content to each of those domains, including using the collective capabilities and information derived from multiple domains to deliver content to each domain.
  • One embodiment of the methods and systems disclosed herein relates to television content and advertising. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target television content, including advertisements, to the user. The network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, but during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as behavioral targeting, hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the television of the user. In some embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless connection between a mobile handset and another network-enabled device, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device. Thus, a user's proximity to a television screen can be determined by using a short-distance wireless protocol to access the MAC address, or other mobile device-specific identifier (DSI) of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) view on the television screen, such as for ratings purposes, managing (including with digital rights management techniques) the content the user is allowed to view on the screen (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the screen), and targeting the content directed to the user on the screen, including advertising, for which a user-specific profile which includes the activities performed on a multitude of network-connected devices may be referenced. Thus, the methods and systems disclosed herein allow for user-specific control of content delivered to the screen the user is watching, based on proximity of the user's (or set of users') mobile handset(s) to the screen.
  • Another embodiment of the methods and systems disclosed herein relates to radio advertising. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target audio content, including advertisements, to the user. As in other embodiments, the network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, but during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as behavioral targeting, hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the audio-enabled devices, such as Internet radios, of the user. In embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless connection between a mobile handset and another network-enabled device, such as an Internet-radio, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device. Thus, a user's proximity to an Internet radio can be determined by using a short-distance wireless protocol to access the MAC address, or other mobile-specific identifier (DSI) of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) listen to on the audio-enabled device, such as for ratings purposes, managing (including with digital rights management techniques) the content the user is allowed to listen to on the audio-enabled device (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the audio-enabled device), and targeting the content directed to the user on the audio-enabled device, including advertising. Thus, the methods and systems disclosed herein allow for user-specific control of content delivered to the audio-enabled device to which the user is listening, based on proximity of the user's mobile handset to the audio-enabled device.
  • Another embodiment of the methods and systems disclosed herein relates to point-of-presence content delivery, such as live event content delivery and point-of-sale advertising, and outdoor advertising facilitating the use of a network-connected screen. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target point-of-presence content, including advertisements, to the user. As in other embodiments, the network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, however during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as behavioral targeting, hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to a point-of-presence device, such as a screen or audio-enabled device, that is in proximity to the user. In embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless connection between a mobile handset and another network-enabled device, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device, in this case a point-of-presence device such as a screen at a live event, a point-of-sale screen, or a point-of-presence audio-enabled device. Thus, a user's proximity to such a point-of-presence device can be determined by using a short-distance wireless protocol to access the MAC address, or other mobile-specific identifier (DSI) of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) view on a screen or hear on an audio-enabled device, such as for ratings purposes, tracking the effectiveness of advertising, managing (including with digital rights management techniques) the content the user is allowed to view on the screen (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the screen), and targeting the content directed to the user on the screen, including advertising. Thus, the methods and systems disclosed herein allow for user-specific control of content delivered to the screen or audio-enabled device the user is watching, based on proximity of the user's mobile handset to the screen or audio-enabled device.
  • One embodiment of the methods and systems disclosed herein relates to Internet web-page-based, or Internet portal-based content. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target Internet web-page-based or Internet portal-based content, including advertisements, to the user. The network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, however during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the Internet-connected device of the user. In some embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless connection between a mobile handset and another network-enabled device, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device. Thus, a user's proximity to an Internet-connected device can be determined by using a short-distance wireless protocol to access the MAC address or other DSI of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) view on the Internet-connected device, such as for ratings purposes, managing (including with digital rights management techniques) the content the user is allowed to view or listen on the device (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the device), and targeting the content directed to the user on the device, including advertising. Thus, the methods and systems disclosed herein allow for user-specific control of content delivered to the screen the user is watching or the audio-device to which the user is listening, based on proximity of the user's mobile handset to the Internet-connected device.
  • One embodiment of the methods and systems disclosed herein relates to mobile, including, without limitation, mobile handset screen advertising. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target television content, including advertisements, to the user. The network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, however during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the mobile device of the user. In embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless connection between a mobile handset and another network-enabled device, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to another mobile device. Thus, a user's proximity to a mobile device can be determined by using a short-distance wireless protocol to access the MAC address or other DSI of the handset. Once proximity is determined or verified, it can be used for various purposes, including managing (including with digital rights management techniques) the content another user is allowed to access on another mobile device (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the other user's device), and targeting the content directed to the user on the other device, including advertising.
  • One advantage of the methods and systems herein is they enable a drastic improvement in the television advertising industry. There are certain technology and business drivers for a higher penetration of more advanced set-top boxes, or televisions integrated with Internet-connection capability that may be associated with improvements in television advertising.
  • DVDs may become a technological non-necessity in a few years. Users may consume video via a direct feed/download via an Internet-protocol based connection to a content serving database. This video data will need to go through a data network utility in the home that may route not only video, but other data streams such as voice and Internet data inside the home. As a result, even viewers that will not subscribe to premium television channels will likely have an advanced set-top box or television with Internet-connection capabilities for the consumption of non-premium television channels and for watching movies.
  • Fixed-Mobile-Convergence (FMC) indicates that landlines may soon become a technological non-necessity. A device that switches a cell phone's connection from a cell-tower to the broadband connection inside the home (in the form of cable, satellite, Fixed WiMax, or other broadband connection) may become necessary. It is very reasonable to assume, especially with the triple and quadruple play packages being presented to consumers that the features of such a device will eventually be embedded into the same unit that controls video downloads including television and movies.
  • Using the mobile device is potentially the only way to attain a real-time, live assessment of who is watching the television and tailor the advertisements delivered to the unique combinations of viewers. A father and son watching television content together represent two very unique advertising markets. To best take advantage of this blend of viewers simultaneously viewing television, for the purposes of accurate and proportional advertising, a device that is overwhelmingly individual specific such as the mobile handset may provide tremendous value.
  • Additionally, activity performed on a mobile handset as a portion of overall activity performed on a network-connected device, is increasing rapidly and will continue to do so in the foreseeable future.
  • For Internet publishers of websites, blogs, or for Internet retailers, the server-side software which facilitates the creation of user-specific profiles rooted in the mobile DSI but which also take into consideration all network-connected devices, is a technology that may but will not necessarily, provide the same value as a real-time user-specific advertising network for Internet websites, blog publishers, or Internet retailers allowing them access to the best available user-specific Internet usage metrics so they can serve the best possible ads on available ad inventory or in the case of an Internet retailer, promote the best products suited for visitors to the given Internet retailer's website. Based on the content, fees may be collected by a provider of a mobile DSI identification/authentication service, such as for video, unlimited viewing, extending the content on a given Internet platform to another platform such as television content, portable/flexible electronic screens used to make digital text portable, radio, and the like.
  • As a result of mobile carriers dealing with rapidly decaying voice revenue and as even the margins on Internet data connection rates are becoming hyper-competitive, mobile carriers are rapidly seeking ways to monetize their high subscriber penetrations through advertising. From business processes which rely upon the methods and systems disclosed herein, mobile carriers may receive a portion of advertising revenue from various sources of advertising, including television which accounts for 34% of all advertising dollars in the US or $72 billion in 2006. As video on the internet becomes more prevalent, advertising related revenue may grow and through technological advances, television and internet advertising and content delivery will benefit.
  • Digital Rights Management synergies with content producers are enabled by the methods and systems herein. Content production companies such as News Corporation may enjoy digital rights management services to protect their premium for-pay content while using the methods and systems herein to aid in the serving of highly-precise, targeted ads, such as by using DSI based identification/authentication profiles.
  • Placing an emphasis on a mobile handset's device-specific identification (DSI) as a base for a user-specific profile generated from activity performed on various network-connected devices may be based on an understanding that it is essentially carried on a given user's person and thus is very individual-specific. Additionally, since it is carried on a given user's person, it follows the user in many places where other devices such as a PC/laptop might not, thus allowing user-specific profiles created with specific dependencies and ties to the mobile handset, to be portable by virtue of the inherent portability of mobile handset. Additionally, when attempting to aggregate all the Internet usage habits of a user across various devices, beginning with the mobile DSI may facilitate the aggregation by enabling the use of clues or information associated with the mobile handset DSI and the associated user to determine what other information, found as a result of Internet usage on other network-connected devices associated with the same user, to aggregate with it. Starting with a fixed position, or multi-user device, such as a PC, a television, or other stationary Internet-enabled device presents user identification challenges that the mobile handset does not. These challenges are mainly rooted on the basis that such devices may, and often, have multiple regular users. Therefore the mobile handset may serve as a primary identification device for a scenario in which the methods and systems herein (e.g. identification or authentication) could be applied for advertising, content/software as a service-authentication, and the like. The mobile handset is widely regarded as becoming the most frequently used computing interface, making it ideal for user authentication purposes. However, the methods and systems described herein do not all require a mobile component, and therefore, for the purposes of the unique methods and systems described herein, they can be associated with mechanisms that do include a mobile component.
  • In one aspect of the invention, methods and systems may include using a personal device to detect a proximity of a wireless device identifier; determining a duration of the detected proximity; generating a measure of real-world behavior by associating the detected wireless device identifier with at least one of a real world product, service, product category, retail store aisle, and retail store; and updating a usage profile that is associated with a user of the personal device with the real world behavior.
  • In one aspect, the wireless device identifier may include at least one of an RFID device and a WiFi device.
  • In one aspect, updating a usage profile may include using a device specific identifier associated with the personal device to determine the usage profile to update.
  • In one aspect, the measure of real world behavior may include GPS location data received from the personal device.
  • In another aspect of the invention, methods and systems may include detecting a proximity of a personal device to a plurality of wireless device identifiers; determining a duration of proximity for each of wireless device identifiers, providing a dwell event for each of the plurality of wireless device identifiers; and analyzing the plurality of dwell events and a usage profile associated with a user of the personal device to determine a measure of user interest in an item associated with at least one of the plurality of wireless device identifiers.
  • Another aspect further may include facilitating delivering to the personal device an offer based on the measure of user interest. The measure of user interest may indicate that the user has acquired the item
  • In one aspect, a device specific identifier of the personal device may be used to identify the usage profile for analysis. The usage profile may include usage data associated with a plurality of network-enabled devices.
  • In one aspect, the dwell event may include GPS location data received from the personal device. The GPS location data may be used to determine a retailer associated with the wireless device identifiers.
  • In another aspect of the invention, methods and systems may include receiving dwell event data representing a real-world proximity of a plurality of personal devices to a wireless device identifier; using a device specific identifier associated with each of the plurality of personal devices to identify a usage profile of a user of each of the personal devices; comparing the dwell event data with each usage profile to determine a measure of user interest in an item associated with the wireless device identifier; and updating each usage profile based on the measure of user interest.
  • In one aspect, substantially identical dwell event data for a first personal device and a second personal device may result in a measure of user interest for a user associated with the first device that is different from a measure of user interest for a user associated with the second device, wherein the difference in user interest is provided by comparing the dwell event data with each of the usage profile of the first device and the usage profile of the second device.
  • In another aspect of the invention, methods and systems may include receiving a GPS location of a first network-enabled device; receiving a device specific identifier of the first network-enabled device; and authorizing the delivery of content to a second network-enabled device based on the GPS location of the first network-enabled device.
  • In one aspect, the content may be an advertisement that is targeted to a user of the second network-enabled device. The advertisement may be based on a usage profile associated with at least one of the first network-enabled device and the second network-enabled device.
  • In one aspect, authorizing the delivery may be further based on a GPS location of the second network-enabled device.
  • In one aspect, the first network-enabled device may be on a different network from the second network-enabled device. The first network-enabled device may be connected to a cellular network and the second network-enabled device is connected to the Internet.
  • In another aspect of the invention, methods and systems may include detecting a latency of communication between a first network-enabled device and a second network-enabled device; calculating a distance between the first and second network-enabled devices based at least in part on the detected latency; and updating a usage profile based on network activity data collected from the second network-enabled device, wherein the usage profile is identified by a device specific identifier of the first network-enabled device, and wherein the updating is based on the calculated distance.
  • In another aspect of the invention, methods and systems may include receiving a measure of latency of communication between a first network-enabled device and a second network-enabled device; receiving network activity associated with at least the second network-enabled device; receiving a device specific identifier of the first network-enabled device; identifying a usage profile based on the device specific identifier; calculating a distance between the first and second network-enabled devices based at least in part on the measure of latency; and updating the usage profile based on the received network activity data, wherein the updating is based on the calculated distance.
  • In another aspect of the invention, methods and systems may include receiving a GPS location data of a first network-enabled device and a second network-enabled device; receiving a device specific identifier of the first network-enabled device; and authorizing the delivery of content to the second network-enabled device based on the device specific identifier and the GPS location data.
  • In one aspect, the first and second network-enabled devices may be located remotely to each other. The first and second network-enabled devices are not communicating by short haul wireless communications.
  • In one aspect, the GPS location data may be one of a specific location, a proximity to a location, one of a plurality of locations, and not within range of certain locations. The GPS location of the first network-enabled device is the same as the GPS location of the second network-enabled device. The GPS location of the first network-enabled device may be nearby to the GPS location of the second network-enabled device.
  • In one aspect, the GPS location of the first network-enabled device may be compared to the GPS location of the second network-enabled device to determine a proximity of a user of the first network-enabled device to the second network-enabled device. The device specific identifier of a first network-enabled device may be retrieved from a GPS locating system.
  • In one aspect, street address referenced GPS data may be combined with the GPS location data to facilitate selecting a usage profile. The street address referenced GPS data may be combined with the GPS location data to facilitate at least one of digital rights management, access to content, sharing of content, storing of content, targeting of content, developing a user-specific authentication/identification profile, associating devices to a user-specific authentication/ identification profile, associating web surfing with a user history, and associating an electronic communication activity with a user history.
  • In one aspect, GPS location of the first network-enabled device may be combined with a determination of network communication latency between the second network-enabled device and the first network-enabled device to calculate a proximity of the first and second network-enabled devices.
  • In one aspect, authorizing the delivery may be based on the calculated proximity.
  • In one aspect of the invention, methods and systems may include providing geo-location data from a GPS enabled personal device to a media capture device; marking media created by the media capture device with the geo-location data; and transferring the marked media to a server.
  • In another aspect of the invention, methods and systems may include receiving media from a media capture device over a short haul wireless network; marking the media with a geo-location; and transferring the geo-location marked media over a network.
  • In another aspect of the invention, methods and systems may include forwarding media received by a personal device over a short haul wireless network from a media capture device and a geo-location of the personal device over a long haul wireless network, wherein the forwarded media is associated with the geo-location.
  • These and other systems, methods, objects, features, and advantages of the present invention will be apparent to those skilled in the art from the following detailed description of the preferred embodiment and the drawings. All documents mentioned herein are hereby incorporated in their entirety by reference.
  • BRIEF DESCRIPTION OF THE FIGURES
  • The invention and the following detailed description of certain embodiments thereof may be understood by reference to the following figures:
  • FIG. 1 depicts a DSI-based authentication/identification platform.
  • FIG. 2 depicts using a mobile handset DSI to facilitate delivery of targeted television advertising.
  • FIG. 3 depicts providing recent historical usage information (internet browser cache data) from a mobile device to a server on the internet
  • FIG. 4 depicts determining a presence and a location of mobile handsets in proximity to a set-top box and/or an Internet-connection capable television.
  • FIG. 5 depicts determining a presence and a location of mobile handsets in proximity to a set-top box and/or an Internet-connection capable television in order to determine a presence of viewers by virtue of the presence of their mobile handsets.
  • FIG. 6 depicts uploading DSI or browser cache data over the internet to a host and the processing there.
  • FIG. 7 depicts a typical wireless network device gaining access to internet resources.
  • FIG. 8 depicts a very simplified embodiment of the internet with a plurality of web sites and servers.
  • FIG. 9 depicts the delivery of client side software by a server to a mobile handset.
  • FIG. 10 depicts client side software communicating the device identifier or device-specific identification (DSI) over the internet.
  • FIG. 11 depicts the creation of DSI-specific logs being facilitated by a server's server-side software once it has obtained a mobile handset's DSI.
  • FIG. 12 depicts a device other than a mobile device providing a DSI for the creation of DSI-specific logs facilitated by a server's server-side software once it has obtained a mobile handset's DSI.
  • FIG. 13 depicts a plurality of devices, submitting their respective DSIs to servers, for the production of DSI-specific usage logs.
  • FIG. 14 depicts formation of user-specific authentication/identification profiles as a result of DSI and username aggregation and compilation of usage logs associated therewith
  • FIG. 15 depicts real-time audience tracking of embedded web objects that may be a distribution method for super distributed content in association with DSI-based audience tracking.
  • FIG. 16 depicts filtering user information as DSI-based logs and usage data is passed to servers on the internet.
  • FIG. 17 depicts delivering authentication protected content in a DSI-enabled digital rights management/content authentication system.
  • FIG. 18 depicts layered targeted advertising based on one user profile.
  • FIG. 19 depicts layered targeted advertising based on two user profiles.
  • FIG. 20 depicts dynamic content placement in association with layered targeted advertising based on two user profiles.
  • FIG. 21 depicts using a mobile handset to interact with an interactive targeted advertisement presented by a television connected to a set-top box and/or an Internet-connection capable television
  • FIG. 22 depicts the embodiment of FIG. 21 wherein the advertisement is presented on a personal computer.
  • FIG. 23 depicts the embodiment of FIG. 21 wherein the advertisement is presented on an electronic multimedia screen.
  • FIG. 24 depicts an alternate embodiment of FIG. 21 wherein the advertisement is presented on a flexible electronic presentation media.
  • FIG. 25 depicts a timeline representing real-time accumulation of usage data impacting targeted advertising.
  • FIG. 26 depicts contact sharing between DSI-enabled wireless mobile handsets and uploading the contact to a social networking site.
  • FIG. 27 shows methods and systems for automatic mobile contact information exchange and synchronization with a social network.
  • FIG. 28 shows steps for a mobile aware, automatic social networking tool.
  • FIG. 29 shows additional details relevant to a mobile aware, automatic social networking tool.
  • FIG. 30 shows components for a mobile aware, automatic, social networking system.
  • FIG. 31 shows methods and systems for managing content based on a device-specific identifier of a client.
  • FIG. 32 shows steps for integration of content in the playback software of a user device.
  • FIG. 33 shows downloading and integration of content into playback software of a user device.
  • FIG. 34 shows geocoding media using the methods and systems of device specific identification and user profiling.
  • FIG. 35 shows a real world wireless device identifier dwell event.
  • DETAILED DESCRIPTION
  • The following disclosure relates generally to mobile device identification and authentication for access to and presentation of targeted content.
  • As used herein, the terms “comprises,” “comprising,” “includes,” “including,” “has,” “having” or any other variation thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, article, or apparatus that comprises a list of elements is not necessarily limited to only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Further, unless expressly stated to the contrary, “or” is intended to mean “and/or” unless otherwise stated to the contrary. Also, use of the “a” or “an” are employed to describe elements and components of the invention. Thus in the foregoing description references to the singular (“a”, “an”, “the”, “one”, etc.) are also intended to refer to the plural unless otherwise stated or clear from the context.
  • The Figures and the following description relate to preferred embodiments of the present invention by way of illustration only. It should be noted that from the following discussion, alternative embodiments of the structures and methods disclosed herein will be readily recognized as viable alternatives that may be employed without departing from the principles of the claimed invention. Reference will now be made in detail to several embodiments, examples of which are illustrated in the accompanying figures. It is noted that wherever practicable similar or like reference numbers may be used in the figures and may indicate similar or like functionality. The figures depict embodiments of the present invention for purposes of illustration only, and are not intended to limit the scope of this disclosure in any manner. One skilled in the art will readily recognize that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles described herein.
  • Referring to FIG. 1, in certain preferred embodiments of the methods and systems disclosed herein, a DSI-based authentication/identification platform 100 may include profile aggregation 124, content tagging 122, user identification 120, authentication 114, usage logging 112, a standards facility 118, a short haul wireless port 110, a profile database 130, an internet port 128, client software 102, device MAC addresses 104, and a device username 108. A mobile device 202 may include some portions and functionality of the platform 100. The mobile device 202 may also be connected to the platform 100 through the short haul wireless port 110 and/or through the Internet port 128.
  • FIG. 2 depicts using a mobile handset DSI to facilitate delivery of targeted television advertising 218. A mobile handset 202 may be in communication with a set-top box 204 or other Internet-connected device that is controlling a television 208. The mobile handset 202 may be in communication with the set-top box 204 through a wireless interface 214, such as short distance wireless interfaces including WiFi, Bluetooth, WUSB, UWB and the like. The mobile handset 202 may include location technology such as a GPS receiver/cellular/radio wave triangulation to further assist locating the relative position of the handset user and the television 208. The set-top box 204 may be connected to one or more host servers 210, such as through the internet, to communicate content related to functions of the set-top box 204. The host server 210 may include functionality to support the identification and selection of content, such as advertisements 218, based the mobile handset 202 device-specific identification (DSI).
  • In the embodiment of FIG. 2, a viewer who may be carrying the mobile handset 202 on his person may sit down in front of a television that is connected to the Internet. The Internet connection may be via the set-top box 204, which may be one provided by a cable company, satellite company, internet service provider, etc. The set-top box 204 may also be separate from the ones provided by the providers of television/internet data services (e.g. Microsoft's X-box, AppleTV, and the like). Alternatively the television 208 may provide internet communication.
  • To deliver targeted advertising 218 to a user of the mobile handset 202 who may be viewing the television 208, the set-top box 204 may extract the mobile handset DSI 212 by employing a short-distance wireless technology (WiFi, Bluetooth, WUSB, UWB, and the like) to locate mobile handsets within viewing proximity of the television 208. The mobile handset DSI 212 (also known as mobile DSI or just DSI) may then be uploaded from the set-top box 204 over the internet to the host 210 for matching to a user-specific authentication/identification profile (a user profile) that corresponds to the uploaded DSI 212. The servers 210 may be servers associated with the DSI platform 100, or may be associated with partners or affiliates of the platform 100. The server 210 may mine data across an uploaded user authentication/identification profile that corresponds to the extracted mobile DSI 212 and use the information for precision advertisement targeting. By using location based technology such as GPS/cellular/radio wave triangulation, a more precise location for the user may be determined so that advertising for a user viewing the television may be presented on the television 208. The location based technology information may be retrieved from the mobile handset 202, such as by querying the mobile handset 202 or the location information may be included in the initial extraction of the DSI 212 by the set-top box 204. The host server(s) 210 may then find the most appropriate advertisement 218 and distribute the advertisement back to the set-top box 204 for display on the television 208. In an example, advertisements 218 may come in the form of dynamic, embedded content advertisements 218. Interactivity during the period of display of the advertisement can be monitored and recorded by the servers 210 for the purposes of adding more data to the corresponding user authentication/identification profile.
  • An alternative embodiment for delivering targeted advertising 218 to a television that may be viewed by a user of a mobile handset is depicted in FIG. 3. In the embodiment of FIG. 3, recent historical information 302 from the mobile handset 202 web browser or other user interface software may be retrieved by the set-top box 204 and forwarded to the servers 210. Alternatively, the servers 210 may prepare a query that is passed to the handset 202 by the set-top box 204 and the recent historical information 302 may be included in a response to the query.
  • In addition to, or in place of sending the DSI 212 to the server 210, the set-top box 204 may extract information, in its entirety or derived from the mobile handset's Internet browser cache and forward it to the servers 210. The extracted internet recent historical information 302, such as represented by a internet browser cache, may be combined with a user profile or usage profile corresponding to the DSI 212 to determine relevant analysis about the historical information 302. Alternatively, the recent historical information 302 may be analyzed alone. The information may be analyzed for demographic, interests, trends, and the like that may facilitate the servers 210 determining an appropriate offer or advertisement 218 to present on the television 208 that the user of the mobile handset 202 may be viewing.
  • In an embodiment, presence of a mobile phone may be used to identify the users who are present/within viewable proximity in front of a television or other electronic display by virtue of the distance of their mobile handsets from the television or other electronic display. Communication with a mobile phone or mobile handset 202 may include using short-distance wireless technologies, such as WiFi, Bluetooth, WUSB, and UWB to identify nearby mobile handsets 202. Precise user location may further be determined via device-specific GPS/cellular/radio wave triangulation alignment. Such detection may be used to derive real-time and accurate content audience ratings.
  • FIGS. 4 and 5 each depict determining a presence and a location of mobile handsets in proximity to a set-top box. Using radio wave distance-mapping methods, the set-top box may determine a distance and a direction of mobile handset 202. The set-top box 204 and/or internet television 208 may determine if the presence and distance of detected mobile handsets 202 can support an assumption that the detected mobile handsets 202 represent individuals 502 within viewing proximity 508 of the television, or viewers 504 outside a viewing proximity 508 of the television 208. This will allow the set-top or the television to determine individuals within viewing proximity of the television by virtue of the presence of their mobile handsets. Individual handsets 202 may be detected uniquely by retrieving the handset DSI 402 and, when available, a GPS/cellular/radio wave triangulation coordinate 404 for the handset. By associating the DSI 402 with a user identification as described in reference to FIG. 2, an identity of the viewers or listeners in detectable proximity to the television 208 may be determined.
  • The methods and systems herein may facilitate real-time television or other electronic display audience rating/headcount via use of mobile DSI and/or mobile handset internet browser cache. Once it has been established that individuals, by virtue of the presence of their mobile handsets, are viewers in front of a given television or other electronic display, the methods and systems herein may include using the mobile DSIs of the given mobile handsets (and profiles of usage associated therewith, including usage of non-mobile devices) for the purposes of retrieving a real-time, audience ratings/headcount, which pertains to various demographic categories/metrics. This may involve the use of Internet usage profiles associated with the mobile DSI but also may take into consideration usage activity from non-mobile devices. Usage profiles provide a way of tracking of Internet activity which can result in strong assumptions of real-time, viewer-specific demographic data.
  • Alternatively real-time viewer attendance may be determined through the extraction of each proximate mobile handset's Internet browser cache, in place of extraction of the mobile DSI, which can also effectively report real-time viewer demographical data as determined by the Internet usage patterns which can be recognized by analyzing the mobile handset's Internet browser cache contents.
  • Referring to FIG. 6, after establishing unique mobile handsets or personal devices as determined by the presence and distance of their mobile handsets from a nearby a television or other electronic display as described in reference to FIGS. 4 and 5, the set-top box 204 or the television 208 uploads the detected mobile device DSIs to host servers 210. The servers 210 compare the extracted Mobile DSI 212 across a database, or more generally a data store of user-specific authentication/identification profiles 602 to find the profiles which correspond to the extracted mobile DSIs (resulting in a corresponding profile 604). Using information from the corresponding user-specific authentication/identification profiles 604, servers 210 may make demographic assumptions.
  • Alternative to using the mobile device DSI and cross referencing it to a data store of user identities, demographics and audience classification may be determined by analyzing an internet browser cache 302 associated with the proximate mobile handsets. Information such as historical browsing data, queries, locations, communication such as texting, email, and the like may be analyzed by the servers 210 to determine real-time viewing audience aspects.
  • Through this method, a mobile handset may effectively allow for the creation of real-time audience ratings which include various demographics determined by identifying the participants in a viewing audience as well as relative Internet usage metrics. The derived or measured real-time viewing information may be provided in a report to broadcasters, advertisers, and the like to become part of a broadcast or programming business process.
  • User-specific authentication/identification profiles may be based on mobile device or personal device device-specific identifications (DSIs), such as for the purposes of user-specific multi-device internet usage tracking and profiling. User-specific authentication/identification profiles may include a user identity, usage tracking, and the like. Establishing user-specific profiles may involve tracking of activities associated with user names that are linked or tied to the mobile DSI; and linking those usernames to other (non-mobile) DSIs to aggregate user-specific activities regardless of which device(s) the activities take place. One useful purpose for this aggregation of mobile and non-mobile activity tracking is targeted advertising.
  • Defining, extracting, and using mobile device specific identifiers (DSIs) may make use of server-side and/or client-side software. Server-side software may reside on the servers 210 or may reside elsewhere and be executed on the servers 210. Client-side software may be downloaded onto or otherwise configured into mobile and/or stationary devices used by end users. The client-side and server-side software may be used when a mobile device user visits a website in order to gain access to content residing on servers that require authentication and/or user identification. One or more of the client-side and the server-side software may include creating and updating logs associated with a mobile device DSI once a known visitor has gained access to servers providing access to the requested authentication protected content. DSI based logs may differ from other logging methodologies in that DSI logs may have the ability to completely mask the real world identities of users as their user-specific authentication/identification profiles can be created with a process that results in the complete morphing or excluding of anything that renders the user identifiable in the real world. Additionally, the DSI specific logs are initiated, conducted, and managed on the server side rather than on the device with which the user is in direct contact with and/or uses to input/request network content. Also, client-side software may provide capabilities that pertain to uploading device-specific information and existing information already contained in the mobile device prior to engagement with the server 210 or with the website a given user is attempting to access. This results in an important difference from information/behavioral software existing today that log behavioral activity on the client device.
  • FIG. 7 depicts a typical wireless network device gaining access to internet resources. Mobile handheld device 202 communicates through a wireless provider's network that may comprise cellular phone towers 702 for cellular connections such as CDMA, GSM, or IP-based WiMax connections. The wireless provider's network may include an access point to the internet through which a mobile handset 202 may send and receive information over the internet The same mobile device 202 may also communicate through a wireless IP-based interface, such as WiMax, or WiFi, and other wireless protocols such as Bluetooth, WUSB, or UWB and the like 704. The WiFi router 704 may interface to the internet through a WiFi Back-Haul 708 such as through T3, Cable, DSL, or any other broadband connection. This exemplary network connection scheme may provide an access path from the mobile handset 202 to the internet and servers such as a host server 210 herein described.
