US20200302482A1 - Digital advertising platform and method - Google Patents
Digital advertising platform and method Download PDFInfo
- Publication number
- US20200302482A1 US20200302482A1 US16/821,892 US202016821892A US2020302482A1 US 20200302482 A1 US20200302482 A1 US 20200302482A1 US 202016821892 A US202016821892 A US 202016821892A US 2020302482 A1 US2020302482 A1 US 2020302482A1
- Authority
- US
- United States
- Prior art keywords
- user
- data
- attributes
- receiving
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 238000004891 communication Methods 0.000 claims abstract description 43
- 230000015654 memory Effects 0.000 claims description 21
- 230000001413 cellular effect Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 15
- 230000008685 targeting Effects 0.000 description 12
- 238000005516 engineering process Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 9
- 230000003993 interaction Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 9
- 238000012545 processing Methods 0.000 description 8
- 230000036541 health Effects 0.000 description 6
- 230000008520 organization Effects 0.000 description 6
- 238000009826 distribution Methods 0.000 description 5
- 238000011160 research Methods 0.000 description 5
- 238000012546 transfer Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000012935 Averaging Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 2
- 230000033228 biological regulation Effects 0.000 description 2
- 238000013523 data management Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 241000282412 Homo Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000001351 cycling effect Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 239000003599 detergent Substances 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0214—Referral reward systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
- G06Q30/0269—Targeted advertisements based on user profile or attribute
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2379—Updates performed during online database operations; commit processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0215—Including financial accounts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0236—Incentive or reward received by requiring registration or ID from user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0248—Avoiding fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
- G06Q30/0269—Targeted advertisements based on user profile or attribute
- G06Q30/0271—Personalized advertisement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/20—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
- H04W4/23—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for mobile advertising
Definitions
- the present application relates to a digital exchange, digital advertising, web service technologies, blockchain technologies, data aggregation, manipulation, and analysis technologies, tracking technologies, and computing technologies, and more particularly, to a system and method for utilizing permissioned personal data to curate digital advertisements.
- Data may be created by way of interacting with a digital device such as a computer or mobile phone.
- a digital device such as a computer or mobile phone.
- an individual or organization may create data by browsing the internet, interacting on social media networks, uploading personal files, syncing devices, shopping online, location tracking of a mobile device, health information, and driving a car.
- This data is typically transmitted to large corporations, where it may be stored, analyzed, sold, tampered with, extracted or otherwise exploited.
- the originator of the data mostly loses control over its data when signing up for digital services and in many instances is not aware of the data being shared or mined from a user or organization.
- the digital advertising market currently uses mined data in an attempt to target advertising.
- the digital advertising market is inefficient and lacks transparency.
- the result is frustration for market participants, for the ‘sellers’ of personal data (individuals), the ‘buyers’ of personal data (advertisers), and the web publishers where personal data transactions take place in the form of online advertising.
- the current mechanisms for identifying us, tracking us, and reaching us are intensively personal and pervasive and makes us uncomfortable. Internet users are increasingly trying to avoid being tracked and identified. A fast-growing proportion of people are deliberately diffling against being tracked on principle and in practice.
- GDPR European Union's General Data Protection Regulation
- the present invention is directed to a digital advertising platform and method.
- users provide permission to share certain data attributes with a platform.
- a user may provide permission to share certain data attributes from a mobile device, such as a mobile phone, through a phone application.
- a user may choose which data attributes are made available to the platform.
- a user may choose to allow certain data to be shared with the platform and not share other data.
- Data may be shared pursuant to blockchain.
- the user's data may be matched with advertisers that identify target consumer attributes.
- a targeted advertisement may then be sent to the user based upon the shared data.
- consumers earn rewards. Advertisers using the platform gain access to known audience attributes, which enables more effective ad targeting and better campaign performance.
- the blockchain-based platform allows users will be able to choose which personal attributes to make available to advertisers while remaining anonymous. For example, a user might decide to share information about favorite hobbies and withhold data related to health history. In an embodiment, a user sharing data may remain anonymous. In exchange for sharing attributes, users may earn additional rewards. Advertisers may obtain access to personalized, permissioned data that can be leveraged for more effective ad targeting. The transparent and verifiable record of transactions will provide assurance that ads are reaching actual humans as opposed to bots and support businesses in meeting GDPR requirements. In an embodiment, the data tracking capabilities of blockchain provides an improved digital advertising environment for consumers, advertisers, and publishers.
- a system for utilizing permissioned data may include a memory that stores instruction and a processor that executes the instructions to perform operations conducted by the system.
- the system may receive, from a first communication device, data permissions and attributes corresponding to a first user.
- the system may receive, from a second communication device, target attributes corresponding to a second user.
- the system may determine based on data permissions and attributes corresponding to a first user and the target attributes corresponding to a second user, a possible match of said first user with said second user.
- the system may provide to the first communication device, a communication from said second user.
- a method for utilizing permissioned data may include receiving, from a first communication device, data permissions and attributes corresponding to a first user; receiving, from a second communication device, target attributes corresponding to a second user; determining, based on data permissions and attributes corresponding to a first user and the target attributes corresponding to a second user, a possible match of said first user with said second user; and, providing, to the first communication device, a communication from said second user.
- a computer-readable device having instructions for utilizing permissioned data.
- the computer instructions which when loaded and executed by a processor, cause the processor to perform operations of receiving, from a first communication device, data permissions and attributes corresponding to a first user; receiving, from a second communication device, target attributes corresponding to a second user; determining, based on data permissions and attributes corresponding to a first user and the target attributes corresponding to a second user, a possible match of said first user with said second user; and, providing, to the first communication device, a communication from said second user.
- Another embodiment of the present invention is directed to a method of providing a permission based advertising platform.
- the method includes granting permission to share certain data attributes and sharing permissioned attributes with a platform.
- the method further includes matching the shared data attributes with target attributes.
- the method further includes providing a targeted advertisement to the user based upon the matched attributes.
- the method further includes providing a reward to the user for sharing data.
- FIG. 1 is a schematic diagram of a system for utilizing permissioned data.
- FIG. 2 is a diagram illustrating a sample method and flow diagram for utilizing permissioned data that may be used with the system of FIG. 1 .
- FIG. 3 is a diagram illustrating the potential users of the system of FIG. 1 .
- FIG. 4 is a diagram illustrating the attributes of the dashboards that may be used with the system of FIG. 1 .
- FIG. 5 is a diagram illustrating a sample method and flow diagram for utilizing permissioned data that may be used with the system of FIG. 1 .
- FIG. 6 is a diagram illustrating a sample method and flow diagram for utilizing permissioned data that may be used with the system of FIG. 1 .
- FIG. 7 is a schematic diagram of a system for utilizing permissioned data that may be used with the system of FIG. 1 .
- FIG. 8 is a schematic diagram of a system for utilizing permissioned data that may be used with the system of FIG. 1 .
- FIG. 9 is a schematic diagram of a machine in the form of a computer system within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies or operations of the systems and methods for utilizing permissioned data.
- FIG. 10 is a diagram illustrating a sample method and flow diagram for utilizing permissioned data that may be used with the system of FIG. 1 .
- FIG. 11 is a method and flow diagram for utilizing permissioned data that may be used with the system of FIG. 1 .
- FIG. 12 is a screen shot from a mobile phone of a user.
- FIG. 13 is a screen shot from a mobile phone of a user illustrating example profile and consent information.
- FIG. 14 is a screen shot from a mobile phone of a user illustrating example profile and consent information.
- FIG. 15 is a screen shot from a mobile phone of a user illustrating example profile and consent information.
- FIG. 16 is a screen shot from a mobile phone of a user illustrating an example of matching a users' profile and consent information to an interested third-party.
- FIG. 17 is a screen shot from a mobile phone of a user illustrating example invitations to a user to share data in exchange for a reward.
- FIG. 18 is a screen shot from a mobile phone of a user illustrating an example question when a user accepts an invitation.
- FIG. 19 is a screen shot from a mobile phone of a user illustrating an example of a targeted advertisement.
- FIG. 20 is a screen shot from a mobile phone of a user illustrating an example question when a user accepts an invitation.
- FIG. 21 is a screen shot from a mobile phone of a user illustrating an example reward.
- FIG. 22 is a screen shot from a mobile phone of a user illustrating an example of a targeted advertisement.
- FIG. 23 is screen shot from a mobile phone of a user illustrating an example of the blockchain record of the transaction.
- the system 100 and accompanying methods provide for a web service that collects and curates data information from users or organizations.
- the data may include information browsing the internet, interacting on social media networks, uploading personal files, syncing devices, shopping online, location tracking of a mobile device, health information, or driving a car, or any combination thereof.
- the system 100 and accompanying methods provide a novel way for searching for allowing a user or organization to control the types of data that is shared and provide permission to receive targeted advertisements based on the shared data.
- the system 100 and methods may utilize a website, an application, or other software program that allows for the display of the types of data that the user agrees to share, and the user may also share data through surveys.
- the data may be anonymous and aggregated, and will be able to designate which attributes to make available to marketers.
- panelists will receive tokens from advertisers for viewing and interacting with curated ads that replace the ads a user would otherwise see online. Advertisers will know their ads are viewed by real willing customers. Advertisers can buy tokens on a designated exchange. Panelists receiving tokens can sell them on an exchange or use them in a third-party loyalty program to purchase products and services, receive discounts or participate in other special offers.
- the platform is decentralized where participants are known to be unique, human, and possessing certain attributes as stated directly by the participants, rather than inferred. Buyers may approach sellers based on actively provided and consented personal data.
- the platform will allow advertisers to target participants based on attributes users have permissioned them to temporarily know. Users will be paid tokens by advertisers in exchange for this permissioned targeting. Users may remain anonymous, and the ads they see will replace ads they would otherwise see when online. A user may have transparency about who is targeting them, what data they are collecting, and what they are doing with the data.
- the system 100 and methods may include allowing users to store, organize, and sell their data though a secure platform that will make a sale on an individualized process.
- Users can manage their online personal data and for example, see the data, see how third parties request to use the data, and grant/deny consent to those third parties and specify a minimum price for use.
- a user may allow sale of data through a single broker on behalf of the user, or a user may want to manage the sale of data directly to a buyer, with varying degrees of control between.
- Users can utilize the platform to store and control their data and gain additional value for their data. Data consumers, for example advertisers, will pay a rate dependent on the value of the data to them.
- Advertisers that want to understand and market to their target groups or general audiences will have access to explicitly permissioned, curated, and valuable data allowing them to work with their current ad-serving partners to provide a more granular and connected dataset that is aligned with GDPR, Eprivacy and the associated attitudes in society that are driving those regulations. Advertisers will also be able to make direct contact with anonymized individuals who have been highly qualified by permissioned data, either for research purposes, including ad-testing with post-view tracking, one-to-one or small-group, conversations, conventional surveys, or for direct marketing.
