Patent application number | Description | Published |
20080235351 | Apparatus, Systems and Methods for Targeted Content Delivery - According to some embodiments of the present invention, a system, apparatus and method for targeted content delivery is presented. In some embodiments, the method comprises registering users logging-on to a computer network and gathering user-related information from users. Location-centric information for each user logged-on to the network is relayed to a server, and user-profile information for each user is retrieved from a database. User-profile and location-centric information for each user is processed to get targeting information for each user and the targeting information is sent to a content-provider wherein the content-provider uses the targeting information to select content to be displayed to each user. In some embodiments, user-profile and location-centric information may be gathered from wireless access points to which users log-on in order to access the Internet. | 09-25-2008 |
20080262901 | Systems and Method of Network Operation and Information Processing, Including Data Acquisition, Processing and Provision, Including Data Acquisition, Processing and Provision and/or Interoperability Features - According to some embodiments of the present invention, a system ( | 10-23-2008 |
20080263633 | Systems and Methods of Network Operation and Information Processing, Including Data Acquisition, Processing and Provision and/or Interoperability Features - According to some embodiments of the present invention, a system, apparatus and method of network operation and information processing, including data acquisition, data processing, data provision, and/or data interoperability features is presented. In some exemplary embodiments, the method includes registering users logging-on to a computer network and gathering user-related information from users. In one or more embodiments, user-profile and location-centric information for each user may be gathered and/or processed in connection with processing targeting and content information. | 10-23-2008 |
20090282468 | Systems and methods of network operation and information processing, including use of persistent/anonymous identifiers throughout all stages of information processing and delivery - Systems and methods are disclosed for network operation and information processing associated with global unique identifiers (GUIDs). In one exemplary embodiment, there is provided a method of inserting a UID into a web-bound request. Moreover, the method includes, in the context of processing a web-bound request associated with a browsing session, extracting non-personal/device information during MAC/network layer processing, processing an anonymous UID created based on the non-personal/device information, and inserting the UID in the HTTP header or other extensible locations within the web-bound request. Exemplary embodiments may also include enabling global persistence of the UID as a function of extraction of non-personal/device data during MAC/network layer processing. | 11-12-2009 |
20090327488 | Method and System for Implementing Consumer Choice in a Targeted Message Delivery System - Embodiments are directed to a method and system of providing a centralized consumer choice process covering multiple Internet-based content services. The method comprises transmitting a consumer choice notification message to a user, receiving an indication of consumer choice with regard to gathering, storing or sharing of consumer information and activity during user Internet activity, wherein the consumer choice may comprise one of an opt-out or opt-in selection, storing the indicated consumer choice in a customer relationship management module, and setting a protocol in a network routing device to tag network traffic bound for a remote Internet-based content service indicating the user's choice. In one embodiment, reception of the tag indicates to the Internet-based content services that the user has agreed to participate in the gathering, storing, or sharing of defined user information, and the absence of a tag indicates that the user has declined to participate in the gathering, storing, or sharing of defined user information. Alternatively, two different types of tags may be provided to indicate the user's choice with respect to opt-in or opt-out. | 12-31-2009 |
20100082775 | Directed Media Based On User Preferences - A system for determining directed media for a user is provided. The exemplary system comprises a media selection optimizer which is configured to determine a directed media component based on a user profile associated, via a device identifier, with a network access device. The media selection optimizer may also utilize access point information, historic information, and access point location-centric information in its determination of the directed media component. The directed media component may then be forward to a media server which provides the corresponding directed media to the user. The directed media may comprise advertisement, coupons, video, music, or any other media which is customizable to the user. | 04-01-2010 |
Patent application number | Description | Published |
20080244076 | Method and Apparatus for Tagging Network Traffic Using Extensible Fields in Message Headers - Embodiments of a system and method of tagging network traffic with relevant user demographic and location information for facilitating the delivery of directed media are described. A tag processing module within a router device coupling a client computer to a destination site served by a server computer intercepts a request from a client computer to a server computer over a network. The tag processing module determines a unique device identifier corresponding to the client computer, generates a local user identifier for the client computer by performing a one-way hashing operation on the unique device identifier, derives demographic and location information for a user of the client computer, generates a request identifier associated with the intercepted request by encrypting the local user identifier, demographic information and geographic location information in an alphanumeric string, and embeds the alphanumeric string in an extensible field of a packet within the request to generate a tagged request identifier. | 10-02-2008 |