  • For pedagogical purposes, FIG. 8 depicts a very simplified embodiment of the internet with a plurality of web sites and servers, wherein some web sites require authentication and/or identification, and other web sites may often provide a fulfilling web experience without the collection of usernames/passwords normally associated with authentication. Web sites represented by servers 802 and 804, such as servers, may, based on a need for user authentication/identification operate server-side software 808 associated with the systems and methods herein described. In FIG. 8, it is assumed that servers 802 execute the herein described server-side software 808, and servers 804 do not. Generally, although variations may occur, websites 802 may require a username/password to be input by visitors for a more personalized experience (e.g. social networks, email, and the like).
  • FIG. 9 depicts when a mobile handset 202 identifies itself to a server 802, such as through the network described in any of FIGS. 1 through 7 and server-side software 808 executing on the server may run a check on the mobile device 202 to see if it has the most current client-side software 902. If the mobile device does not have the most current client-side software 902, the user may be asked to download it to gain access to content on the authenticated website. Downloading of the client-side software 902 onto the mobile handset 202 may be facilitated by the server-side software 808 residing on a website's servers. Alternatively, the latest client-side software 902 maybe automatically downloaded to a device 202 that has identified itself to the server 802.
  • Referring to FIG. 10, upon completion of download and installation, client-side software 902 may begin executing on the mobile device 202. The client-side software 902 may be responsible or collecting relevant and necessary information from and about the mobile device, such as a MAC address, username, password, browser cache settings, and the like to provide a DSI 212. The client-side software 902 may deliver the DSI 212 to a web site/internet server contemporaneously with a first access to the web site/internet server 802. A web site server 802 that is executing the server-side software 808 may collect the DSI 212 during authentication, or if authentication is not required, the server 802 may also collect the DSI 212. Information stored on the mobile device 202, such as a browser cache, may be transmitted to the server 802 to update information related to the device DSI 212. It is important to note that unlike cookies, the client-side software 902 will not monitor the device related activities of the user, rather just identify of the device (mobile or non-mobile) that is currently connected to the server 802 along with existing properties of that device is recorded. Although past behavior may be included in the information uploaded to the server 802, such as data derived from an Internet browser cache on the device, logging of the activities once the device has been connected to a given website server 802 will be done by the server-side software 808, not the client side software 902.
  • Referring to FIGS. 11 and 12, upon receipt of a DSI 212, a server 802 executing server-side software 808 may begin tracking usage of the website supported by the server 802 in a DSI specific log 1102. FIG. 11 depicts a configuration with a mobile device 202 providing the DSI 212; whereas FIG. 12 depicts a device other than a mobile handset providing a DSI 1202, such as a PC, providing the DSI 212. Information collected from the mobile device 202 or the non-mobile handset device 1202 may include the device identifier (e.g. the MAC address), username, password, GPS/cellular/radio wave triangulation data, browser cache data, and the like. The information collected may be stored in association with the mobile device DSI log 1102 as shown in FIG. 11 or with the non-mobile handset device DSI log 1204 as shown in FIG. 12.
  • FIG. 13 depicts a configuration wherein at least two devices and a plurality of servers are embodying the methods and systems herein described. The embodiment of FIG. 13 includes a mobile device 212, a device that is not a mobile handset may be a wired PC, a laptop with WiFi, or any other Internet-enabled device that is not a mobile handset. 1202, a plurality of servers 802 executing server-side software 808 and recording a usage log (1102, 1204) for each device (202, 1202).
  • Referring to FIG. 14, the DSI information and the usage logs may be forwarded onto a host server 210 for the purposes of analyzing and relating the various information to provide usage or user profiles. FIG. 14 depicts a host server 210 accessing the information collected from the mobile or non-mobile handset and the corresponding usage logs to determine associations between them. In particular the host server 210 may determine that two different DSIs and corresponding usage logs may be associated with a single user or a single entity, such as a business. By collecting a DSI and recording a usage log for each connection of a DSI enabled device to a server 802 executing server-side software 808, a host server 210 may associate a username that may have been provided by a user of a DSI enabled device to access authentication protected internet content with the same or related DSIs collected by other servers 802 and reported to the host server 210. In the embodiment of FIG. 14, three usage logs from three different servers are analyzed to associate a username to a DSI and its corresponding usage data. The host server 210 may also search through a data store of existing DSIs, usage logs, and usernames to determine such an association. The data store of existing DSIs and usernames may be derived from data provided by servers 802 connected to the internet and is not restricted to the three server log configuration depicted in FIG. 14. By identifying associations between the usage logs provided to the host server 210, the host server 210 may create user profiles, such as user authentication/identification profiles that may be useful for purposes such as targeted advertising, while enabling the protection of the privacy of the individual associated with the user profile through morphing the identifying information so that third parties, such as advertisers, cannot determine the user's identity. The host server 210 may also provide privacy protection by requiring the advertisers to target advertisements to users through the host server 210. Alternatively, the user authentication/identification profile, or data derived from it, may be provided to third parties, such as advertisers or web sites so that one or more devices identified by DSIs associated with the user profile may be targeted to receive advertising. By morphing data from the DSI logs that are created and kept on a server, and sending the morphed data to the host server, the host server may anonymously create user-specific profiles across various devices. In this way, even the host server does not have the information necessary to find the real world identity of the user associated with the user profile.
  • Referring further to FIG. 14, host server 210 accesses usage logs from at least three servers. Usage logs that directly contain common user names are aggregated into a user authentication profile 1404. In this embodiment, usage logs 1102, 1204 and 1102A can be identified by the host server 210 as having common usernames. Usage log 1204A does not have a username that matches those aggregated into profile 1404 so it is compared to a data store 1402 of usernames and associated DSIs that includes historical data as well as usage data being provided by other servers to the host server 210. Usage log 1204B is associated with user profile 1408, while usage log 1102B is compared to the data store 1402. The lookup of the usernames and/or DSIs from usage logs 1102B and 1204A through data store 1402 results in usage log 1102B being aggregated with user profile 1404 and usage log 1204A being aggregated with user profile 1408.
  • In addition to checking usernames in usage logs against other usage logs, DSIs in usage logs may also be checked in a similar way. A usage log that contains a DSI but does not contain a username may be aggregated with a user profile by associating the DSI in the usage log with the information in the data store 1402 to determine an appropriate user profile for aggregating the usage log data.
  • Even when there is no direct correlation among usernames and DSIs, such as when a DSI does not have any username associated with it, a user profile may be created for the DSI so that all usage associated with that DSI may be aggregated under the DSI specific user profile. In this way, user authentication/identification profiles may be established and used even without a username or other personal identifying information associated with the profile.
  • Because users often perform a variety of activities during an on-line session or connection, time analysis of logs may facilitate determining user names for DSI log entries for which a user name is not required by the server generating the DSI log. If activity associated with a DSI is logged by a website that requires a username login, and another site that doesn't require a username logs activity from the same DSI at nearly the same time, such as shortly before or after the website requiring login, it can be determined that for those particular sessions of activity, the visitor is likely to be the same.
  • When a plurality usage profiles with different DSIs and without usernames, are collected by the host server 210, the host server may analyze the usage related data to determine associations that may allow the formation of a user profile associated with the different DSIs.
  • FIG. 15 is a depiction of the methods and systems herein applied to embedded web objects for real-time audience tracking of super distributed content. Software residing on website servers which allows embedded objects (e.g. widgets, flash objects, videos, music, and the like) may be adapted to extract the DSI of a device on which the website is being executed and the DSIs of surrounding mobile devices. This information may be sent to the embedded object's point of origination, the visited website's own point of origination, and/or one or more host servers 210. This will aid in the process of attaining real-time audience ratings for music, video, and other interactive objects that are embedded across several websites (often known as super-distribution). This method of audience gauging makes irrelevant which website the embedded object was accessed from or through what device it was accessed with because the viewer information can be collected without having to rely on a specific website. Additionally, using the methods and systems herein described, it is possible for embedded content, regardless of which website it is hosted on, to have audience ratings that do not rely upon statistics generated for or by the website on which the embedded content is hosted. Instead, the audience ratings may be obtained from user-specific authentication/identification profiles.
  • In FIG. 15, a plurality of users of mobile devices 202 may be in close proximity to a viewing or listening device 1502 (such as a screen, computer, radio, and the like) on which a website with embedded objects 1504 is being presented. The DSI of the device 1502 and all proximate mobile devices 202 may be collected and delivered to a server 802 providing the web site content and the embedded objects 1504. The server 802 may collect DSI usage logs 1512 and forward the collected DSIs and usage logs 1512 to the host server 210 through the server-side software 808. The host server may package the collected usage data and relate it to each embedded object 1504, perhaps along with demographic information of all collected DSIs (as may be determined from the user profiles corresponding to the collected DSIs by accessing the user profile data store 1402) to provide audience ratings 1508 for the embedded objects 1504. The determined audience ratings 1508 may also be sent to the embedded objects' 1504 originating server 1510 for correlation and further audience analysis.
  • The methods and systems may enable ensuring privacy of select user-specific profile/profile activity data via server-to-server data morphing and data exclusion. The methods and systems herein may include the ability to morph or exclude specific parts of the user-specific authentication/identification profile or specific activity associated with a given profile for the purpose of making certain the real world identity associated with the given user-specific identification profile remains private. The result is a highly individualized profiling system that successfully leaves private, the real world identity of those being profiled.
  • By supporting real world identification to provide digital rights management for authentication protected content and then using morphed information related to the usage by the DSI accessing the protected content, such as for targeted advertising, both the protected individual and the public advertiser may benefit without creating a conflict between the private user and the targeted advertising provider.
  • Referring to FIG. 16, when a host server 210 passes information from a user-specific authentication/identification profile 1602, select information, as determined by the purpose of the data exchange, (targeted advertising or content digital rights management, etc) such as name, address, credit card information, etc can be filtered out by a filtering module 1604 that, for example, finds common patterns in computer code. In an example, data fields containing variations of the form “Name” (indicating the next field of user-inputted information to be user's real world name), or Credit Card, and the like can be searched via pre-designed algorithms so such information does NOT pass coherently from the host server 210 to another server, such as a third party advertiser 1608 or service provider 1610. Alternatively, a server 802 may pass DSI based usage logs through a privacy filter 1612 (that may be embodied as a portion of server-side software 808) to ensure information deemed private or protection-worthy by the server 802, or as specified as such by the user is not delivered to the host server 210. Filtering techniques may be applied throughout the transfer of DSI based information before and after the formation of a user profile.
  • Using short-distance wireless communication to pass a mobile device-specific identification, such as a DSI, to another nearby device, such as another mobile device or an internet connected device, may allow the mobile device-specific identification to be used to secure content that is presented (e.g. displayed, stored, played, and the like) on the other device. Examples wherein the mobile DSI may be used to secure content presented on another device include authentication for digital rights management and content sharing. An example of content sharing may include playing music, movies, shows, and the like authenticated by a mobile device DSI, such as a mobile phone, while the phone is in proximity to the sharing device—but only while the phone is in proximity. When the phone is no longer in proximity, the content sharing device may be denied access to present the authenticated content. Digital rights/authentication could be associated with the authentication/identification profile corresponding to the mobile phone DSI. This authentication/identification profile may also be used for targeted advertising. However digital rights management data that is transferred to third parties may include an interface that is more transparent of the specific individual, such as by keeping other data (e.g. surfing habits) out of view or filtered from the third party.
  • In an embodiment of the digital rights authentication process herein described, content authentication may include tagging a representation of the authenticated mobile DSI onto the protected content/service prior to distributing the protected content/service to a device which is providing the sharing or presentation capability. In this way, client-side software associated with the sharing or presenting device may ensure that the authenticated DSI mobile device remains in proximity to the sharing device. When such proximity is no longer detected, the tagged content may be invalidated, deleted, or otherwise blocked from access by the sharing/presenting device.
  • In reference to FIG. 17, authentication protected streamed data 1702 such as text, data tables, embedded pictures, music, video and the like, can be tagged with the mobile DSI of the mobile handset 202, providing a DSI authentication tagged content 1704, so that only the authorized user, as determined by the mobile handset 202 that matches the mobile DSI stamped onto the content during stream or download, will be able to access the tagged content 1704. Tagging the protected content 1702 may prevent other users on wireless networks, or in the vicinity, from maliciously or accidentally intercepting the data in coherent form as it will be tagged with the authorized user's mobile DSI. Such tagging may render the content invalid for correct playback unless the authenticated user mobile device DSI is detected within proximity. Alternatively, the tagged content may be incoherent to any device other than the device containing the authenticated DSI. Tagging may be performed by the server 802 by communicating with an authentication entity 1710, such as through the server-side software 808. The authentication entity 1710 may provide an authentication DSI 1708 that may be converted into a tag and combined with the protected content 1702 to provide tagged protected content 1704.
  • In embodiments, once on the mobile handset, protected content may be streamed to another device via short distance wireless communication (e.g., WiFi, Bluetooth, WUSB, or UWB) during which time playback software on the receiving device may temporarily play content as it is transmitted from the mobile handset to the receiving device. The receiving device may then, such as using client-side software installed on the receiving device, upload a tag for the protected content (such as a tag that is or is associated with the DSI of the sending handset) for authentication on a host server. In embodiments both a DSI of the receiving handset and a DSI of the sending handset may be used to manage rights of the users to play the content.
  • Depending on terms that may be set between the authentication entity (such as the DSI platform 100) and the rightful distributor of the protection enabled content, only information that is necessary for authentication may be submitted to the authentication entity. Limiting the information sent to the authentication entity may restrict what the authentication entity knows about the user's digital rights. In an example, authentication deal terms are solely on a transaction percentage/fixed fee basis. Therefore, information transferred to an authentication entity may only include financial transaction information related to the authentication entities fee structure. As such, each time a transaction takes place in which the authentication entity is entitled to a fee, the authentication entity would be notified only of that specific information which allows the authentication entity to determine and verify the revenue owed to the authentication entity. In another example, the authentication entity has a financial institution as a partner website. The authentication company and the financial institution will work out a deal such that for each user that the financial institution wishes to authenticate to access their account information, the authentication company will charge 10 cents annually. In this example, the authentication company would receive data pertaining to each time a user account is created and each time one is deleted. No other information would flow from the financial institution to the authentication entity. In another example, the authentication entity has a completely non-financial deal with an online site that provides content to registered users (e.g. a social networking site, an online version of a newspaper that charges for subscription, a pure-online newspaper, a content provider to registered users, and the like). In this example, the authentication entity may receive user information, such as the user's real name and identity or a user identity determined from a mobile DSI associated with the authentication request. The information might include entertainment interests, demographic information, and the like. The selected user information can be used in a multitude of ways and can be a set of market data, the value of which could be further enhanced through operational combinations using processes described herein.
  • Mobile DSI-enabled personal online account digital rights management may be associated with the methods and systems herein described. Users may be allowed, on their own discretion, to limit access to an online facility, such as certain personal online accounts (e.g. email, social network, bank, brokerage, etc.) so that those accounts may only be accessed if a mobile handset, which users assign at their own discretion, is nearby the device through which access is attempted to one of the personal accounts. Users may identify specific DSIs or specific users that may be associated with a mobile handset DSI. The specified users or DSIs may be maintained by an authentication entity so that requests to access to a DSI protected account may be authenticated based on proximity of one or more user specified mobile handsets to the device through which the request to access the online facility is made. An authentication response may be provided from authentication functionality embodied in the authentication entity, or in an entity associated with the DSI protected account. Based on the response, access to the online facility may be allowed or denied. In addition, the user may specify DSIs that must not be in proximity to the requesting device to enable authenticated access to the account.
  • The methods and systems herein may allow users, on their own discretion, to limit access to certain personal content (e.g. documents, pictures, video, and the like) accessible through an online facility so that the protected personal content, wherever it resides (e.g. an online social network, online photo album, online video server) may only be accessed by a user as assigned by the personal content publisher/owner. In an example, Mary allows her mom and her brother to view online photo album X while allowing her brother to access online photo album X and online video Y. When Mary's mother and brother seek access to online photo album X, they are granted access when one or more of the mobile DSIs associated with Mary's mother or brother are in proximity to the device requesting access. However, only when Mary's brother's mobile device DSI is within proximity to the requesting device, will access to video Y be granted. Access is granted using similar DSI authentication methods described herein that may include an authentication server, an authentication, tagging of protected content, and the like. Authentication may include matching the DSIs of devices in proximity to a list of authorized users by determining a user associated with each DSI to be matched. The matching may be performed by an authentication entity. Alternatively, the server-side software may receive a list of authorized DSIs (such as from an authentication entity) and may perform the matching. Personal authentication services may be offered to individuals for a fee, may be provided as part of a DSI based digital rights management protection package, or may be provided free of charge to individuals. Alternatively, content providers or servers may pay a fee to use DSI-based authentication services.
  • DSI-based user identification and profiling may allow layered viewer-specific advertising. Layered user-specific television, radio, and/or internet advertising support another layer of advertising within an existing advertising space. This may be embodied as multiple configurable or selectable images essentially in a stack that is selectable by the user or by display device software based DSIs of devices that are in proximity to the display device. Layered user-specific advertising may include the ability to split up each advertisement frame among multiple ads or among various categories of ads so that a reconstituted advertisement based on the user-specific identification/ authentication profiles of the viewers who are in front of the display device (or audio device) can be presented to the user(s). Layering may enable various portions of an advertisement to be customized and targeted to the viewers local to a presentation device.
  • Layered user-specific advertisements may also include a concept of a blanket advertisement that is targeted using general demographics based on the user profiles determined from the DSIs in viewing proximity. The blanket advertisement may be replaceable by the presentation device by an advertisement that is targeted to specific viewers. In an example, two families viewing the same television program through two different set-top boxes may see different advertisements. One family may have viewers with no mobile devices in proximity to the set-top box (or with devices providing DSIs that have no determinable association to targeted advertising) so that family may view the blanket advertisement. The other family may include viewers who are carrying mobile devices that present DSIs that can be determined to satisfy a requirement for a targeted advertisement. This family may not be presented the blanket commercial. Instead the set-top box (or server connected to the set-top box) may present a targeted advertisement in place of the blanket advertisement. While this concept supports layering of entire advertisements, it also extends to layering portions of an advertisement.
  • An advertisement may be composed of layers, frames, regions, elements, primitives, and the like that may be customizable through a targeting process. One or more of these layered portions of an advertisement may be customized with targeted content based on the determined viewers of the advertisement. In an example a sporting goods store advertisement may allow targeting various individuals by allowing products included in the advertisement to be user specific. While a base of the advertisement may be common to all presentations of the advertisement, a viewer with a usage profile that indicates the user has an interest in golf may be presented with golf product promotions, whereas a viewer determined to have an interest or have expressed an interest in basketball may be presented with basketball related product promotions within the advertisement, such as during the same advertisement on the same internet-enabled device such as a television connected to an internet-enabled set-top box.
  • When more than one viewer with differing targeting criteria is viewing output from the same set-top box (or internet connected device), the layering may allow more complex targeting. In an example, an advertisement for a sports drink may include images of a person active in a sport who needs a sport drink to be refreshed. The sport images may be targeted to one of the viewers, and the sport drink may be targeted to another of the viewers, thereby presenting an advertisement with relevance to both viewers.
  • FIGS. 18 and 19 depict layered user-specific advertisements. FIG. 18 depicts a single determined viewer receiving targeted layered advertising. A host server 1802 may determine information about the viewer by accessing the corresponding user-specific authentication/identification profile and usage data 1804. From the profile data 1804 and other information from the device such as location information 1808 (which may be derived from GPS receiver/cellular/radio wave triangulation certain advertisement targeting criteria may be established, such as age assumptions 1810, social network affiliations 1812, and search activity 1814. The embodiments are exemplary of some categories of information. The categories of information or where that information is from, or how it is categorized is not bounded or limited by these examples. These several examples only show the potential complexity of mixing and matching these categories with various viewers under various situations, such as layered, embedded, combined, or other scenarios. The advertisement targeting criteria may influence what information is presented in the layered portions of the advertisement 1818. The advertisement 1818 may reflect a composition as determined by the internet-enabled device and the various media formats it may receive (e.g. the set-top may receive video, images, audio; the radio may receive audio; the outdoor LCD may receive video, images and the like . . . ) The layered objects may represent the finished, delivered components of the advertisement 1818 as determined by the various targeting mechanisms described here such as by passing targeting information through the internet to the display or audio device 1820 on which the targeted advertisement 1818 is to be presented. In the embodiment of FIG. 18, age assumptions 1810 may be used to determine the main advertisement 1822 to be presented. Age assumptions 1810 and current location 1808 may determine which local establishment 1824 to present, and current location 1808 combined with search activity 1814 may determine which product or service 1828 associated with the local establishment 1824 to present.
  • FIG. 19 depicts targeting layered advertisements based on more than one viewer. In the embodiment of FIG. 19, age assumptions 1810 and 1910 from the different viewers contribute to determining the main advertisement 1922 to be presented. Social networking 1812 from a first viewer may determine which local establishment 1924 to present, and search activity 1814 if the first viewer may be combined with social networking 1912 of the second viewer to determine which product or service 1928 associated with the local establishment 1924 to present.
  • FIG. 20 depicts a targeted advertising scenario in which portions of content, such as a movie, television show, video, or other non-advertisement specific content may support creating dynamic embedded content advertising. Product placement in movie production is a high value market that can be significantly enhanced through targeting the product placement. In targeted product placement, specific items within the content being viewed, such as a soda bottle, a store sign may be dynamic and may be configurable to suit the viewer-specific audience as determined by the viewer's corresponding user-specific authentication/identification profiles derived from the viewer's DSI-based identity. In an example, during a given television program, three gentlemen walk into a restaurant. However, when viewers watch this content, the storefront of the restaurant may change to reflect an actual local restaurant nearby the physical location of the viewers. This may further allow for interactivity that allows the viewer(s) to reference this actual local restaurant's current menus to proceed towards a transaction for a delivery of food, a reservation for a meal, and the like. In another example, a character is drinking for a soda bottle. If the viewer has a demonstrated interest in drinks other than soda, the soda bottle may change to be a branded water bottle, a protein-drink, and the like.
  • In FIG. 20, age assumptions 1820 and 1910 of the two viewers may identify a portion 2002 of the content in which the product placement may occur. A first product placement 2004 may be determined based on the first user age assumptions 1810 and online social networking 1812. A second product placement 2008 may be determined based on a second user's social networking 1912 and search activity 1914.
  • The mobile device providing the DSI may be used as an interactive controller, such as a remote control or user input device to interact with the user-specific targeted advertisements. Data inputted by the viewers may be anticipated using predictive algorithms that may take into consideration the user-specific authentication/identification profile that may be retrieved once the mobile DSI is extracted. The range of interactivity may be based on aspects of the user-specific authentication/identification profile corresponding to the extracted mobile DSI. Advertising interactivity may allow a viewer to respond to a television, electronic multimedia display, radio advertisement, and the like via inputting information into the mobile handset which is then wirelessly transmitted to the device controlling the presentation of the advertisement. Another way of connecting the user inputted responses to the interactive advertisement is by interfacing the mobile handset to the device controlling the interactive advertisement through a network such as a cellular network and the Internet. Example use of a mobile handset interacting with an interactive targeted advertisement may include book marking advertisements, referring advertisements to friends, responding to interactive games, polls, chat services, and the like. However, when viewers watch this content, the storefront of the restaurant may change to reflect an actual local restaurant nearby the physical location of the viewers. This may further allow for interactivity which allows the viewer(s) to reference this actual local restaurant's current menus to proceed towards a transaction for a delivery of food, a reservation for a meal, etc
  • User actions may be predicted based on a combination of the presented targeted content, such as an advertisement and aspects of the user-specific authentication/identification profile. In an example, usage data associated with a viewer may indicate that the viewer may be likely to forward relevant content to one or more members of his social network. Based on this usage data and based on the content of the targeted advertisement, a list of likely recipients of the content may be prepared so that the viewer may easily interact through the mobile handset to forward the content to the likely recipients. The list of likely recipients may be based on usage data - such as based on frequency of including one or more recipients in prior forwarded advertisements. The list may be based on an association of aspects of the targeted content to user-specific profiles of users in the viewer's online social network. Many other associations are possible in determining what type of interaction may be predicted for the viewer of targeted advertising.
  • FIG. 21 depicts a mobile handset 202 interacting with an interactive targeted advertisement 2112 by wirelessly transmitting a command 2110 to an internet connected device that may control the presentation of the interactive targeted advertisement 2112. The interactive targeted advertisement 2112 may include interactive portions 2102 and 2104 that maybe configured to present predicted interactions as described herein. The interactive targeted advertisement 2112 may also include one or more interactive portions 2108 that may not be predicted interactions. Alternatively portions 2108 may be based on aspects of the user profile 1804 and may not be interactive.
  • FIG. 22 depicts an internet connected computer 2202 that may receive and present advertisements that are interactive targeted, layered, embedded or a combination of these and the like for a viewer determined on the proximity of mobile handset 202.
  • FIG. 23 depicts an internet connected electronic multimedia display 2302, such as an outdoor display, a window display, a display at a supermarket checkout, a point of sale display, a kiosk (e.g. in an airport), a display in an airplane, a display in a taxi or public transportation, and the like. The interactive electronic multimedia display 2302 may support interactive targeted advertising, gaming, shopping, social networking, and the like. The predictive interactions presented on the electronic multimedia display 2302 may provide opportunities to engage the viewer on a temporary basis, such as when the viewer passes by a store display window, or when the viewer is riding in a taxi, and the like.
  • FIG. 24 depicts flexible electronic presentation media 2402 (flexible active-matrix display modules for ‘take anywhere, read anywhere’ electronic reading), such as products available from Plastic Logic Limited connected to the internet and interacting with a mobile handset 202. In embodiments, the flexible electronic presentation media 2402 may be a handheld, portable replacement for the internet connected electronic multimedia display 2302 depicted in FIG. 23. In the embodiment of FIG. 24, the flexible electronic presentation media 2402 may not include an independent internet connection connected directly to the device 2402 or the device 2402 may use an existing nearby internet connection, such as a WiMax or other cellular Internet connection that is available through the mobile handset 202. The relaying of the Internet connection from a nearby internet-connected device such as the mobile handset may be facilitated through short distance wireless communication (such as WiFi, Bluetooth, WUSB, UWB, and the like) between the device 2402 and the nearby internet-connected device such as the mobile handset. In such a scenario, the content, such as targeted advertisements, presented by the flexible electronic presentation media 2402 may be transmitted from a host 1802 through the internet to the mobile handset 202 and to the media 2402. The features and characteristics described herein that may be associated with more than one mobile handset being detected within a viewing proximity of a device, such as the flexible electronic presentation media 2402 may be applied to the embodiment of FIG. 24.
  • The presentation devices depicted in FIGS. 21-24 may alternatively be audio only playback devices, such as an internet connected radio, digital music player, and the like. Audio content, including audio advertisements may be targeted to be played for a listener within listening range of the device much like advertisements may be targeted to a viewer in appropriate proximity to the presentation devices of FIGS. 21-24. An appropriate proximity may partially be determined by the content being displayed to the presentation device which may further be determined by the capabilities of the internet-enabled device. Interactive targeted audio advertisements may be played and interacted with through the user's mobile handset by providing interactive signals such as an announcement to press a button on the handset.
  • FIG. 25 depicts a timeline of internet interactions or usage that maybe associated with a user so that the cumulative user interaction experience may be applied to targeted advertising and other services through the timeline. In this way, interactions occurring at time 2504 may impact advertising targeting, interaction prediction and the like at times 2508, 2510, and 2512.
  • In FIG. 25, a user engages various Internet-connected devices throughout several periods. The cumulative and real-time nature of the user-specific authentication/identification profiles allows advertisements sent to the user via different platforms to reflect all of the user's past recognized Internet usage activities. In this way, FIG. 25 depicts how a time-sensitive, device-agnostic internet protocol-based reactive relaying advertising platform may operate. The platform may operate so that while a user is watching content on a television, if the user also demonstrates interest in a particular product or product category of a DSI tracking enabled website (e.g. prior to or simultaneously with watching content on a television, an advertisement could be delivered on the television in immediate response to his Internet usage activity. Similarly, if a user is walking past an electronic multimedia display that is equipped with DSI based advertisement delivery technology, the user may receive an advertisement that is derived from information from his Internet usage on his mobile device, such as a website that the user is currently visiting.
  • In the timeline depicted in FIG. 25, at time 2504 a user engages a PC 2502 with the Internet. At time 2508 the user engages a television 2518 with an internet-connected set-top box 2514. Advertisement targeting provided at time 2508 may include usage from time 2504. At time 2510 a user engages his mobile handset 202 and targeted advertising assumes usage from times 2504 and 2508. At time 2512, a user's mobile handset's DSI is wirelessly extracted by an Internet-connected Electronic Display 2520. Targeted ads sent to user at time 2512 may include usage from times 2504, 2508, and 2510. This may be accomplished by host server 210 updating user-specific authentication/id profiles in real-time, such as after every recognized Internet engagement.
  • Referring to FIG. 26, automatic contact information exchange between two individuals via proximate mobile handsets may be supported by the DSI-based methods and systems herein described. A user of a mobile handset 202 may initiate contact information exchange with another individual with a mobile handset 2602 who is located in close proximity to the user. After verifying that the individual wishes to exchange contact information, the two mobile handsets 202 and 2602 may exchange contact information via the short range wireless connection. In embodiments, an initiator 202 my request a receiver 2602 to accept the initiator's contact information. Alternatively, the initiator 202 may request the receiver 2602 to send the initiator 202 the receiver's contact information. Alternatively, the initiator 202 may request the receiver 2602 to mutually swap contact information.
  • Automatic exchange of contact information in the physical person, as described above and in FIG. 26 may be supplemented by uploading the contact information 2604 to a DSI-based authentication required online social networking platform 2608. The online social networking platform 2602 may not require DSI-based authentication. In an example John meets Sarah at a company sponsored networking event, and they exchange contact information. John immediately categorizes Sarah under a “coworkers” group. The next time Sarah signs on to her social network, she will see exactly what John's other contacts under his coworkers group sees, or what he wishes her to see specifically.
  • Enabling Sarah to view only the portions of John's social networking information viewable to his coworkers takes only two steps. A first step may include one of John requesting Sarah for her contact information, John accepting Sarah's request to receiver her contact information, or John and Sarah both accepting a mutual swap of contact information. A second step involves John categorizing Sarah under a pre-made group of coworkers thereby assigning her accessibility rights to his social networking profile.
  • FIG. 27 shows methods and systems for automatic mobile contact information exchange and synchronization with a social network. At a step 2702 a user receives a request for contact information from another user within close physical proximity. A sending handset's DSI may be included in the data packet with the request for contact information exchange. At a step 2704 the receiving mobile user may approve the contact information exchange, in which case the recipient handset DSI may be included in the return data packet. At a step 2708 a social networking profile may be linked to each mobile handset and may be updated to reflect the contact information exchange.
  • Referring to FIG. 28, a method and system of mobile-aware, automatic, mobile social networking may alert a user of individuals who fall into one or more pre-defined social network categories or groups who are in proximity to the user. Short distance wireless communications (e.g. WiFi, Bluetooth, WUSB, or UWB) or GPS/cellular/radio wave triangulation data may be combined with DSI-based authentication/identification to identify a distance between a user and individuals of potential interest and thereby alert a user accordingly. A user who wishes to meet someone of a given background, similar hobbies or interest, or any other pre-defined category can be alerted once he is within a pre-defined physical proximity of such persons, if such persons allow it. Thus, at a step 2802 a handset may emit a mobile DSI via a short-distance protocol. At a step 2804 mobile handset within range may accept a mobile DSI of a nearby handset. At a step 2808 a common social network may check the in-proximity DSIs to determine whether there are matching interests of the handset users and notify the users. At a step 2810 the users may interact, either using the handsets or in a live, in-person interaction.
  • Alerting a user to the presence of a mobile handset user meeting one or more classifications, categorizations, or interest pools may be determined through a DSI based authentication process. In an embodiment, at a step 2802 software executing on a recipient mobile handset that receives a DSI from another mobile handset seeking to be alerted may run a check to see if the user of the seeking mobile handset is of any interest to the recipient. If so, the recipient may acknowledge the DSI by exchanging information such as messages, pictures, current GPS/cellular/radio wave triangulated location, and the like.
  • Referring to FIG. 29, in embodiments a handset may emit a DSI at a step 2902, along with a limited social networking profile. At a step 2904 a recipient handset may accept the mobile DSI and receive the limited profile. At a step 2908 social networking software on the mobile handset may determine whether there is a match between the profile of the first mobile handset and a profile associated with the recipient handset, in which case both users may be notified. At a step 2910 users may interact.
  • Referring to FIG. 30, in an alternative embodiment, social networking management software on a given mobile handset may monitor a GPS/cellular/radio wave triangulated location of surrounding mobile DSI-enabled handsets. The DSI of each of the surrounding mobile handsets and its corresponding social networking profile may be analyzed to determine aspects of the users of the surrounding handsets, such as interest categories, to facilitate the user of the GPS/cellular/radio wave triangulation monitoring device determining if any of the surrounding users may be of particular interest. If so, contact exchange requests may be initiated between the two mobile handsets using the short distance wireless interface or through a network such as text messaging or mobile emails is conducted today.
  • Physical person social networking may be facilitated by software executing on a mobile handset that transmits a limited social networking profile associated with the user of the mobile handset so that it can be received by surrounding mobile handsets. Software running on the surrounding mobile handsets may perform checks against categories, and the like as described above to determine if contact information exchange may be beneficial. If so, requests for contact exchange may be performed between proximate DSI-based mobile handsets as described in reference to FIG. 26.
  • Referring to FIG. 31 and FIG. 32, file-less (non-file based) content that is stamped with a mobile DSI may enable digital rights management for safe content streaming while prohibiting content transfers between mobile handsets or other computing devices. Content to be downloaded to a mobile device may be tagged with signal that represents the mobile DSI of the device to which the download is directed. The tagged content may be directly downloaded into a mobile handset and integrated with the software used to present (playback) the tagged content. The mobile DSI tag representation may be integrated with the content's metadata (or data within the content which is used to describe the content, examples include content title, copyright information, production year, etc). The downloaded tagged content may become an integral part of content that a user-specific authentication/identification profile may access. Because the content is integrated into an adapted playback application on the mobile handset, the tagged downloaded content cannot be moved to another device permanently.
  • Referring to FIG. 33, some access to the tagged content, such as for temporarily streaming to nearby playback devices (e.g. television, PC, another mobile handset) may be provided by the adapted playback software but may include time limitations on access to the content by the receiving device. The receiving or secondary device may upload the mobile DSI through the Internet onto an authentication server for the purposes of verifying if content playback is within the legal limits of its use. In embodiments downloaded protected content cannot be copied from the mobile device and moved somewhere else, but using content playback software the user may stream the content to a more desirable platform or nearby device 3302, such as a nearby larger electronic display (such as a network-enabled television screen), a better audio system, or the like.
  • GPS location, cellular, radio wave triangulation, and other earth surface and near earth location detection techniques may facilitate managing, securing, and targeting content as herein described, and the like. These device location techniques may allow, for example, presentation of targeted advertising on a first device based on a GPS location of a second device, even if the two devices are remote from one another. Therefore, device related information such as a DSI may be collected from a device that is not in range for short haul wireless communication with another device and still allow the DSI and associated user profile information to determine access to and/or targeting for content on the other device. The detection of a user device at a specific GPS location, within a proximity to a GPS location, at one of a range of GPS locations, or when a user is not within a range of GPS locations (for example) may indicate that content may be presented on, delivered to, made accessible to, be stored on, and the like a different networked device. In an example, if a user has entered a room and the user is carrying a GPS enabled mobile device that is in proximity of a short haul wireless communication (ex: Bluetooth) with a display device, however the user has turned off Bluetooth communication in the device, the GPS location of the device could indicate that the user is in proximity to the display and targeted advertising may be presented on the display. In this example, the GPS location is used as an alternate locating method.
  • Using GPS or other device locating methods facilitates devices on separate networks sharing information associated with or contributing to a user-specific authentication/identification profile. In an example, a user may be carrying a GPS enabled mobile phone that is connected only to a cellular communication network. An outdoor display may be connected to a proprietary advertising communication network. The user device GPS information may be transmitted through the cellular network to a server or other network interconnecting facility to eventually reach a computing facility on the proprietary advertising communication network. By associating the user device GPS location with the outdoor display GPS location, targeted advertising (for example) may be presented on the outdoor display. In another example, a user GPS device enabled to provide DSI related information may only be connected to a GPS network. The GPS location of the user device may be communicated from the GPS network as described above so that advertising or other content can be presented to the user. Further in the example, a hiker may carry a GPS locating device that detects and transmits its GPS location over a GPS network. As the hiker approaches a hiking trailhead with an electronic kiosk, the GPS location of the hiker being related to the GPS location of the kiosk may result in a map of the area with trails marked that the hiker has already hiked being displayed. In this way the user-specific authentication/identification profile associated with the GPS device is accessed and associated with a hiking history collected, perhaps automatically, from a GPS device associated with the user profile. Such techniques may also be used for field sales so that sales people can gain access to information related to the location of their mobile device through its GPS location. A sales visitation log may be accessed based on the user-specific authentication/identification profile that is associated with the GPS located device and indicate, perhaps by GPS location, key clients that have not been visited in the current quarter.
  • Device locating techniques such as GPS, cellular/radio signal triangulation, and the like, may be combined with other location information, such as street address to facilitate an association between a user-specific authentication/ identification profile and one or more devices.
  • Therefore GPS and other device physical location information, and other geospatial location information may be associated with, for example, DSI information to facilitate digital rights management, access to content, sharing of content, storing of content, targeting of content, developing a user-specific authentication/identification profile, associating devices to a user-specific authentication/identification profile, associating web surfing and other communication activity (e.g. email, texting, SMS, messaging) with a user history, and the like.
  • Based on recently executed research on the accuracy of GPS, a margin of error associated with a GPS position derived from GPS satellites is typically +/−50 feet. Finer grained proximity data may be derived by examining network latency from one IP enabled device (e.g., mobile handset, laptop, and the like) to another IP enabled media device (e.g., set-top box/IP capable television, and the like). This data may be used to identify user behavior and proximity to IP enabled media devices. A virtual map of a location can be assembled by examining the various latencies in a specific location. For example, network latency analysis may facilitate identifying loose physical boundaries of a location by collecting and analyzing the network latencies around a building or home. This data may be used to facilitate associating detected activity that is associated with network devices (e.g. network activity, movement of a mobile device, dwell time at a fine grained position, and the like) with a user profile. This may further facilitate identifying behavioral traits of the user. . In an example, if a device is determined to be within 30 feet of a television, yet not in the detected “docking position for the device”, the television is turned on, and the content being viewed is consistent with the user's profile based behavior or preferences, it may be reasonable to determine that the user is watching television.
  • Network latency within a specific location can be determined to at least a few tenths of milliseconds. In example, the latency from a wireless laptop to a wireless router within a room is approximately 1.7 milliseconds (based on 64 byte packets). The latency from the same laptop to the same wireless router in an adjoining room may be 1.9 milliseconds. Network changes may be detected by examining historical latency data. Additionally, devices must be considered individually as network latencies can be characteristic of processing speeds of the device. The DSI may facilitate device identification and therefore may further facilitate determining network latency associated with the device. In an example, the CPU of a mobile handheld will typically process network traffic slower than a laptop CPU.
  • FIG. 34 depicts various embodiments of using the methods and systems described herein for geocoding newly created media. The methods and systems described here of device specific identifier, short-haul wireless communication, proximity detection, content communication through a mobile device to a media device, and the like may be associated with automatic geocoding of media created by a media creation or collection device, such as a camera, audio recorder, content generation device, and the like. In particular, GPS location, cellular triangulation, and other near earth location information determination technology and methods may be associated with the above described methods and geocoding. A GPS enabled mobile device may be used in proximity to a media or content creation device as herein described and location related information determined in the mobile device may be associated with the created media or content. At least the mobile device and the media creation device may be connected to a Personal Area Network (PAN) that may be a wireless short-haul network or a wired network of a combination thereof. The location information may be associated with the created content by transferring the location information from the mobile device to the media creation device contemporaneously with the creation of the media or content for geocoding the created media. Alternatively, the created content may be transferred from the media creation device through the mobile device, taking advantage of the mobile device network connection (e.g. WiFi, and the like) and the transferred content may be geocoded with the device determined location. The transferred geocoded content may be stored in a network accessible remote data store or database. Yet in another alternative, both the location information and the created content may be transferred to a network connected device through a short-haul wireless (or wired) connection to a network enabled device for geocoding and network communication of the newly created geocoded content, such as for storing the geocoded content in a network accessible, remote data store or database.
  • In the alternative configurations that involve the media creation device transmitting non-geocoded media to a location aware device where geocoding is executed, software to associate the newly created content with the geo-location would potentially reside on the location aware device rather than on the media creation device. This facilitates current technology media creation devices, such as digital cameras, and the like to participate in creating geocoded media without adaptation.
  • In yet another alternative embodiment, the newly created content may be transferred without a geocode over the PAN to a mobile device that supports GPS or other location determination methods. Both the location information and the transferred created media may be individually sent to a common remote server by the mobile device via the mobile device's internet connection. Merging of the location information with the created media (to produce geocoded media) may be performed by the server or other networked processor.
  • Geocoded content that is produced using the methods described herein and other equivalent PAN-based approaches may be identified so that the initial geocoding and/or subsequent use or access to this geocoded content may facilitate collection of a royalty for the use of thereof. In an example, when a search engine delivers content geocoded as herein described, a royalty may be payable for presentation of the geocoded content to a user. This and other royalty collection techniques associated with presentation of geocoded media (or variations thereof (e.g. thumbnail image) are hereby included in the scope of the methods and systems of this specification. In another example, a content provider may provide content that has been created using the geocoding methods and systems herein described. The content may be owned by a third party. The content provider may be required to pay a royalty to both the content owner and to the geocoding facilitator for the use of the content.
  • FIG. 35 depicts a real world wireless device identification dwell event in which wireless identification facilities, such as an RFID device (e.g. chip), WiFi device (e.g. chip) , other wireless components and the like are being used throughout consumer and business commerce for identification/categorization of physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store, and the like even when such aforementioned products, product categories, and environments are not readily visible or easily accessible. In as much as a product in a shipping container may be identified/categorized through an RFID/WiFi or other potential wireless identification/categorization-enabling signal, the RFID/WiFi or other potential wireless identification/categorization-enabling signal of a product on display in a store front window may be detected by a mobile handset's embedded wireless components as a user of the mobile handset walks past the window at certain proximity ranges. A measure of user interest in the given product may be estimated based on a measure of dwell time of the mobile handset remaining in certain proximities to the RFID/WiFi or other potential wireless identification/categorization-enabling signal. By recording data associated with a RFID/WiFi or other potential wireless identification/categorization-enabling signal identifying/categorizing physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store, and the like as such signals are received by a user's mobile handset, and using similar data from other similar events, it may be possible to determine or enhance an understanding of the mobile handset owner's user behavior with respect to the physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store, and the like associated with the RFID/WiFi or other potential wireless identification/categorization-enabling signal and combine it with the given consumer's user-specific authentication/identification profile. In an example, a store front may have five products in a store window, each generating its own RFID/WiFi or other potential wireless identification/categorization-enabling signal. As a user moves along the window, the dwell time associated with each RFID/WiFi or other potential wireless identification/categorization-enabling signal that is detected by the user's mobile handset can be measured and captured, such as through the embedded wireless capabilities supported by the mobile handset of the user. Much like a user's internet browsing behavior can be determined by analyzing data associated with measured web page, content viewing, and associated interaction dwell time, the measured dwell time associated with each RFID/WiFi or other potential wireless identification/categorization-enabling signal may be used to estimate a user's ‘real-world’ preferences, interests, and other behavioral aspects.
  • The raw data, and/or data derived from an analysis of the data may be associated with a user-specific authentication/identification profile that may be associated with the mobile handset, such as through the DSI of the mobile handset. Further, the user-specific authentication/identification profile may be associated with several other mobile and non-mobile devices and those devices' associated DSIs.
  • When combined with location specific information, such as GPS coordinates of the mobile handset during the measured dwell time, it may be possible to associate a dwell event with a retailer or other provider of the product or feature that characterizes the dwell event. By associating this information together, it is possible to determine which physical retail store, physical product, services offered or marketed, product category or aisle in a retail store, and the like the user may be interested in. In an example, a user may access the internet through a networked device, such as a set-top box, and may search for retailers in their area for a product. This information may be recorded or analyzed and data derived from the analysis of this internet access event may be associated with the user's authentication/identification profile. The user may, before or after the internet access event, visit the retailer and shop for the product (a dwell event) associated with the internet access event. Such actions may be determined by comparing the data aggregated from the RFID/WiFi or other potential wireless identification/categorization-enabling signal collected by the embedded wireless components of the mobile handset of the user with the given user's historical internet behavior which together, in turn, may be associated with the given user's user-specific authentication/identification profile.
  • Based on an analysis of the data from the dwell event, it may be possible to conclude that the user did not acquire the item at the retailer (e.g. the dwell event occurred within the location of the store), or that the user did acquire the item (e.g. the dwell event started within the location of the store and continued outside the store, such as to the user's home or the dwell event was initiated within an aisle of the store and the given item's RFID/WiFi or other potential wireless identification/categorization-enabling signal was utilized to deem the given item as purchased within the store's POS [point-of-sales] area. Based on this analysis, it may be possible to target content, such as advertisements. This targeting of content may be used when the user is consuming networked content such as video, audio, digital print, potentially through an Internet Protocol network. If it is determined that the user did not purchase the item at the retailer, information about the availability and price of the item at other local retailers or electronic, or online retailers may be delivered to the user's mobile handset. Alternatively, the user may receive an email, text message, or other electronic offer and the like with an invitation to purchase the item through the internet or alternative physical retail location (presumably at a cost lower than the most recent physical retailer from which the given item's RFID/WiFi or other potential wireless identification/categorization-enabling signal and associated item detail/pricing information was first received by the user's mobile handset's embedded wireless components and associated capabilities).
  • Users often shop together; therefore it is possible to associate two user-specific authentication/identification profiles with RFID/WiFi or other potential wireless identification/categorization-enabling signals associated with physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store and the like. By analyzing other behaviors and actions associated with the two users (e.g. by analyzing data associated with each user's user-specific authentication/identification profile), it may be further possible to determine users with a genuine interest in purchasing products or services.
  • In an example of this real-world dwell event, short distance wireless communication between a mobile handset and a wireless identifier representing physical goods, services, retail environments, etc., such as a RFID/WiFi or other potential wireless identification/categorization-enabling signals associated with physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store and the like (e.g. a UPC or other serialized identifier, and the like) may take place. The mobile handset may upload the data specific to a RFID/WiFi or other potential wireless identification/categorization-enabling signals associated with physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store to a data store. Through an associative process, the signal-specific data may be matched to physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store, and the like and thus be used to facilitate the determining of ‘real world’ behavioral data of the mobile handset user. This behavioral data can then be aggregated and further refined to be incorporated into a user-specific authentication/identification profile which may be associated with at least the DSI of the mobile handset which may further be tied to the DSI of several networked devices such as personal computers, televisions, audio devices, digital print devices, which in turn, may be connected to an electronic network such as an Internet Protocol network.
  • The methods and systems described in this document and the referenced documents include many possible alternate combinations for the described methods and systems, such as wireless protocols and/or device-specific identifications. In an example, utilizing a device's MAC address, which is a standard unique identification assigned to every WiFi/WiMax adapter and Ethernet card (fixed—for facilitating a wired broadband internet connection) as a basis for a device-specific identification (DSI) in a wireless protocol is one alternative combination. In this example, another alternative may include the wireless protocol being based on Bluetooth, WUSB, UWB, and the like, instead of being based on WiFi/WiMax/Ethernet connection which may or may not require a different DSI.
  • In the various embodiments of the methods and systems disclosed herein, various technologies may be employed. In certain preferred embodiments, the methods and systems disclosed herein identify and/or authenticate use of Internet-connected devices (mobile handsets - including cellular phones), PCs/laptops, television set-top boxes, Internet-connection capable televisions, and the like) using, primarily but not limited to, a variety of device-specific identification (DSI) types and techniques associated with various wireless protocols. This objective may be associated with WiFi and WiMax (both of which may utilize MAC addresses), WUSB (Wireless USB), UWB (Ultra-wide Band), Bluetooth (e.g. Bluetooth 3.0), and other forms of device-specific identifiers. Other forms of DSI may be derived from an identification not necessarily associated with a wireless protocol.
  • The methods and systems herein may facilitate building privacy-sensitive and device-specific user identification and/or authentication profiles. The methods and systems may allow aggregation of various DSIs that belong to a number of different devices that may include any combination of devices (i.e. 1 mobile handset, 1 PC, 1 set-top box and 2 laptops OR 2 mobile handsets, 3 PCs, 1 laptop, 1 internet-connection capable television etc.) and may tie it to specific users WITHOUT necessarily revealing a given user's “real world” identity (e.g. to non-affiliated third parties). A mobile handset's DSI is an example of a source of DSI used in the creation of identification/authentication profiles. The mobile handset's DSI may be the primary or base DSI associated with the identification/authentication profile. Other device DSIs may become associated with a profile based on usage from those devices being associated with the usernames/surfing habits associated with the mobile handset's DSI.
  • The methods and systems herein provide mechanisms that may transparently monitor the flow of device-specific or profile-specific information, such as a user-profile, while enabling a user's “real world” identity to be scrambled or encrypted (herein referred to as morphed) such that providers or facilitators who have access to the communications within the process would be not be capable of deriving the user's real world identity. Such morphing of real world identities may occur by creating unique algorithms that scramble a DSI or username-specific profile as the information associated with that profile is transferred from a partner's server (a partner may include but is not limited to internet search and content companies such as Google, MySpace, internet email sites such gmail.com or mail.yahoo.com, retail websites such as Amazon.com, and the like.)
  • User-specific identification and/or authentication profiles may be utilized for, but not limited to targeted advertising. Targeted advertising may include delivering targeted advertising across various media forms including but not limited to internet websites, television, internet television, outdoor advertising, mobile handset advertising, portable LCD-advertising, Internet radio, and the like. Mechanisms for delivering targeted advertisements across each media form may vary but may benefit from the core concepts of the methods and systems herein.
  • The methods and systems herein may facilitate creating content authentication and management systems or digital rights management systems using a mobile DSI, such as authenticating and managing access rights to and management of content (e.g. free content or content provided for a fee) and Internet software-as-a-service information content such as Lexis Nexus, Gartner, IDC, digital textbooks, and other digital media/digital information providers that grant conditional access (for payment, or otherwise).
  • In regards to digital rights management/content authentication, due to a mobile device's individual specific nature and its portability, a mobile DSI may provide a higher level of accuracy and flexibility than using a system in which access to content is tied to a particular PC/laptop, set-top box, and the like. The latter is a system that is commonly used in many current digital rights management schemes. Through the methods and systems herein described, a user may essentially carry all of his online digital rights with him as it is rooted in a DSI from his mobile handset. Although content may be exchanged with the user's mobile handset through other devices, (e.g. a set top box, PC/laptop, television, kiosk, external advertising device, and the like), the mobile handset DSI provides the means for authentication—independent of any other device in the content transfer chain. This is beneficial in that the other device(s) in the content transfer chain may have multiple users, may not be secure, may not support digital rights management and most importantly may be stationary in its location and thus not allowing the authenticated user to carry his digital rights with him. Make the comparison to a DVD? You bought it so you can take it with you. Not being able to do that for digital content is a step backwards, not forward. In such a system, if a user attempts to access a Mobile DSI-protected online account through a PC/laptop, or other internet-connected device, short distance communication would take place between the user's mobile handset and the internet-connected device at which point the user's mobile DSI would be passed to internet servers for authentication. The server at which the protected account exists may then attempt to match an entered username/password combination against a pre-registered mobile DSI. The username/password may be collected at the time a user's account is registered or at the time of an update/replacement of a mobile DSI for the user's account). If the username/password combination matches up with the mobile DSI, then the user will be granted access to the mobile DSI-protected account. If the mobile DSI does not match the username/password of the account, the user will not be granted access. Standard mechanisms for lost passwords or for resetting a password may also be applied, such as the use of pre-registered secret password questions.
  • Mobile handsets provide a variety of device-specific identification types on which a DSI may be based. A mobile handset that is WiFi or WiMax enabled will have a MAC address, this MAC address may serve as a DSI. A mobile handset that is Bluetooth-enabled will have a Bluetooth Device Address. This Bluetooth Device Address may serve as a DSI. A unique identification, potentially a serial code that identifies a mobile handset's central processing unit (CPU) may serve as a DSI. A unique identification, potentially a serial code, that identifies a mobile handset's WUSB (wireless USB) or UWB (Ultra Wide-band) chipset may serve as a DSI. A mobile telephone number that is used to dial a voice connection or send a TXT message to a mobile handset may serve as a DSI. GSM phones use the International Mobile Equipment Identity or IMEI that may serve as a DSI. CDMA phones use Mobile Equipment Identifiers or MEIDs that may serve as a DSI. Other similar device-specific identifications that are unique to a single physical mobile handset may serve as a mobile DSI.
  • When connected wired or wirelessly, PC/laptops may contribute device-specific information that may be used as a basis for a DSI. A PC/laptop that has a fixed wired connection via an Ethernet card will have a MAC address, this MAC address may serve as a DSI. A PC/laptop that is WiFi or WiMax enabled will have a MAC address, this MAC address may serve as a DSI. A PC/laptop that is Bluetooth-enabled will have a Bluetooth Device Address. This Bluetooth Device Address may serve as a DSI. A unique identification, potentially a serial code, which identifies a PC/laptop's central processing unit (CPU), may serve as a DSI. A unique identification, potentially a serial code, which identifies a PC/laptop's WUSB (wireless USB) or UWB (Ultra Wide-band) connection, may serve as a DSI.
  • Other consumer electronic devices that can be connected to an electronic network such as the Internet may also have DSI. If the consumer electronic device is capable of accessing an electronic network such as the Internet, it may do so using a wired Ethernet connection using a Ethernet card, or a wireless connection using a WiFi/WiMax connection, in both such scenarios, the device should have a MAC address that will be used as its DSI>. Examples of such consumer electronic devices capable of being connected to an electronic network include Television set-top boxes, Televisions, LCDs fixated outdoors, within retail stores, taxi cabs, other public transportation, Radio devices that are Internet-enabled, car radio devices that are Internet-enabled, and the like. These other consumer electronic devices may use many of the same or similar DSIs as mentioned above for mobile handsets or PCs/laptops including the MAC address as a DSI if it's available.
  • The role of MAC addresses in Internet protocol v4 and v6 may require unique treatment. In Internet Protocol version 4, or IPv4, the IP Address of a given device is 32 bits long and is assigned without embedding the device's unique, permanent, MAC-address. However, In IPv6, the MAC-address of a device is intended to be embedded into a device's IP Address.
  • Public sources of information regarding the difference of the IPv6 address and its relevance to MAC-addresses describe IPv6 addresses as typically composed of two logical parts: a 64-bit sub-network prefix, and a 64-bit host part, which is either automatically generated from the interface's MAC address or assigned sequentially. Because the globally unique MAC addresses offer an opportunity to track user equipment, and so users, across time and TPv6 address changes, RFC 3041 (http://tools.ietforg/html/rfc3041) was developed to reduce the prospect of user identity being permanently tied to an TPv6 address, thus restoring some of the possibilities of anonymity existing at IPv4. RFC 3041 (http://tools.ietforg/html/rfc3041) specifies a mechanism by which time-varying random bit strings can be used as interface circuit identifiers, replacing unchanging and traceable MAC addresses
  • In IPv6, the possibility arises, that since the IP address includes the MAC address, that the IP address may become an easier and quicker way to derive a device-specific identification. The methods and systems herein support methodologies using IPv6 and IPv4. In particular an IPv6 IP Address or a MAC-address suited for IPv6 may facilitate determining and using a DSI. It is anticipated that while IPv4 is the popular standard today, a transition to IPv6 is imminent.
  • Targeted television advertising may be associated with personal devices, such as through mobile DSI-enabled identification or with mobile device internet browser cache/history content. Advertisement targeting may be improved through the use of mobile DSI device detection within proximity of a front of a television. Mobile DSI, as herein described, may uniquely identify an individual through an association of a user profile with the Mobile DSI. By detecting a mobile device (through Mobile DSI detection) that is positioned within viewing distance of a television and identifying advertisements targeted to the user of the detected mobile device, the targeted advertisement may be presented to the television, or a set-top box controlling the television, and displayed for the user. The advertisement may be targeted based on a variety of factors associated with the mobile DSI including a user profile associated with the mobile DSI.
  • Advertisements may be targeted to and presented to a user based on the user's mobile DSI through a process that includes: gathering the device identifier or device-specific identification (DSI) from the user's mobile device, associating the gathered DSI with a user identity to provide a usage profile that may include usage tracking of content interaction through the mobile device and other internet enabled devices, using the usage profile to identify an advertisement or offer, determining which screen provides a good proximity to the user based on the relative distance of the user's mobile DSI device from a screen, and displaying the advertisement or offer on the screen.
  • Alternatively in the methods and systems, PC and/or laptops can have wired connections, whereas for mobile devices this is typically not the case. As such, referring to a wire connected PC/laptop MAC address is the equivalent of a wireless PC/Laptop/Mobile Handset's WiFi MAC address. As a result of such considerations, in the following described processes and diagrams, device-specific identifications, including those which are associated with wired or wireless technologies, are collectively referred to as DSIs.
  • The elements depicted in flow charts and block diagrams throughout the figures imply logical boundaries between the elements. However, according to software or hardware engineering practices, the depicted elements and the functions thereof may be implemented as parts of a monolithic software structure, as standalone software modules, or as modules that employ external routines, code, services, and so forth, or any combination of these, and all such implementations are within the scope of the present disclosure. Thus, while the foregoing drawings and description set forth functional aspects of the disclosed systems, no particular arrangement of software for implementing these functional aspects should be inferred from these descriptions unless explicitly stated or otherwise clear from the context.
  • Similarly, it will be appreciated that the various steps identified and described above may be varied, and that the order of steps may be adapted to particular applications of the techniques disclosed herein. All such variations and modifications are intended to fall within the scope of this disclosure. As such, the depiction and/or description of an order for various steps should not be understood to require a particular order of execution for those steps, unless required by a particular application, or explicitly stated or otherwise clear from the context.
  • The methods or processes described above, and steps thereof, may be realized in hardware, software, or any combination of these suitable for a particular application. The hardware may include a general-purpose computer and/or dedicated computing device. The processes may be realized in one or more microprocessors, microcontrollers, embedded microcontrollers, programmable digital signal processors or other programmable device, along with internal and/or external memory. The processes may also, or instead, be embodied in an application specific integrated circuit, a programmable gate array, programmable array logic, or any other device or combination of devices that may be configured to process electronic signals. It will further be appreciated that one or more of the processes may be realized as computer executable code created using a structured programming language such as C, an object oriented programming language such as C++, or any other high-level or low-level programming language (including assembly languages, hardware description languages, and database programming languages and technologies) that may be stored, compiled or interpreted to run on one of the above devices, as well as heterogeneous combinations of processors, processor architectures, or combinations of different hardware and software.
  • Thus, in one aspect, each method described above and combinations thereof may be embodied in computer executable code that, when executing on one or more computing devices, performs the steps thereof. In another aspect, the methods may be embodied in systems that perform the steps thereof, and may be distributed across devices in a number of ways, or all of the functionality may be integrated into a dedicated, standalone device or other hardware. In another aspect, means for performing the steps associated with the processes described above may include any of the hardware and/or software described above. All such permutations and combinations are intended to fall within the scope of the present disclosure.
  • While the invention has been disclosed in connection with the preferred embodiments shown and described in detail, various modifications and improvements thereon will become readily apparent to those skilled in the art. Accordingly, the spirit and scope of the present invention is not to be limited by the foregoing examples, but is to be understood in the broadest sense allowable by law.
  • All documents referenced herein are hereby incorporated by reference.