- the system 100 may be configured to support, but is not limited to supporting, data and content services, computing applications and services, cloud computing services, internet services, satellite services, telephone services, software as a service (SaaS) applications, mobile applications and services, and any other computing applications and services.
- the system may include a first user 101 , who may utilize a first user device 102 to access data, content, and applications, or to perform a variety of other tasks and functions.
- the first user 101 may utilize first user device 102 to access an application (e.g.
- the first user 101 may be any type of user or organization that generates data.
- the first user 101 may be an individual that browsing the internet, interacting on social media networks, uploading personal files, syncing devices, shopping online, location tracking of a mobile device, generating health information, or driving a car, or any combination thereof.
- the first user device 102 utilized by the first user 101 may include a memory 103 that includes instructions, and a processor 104 that executes the instructions from the memory 103 to perform the various operations that are performed by the first user device 102 .
- the processor 104 may be hardware, software, or a combination thereof.
- the first user device 102 may also include an interface 105 (e.g. screen, monitor, graphical user interface, etc.) that may enable the first user 101 to interact with various applications executing on the first user device 102 , to interact with various applications executing within the system 100 , and to interact with the system 100 .
- the first user device 102 may be a computer, a laptop, a tablet device, a phablet, a server, a mobile device, a smartphone, a smart watch, and/or any other type of computing device.
- the first user device 102 is shown as a mobile device in FIG. 1 .
- the first user device 102 may also include a global positioning system (GPS), which may include a GPS receiver and any other necessary components for enabling GPS functionality.
- GPS global positioning system
- the system 100 may include a second user 110 , who may utilize a second user device 111 to access data, content, and applications, or to perform a variety of other tasks and functions.
- the second user 110 may also be any type of user or organization that generates data.
- the first user 101 may be an individual browsing the internet, interacting on social media networks, uploading personal files, syncing devices, shopping online, location tracking of a mobile device, generating health information, or driving a car, or any combination thereof.
- the second user 110 may utilize second user device 111 to access an application (e.g. a browser or a mobile application) executing on the second user device 111 that may be utilized to access web pages, data, and content associated with the system 100 .
- the second user device 111 may include a memory 112 that includes instructions, and a processor 113 that executes the instructions from the memory 112 to perform the various operations that are performed by the second user device 111 .
- the processor 113 may be hardware, software, or a combination thereof.
- the second user device 111 may also include an interface 114 (e.g.
- the second user device 111 may be a computer, a laptop, a tablet device, a phablet, a server, a mobile device, a smartphone, a smart watch, and/or any other type of computing device.
- the second user device 111 may be a computing device in FIG. 1 .
- the first user device 102 and the second user device 111 may have any number of software applications and/or application services stored and/or accessible thereon.
- the first and second user devices 102 , 111 may include cloud-based applications, location-determining applications, GPS applications, database applications, algorithmic applications, phone-based applications, product-ordering applications, business applications, e-commerce applications, media streaming applications, content-based applications, database applications, gaming applications, internet-based applications, browser applications, mobile applications, service-based applications, productivity applications, video applications, music applications, social media applications, any other type of applications, any types of application services, or a combination thereof.
- the software applications and services may include one or more graphical user interfaces so as to enable the first and second users 101 , 110 to readily interact with the software applications.
- the software applications and services may also be utilized by the first and second users 101 , 110 to interact with any device in the system 100 , any network in the system 100 , or any combination thereof.
- the software applications executing on the first and second user devices 102 , 111 may be applications for receiving data, applications for storing data, applications for determining locations of users and devices, applications for receiving demographic and preference information, applications for transforming data, applications for executing mathematical algorithms, applications for generating and transmitting electronic messages, applications for generating and transmitting various types of content, any other type of applications, or a combination thereof.
- the first and second user devices 102 , 111 may include associated telephone numbers, internet protocol addresses, device identities, or any other identifiers to uniquely identify the first and second user devices 102 , 111 .
- location information corresponding to the first and second user devices 102 , 111 may be obtained based on the internet protocol addresses.
- the system 100 may also include one or more cell towers 125 , which may include any number of antennae to facilitate communications for the devices, applications, and networks in the system 100 .
- the cell tower 125 may be utilized to create a cell for the communications network 135 .
- Each cell tower 125 may include an identifier that is utilized to identify the cell tower 125 to any of the networks, devices, and programs in the system 100 .
- the identifier may be a sequence of numbers, characters, or any combination thereof that uniquely identify the cell tower 125 .
- the cell tower 125 may be a base station or other similar station, and may include any of the functionality and features of any type of cell site or tower.
- the cell tower 125 may be utilized to facilitate communications for the first and second user devices 102 , 111 , the locations 115 - 117 , the servers 140 , 150 , 160 , the database 155 , any other components of the system 100 or outside the system 100 , or any combination thereof.
- the system 100 may also include a communications network 135 .
- the communications network 135 of the system 100 may be configured to link each of the devices in the system 100 to one another.
- the communications network 135 may be utilized by the first user device 102 to connect with other devices within or outside communications network 135 .
- the communications network 135 may be configured to transmit, generate, and receive any information and data traversing the system 100 .
- the communications network 135 may include any number of servers, databases, or other componentry, and may be controlled by a service provider.
- the communications network 135 may also include and be connected to a cloud-computing network, a phone network, a wireless network, an Ethernet network, a satellite network, a broadband network, a cellular network, a private network, a cable network, the Internet, an internet protocol network, a content distribution network, any network, or any combination thereof.
- a cloud-computing network a phone network, a wireless network, an Ethernet network, a satellite network, a broadband network, a cellular network, a private network, a cable network, the Internet, an internet protocol network, a content distribution network, any network, or any combination thereof.
- cell tower 125 , server 140 , and server 150 are shown as being included within communications network 135 .
- the functionality of the system 100 may be supported and executed by using any combination of the servers 140 , 150 , and 160 .
- the servers 140 , and 150 may reside in communications network 135 , however, in certain embodiments, the servers 140 , 150 may reside outside communications network 135 .
- the servers 140 , and 150 may be utilized to perform the various operations and functions provided by the system 100 , such as those requested by applications executing on the first and second user devices 102 , 111 .
- the server 140 may include a memory 141 that includes instructions, and a processor 142 that executes the instructions from the memory 141 to perform various operations that are performed by the server 140 .
- the processor 142 may be hardware, software, or a combination thereof.
- the server 150 may include a memory 151 that includes instructions, and a processor 152 that executes the instructions from the memory 151 to perform the various operations that are performed by the server 150 .
- the servers 140 , 150 , and 160 may be network servers, routers, gateways, switches, media distribution hubs, signal transfer points, service control points, service switching points, firewalls, routers, edge devices, nodes, computers, mobile devices, or any other suitable computing device, or any combination thereof.
- the servers 140 , 150 may be communicatively linked to the communications network 135 , any network, any device in the system 100 , or any combination thereof.
- the database 155 of the system 100 may be utilized to store and relay information that traverses the system 100 , cache information and/or content that traverses the system 100 , store data about each of the devices in the system 100 , and perform any other typical functions of a database.
- the database 155 may be connected to or reside within the communications network 135 , any other network, or a combination thereof.
- the database 155 may serve as a central repository for any information associated with any of the devices and information associated with the system 100 .
- the database 155 may include a processor and memory or be connected to a processor and memory to perform the various operations associated with the database 155 .
- the database 155 may be connected to the servers 140 , 150 , 160 , the first user device 102 , the second user device 111 , any devices in the system 100 , any other device, any network, or any combination thereof.
- the database 155 may also store information obtained from the system 100 , store information associated with the first and second users 101 , 110 , store location information for the first and second user devices 102 , 111 and/or first and second users 101 , 110 , store location information for the locations 115 - 117 , store user profiles associated with the first and second users 101 , 110 , store device profiles associated with any device in the system 100 , store communications traversing the system 100 , store user preferences, store demographic information for the first and second users 101 , 110 and/or the locations 115 - 117 , store information associated with any device or signal in the system 100 , store information relating to usage of applications accessed by the first and second user devices 102 , 111 , store any information obtained from any of the networks in the system 100 , store historical data associated with the first and second users 101 , 110 , store device characteristics, store information relating to any devices associated with the first and second users 101 , 110 , or any combination thereof.
- the database 155 may store algorithms for calculating gender ratios, ethnicity distributions, averaging age ranges, averaging demographic information received for a particular locality from various users checked into the locality, any other algorithms for performing any other calculations in the system 100 , or any combination thereof.
- the database 155 may be configured to store any information generated and/or processed by the system 100 , store any of the information disclosed for any of the operations and functions disclosed for the system 100 herewith, store any information traversing the system 100 , or any combination thereof.
- the database 155 may be configured to process queries sent to it by any device in the system 100 .
- the system 100 may also include one or more software applications, which may be configured to perform and support the operative functions of the system 100 .
- the application may be a website, a mobile application, a software application, or a combination thereof that may be made accessible to users utilizing one or more computing devices, such as first user device 102 .
- the application may be utilized to sign up for an account, provide permissions, and manage interactions with the system 100 .
- A may select from a menu which of their existing attributes they are willing to be used by third parties.
- the application of the system 100 may be accessible via an internet connection established with a browser program executing on the first or second user devices 102 , 111 , a mobile application executing on the first or second user devices 102 , 111 , or through other suitable means.
- the application may allow users and computing devices to create accounts with the application and sign-in to the created accounts with authenticating username and password log-in combinations.
- the application may include a custom graphical user interface that the first user 101 or second user 110 may interact with by utilizing the web browser executing on the first user device 102 or second user device 111 .
- a number of steps may be taken to ensure ensure panelists are human and maintain only one account. For example, the administrator may use recaptcha and assess various aspects of the user's profile. A user that passes the first opt-in stage is then sent a second opt-in verification link; without confirming the link the user cannot proceed as a panelist. During the user's first survey interaction the administrator may check to ensure that the respondent is a human, and presents a unique digital signature. In addition, a machine learning application that scans relationships between accounts may be used to help determine whether a user has attempted to create an additional account.
- FIGS. 1-23 allow direct ad serving based on profiling data.
- Panelists may accept direct payment from third parties in return for access to someone with their attributes. For instance, Jenny (using a pseudonym) can select to make ‘available’ that she is 36 years old, lives in Vermont, and enjoys cycling, while keeping unavailable that she works as a lawyer and is planning a trip to Hawaii.
- An advertiser looking to reach people with Jenny's available attributes will pay Jenny in tokens in exchange for the right to serve her an ad, which would replace the ad she would otherwise see when browsing.