20080255944 | Campaign Management Platform for Network-Based Online Advertising and Directed Media Transmission System - Embodiments of a system and method for managing multi-media advertising campaigns across multiple online and offline media sources are described. A durable network identifier is associated with a client device that is used to access an advertising network. The durable identifier comprises an alphanumeric tag associated with network traffic transmitted through routing devices of the network. The durable identifier indexes relevant user demographic and client device information for facilitating the delivery of directed media within the advertising network and is embedded within requests sent from the client computer to a target server computer over a network. A campaign management platform processes certain user metrics provided by the tag processing service and supplements this information with certain extrinsic data. Analysis processes determine behavioral or contextual targeting, as well as user response to ad messages. | 10-16-2008 |
20090168995 | Systems and Methods of Information/Network Processing Consistent with Creation, Encryption and/or Insertion of UIDs/Tags - Embodiments are directed to a system and method of generating a global unique identifier (GUID) associated with web/network-related requests. In the context of processing a web-bound request associated with a browsing session, the method comprises receiving information associated with a device that initiated a web-bound request, extracting non-personal/device information during MAC/network layer processing, and creating an anonymous GUID based on the non-personal/device information. The GUID may be implemented as an alphanumeric string that is least partially encrypted and inserted in an extensible location of the HTTP data. The non-personal/device information includes one or more of data associated with a device/user, data related to the device, software on the device, or any user/input data that is resident on the device. The global persistence of the GUID is enabled as a function of extraction of non-personal/device data during MAC/network layer processing. | 07-02-2009 |
20100022272 | METHOD AND APPARATUS FOR DISABLING THE RF FUNCTIONALITY OF A MULTI-FUNCTION WIRELESS COMMUNICATION DEVICE WHILE MAINTAINING ACCESS TO LOCAL FUNCTIONALITY - A method and apparatus for disabling the communication functionality (i.e., disabling the transmission and/or reception of RF signals) of an integrated device, while still providing access to the local functionality of such device. A control and select function, such as a switch that is implemented by hardware or software or a combination thereof, is provided in an integrated device to allow the end user of the device to access the local data processing functionality of the device, even while the wireless communication functionality of such device is disabled. | 01-28-2010 |
20100169803 | Method and System for Implementing User Generated Preferences in a Communication System - Embodiments of a distributed network system that implements a user-generated preferences (UGP) method to obtain meaningful data regarding user choices and profile data are described. The UGP process is implemented as an interactive application used to understand and segment internet users through graphical question and answer methodology. Over time as internet users participate and interact with the application more preferences are discovered which creates a silo, or profile, of information unique to each user. The interactive question and answer structure is directed to consumer users who are accessing specific websites or browsing the Internet. The UGP process provides the ability for a content provider to engage the user at several different times during the web browsing session, each in a slightly different way, but each in an equivalently engaging way. | 07-01-2010 |
20110300860 | METHOD AND APPARATUS FOR DISABLING THE RF FUNCTIONALITY OF A MULTI-FUNCTION WIRELESS COMMUNICATION DEVICE WHILE MAINTAINING ACCESS TO LOCAL FUNCTIONALITY - A method and apparatus for disabling the communication functionality (i.e., disabling the transmission and/or reception of RF signals) of an integrated device, while still providing access to the local functionality of such device. A control and select function, such as a switch that is implemented by hardware or software or a combination thereof, is provided in an integrated device to allow the end user of the device to access the local data processing functionality of the device, even while the wireless communication functionality of such device is disabled. | 12-08-2011 |
20120208508 | METHOD AND APPARATUS FOR DISABLING THE RF FUNCTIONALITY OF A MULTI-FUNCTION WIRELESS COMMUNICATION DEVICE WHILE MAINTAINING ACCESS TO LOCAL FUNCTIONALITY - A method and apparatus for disabling the communication functionality (i.e., disabling the transmission and/or reception of RF signals) of an integrated device, while still providing access to the local functionality of such device. A control and select function, such as a switch that is implemented by hardware or software or a combination thereof, is provided in an integrated device to allow the end user of the device to access the local data processing functionality of the device, even while the wireless communication functionality of such device is disabled. | 08-16-2012 |
20140194098 | METHOD AND APPARATUS FOR DISABLING THE RF FUNCTIONALITY OF A MULTI-FUNCTION WIRELESS COMMUNICATION DEVICE WHILE MAINTAINING ACCESS TO LOCAL FUNCTIONALITY - A method and apparatus for disabling the communication functionality (i.e., disabling the transmission and/or reception of RF signals) of an integrated device, while still providing access to the local functionality of such device. A control and select function, such as a switch that is implemented by hardware or software or a combination thereof, is provided in an integrated device to allow the end user of the device to access the local data processing functionality of the device, even while the wireless communication functionality of such device is disabled. | 07-10-2014 |
20150032550 | METHOD AND APPARATUS FOR TAGGING NETWORK TRAFFIC USING EXTENSIBLE FIELDS IN MESSAGE HEADERS - Embodiments within describe a system and method of tagging network traffic with relevant user information for facilitating the delivery of directed media. In an embodiment, a user identifier is generated from user information. Network traffic from the user and bound for a destination site is tagged within a network routing device. The tagged traffic is tagged with a request identifier that has the user identifier encrypted in an alphanumeric string. The tagged network traffic is transmitted to the destination site. A request is received from the destination site to decode the tagged network traffic, retrieve stored user information, and transmit the stored user information to the destination site. | 01-29-2015 |
Patent application number | Description | Published |
20080288658 | SYSTEMS AND METHODS OF NETWORK OPERATION AND INFORMATION PROCESSING, INCLUDING USE OF UNIQUE/ANONYMOUS IDENTIFIERS THROUGHOUT ALL STAGES OF INFORMATION PROCESSING AND DELIVERY - Systems and methods are disclosed for network operation and information processing involving engaging users of a network. In one exemplary embodiment, there is provided a method of engaging users of a public-access network. Moreover, the method includes associating a processing component with the public-access network; transmitting a request for authorization to use the public-access network, including transmission of a specific identifier associated with the user; transmitting first data including data determined by processing software as a function of the specific identifier; and opening up a connection to the network for the user. In one or more further embodiments, the specific identifier may include or be a function of a processing component ID or the MAC address of a device associated with the user. Other exemplary embodiments may include building profiles of users who access the network based on information collected. | 11-20-2008 |
20090049192 | Systems and methods of network operation and information processing, including use of unique/anonymous identifiers throughout all stages of information processing and delivery - Systems and methods are disclosed for network operation and information processing involving engaging users of a network. In one exemplary embodiment, there is provided a method of engaging users of a public-access network. Moreover, the method includes associating a processing component with the public-access network; transmitting a request for authorization to use the public-access network, including transmission of a specific identifier associated with the user; transmitting first data including data determined by processing software as a function of the specific identifier; and opening up a connection to the network for the user. In one or more further embodiments, the specific identifier may include or be a function of a processing component ID or the MAC address of a device associated with the user. Other exemplary embodiments may include building profiles of users who access the network based on information collected. | 02-19-2009 |
20090222895 | Systems and Methods of Network Operation and Information Processing - Systems and methods are disclosed for network operation and information processing involving engaging users of a network. In one exemplary embodiment, there is provided a method of engaging users of a public-access network. Moreover, the method includes associating a processing component with the public-access network; transmitting a request for authorization to use the public-access network, including transmission of a specific identifier associated with the user; transmitting first data including data determined by processing software as a function of the specific identifier; and opening up a connection to the network for the user. In one or more further embodiments, the specific identifier may include or be a function of a processing component ID or the MAC address of a device associated with the user. Other exemplary embodiments may include building profiles of users who access the network based on information collected. | 09-03-2009 |
20120215898 | Applications of a Network-Centric Information Distribution Platform on the Internet - The predominant way of customizing and tailoring services on the Internet is the use of cookies. The invention in this disclosure is to use the http header in an http get request as a distribution mechanism of anonymized and unique metadata between the user and the web server, and then for the web server to interrogate an information storage system hosted in the cloud or in a server to get real-time information, classification, categorization of that device in real time. The invention allows the web server to customize the service for that particular session using that information. This two-tiered distribution platform on the internet can be used for a wide range of applications such as advertising, security, authentication, emergency altering, children's privacy in a reliable, robust and trust-worthy way compared to the use of cookies, and the invention is universal and works with any Internet connected device. | 08-23-2012 |
Patent application number | Description | Published |
20150207662 | NETWORK CONTROL SOFTWARE NOTIFICATION WITH ADVANCE LEARNING - Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch detects packets sent by a new or migrated virtual machine, and sends a copy of a detected packet to the network control software as a notification. The switch further learns the source MAC address, thereby permitting the entry to be used for normal forwarding prior to validation of the entry and the VM associated therewith by the network control software. Until the network control software has validated the VM, the switch may periodically retry the notification to the network control software. “No_Redirect” and “Not_Validated” flags may be used to indicate whether a notification has already been attempted and thus no retry is necessary, and that the VM associated with the VM has not yet been validated, respectively. | 07-23-2015 |
20150207663 | NETWORK CONTROL SOFTWARE NOTIFICATION AND INVALIDATION OF STATIC ENTRIES - Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch may redirect a packet sent by a new or migrated virtual machine to the network control software as a notification. The switch does not forward the packet, thereby protecting against denial of service attacks. The switch further adds to a forwarding database a temporary entry which includes a “No_Redirect” flag for a new source MAC address, or updates an existing entry for a source MAC address that hits in the forwarding database by setting the “No_Redirect” flag. The “No_Redirect” flag indicates whether a notification has already been sent to the network control software for this source MAC address. The switch may periodically retry the notification to the network control software, until the network control software validates the source MAC address, depending on whether the “No_Redirect” is set. | 07-23-2015 |
20150207664 | NETWORK CONTROL SOFTWARE NOTIFICATION WITH DENIAL OF SERVICE PROTECTION - Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch may redirect a packet sent by a new or migrated virtual machine to the network control software as a notification. The switch does not forward the packet, thereby protecting against denial of service attacks. The switch further adds to a forwarding database a temporary entry which includes a “No_Redirect” flag for a new source MAC address, or updates an existing entry for a source MAC address that hits in the forwarding database by setting the “No_Redirect” flag. The “No_Redirect” flag indicates whether a notification has already been sent to the network control software for this source MAC address. The switch may periodically retry the notification to the network control software, until the network control software validates the source MAC address, depending on whether the “No_Redirect” is set. | 07-23-2015 |
20150207665 | NETWORK CONTROL SOFTWARE NOTIFICATION WITH DENIAL OF SERVICE PROTECTION - Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch may redirect a packet sent by a new or migrated virtual machine to the network control software as a notification. The switch does not forward the packet, thereby protecting against denial of service attacks. The switch further adds to a forwarding database a temporary entry which includes a “No_Redirect” flag for a new source MAC address, or updates an existing entry for a source MAC address that hits in the forwarding database by setting the “No_Redirect” flag. The “No_Redirect” flag indicates whether a notification has already been sent to the network control software for this source MAC address. The switch may periodically retry the notification to the network control software, until the network control software validates the source MAC address, depending on whether the “No_Redirect” is set. | 07-23-2015 |
20150207666 | NETWORK CONTROL SOFTWARE NOTIFICATION AND INVALIDATION OF STATIC ENTRIES - Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch may redirect a packet sent by a new or migrated virtual machine to the network control software as a notification. The switch does not forward the packet, thereby protecting against denial of service attacks. The switch further adds to a forwarding database a temporary entry which includes a “No_Redirect” flag for a new source MAC address, or updates an existing entry for a source MAC address that hits in the forwarding database by setting the “No_Redirect” flag. The “No_Redirect” flag indicates whether a notification has already been sent to the network control software for this source MAC address. The switch may periodically retry the notification to the network control software, until the network control software validates the source MAC address, depending on whether the “No_Redirect” is set. | 07-23-2015 |
20150207667 | NETWORK CONTROL SOFTWARE NOTIFICATION WITH ADVANCE LEARNING - Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch detects packets sent by a new or migrated virtual machine, and sends a copy of a detected packet to the network control software as a notification. The switch further learns the source MAC address, thereby permitting the entry to be used for normal forwarding prior to validation of the entry and the VM associated therewith by the network control software. Until the network control software has validated the VM, the switch may periodically retry the notification to the network control software. “No_Redirect” and “Not_Validated” flags may be used to indicate whether a notification has already been attempted and thus no retry is necessary, and that the VM associated with the VM has not yet been validated, respectively. | 07-23-2015 |