Claims (19)

1. A method comprising:
using a personal device to detect a proximity of a wireless device identifier;
determining a duration of the detected proximity;
generating a measure of real-world behavior by associating the detected wireless device identifier with at least one of a real world product, service, product category, retail store isle, and retail store; and
updating a usage profile that is associated with a user of the personal device with the real world behavior.
2. The method of claim 1, wherein the wireless device identifier includes at least one of an RFID device and a WiFi device.
3. The method of claim 1, wherein updating a usage profile includes using a device specific identifier associated with the personal device to determine the usage profile to update.
4. The method of claim 1, wherein the measure of real world behavior includes GPS location data received from the personal device.
5. A method comprising:
detecting a proximity of a personal device to a plurality of wireless device identifiers;
determining a duration of proximity for each of wireless device identifiers, providing a dwell event for each of the plurality of wireless device identifiers; and
analyzing the plurality of dwell events and a usage profile associated with a user of the personal device to determine a measure of user interest in an item associated with at least one of the plurality of wireless device identifiers.
6. The method of claim 5, further including facilitating delivering to the personal device an offer based on the measure of user interest.
7. The method of claim 5, wherein a device specific identifier of the personal device is used to identify the usage profile for analysis.
8. The method of claim 5, wherein the usage profile includes usage data associated with a plurality of network-enabled devices.
9. The method of claim 5 wherein the dwell event includes GPS location data received from the personal device.
10. The method of claim 9, wherein the GPS location data is used to determine a retailer associated with the wireless device identifiers.
11. The method of claim 5, wherein the measure of user interest indicates the user has acquired the item.
12. A method comprising:
receiving dwell even data representing a real-world proximity of a plurality of personal devices to a wireless device identifier;
using a device specific identifier associated with each of the plurality of personal devices to identify a usage profile of a user of each of the personal devices;
comparing the dwell event data with each usage profile to determine a measure of user interest in an item associated with the wireless device identifier; and
updating each usage profile based on the measure of user interest.
13. The method of claim 12, wherein substantially identical dwell event data for a first personal device and a second personal device results in a measure of user interest for a user associated with the first device that is different from a measure of user interest for a user associated with the second device, wherein the difference in user interest is provided by comparing the dwell even data with each of the usage profile of the first device and the usage profile of the second device.
14-36. (canceled)
37. The method of claim 12, further including facilitating delivering to at least one of the plurality of personal devices an offer based on the measure of user interest.
38. The method of claim 12, wherein the usage profiles include usage data associated with a plurality of network-enabled devices.
39. The method of claim 12, wherein the dwell event data includes GPS location data received from the personal device.
40. The method of claim 39, wherein the GPS location data is used to determine a retailer associated with the wireless device identifiers.
41. The method of claim 12, wherein the measure of user interest indicates the user has acquired the item.
US12/357,295 2006-09-14 2009-01-21 Real world behavior measurement using identifiers specific to mobile devices Abandoned US20090298514A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US12/357,295 US20090298514A1 (en) 2006-09-14 2009-01-21 Real world behavior measurement using identifiers specific to mobile devices
US13/594,360 US20120323685A1 (en) 2006-09-14 2012-08-24 Real world behavior measurement using identifiers specific to mobile devices
US13/651,097 US9445353B2 (en) 2006-09-14 2012-10-12 Presence platform for passive radio access network-to-radio access network device transition
US13/904,151 US9204376B2 (en) 2006-09-14 2013-05-29 Profile based passive network switching

Applications Claiming Priority (11)

Application Number Priority Date Filing Date Title
US82570806P 2006-09-14 2006-09-14
US11/855,122 US20080108308A1 (en) 2006-09-14 2007-09-13 Methods and systems for using mobile device specific identifiers and short-distance wireless protocols to manage, secure and target content
USPCT/US07/78519 2007-09-14
PCT/US2007/078519 WO2008034072A2 (en) 2006-09-14 2007-09-14 Methods and systems for using mobile device specific identifiers and short-distance wireless protocols to manage, secure and target content
US11/855,820 US20080133327A1 (en) 2006-09-14 2007-09-14 Methods and systems for securing content played on mobile devices
US11/855,685 US20080109888A1 (en) 2006-09-14 2007-09-14 Methods and systems for securing content projected to a nearby device
US11/855,811 US20080220760A1 (en) 2006-09-14 2007-09-14 Methods and systems for usage profiling associated with device specific identifiers
US11/925,967 US20080109307A1 (en) 2006-09-14 2007-10-28 Methods and systems for securing content played on mobile devices
US2248308P 2008-01-21 2008-01-21
US3021408P 2008-02-20 2008-02-20
US12/357,295 US20090298514A1 (en) 2006-09-14 2009-01-21 Real world behavior measurement using identifiers specific to mobile devices

Related Parent Applications (4)

Application Number Title Priority Date Filing Date
US11/855,122 Continuation-In-Part US20080108308A1 (en) 2006-09-14 2007-09-13 Methods and systems for using mobile device specific identifiers and short-distance wireless protocols to manage, secure and target content
US11/855,685 Continuation-In-Part US20080109888A1 (en) 2006-09-14 2007-09-14 Methods and systems for securing content projected to a nearby device
US11/925,967 Continuation-In-Part US20080109307A1 (en) 2006-09-14 2007-10-28 Methods and systems for securing content played on mobile devices
US12/238,830 Continuation-In-Part US20090083899A1 (en) 2007-09-26 2008-09-26 Harness For Holding The Distal End Of A Pant Leg In Place

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US13/594,360 Continuation US20120323685A1 (en) 2006-09-14 2012-08-24 Real world behavior measurement using identifiers specific to mobile devices
US13/651,097 Continuation US9445353B2 (en) 2006-09-14 2012-10-12 Presence platform for passive radio access network-to-radio access network device transition

Publications (1)

Publication Number Publication Date
US20090298514A1 true US20090298514A1 (en) 2009-12-03

Family

ID=41380469

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/357,295 Abandoned US20090298514A1 (en) 2006-09-14 2009-01-21 Real world behavior measurement using identifiers specific to mobile devices
US13/594,360 Abandoned US20120323685A1 (en) 2006-09-14 2012-08-24 Real world behavior measurement using identifiers specific to mobile devices
US13/904,151 Expired - Fee Related US9204376B2 (en) 2006-09-14 2013-05-29 Profile based passive network switching

Family Applications After (2)

Application Number Title Priority Date Filing Date
US13/594,360 Abandoned US20120323685A1 (en) 2006-09-14 2012-08-24 Real world behavior measurement using identifiers specific to mobile devices
US13/904,151 Expired - Fee Related US9204376B2 (en) 2006-09-14 2013-05-29 Profile based passive network switching

Country Status (1)

Country Link
US (3) US20090298514A1 (en)

Cited By (149)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070219866A1 (en) * 2006-03-17 2007-09-20 Robert Wolf Passive Shopper Identification Systems Utilized to Optimize Advertising
US20080109307A1 (en) * 2006-09-14 2008-05-08 Shah Ullah Methods and systems for securing content played on mobile devices
US20090070434A1 (en) * 1999-07-15 2009-03-12 Himmelstein Richard B System and method for efficiently accessing internet resources
US20100097214A1 (en) * 2008-10-22 2010-04-22 Embarq Holdings Company, Llc System and method for monitoring a location
US20100151821A1 (en) * 2008-12-11 2010-06-17 Embarq Holdings Company, Llc System and method for providing location based services at a shopping facility
US20100153200A1 (en) * 2004-08-02 2010-06-17 Consumer And Merchant Awareness Foundation Pay yourself first with automated data input
US20100174645A1 (en) * 2004-08-02 2010-07-08 Consumer And Merchant Awareness Foundation Pay yourself first with user guidance
US20100198724A1 (en) * 2004-08-02 2010-08-05 Consumer And Merchant Awareness Foundation Pay yourself first with community knowledge
US20100241514A1 (en) * 2009-03-17 2010-09-23 Microsoft Corporation Automated provision of user feedback
US20100284389A1 (en) * 2008-01-07 2010-11-11 Max Ramsay Systems and methods for providing a media playback in a networked environment
US20100299252A1 (en) * 2000-11-06 2010-11-25 Consumer And Merchant Awareness Foundation Pay yourself first with revenue generation
US20110136442A1 (en) * 2009-12-09 2011-06-09 Echostar Technologies Llc Apparatus and methods for identifying a user of an entertainment device via a mobile communication device
US20110173337A1 (en) * 2010-01-13 2011-07-14 Oto Technologies, Llc Proactive pre-provisioning for a content sharing session
US20110192901A1 (en) * 2000-10-20 2011-08-11 Michael Dearing Rf point of sale and delivery method and system using communication with remote computer and having features to read a large number of rf tags
US20110231483A1 (en) * 2010-03-19 2011-09-22 Neil Alexander Derraugh System, method and computer program for delivery of targeted invitations to participate in market research, based on observed geospatial behaviour
US20110315766A1 (en) * 2007-03-16 2011-12-29 Phillips Travis A Rfid reader enclosure and man-o-war rfid reader system
US20120047549A1 (en) * 2010-08-20 2012-02-23 At&T Intellectual Property I, L.P. System for establishing communications with a mobile device server
US20120146918A1 (en) * 2010-12-08 2012-06-14 At&T Intellectual Property I, L.P. Remote Control of Electronic Devices Via Mobile Device
US8231053B2 (en) 2000-10-20 2012-07-31 Promega Corporation Radio frequency identification method and system of distributing products
US20120246024A1 (en) * 2011-03-23 2012-09-27 Bank Of America Self-service home buying
WO2013025586A2 (en) * 2011-08-15 2013-02-21 Bank Of America Corporation Apparatus and method for performing session validation
US20130054758A1 (en) * 2011-08-30 2013-02-28 Allure Energy, Inc. Customer engagement platform and portal having multi-media capabilities
US20130085851A1 (en) * 2011-09-30 2013-04-04 At&T Intellectual Property I, L.P. Targeted Advertising of Products Shown in Media Content
US8428620B2 (en) 2009-04-22 2013-04-23 Centurylink Intellectual Property Llc Mass transportation service delivery platform
US8438285B2 (en) 2010-09-15 2013-05-07 At&T Intellectual Property I, L.P. System for managing resources accessible to a mobile device server
US8443420B2 (en) 2010-10-01 2013-05-14 At&T Intellectual Property I, L.P. System for communicating with a mobile device server
US8452797B1 (en) * 2011-03-09 2013-05-28 Amazon Technologies, Inc. Personalized recommendations based on item usage
US8468164B1 (en) * 2011-03-09 2013-06-18 Amazon Technologies, Inc. Personalized recommendations based on related users
US20130160087A1 (en) * 2011-09-24 2013-06-20 Elwha LLC, a limited liability corporation of the State of Delaware Behavioral fingerprinting with adaptive development
US8473380B2 (en) 2000-11-06 2013-06-25 Propulsion Remote Holdings, Llc Pay yourself first budgeting
US20130166385A1 (en) * 2011-12-22 2013-06-27 James Neil Russell Event Location with Social Network Integration
US20130171960A1 (en) * 2011-12-29 2013-07-04 Anil Kandregula Systems, methods, apparatus, and articles of manufacture to measure mobile device usage
US8504449B2 (en) 2010-10-01 2013-08-06 At&T Intellectual Property I, L.P. Apparatus and method for managing software applications of a mobile device server
EP2624193A1 (en) * 2012-02-03 2013-08-07 RapidBlue Solutions Oy Method and system for monitoring spatial positions of a user at retailing premises
US8509816B2 (en) * 2011-11-11 2013-08-13 International Business Machines Corporation Data pre-fetching based on user demographics
US8516039B2 (en) 2010-10-01 2013-08-20 At&T Intellectual Property I, L.P. Apparatus and method for managing mobile device servers
US20130227388A1 (en) * 2012-02-28 2013-08-29 Microsoft Corporation Persistent Storage of Profile Data for Script Compilation
US20130238426A1 (en) * 2012-03-06 2013-09-12 Verizon Patent And Licensing Inc. Providing advertisements via multiple devices
US8538874B2 (en) 2004-02-06 2013-09-17 Propulsion Remote Holdings, Llc Pay yourself first with auto bill pay system and method
US20130262184A1 (en) * 2012-03-30 2013-10-03 Arbitron Inc. Systems and Methods for Presence Detection and Linking to Media Exposure Data
US20130279715A1 (en) * 2007-01-22 2013-10-24 Jook, Inc. Profile management method and system
US8572724B2 (en) 2011-08-15 2013-10-29 Bank Of America Corporation Method and apparatus for network session validation
US8572687B2 (en) 2011-08-15 2013-10-29 Bank Of America Corporation Apparatus and method for performing session validation
US8572686B2 (en) 2011-08-15 2013-10-29 Bank Of America Corporation Method and apparatus for object transaction session validation
US8572690B2 (en) 2011-08-15 2013-10-29 Bank Of America Corporation Apparatus and method for performing session validation to access confidential resources
US8572688B2 (en) 2011-08-15 2013-10-29 Bank Of America Corporation Method and apparatus for session validation to access third party resources
US8584201B2 (en) 2011-08-15 2013-11-12 Bank Of America Corporation Method and apparatus for session validation to access from uncontrolled devices
US8601541B2 (en) 2011-08-15 2013-12-03 Bank Of America Corporation Method and apparatus for session validation to access mainframe resources
US8610546B2 (en) 2010-10-01 2013-12-17 At&T Intellectual Property I, L.P. System for selecting resources accessible to a mobile device server
US20140004940A1 (en) * 2011-12-09 2014-01-02 Alexander D. Wissner-Gross Providing Recreation and Social Activities in Retail Environments
US20140033312A1 (en) * 2008-11-15 2014-01-30 Adobe Systems Incorporated Methods and systems for distributing right-protected asset
US8655693B2 (en) 2009-07-08 2014-02-18 Centurylink Intellectual Property Llc System and method for automating travel related features
US8688980B2 (en) 2011-09-24 2014-04-01 Elwha Llc Trust verification schema based transaction authorization
US8713704B2 (en) 2011-09-24 2014-04-29 Elwha Llc Behavioral fingerprint based authentication
US20140123249A1 (en) * 2012-10-31 2014-05-01 Elwha LLC, a limited liability corporation of the State of Delaware Behavioral Fingerprinting Via Corroborative User Device
US20140129487A1 (en) * 2011-07-15 2014-05-08 Omron Corporation Information processing device and method, attention level-calculating device, and computer readable medium
US8726339B2 (en) 2011-08-15 2014-05-13 Bank Of America Corporation Method and apparatus for emergency session validation
US8752157B2 (en) 2011-08-15 2014-06-10 Bank Of America Corporation Method and apparatus for third party session validation
US20140187268A1 (en) * 2012-12-28 2014-07-03 Arbitron Inc. Apparatus, System and Method for Location Detection and User Identification for Media Exposure Data
US20140228055A1 (en) * 2007-06-11 2014-08-14 Broadcom Corporation Smart Phone to Home Gateway/STB Data Exchange for Content Delivery
US20140282684A1 (en) * 2010-06-22 2014-09-18 LlVETV, LLC Registration of a personal electronic device (ped) with an aircraft ife system using a ped generated registration identifier and associated methods
US20140282877A1 (en) * 2013-03-13 2014-09-18 Lookout, Inc. System and method for changing security behavior of a device based on proximity to another device
US8850515B2 (en) 2011-08-15 2014-09-30 Bank Of America Corporation Method and apparatus for subject recognition session validation
US8869241B2 (en) 2011-09-24 2014-10-21 Elwha Llc Network acquired behavioral fingerprint for authentication
US8874899B1 (en) * 2011-01-13 2014-10-28 Sprint Communications Company L.P. Premium services authentication
US8989055B2 (en) 2011-07-17 2015-03-24 At&T Intellectual Property I, L.P. Processing messages with a device server operating in a telephone
US20150088739A1 (en) * 2002-10-31 2015-03-26 C-Sam, Inc. Life occurrence handling and resolution
US9015860B2 (en) 2011-09-24 2015-04-21 Elwha Llc Behavioral fingerprinting via derived personal relation
JP2015515664A (en) * 2012-03-02 2015-05-28 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited Method and apparatus for user recognition and information distribution
US9066123B2 (en) 2010-11-30 2015-06-23 At&T Intellectual Property I, L.P. System for monetizing resources accessible to a mobile device server
US9083687B2 (en) 2011-09-24 2015-07-14 Elwha Llc Multi-device behavioral fingerprinting
US20150199547A1 (en) * 2014-01-11 2015-07-16 Federico Fraccaroli Method, system and apparatus for adapting the functionalities of a connected object associated with a user id
US9112944B2 (en) 2010-10-01 2015-08-18 At&T Intellectual Property I, Lp System for synchronizing information
US9154949B1 (en) 2013-07-08 2015-10-06 Sprint Communications Company L.P. Authenticated delivery of premium communication services to untrusted devices over an untrusted network
US9154955B1 (en) 2013-07-08 2015-10-06 Sprint Communications Company L.P. Authenticated delivery of premium communication services to trusted devices over an untrusted network
US9159065B2 (en) 2011-08-15 2015-10-13 Bank Of America Corporation Method and apparatus for object security session validation
US9159029B1 (en) * 2013-06-28 2015-10-13 Quantcast Corporation Inferring the presence of an entity within an identifier space based on the behaviors of unrelated entities
US9165304B2 (en) 2009-10-23 2015-10-20 Service Management Group, Inc. Analyzing consumer behavior using electronically-captured consumer location data
US20150312614A1 (en) * 2008-06-02 2015-10-29 Intent IQ, LLC Targeted television advertisements associated with online users' preferred television programs or channels
US9204376B2 (en) 2006-09-14 2015-12-01 Omnitrail Technologies, Inc. Profile based passive network switching
US20150379557A1 (en) * 2014-06-27 2015-12-31 Google Inc. Automated creative extension selection for content performance optimization
US20160014176A1 (en) * 2014-07-09 2016-01-14 Liveu Ltd. System and method for content solicitation
US20160026964A1 (en) * 2011-09-30 2016-01-28 Bloom Insurance Agency Llc Meeting monitoring and compliance assurance system
EP2988566A1 (en) * 2014-08-19 2016-02-24 Walkbase Oy Anonymous device position measuring system and method
US9298900B2 (en) 2011-09-24 2016-03-29 Elwha Llc Behavioral fingerprinting via inferred personal relation
US9307037B2 (en) 2009-04-15 2016-04-05 Centurylink Intellectual Property Llc System and method for utilizing attendee location information with an event planner
US9319407B1 (en) 2014-04-18 2016-04-19 Sprint Communications Company L.P. Authentication extension to untrusted devices on an untrusted network
US9348985B2 (en) 2011-11-23 2016-05-24 Elwha Llc Behavioral fingerprint controlled automatic task determination
US9373112B1 (en) 2012-03-16 2016-06-21 Square, Inc. Ranking of merchants for cardless payment transactions
US9392316B2 (en) 2010-10-28 2016-07-12 At&T Intellectual Property I, L.P. Messaging abstraction in a mobile device server
US9445353B2 (en) 2006-09-14 2016-09-13 Omnitrail Technologies Inc. Presence platform for passive radio access network-to-radio access network device transition
US9456007B2 (en) 2008-11-15 2016-09-27 Adobe Systems Incorporated Session aware notifications
US9462332B2 (en) 2012-12-05 2016-10-04 At&T Intellectual Property I, L.P. Method and apparatus for controlling a media device
US20160337347A1 (en) * 2013-03-15 2016-11-17 Airwatch Llc Secondary device as key for authorizing access to resources
US20160359850A1 (en) * 2010-09-17 2016-12-08 Universal Secure Registry, Llc Apparatus, system and method employing a wireless user-device
US9576295B2 (en) 2011-06-27 2017-02-21 Service Management Group, Inc. Adjusting a process for visit detection based on location data
US9576289B2 (en) 2011-11-22 2017-02-21 Square, Inc. Authorization of cardless payment transactions
US9584964B2 (en) 2014-12-22 2017-02-28 Airwatch Llc Enforcement of proximity based policies
US20170063818A1 (en) * 2015-08-26 2017-03-02 Facebook, Inc. Authenticating Users to Media-Player Devices on Online Social Networks
US9621404B2 (en) 2011-09-24 2017-04-11 Elwha Llc Behavioral fingerprinting with social networking
US9635422B2 (en) * 2015-02-12 2017-04-25 Dstillery, Inc. Methods and apparatus for defining an audience for a particular location by surveying nearby receivers and/or passively monitoring content consumption
US9727884B2 (en) 2012-10-01 2017-08-08 Service Management Group, Inc. Tracking brand strength using consumer location data and consumer survey responses
US9763097B2 (en) 2013-03-13 2017-09-12 Lookout, Inc. Method for performing device security corrective actions based on loss of proximity to another device
US9825967B2 (en) 2011-09-24 2017-11-21 Elwha Llc Behavioral fingerprinting via social networking interaction
US9864778B1 (en) * 2014-09-29 2018-01-09 Amazon Technologies, Inc. System for providing events to users
US9924470B2 (en) 2015-08-26 2018-03-20 Facebook, Inc. User-defined coverage of media-player devices on online social networks
US9959529B1 (en) 2014-05-11 2018-05-01 Square, Inc. Open tab transactions
US9992729B2 (en) 2012-10-22 2018-06-05 The Nielsen Company (Us), Llc Systems and methods for wirelessly modifying detection characteristics of portable devices
US10068272B1 (en) 2013-10-28 2018-09-04 Square, Inc. Pickup order
US10122733B2 (en) * 2016-08-02 2018-11-06 Capital One Services, Llc Systems and methods for proximity identity verification
US10163103B2 (en) 2006-02-21 2018-12-25 Universal Secure Registry, Llc Method and apparatus for secure access payment and identification
US10210560B2 (en) * 2015-10-23 2019-02-19 International Business Machines Corporation In-store shopper location-based gift idea determination
US10250837B2 (en) * 2012-12-05 2019-04-02 DISH Technologies L.L.C. User proximity recognition and hands-free control
US10303872B2 (en) 2013-05-02 2019-05-28 Airwatch, Llc Location based configuration profile toggling
US10332162B1 (en) 2013-09-30 2019-06-25 Square, Inc. Using wireless beacons for transit systems
US10360364B2 (en) 2013-03-13 2019-07-23 Lookout, Inc. Method for changing mobile communication device functionality based upon receipt of a second code
US20190230405A1 (en) * 2018-01-22 2019-07-25 Comcast Cable Communications, Llc Supplemental video content delivery
US10373221B1 (en) 2013-03-05 2019-08-06 Square, Inc. On-device directory search
US10375077B1 (en) * 2016-08-12 2019-08-06 Symantec Corporation Systems and methods for mediating information requests
US10373151B1 (en) 2012-11-20 2019-08-06 Square, Inc. Multiple merchants in cardless payment transactions and multiple customers in cardless payment transactions
US20190246172A1 (en) * 2016-11-04 2019-08-08 Samsung Electronics Co., Ltd. Display device and control method therefor
CN110139137A (en) * 2013-02-18 2019-08-16 麦克赛尔株式会社 Display methods
US10460098B1 (en) * 2014-08-20 2019-10-29 Google Llc Linking devices using encrypted account identifiers
US10531239B1 (en) * 2018-09-21 2020-01-07 Rovi Guides, Inc. Systems and methods for temporarily licensing content
US10530875B2 (en) 2015-08-26 2020-01-07 Facebook, Inc. Customizing media content on online social networks
US10560808B2 (en) 2013-07-23 2020-02-11 Square, Inc. Computing distances of devices
US10636022B2 (en) 2001-03-16 2020-04-28 Universal Secure Registry, Llc Universal secure registry
US10733607B2 (en) 2006-02-21 2020-08-04 Universal Secure Registry, Llc Universal secure registry
US10757216B1 (en) 2015-02-20 2020-08-25 Amazon Technologies, Inc. Group profiles for group item recommendations
US20200372541A1 (en) * 2013-11-22 2020-11-26 At&T Intellectual Property I, L.P. Targeting media delivery to a mobile audience
US20200401360A1 (en) * 2018-02-23 2020-12-24 Samsung Electronics Co., Ltd. Electronic device and operating method therefor
US10885522B1 (en) 2013-02-08 2021-01-05 Square, Inc. Updating merchant location for cardless payment transactions
US10909590B2 (en) 2013-03-15 2021-02-02 Square, Inc. Merchant and item ratings
US20210034192A1 (en) * 2013-03-15 2021-02-04 Amazon Technologies, Inc. Systems and methods for identifying users of devices and customizing devices to users
US10951541B2 (en) 2012-02-14 2021-03-16 Airwatch, Llc Controlling distribution of resources on a network
US11019134B2 (en) * 2014-05-23 2021-05-25 Capital One Services, Llc Systems and methods for communicating with a unique identifier
US11017069B2 (en) * 2013-03-13 2021-05-25 Lookout, Inc. Method for changing mobile communications device functionality based upon receipt of a second code and the location of a key device
US11082355B2 (en) 2012-02-14 2021-08-03 Airwatch, Llc Controllng distribution of resources in a network
US20210279749A1 (en) * 2020-03-02 2021-09-09 PlaceIQ, Inc. Characterizing geographic areas based on geolocations reported by populations of mobile computing devices
US11227676B2 (en) 2006-02-21 2022-01-18 Universal Secure Registry, Llc Universal secure registry
US20220044276A1 (en) * 2014-06-30 2022-02-10 Groupon, Inc. Apparatus, computer-implemented methods, and computer program products for providing dynamic data-driven profile based persona dimensional promotion selection
US11363460B1 (en) * 2015-03-03 2022-06-14 Amazon Technologies, Inc. Device-based identification for automated user detection
US20220188942A1 (en) * 2020-01-30 2022-06-16 Capital One Services, Llc Employment status detection based on transaction information
US20220292518A1 (en) * 2018-03-16 2022-09-15 Wells Fargo Bank, N.A. Sentiment analysis data retrieval
US11449854B1 (en) 2012-10-29 2022-09-20 Block, Inc. Establishing consent for cardless transactions using short-range transmission
US11474487B2 (en) 2010-09-08 2022-10-18 Universal Electronics Inc. System and method for providing an adaptive user interface on an electronic appliance
US20230032959A1 (en) * 2021-08-02 2023-02-02 Rovi Guides, Inc. Systems and methods for detecting a number of viewers
US11587146B1 (en) 2013-11-13 2023-02-21 Block, Inc. Wireless beacon shopping experience
US11824644B2 (en) 2013-03-14 2023-11-21 Airwatch, Llc Controlling electronically communicated resources

Families Citing this family (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8914360B1 (en) * 2006-09-15 2014-12-16 Sprint Spectrum L.P. System and method for providing location-based video content
US20110093339A1 (en) * 2009-09-10 2011-04-21 Morton Timothy B System and method for the service of advertising content to a consumer based on the detection of zone events in a retail environment
US20110119132A1 (en) * 2009-11-18 2011-05-19 Morton Timothy B System and method for the correlation of mobile devices with markers used by a content delivery system in a retail environment
US20120016733A1 (en) * 2010-07-13 2012-01-19 Visible Brands, Inc. System and method for correlating electronic advertisements presented to consumers on computing devices with consumer visits to retail environments
US8626587B2 (en) * 2010-12-10 2014-01-07 Verizon Patent And Licensing Inc. Artificial intelligence-based recommender and self-provisioner
US8799005B2 (en) * 2011-04-01 2014-08-05 Votini, Llc Systems and methods for capturing event feedback
US8860787B1 (en) 2011-05-11 2014-10-14 Google Inc. Method and apparatus for telepresence sharing
US8326260B1 (en) * 2011-05-18 2012-12-04 Radius Networks, Inc. System and method for managing communications over a wireless network during an emergency
US9008062B2 (en) * 2012-01-09 2015-04-14 Futurewei Technologies, Inc. Systems and methods for AP discovery with FILS beacon
US8862764B1 (en) 2012-03-16 2014-10-14 Google Inc. Method and Apparatus for providing Media Information to Mobile Devices
US8769003B2 (en) * 2012-05-09 2014-07-01 Qualcomm Innovation Center, Inc. Method for proximity determination between mobile peers while maintaining privacy
WO2014031597A1 (en) 2012-08-24 2014-02-27 Oceus Networks Inc. Mobile cellular networks
WO2014031689A1 (en) 2012-08-24 2014-02-27 Oceus Networks Inc. Mobile cellular networks
US20140280339A1 (en) * 2013-03-13 2014-09-18 Microsoft Corporation Integrating offers
US9704146B1 (en) 2013-03-14 2017-07-11 Square, Inc. Generating an online storefront
US9940616B1 (en) * 2013-03-14 2018-04-10 Square, Inc. Verifying proximity during payment transactions
US20140379580A1 (en) 2013-06-25 2014-12-25 Square, Inc. Integrated online and offline purchase authorization
US10003620B2 (en) * 2013-06-26 2018-06-19 International Business Machines Corporation Collaborative analytics with edge devices
US10055752B2 (en) 2013-07-30 2018-08-21 Here Global B.V. Method and apparatus for performing real-time out home advertising performance analytics based on arbitrary data streams and out of home advertising display analysis
US10628815B1 (en) 2013-09-27 2020-04-21 Groupon, Inc. Systems and methods for programmatically grouping consumers
US10438188B1 (en) 2013-09-27 2019-10-08 Groupon, Inc. Systems and methods for providing shared promotion redemptions
US9922321B2 (en) 2013-10-22 2018-03-20 Square, Inc. Proxy for multiple payment mechanisms
US8892462B1 (en) 2013-10-22 2014-11-18 Square, Inc. Proxy card payment with digital receipt delivery
US10417635B1 (en) 2013-10-22 2019-09-17 Square, Inc. Authorizing a purchase transaction using a mobile device
US9836739B1 (en) 2013-10-22 2017-12-05 Square, Inc. Changing a financial account after initiating a payment using a proxy card
US20150134439A1 (en) 2013-11-08 2015-05-14 Square, Inc. Interactive digital receipt
US10467641B2 (en) * 2013-12-20 2019-11-05 Ncr Corporation Mobile proximity-based analytics
US10810682B2 (en) 2013-12-26 2020-10-20 Square, Inc. Automatic triggering of receipt delivery
US10621563B1 (en) 2013-12-27 2020-04-14 Square, Inc. Apportioning a payment card transaction among multiple payers
US10198731B1 (en) 2014-02-18 2019-02-05 Square, Inc. Performing actions based on the location of mobile device during a card swipe
US11037129B1 (en) 2014-02-24 2021-06-15 Groupon, Inc. Consumer device presence-based transaction session
US9224141B1 (en) 2014-03-05 2015-12-29 Square, Inc. Encoding a magnetic stripe of a card with data of multiple cards
US10692059B1 (en) 2014-03-13 2020-06-23 Square, Inc. Selecting a financial account associated with a proxy object based on fund availability
US9619792B1 (en) 2014-03-25 2017-04-11 Square, Inc. Associating an account with a card based on a photo
US9864986B1 (en) 2014-03-25 2018-01-09 Square, Inc. Associating a monetary value card with a payment object
EP2925074B1 (en) * 2014-03-28 2018-05-02 Vodafone GmbH Application aware communication system
US11348139B1 (en) 2014-04-09 2022-05-31 Groupon, Inc. Communication beacon based promotions for mobile devices
US10643243B1 (en) * 2014-04-09 2020-05-05 Groupon, Inc. Communication beacon based promotions for mobile devices
US9569767B1 (en) 2014-05-06 2017-02-14 Square, Inc. Fraud protection based on presence indication
US20150332223A1 (en) 2014-05-19 2015-11-19 Square, Inc. Transaction information collection for mobile payment experience
US20150373304A1 (en) * 2014-06-18 2015-12-24 Opentv, Inc. User/interaction association via a media gateway
KR101593955B1 (en) * 2014-08-04 2016-02-15 에스케이텔레콤 주식회사 Stamper, and terminal and method thereof
US9655034B2 (en) 2014-10-31 2017-05-16 At&T Intellectual Property I, L.P. Transaction sensitive access network discovery and selection
US9629076B2 (en) 2014-11-20 2017-04-18 At&T Intellectual Property I, L.P. Network edge based access network discovery and selection
US9721251B1 (en) 2015-05-01 2017-08-01 Square, Inc. Intelligent capture in mixed fulfillment transactions
US10026062B1 (en) 2015-06-04 2018-07-17 Square, Inc. Apparatuses, methods, and systems for generating interactive digital receipts
US10129706B2 (en) 2015-06-05 2018-11-13 At&T Intellectual Property I, L.P. Context sensitive communication augmentation
US10162351B2 (en) 2015-06-05 2018-12-25 At&T Intellectual Property I, L.P. Remote provisioning of a drone resource
US10636019B1 (en) 2016-03-31 2020-04-28 Square, Inc. Interactive gratuity platform
US10873891B2 (en) 2016-07-06 2020-12-22 Oceus Networks, Llc Secure network rollover
US9686238B1 (en) * 2016-07-07 2017-06-20 Oceus Networks Inc. Secure network enrollment
US10419558B2 (en) 2016-08-24 2019-09-17 The Directv Group, Inc. Methods and systems for provisioning a user profile on a media processor
US10470241B2 (en) 2016-11-15 2019-11-05 At&T Intellectual Property I, L.P. Multiple mesh drone communication
US9882988B1 (en) * 2016-12-21 2018-01-30 Chengfu Yu Autonomous pairing of internet of things devices
US10172078B2 (en) 2017-03-31 2019-01-01 Oceus Networks Inc. Targeted user equipment-base station communication link
US10515342B1 (en) 2017-06-22 2019-12-24 Square, Inc. Referral candidate identification
US10430841B1 (en) * 2018-04-12 2019-10-01 Capital One Services, Llc Systems for determining customer interest in goods
EP3933791A1 (en) * 2020-06-30 2022-01-05 Lopos BV An apparatus and related method for proximity awareness

Citations (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5848396A (en) * 1996-04-26 1998-12-08 Freedom Of Information, Inc. Method and apparatus for determining behavioral profile of a computer user
US20020055924A1 (en) * 2000-01-18 2002-05-09 Richard Liming System and method providing a spatial location context
US20020138848A1 (en) * 2001-02-02 2002-09-26 Rachad Alao Service gateway for interactive television
US6460036B1 (en) * 1994-11-29 2002-10-01 Pinpoint Incorporated System and method for providing customized electronic newspapers and target advertisements
US6484148B1 (en) * 2000-02-19 2002-11-19 John E. Boyd Electronic advertising device and method of using the same
US20030014307A1 (en) * 2001-07-16 2003-01-16 General Motors Corporation Method and system for mobile commerce advertising
US20030032409A1 (en) * 2001-03-16 2003-02-13 Hutcheson Stewart Douglas Method and system for distributing content over a wireless communications system
US6571279B1 (en) * 1997-12-05 2003-05-27 Pinpoint Incorporated Location enhanced information delivery system
US6600898B1 (en) * 2000-09-07 2003-07-29 Clix Network, Inc. Method and apparatus for generating a number audio element in an audio system
US20030208754A1 (en) * 2002-05-01 2003-11-06 G. Sridhar System and method for selective transmission of multimedia based on subscriber behavioral model
US20040005900A1 (en) * 2002-07-05 2004-01-08 Martin Zilliacus Mobile terminal interactivity with multimedia programming
US6710815B1 (en) * 2001-01-23 2004-03-23 Digeo, Inc. Synchronizing multiple signals received through different transmission mediums
US20040068439A1 (en) * 2000-12-14 2004-04-08 Eric Elgrably Method for sending customised data to at least a person provided with a portable apparatus
US20050080665A1 (en) * 2001-11-27 2005-04-14 Accenture Global Services, Gmbh Context sensitive advertisement delivery framework
US20050120389A1 (en) * 2003-12-01 2005-06-02 International Business Machines Corporation Selecting divergent storylines using branching techniques
US6947922B1 (en) * 2000-06-16 2005-09-20 Xerox Corporation Recommender system and method for generating implicit ratings based on user interactions with handheld devices
US20050278716A1 (en) * 2004-06-14 2005-12-15 Nokia Corporation Digital rights management (DRM) license manager
US20060022048A1 (en) * 2000-06-07 2006-02-02 Johnson William J System and method for anonymous location based services
US7039699B1 (en) * 2000-05-02 2006-05-02 Microsoft Corporation Tracking usage behavior in computer systems
US20060165060A1 (en) * 2005-01-21 2006-07-27 Robin Dua Method and apparatus for managing credentials through a wireless network
US7085845B2 (en) * 2001-05-09 2006-08-01 Gene Fein Method, apparatus and computer program product for identifying a playing media file and tracking associated user preferences
US20060173974A1 (en) * 2005-02-02 2006-08-03 Victor Tang System and method for providing mobile access to personal media
US20060277271A1 (en) * 2005-06-07 2006-12-07 Yahoo! Inc. Prefetching content based on a mobile user profile
US7187947B1 (en) * 2000-03-28 2007-03-06 Affinity Labs, Llc System and method for communicating selected information to an electronic device
US7227475B1 (en) * 2005-04-13 2007-06-05 Giorgio Provenzano Public transportation interactive geographical advertisement system having world wide web access
US7254367B2 (en) * 2004-06-23 2007-08-07 Agere Systems Inc. Method and apparatus for pairing and configuring wireless devices
US20070201376A1 (en) * 2006-02-27 2007-08-30 Marshall-Wilson Maria I Apparatus and methods for group communications
US7283803B2 (en) * 2004-04-16 2007-10-16 Broadcom Corporation Location-aware application based quality of service (QOS) via a broadband access gateway
US7343317B2 (en) * 2001-01-18 2008-03-11 Nokia Corporation Real-time wireless e-coupon (promotion) definition based on available segment
US20080109307A1 (en) * 2006-09-14 2008-05-08 Shah Ullah Methods and systems for securing content played on mobile devices
US20080109888A1 (en) * 2006-09-14 2008-05-08 Shah Ullah Methods and systems for securing content projected to a nearby device
US20080108308A1 (en) * 2006-09-14 2008-05-08 Shah Ullah Methods and systems for using mobile device specific identifiers and short-distance wireless protocols to manage, secure and target content
US7412202B2 (en) * 2001-04-03 2008-08-12 Koninklijke Philips Electronics N.V. Method and apparatus for generating recommendations based on user preferences and environmental characteristics
US20080220760A1 (en) * 2006-09-14 2008-09-11 Shah Ullah Methods and systems for usage profiling associated with device specific identifiers
US20090076875A1 (en) * 2005-12-02 2009-03-19 Modiv Media, Inc. System for queue and service management

Family Cites Families (94)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4646145A (en) 1980-04-07 1987-02-24 R. D. Percy & Company Television viewer reaction determining systems
US7663502B2 (en) 1992-05-05 2010-02-16 Intelligent Technologies International, Inc. Asset system control arrangement and method
US4695879A (en) 1986-02-07 1987-09-22 Weinblatt Lee S Television viewer meter
US5550928A (en) 1992-12-15 1996-08-27 A.C. Nielsen Company Audience measurement system and method
US5737539A (en) 1994-10-28 1998-04-07 Advanced Health Med-E-Systems Corp. Prescription creation system
US5546471A (en) 1994-10-28 1996-08-13 The National Registry, Inc. Ergonomic fingerprint reader apparatus
US6202023B1 (en) 1996-08-22 2001-03-13 Go2 Systems, Inc. Internet based geographic location referencing system and method
US6837436B2 (en) * 1996-09-05 2005-01-04 Symbol Technologies, Inc. Consumer interactive shopping system
US5842199A (en) 1996-10-18 1998-11-24 Regents Of The University Of Minnesota System, method and article of manufacture for using receiver operating curves to evaluate predictive utility
US6049831A (en) 1996-11-08 2000-04-11 Gte Laboratories Incorporated System for transmitting network-related information where requested network information is separately transmitted as definitions and display information
US6898762B2 (en) 1998-08-21 2005-05-24 United Video Properties, Inc. Client-server electronic program guide
US6332127B1 (en) 1999-01-28 2001-12-18 International Business Machines Corporation Systems, methods and computer program products for providing time and location specific advertising via the internet
US6519571B1 (en) 1999-05-27 2003-02-11 Accenture Llp Dynamic customer profile management
US20020026351A1 (en) 1999-06-30 2002-02-28 Thomas E. Coleman Method and system for delivery of targeted commercial messages
US6704929B1 (en) 1999-08-18 2004-03-09 Webtv Networks, Inc. Tracking viewing behavior of a home entertainment system
US6381465B1 (en) 1999-08-27 2002-04-30 Leap Wireless International, Inc. System and method for attaching an advertisement to an SMS message for wireless transmission
US6812851B1 (en) 1999-12-15 2004-11-02 Vert, Inc. Apparatuses for displaying information on vehicles
WO2001045004A1 (en) 1999-12-17 2001-06-21 Promo Vu Interactive promotional information communicating system
US20020059637A1 (en) 2000-01-14 2002-05-16 Rakib Selim Shlomo Home gateway for video and data distribution from various types of headend facilities and including digital video recording functions
US8151306B2 (en) 2000-01-14 2012-04-03 Terayon Communication Systems, Inc. Remote control for wireless control of system including home gateway and headend, either or both of which have digital video recording functionality
US6587835B1 (en) 2000-02-09 2003-07-01 G. Victor Treyz Shopping assistance with handheld computing device
US6456854B1 (en) 2000-05-08 2002-09-24 Leap Wireless International System and method for locating and tracking mobile telephone devices via the internet
GB0012132D0 (en) 2000-05-20 2000-07-12 Hewlett Packard Co Targeted information display
US7487112B2 (en) 2000-06-29 2009-02-03 Barnes Jr Melvin L System, method, and computer program product for providing location based services and mobile e-commerce
US6674453B1 (en) 2000-07-10 2004-01-06 Fuji Xerox Co., Ltd. Service portal for links separated from Web content
US7797447B1 (en) 2000-07-10 2010-09-14 Fuji Xerox Co., Ltd. Data detector for creating links from web content for mobile devices
AU2001285023A1 (en) 2000-08-17 2002-02-25 Mobileum, Inc. Method and system for wireless voice channel/data channel integration
JP2002077755A (en) 2000-08-29 2002-03-15 Sharp Corp Agent interface apparatus
US6754470B2 (en) 2000-09-01 2004-06-22 Telephia, Inc. System and method for measuring wireless device and network usage and performance metrics
US20040201599A1 (en) 2000-11-30 2004-10-14 Rabindranath Dutta System and method for displaying content without control items
US7721310B2 (en) 2000-12-05 2010-05-18 Koninklijke Philips Electronics N.V. Method and apparatus for selective updating of a user profile
US9107030B2 (en) * 2000-12-13 2015-08-11 Thomas E. Coverstone Communication system for sending advertisements based on location determination and previously specified user selections
US20020124249A1 (en) 2001-01-02 2002-09-05 Shintani Peter Rae Targeted advertising during playback of stored content
US6990635B2 (en) 2001-01-24 2006-01-24 Koninklijke Philips Electronics N.V. User interface for collecting viewer ratings of media content and facilitating adaption of content recommenders
JP3849435B2 (en) 2001-02-23 2006-11-22 株式会社日立製作所 Traffic situation estimation method and traffic situation estimation / provision system using probe information
US20020162031A1 (en) 2001-03-08 2002-10-31 Shmuel Levin Method and apparatus for automatic control of access
AU2002252405A1 (en) * 2001-03-19 2002-10-03 Accenture Llp Mobile valet
US6993326B2 (en) 2001-04-02 2006-01-31 Bellsouth Intellectual Property Corporation System and method for providing short message targeted advertisements over a wireless communications network
US7680796B2 (en) 2003-09-03 2010-03-16 Google, Inc. Determining and/or using location information in an ad system
US20060149624A1 (en) 2004-12-30 2006-07-06 Shumeet Baluja Generating and/or serving local area advertisements, such as advertisements for devices with call functionality
US8560493B2 (en) 2003-10-01 2013-10-15 Google Inc. Determining and/or using end user local time information in an ad system
KR100470303B1 (en) * 2002-04-23 2005-02-05 에스케이 텔레콤주식회사 Authentication System and Method Having Mobility for Public Wireless LAN
AU2003239385A1 (en) * 2002-05-10 2003-11-11 Richard R. Reisman Method and apparatus for browsing using multiple coordinated device
US8611919B2 (en) 2002-05-23 2013-12-17 Wounder Gmbh., Llc System, method, and computer program product for providing location based services and mobile e-commerce
JP2004015725A (en) 2002-06-11 2004-01-15 Canon Inc Communication system, authentication method in communication system, program therefor and recording medium therefor
US20060026067A1 (en) 2002-06-14 2006-02-02 Nicholas Frank C Method and system for providing network based target advertising and encapsulation
US20040002958A1 (en) * 2002-06-26 2004-01-01 Praveen Seshadri System and method for providing notification(s)
US20070047043A1 (en) 2002-07-08 2007-03-01 Explay Ltd. image projecting device and method
US8086559B2 (en) 2002-09-24 2011-12-27 Google, Inc. Serving content-relevant advertisements with client-side device support
US20120173732A1 (en) 2002-10-22 2012-07-05 Sullivan Jason A Systems and methods for providing resources and interactivity in computer systems
JP2004343448A (en) 2003-05-15 2004-12-02 Matsushita Electric Ind Co Ltd Authentication system for wireless lan access
US20050038326A1 (en) 2003-05-30 2005-02-17 Michael Mathur System, device, and method for remote monitoring and servicing
EP1526457B1 (en) * 2003-10-22 2013-03-13 Sony Deutschland GmbH Context-aware automatic service discovery and execution engine in mobile ad-hoc networks
US7155305B2 (en) 2003-11-04 2006-12-26 Universal Electronics Inc. System and methods for home appliance identification and control in a networked environment
US7597250B2 (en) 2003-11-17 2009-10-06 Dpd Patent Trust Ltd. RFID reader with multiple interfaces
US8615487B2 (en) 2004-01-23 2013-12-24 Garrison Gomez System and method to store and retrieve identifier associated information content
US7475813B2 (en) * 2004-02-06 2009-01-13 Capital One Financial Corporation System and method of using RFID devices to analyze customer traffic patterns in order to improve a merchant's layout
US10417298B2 (en) 2004-12-02 2019-09-17 Insignio Technologies, Inc. Personalized content processing and delivery system and media
US8682279B2 (en) 2004-05-07 2014-03-25 Interdigital Technology Corporation Supporting emergency calls on a wireless local area network
EP1596271A1 (en) 2004-05-11 2005-11-16 Hitachi Europe S.r.l. Method for displaying information and information display system
US20050275406A1 (en) * 2004-06-15 2005-12-15 Hatalkar Atul N Apparatus and method of dynamic usage profile acquisition and utilization in a wireless mobile device
US20060004627A1 (en) 2004-06-30 2006-01-05 Shumeet Baluja Advertisements for devices with call functionality, such as mobile phones
DE102004045147A1 (en) 2004-09-17 2006-03-23 Fujitsu Ltd., Kawasaki A setting information distribution apparatus, method, program and medium, authentication setting transfer apparatus, method, program and medium, and setting information receiving program
US20060089099A1 (en) 2004-10-26 2006-04-27 Buchwald Gregory J Method and apparatus for allowing communication units to utilize non-licensed spectrum
US20060123081A1 (en) * 2004-12-03 2006-06-08 Motorola, Inc. Method and system for seamless portability by profile sharing
US8473617B2 (en) 2004-12-31 2013-06-25 Sony Corporation Media client architecture for networked communication devices
US8230456B2 (en) * 2005-01-05 2012-07-24 Yahoo! Inc. Framework for delivering a plurality of content and providing for interaction with the same in a television environment
US8836580B2 (en) 2005-05-09 2014-09-16 Ehud Mendelson RF proximity tags providing indoor and outdoor navigation and method of use
US7562304B2 (en) 2005-05-03 2009-07-14 Mcafee, Inc. Indicating website reputations during website manipulation of user information
US7822620B2 (en) 2005-05-03 2010-10-26 Mcafee, Inc. Determining website reputations using automatic testing
US8438499B2 (en) 2005-05-03 2013-05-07 Mcafee, Inc. Indicating website reputations during user interactions
US7407099B1 (en) 2005-06-03 2008-08-05 Hewlett-Packard Development Company, L.P. Method and apparatus for achieving a tailored content response based upon a product identifier coupled with a device identifier
US20060291506A1 (en) 2005-06-23 2006-12-28 Cain David C Process of providing content component displays with a digital video recorder
US7660581B2 (en) 2005-09-14 2010-02-09 Jumptap, Inc. Managing sponsored content based on usage history
US7548915B2 (en) 2005-09-14 2009-06-16 Jorey Ramer Contextual mobile content placement on a mobile communication facility
US8576846B2 (en) * 2005-10-05 2013-11-05 Qualcomm Incorporated Peer-to-peer communication in ad hoc wireless network
US20070088801A1 (en) 2005-10-17 2007-04-19 Zohar Levkovitz Device, system and method of delivering targeted advertisements using wireless application protocol
US20070088852A1 (en) 2005-10-17 2007-04-19 Zohar Levkovitz Device, system and method of presentation of advertisements on a wireless device
US20070165875A1 (en) 2005-12-01 2007-07-19 Behrooz Rezvani High fidelity multimedia wireless headset
US7333464B2 (en) * 2006-02-01 2008-02-19 Microsoft Corporation Automated service discovery and wireless network set-up
US10803468B2 (en) 2006-04-18 2020-10-13 At&T Intellectual Property I, L.P. Method and apparatus for selecting advertising
US8793772B2 (en) 2006-04-26 2014-07-29 At&T Intellectual Property I, L.P. Wireless local area network access controlled by cellular communications
US9445353B2 (en) 2006-09-14 2016-09-13 Omnitrail Technologies Inc. Presence platform for passive radio access network-to-radio access network device transition
US20090298514A1 (en) 2006-09-14 2009-12-03 Shah Ullah Real world behavior measurement using identifiers specific to mobile devices
CA2665854C (en) * 2006-09-21 2017-10-10 T-Mobile Usa, Inc. Wireless device registration, such as automatic registration of a wi-fi enabled device
US8356176B2 (en) * 2007-02-09 2013-01-15 Research In Motion Limited Method and system for authenticating peer devices using EAP
EP1965595B1 (en) 2007-02-27 2009-10-28 Lucent Technologies Inc. Wireless communication techniques for controlling access granted by a security device
US9319879B2 (en) 2007-05-30 2016-04-19 Apple Inc. Method and apparatus for security configuration and verification of wireless devices in a fixed/mobile convergence environment
US8265281B2 (en) 2007-07-09 2012-09-11 Qualcomm Incorporated IP service authorization in wireless communications networks
US20090252129A1 (en) * 2008-04-08 2009-10-08 Nokia Corporation Known station hidden network discovery
WO2010019848A1 (en) * 2008-08-14 2010-02-18 Starent Networks, Corp Access technology independent identifier generation
US8295864B2 (en) 2008-10-10 2012-10-23 Samaha Tareq A Sending and receiving text-based messages over a mobile phone via a network connected computer
KR20100107801A (en) 2009-03-26 2010-10-06 삼성전자주식회사 Apparatus and method for antenna selection in wireless communication system
US20120185458A1 (en) 2011-01-18 2012-07-19 Microsoft Corporation Clustering crowd-sourced data to identify event beacons

