Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Methods and systems for securing content played on mobile devices

a mobile device and content technology, applied in the field of mobile device identification and authentication, can solve the problems of content targeting methods that face various challenges, limited profiles based on that usage, and limited targeting based on cookies and similar information

Inactive Publication Date: 2008-05-29
ULLAH SHAH
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This approach allows for more accurate and specific content targeting across multiple devices, enhancing user experience by delivering relevant advertisements and managing digital rights, while maintaining user privacy through anonymous profiling.

Problems solved by technology

Such content-targeting methods face various challenges, depending on the users and devices to which content is targeted.
Internet advertisements may be based on cookies or similar mechanisms that indicate that a user is returning to a particular site, but targeting based on cookies and similar information are subject to limitations, among them being that multiple users may access the Internet through the same device.
Mobile content may be targeted more easily to a specific user, such as based on information about the user in a database maintained by a wireless carrier or based on the user's interaction with content on the mobile handset, but the more limited range of content that can be delivered to mobile devices means that profiles based on that usage are often limited and sometimes misleading.
As a result of mobile carriers dealing with voice revenue decaying rapidly and as even the margins on data consumption are becoming hyper-competitive, mobile carriers are rapidly seeking ways to monetize their high penetration numbers through advertising.
Starting with a fixed position, or multi-user device, such as a PC, a television, or other stationary Internet-enabled device presents user identification challenges that the mobile handset does not.
These challenges are mainly rooted on the basis that such devices may, and often, have multiple regular users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and systems for securing content played on mobile devices
  • Methods and systems for securing content played on mobile devices
  • Methods and systems for securing content played on mobile devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056]Referring to FIG. 1, in certain preferred embodiments of the methods and systems disclosed herein, a DSI-based authentication / identification platform 100 may include profile aggregation 124, content tagging 122, user identification 120, authentication 114, usage logging 112, a standards facility 118, a short haul wireless port 110, a profile database 130, an internet port 128, client software 102, device MAC addresses 104, and a device username 108. A mobile device 202 may include some portions and functionality of the platform 100. The mobile device 202 may also be connected to the platform 100 through the short haul wireless port 110 and / or through the Internet port 128.

[0057]FIG. 2 depicts using a mobile handset DSI to facilitate delivery of targeted television advertising 218. A mobile handset 202 may be in communication with a set-top box 204 or other Internet-connected device that is controlling a television 208. The mobile handset 202 may be in communication with the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and systems are disclosed herein for managing content, including advertising content, delivered to various network-connected devices, including screens, mobile devices, computers, televisions, radios, and the like, based on usage profiles associated with device-specific identifiers for mobile devices, short-distance wireless technologies for transmission of content and detection of proximity, and content targeting and management techniques.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application claims the benefit of the following provisional application, which is hereby incorporated by reference in its entirety: U.S. Provisional App. No. 60 / 825,708 filed Sep. 14, 2006.BACKGROUND[0002]1. Field[0003]The methods and systems herein described relate to mobile device identification and authentication for access to and presentation of targeted content.[0004]2. Description of the Related Art[0005]Methods and systems exist for targeting content, including advertising content, directed to users of network-connected devices, such as televisions, mobile handsets, computers, radios, advertising screens and the like. Such content-targeting methods face various challenges, depending on the users and devices to which content is targeted. For example, television and radio advertisements are often directed to a mass audience, with little information about specific users. Internet advertisements may be based on cookies or similar ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04M1/66H04W12/06H04W12/08H04W88/02H04W99/00
CPCG06Q30/02H04L67/306G06Q30/0202G06Q30/0205G06Q30/0241G06Q30/0255G06Q30/0267G06Q30/0269G06Q30/0276G06Q30/0277H04N5/4401H04N7/17318H04N21/25841H04N21/25891H04N21/2668H04N21/4126H04N21/42684H04N21/43637H04N21/44231H04N21/4622H04N21/4788H04N21/812H04W12/06H04W12/08H04W88/02H04W99/00H04L67/20H04L67/22G06Q30/0201H04N21/426H04N21/41265H04L67/53H04L67/535
Inventor ULLAH, SHAH
Owner ULLAH SHAH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products