Patent application number | Description | Published |
20080235351 | Apparatus, Systems and Methods for Targeted Content Delivery - According to some embodiments of the present invention, a system, apparatus and method for targeted content delivery is presented. In some embodiments, the method comprises registering users logging-on to a computer network and gathering user-related information from users. Location-centric information for each user logged-on to the network is relayed to a server, and user-profile information for each user is retrieved from a database. User-profile and location-centric information for each user is processed to get targeting information for each user and the targeting information is sent to a content-provider wherein the content-provider uses the targeting information to select content to be displayed to each user. In some embodiments, user-profile and location-centric information may be gathered from wireless access points to which users log-on in order to access the Internet. | 09-25-2008 |
20080244076 | Method and Apparatus for Tagging Network Traffic Using Extensible Fields in Message Headers - Embodiments of a system and method of tagging network traffic with relevant user demographic and location information for facilitating the delivery of directed media are described. A tag processing module within a router device coupling a client computer to a destination site served by a server computer intercepts a request from a client computer to a server computer over a network. The tag processing module determines a unique device identifier corresponding to the client computer, generates a local user identifier for the client computer by performing a one-way hashing operation on the unique device identifier, derives demographic and location information for a user of the client computer, generates a request identifier associated with the intercepted request by encrypting the local user identifier, demographic information and geographic location information in an alphanumeric string, and embeds the alphanumeric string in an extensible field of a packet within the request to generate a tagged request identifier. | 10-02-2008 |
20080262901 | Systems and Method of Network Operation and Information Processing, Including Data Acquisition, Processing and Provision, Including Data Acquisition, Processing and Provision and/or Interoperability Features - According to some embodiments of the present invention, a system ( | 10-23-2008 |
20080263633 | Systems and Methods of Network Operation and Information Processing, Including Data Acquisition, Processing and Provision and/or Interoperability Features - According to some embodiments of the present invention, a system, apparatus and method of network operation and information processing, including data acquisition, data processing, data provision, and/or data interoperability features is presented. In some exemplary embodiments, the method includes registering users logging-on to a computer network and gathering user-related information from users. In one or more embodiments, user-profile and location-centric information for each user may be gathered and/or processed in connection with processing targeting and content information. | 10-23-2008 |
20080288658 | SYSTEMS AND METHODS OF NETWORK OPERATION AND INFORMATION PROCESSING, INCLUDING USE OF UNIQUE/ANONYMOUS IDENTIFIERS THROUGHOUT ALL STAGES OF INFORMATION PROCESSING AND DELIVERY - Systems and methods are disclosed for network operation and information processing involving engaging users of a network. In one exemplary embodiment, there is provided a method of engaging users of a public-access network. Moreover, the method includes associating a processing component with the public-access network; transmitting a request for authorization to use the public-access network, including transmission of a specific identifier associated with the user; transmitting first data including data determined by processing software as a function of the specific identifier; and opening up a connection to the network for the user. In one or more further embodiments, the specific identifier may include or be a function of a processing component ID or the MAC address of a device associated with the user. Other exemplary embodiments may include building profiles of users who access the network based on information collected. | 11-20-2008 |
20090049192 | Systems and methods of network operation and information processing, including use of unique/anonymous identifiers throughout all stages of information processing and delivery - Systems and methods are disclosed for network operation and information processing involving engaging users of a network. In one exemplary embodiment, there is provided a method of engaging users of a public-access network. Moreover, the method includes associating a processing component with the public-access network; transmitting a request for authorization to use the public-access network, including transmission of a specific identifier associated with the user; transmitting first data including data determined by processing software as a function of the specific identifier; and opening up a connection to the network for the user. In one or more further embodiments, the specific identifier may include or be a function of a processing component ID or the MAC address of a device associated with the user. Other exemplary embodiments may include building profiles of users who access the network based on information collected. | 02-19-2009 |
20090168995 | Systems and Methods of Information/Network Processing Consistent with Creation, Encryption and/or Insertion of UIDs/Tags - Embodiments are directed to a system and method of generating a global unique identifier (GUID) associated with web/network-related requests. In the context of processing a web-bound request associated with a browsing session, the method comprises receiving information associated with a device that initiated a web-bound request, extracting non-personal/device information during MAC/network layer processing, and creating an anonymous GUID based on the non-personal/device information. The GUID may be implemented as an alphanumeric string that is least partially encrypted and inserted in an extensible location of the HTTP data. The non-personal/device information includes one or more of data associated with a device/user, data related to the device, software on the device, or any user/input data that is resident on the device. The global persistence of the GUID is enabled as a function of extraction of non-personal/device data during MAC/network layer processing. | 07-02-2009 |
20090222895 | Systems and Methods of Network Operation and Information Processing - Systems and methods are disclosed for network operation and information processing involving engaging users of a network. In one exemplary embodiment, there is provided a method of engaging users of a public-access network. Moreover, the method includes associating a processing component with the public-access network; transmitting a request for authorization to use the public-access network, including transmission of a specific identifier associated with the user; transmitting first data including data determined by processing software as a function of the specific identifier; and opening up a connection to the network for the user. In one or more further embodiments, the specific identifier may include or be a function of a processing component ID or the MAC address of a device associated with the user. Other exemplary embodiments may include building profiles of users who access the network based on information collected. | 09-03-2009 |
20090327488 | Method and System for Implementing Consumer Choice in a Targeted Message Delivery System - Embodiments are directed to a method and system of providing a centralized consumer choice process covering multiple Internet-based content services. The method comprises transmitting a consumer choice notification message to a user, receiving an indication of consumer choice with regard to gathering, storing or sharing of consumer information and activity during user Internet activity, wherein the consumer choice may comprise one of an opt-out or opt-in selection, storing the indicated consumer choice in a customer relationship management module, and setting a protocol in a network routing device to tag network traffic bound for a remote Internet-based content service indicating the user's choice. In one embodiment, reception of the tag indicates to the Internet-based content services that the user has agreed to participate in the gathering, storing, or sharing of defined user information, and the absence of a tag indicates that the user has declined to participate in the gathering, storing, or sharing of defined user information. Alternatively, two different types of tags may be provided to indicate the user's choice with respect to opt-in or opt-out. | 12-31-2009 |
20100082775 | Directed Media Based On User Preferences - A system for determining directed media for a user is provided. The exemplary system comprises a media selection optimizer which is configured to determine a directed media component based on a user profile associated, via a device identifier, with a network access device. The media selection optimizer may also utilize access point information, historic information, and access point location-centric information in its determination of the directed media component. The directed media component may then be forward to a media server which provides the corresponding directed media to the user. The directed media may comprise advertisement, coupons, video, music, or any other media which is customizable to the user. | 04-01-2010 |
20150032550 | METHOD AND APPARATUS FOR TAGGING NETWORK TRAFFIC USING EXTENSIBLE FIELDS IN MESSAGE HEADERS - Embodiments within describe a system and method of tagging network traffic with relevant user information for facilitating the delivery of directed media. In an embodiment, a user identifier is generated from user information. Network traffic from the user and bound for a destination site is tagged within a network routing device. The tagged traffic is tagged with a request identifier that has the user identifier encrypted in an alphanumeric string. The tagged network traffic is transmitted to the destination site. A request is received from the destination site to decode the tagged network traffic, retrieve stored user information, and transmit the stored user information to the destination site. | 01-29-2015 |