- Panelists will benefit from better targeted online ads. Advertisers will benefit in that through the platform they can directly reach real people that have verified attributes.
- the system and method of FIGS. 1-23 utilize blockchain.
- a user id, payment in tokens, ad campaign id, and ad campaign desired attributes may be published to the blockchain for a transaction.
- the use of blockchain as a distributed ledger is beneficial to regulators, panelists and advertisers.
- the blockchain allows time-limited per use authorization on the part of individuals for use of their personal data.
- the use of the personal data and transactions are transparent.
- transaction data on the blockchain will allow participants to verify with certainty which of their attributes are of value to third parties and what share of the ad spend they are receiving.
- transaction data on a blockchain will allow advertisers to verify with certainty who or what verified the authenticity of each viewer and their attributes, and what percentage of ad spend is going to viewers.
- Addresses on the blockchain generally corresponded to a user account, ad campaign, or basic account.
- the platform creates a blockchain address for the user containing the high-level demographic attributes most important to advertisers (age, gender, and broad location, possibly among others). To maintain privacy, the blockchain profile is limited to these high-level demographics, with other attributes stored off the blockchain. Account addresses are anonymous; only the user and administrator know which blockchain address is associated with that particular user. Advertisers wishing to serve ads through the platform create a smart contract for their ad campaign through the web portal. The smart contract consists of the maximum allowed cost per ad, the set of targeted user attributes, and a start and end time.
- the campaign's total budget is equal to the token balance sent to the smart contract. Advertisers can end their campaign and retrieve any unused tokens by transferring the tokens to another blockchain address. Advertisers and other platform participants may store their tokens in a basic account when the tokens are not currently pledged to an ad campaign. Basic accounts do not have special attributes.
- the administrator sends a certified record of the ad to the campaign's smart contract.
- This record consists of the user's blockchain address and the ad's price in tokens.
- the smart contract enforces that every ad served conforms to the parameters defined in the ad campaign: the ads must be served between the start and end time at a price no greater than the maximum specified for the campaign, and the user's blockchain profile must contain the required attributes.
- Advertisers may optionally target more specific attributes which are not part of the user's blockchain profile. For instance, a sports shoe manufacturer may wish to target users who included in their profile that have a current gym membership. To preserve user privacy and anonymity, the administrator does not store these more detailed attributes as part of the user's blockchain address.
- the administrator certifies that each user served an ad possesses the attributes without revealing their blockchain address or any other information about the user.
- the smart contract then directs the user's share of the ad payment to an anonymous single-use address controlled by the user.
- These single-use addresses can be anonymously converted to tokens on the public Ethereum blockchain by bundling them into the user's payment channel.
- the administrator utilizes payment channels for token transfers to and from the Ethereum public chain.
- the administrator stakes tokens into a payment channel with that user. As the user collects more tokens on the platform, they can automatically transfer these to their channel. The administrator will update the payment channel to reflect the increased balance. The user may close the payment channel at any time to retrieve their tokens. Advertisers may also create a payment channel with the administrator. This allows them to transfer tokens to the platform as needed, without storing a large balance of tokens on the platform. All participants have the option of creating and managing their own private keys for both the administrator platform and the Ethereum public chain. Alternatively, they can allow the administrator to manage one or both sets of keys for them through a wallet program. The wallet can automatically open and close payment channels, continuously update the payment channel off-chain as the user receives additional tokens, and sign transactions for the user's accounts.
- An ad campaign is assigned to one child blockchain.
- the child blockchain holds a complete record of ads served and payments made for that campaign.
- the child blockchain also holds the full set of user addresses. This allows an ad campaign to reach the full set of users even though it exists on a single child blockchain.
- the parent blockchain includes the block headers of all child chains, thereby providing a record of all transactions on the network.
- the child blockchains hold the set of user accounts.
- Ad campaigns are dived between child blockchains such that one blockchain holds all the ad records for a particular campaign.
- a user's attributes may be verified by a distributed ledger.
- a targeted ad is an individual transaction on the blockchain.
- the system and method of FIGS. 1-23 is scalable and may be composed of parent blockchain and child blockchains running in parallel.
- the parent blockchain may be coordinating block production by the child chains.
- the creation of a new child chain with every fix set of new sellers allows parallel scalability.
- the limiting factor may be the speed at which new child block hashes are processed and notification of new block starts can be done.
- the system and method of FIGS. 1-23 is flexible in that the API allows submission of transactions by approved parties. The modification of requirements by other partners is possible.
- the transaction models support consent and payments, indirect contacts and direct contacts.
- the system and method of FIGS. 1-23 provides for privacy in that the blockchain reports public part of transactions, consent is stored on the blockchain containing price, ad campaign and for example, up to three targeted categories (e.g. gender, age, location).
- the hashed signatures of consent are used to prevent further identification of sellers.
- Seller data is not typically stored on the blockchain.
- the system and method of FIGS. 1-23 is reliable/auditable.
- the blockchain server will add transactions with a unique reference (consisting of blockchain ID, block number and transaction index) to data store.
- the full signed blocks are uploaded to a publicly readable repository for third party review. In case of data loss, data can be reconstructed from public repository.
- FIGS. 1-23 provides for security in that the endpoints are secured by 2-way SSL and parent blockchain nodes act as certificate authority responsible for issuing and managing certificates.
- the system and method of FIGS. 1-23 provides that data does not generally pass from a member to a third party, use of member data is individually and actively permissioned, third party does not track a member through this process, clients may contact members without middle-man interaction, the administrator of the platform sets the rules, certifies data, validates members and clients, interactions are simple, fast, contracted, accounted transaction, a secure place for members and clients to communicate and trade data.
- the system and method of FIGS. 1-23 can be used for conducting self-service research with granular respondent definitions, testing concepts, ads, offers, delivering targeted advertising, other communication or interactions.
- the system and method of FIGS. 1-23 describes a process of permissioned use of data within safe direct contact and may be used in all forms of client-panelist interaction, whether for conducting surveys, other research or engagement tasks, or delivering ads.
- Individuals or organizations that register to use the platform can manage personal data consent, receive direct contacts from third parties for pay, view and manage balances from such payments, and view history of transactions.
- Companies that register to use the platform can collect personal data usage consent from their customers, allow customers ability to manage their personal data, including accepting payment for direct contact from their parties, which may be on the platform or by way of a publisher via an online ad, cell phone company via text message, or tv network via a TV ad.
- a member company may join the online ad platform.
- Third parties that are not registrants or members may be entities that desire to reach registrants directly based on registrant attributes. For example, direct advertisers, online advertisers, market researchers, or academic researchers.
- the personal data management for registrants may be in the form of consent management.
- the consent management may be by data type, for example survey data, browser history, past purchases, health records, or other data type.
- the consent management may be by data use, for example direct contact of an offer or survey, online ad targeting, academic research.
- a registrant may grant consent by responding yes or no, or provide a price required for direct contact.
- a registrant may also have an inbox of third party direct contacts, statement of asset balances, and history of transactions.
- the data management may also include data pertaining to direct contact on members' platforms.
- a record of transactions can be referenced by businesses to verify they are meeting GDPR requirements.
- a third party may choose attributes of people it desires to reach, choose minimum payment to do so, which may be based on a base price and price per attribute, create a message to be delivered, and view a history of transactions.
- the publishers ad platform for internet publishers Integrates data, data analysis software, demand side platform, supply side platform, matching engine, GDPR compliance. A publisher can deliver targeted advertising on publisher sites using GDPR compliant data.
- the platform and publisher may obtain permissions from members.
- the platform provides software to the publisher that combines data gathered by the publisher with known attributes provided by the platform to better understand publisher's visitors and improve visitor experience and ad targeting.
- Members who have received enhanced targeted ads can be post-tested by the platform to audit ad reach and ad effectiveness.
- the publisher can refer new members to the platform and receive royalty based on revenue the platform generates from referred members going forward.
- the methodologies and techniques described with respect to the exemplary embodiments of the system 100 can incorporate a machine, such as, but not limited to, computer system 900 , or other computing device within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies or functions discussed above.
- the machine may be configured to facilitate various operations conducted by the system 100 .
- the machine may be configured to, but is not limited to, assist the system 100 by providing processing power to assist with processing loads experienced in the system 100 , by providing storage capacity for storing instructions or data traversing the system 100 , or by assisting with any other operations conducted by or within the system 100 .
- the machine may operate as a standalone device.
- the machine may be connected (e.g., using communications network 135 , another network, or a combination thereof) to and assist with operations performed by other machines and systems, such as, but not limited to, the first user device 102 , the second user device 111 , the cell tower 125 , the server 140 , the server 150 , the database 155 , the server 160 , or any combination thereof.
- the machine may be connected with any component in the system 100 .
- the machine may operate in the capacity of a server or a client user machine in a server-client user network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
- the machine may comprise a server computer, a client user computer, a personal computer (PC), a tablet PC, a laptop computer, a desktop computer, a control system, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
- PC personal computer
- tablet PC tablet PC
- laptop computer a laptop computer
- desktop computer a control system
- network router, switch or bridge any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
- the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
- the computer system 900 may include a processor 902 (e.g., a central processing unit (CPU), a graphics processing unit (GPU, or both), a main memory 904 and a static memory 906 , which communicate with each other via a bus 908 .
- the computer system 900 may further include a video display unit 910 , which may be, but is not limited to, a liquid crystal display (LCD), a flat panel, a solid state display, or a cathode ray tube (CRT).
- LCD liquid crystal display
- CRT cathode ray tube
- the computer system 900 may include an input device 912 , such as, but not limited to, a keyboard, a cursor control device 914 , such as, but not limited to, a mouse, a disk drive unit 916 , a signal generation device 918 , such as, but not limited to, a speaker or remote control, and a network interface device 920 .
- an input device 912 such as, but not limited to, a keyboard
- a cursor control device 914 such as, but not limited to, a mouse
- a disk drive unit 916 such as, but not limited to, a disk drive unit 916
- a signal generation device 918 such as, but not limited to, a speaker or remote control
- the disk drive unit 916 may include a machine-readable medium 922 on which is stored one or more sets of instructions 924 , such as, but not limited to, software embodying any one or more of the methodologies or functions described herein, including those methods illustrated above.
- the instructions 924 may also reside, completely or at least partially, within the main memory 904 , the static memory 906 , or within the processor 902 , or a combination thereof, during execution thereof by the computer system 900 .
- the main memory 904 and the processor 902 also may constitute machine-readable media.
- Dedicated hardware implementations including, but not limited to, application specific integrated circuits, programmable logic arrays and other hardware devices can likewise be constructed to implement the methods described herein.
- Applications that may include the apparatus and systems of various embodiments broadly include a variety of electronic and computer systems. Some embodiments implement functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit.