Patent Citations (79)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6460036B1 (en) * 1994-11-29 2002-10-01 Pinpoint Incorporated System and method for providing customized electronic newspapers and target advertisements
US5848396A (en) * 1996-04-26 1998-12-08 Freedom Of Information, Inc. Method and apparatus for determining behavioral profile of a computer user
US6571279B1 (en) * 1997-12-05 2003-05-27 Pinpoint Incorporated Location enhanced information delivery system
US20020055924A1 (en) * 2000-01-18 2002-05-09 Richard Liming System and method providing a spatial location context
US6484148B1 (en) * 2000-02-19 2002-11-19 John E. Boyd Electronic advertising device and method of using the same
US7187947B1 (en) * 2000-03-28 2007-03-06 Affinity Labs, Llc System and method for communicating selected information to an electronic device
US7039699B1 (en) * 2000-05-02 2006-05-02 Microsoft Corporation Tracking usage behavior in computer systems
US20060022048A1 (en) * 2000-06-07 2006-02-02 Johnson William J System and method for anonymous location based services
US6947922B1 (en) * 2000-06-16 2005-09-20 Xerox Corporation Recommender system and method for generating implicit ratings based on user interactions with handheld devices
US6600898B1 (en) * 2000-09-07 2003-07-29 Clix Network, Inc. Method and apparatus for generating a number audio element in an audio system
US20040068439A1 (en) * 2000-12-14 2004-04-08 Eric Elgrably Method for sending customised data to at least a person provided with a portable apparatus
US7343317B2 (en) * 2001-01-18 2008-03-11 Nokia Corporation Real-time wireless e-coupon (promotion) definition based on available segment
US6710815B1 (en) * 2001-01-23 2004-03-23 Digeo, Inc. Synchronizing multiple signals received through different transmission mediums
US20020138848A1 (en) * 2001-02-02 2002-09-26 Rachad Alao Service gateway for interactive television
US20030032409A1 (en) * 2001-03-16 2003-02-13 Hutcheson Stewart Douglas Method and system for distributing content over a wireless communications system
US7412202B2 (en) * 2001-04-03 2008-08-12 Koninklijke Philips Electronics N.V. Method and apparatus for generating recommendations based on user preferences and environmental characteristics
US7085845B2 (en) * 2001-05-09 2006-08-01 Gene Fein Method, apparatus and computer program product for identifying a playing media file and tracking associated user preferences
US20030014307A1 (en) * 2001-07-16 2003-01-16 General Motors Corporation Method and system for mobile commerce advertising
US20050080665A1 (en) * 2001-11-27 2005-04-14 Accenture Global Services, Gmbh Context sensitive advertisement delivery framework
US20030208754A1 (en) * 2002-05-01 2003-11-06 G. Sridhar System and method for selective transmission of multimedia based on subscriber behavioral model
US20040005900A1 (en) * 2002-07-05 2004-01-08 Martin Zilliacus Mobile terminal interactivity with multimedia programming
US20050120389A1 (en) * 2003-12-01 2005-06-02 International Business Machines Corporation Selecting divergent storylines using branching techniques
US7283803B2 (en) * 2004-04-16 2007-10-16 Broadcom Corporation Location-aware application based quality of service (QOS) via a broadband access gateway
US20050278716A1 (en) * 2004-06-14 2005-12-15 Nokia Corporation Digital rights management (DRM) license manager
US7254367B2 (en) * 2004-06-23 2007-08-07 Agere Systems Inc. Method and apparatus for pairing and configuring wireless devices
US20060165060A1 (en) * 2005-01-21 2006-07-27 Robin Dua Method and apparatus for managing credentials through a wireless network
US20060173974A1 (en) * 2005-02-02 2006-08-03 Victor Tang System and method for providing mobile access to personal media
US7227475B1 (en) * 2005-04-13 2007-06-05 Giorgio Provenzano Public transportation interactive geographical advertisement system having world wide web access
US20060277271A1 (en) * 2005-06-07 2006-12-07 Yahoo! Inc. Prefetching content based on a mobile user profile
US20090076875A1 (en) * 2005-12-02 2009-03-19 Modiv Media, Inc. System for queue and service management
US20070201376A1 (en) * 2006-02-27 2007-08-30 Marshall-Wilson Maria I Apparatus and methods for group communications
US20080126198A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080125088A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080126201A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080125092A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080126186A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080125089A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080126203A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080109843A1 (en) * 2006-09-14 2008-05-08 Shah Ullah Methods and systems for securing content played on mobile devices
US20080125085A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080125086A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080125091A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080126200A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080125087A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080126182A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080126199A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080125093A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080126180A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080126181A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080126184A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080126202A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080126185A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080125090A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080126183A1 (en) * 2006-09-14 2008-05-29 Shah Ullah Methods and systems for securing content played on mobile devices
US20080108308A1 (en) * 2006-09-14 2008-05-08 Shah Ullah Methods and systems for using mobile device specific identifiers and short-distance wireless protocols to manage, secure and target content
US20080133328A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133355A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133329A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133327A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133360A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133364A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133353A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133333A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133356A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133363A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133358A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133354A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133362A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133331A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133332A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133361A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133352A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133357A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133330A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133335A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080133334A1 (en) * 2006-09-14 2008-06-05 Shah Ullah Methods and systems for securing content played on mobile devices
US20080109888A1 (en) * 2006-09-14 2008-05-08 Shah Ullah Methods and systems for securing content projected to a nearby device
US20080220760A1 (en) * 2006-09-14 2008-09-11 Shah Ullah Methods and systems for usage profiling associated with device specific identifiers
US20080109307A1 (en) * 2006-09-14 2008-05-08 Shah Ullah Methods and systems for securing content played on mobile devices

Cited By (263)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9607041B2 (en) * 1999-07-15 2017-03-28 Gula Consulting Limited Liability Company System and method for efficiently accessing internet resources
US20090070434A1 (en) * 1999-07-15 2009-03-12 Himmelstein Richard B System and method for efficiently accessing internet resources
US10158640B2 (en) 1999-07-15 2018-12-18 Gula Consulting Limited Liability Company System and method for efficiently accessing internet resources
US20110192901A1 (en) * 2000-10-20 2011-08-11 Michael Dearing Rf point of sale and delivery method and system using communication with remote computer and having features to read a large number of rf tags
US8231053B2 (en) 2000-10-20 2012-07-31 Promega Corporation Radio frequency identification method and system of distributing products
US20100299251A1 (en) * 2000-11-06 2010-11-25 Consumer And Merchant Awareness Foundation Pay yourself first with revenue generation
US20100324986A1 (en) * 2000-11-06 2010-12-23 Consumer And Merchant Awareness Foundation Pay yourself first with revenue generation
US8732073B2 (en) 2000-11-06 2014-05-20 Propulsion Remote Holdings, Llc Pay yourself first with revenue generation
US8473380B2 (en) 2000-11-06 2013-06-25 Propulsion Remote Holdings, Llc Pay yourself first budgeting
US20110004546A1 (en) * 2000-11-06 2011-01-06 Consumer And Merchant Awareness Foundation Pay yourself first with revenue generation
US20100299252A1 (en) * 2000-11-06 2010-11-25 Consumer And Merchant Awareness Foundation Pay yourself first with revenue generation
US20100299260A1 (en) * 2000-11-06 2010-11-25 Consumer And Merchant Awareness Foundation Pay yourself first with revenue generation
US20100325036A1 (en) * 2000-11-06 2010-12-23 Consumer And Merchant Awareness Foundation Pay yourself first with revenue generation
US10636023B2 (en) 2001-03-16 2020-04-28 Universal Secure Registry, Llc Universal secure registry
US10885504B2 (en) 2001-03-16 2021-01-05 Universal Secure Registry, Llc Universal secure registry
US10636022B2 (en) 2001-03-16 2020-04-28 Universal Secure Registry, Llc Universal secure registry
US10861072B2 (en) 2002-10-31 2020-12-08 Mastercard Mobile Transactions Solutions, Inc. Handling live occurrence events with a rules engine
US20150088739A1 (en) * 2002-10-31 2015-03-26 C-Sam, Inc. Life occurrence handling and resolution
US10803502B2 (en) 2002-10-31 2020-10-13 Mastercard Mobile Transactions Solutions, Inc. Configuring a life occurrence container
US20150324783A1 (en) * 2002-10-31 2015-11-12 Mastercard Mobile Transactions Solutions, Inc. Events and related responses between an expert engine and an advanced mobile transaction platform
US8538874B2 (en) 2004-02-06 2013-09-17 Propulsion Remote Holdings, Llc Pay yourself first with auto bill pay system and method
US20100174645A1 (en) * 2004-08-02 2010-07-08 Consumer And Merchant Awareness Foundation Pay yourself first with user guidance
US20100153200A1 (en) * 2004-08-02 2010-06-17 Consumer And Merchant Awareness Foundation Pay yourself first with automated data input
US20100198724A1 (en) * 2004-08-02 2010-08-05 Consumer And Merchant Awareness Foundation Pay yourself first with community knowledge
US8407137B2 (en) 2004-08-02 2013-03-26 Propulsion Remote Holdings, Llc Pay yourself first with user guidance
US10163103B2 (en) 2006-02-21 2018-12-25 Universal Secure Registry, Llc Method and apparatus for secure access payment and identification
US10733607B2 (en) 2006-02-21 2020-08-04 Universal Secure Registry, Llc Universal secure registry
US10832245B2 (en) 2006-02-21 2020-11-10 Univsersal Secure Registry, Llc Universal secure registry
US11227676B2 (en) 2006-02-21 2022-01-18 Universal Secure Registry, Llc Universal secure registry
US20070219866A1 (en) * 2006-03-17 2007-09-20 Robert Wolf Passive Shopper Identification Systems Utilized to Optimize Advertising
US8060399B2 (en) 2006-09-14 2011-11-15 Shah Ullah Targeting content to network-enabled television devices
US20080109307A1 (en) * 2006-09-14 2008-05-08 Shah Ullah Methods and systems for securing content played on mobile devices
US9445353B2 (en) 2006-09-14 2016-09-13 Omnitrail Technologies Inc. Presence platform for passive radio access network-to-radio access network device transition
US9204376B2 (en) 2006-09-14 2015-12-01 Omnitrail Technologies, Inc. Profile based passive network switching
US20130279715A1 (en) * 2007-01-22 2013-10-24 Jook, Inc. Profile management method and system
US9129014B2 (en) * 2007-01-22 2015-09-08 Jook, Inc. Profile management method and system
US20110315766A1 (en) * 2007-03-16 2011-12-29 Phillips Travis A Rfid reader enclosure and man-o-war rfid reader system
US8258961B2 (en) * 2007-03-16 2012-09-04 Promega Corporation RFID reader enclosure and man-o-war RFID reader system
US20140228055A1 (en) * 2007-06-11 2014-08-14 Broadcom Corporation Smart Phone to Home Gateway/STB Data Exchange for Content Delivery
US9497582B2 (en) * 2007-06-11 2016-11-15 Broadcom Corporation Smart phone to home gateway/STB data exchange for content delivery
USRE48946E1 (en) * 2008-01-07 2022-02-22 D&M Holdings, Inc. Systems and methods for providing a media playback in a networked environment
US20100284389A1 (en) * 2008-01-07 2010-11-11 Max Ramsay Systems and methods for providing a media playback in a networked environment
US8724600B2 (en) * 2008-01-07 2014-05-13 Tymphany Hong Kong Limited Systems and methods for providing a media playback in a networked environment
US9800917B2 (en) * 2008-06-02 2017-10-24 Intent IQ, LLC Targeted television advertisements associated with online users' preferred television programs or channels
US10645438B2 (en) 2008-06-02 2020-05-05 Intent IQ, LLC Targeted television advertisements associated with online users' preferred television programs or channels
US20150312614A1 (en) * 2008-06-02 2015-10-29 Intent IQ, LLC Targeted television advertisements associated with online users' preferred television programs or channels
US8791817B2 (en) * 2008-10-22 2014-07-29 Centurylink Intellectual Property Llc System and method for monitoring a location
US20100097214A1 (en) * 2008-10-22 2010-04-22 Embarq Holdings Company, Llc System and method for monitoring a location
US20140033312A1 (en) * 2008-11-15 2014-01-30 Adobe Systems Incorporated Methods and systems for distributing right-protected asset
US9158897B2 (en) * 2008-11-15 2015-10-13 Adobe Systems Incorporated Methods and systems for distributing right-protected asset
US9456007B2 (en) 2008-11-15 2016-09-27 Adobe Systems Incorporated Session aware notifications
US20100151821A1 (en) * 2008-12-11 2010-06-17 Embarq Holdings Company, Llc System and method for providing location based services at a shopping facility
US8983488B2 (en) 2008-12-11 2015-03-17 Centurylink Intellectual Property Llc System and method for providing location based services at a shopping facility
US20100241514A1 (en) * 2009-03-17 2010-09-23 Microsoft Corporation Automated provision of user feedback
US9307037B2 (en) 2009-04-15 2016-04-05 Centurylink Intellectual Property Llc System and method for utilizing attendee location information with an event planner
US8428620B2 (en) 2009-04-22 2013-04-23 Centurylink Intellectual Property Llc Mass transportation service delivery platform
US8655693B2 (en) 2009-07-08 2014-02-18 Centurylink Intellectual Property Llc System and method for automating travel related features
US9589270B2 (en) 2009-10-23 2017-03-07 Service Management Group, Inc. Electronically capturing consumer location data for analyzing consumer behavior
US10572887B2 (en) 2009-10-23 2020-02-25 Service Management Group, Inc. Electronically capturing consumer location data for analyzing consumer behavior
US9165304B2 (en) 2009-10-23 2015-10-20 Service Management Group, Inc. Analyzing consumer behavior using electronically-captured consumer location data
US20110136442A1 (en) * 2009-12-09 2011-06-09 Echostar Technologies Llc Apparatus and methods for identifying a user of an entertainment device via a mobile communication device
US20110173337A1 (en) * 2010-01-13 2011-07-14 Oto Technologies, Llc Proactive pre-provisioning for a content sharing session
US8700718B2 (en) 2010-01-13 2014-04-15 Oto Technologies, Llc Proactive pre-provisioning for a content sharing session
US20110208868A1 (en) * 2010-01-13 2011-08-25 Oto Technologies, Llc. Proactive pre-provisioning for a content sharing session
US20110231483A1 (en) * 2010-03-19 2011-09-22 Neil Alexander Derraugh System, method and computer program for delivery of targeted invitations to participate in market research, based on observed geospatial behaviour
US20140282684A1 (en) * 2010-06-22 2014-09-18 LlVETV, LLC Registration of a personal electronic device (ped) with an aircraft ife system using a ped generated registration identifier and associated methods
US9516352B2 (en) * 2010-06-22 2016-12-06 Livetv, Llc Registration of a personal electronic device (PED) with an aircraft IFE system using a PED generated registration identifier and associated methods
US8856858B2 (en) 2010-08-20 2014-10-07 At&T Intellectual Property I, Lp System for establishing communications with a mobile device server
US20120047549A1 (en) * 2010-08-20 2012-02-23 At&T Intellectual Property I, L.P. System for establishing communications with a mobile device server
US10582273B2 (en) * 2010-08-20 2020-03-03 At&T Intellectual Property I, L.P. System for establishing communications with a mobile device server
US20140344878A1 (en) * 2010-08-20 2014-11-20 At&T Intellectual Property I, Lp System for establishing communications with a mobile device server
US20160255413A1 (en) * 2010-08-20 2016-09-01 At&T Intellectual Property I, Lp System for establishing communications with a mobile device server
US8555332B2 (en) * 2010-08-20 2013-10-08 At&T Intellectual Property I, L.P. System for establishing communications with a mobile device server
US9369773B2 (en) * 2010-08-20 2016-06-14 At&T Intellectual Property I, Lp System for establishing communications with a mobile device server
US11474487B2 (en) 2010-09-08 2022-10-18 Universal Electronics Inc. System and method for providing an adaptive user interface on an electronic appliance
US8438285B2 (en) 2010-09-15 2013-05-07 At&T Intellectual Property I, L.P. System for managing resources accessible to a mobile device server
US9609655B2 (en) 2010-09-15 2017-03-28 At&T Intellectual Propery I, L.P. System for managing resources accessible to a mobile device server
US9338169B2 (en) 2010-09-15 2016-05-10 At&T Intellectual Property I, Lp System for managing resources accessible to a mobile device server
US8892743B2 (en) 2010-09-15 2014-11-18 At&T Intellectual Property I, Lp System for managing resources accessible to a mobile device server
US10616198B2 (en) * 2010-09-17 2020-04-07 Universal Secure Registry, Llc Apparatus, system and method employing a wireless user-device
US20160359850A1 (en) * 2010-09-17 2016-12-08 Universal Secure Registry, Llc Apparatus, system and method employing a wireless user-device
US10484260B2 (en) 2010-10-01 2019-11-19 At&T Intellectual Property I, L.P. Apparatus and method for managing mobile device servers
US8516039B2 (en) 2010-10-01 2013-08-20 At&T Intellectual Property I, L.P. Apparatus and method for managing mobile device servers
US9521129B2 (en) 2010-10-01 2016-12-13 At&T Intellectual Property I, L.P. Apparatus and method for managing software applications of a mobile device server
US8806577B2 (en) 2010-10-01 2014-08-12 At&T Intellectual Property I, Lp System for communicating with a mobile device server
US8443420B2 (en) 2010-10-01 2013-05-14 At&T Intellectual Property I, L.P. System for communicating with a mobile device server
US9438530B2 (en) 2010-10-01 2016-09-06 At&T Intellectual Property I, L.P. System for synchronizing information
US10686770B2 (en) 2010-10-01 2020-06-16 At&T Intellectual Property I, L.P. Apparatus and method for managing software applications of a mobile device server
US8504449B2 (en) 2010-10-01 2013-08-06 At&T Intellectual Property I, L.P. Apparatus and method for managing software applications of a mobile device server
US9654366B2 (en) 2010-10-01 2017-05-16 At&T Intellectual Property I, L.P. Apparatus and method for managing mobile device servers
US10356065B2 (en) 2010-10-01 2019-07-16 At&T Intellectual Property I, L.P. Apparatus and method for managing software applications of a mobile device server
US9736198B2 (en) 2010-10-01 2017-08-15 At&T Intellectual Property I, L.P. Processing messages with a device server operating in a telephone
US9112944B2 (en) 2010-10-01 2015-08-18 At&T Intellectual Property I, Lp System for synchronizing information
US8610546B2 (en) 2010-10-01 2013-12-17 At&T Intellectual Property I, L.P. System for selecting resources accessible to a mobile device server
US10172116B2 (en) 2010-10-28 2019-01-01 At&T Intellectual Property I, L.P. Messaging abstraction in a mobile device server
US9392316B2 (en) 2010-10-28 2016-07-12 At&T Intellectual Property I, L.P. Messaging abstraction in a mobile device server
US9066123B2 (en) 2010-11-30 2015-06-23 At&T Intellectual Property I, L.P. System for monetizing resources accessible to a mobile device server
US10536737B2 (en) 2010-11-30 2020-01-14 At&T Intellectual Property I, L.P. System for monetizing resources accessible to a mobile device server
US9942588B2 (en) 2010-11-30 2018-04-10 At&T Intellectual Property I, L.P. System for monetizing resources accessible to a mobile device server
US9544627B2 (en) 2010-11-30 2017-01-10 At&T Intellectual Property I, L.P. System for monetizing resources accessible to a mobile device server
US10678400B2 (en) 2010-12-08 2020-06-09 At&T Intellectual Property I, L.P. Remote control of electronic devices via mobile device
US8937534B2 (en) * 2010-12-08 2015-01-20 At&T Intellectual Property I, L.P. Remote control of electronic devices via mobile device
US20120146918A1 (en) * 2010-12-08 2012-06-14 At&T Intellectual Property I, L.P. Remote Control of Electronic Devices Via Mobile Device
US11137872B2 (en) 2010-12-08 2021-10-05 At&T Intellectual Property I, L.P. Remote control of electronic devices via mobile device
US20150095786A1 (en) * 2010-12-08 2015-04-02 At&T Intellectual Property I, Lp Remote Control of Electronic Devices Via Mobile Device
US9671928B2 (en) * 2010-12-08 2017-06-06 At&T Intellectual Property I, L.P. Remote control of electronic devices via mobile device
US8874899B1 (en) * 2011-01-13 2014-10-28 Sprint Communications Company L.P. Premium services authentication
US8914399B1 (en) 2011-03-09 2014-12-16 Amazon Technologies, Inc. Personalized recommendations based on item usage
US8452797B1 (en) * 2011-03-09 2013-05-28 Amazon Technologies, Inc. Personalized recommendations based on item usage
US8468164B1 (en) * 2011-03-09 2013-06-18 Amazon Technologies, Inc. Personalized recommendations based on related users
US20120246024A1 (en) * 2011-03-23 2012-09-27 Bank Of America Self-service home buying
US8688594B2 (en) * 2011-03-23 2014-04-01 Bank Of America Corporation Self-service home buying
US9576295B2 (en) 2011-06-27 2017-02-21 Service Management Group, Inc. Adjusting a process for visit detection based on location data
US20140129487A1 (en) * 2011-07-15 2014-05-08 Omron Corporation Information processing device and method, attention level-calculating device, and computer readable medium
US9317806B2 (en) * 2011-07-15 2016-04-19 Omron Corporation Information processing device and method, attention level-calculating device, and computer readable medium
US8989055B2 (en) 2011-07-17 2015-03-24 At&T Intellectual Property I, L.P. Processing messages with a device server operating in a telephone
US10623580B2 (en) 2011-07-17 2020-04-14 At&T Intellectual Property I, L.P. Processing messages with a device server operating in a telephone
US11283933B2 (en) 2011-07-17 2022-03-22 At&T Intellectual Property I, L.P. Processing messages with a device server operating in a telephone
US8572687B2 (en) 2011-08-15 2013-10-29 Bank Of America Corporation Apparatus and method for performing session validation
US8726339B2 (en) 2011-08-15 2014-05-13 Bank Of America Corporation Method and apparatus for emergency session validation
WO2013025586A3 (en) * 2011-08-15 2014-05-15 Bank Of America Corporation Apparatus and method for performing session validation
US8752157B2 (en) 2011-08-15 2014-06-10 Bank Of America Corporation Method and apparatus for third party session validation
US8601541B2 (en) 2011-08-15 2013-12-03 Bank Of America Corporation Method and apparatus for session validation to access mainframe resources
US8572724B2 (en) 2011-08-15 2013-10-29 Bank Of America Corporation Method and apparatus for network session validation
US8584201B2 (en) 2011-08-15 2013-11-12 Bank Of America Corporation Method and apparatus for session validation to access from uncontrolled devices
US9159065B2 (en) 2011-08-15 2015-10-13 Bank Of America Corporation Method and apparatus for object security session validation
US8572686B2 (en) 2011-08-15 2013-10-29 Bank Of America Corporation Method and apparatus for object transaction session validation
US8572688B2 (en) 2011-08-15 2013-10-29 Bank Of America Corporation Method and apparatus for session validation to access third party resources
US8572690B2 (en) 2011-08-15 2013-10-29 Bank Of America Corporation Apparatus and method for performing session validation to access confidential resources
WO2013025586A2 (en) * 2011-08-15 2013-02-21 Bank Of America Corporation Apparatus and method for performing session validation
US8850515B2 (en) 2011-08-15 2014-09-30 Bank Of America Corporation Method and apparatus for subject recognition session validation
US20130054758A1 (en) * 2011-08-30 2013-02-28 Allure Energy, Inc. Customer engagement platform and portal having multi-media capabilities
US10250520B2 (en) * 2011-08-30 2019-04-02 Samsung Electronics Co., Ltd. Customer engagement platform and portal having multi-media capabilities
US8713704B2 (en) 2011-09-24 2014-04-29 Elwha Llc Behavioral fingerprint based authentication
US20130160087A1 (en) * 2011-09-24 2013-06-20 Elwha LLC, a limited liability corporation of the State of Delaware Behavioral fingerprinting with adaptive development
US8869241B2 (en) 2011-09-24 2014-10-21 Elwha Llc Network acquired behavioral fingerprint for authentication
US9825967B2 (en) 2011-09-24 2017-11-21 Elwha Llc Behavioral fingerprinting via social networking interaction
US9015860B2 (en) 2011-09-24 2015-04-21 Elwha Llc Behavioral fingerprinting via derived personal relation
US9298900B2 (en) 2011-09-24 2016-03-29 Elwha Llc Behavioral fingerprinting via inferred personal relation
US9729549B2 (en) * 2011-09-24 2017-08-08 Elwha Llc Behavioral fingerprinting with adaptive development
US8688980B2 (en) 2011-09-24 2014-04-01 Elwha Llc Trust verification schema based transaction authorization
US9621404B2 (en) 2011-09-24 2017-04-11 Elwha Llc Behavioral fingerprinting with social networking
US9083687B2 (en) 2011-09-24 2015-07-14 Elwha Llc Multi-device behavioral fingerprinting
US20130085851A1 (en) * 2011-09-30 2013-04-04 At&T Intellectual Property I, L.P. Targeted Advertising of Products Shown in Media Content
US20160026964A1 (en) * 2011-09-30 2016-01-28 Bloom Insurance Agency Llc Meeting monitoring and compliance assurance system
US8509816B2 (en) * 2011-11-11 2013-08-13 International Business Machines Corporation Data pre-fetching based on user demographics
US9633352B2 (en) 2011-11-22 2017-04-25 Square, Inc. Authorization of cardless payment transactions
US10185958B2 (en) 2011-11-22 2019-01-22 Square, Inc. Cardless payment transactions
US10592903B2 (en) 2011-11-22 2020-03-17 Square, Inc. Authorization of cardless payment transactions
US9589269B2 (en) 2011-11-22 2017-03-07 Square, Inc. Cardless payment transactions
US9799034B1 (en) 2011-11-22 2017-10-24 Square, Inc. Customer authentication for an order
US9576289B2 (en) 2011-11-22 2017-02-21 Square, Inc. Authorization of cardless payment transactions
US9348985B2 (en) 2011-11-23 2016-05-24 Elwha Llc Behavioral fingerprint controlled automatic task determination
US20140004940A1 (en) * 2011-12-09 2014-01-02 Alexander D. Wissner-Gross Providing Recreation and Social Activities in Retail Environments
US10002194B2 (en) * 2011-12-22 2018-06-19 James Neil Russell Event location with social network integration
US20130166385A1 (en) * 2011-12-22 2013-06-27 James Neil Russell Event Location with Social Network Integration
US20130171960A1 (en) * 2011-12-29 2013-07-04 Anil Kandregula Systems, methods, apparatus, and articles of manufacture to measure mobile device usage
US9020463B2 (en) * 2011-12-29 2015-04-28 The Nielsen Company (Us), Llc Systems, methods, apparatus, and articles of manufacture to measure mobile device usage
EP2624193A1 (en) * 2012-02-03 2013-08-07 RapidBlue Solutions Oy Method and system for monitoring spatial positions of a user at retailing premises
US11483252B2 (en) 2012-02-14 2022-10-25 Airwatch, Llc Controlling distribution of resources on a network
US10951541B2 (en) 2012-02-14 2021-03-16 Airwatch, Llc Controlling distribution of resources on a network
US11082355B2 (en) 2012-02-14 2021-08-03 Airwatch, Llc Controllng distribution of resources in a network
US20130227388A1 (en) * 2012-02-28 2013-08-29 Microsoft Corporation Persistent Storage of Profile Data for Script Compilation
JP2015515664A (en) * 2012-03-02 2015-05-28 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited Method and apparatus for user recognition and information distribution
US20130238426A1 (en) * 2012-03-06 2013-09-12 Verizon Patent And Licensing Inc. Providing advertisements via multiple devices
US10783531B2 (en) * 2012-03-16 2020-09-22 Square, Inc. Cardless payment transactions based on geographic locations of user devices
US9741045B1 (en) * 2012-03-16 2017-08-22 Square, Inc. Ranking of merchants for cardless payment transactions
US9373112B1 (en) 2012-03-16 2016-06-21 Square, Inc. Ranking of merchants for cardless payment transactions
US20160210606A1 (en) * 2012-03-16 2016-07-21 Square, Inc. Cardless Payment Transactions Based on Geographic Locations of User Devices
US20130262184A1 (en) * 2012-03-30 2013-10-03 Arbitron Inc. Systems and Methods for Presence Detection and Linking to Media Exposure Data
US9727884B2 (en) 2012-10-01 2017-08-08 Service Management Group, Inc. Tracking brand strength using consumer location data and consumer survey responses
US10726431B2 (en) 2012-10-01 2020-07-28 Service Management Group, Llc Consumer analytics system that determines, offers, and monitors use of rewards incentivizing consumers to perform tasks
US11064423B2 (en) 2012-10-22 2021-07-13 The Nielsen Company (Us), Llc Systems and methods for wirelessly modifying detection characteristics of portable devices
US10631231B2 (en) 2012-10-22 2020-04-21 The Nielsen Company (Us), Llc Systems and methods for wirelessly modifying detection characteristics of portable devices
US11825401B2 (en) 2012-10-22 2023-11-21 The Nielsen Company (Us), Llc Systems and methods for wirelessly modifying detection characteristics of portable devices
US9992729B2 (en) 2012-10-22 2018-06-05 The Nielsen Company (Us), Llc Systems and methods for wirelessly modifying detection characteristics of portable devices
US11449854B1 (en) 2012-10-29 2022-09-20 Block, Inc. Establishing consent for cardless transactions using short-range transmission
US20140123249A1 (en) * 2012-10-31 2014-05-01 Elwha LLC, a limited liability corporation of the State of Delaware Behavioral Fingerprinting Via Corroborative User Device
US10373151B1 (en) 2012-11-20 2019-08-06 Square, Inc. Multiple merchants in cardless payment transactions and multiple customers in cardless payment transactions
US9462332B2 (en) 2012-12-05 2016-10-04 At&T Intellectual Property I, L.P. Method and apparatus for controlling a media device
US10250837B2 (en) * 2012-12-05 2019-04-02 DISH Technologies L.L.C. User proximity recognition and hands-free control
US9602868B2 (en) 2012-12-05 2017-03-21 At&T Intellectual Property I, L.P. Method and apparatus for controlling a media device
US20140187268A1 (en) * 2012-12-28 2014-07-03 Arbitron Inc. Apparatus, System and Method for Location Detection and User Identification for Media Exposure Data
US10885522B1 (en) 2013-02-08 2021-01-05 Square, Inc. Updating merchant location for cardless payment transactions
CN110139137A (en) * 2013-02-18 2019-08-16 麦克赛尔株式会社 Display methods
US11729446B2 (en) * 2013-02-18 2023-08-15 Maxell, Ltd. Video display system, video display device, contents server, video display method, and video display program
US20190281336A1 (en) * 2013-02-18 2019-09-12 Maxell, Ltd. Video display system, video display device, contents server, video display method, and video display program
US10373221B1 (en) 2013-03-05 2019-08-06 Square, Inc. On-device directory search
US9763097B2 (en) 2013-03-13 2017-09-12 Lookout, Inc. Method for performing device security corrective actions based on loss of proximity to another device
US20140282877A1 (en) * 2013-03-13 2014-09-18 Lookout, Inc. System and method for changing security behavior of a device based on proximity to another device
US11017069B2 (en) * 2013-03-13 2021-05-25 Lookout, Inc. Method for changing mobile communications device functionality based upon receipt of a second code and the location of a key device
US9432361B2 (en) * 2013-03-13 2016-08-30 Lookout, Inc. System and method for changing security behavior of a device based on proximity to another device
US10360364B2 (en) 2013-03-13 2019-07-23 Lookout, Inc. Method for changing mobile communication device functionality based upon receipt of a second code
US11824644B2 (en) 2013-03-14 2023-11-21 Airwatch, Llc Controlling electronically communicated resources
US20210034192A1 (en) * 2013-03-15 2021-02-04 Amazon Technologies, Inc. Systems and methods for identifying users of devices and customizing devices to users
US10909590B2 (en) 2013-03-15 2021-02-02 Square, Inc. Merchant and item ratings
US20160337347A1 (en) * 2013-03-15 2016-11-17 Airwatch Llc Secondary device as key for authorizing access to resources
US11762494B2 (en) * 2013-03-15 2023-09-19 Amazon Technologies, Inc. Systems and methods for identifying users of devices and customizing devices to users
US10303872B2 (en) 2013-05-02 2019-05-28 Airwatch, Llc Location based configuration profile toggling
US11204993B2 (en) 2013-05-02 2021-12-21 Airwatch, Llc Location-based configuration profile toggling
US9159029B1 (en) * 2013-06-28 2015-10-13 Quantcast Corporation Inferring the presence of an entity within an identifier space based on the behaviors of unrelated entities
US9330361B1 (en) * 2013-06-28 2016-05-03 Quantcast Corporation Inferring the presence of an entity within an identifier space based on the behaviors of unrelated entities
US10922615B1 (en) 2013-06-28 2021-02-16 Quantcast Corporation Inferring the presence of an entity within an identifier space based on the behaviors of unrelated entities
US9154949B1 (en) 2013-07-08 2015-10-06 Sprint Communications Company L.P. Authenticated delivery of premium communication services to untrusted devices over an untrusted network
US9154955B1 (en) 2013-07-08 2015-10-06 Sprint Communications Company L.P. Authenticated delivery of premium communication services to trusted devices over an untrusted network
US10560808B2 (en) 2013-07-23 2020-02-11 Square, Inc. Computing distances of devices
US10332162B1 (en) 2013-09-30 2019-06-25 Square, Inc. Using wireless beacons for transit systems
US10068272B1 (en) 2013-10-28 2018-09-04 Square, Inc. Pickup order
US10319013B2 (en) 2013-10-28 2019-06-11 Square, Inc. Electronic ordering system
US11587146B1 (en) 2013-11-13 2023-02-21 Block, Inc. Wireless beacon shopping experience
US20230070891A1 (en) * 2013-11-22 2023-03-09 At&T Intellectual Property I, L.P. Targeting media delivery to a mobile audience
US11544742B2 (en) * 2013-11-22 2023-01-03 At&T Intellectual Property I, L.P. Targeting media delivery to a mobile audience
US20200372541A1 (en) * 2013-11-22 2020-11-26 At&T Intellectual Property I, L.P. Targeting media delivery to a mobile audience
US20150199547A1 (en) * 2014-01-11 2015-07-16 Federico Fraccaroli Method, system and apparatus for adapting the functionalities of a connected object associated with a user id
US9704132B2 (en) * 2014-01-11 2017-07-11 Federico Fraccaroli Method, system and apparatus for adapting the functionalities of a connected object associated with a user ID
US9319407B1 (en) 2014-04-18 2016-04-19 Sprint Communications Company L.P. Authentication extension to untrusted devices on an untrusted network
US10026083B1 (en) 2014-05-11 2018-07-17 Square, Inc. Tab for a venue
US9959529B1 (en) 2014-05-11 2018-05-01 Square, Inc. Open tab transactions
US11425192B2 (en) * 2014-05-23 2022-08-23 Capital One Services, Llc Systems and methods for communicating with a unique identifier
US11019134B2 (en) * 2014-05-23 2021-05-25 Capital One Services, Llc Systems and methods for communicating with a unique identifier
US11004109B2 (en) 2014-06-27 2021-05-11 Google Llc Automated creative extension selection for content performance optimization
US11182823B2 (en) 2014-06-27 2021-11-23 Google Llc Automated creative extension selection for content performance optimization
US10489818B2 (en) * 2014-06-27 2019-11-26 Google Llc Automated creative extension selection for content performance optimization
US20150379557A1 (en) * 2014-06-27 2015-12-31 Google Inc. Automated creative extension selection for content performance optimization
US20220044276A1 (en) * 2014-06-30 2022-02-10 Groupon, Inc. Apparatus, computer-implemented methods, and computer program products for providing dynamic data-driven profile based persona dimensional promotion selection
US20160014176A1 (en) * 2014-07-09 2016-01-14 Liveu Ltd. System and method for content solicitation
EP2988566A1 (en) * 2014-08-19 2016-02-24 Walkbase Oy Anonymous device position measuring system and method
US10460098B1 (en) * 2014-08-20 2019-10-29 Google Llc Linking devices using encrypted account identifiers
US9864778B1 (en) * 2014-09-29 2018-01-09 Amazon Technologies, Inc. System for providing events to users
US9584964B2 (en) 2014-12-22 2017-02-28 Airwatch Llc Enforcement of proximity based policies
US10194266B2 (en) 2014-12-22 2019-01-29 Airwatch Llc Enforcement of proximity based policies
US9635422B2 (en) * 2015-02-12 2017-04-25 Dstillery, Inc. Methods and apparatus for defining an audience for a particular location by surveying nearby receivers and/or passively monitoring content consumption
US10129595B2 (en) * 2015-02-12 2018-11-13 Dstillery, Inc. Methods and apparatus for defining an audience for a particular location by surveying nearby receivers and/or passively monitoring content consumption
US20200186883A1 (en) * 2015-02-12 2020-06-11 Dstillery, Inc. Methods and apparatus for defining an audience for a particular location by surveying nearby receivers and/or passively monitoring content consumption
US10757216B1 (en) 2015-02-20 2020-08-25 Amazon Technologies, Inc. Group profiles for group item recommendations
US11363460B1 (en) * 2015-03-03 2022-06-14 Amazon Technologies, Inc. Device-based identification for automated user detection
US20170366531A1 (en) * 2015-08-26 2017-12-21 Facebook, Inc. Authenticating Users to Media-Player Devices on Online Social Networks
US9781092B2 (en) * 2015-08-26 2017-10-03 Facebook, Inc. Authenticating users to media-player devices on online social networks
US10447679B2 (en) * 2015-08-26 2019-10-15 Facebook, Inc. Authenticating users to media-player devices on online social networks
US9924470B2 (en) 2015-08-26 2018-03-20 Facebook, Inc. User-defined coverage of media-player devices on online social networks
US20170063818A1 (en) * 2015-08-26 2017-03-02 Facebook, Inc. Authenticating Users to Media-Player Devices on Online Social Networks
US10530875B2 (en) 2015-08-26 2020-01-07 Facebook, Inc. Customizing media content on online social networks
US11093994B2 (en) 2015-10-23 2021-08-17 International Business Machines Corporation In-store shopper location-based gift idea determination
US10210560B2 (en) * 2015-10-23 2019-02-19 International Business Machines Corporation In-store shopper location-based gift idea determination
US10122733B2 (en) * 2016-08-02 2018-11-06 Capital One Services, Llc Systems and methods for proximity identity verification
US11588824B2 (en) * 2016-08-02 2023-02-21 Capital One Services, Llc Systems and methods for proximity identity verification
US10693888B2 (en) * 2016-08-02 2020-06-23 Capital One Services, Llc Systems and methods for proximity identity verification
US10313358B2 (en) * 2016-08-02 2019-06-04 Capital One Services, Llc Systems and methods for proximity identity verification
US20230164147A1 (en) * 2016-08-02 2023-05-25 Capital One Services, Llc Systems and methods for proximity identity verification
US20200389464A1 (en) * 2016-08-02 2020-12-10 Capital One Services, Llc Systems and methods for proximity identity verification
US10375077B1 (en) * 2016-08-12 2019-08-06 Symantec Corporation Systems and methods for mediating information requests
US10893325B2 (en) * 2016-11-04 2021-01-12 Samsung Electronics Co., Ltd. Display device and control method therefor
US20190246172A1 (en) * 2016-11-04 2019-08-08 Samsung Electronics Co., Ltd. Display device and control method therefor
US20190230405A1 (en) * 2018-01-22 2019-07-25 Comcast Cable Communications, Llc Supplemental video content delivery
US20200401360A1 (en) * 2018-02-23 2020-12-24 Samsung Electronics Co., Ltd. Electronic device and operating method therefor
US11599321B2 (en) * 2018-02-23 2023-03-07 Samsung Electronics Co., Ltd Electronic device and operating method therefor
US20220292518A1 (en) * 2018-03-16 2022-09-15 Wells Fargo Bank, N.A. Sentiment analysis data retrieval
US10531239B1 (en) * 2018-09-21 2020-01-07 Rovi Guides, Inc. Systems and methods for temporarily licensing content
US20220188942A1 (en) * 2020-01-30 2022-06-16 Capital One Services, Llc Employment status detection based on transaction information
US11836809B2 (en) * 2020-01-30 2023-12-05 Capital One Services, Llc Employment status detection based on transaction information
US20210279749A1 (en) * 2020-03-02 2021-09-09 PlaceIQ, Inc. Characterizing geographic areas based on geolocations reported by populations of mobile computing devices
US11741487B2 (en) * 2020-03-02 2023-08-29 PlaceIQ, Inc. Characterizing geographic areas based on geolocations reported by populations of mobile computing devices
US20230032959A1 (en) * 2021-08-02 2023-02-02 Rovi Guides, Inc. Systems and methods for detecting a number of viewers

Also Published As

Publication number Publication date
US9204376B2 (en) 2015-12-01
US20120323685A1 (en) 2012-12-20
US20130259020A1 (en) 2013-10-03

Similar Documents

Publication Publication Date Title
US8060399B2 (en) Targeting content to network-enabled television devices
US20120323685A1 (en) Real world behavior measurement using identifiers specific to mobile devices
EP2840544A1 (en) Methods and systems for using mobile device specific identifiers and short-distance wireless protocols to manage, secure and target content
US20080109888A1 (en) Methods and systems for securing content projected to a nearby device
US20080220760A1 (en) Methods and systems for usage profiling associated with device specific identifiers
EP2248361A2 (en) Real world behavior measurement using mobile device specific identifiers

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION