Patent application number | Description | Published |
20090129377 | SERVICE FOR MAPPING IP ADDRESSES TO USER SEGMENTS - A system is disclosed that uses behavioral data collected by ISPs to categorize particular ISP subscribers. The behavioral data may, for example, include the identities of particular web sites and/or web pages accessed by particular subscribers, the search queries used by the subscribers to conduct Internet searches, and/or other types of behavioral information. The ISP subscribers are assigned to particular behavioral categories or “segments” using a behavioral segmentation schema that maps particular subscriber behaviors to particular behavioral segments. The ISP subscribers may also be mapped to other segment types, such as demographic segments derived from off-line data about the subscribers. The subscriber-to-segment mappings are made available to content targeting entities via a query interface that, for example, supports queries of the form “what are the segments associated with IP address X?” | 05-21-2009 |
20090132559 | BEHAVIORAL SEGMENTATION USING ISP-COLLECTED BEHAVIORAL DATA - A system is disclosed that uses behavioral data collected by ISPs to categorize particular ISP subscribers. The behavioral data may, for example, include the identities of particular web sites and/or web pages accessed by particular subscribers, the search queries used by the subscribers to conduct Internet searches, and/or other types of behavioral information. The ISP subscribers are assigned to particular behavioral categories or “segments” using a behavioral segmentation schema that maps particular subscriber behaviors to particular behavioral segments. The ISP subscribers may also be mapped to other segment types, such as demographic segments derived from off-line data about the subscribers. The subscriber-to-segment mappings are made available to content targeting entities via a query interface that, for example, supports queries of the form “what are the segments associated with IP address X?” | 05-21-2009 |
20100094758 | SYSTEMS AND METHODS FOR PROVIDING REAL TIME ANONYMIZED MARKETING INFORMATION - Embodiments disclosed herein are directed to systems and methods for enabling the matching of third party data with access providers' subscriber data in a privacy compliant manner, and then connecting an internet user to that third party data for use by marketers, content providers, or other interested parties in a manner that protects consumer privacy at all times. In one embodiment, an access provider such as an ISP sends its subscriber data to a double blind processor that generates an encrypted key for each subscriber. The key is then used to find matching consumer data, for example, consumer segments that represent previously collected or modeled consumer attitudinal, habit, or financial data. The key may be forwarded to a real time marketing bureau, which may use the matched data in subsequent real-time or substantially real-time operations to provide consumer or business data to advertisers, content providers, and other interested parties. | 04-15-2010 |
20110060905 | SYSTEMS AND METHODS FOR PROVIDING ANONYMIZED USER PROFILE DATA - Embodiments facilitate confidential and secure sharing of anonymous user profile data to improve the delivery of customized content. Embodiments of the invention provide a data appliance to an entity such as a business to convert profile data about the business's customers into anonymous identifiers. A similar data appliance is provided to a content provider in one embodiment to generate identifiers for its user profile data. Because the anonymous identifiers are generated with the same anonymization method, identical identifiers are likely generated from profile data of the same users. Therefore, the identifiers can be used to anonymously match the customers of the business to the users of the content provider. Therefore, data can be shared to improve customized content such as advertisements that the business wishes to place with the content provider without requiring the business to disclose customer data in an unencrypted form, and any non-matched data can remain confidential. | 03-10-2011 |
20110289190 | SERVICE FOR ASSOCIATING IP ADDRESSES WITH USER SEGMENTS - A system is disclosed that maps IP addresses and geographic regions to particular categories or “segments” reflective of user profiles. The mappings may be based on behavioral data reflective of user browsing activities, offline data (e.g., survey data or demographic data), or a combination thereof. In one embodiment, the mappings are generated using data collected by a plurality of Internet Service Providers (ISPs) regarding their subscribers. The system also includes a query interface that enables content providers to retrieve segment data associated with particular IP addresses. | 11-24-2011 |
20120084399 | Reconfigurable Download Manager - Some embodiments provide a reconfigurable tool for managing the downloading of content from, while reporting information to, various content providers and Content Delivery Networks (CDNs) through a single installed instance of the reconfigurable tool. In some embodiments, the tool includes a container application that is used to download content that is supplied by various content providers. The tool also includes a configuration file. The configuration file configures operation of the application to download content from a particular content host. The configuration also specifies reporting parameters that identify what information to report, when to report the information, and to whom the information is reported as part of the content download. Using this tool, content providers and CDNs are able to provide customizable and unique user experiences without modifying the code base of the application and without having to develop and maintain their own proprietary download manager applications. | 04-05-2012 |
20120120800 | Request Modification for Transparent Capacity Management in a Carrier Network - Some embodiments provide a capacity management agent that modifies content requests to adjust bandwidth consumption when streaming requested content from a content provider to a requesting user. The modifications include modifying a URL or header information of the request. The agent performs a process that receives a request for content of a content provider. The process identifies a parameter of the carrier network and modifies the request when the parameter satisfies a threshold. The process passes the request to the content provider and the content provider provides content that consumes a first set of resources in response to an unmodified request and a second set of resources in response to a modified request. When the parameter identifies congestion, the first set of resources is greater than the second set of resources. When the condition parameter identifies underutilization, the first set of resources is less than the second set of resources. | 05-17-2012 |
20120120818 | Bandwidth Modification for Transparent Capacity Management in a Carrier Network - Some embodiments provide a capacity management agent that modifies bandwidth that is allocated between an end user and a carrier network by caching requested content that is streamed at a first rate and then providing the cached content to the end user through the carrier network at a second rate. The agent performs a process that includes receiving data intended for a service region of the carrier network from an external data network. The process identifies resource availability at the service region. Next, the process passes the data to the service region at the first rate when the resource availability at the service region is not less than a threshold amount and caches the data for passing to the service region at the second rate that consumes fewer carrier network resource than the first rate when the resource availability at the service region is less than the threshold amount. | 05-17-2012 |
20120124184 | Discrete Mapping for Targeted Caching - Some embodiments provide systems and methods for implementing discrete mapping for targeted caching in a carrier network. In some embodiments, discrete mapping is implemented using a method that caches content from a content provider to a caching server. The method modifies a DNS entry at a particular DNS server to resolve a request that identifies either a hostname or a domain for the content provider to an address of the caching server so that the requested content is passed from the cached content of the caching server and not the source content provider. In some embodiments, the particular DNS server is a recursive DNS server, a local DNS server of the carrier network, or a DNS server that is not authoritative for the hostname or domain of the content provider. | 05-17-2012 |
20120185503 | SERVICE FOR ASSOCIATING NETWORK USERS WITH PROFILES - A system is disclosed that maps user IDs (such as IP addresses) and geographic regions to particular categories or “segments” reflective of user profiles. The mappings may be based on behavioral data reflective of user browsing activities, offline data (e.g., survey data or demographic data), or a combination thereof. In one embodiment, the mappings are generated using data collected by a plurality of Internet Service Providers (ISPs) regarding their subscribers. The system also includes a query interface that enables content providers to retrieve segment data associated with particular user IDs. | 07-19-2012 |
20130046883 | End-to-End Content Delivery Network Incorporating Independently Operated Transparent Caches and Proxy Caches - Some embodiments provide an end-to-end federated CDN solution that assimilates a transparent caching server that is operated by a transparent caching server operator into a CDN that independently operates CDN caching servers. Specifically, the logs from the transparent caching server are assimilated into the CDN by aggregating the logs from the transparent caching server and processing the transparent caching server logs to identify network usage for content of a CDN content provider customer that is delivered by the transparent caching server. The network usage is then combined with the network usage that tracked by the CDN caching servers in order to provide comprehensive report metrics for the content provider customer and to bill the content provider customer for all network usage related to delivering the content provider customer's content irrespective of whether the content was delivered by a transparent caching server or a CDN caching server. | 02-21-2013 |
20130238472 | Systems and Methods for Billing Content Providers for Designated Content Delivered Over a Data Network - Some embodiments provide multi-tenant billing systems and methods whereby data network usage fees that are associated with delivering select content of different content providers over a data network are passed to the content provider that originates or is the source for that select content instead of the end users that request and receive the select content. A deep packet inspection server or a billing server may be configured with a list of identifiers to distinguish between the network usage that is related to the delivery of the designated free content from the network usage that is not related to the delivery of the designated free content. The network usage can be distinguished by filtering or processing usage logs that track the network usage using the configured list of identifiers. Such filtering or processing can be done in real-time or in a delayed manner in a standalone or integrated system. | 09-12-2013 |
20130238473 | Systems and Methods for Billing Content Providers for Designated Content Delivered Over a Data Network - Some embodiments provide multi-tenant billing systems and methods whereby data network usage fees that are associated with delivering select content of different content providers over a data network are passed to the content provider that originates or is the source for that select content instead of the end users that request and receive the select content. A deep packet inspection server or a billing server may be configured with a list of identifiers to distinguish between the network usage that is related to the delivery of the designated free content from the network usage that is not related to the delivery of the designated free content. The network usage can be distinguished by filtering or processing usage logs that track the network usage using the configured list of identifiers. Such filtering or processing can be done in real-time or in a delayed manner in a standalone or integrated system. | 09-12-2013 |
20130339519 | Systems and Methods for Performing Localized Server-Side Monitoring in a Content Delivery Network - Some embodiments provide systems and methods for performing localized and real-time server-side network performance monitoring. These systems and methods leverage the distributed architecture of a content delivery network (CDN) so as to perform distributed monitoring with each Point-of-Presence of the CDN responsible for monitoring performance to a localized set of end users. These systems and methods also leverage existing traffic flows from a server to a particular end user in order to perform real-time server-side network performance monitoring without the injection of specialized monitoring packets and without active involvement of the end user in deriving the performance measurements. The performance measurements are then used to optimize delivery of existing and future traffic flows to the end user. | 12-19-2013 |
20140095804 | Efficient Cache Validation and Content Retrieval in a Content Delivery Network - Some embodiments provide systems and methods for validating cached content based on changes in the content instead of an expiration interval. One method involves caching content and a first checksum in response to a first request for that content. The caching produces a cached instance of the content representative of a form of the content at the time of caching. The first checksum identifies the cached instance. In response to receiving a second request for the content, the method submits a request for a second checksum representing a current instance of the content and a request for the current instance. Upon receiving the second checksum, the method serves the cached instance of the content when the first checksum matches the second checksum and serves the current instance of the content upon completion of the transfer of the current instance when the first checksum does not match the second checksum. | 04-03-2014 |
20140201007 | SYSTEMS AND METHODS FOR PROVIDING ANONYMIZED USER PROFILE DATA - Embodiments facilitate confidential and secure sharing of anonymous user profile data to improve the delivery of customized content. Embodiments of the invention provide a data appliance to an entity such as a business to convert profile data about the business's customers into anonymous identifiers. A similar data appliance is provided to a content provider in one embodiment to generate identifiers for its user profile data. Because the anonymous identifiers are generated with the same anonymization method, identical identifiers are likely generated from profile data of the same users. Therefore, the identifiers can be used to anonymously match the customers of the business to the users of the content provider. Therefore, data can be shared to improve customized content such as advertisements that the business wishes to place with the content provider without requiring the business to disclose customer data in an unencrypted form, and any non-matched data can remain confidential. | 07-17-2014 |