- the example system is applicable to software, firmware, and hardware implementations.
- the methods described herein are intended for operation as software programs running on a computer processor.
- software implementations can include, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.
- the present disclosure contemplates a machine-readable medium 922 containing instructions 924 so that a device connected to the communications network 135 , another network, or a combination thereof, can send or receive voice, video or data, and communicate over the communications network 135 , another network, or a combination thereof, using the instructions.
- the instructions 924 may further be transmitted or received over the communications network 135 , another network, or a combination thereof, via the network interface device 920 .
- machine-readable medium 922 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions.
- the term “machine-readable medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that causes the machine to perform any one or more of the methodologies of the present disclosure.
- machine-readable medium shall accordingly be taken to include, but not be limited to: memory devices, solid-state memories such as a memory card or other package that houses one or more read-only (non-volatile) memories, random access memories, or other re-writable (volatile) memories; magneto-optical or optical medium such as a disk or tape; or other self-contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium.
- the “machine-readable medium,” “machine-readable device,” or “computer-readable device” may be non-transitory, and, in certain embodiments, may not include a wave or signal per se. Accordingly, the disclosure is considered to include any one or more of a machine-readable medium or a distribution medium, as listed herein and including art-recognized equivalents and successor media, in which the software implementations herein are stored.
- FIGS. 12-23 illustrate an embodiment of the invention where a user may interact with the digital advertising platform using a mobile device, for example an application on a cellular phone.
- FIG. 12 illustrates that the YouDirect application may be downloaded and used on both the Android and Apple operating systems.
- FIGS. 13, 14 , and 15 illustrate screen shots from a mobile phone of a user with example profile and consent information questions.
- information is divided into categories.
- categories include Basic Information, Financial Information, and Household Information, and in FIG. 15 Household Information, 2019 Life Events, and Online Activity.
- the number of questions in each category is provided and the status of completion. For example, in the category of Basic Information, three questions are provided and the user has provided answers to all three questions.
- each category there is a column entitled Consent to targeting.
- a user may choose whether the information provided in response to each question may be used for targeted advertising.
- FIG. 13 when the user consents to targeting, YouDirect uses your data to anonymously match you with relevant invitations. Your personal data is not shared with advertisers. In such a manner, a user may control which data is used to match the user with relevant invitations.
- FIGS. 13, 14, and 15 Also shown at the bottom of FIGS. 13, 14, and 15 are screen selections of entitled invitations, History, and Profile.
- the illustrated categories and questions are examples and other categories and questions are contemplated to be within the scope of the invention.
- user data such as illustrated in FIGS. 13, 14, and 15
- a targeted advertisement may then be sent to the user based upon the shared data.
- consumers earn rewards In exchange for sharing their data, consumers earn rewards.
- FIG. 16 is a screen shot from a mobile phone of a user illustrating an example of matching the profile and consent information of a user to an advertiser.
- the user has been matched with a film company.
- the film company has sent an invitation to the user requesting interaction between the user and the film company.
- the user can choose to accept the invitation or decline the invitation.
- FIG. 17 is a screen shot from a mobile phone of a user illustrating example invitations and corresponding rewards.
- the invitations may include targeted advertisements and questions, or just questions.
- the invitations may be from various third-parties that have expressed interest in the type of information the user is willing to share.
- FIG. 18 is a screen shot from a mobile phone of a user illustrating an example question when a user accepts an invitation. In the embodiment shown in FIG. 18 , the user has agreed to watch a targeted video advertisement and answer at least one question.
- FIG. 19 is a screen shot from a mobile phone of a user illustrating an example of a targeted advertisement.
- FIG. 20 is a screen shot from a mobile phone of a user illustrating an example question when a user accepts an invitation.
- FIG. 21 is a screen shot from a mobile phone of a user illustrating an example reward.
- the reward may be in the form of money credited to an account or other reward such as points that can be redeemed.
- a targeted offer from a third-party is also shown in FIG. 21 . The user can choose to proceed to view the offer or choose not to view the offer.
- FIG. 22 is a screen shot from a mobile phone of a user illustrating an example of a targeted advertisement by way of linking the user to the third-party website.
- FIG. 23 is screen shot from a mobile phone of a user illustrating an example of the blockchain record of the transaction.
- personal data is not a part of the blockchain.
- the blockchain record shown in FIG. 23 illustrates an encrypted ID, value, and the type of data being used.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Human Resources & Organizations (AREA)
- Primary Health Care (AREA)
- Tourism & Hospitality (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
Description
- This application claims the benefit of U.S. Provisional Application No. 62/819,800 entitled “DIGITAL ADVERTISING PLATFORM AND METHOD” filed on Mar. 18, 2019, the contents of which are incorporated herein by reference.
- The present application relates to a digital exchange, digital advertising, web service technologies, blockchain technologies, data aggregation, manipulation, and analysis technologies, tracking technologies, and computing technologies, and more particularly, to a system and method for utilizing permissioned personal data to curate digital advertisements.
- In today's technologically-driven society, individuals and organizations create data on a daily basis. Data may be created by way of interacting with a digital device such as a computer or mobile phone. For example, an individual or organization may create data by browsing the internet, interacting on social media networks, uploading personal files, syncing devices, shopping online, location tracking of a mobile device, health information, and driving a car. This data is typically transmitted to large corporations, where it may be stored, analyzed, sold, tampered with, extracted or otherwise exploited. The originator of the data mostly loses control over its data when signing up for digital services and in many instances is not aware of the data being shared or mined from a user or organization.
- The digital advertising market currently uses mined data in an attempt to target advertising. However, the digital advertising market is inefficient and lacks transparency. The result is frustration for market participants, for the ‘sellers’ of personal data (individuals), the ‘buyers’ of personal data (advertisers), and the web publishers where personal data transactions take place in the form of online advertising. The current mechanisms for identifying us, tracking us, and reaching us are intensively personal and pervasive and makes us uncomfortable. Internet users are increasingly trying to avoid being tracked and identified. A fast-growing proportion of people are deliberately rebelling against being tracked on principle and in practice.
- In addition, while certain technologies exist today to utilize mined data for digital advertising, such technologies and processes have many shortcomings. For example, an advertiser may attempt to infer the interests of a user based on internet searches or online shopping data, and provide an inferred targeted advertisement to user. However, the process of inferring information about a user or organization is inefficient, often incorrect, and may result in ineffective ad targeting. Such ineffective ad targeting has a negative impact on brands and publishers. In addition, current technologies and processes technologies and processes are often error-prone, provide a lot of irrelevant information, and may be difficult to implement. For example, brands cannot be certain their ads are being viewed by real people. Organizations exist that sell bot services to imitate human traffic, for example to provide “clicks” on digital advertisements, “likes” on Facebook, “views” on YouTube, or other misleading interactions with an advertisement or brand. Such interactions are ineffective from an advertising perspective because a human is not viewing the advertisement or interacting with the brand, yet metrics indicate a broad exposure. In addition, even when a human may be on the receiving end of an advertisement, a proliferation of ad blockers indicates increasing consumer dissatisfaction with the online ad experience, while brands and publishers face revenue losses due to ineffective targeting.
- Furthermore, the European Union's General Data Protection Regulation (GDPR) is intended to increase consumer data protection and threatens to levy hefty fines against businesses failing to comply. Thus, it may be advantageous to provide a digital advertising platform that allows verification of the data exchange between consumers and advertisers. As a result, there is a need for improved technologies and processes to obtain data from individuals and organizations, share such data, and utilize the data in an expeditious and effective manner. Such enhancements and improvements may provide for improved user satisfaction, improved advertiser satisfaction, improved effectiveness, increased efficiencies, increased access to meaningful data, substantially-improved decision-making abilities, and increased ease-of-use for users, while simultaneously optimizing the use of computing resources.
- The present invention is directed to a digital advertising platform and method. In an embodiment of the invention, users provide permission to share certain data attributes with a platform. For example, a user may provide permission to share certain data attributes from a mobile device, such as a mobile phone, through a phone application. A user may choose which data attributes are made available to the platform. A user may choose to allow certain data to be shared with the platform and not share other data. Data may be shared pursuant to blockchain. The user's data may be matched with advertisers that identify target consumer attributes. A targeted advertisement may then be sent to the user based upon the shared data. In exchange for sharing their data, consumers earn rewards. Advertisers using the platform gain access to known audience attributes, which enables more effective ad targeting and better campaign performance.
- The blockchain-based platform allows users will be able to choose which personal attributes to make available to advertisers while remaining anonymous. For example, a user might decide to share information about favorite hobbies and withhold data related to health history. In an embodiment, a user sharing data may remain anonymous. In exchange for sharing attributes, users may earn additional rewards. Advertisers may obtain access to personalized, permissioned data that can be leveraged for more effective ad targeting. The transparent and verifiable record of transactions will provide assurance that ads are reaching actual humans as opposed to bots and support businesses in meeting GDPR requirements. In an embodiment, the data tracking capabilities of blockchain provides an improved digital advertising environment for consumers, advertisers, and publishers.
- In one embodiment, a system for utilizing permissioned data is disclosed. The system may include a memory that stores instruction and a processor that executes the instructions to perform operations conducted by the system. The system may receive, from a first communication device, data permissions and attributes corresponding to a first user. The system may receive, from a second communication device, target attributes corresponding to a second user. The system may determine based on data permissions and attributes corresponding to a first user and the target attributes corresponding to a second user, a possible match of said first user with said second user. The system may provide to the first communication device, a communication from said second user.
- In another embodiment, a method for utilizing permissioned data is disclosed. The method may include receiving, from a first communication device, data permissions and attributes corresponding to a first user; receiving, from a second communication device, target attributes corresponding to a second user; determining, based on data permissions and attributes corresponding to a first user and the target attributes corresponding to a second user, a possible match of said first user with said second user; and, providing, to the first communication device, a communication from said second user.
- In another embodiment, a computer-readable device having instructions for utilizing permissioned data is provided. The computer instructions, which when loaded and executed by a processor, cause the processor to perform operations of receiving, from a first communication device, data permissions and attributes corresponding to a first user; receiving, from a second communication device, target attributes corresponding to a second user; determining, based on data permissions and attributes corresponding to a first user and the target attributes corresponding to a second user, a possible match of said first user with said second user; and, providing, to the first communication device, a communication from said second user.
- Another embodiment of the present invention is directed to a method of providing a permission based advertising platform. The method includes granting permission to share certain data attributes and sharing permissioned attributes with a platform. The method further includes matching the shared data attributes with target attributes. The method further includes providing a targeted advertisement to the user based upon the matched attributes. The method further includes providing a reward to the user for sharing data.
- These and other features of the systems and methods utilizing preferences to curate venues based on data obtained from a variety of sources are described in the following detailed description, drawings, and appended claims.
-
FIG. 1 is a schematic diagram of a system for utilizing permissioned data. -
FIG. 2 is a diagram illustrating a sample method and flow diagram for utilizing permissioned data that may be used with the system ofFIG. 1 . -
FIG. 3 is a diagram illustrating the potential users of the system ofFIG. 1 . -
FIG. 4 is a diagram illustrating the attributes of the dashboards that may be used with the system ofFIG. 1 . -
FIG. 5 is a diagram illustrating a sample method and flow diagram for utilizing permissioned data that may be used with the system ofFIG. 1 . -
FIG. 6 is a diagram illustrating a sample method and flow diagram for utilizing permissioned data that may be used with the system ofFIG. 1 . -
FIG. 7 is a schematic diagram of a system for utilizing permissioned data that may be used with the system ofFIG. 1 . -
FIG. 8 is a schematic diagram of a system for utilizing permissioned data that may be used with the system ofFIG. 1 . -
FIG. 9 is a schematic diagram of a machine in the form of a computer system within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies or operations of the systems and methods for utilizing permissioned data. -
FIG. 10 is a diagram illustrating a sample method and flow diagram for utilizing permissioned data that may be used with the system ofFIG. 1 . -
FIG. 11 is a method and flow diagram for utilizing permissioned data that may be used with the system ofFIG. 1 . -
FIG. 12 is a screen shot from a mobile phone of a user. -
FIG. 13 is a screen shot from a mobile phone of a user illustrating example profile and consent information. -
FIG. 14 is a screen shot from a mobile phone of a user illustrating example profile and consent information. -
FIG. 15 is a screen shot from a mobile phone of a user illustrating example profile and consent information. -
FIG. 16 is a screen shot from a mobile phone of a user illustrating an example of matching a users' profile and consent information to an interested third-party. -
FIG. 17 is a screen shot from a mobile phone of a user illustrating example invitations to a user to share data in exchange for a reward. -
FIG. 18 is a screen shot from a mobile phone of a user illustrating an example question when a user accepts an invitation. -
FIG. 19 is a screen shot from a mobile phone of a user illustrating an example of a targeted advertisement. -
FIG. 20 is a screen shot from a mobile phone of a user illustrating an example question when a user accepts an invitation. -
FIG. 21 is a screen shot from a mobile phone of a user illustrating an example reward. -
FIG. 22 is a screen shot from a mobile phone of a user illustrating an example of a targeted advertisement. -
FIG. 23 is screen shot from a mobile phone of a user illustrating an example of the blockchain record of the transaction. - A
system 100 and method for utilizing shared permissioned data to curate digital advertisements based on data obtained from a variety of sources, including the shared permissioned data. In particular, thesystem 100 and accompanying methods provide for a web service that collects and curates data information from users or organizations. The data may include information browsing the internet, interacting on social media networks, uploading personal files, syncing devices, shopping online, location tracking of a mobile device, health information, or driving a car, or any combination thereof. Additionally, thesystem 100 and accompanying methods provide a novel way for searching for allowing a user or organization to control the types of data that is shared and provide permission to receive targeted advertisements based on the shared data. To that end, thesystem 100 and methods may utilize a website, an application, or other software program that allows for the display of the types of data that the user agrees to share, and the user may also share data through surveys. The data may be anonymous and aggregated, and will be able to designate which attributes to make available to marketers. In return, panelists will receive tokens from advertisers for viewing and interacting with curated ads that replace the ads a user would otherwise see online. Advertisers will know their ads are viewed by real willing customers. Advertisers can buy tokens on a designated exchange. Panelists receiving tokens can sell them on an exchange or use them in a third-party loyalty program to purchase products and services, receive discounts or participate in other special offers. In an embodiment, the platform is decentralized where participants are known to be unique, human, and possessing certain attributes as stated directly by the participants, rather than inferred. Buyers may approach sellers based on actively provided and consented personal data. The platform will allow advertisers to target participants based on attributes users have permissioned them to temporarily know. Users will be paid tokens by advertisers in exchange for this permissioned targeting. Users may remain anonymous, and the ads they see will replace ads they would otherwise see when online. A user may have transparency about who is targeting them, what data they are collecting, and what they are doing with the data. - Also, the
system 100 and methods may include allowing users to store, organize, and sell their data though a secure platform that will make a sale on an individualized process. Users can manage their online personal data and for example, see the data, see how third parties request to use the data, and grant/deny consent to those third parties and specify a minimum price for use. For example, a user may allow sale of data through a single broker on behalf of the user, or a user may want to manage the sale of data directly to a buyer, with varying degrees of control between. Users can utilize the platform to store and control their data and gain additional value for their data. Data consumers, for example advertisers, will pay a rate dependent on the value of the data to them. For example, corporations, academic institutions and others seeking to access personal data legally and with consent of individuals can do so by making individual direct contact with bespoke offers, target ads to groups or individuals, reach targeted audiences for surveys, academic research or other purposes. In general, the more personal the data and the more personal the usage, the greater value it will have. For example a member may receive a higher payment if their medical records are used to market directly to them than if, their laundry detergent preferences are not useable for any kind of contact by are only added to a data set used to model out a campaign to the whole population. Advertisers that want to understand and market to their target groups or general audiences will have access to explicitly permissioned, curated, and valuable data allowing them to work with their current ad-serving partners to provide a more granular and connected dataset that is aligned with GDPR, Eprivacy and the associated attitudes in society that are driving those regulations. Advertisers will also be able to make direct contact with anonymized individuals who have been highly qualified by permissioned data, either for research purposes, including ad-testing with post-view tracking, one-to-one or small-group, conversations, conventional surveys, or for direct marketing. - As shown in
FIGS. 1-23 , asystem 100 for utilizing shared permissioned data to curate digital advertisements based on data obtained from a variety of sources, including the shared permissioned data. Thesystem 100 may be configured to support, but is not limited to supporting, data and content services, computing applications and services, cloud computing services, internet services, satellite services, telephone services, software as a service (SaaS) applications, mobile applications and services, and any other computing applications and services. The system may include afirst user 101, who may utilize afirst user device 102 to access data, content, and applications, or to perform a variety of other tasks and functions. As an example, thefirst user 101 may utilizefirst user device 102 to access an application (e.g. a browser or a mobile application) executing on thefirst user device 102 that may be utilized to access web pages, data, and content associated with thesystem 100. In certain embodiments, thefirst user 101 may be any type of user or organization that generates data. For example, thefirst user 101 may be an individual that browsing the internet, interacting on social media networks, uploading personal files, syncing devices, shopping online, location tracking of a mobile device, generating health information, or driving a car, or any combination thereof. Thefirst user device 102 utilized by thefirst user 101 may include amemory 103 that includes instructions, and aprocessor 104 that executes the instructions from thememory 103 to perform the various operations that are performed by thefirst user device 102. In certain embodiments, theprocessor 104 may be hardware, software, or a combination thereof. Thefirst user device 102 may also include an interface 105 (e.g. screen, monitor, graphical user interface, etc.) that may enable thefirst user 101 to interact with various applications executing on thefirst user device 102, to interact with various applications executing within thesystem 100, and to interact with thesystem 100. In certain embodiments, thefirst user device 102 may be a computer, a laptop, a tablet device, a phablet, a server, a mobile device, a smartphone, a smart watch, and/or any other type of computing device. Illustratively, thefirst user device 102 is shown as a mobile device inFIG. 1 . Thefirst user device 102 may also include a global positioning system (GPS), which may include a GPS receiver and any other necessary components for enabling GPS functionality. - In addition to the
first user 101, thesystem 100 may include asecond user 110, who may utilize asecond user device 111 to access data, content, and applications, or to perform a variety of other tasks and functions. Thesecond user 110 may also be any type of user or organization that generates data. For example, thefirst user 101 may be an individual browsing the internet, interacting on social media networks, uploading personal files, syncing devices, shopping online, location tracking of a mobile device, generating health information, or driving a car, or any combination thereof. - Much like the
first user 101, thesecond user 110 may utilizesecond user device 111 to access an application (e.g. a browser or a mobile application) executing on thesecond user device 111 that may be utilized to access web pages, data, and content associated with thesystem 100. Thesecond user device 111 may include amemory 112 that includes instructions, and aprocessor 113 that executes the instructions from thememory 112 to perform the various operations that are performed by thesecond user device 111. In certain embodiments, theprocessor 113 may be hardware, software, or a combination thereof. Thesecond user device 111 may also include an interface 114 (e.g. a screen, a monitor, a graphical user interface, etc.) that may enable thesecond user 110 to interact with various applications executing on thesecond user device 111, to interact with various applications executing in thesystem 100, and to interact with thesystem 100. In certain embodiments, thesecond user device 111 may be a computer, a laptop, a tablet device, a phablet, a server, a mobile device, a smartphone, a smart watch, and/or any other type of computing device. Illustratively, thesecond user device 111 may be a computing device inFIG. 1 . - In certain embodiments, the
first user device 102 and thesecond user device 111 may have any number of software applications and/or application services stored and/or accessible thereon. For example, the first andsecond user devices second users second users system 100, any network in thesystem 100, or any combination thereof. For example, the software applications executing on the first andsecond user devices second user devices second user devices second user devices - The
system 100 may also include one or more cell towers 125, which may include any number of antennae to facilitate communications for the devices, applications, and networks in thesystem 100. Thecell tower 125 may be utilized to create a cell for thecommunications network 135. Eachcell tower 125 may include an identifier that is utilized to identify thecell tower 125 to any of the networks, devices, and programs in thesystem 100. The identifier may be a sequence of numbers, characters, or any combination thereof that uniquely identify thecell tower 125. In certain embodiments, thecell tower 125 may be a base station or other similar station, and may include any of the functionality and features of any type of cell site or tower. In certain embodiments, thecell tower 125 may be utilized to facilitate communications for the first andsecond user devices servers database 155, any other components of thesystem 100 or outside thesystem 100, or any combination thereof. - The
system 100 may also include acommunications network 135. Thecommunications network 135 of thesystem 100 may be configured to link each of the devices in thesystem 100 to one another. For example, thecommunications network 135 may be utilized by thefirst user device 102 to connect with other devices within oroutside communications network 135. Additionally, thecommunications network 135 may be configured to transmit, generate, and receive any information and data traversing thesystem 100. In certain embodiments, thecommunications network 135 may include any number of servers, databases, or other componentry, and may be controlled by a service provider. Thecommunications network 135 may also include and be connected to a cloud-computing network, a phone network, a wireless network, an Ethernet network, a satellite network, a broadband network, a cellular network, a private network, a cable network, the Internet, an internet protocol network, a content distribution network, any network, or any combination thereof. Illustratively,cell tower 125,server 140, andserver 150 are shown as being included withincommunications network 135. - The functionality of the
system 100 may be supported and executed by using any combination of theservers servers communications network 135, however, in certain embodiments, theservers outside communications network 135. Theservers system 100, such as those requested by applications executing on the first andsecond user devices server 140 may include amemory 141 that includes instructions, and aprocessor 142 that executes the instructions from thememory 141 to perform various operations that are performed by theserver 140. Theprocessor 142 may be hardware, software, or a combination thereof. Similarly, theserver 150 may include amemory 151 that includes instructions, and aprocessor 152 that executes the instructions from thememory 151 to perform the various operations that are performed by theserver 150. In certain embodiments, theservers servers communications network 135, any network, any device in thesystem 100, or any combination thereof. - The
database 155 of thesystem 100 may be utilized to store and relay information that traverses thesystem 100, cache information and/or content that traverses thesystem 100, store data about each of the devices in thesystem 100, and perform any other typical functions of a database. In certain embodiments, thedatabase 155 may be connected to or reside within thecommunications network 135, any other network, or a combination thereof. In certain embodiments, thedatabase 155 may serve as a central repository for any information associated with any of the devices and information associated with thesystem 100. Furthermore, thedatabase 155 may include a processor and memory or be connected to a processor and memory to perform the various operations associated with thedatabase 155. In certain embodiments, thedatabase 155 may be connected to theservers first user device 102, thesecond user device 111, any devices in thesystem 100, any other device, any network, or any combination thereof. - The
database 155 may also store information obtained from thesystem 100, store information associated with the first andsecond users second user devices second users second users system 100, store communications traversing thesystem 100, store user preferences, store demographic information for the first andsecond users system 100, store information relating to usage of applications accessed by the first andsecond user devices system 100, store historical data associated with the first andsecond users second users database 155 may store algorithms for calculating gender ratios, ethnicity distributions, averaging age ranges, averaging demographic information received for a particular locality from various users checked into the locality, any other algorithms for performing any other calculations in thesystem 100, or any combination thereof. In certain embodiments, thedatabase 155 may be configured to store any information generated and/or processed by thesystem 100, store any of the information disclosed for any of the operations and functions disclosed for thesystem 100 herewith, store any information traversing thesystem 100, or any combination thereof. Furthermore, thedatabase 155 may be configured to process queries sent to it by any device in thesystem 100. - The
system 100 may also include one or more software applications, which may be configured to perform and support the operative functions of thesystem 100. In certain embodiments, the application may be a website, a mobile application, a software application, or a combination thereof that may be made accessible to users utilizing one or more computing devices, such asfirst user device 102. The application may be utilized to sign up for an account, provide permissions, and manage interactions with thesystem 100. A may select from a menu which of their existing attributes they are willing to be used by third parties. The application of thesystem 100 may be accessible via an internet connection established with a browser program executing on the first orsecond user devices second user devices first user 101 orsecond user 110 may interact with by utilizing the web browser executing on thefirst user device 102 orsecond user device 111. - When users sign up for an account, a number of steps may be taken to ensure ensure panelists are human and maintain only one account. For example, the administrator may use recaptcha and assess various aspects of the user's profile. A user that passes the first opt-in stage is then sent a second opt-in verification link; without confirming the link the user cannot proceed as a panelist. During the user's first survey interaction the administrator may check to ensure that the respondent is a human, and presents a unique digital signature. In addition, a machine learning application that scans relationships between accounts may be used to help determine whether a user has attempted to create an additional account.
- The system and method of
FIGS. 1-23 allow direct ad serving based on profiling data. Panelists may accept direct payment from third parties in return for access to someone with their attributes. For instance, Jenny (using a pseudonym) can select to make ‘available’ that she is 36 years old, lives in Vermont, and enjoys cycling, while keeping unavailable that she works as a lawyer and is planning a trip to Hawaii. An advertiser looking to reach people with Jenny's available attributes will pay Jenny in tokens in exchange for the right to serve her an ad, which would replace the ad she would otherwise see when browsing. Panelists will benefit from better targeted online ads. Advertisers will benefit in that through the platform they can directly reach real people that have verified attributes. - In an embodiment, the system and method of
FIGS. 1-23 utilize blockchain. A user id, payment in tokens, ad campaign id, and ad campaign desired attributes may be published to the blockchain for a transaction. The use of blockchain as a distributed ledger is beneficial to regulators, panelists and advertisers. For example, for regulators, the blockchain allows time-limited per use authorization on the part of individuals for use of their personal data. The use of the personal data and transactions are transparent. For panelists, transaction data on the blockchain will allow participants to verify with certainty which of their attributes are of value to third parties and what share of the ad spend they are receiving. For advertisers, transaction data on a blockchain will allow advertisers to verify with certainty who or what verified the authenticity of each viewer and their attributes, and what percentage of ad spend is going to viewers. - Addresses on the blockchain generally corresponded to a user account, ad campaign, or basic account. After a user joins and selects their data preferences, the platform creates a blockchain address for the user containing the high-level demographic attributes most important to advertisers (age, gender, and broad location, possibly among others). To maintain privacy, the blockchain profile is limited to these high-level demographics, with other attributes stored off the blockchain. Account addresses are anonymous; only the user and administrator know which blockchain address is associated with that particular user. Advertisers wishing to serve ads through the platform create a smart contract for their ad campaign through the web portal. The smart contract consists of the maximum allowed cost per ad, the set of targeted user attributes, and a start and end time. The campaign's total budget is equal to the token balance sent to the smart contract. Advertisers can end their campaign and retrieve any unused tokens by transferring the tokens to another blockchain address. Advertisers and other platform participants may store their tokens in a basic account when the tokens are not currently pledged to an ad campaign. Basic accounts do not have special attributes.
- When a user views an ad, the administrator sends a certified record of the ad to the campaign's smart contract. This record consists of the user's blockchain address and the ad's price in tokens. The smart contract enforces that every ad served conforms to the parameters defined in the ad campaign: the ads must be served between the start and end time at a price no greater than the maximum specified for the campaign, and the user's blockchain profile must contain the required attributes. Advertisers may optionally target more specific attributes which are not part of the user's blockchain profile. For instance, a sports shoe manufacturer may wish to target users who included in their profile that have a current gym membership. To preserve user privacy and anonymity, the administrator does not store these more detailed attributes as part of the user's blockchain address. For these types of smart contracts, the administrator certifies that each user served an ad possesses the attributes without revealing their blockchain address or any other information about the user. The smart contract then directs the user's share of the ad payment to an anonymous single-use address controlled by the user. These single-use addresses can be anonymously converted to tokens on the public Ethereum blockchain by bundling them into the user's payment channel.
- The administrator utilizes payment channels for token transfers to and from the Ethereum public chain. When a user begins receiving tokens from ads, the administrator stakes tokens into a payment channel with that user. As the user collects more tokens on the platform, they can automatically transfer these to their channel. The administrator will update the payment channel to reflect the increased balance. The user may close the payment channel at any time to retrieve their tokens. Advertisers may also create a payment channel with the administrator. This allows them to transfer tokens to the platform as needed, without storing a large balance of tokens on the platform. All participants have the option of creating and managing their own private keys for both the administrator platform and the Ethereum public chain. Alternatively, they can allow the administrator to manage one or both sets of keys for them through a wallet program. The wallet can automatically open and close payment channels, continuously update the payment channel off-chain as the user receives additional tokens, and sign transactions for the user's accounts.
- An ad campaign is assigned to one child blockchain. The child blockchain holds a complete record of ads served and payments made for that campaign. The child blockchain also holds the full set of user addresses. This allows an ad campaign to reach the full set of users even though it exists on a single child blockchain. The parent blockchain includes the block headers of all child chains, thereby providing a record of all transactions on the network. The child blockchains hold the set of user accounts. Ad campaigns are dived between child blockchains such that one blockchain holds all the ad records for a particular campaign. A user's attributes may be verified by a distributed ledger. A targeted ad is an individual transaction on the blockchain.
- The system and method of
FIGS. 1-23 is scalable and may be composed of parent blockchain and child blockchains running in parallel. The parent blockchain may be coordinating block production by the child chains. In an embodiment, the creation of a new child chain with every fix set of new sellers allows parallel scalability. In an embodiment, the limiting factor may be the speed at which new child block hashes are processed and notification of new block starts can be done. The system and method ofFIGS. 1-23 is flexible in that the API allows submission of transactions by approved parties. The modification of requirements by other partners is possible. The transaction models support consent and payments, indirect contacts and direct contacts. The system and method ofFIGS. 1-23 provides for privacy in that the blockchain reports public part of transactions, consent is stored on the blockchain containing price, ad campaign and for example, up to three targeted categories (e.g. gender, age, location). The hashed signatures of consent are used to prevent further identification of sellers. Seller data is not typically stored on the blockchain. The system and method ofFIGS. 1-23 is reliable/auditable. The blockchain server will add transactions with a unique reference (consisting of blockchain ID, block number and transaction index) to data store. The full signed blocks are uploaded to a publicly readable repository for third party review. In case of data loss, data can be reconstructed from public repository. The system and method ofFIGS. 1-23 provides for security in that the endpoints are secured by 2-way SSL and parent blockchain nodes act as certificate authority responsible for issuing and managing certificates. The system and method ofFIGS. 1-23 provides that data does not generally pass from a member to a third party, use of member data is individually and actively permissioned, third party does not track a member through this process, clients may contact members without middle-man interaction, the administrator of the platform sets the rules, certifies data, validates members and clients, interactions are simple, fast, contracted, accounted transaction, a secure place for members and clients to communicate and trade data. The system and method ofFIGS. 1-23 can be used for conducting self-service research with granular respondent definitions, testing concepts, ads, offers, delivering targeted advertising, other communication or interactions. - The system and method of
FIGS. 1-23 describes a process of permissioned use of data within safe direct contact and may be used in all forms of client-panelist interaction, whether for conducting surveys, other research or engagement tasks, or delivering ads. Individuals or organizations that register to use the platform can manage personal data consent, receive direct contacts from third parties for pay, view and manage balances from such payments, and view history of transactions. Companies that register to use the platform can collect personal data usage consent from their customers, allow customers ability to manage their personal data, including accepting payment for direct contact from their parties, which may be on the platform or by way of a publisher via an online ad, cell phone company via text message, or tv network via a TV ad. A member company may join the online ad platform. Third parties that are not registrants or members may be entities that desire to reach registrants directly based on registrant attributes. For example, direct advertisers, online advertisers, market researchers, or academic researchers. - The personal data management for registrants may be in the form of consent management. The consent management may be by data type, for example survey data, browser history, past purchases, health records, or other data type. The consent management may be by data use, for example direct contact of an offer or survey, online ad targeting, academic research. A registrant may grant consent by responding yes or no, or provide a price required for direct contact. A registrant may also have an inbox of third party direct contacts, statement of asset balances, and history of transactions. With respect to members' customers, the data management may also include data pertaining to direct contact on members' platforms. A record of transactions can be referenced by businesses to verify they are meeting GDPR requirements. There is value and efficiency created for individuals in that they have a better experience of ads because they are more relevant due to the quality of data used for targeting, protection of privacy, and rewards for members for every permissioned use of their data. With respect to the direct contact interface for third parties, a third party may choose attributes of people it desires to reach, choose minimum payment to do so, which may be based on a base price and price per attribute, create a message to be delivered, and view a history of transactions. The publishers ad platform for internet publishers Integrates data, data analysis software, demand side platform, supply side platform, matching engine, GDPR compliance. A publisher can deliver targeted advertising on publisher sites using GDPR compliant data.
- In an embodiment, the platform and publisher may obtain permissions from members. The platform provides software to the publisher that combines data gathered by the publisher with known attributes provided by the platform to better understand publisher's visitors and improve visitor experience and ad targeting. Members who have received enhanced targeted ads can be post-tested by the platform to audit ad reach and ad effectiveness. The publisher can refer new members to the platform and receive royalty based on revenue the platform generates from referred members going forward.
- Referring now also to
FIG. 9 , at least a portion of the methodologies and techniques described with respect to the exemplary embodiments of thesystem 100 can incorporate a machine, such as, but not limited to,computer system 900, or other computing device within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies or functions discussed above. The machine may be configured to facilitate various operations conducted by thesystem 100. For example, the machine may be configured to, but is not limited to, assist thesystem 100 by providing processing power to assist with processing loads experienced in thesystem 100, by providing storage capacity for storing instructions or data traversing thesystem 100, or by assisting with any other operations conducted by or within thesystem 100. - In some embodiments, the machine may operate as a standalone device. In some embodiments, the machine may be connected (e.g., using
communications network 135, another network, or a combination thereof) to and assist with operations performed by other machines and systems, such as, but not limited to, thefirst user device 102, thesecond user device 111, thecell tower 125, theserver 140, theserver 150, thedatabase 155, theserver 160, or any combination thereof. The machine may be connected with any component in thesystem 100. In a networked deployment, the machine may operate in the capacity of a server or a client user machine in a server-client user network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. The machine may comprise a server computer, a client user computer, a personal computer (PC), a tablet PC, a laptop computer, a desktop computer, a control system, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein. - The
computer system 900 may include a processor 902 (e.g., a central processing unit (CPU), a graphics processing unit (GPU, or both), amain memory 904 and astatic memory 906, which communicate with each other via abus 908. Thecomputer system 900 may further include avideo display unit 910, which may be, but is not limited to, a liquid crystal display (LCD), a flat panel, a solid state display, or a cathode ray tube (CRT). Thecomputer system 900 may include an input device 912, such as, but not limited to, a keyboard, acursor control device 914, such as, but not limited to, a mouse, adisk drive unit 916, asignal generation device 918, such as, but not limited to, a speaker or remote control, and anetwork interface device 920. - The
disk drive unit 916 may include a machine-readable medium 922 on which is stored one or more sets ofinstructions 924, such as, but not limited to, software embodying any one or more of the methodologies or functions described herein, including those methods illustrated above. Theinstructions 924 may also reside, completely or at least partially, within themain memory 904, thestatic memory 906, or within theprocessor 902, or a combination thereof, during execution thereof by thecomputer system 900. Themain memory 904 and theprocessor 902 also may constitute machine-readable media. - Dedicated hardware implementations including, but not limited to, application specific integrated circuits, programmable logic arrays and other hardware devices can likewise be constructed to implement the methods described herein. Applications that may include the apparatus and systems of various embodiments broadly include a variety of electronic and computer systems. Some embodiments implement functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit. Thus, the example system is applicable to software, firmware, and hardware implementations.
- In accordance with various embodiments of the present disclosure, the methods described herein are intended for operation as software programs running on a computer processor. Furthermore, software implementations can include, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.
- The present disclosure contemplates a machine-
readable medium 922 containinginstructions 924 so that a device connected to thecommunications network 135, another network, or a combination thereof, can send or receive voice, video or data, and communicate over thecommunications network 135, another network, or a combination thereof, using the instructions. Theinstructions 924 may further be transmitted or received over thecommunications network 135, another network, or a combination thereof, via thenetwork interface device 920. - While the machine-
readable medium 922 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “machine-readable medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that causes the machine to perform any one or more of the methodologies of the present disclosure. - The terms “machine-readable medium,” “machine-readable device,” or “computer-readable device” shall accordingly be taken to include, but not be limited to: memory devices, solid-state memories such as a memory card or other package that houses one or more read-only (non-volatile) memories, random access memories, or other re-writable (volatile) memories; magneto-optical or optical medium such as a disk or tape; or other self-contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium. The “machine-readable medium,” “machine-readable device,” or “computer-readable device” may be non-transitory, and, in certain embodiments, may not include a wave or signal per se. Accordingly, the disclosure is considered to include any one or more of a machine-readable medium or a distribution medium, as listed herein and including art-recognized equivalents and successor media, in which the software implementations herein are stored.
-
FIGS. 12-23 illustrate an embodiment of the invention where a user may interact with the digital advertising platform using a mobile device, for example an application on a cellular phone.FIG. 12 illustrates that the YouDirect application may be downloaded and used on both the Android and Apple operating systems.FIGS. 13, 14 , and 15 illustrate screen shots from a mobile phone of a user with example profile and consent information questions. InFIGS. 13, 14, and 15 , information is divided into categories. For example inFIGS. 13 and 14 , categories include Basic Information, Financial Information, and Household Information, and inFIG. 15 Household Information, 2019 Life Events, and Online Activity. The number of questions in each category is provided and the status of completion. For example, in the category of Basic Information, three questions are provided and the user has provided answers to all three questions. For each category, there is a column entitled Consent to targeting. A user may choose whether the information provided in response to each question may be used for targeted advertising. As stated inFIG. 13 , when the user consents to targeting, YouDirect uses your data to anonymously match you with relevant invitations. Your personal data is not shared with advertisers. In such a manner, a user may control which data is used to match the user with relevant invitations. Also shown at the bottom ofFIGS. 13, 14, and 15 are screen selections of entitled Invitations, History, and Profile. The illustrated categories and questions are examples and other categories and questions are contemplated to be within the scope of the invention. - In an embodiment, user data, such as illustrated in
FIGS. 13, 14, and 15 , may be used to match the user with advertisers that identify similar target consumer attributes. A targeted advertisement may then be sent to the user based upon the shared data. In exchange for sharing their data, consumers earn rewards. -
FIG. 16 is a screen shot from a mobile phone of a user illustrating an example of matching the profile and consent information of a user to an advertiser. As shown inFIG. 16 , the user has been matched with a film company. The film company has sent an invitation to the user requesting interaction between the user and the film company. The user can choose to accept the invitation or decline the invitation. -
FIG. 17 is a screen shot from a mobile phone of a user illustrating example invitations and corresponding rewards. In the embodiment shown, the invitations may include targeted advertisements and questions, or just questions. The invitations may be from various third-parties that have expressed interest in the type of information the user is willing to share.FIG. 18 is a screen shot from a mobile phone of a user illustrating an example question when a user accepts an invitation. In the embodiment shown inFIG. 18 , the user has agreed to watch a targeted video advertisement and answer at least one question.FIG. 19 is a screen shot from a mobile phone of a user illustrating an example of a targeted advertisement.FIG. 20 is a screen shot from a mobile phone of a user illustrating an example question when a user accepts an invitation. -
FIG. 21 is a screen shot from a mobile phone of a user illustrating an example reward. The reward may be in the form of money credited to an account or other reward such as points that can be redeemed. Also shown inFIG. 21 is a targeted offer from a third-party. The user can choose to proceed to view the offer or choose not to view the offer.FIG. 22 is a screen shot from a mobile phone of a user illustrating an example of a targeted advertisement by way of linking the user to the third-party website. -
FIG. 23 is screen shot from a mobile phone of a user illustrating an example of the blockchain record of the transaction. In the embodiment shown, personal data is not a part of the blockchain. The blockchain record shown inFIG. 23 illustrates an encrypted ID, value, and the type of data being used. - The illustrations of arrangements described herein are intended to provide a general understanding of the structure of various embodiments, and they are not intended to serve as a complete description of all the elements and features of apparatus and systems that might make use of the structures described herein. Other arrangements may be utilized and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. Figures are also merely representational and may not be drawn to scale. Certain proportions thereof may be exaggerated, while others may be minimized. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
- Thus, although specific arrangements have been illustrated and described herein, it should be appreciated that any arrangement calculated to achieve the same purpose may be substituted for the specific arrangement shown. This disclosure is intended to cover any and all adaptations or variations of various embodiments and arrangements of the invention. Combinations of the above arrangements, and other arrangements not specifically described herein, will be apparent to those of skill in the art upon reviewing the above description. Therefore, it is intended that the disclosure not be limited to the particular arrangement(s) disclosed as the best mode contemplated for carrying out this invention, but that the invention will include all embodiments and arrangements falling within the scope of the appended claims.
- The foregoing is provided for purposes of illustrating, explaining, and describing embodiments of this invention. Modifications and adaptations to these embodiments will be apparent to those skilled in the art and may be made without departing from the scope or spirit of this invention. Upon reviewing the aforementioned embodiments, it would be evident to an artisan with ordinary skill in the art that said embodiments can be modified, reduced, or enhanced without departing from the scope and spirit of the claims described below.
Claims (20)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/821,892 US20200302482A1 (en) | 2019-03-18 | 2020-03-17 | Digital advertising platform and method |
US18/141,325 US11847251B1 (en) | 2019-03-18 | 2023-04-28 | Permissions-based communication of information |
US18/531,978 US20240104246A1 (en) | 2019-03-18 | 2023-12-07 | Permissions-Based Communication of Information |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201962819800P | 2019-03-18 | 2019-03-18 | |
US16/821,892 US20200302482A1 (en) | 2019-03-18 | 2020-03-17 | Digital advertising platform and method |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/141,325 Continuation US11847251B1 (en) | 2019-03-18 | 2023-04-28 | Permissions-based communication of information |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200302482A1 true US20200302482A1 (en) | 2020-09-24 |
Family
ID=70775429
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/821,892 Abandoned US20200302482A1 (en) | 2019-03-18 | 2020-03-17 | Digital advertising platform and method |
US18/141,325 Active US11847251B1 (en) | 2019-03-18 | 2023-04-28 | Permissions-based communication of information |
US18/531,978 Pending US20240104246A1 (en) | 2019-03-18 | 2023-12-07 | Permissions-Based Communication of Information |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/141,325 Active US11847251B1 (en) | 2019-03-18 | 2023-04-28 | Permissions-based communication of information |
US18/531,978 Pending US20240104246A1 (en) | 2019-03-18 | 2023-12-07 | Permissions-Based Communication of Information |
Country Status (8)
Country | Link |
---|---|
US (3) | US20200302482A1 (en) |
EP (1) | EP3942508A1 (en) |
AU (1) | AU2020242330A1 (en) |
CA (1) | CA3133900A1 (en) |
GB (1) | GB2596253A (en) |
MX (1) | MX2021011304A (en) |
SG (1) | SG11202110309UA (en) |
WO (1) | WO2020188349A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210182915A1 (en) * | 2019-12-11 | 2021-06-17 | Data Donate Technologies, Inc. | Platform for management of user data |
US20210390196A1 (en) * | 2020-06-15 | 2021-12-16 | Concord Technologies Inc. | Decentralized consent network for decoupling the storage of personally identifiable user data from user profiling data |
WO2022271361A1 (en) * | 2021-06-25 | 2022-12-29 | Qonsent Inc. | Systems and methods for electronic data privacy, consent, and control in electronic transactions |
US20230041097A1 (en) * | 2021-08-05 | 2023-02-09 | Good-Loop Ltd. | Advertising database management system and method |
US11748784B2 (en) | 2018-06-01 | 2023-09-05 | Concord Technologies Inc. | User control of anonymized profiling data using public and private blockchains in an electronic ad marketplace |
US20230379318A1 (en) * | 2022-05-19 | 2023-11-23 | Lemon Inc. | Online data in a secure environment |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20240020365A1 (en) * | 2022-07-13 | 2024-01-18 | Capital One Services, Llc | Systems and methods for using machine learning models to organize and select access-restricted components for accessed using user-specific access tokens with variable properties |
US12086832B2 (en) * | 2022-09-26 | 2024-09-10 | Yahoo Ad Tech Llc | Systems and methods for targeting electronic content using virtual tokens on user devices |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070067297A1 (en) * | 2004-04-30 | 2007-03-22 | Kublickis Peter J | System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users |
US20200329018A1 (en) * | 2017-12-21 | 2020-10-15 | Taliware, Inc. | Blockchain network management implementing biometric based authentication of an individual |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180225693A1 (en) | 2012-03-06 | 2018-08-09 | Richard Postrel | Consumer data and privacy controls in a social networking environment |
US20190019208A1 (en) | 2012-03-06 | 2019-01-17 | Richard Postrel | Consumer data and privacy controls in a social networking environment |
US20180322597A1 (en) * | 2016-08-31 | 2018-11-08 | Robert Sher | Decentralized cryptographic real estate transaction assistance system and method |
US10735202B2 (en) | 2017-07-24 | 2020-08-04 | International Business Machines Corporation | Anonymous consent and data sharing on a blockchain |
US11282149B2 (en) | 2017-08-14 | 2022-03-22 | LO3 Energy Inc. | Exergy token |
WO2019059812A1 (en) * | 2017-09-21 | 2019-03-28 | Никита Михайлович БЕСПАЛОВ | Method and decentralised platform for conducting and monitoring advertising campaigns using smart contracts, blockchain technology and neural networks |
JP2019159773A (en) | 2018-03-13 | 2019-09-19 | 本田技研工業株式会社 | Data distribution control device, information processing device, and data distribution control method |
US10798131B2 (en) | 2018-05-01 | 2020-10-06 | Charles Finkelstein Consulting LLC | Universal data privacy control management system |
US11049148B2 (en) | 2018-06-01 | 2021-06-29 | Concord Technologies Inc. | User control of anonymized profiling data using public and private blockchains in an electronic ad marketplace |
US10565607B2 (en) | 2018-06-29 | 2020-02-18 | Sion Apps LLC | Browser based advertising platform and rewards system |
US11048813B2 (en) | 2018-08-29 | 2021-06-29 | Nucleus Vision, Llc | Method and system for managing consent data in a blockchain network |
US11288280B2 (en) | 2018-10-31 | 2022-03-29 | Salesforce.Com, Inc. | Systems, methods, and apparatuses for implementing consumer data validation, matching, and merging across tenants with optional verification prompts utilizing blockchain |
US11568437B2 (en) | 2018-10-31 | 2023-01-31 | Salesforce.Com, Inc. | Systems, methods, and apparatuses for implementing commerce rewards across tenants for commerce cloud customers utilizing blockchain |
CN112381646B (en) * | 2018-10-31 | 2024-10-22 | 蚂蚁链技术有限公司 | Blockchain-based privacy transaction and application method and device thereof |
US20210365574A1 (en) | 2018-11-05 | 2021-11-25 | Data Donate Technologies, Inc. | Method and System for Data Valuation and Secure Commercial Monetization Platform |
US11178151B2 (en) | 2018-12-19 | 2021-11-16 | International Business Machines Corporation | Decentralized database identity management system |
WO2020168115A1 (en) * | 2019-02-13 | 2020-08-20 | Alghamdi Mansour | Systems and methods for verifiable peer to peer communication |
-
2020
- 2020-03-17 SG SG11202110309UA patent/SG11202110309UA/en unknown
- 2020-03-17 MX MX2021011304A patent/MX2021011304A/en unknown
- 2020-03-17 GB GB2113247.7A patent/GB2596253A/en not_active Withdrawn
- 2020-03-17 WO PCT/IB2020/000169 patent/WO2020188349A1/en unknown
- 2020-03-17 US US16/821,892 patent/US20200302482A1/en not_active Abandoned
- 2020-03-17 CA CA3133900A patent/CA3133900A1/en active Pending
- 2020-03-17 EP EP20726929.1A patent/EP3942508A1/en not_active Withdrawn
- 2020-03-17 AU AU2020242330A patent/AU2020242330A1/en not_active Abandoned
-
2023
- 2023-04-28 US US18/141,325 patent/US11847251B1/en active Active
- 2023-12-07 US US18/531,978 patent/US20240104246A1/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070067297A1 (en) * | 2004-04-30 | 2007-03-22 | Kublickis Peter J | System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users |
US20200329018A1 (en) * | 2017-12-21 | 2020-10-15 | Taliware, Inc. | Blockchain network management implementing biometric based authentication of an individual |
Non-Patent Citations (1)
Title |
---|
U Joseph Poon and Vitalik Buterin, Plasma: Scalable Autonomus Smart Contracts, August 11, 2017, https://www.plasma.io/plasma-deprecated.pdf (Year: 2017) * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11748784B2 (en) | 2018-06-01 | 2023-09-05 | Concord Technologies Inc. | User control of anonymized profiling data using public and private blockchains in an electronic ad marketplace |
US20210182915A1 (en) * | 2019-12-11 | 2021-06-17 | Data Donate Technologies, Inc. | Platform for management of user data |
US12100025B2 (en) * | 2019-12-11 | 2024-09-24 | Data Vault Holdings, Inc. | Platform for management of user data |
US20210390196A1 (en) * | 2020-06-15 | 2021-12-16 | Concord Technologies Inc. | Decentralized consent network for decoupling the storage of personally identifiable user data from user profiling data |
US11797698B2 (en) * | 2020-06-15 | 2023-10-24 | Concord Technologies Inc. | Decentralized consent network for decoupling the storage of personally identifiable user data from user profiling data |
WO2022271361A1 (en) * | 2021-06-25 | 2022-12-29 | Qonsent Inc. | Systems and methods for electronic data privacy, consent, and control in electronic transactions |
US20220414259A1 (en) * | 2021-06-25 | 2022-12-29 | Qonsent Inc. | Systems and Methods for Electronic Data Privacy, Consent, and Control in Electronic Transactions |
US20230041097A1 (en) * | 2021-08-05 | 2023-02-09 | Good-Loop Ltd. | Advertising database management system and method |
US20230379318A1 (en) * | 2022-05-19 | 2023-11-23 | Lemon Inc. | Online data in a secure environment |
Also Published As
Publication number | Publication date |
---|---|
GB2596253A (en) | 2021-12-22 |
CA3133900A1 (en) | 2020-09-24 |
EP3942508A1 (en) | 2022-01-26 |
WO2020188349A1 (en) | 2020-09-24 |
SG11202110309UA (en) | 2021-10-28 |
AU2020242330A1 (en) | 2021-10-14 |
MX2021011304A (en) | 2022-01-18 |
US20240104246A1 (en) | 2024-03-28 |
US11847251B1 (en) | 2023-12-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11847251B1 (en) | Permissions-based communication of information | |
JP7416870B2 (en) | Personal data processing method, computer program, recording medium and computer device based on blockchain | |
JP6170463B2 (en) | Targeting ads on social networks | |
US20120246065A1 (en) | Techniques for offering context to service providers utilizing incentives | |
US10666690B2 (en) | Resource-related content distribution hub | |
US20110247029A1 (en) | Techniques for offering context to service providers utilizing incentives | |
JP5498899B2 (en) | System and method for supporting consumer aggregation procedures in electronic networks | |
US20130173367A1 (en) | Processing of Electronic Referral Hyperlinks | |
US20120066084A1 (en) | System and method for consumer-controlled rich privacy | |
US8635110B2 (en) | Centralized management of marketing activities among participants of multiple channel marketing networks | |
US20130339109A1 (en) | System and method for providing celebrity endorsed content | |
US20200258099A1 (en) | Systems And Methods For Verifiable Peer To Peer Communication | |
US20110246213A1 (en) | Techniques for offering context to service providers utilizing an approval service and incentives utlizing online secure profile storage | |
US20110247030A1 (en) | Incentives based techniques for offering context to service providers utilizing syncronizing profile stores | |
US20110246283A1 (en) | Approval service based techniques for offering context to service providers utilizing incentives | |
Russell et al. | APIs and your privacy | |
KR102382438B1 (en) | Method, system and non-transitory computer-readable recording medium for providing commerce platform based on contents | |
US12073439B2 (en) | Smart contract system and method for managing digital user engagement | |
US20140279031A1 (en) | Mobile in-store loyalty advertising and marketing system and method | |
Zhang | Design and Secure Implementation of Private Data Query Mechanisms for Data Marketplaces | |
CA3221730A1 (en) | Smart contract system and method for managing digital user engagement | |
KR20240100215A (en) | Privacy-preserving of user profile and Real-Time Bidding(RTB) based ad delivery system through Functional Encryption(FE) and Method for the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |