Nothing Special   »   [go: up one dir, main page]

US20220261853A1 - Providing targeted content based on a user's preferences - Google Patents

Providing targeted content based on a user's preferences Download PDF

Info

Publication number
US20220261853A1
US20220261853A1 US17/585,255 US202217585255A US2022261853A1 US 20220261853 A1 US20220261853 A1 US 20220261853A1 US 202217585255 A US202217585255 A US 202217585255A US 2022261853 A1 US2022261853 A1 US 2022261853A1
Authority
US
United States
Prior art keywords
content
user
arkiïs
individual user
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/585,255
Inventor
Mark W. Publicover
William Knight Foster
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US17/585,255 priority Critical patent/US20220261853A1/en
Publication of US20220261853A1 publication Critical patent/US20220261853A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0269Targeted advertisements based on user profile or attribute
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2358Change logging, detection, and notification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • G06F16/24575Query processing with adaptation to user needs using context
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/251Learning process for intelligent management, e.g. learning user preferences for recommending movies
    • H04N21/252Processing of multiple end-users' preferences to derive collaborative data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25883Management of end-user data being end-user demographical data, e.g. age, family status or address
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/2668Creating a channel for a dedicated end-user group, e.g. insertion of targeted commercials based on end-user profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/4508Management of client data or end-user data
    • H04N21/4532Management of client data or end-user data involving end-user characteristics, e.g. viewer profile, preferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/485End-user interface for client configuration
    • H04N21/4858End-user interface for client configuration for modifying screen layout parameters, e.g. fonts, size of the windows
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/65Transmission of management data between client and server
    • H04N21/658Transmission by the client directed to the server
    • H04N21/6582Data stored in the client, e.g. viewing habits, hardware capabilities, credit card number
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • H04W4/21Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications

Definitions

  • Computerized targeted advertising is increasingly being used to target potential consumers.
  • the ubiquity of social networks and the large volume of data generated by such networks is increasingly being used to further target advertising within electronic systems.
  • Computerized advertising permits a degree of targeting not possible in other realms.
  • the ubiquity of social networks and other online services entice us to sacrifice our privacy in order to receive the benefits of these “free” services. This approach creates an escalating tension between our desire to control our personal information and the service provider's need to continually improve profits by selling increasingly targeted advertising.
  • Keyword advertising is booming across the Internet today, and behind the scenes, money changes hands with every click of a user's mouse. Retailers and advertisers are more than willing to pay for access to a user's information—but the user is forced to give up this information for free. The money may be diverted to clearing houses, search engine companies, or publicly traded corporations. The end user fuels the economics of online advertising; however, the end user does not obtain his or her rightful portion of the generated cash flow accompanying every click.
  • the present invention relates to computerized advertising and fulfillment systems.
  • Embodiments of the disclosed systems resolve the above noted conflict by aligning the interests between Providers and Consumers.
  • the Arki ⁇ sTM platform safeguards member privacy, providing tools to create and control in-depth Profiles. As these Profiles become more exhaustive, the advertising becomes more highly targeted and thus more valuable for both Marketers/Providers and Users who are paid to watch and engage with these ads.
  • Payments may be used to purchase Content (e.g. TV shows) and Products.) Members may increase their advertising payouts by providing Feedback, sharing an ad with a friend, or using a coupon.
  • Arki ⁇ sTM rates each User's buying performance by analyzing numerous metrics including how accurately their Assertions (e.g. buying predictions) match their future actions (e.g. subsequent purchases) and the rate at which they buy advertised Products. Additionally, Arki ⁇ sTM enables Users to project their values into the marketplace by joining with other like-minded Users to create buying groups that influence the way goods and services are produced for them, and to maintain their privacy in the process.
  • targeted advertisements can be provided to a User based on the User's Profile.
  • Targeted advertisements can also be provided to a group of Users based on Profiles of one or more of the Users in the group.
  • Targeted advertisements can be presented instead of generic advertisements (e.g., non-targeted advertisements).
  • targeted advertisements can be provided (e.g., provided seamlessly or transparently to the User) instead of generic advertisements in audio and/or video Content (e.g., broadcast television, streaming content, etc.).
  • Targeted advertisements can also be provided on a computing device (e.g., a mobile computing device, such as a smartphone or tablet computer) for consumption by Users while engaged with a First Device (e.g., watching a television display).
  • a method for providing targeted advertising to a group of Users.
  • the method comprises grouping a plurality of Users into a shared advertising group, determining one or more targeted advertisements to be presented to the shared advertising group, where the determining the one or more targeted advertisements is based, at least in part, on Profiles (that can be kept private) of the plurality of Users in the shared advertising group, and providing the one or more targeted advertisements for presentation to the shared advertising group.
  • Profiles that can be kept private
  • Such method is too complex and time consuming for one or more humans to carry out and thus requires automation through one of more computing devices, which when using this method is able to more effectively deliver Targeted Content, that can be privacy protected, to a group of Users than it could by considering them individually.
  • Such method is not a previously well-understood, routine, or conventional activity, being a significant improvement in the field of selecting and delivering targeted advertising.
  • a method for participating in a group receiving shared advertisements, comprising a plurality of Users.
  • the method comprises associating with the shared advertising group comprising the plurality of Users, providing Context Information associated with Content, where the Content is being consumed by a User, who is a member of the group, on a First Device, reproducing one or more targeted advertisements, where the one or more targeted advertisements have been selected for presentation to the shared advertising group, and where the one or more targeted advertisements have been selected based, at least in part, on Profiles of the plurality of Users, that can be privacy protected, in the shared advertising group.
  • the method can also comprise receiving Feedback for at least one of the one or more targeted advertisements.
  • the User can also receive a payout for receiving one or more of the advertisements, and the payout can be based, at least in part, on the provided Feedback.
  • the group can be formed for any reason, based upon shared purchasing interests, shared values and goals, or any other reason why association in the group benefits its members, and therefore benefits potential advertisers desiring to connect with such a group even though the connection may be opaque and private as to the User group such that the advertiser cannot see or access the personal Profile, name, or digital address of the group or its participants.
  • a symbol, certificate, or Visualization can be utilized that quickly surmises how well an item matches the values and desires of the one or more Users.
  • a certificate can display information in a clear and concise manner by format, terminology, imagery or symbols, to concisely convey and/or summarize information to a User without that User being compelled to delve into the body of the advertisements or information being pushed to them, and can be performed without that User's privacy being infringed.
  • Users and groups or even Providers and Advertisers
  • some sort of integrity rating that quantifies how well a User or group matches their stated purchasing predictions and behavior.
  • This rating permits advertisers to more accurately gauge whether paying a User or group to consume their advertisement is reasonable in light of the relationship between their stated intentions and their actual behavior. For example, if a group indicates that it intends to purchase a yacht within the next six months, but actually does not come close to possessing the capability or true intent to do so, a yacht company may not want to pay such a group to receive their yacht advertisements.
  • Such integrity ratings may go both ways as to Providers and Users and help ensure that proper economic (or moral) efficiencies are being sustained within the system.
  • the integrity rating can influence a user or group's standing within the system, it may do so without exposing who they are personally because their privacy can be protected. And because it is not personal, it increases the likelihood of honesty and accuracy, which in turn, increases economic efficiency for all concerned.
  • Embodiments of the present invention concern systems for selling goods online via a global computer network.
  • the end user signs up for the disclosed system and, in some embodiments, downloads profile creation software for use on a local computer.
  • the user then creates a customized profile, that can remain private, which may include one or more of: demographic information, income level, interests/hobbies, geographic location, type of buyer, and search intentions which can remain opaque or anonymous to any potential advertiser or producer.
  • the user then uploads the customized profile information to a database.
  • the disclosed system assigns an initial Click Value to the user (amount that advertisers are willing to pay a user for their click, determined by the advertiser and partially based on specificity and details of a user's profile).
  • the customized profile is also used to determine Focus Spectrum Statistics (including the percentage of similar users who decided to click on the product and the smaller percentage that followed through with a conversion), which encompass the range of interests for the advertisements that the user, who may remain anonymous, will view.
  • the user then logs into the system, which can protect their external privacy as to potential advertisers, and is offered the choice to select an intention representing the user's conversion plans for the near or immediate future, specifying a choice of, for example, definite buyer, potential buyer, research to buy, just browsing or rather not say.
  • the user then performs standard keyword searches for items and the system returns advertisement results based on, in a preferred environment, Focus Spectrum Statistics, Click Value, relevancy and product price. The user then has a choice to rerank the results based on any of these factors.
  • the disclosed system eliminates the need for real-life focus groups, joining the buyer and advertiser digitally.
  • a rating system where end users can rate different sites or aspects of advertisers allows advertisers to ascertain what advertisements and products work, and what needs to be improved.
  • the system allows advertisers to gain more input from end users, while maintaining the identity protection which is always granted to end users within the system. Users can make their opinions known, directly affecting new products and advertisements and tailoring businesses to their preference.
  • mobile computing devices e.g., mobile phones, smartphones, tablet computers, etc.
  • mobile computing devices can implement the methods described herein to more effectively provide targeted advertising solutions (e.g., provide User Profile information for storage in a server or cloud database, provide Context Information regarding programming currently being consumed, provide targeted advertising options and payout information, present targeted advertising for consumption by Users, receive Feedback regarding targeted advertising, etc.).
  • targeted advertising solutions e.g., provide User Profile information for storage in a server or cloud database, provide Context Information regarding programming currently being consumed, provide targeted advertising options and payout information, present targeted advertising for consumption by Users, receive Feedback regarding targeted advertising, etc.
  • FIG. 1 is a block diagram of an example system for providing targeted advertising.
  • FIG. 2 is a diagram depicting the selection of Content to deliver to a Consumer based upon the Consumer's Profile that includes preferences and rules, the present context including the time, location, social, and adjacent Content of the User, and the matching Content information including Independent Reviewer Certifications and bid amount.
  • FIG. 3 is a flowchart of an example method providing targeted advertising to a group of Users.
  • FIG. 4 is an illustration of the generation of an actualize bid offered by a Marketer for use by content selector.
  • FIG. 5 is a flowchart of an example method for participating in a shared advertising group comprising a plurality of Users.
  • FIG. 6 is a flowchart of an example method providing targeted advertising to a group of Users including a Champion.
  • FIG. 7 is a flowchart of an exemplary depiction of how Users and Merchants are connected together to provide opportunities to a User based upon their location.
  • FIG. 8 is a diagram depicting the Spectrum of Targeted Content.
  • FIG. 9 is a diagram of the flow of digital Content to a Consumer.
  • FIG. 10 is a Venn diagram of the relationship between a Master Profile and Public Profiles.
  • FIG. 11 is a diagram depicting many of sources of information for building a User's Profile in the Arki ⁇ s system including corrections, edits, and deletions by the User.
  • FIG. 12 is a diagram depicting a User Profile, that can be privacy protected, and many of the constituent pieces of a User Profile.
  • FIG. 13 is a flowchart of friendship, networking, and social media integration.
  • FIG. 14 is a diagram of the workings of a Family Friendly Location.
  • FIG. 15 is a flow chart depicting how Content is created, provided, filtered, and fed back upon.
  • FIG. 16 is a Venn diagram showing the different kinds of User Profiles.
  • FIG. 17 a is a series of exemplary depictions of the match level between the interests of a Profile and a particular piece of Targeted Content.
  • FIG. 17 b is an exemplary depiction of the match level between the interests of a Profile and a particular piece of Targeted Content.
  • FIG. 18 is an information flow diagram in an exemplary Content ranking, Filtering, and alerting system that can be used in conjunction with the technologies described herein.
  • FIG. 19 is a diagram depicting the various Devices that a Consumer may receive digital content from along with their ability to provide Feedback back to those Devices.
  • FIG. 20 is a flowchart of SyncGroup Profiles, that can be privacy protected.
  • FIG. 21 is an exemplary SyncGroup Profile creation and notification system that can be used in conjunction with the technologies described herein.
  • FIG. 22 is an exemplary depiction of a SyncGroup of three individuals coordinated by their mobile phones with targeted advertising delivered to a shared First Device.
  • FIG. 23 is a flowchart of an exemplary depiction of a SyncGroup of three individuals coordinated by their mobile phones with targeted advertising delivered to a shared First Device.
  • FIG. 24 is a diagram of the Champion process.
  • FIG. 25 is a flow chart depicting a Content Producer asking a question about Consumers that is answered by a function that takes as input the context, the Consumer's Profile, and the producer's information to receive the probability of a positive answer to the question that is used to inform the decision as to whether to bid and how much to bid to submit Content to a particular Consumer for possible consumption by the Consumer.
  • FIG. 26 is a graph depicting the likelihood a User will purchase a new car over the time of a year.
  • FIG. 27 is a diagram depicting the use of 3 rd party plug-ins to extend the Arki ⁇ s system through published APIs while maintaining security of Profile information.
  • FIG. 28 is an exemplary depiction of how well a particular piece of Targeted Content matches the interests of a profile along various dimensions and in aggregate.
  • FIG. 29 is the illustration of creating a Product's User customized match level certificate that is presented to the User.
  • FIG. 30 is an exemplary stream selector system that can be used in conjunction with the technologies described herein.
  • FIG. 31 is an exemplary bidding scenario wherein the highest bidding advertiser wins the right to deliver advertising to a public profile and the public profile shares in the proceeds. It is also an exemplary bidding scenario of a single advertiser bidding on several Profiles at different rates and winning a subset of these bids.
  • FIG. 32 is a diagram of an exemplary computing system in which some described embodiments can be implemented.
  • FIG. 33 is an exemplary mobile device that can be used in conjunction with the technologies described herein.
  • FIG. 34 is a flowchart of an example method governing the automated collection of data that can be privacy protected.
  • FIG. 35 is an exemplary cloud computing system that can be used in conjunction with the technologies described herein.
  • FIG. 36 is a representation of the system components and users: the system network and software interface, end users' local computers, and advertisers.
  • FIG. 37 is an example GUI (graphical user interface) depicting a search through the system, from the user's perspective.
  • FIG. 38 is a flowchart depicting the transfer of money and credit through the provided online banking system, between the user (who may maintain anonymity) and the advertiser.
  • FIG. 39 is a flowchart depicting the Search Intention and the different effects caused by selecting its choices.
  • FIG. 40 is a visual representation of a shipping method that hides the user's identity from the advertiser supplying a product.
  • FIG. 41 is a flowchart of a system for purchasing goods online.
  • FIG. 42 is a visual representation of the Click Value and how its value can change.
  • Alternate Device A Device that may provide alternate Targeted Content to that of a First Device.
  • the Alternate Device is a mobile device being used by a single User where the First Device may be shared by a plurality of Users.
  • Other Alternate Devices include a DVR, a RokuTM player, and a networked Blu-Ray player.
  • a forward-looking declaration of a User's intention to take future action(s) related to a targeted marketing profile e.g. make a purchase, travel, go to college in fall, adopt a baby
  • a targeted marketing profile e.g. make a purchase, travel, go to college in fall, adopt a baby
  • a probability e.g. 80% likely to go to Europe
  • a condition e.g. if my portfolio grows by 10% then I will buy a new car.
  • Business User An Individual User that is acting on behalf of a business, non-profit, governmental, or other incorporeal entity.
  • Business User Profile Either a Goods & Services Provider Profile, Marketer Profile, Content Producer Profile, or Content Provider Profile.
  • Certifier A Reviewer that provides independent certification about suppliers for specific metrics and often is a Non-Governmental Organization (NGO) or individual.
  • NGO Non-Governmental Organization
  • Certifier Profile A collection of delineating information about a Certifier that may be used by Consumers to filter associated certification content.
  • a User or SyncGroup of Users who can remain anonymous, that receives content from Content Producers, which may be received by way of Content Providers and may buy from Goods & Services Providers.
  • Content Any experiential information consumed by a User, that may include interactions and/or artistic expression such as video, audio, still photos, words, comic strips, and live performances. Content is a continuum from paid premium to targeted advertising that may pay the User, who can remain anonymous.
  • Content Producer An entity that creates Content for consumption.
  • Content Producer Profile Any delineating information about a Content Producer that may be used by Consumers to Filter their Content delivery.
  • Content Provider An entity that delivers Content for consumption.
  • Content Provider Profile Any delineating information about a Content Provider that may be used by Consumers to Filter their Content delivery.
  • Content Spectrum The range of available Content that spans from high-value/Premium Content to low or negative value Content—like advertising that pays Consumers.
  • a particular Content's value may vary depending upon Consumer's preferences, context, etc.
  • Context Information Data points, often from a User's Profile, that can remain private, which may be utilized to deduce the Content likely being consumed by the Consumer.
  • Family Friendly Location A location where all Content being delivered adheres to Profile Filtering of all detected persons present.
  • Family Friendly Content Content that may be audited, rated, and/or judged by a Content Producer, a User, and/or a third party to adhere to certain individual, family, and/or community standards that one or more Users may wish to govern.
  • Family Friendly Device A device that may be configured to detect the presence of minor children with Filtering requirements and automatically Filter Content to that which satisfies the Filtering criteria for all the detected children present. Adults may also configure Filtering requirements for themselves to be protected through Content filtration.
  • Feedback Assessment of consumed Content by a Consumer provided either unsolicited or in response to solicitation by the Content Producer. Feedback may also be an assessment of a Consumer's transactional performance by a Goods & Services Provider party of a transaction.
  • Filter The control of blocking Consumer visibility of Products, Content, Marketers, Reviewers, and Content Producers based upon preferences in a Consumer's Profile.
  • First Device The initial Device or Devices a User engages with in a Content consumption session whose Content may be superseded by the addition of one or more Alternate Devices.
  • An Alternate Device may itself be the First Device of a further superseding Alternate Device.
  • Generic Advertisement Generic Content where the Content is Marketing Content.
  • Generic Content Content that is not individually Targeted toward a Consumer.
  • Goods & Services Provider An entity, such as a manufacturer or service provider, that sells goods and/or services for consumption.
  • Goods & Services Provider Profile A collection of delineating information about a Goods & Services Provider that may be used by Consumers to Filter associated Marketing Content.
  • Individual User A User that is an individual person, representing themselves that can maintain their anonymity.
  • Individual User Profile A collection of delineating information about an Individual User.
  • Market Request A process by which Consumers publish desires and/or commitments to buy goods or services for which there is nothing exactly matching and presently available. This allows Users to extend their values into the marketplace to influence the way goods and services are created for them. Consumers may also publish Market Requests related to Product graduates, Champion performances, reviews, or certifications.
  • Marketer An entity that targets Marketing Content to select Consumers. (Sometimes described as an advertiser.)
  • Marketer Profile A collection of delineating information about a Marketer that may be used by Consumers to Filter their Marketing Content.
  • Marketing Content Content created in an attempt to induce a Consumer action and that may be the basis for a payment to the Consumer and may be targeted.
  • Master Profile A private Profile connected to a single User that helps to delineate their individual identity.
  • Physical Proximity A plurality of Users in the same general physical location (near each other, such as in the same room) at the same time such that Users may readily share one or more Devices or interact with each other such as by smelling, touching, talking, or hand signals.
  • Premium Content Content that a Consumer usually pays to consume and which may be targeted. Broadcast television is also premium and paid for by the included generic advertisements.
  • Primary Content Content for which Arki ⁇ sTM Targeted Content may be overlaid.
  • Product Goods or services including Content or anything that can be consumed, viewed, used, or received.
  • Product Champion A Consumer that promotes, compares, or disparages Products to other Consumers and may be compensated by an interested Marketer. (Sometimes described as a Champion.)
  • Profile A collection of information that delineates an identity and can be accessed for targeting purposes while remaining anonymous.
  • a Goods & Services Provider A Goods & Services Provider, Reviewer, Product Champion, or Content Producer. An entity that supplies something to a User.
  • Reviewer Profile A collection of delineating information about a Reviewer that may be used by Consumers to Filter associated review Content.
  • Sub Profile A User-designated subset (possibly an improper subset) of their Master Profile's demographic information about them that is used for the purpose of helping select the Content they receive. This may contain false information in order to protect a User's privacy. Sub Profiles may be private or public.
  • SyncGroup A plurality of Users who join together into a group to synchronize their consumption of Content and who may elect to maintain a group Profile. Sometimes described as a shared advertising group.
  • SyncGroup Profile A Profile that is created to identify a SyncGroup that is persistent or ongoing.
  • Targeted Content Content that is selected based upon a Consumer's Profile information.
  • Targeted Marketing Content Marketing Content that is also Targeted Content.
  • Targeted Premium Content Premium Content that is also Targeted Content.
  • User Profile A Profile that is created to identify a User.
  • Visualization A compound pictogram that communicates how well a Product matches a Consumer's stated values, ethics, goals, and standards. (Also referred to as a certificate or graphic.)
  • Virtual Proximity A plurality of Users consuming the same Content at the same time.
  • FIG. 1 is a block diagram of an example system 100 for providing targeted advertising solutions to implement the Arki ⁇ sTM system.
  • An operational overview of the system 100 is provided in Section 3—System for Providing Targeted Advertising and describes providing targeted advertising solutions to Users of computing devices (e.g., mobile computing devices) that are also receiving Content on a First Device (e.g., viewing a television).
  • Providing targeted advertising solutions can comprise providing Targeted Content (e.g., targeted advertising content and/or other types of Content provided in association with targeted advertising) to Users of computing devices.
  • Targeted Content e.g., targeted advertising content and/or other types of Content provided in association with targeted advertising
  • the example system 100 comprises a Targeted Content computing system 110 .
  • the Targeted Content computing system 110 can comprise various types of computing resources (e.g., computer servers, database servers, streaming media servers, networking resources, and/or other types of computing resources) for providing targeted advertising solutions to user devices 160 and their associated users.
  • the Targeted Content computing system 110 can be implemented as a cloud computing system.
  • the example system 100 also comprises User Devices 160 .
  • the User Devices 160 are computing Devices associated with Users (e.g., mobile phones, smartphones, tablet devices, smartwatches, etc.).
  • the system 100 also comprises a First Device 140 (e.g., a television or another type of display Device).
  • the Device 140 can be a shared First Device (e.g., a display that is shared by the Users of the User Devices 160 , such as a television in a home being viewed by multiple Users or a television in a business such as a sports bar or a movie screen in a theater).
  • multiple First Devices can be provided (e.g., multiple televisions can be viewed by multiple Users in a shared viewing system, such as a sports bar).
  • Custom DVR boxes that interleave live broadcast feeds with prerecorded Targeted Marketing Content.
  • the live broadcast is time shifted by several seconds to allow more seamless feed integration, commercial detection, and synchronization of targeted advertising end (including Consumer Feedback).
  • Such buffering adjusts automatically from one commercial break to the next to keep the live lag to a minimal amount sufficient to allow seamless integration of the live and pre-recorded streams.
  • a Custom DVR adds integration with the Arki ⁇ sTM system to a traditional DVR by allowing one or more Arki ⁇ sTM Profiles to be associated with the DVR.
  • an Arki ⁇ sTM Profile When consuming Content, an Arki ⁇ sTM Profile is activated either by manual designation on the DVR, one or more Consumers designating to Arki ⁇ sTM their current First Device source as being the Custom DVR, automatically by facial recognition of audience members, etc.
  • the active Profile of a Custom DVR determines the Targeted Marketing Content presented to Consumers.
  • the Custom DVR is in communication with the Arki ⁇ sTM cloud servers to receive Targeted Marketing Content for presentation and for recording for future presentation.
  • the Custom DVR keeps track of the Profile(s) to which Targeted Marketing Content applies. Such Content may have expiration dates by which time it must be received or deleted.
  • the Custom DVR communicates to the Arki ⁇ sTM servers information about which Content is presented at what time.
  • the Custom DVR may detect commercial segment start/entry and end/exit points in any of several methods including through local video feed algorithmic analysis, communicating its current primary source feed channel to the Arki ⁇ sTM servers and receiving notification of segment start and end points as computed by the Arki ⁇ sTM cloud, detecting primary source feed signal encoding of entry and exit points, etc.
  • Blu-Ray streaming application or custom RokuTM channel to provide Targeted Content that is interleaved with traditional live streaming Primary Content sources.
  • Customized hardware to provide the alternate Content presented to Users of the system may also include sensing equipment such as video cameras, microphones, and Near Field Communication (NFC). These sensors are used to dynamically determine the consuming audience so that Targeted Content may be automatically adjusted and optimized for group consumption.
  • sensing equipment such as video cameras, microphones, and Near Field Communication (NFC).
  • the First Device's streaming source communicate directly with nearby Alternate Devices or deduce its audience through environmental detection strategies (e.g., video cameras, microphones, etc.)
  • coordination can instead be done with the help of the Arki ⁇ sTM servers.
  • the coordinated group consumption of Alternate Devices is facilitated by the Arki ⁇ sTM servers and thus the Content delivery device for the First Device may be aware and join such groups with hints from the source Device and its linked Profile.
  • the example system 100 supports providing Targeted Content solutions.
  • the Device 140 can present Content (e.g., television programs, movies, streaming content, advertising, and/or other types of audio and/or video Content) for consumption by Users associated with the User Devices 160 .
  • the Content can be received from a number of sources for presentation by the Device 140 .
  • the Content can be received via a connecting network 130 (e.g., as streaming television or streaming video Content supported by other computing systems 120 ).
  • the Content can also be received from other Content sources 150 (e.g., Content Provider, over-the-air broadcast television, cable television, etc.).
  • the example system 100 supports providing Targeted Marketing Content to Users in place of Generic Advertisements (i.e. non-targeted).
  • the Device 140 can present Content (e.g., television Content and/or other Content with associated Generic Advertisements) to the Users of the User Devices 160 .
  • Content e.g., television Content and/or other Content with associated Generic Advertisements
  • a targeted advertisement can be presented to the Users in example system 100 .
  • the targeted advertisement is presented on the Device 140 instead of the Generic Advertisement (e.g., the targeted advertisement can be inserted by the Targeted Content computing system 110 , by other computing systems 120 , or by an optional media device 142 such as a set-top box, DVR, cable box, streaming media player, etc.).
  • the targeted advertisement is presented on the User Devices 160 (e.g., provided by the Targeted Content computing system 110 for reproduction at the User Devices 160 ).
  • the User Devices 160 can reproduce the same targeted advertisement or different advertisements.
  • the User Devices 160 can reproduce targeted advertisements alone (e.g., while the Device 140 is reproducing a Generic Advertisement) as well as in combination with the Device (e.g., while the Device 140 is reproducing the same or a different targeted advertisement).
  • the Arki ⁇ sTM Content feed being broadcast may automatically fail over to any Alternate Devices (e.g., smartphones) that are synchronized with the First Device.
  • Alternate Devices e.g., smartphones
  • Such connectivity loss may be detected in many ways including: explicit designation by the User on their Alternate Device, the failure of the First Device to respond to a ping-like request in a reasonable time period, or the loss of ability for the Alternate Device to see the First Device such as on a local Wi-Fi network.
  • the Arki ⁇ sTM Content servers may automatically begin recording the Content being consumed for subsequent resumption at the point of disconnect. In the case of failover to an Alternate Device, the servers back up/record the Content so as to resume on the Alternate Device at the point that contact was lost with the First Device even though it may take several seconds for the failover to be negotiated.
  • each Device maintains communication with the Arki ⁇ sTM cloud servers through a heartbeat mechanism whereby at periodic regular intervals (e.g. once per second) each Device notifies the cloud servers what Content is being presented to the Consumers on the Device.
  • a heartbeat mechanism whereby at periodic regular intervals (e.g. once per second) each Device notifies the cloud servers what Content is being presented to the Consumers on the Device.
  • the example system 100 supports targeted advertising in a group setting.
  • the Users of the User Devices 160 can be grouped into a static or dynamic shared advertising group (e.g., based on various criteria, such as Physical Proximity, Virtual Proximity, explicit grouping by the Users, grouping based on receiving the same Content on the Device 140 , or based upon the group's values, ethics, goals, standards, stated Consumer Assertions, etc.).
  • Targeted advertising can be provided to the shared advertising group (i.e. SyncGroup).
  • Profile information can be used by the Targeted Content computing system 110 to select targeted advertisements (e.g., based on the Profiles, payout information, and/or other criteria) to be presented to the Users (e.g., on the User Devices 160 and/or overlaid on the Device 140 ).
  • Profile information can include information about a User voluntarily uploaded by the same User for targeting purposes, it can also include User authorized aggregation of information collected from disparate sources, and it can omit information deleted by a User.
  • a group may indicate intent to only ever purchase certified organic food, or non-GMO food. Such a Profile may prevent such a group from receiving fast-food advertisements or the like. Nor would a fast-food advertiser likely desire to push its advertising to such a group. Thus, both Consumer and Marketer benefit and the system gains increased economic efficiencies.
  • the example system 100 can determine the specific Content being watched by the Users in order to provided targeted advertisements at appropriate times (e.g., during generic advertisements).
  • the Targeted Content computing system 110 can use Context Information to determine the specific Content being received by the Users of the User Devices 160 .
  • the Context Information can include various types of information, such as information provided by the Users of the User Devices 160 (e.g., the Users can enter the specific program, channel, time, and/or other information about the Content), location information (e.g., location of the user devices 160 ), Profile information, information from the media device 142 , information from other computing systems 120 (e.g., programming and commercial information provided by a streaming service), and/or other types of information.
  • Custom DVR hardware may allow the Arki ⁇ sTM User to seamlessly consume Targeted Marketing or Alternate Premium Content that is interleaved into live broadcast streams (e.g. television or radio) to overlay the generic advertising that such streams contain.
  • the Arki ⁇ sTM User may log into their Arki ⁇ sTM Profile on the DVR and the Arki ⁇ sTM server may then provide Targeted Content feeds that are queued up while the User is consuming Premium Content.
  • the DVR may seamlessly switch to the Targeted Marketing Content.
  • either Targeted Marketing Content may be automatically selected or the User may be given a menu of subjects and how much they would pay, and how well other Users have rated them.
  • the User may be allowed to choose the Content they would like to consume.
  • a reference certificate or symbol may be shown to further permit a User to quickly evaluate the rating of a Product or Products to match their interests and values.
  • a potential provider of Targeted Marketing Content may either decrease or increase the likelihood of sending information to a Consumer via the use of an integrity rating tied or linked to the Consumer which indicate the relationship between the Consumer's stated purchasing intentions (i.e. Assertions) and timelines and their actual purchasing conduct.
  • the Marketing Content may be automatically packed to fit into the projected commercial space of the live feed. Based on a User's Profile preferences, the live feed may be queued up when it returns from commercial break until the current Targeted Marketing Content advertisement completes.
  • the buffer on the live feed may actively be managed to drive it back towards a zero second delay compared to the live feed.
  • Arki ⁇ sTM may provide a custom hardware DVR that accepts broadcast, cable, or satellite feeds and dynamically detects commercial breaks on the fly to substitute previously downloaded Targeted Marketing Content that is queued up on the DVR.
  • cable providers may provide an interface box in the User's home or business to access DVR capability.
  • cloud based DVRs may be housed and maintained in data centers maintained by the cable company and accessed on demand over the Internet.
  • FIG. 2 provides a flow diagram to illustrate operation of certain embodiments.
  • Arki ⁇ sTM 201 Servers include functional modules a User Profile 202 includes preferences and rules regarding the User such as certification preferences. Further details for the User Profile 202 are provided in connection with FIG. 12 .
  • a source for Content such as described in further detail in connection with FIG. 15 is shown at 204 .
  • the Content 206 includes meta-data regarding the Content and the source of the Content.
  • a Content Producer and Content Provider are shown generally in connection with Content 206 .
  • the Content Producer and Content Provider may be the same or different entities. As set forth in the definitions in Section 2—Key Terms the Content Producer creates the Content and the Content Provider delivers the Content.
  • the Content Producer and/or Content Provider and/or a third entity receives input from the content selector 208 and payment module 216 . These inputs are shown generally for purposes of illustrating the general flow of information and the exact manner in which the inputs are processed may take a variety of forms.
  • Content selector 208 operates to select Content for delivery to the User shown at 210 .
  • the content selector 208 receives portions of the User Profile 202 and other information regarding the present context 212 of the User.
  • Present context 212 may include the User's recent communication history culled from their caller ID log, Skyping, texting, etc. and the identity of communicating parties and the nature of those parties' typical interaction for the present context as captured in their Profile and the vocabulary, tone of voice, etc. in the communication (e.g., Sally's mood usually improves after communicating with her mom, for example, they shared a joke with each other and laughing could be detected in the communication.)
  • Content might also be filtered out at one time based on context, but not at another time, in a different context.
  • Rating manager 214 generates an integrity rating that indicates a correlation between the User's actual purchase of goods and services and the intention indicated in that Assertion by the User. The rating manager compares the integrity rating to an integrity rating requirement that may be provided by the Content Provider. Further details of the operation of rating manager 214 are provided in Section 11—Providing Feedback on Content, Goods, and Services. Payment module 216 computes credits and debits that are indicative of payments to be made to the User for consuming advertising. The payment module is responsive to the meta-data associated with the Content 206 . Further details of payment module 216 are provided in Section 12 Providing Payment for Content, Goods, and Services.
  • the Content selector 208 receives Content 206 and retrieves from the User Profile consumption preferences that indicate goods and services that the User prefers.
  • the Content selector 208 performs a comparison between the retrieved consumption preferences and meta-data associated with the Content 206 .
  • the comparison yields a match level indicator that indicates a correlation (which may take a variety of known forms) between the Content and the consumption preferences.
  • the match level indicator is then employed to determine whether to provide the Content to the User. For example, the User may have provided in their preference a threshold that must be exceeded by the match level indicator in order to be provided the Content. Alternatively, the User may choose to be presented with all Content, or Content that exceeds the threshold and be permitted to decide whether to experience the Content.
  • the presentation to the User of the match level indicator (or Visualization) may be performed in accordance with the embodiments shown in FIGS. 17 a , 17 b , and 29 .
  • FIG. 4 illustrates the generation of an actualize bid offered by a Marketer for use by Content selector 208 to select Content 206 .
  • the Marketer 402 supplies a bid 404 (that may include a payout formula) in connection with Content 406 .
  • a deliver bid module 420 receives the bid 404 , the Content 406 , along with context 412 , and user profile information 414 , together with the marketing performance score 410 .
  • the deliver bid module 420 operates in accordance with a variety of known techniques to determine whether to deliver (yes 426 ) the bid 404 or to not deliver ( 422 ) it (no 424 ).
  • the function is evaluated as part of the deliver bid module 420 together with one or more variable inputs ( 406 , 410 , 412 , 414 ) to compute an actual bid amount to be offered.
  • variable inputs 406 , 410 , 412 , 414
  • the actualize bid offered 430 is delivered to content selector 208 . Additional details of marketing performance score 410 may be found in Section 6—User Profiles.
  • the actualize bid offered 430 is compared by content selector 210 to criteria pertaining to the User to determine if the Content 206 is to be delivered to the User.
  • FIG. 3 is a flowchart of an exemplary method 300 for providing Targeted Content to a group of Users.
  • the example method 300 can be performed by one or more computing devices (e.g., by the Targeted Content computing system 110 described above in relation to FIG. 1 ).
  • a plurality of Users is grouped into a shared advertising group (SyncGroup) and can be affected through use of a temporary or permanent grouping variable.
  • the plurality of Users e.g., along with their associated computing devices, such as smartphones
  • one or more Targeted Content are determined for presentation (e.g., audio and/or video playback) to the shared advertising group.
  • the one or more Targeted Content can be presented on a First Device (e.g., a television on a home or business setting) and/or on personal Alternate Devices (e.g., on displays of the computing devices, such as smartphones, of the Users in the shared advertising group).
  • a First Device e.g., a television on a home or business setting
  • personal Alternate Devices e.g., on displays of the computing devices, such as smartphones, of the Users in the shared advertising group.
  • the one or more Targeted Content can be determined based, at least in part, on Profiles or only voluntarily supplied or only authorized information in Profiles of the Users in the shared advertising group which may be selected to maximize payout amount for one or more of the Users, selected based on a minimum payout amount across all Users of the group, or selected based on other criteria such as Physical Proximity using GPS or similar data where the User may have given permission to use such criteria for the purpose of receiving Targeted Content.
  • the one or more Targeted Content are provided for presentation to the shared advertising group.
  • the Targeted Content can be presented (i.e. reproduced) on a First Device and/or on personal computing Devices (e.g., smartphone displays).
  • the Targeted Content can be presented on a Device instead of generic advertisements (e.g., in place of generic television commercials that are not targeted to the shared advertising group).
  • the most basic alternative Content is substitution of the generic mass-market advertising with that which is targeted specifically to the Consumer based upon their Arki ⁇ sTM Profile. Given the estimated amount of time available before the live broadcast feed returns, Arki ⁇ sTM may optimize the selection of targeted advertising to fit in the available time duration. In the case that the specific duration to be filled is not exactly known, the server may heuristically pack the space with the targeted commercials. Longer commercials or ones that may not be interrupted due to advertiser requirements may be packed at the beginning of an indeterminate commercial segment break while shorter ones or those for which a partial message may effectively be delivered may be packed towards the end. As each message draws towards an end, the follow on messages may be repacked to account for any new information that affects the time of the break's end.
  • the Arki ⁇ sTM system may allow a User to configure their Profile to allow the targeted advertising to overrun the commercial break by a short period and automatically pause the live feed when it returns and await the completion of the targeted advertising overrun before resuming the now slightly delayed live feed. Any such overrun is subtracted out of the following commercial break.
  • the User's mobile device may automatically send the remote control codes to pause the live feed when it returns, and resume play and unmute it when the targeted advertisement completes on their mobile device. This is most useful when their First Device is not playing an integrated Arki ⁇ sTM feed.
  • the producer of a targeted advertisement may encode reentry points (i.e., rewind points) for their message that a Consumer must return to when a targeted advertisement is interrupted (e.g., due to return to live play or a Consumer's override action) and subsequently resumed to satisfy the originally promised consuming payout.
  • rewind points may be stored within Arki ⁇ sTM servers, or may be recognized by software as an advertisement is played.
  • the beginning of an advertisement is used for reentry when resuming an interrupted message. (Note that some message payouts are context dependent and thus if resumed at a later point in time, the beneficial context may be diminished or gone and the payout computation may have consequently changed.
  • the User may request or the Marketer and/or producer may require deferral of resumption until the same or similar circumstances have returned or disadvantageous circumstances have disappeared.
  • reentry points are supplied, by default, upon resumption of a targeted message, the first reentry point that directly precedes the point of interruption may be generally used and the message may resume play from that entry point.
  • the User may choose to ignore the reentry point and instead resume at the exact point at which they left off at the risk of sacrificing some of the payout as configured by the Marketer that is supplying the message. Selection of how to resume may automatically be configured in the User's Profile or specifically chosen in an instance.
  • Consumer override actions include: simply stopping a message and doing something else, pausing a message briefly before returning to it, and even common DVR actions such as variable fast-forward/rewind, and skip forward/backward.
  • the Content Producer may encode more complex reentry point information, for example, specifying different reentry points that vary as a function of how long the Consumer has been away (e.g., how much time has elapsed since the message was originally interrupted) or vary depending upon the User's Profile information (such as their integrity rating as to their actual behavior versus their Assertions over time) which may predict the Consumer's likelihood of effecting a purchase or vary depending upon what other Content the Consumer has consumed such as other messages from the same Marketer.
  • an individual's Arki ⁇ sTM Profile may weight other factors such as the level of humor in a commercial, or the category the commercial falls into. They may also combine criteria (e.g., give me a funny commercial that pays the most). Their Profile may also indicate when and how they wish to consume commercials. Additionally, a Consumer may have a pattern related to their most likely time or day or seasons of purchases, and/or for what items are more likely to be purchased and when. This data may be added to their Profile and criteria that a Provider may use to affect what Targeted Marketing Content they send or push and the amount they may offer to pay or charge for consuming such Content.
  • Greg's Profile stored in the Arki ⁇ sTM cloud servers, shows that he is willing to watch ads during football games placed only at time-outs and during half time. Further, he requires that only one ad may be served per break period and that it should be no longer than 30 seconds unless the advertiser is willing to pay quadruple or more than his average payout rate over the last seven days as computed by the Arki ⁇ sTM cloud servers. If the ads are insufficient to cover the broadcast Content cost, he wishes to take the remainder due out of his Arki ⁇ sTM Profile earnings balance, or if his balance is insufficient, to accept just enough more advertisements to keep his balance positive at all times.
  • Providers may adjust their Targeted Marketing Content and payouts because Greg's rating indicates that he will be watching a game regularly and tends to purchase items that are being advertised to him during a game. Thus, his integrity rating can be related to the Content Greg consumes and to his purchases.
  • Celebrities e.g. LeBron James or Miley Cyrus
  • Arki ⁇ sTM Profile settings may indicate that if they are a spokesperson for a commercial that you will want to consume it regardless of other criteria in your Profile. Because you love a particular sports figure, artist, singer, or other person you know, you may agree to watch messages that would otherwise not meet your Profile criteria.
  • an Arki ⁇ sTM User's Alternate Device usually a mobile Device, is synchronized with the First Device, they may receive Targeted Content on their Alternate Device to substitute for or overlay on top of the Generic Content (i.e., not targeted) delivered through their Content Provider.
  • their Alternate Device may be configured to automatically subdue or mute the First Device using remote control technology during consumption of the alternate stream on their Alternate Device.
  • the broadcaster has a cooperative deal with Arki ⁇ sTM so that they transmit commercial intention information as it becomes available, of when a break to commercial will begin, and when it will end.
  • the broadcaster may provide live Alternate Premium Content (e.g. additional behind the scenes interviews or commentary and game analysis) that is coordinated with the generic live broadcast.
  • live Alternate Premium Content e.g. additional behind the scenes interviews or commentary and game analysis
  • Such feeds may also be delivered on a User's Alternate Device.
  • Such feeds may also be auxiliary and continue in parallel with the broadcast Generic Content and afford the User simultaneous alternate feeds on the live action.
  • the Arki ⁇ sTM Alternate Device application may download substitute Targeted Marketing or Alternate Premium Content. Downloading may occur in advance, during the Primary Content's non-commercial portions, and/or during the breaks themselves. Given that the non-commercial portion of a typical broadcast program is typically much longer than the commercial sequences (approximately 2.75 times as long), Targeted Content may be downloaded in less than real time.
  • Targeted Content may be shown in high-definition even if the User's Alternate Device connection does not have enough band-width to support real-time high-definition downloads; assuming the above premium to advertising content ratio, overlaid Targeted Content may be shown at a quality level that exceeds the User's real-time bandwidth limitation by a factor of almost 4. If an Arki ⁇ sTM User configures their consuming to not completely fill the commercial time with Targeted Content, this ratio grows even higher and allows for even higher quality Content (e.g., higher resolution video). For example, a User may leave during the commercial break to use a bathroom and get a snack to eat.
  • higher resolution video e.g., higher resolution video
  • the Alternate Device application may turn on the interface, for example the screen (stackoverflow.com/questions/9569529/android-face-detector-using-android-camera) through the remote-control behavior described previously, and await User attention to begin the targeted ad's playback. If their Alternate Device does not support that, it may await a touch of the play button on the Alternate Device's interface.
  • Targeted Content selection is described.
  • John is a junior at Northeastern University and has gone to the local sports bar to watch his home team of the San Francisco 49ers play the New England Patriots.
  • He has logged into Arki ⁇ sTM using his smartphone and his smartphone has automatically detected that he is watching football by listening to the room and detecting the audio feed of the game in a Shazam-like or IntoNow-like manner and/or John pointing his smartphone camera at the screen to detect the game by matching the screenshot or video feed to match the video analogously to how audio is matched.
  • the application determines from his Wi-Fi, GPS and/or microphone that he is also in a noisy location (a sports bar) and that his Bluetooth headset is not turned on and/or paired; therefore, during game play, his phone downloads from the sports bar's wireless Ethernet connection the substitute targeted advertisements that he will watch during the next commercial break.
  • the targeted ads are selected for John by Arki ⁇ sTM based upon his Profile and to best fit his contextual location of a noisy bar, being ones that do not depend upon the audio portion to best deliver their message. While the television is showing a Coke commercial, John sees a Pepsi® commercial on his phone that features references to his favorite team, the San Francisco 49ers.
  • the disclosed system allows for an individual to provide simple targeted advertising that may require little effort to produce (e.g., a simple video, web page, or email message). Such may be the case for selling a used item or their unique artwork.
  • a used item or their unique artwork.
  • This simple marketing message could be targeted to individuals at the seller's choosing.
  • Their query criteria might include those who live near the seller, have bought used cars from a private seller in the past, have sufficient income to afford the car, have indicated they are in the market for a Mercedes® class of car, and have a track record of performing that exceeds 85%. They may decide they are willing to pay $2 for such viewers. They may choose alternate criteria along with alternate payouts; they may also allow anyone to view the ad for free.
  • the targeted advertisements can be presented to the shared advertising group (at 330 ) at the same time as generic advertisements (e.g., inserted on a shared First Device in place of the generic advertisements and/or presented on personal computing devices of the Users).
  • generic advertisements e.g., inserted on a shared First Device in place of the generic advertisements and/or presented on personal computing devices of the Users.
  • the specific Content being watched by the Users of the shared advertising group can be determined.
  • the specific Content being watched e.g., on a shared First Device
  • Context Information e.g., Context Information
  • the Context Information can include location information for the Users in the group, time and date information, audio information from the Content being watched, video information from the Content being watched, Profile information associated with the Users of the group, explicit selection of Content (e.g., program name, channel, network, time, etc.) by one or more of the Users, and/or other types of Context Information.
  • the Users of the shared advertising group can provide Feedback regarding the targeted advertisements. For example, Feedback may be used to adjust payout amount that the Users will receive.
  • Feedback can be received from one or more of the Users of the shared advertising group independently (e.g., via each User's computing device).
  • Feedback can also be received from Users jointly (e.g., a number of the Users can agree on joint Feedback).
  • one or more Users of a shared advertising group can opt-out of a particular targeted advertisement being provided to the group. For example, if a specific User does not wish to view a particular targeted advertisement, then the specific User can opt-out of viewing the particular targeted advertisement. For example, the specific User who opts-out can be presented with a different targeted advertisement (e.g., an individually targeted advertisement) than the targeted advertisement being presented to the remainder of the shared advertising group.
  • the different targeted advertisement that is presented to the specific User who opts-out can be selected, for example, based on priority information (e.g., the highest payout advertisement that fits in the duration of the targeted advertisement being presented to the remainder of the group). Or, a different targeted advertisement may be employed in response to a User's values, ethics or standards.
  • targeted advertisements are selected based, at least in part, on duration (e.g., to fit within the duration of a generic advertisement). Selection of targeted advertisements can also take into account time needed for Feedback (e.g., a time period, such as 15 seconds, can be saved for Feedback). For example, if a generic advertisement is 1 minute in duration, then a targeted advertisement can be selected that is 45 seconds in duration with 15 seconds remaining for User Feedback. Feedback can be provided after the targeted advertisement (e.g., immediately following the targeted advertisement) and/or Feedback can be provided at a later time (e.g., after the User is finished consuming Content).
  • duration e.g., to fit within the duration of a generic advertisement.
  • Selection of targeted advertisements can also take into account time needed for Feedback (e.g., a time period, such as 15 seconds, can be saved for Feedback). For example, if a generic advertisement is 1 minute in duration, then a targeted advertisement can be selected that is 45 seconds in duration with 15 seconds remaining for User Feedback. Feedback can be provided after the targeted advertisement (e
  • FIG. 5 is a flowchart of an exemplary method 500 for participating in a shared content advertising group comprising a plurality of Users.
  • the example method 500 can be performed by one or more computing devices (e.g., by the user devices 160 described above in relation to FIG. 1 ).
  • a computing device e.g., a mobile computing device associated with a User, such as a mobile phone or tablet device
  • the shared advertising group comprises a plurality of Users (including the User of the computing device) and their associated computing devices.
  • the computing device can be associated with the shared advertising group based on various criteria, such as sharing the same general physical location, sharing the same content at the same time, explicit association by the User of the Device, etc.
  • the computing device provides Context Information associated with Content being consumed by the User.
  • the Context Information can be received from the User (e.g., entered via a user interface of the computing device).
  • the Context Information can include location information of the computing device and/or other devices in the group, time and date information, audio information from the Content being watched, video information from the Content being watched, Profile information associated with the User and/or other Users in the group, explicit selection of Content (e.g., program name, channel, network, time, etc.) by the User and/or other Users in the group, and/or other types of Context Information).
  • one or more targeted advertisements are reproduced by the computing device.
  • the one or more advertisements are selected for presentation to the shared advertising group based, at least in part, on Profile information of the Users of the group.
  • the targeted advertisements can be reproduced on the computing device at the same time as generic advertisements are reproduced on a shared First Device (e.g., a shared television being watched by the Users of the shared advertising group).
  • Feedback is received from the User regarding one or more of the reproduced targeted advertisements.
  • the Feedback can be used, at least in part, to determine payout amount that the User will receive.
  • Feedback can be provided via the user's computing device.
  • Feedback can also be provided using another device (e.g., on a First Device, on an Alternate Device, etc.).
  • Payout amount can vary depending on User Profile information (e.g., demographic information) of one or more Users. Payout amount can be provided as a range, which can depend on Feedback (e.g., the payout amount can be more if the User agrees to provide Feedback) or some other type of indication that the User has received the Content. Or payout amount can be adjusted based upon a User's integrity rating, measuring the relationship between the User's stated intended needs and activities (i.e. Assertions), and the User's actual implementation of same in actual practice over time.
  • User Profile information e.g., demographic information
  • Payout amount can be provided as a range, which can depend on Feedback (e.g., the payout amount can be more if the User agrees to provide Feedback) or some other type of indication that the User has received the Content.
  • payout amount can be adjusted based upon a User's integrity rating, measuring the relationship between the User's stated intended needs and activities (i.e. Assertions), and the User's actual implementation of same in actual practice over time
  • FIG. 6 is a flowchart of an exemplary method 600 for providing targeted advertising to a group of Users including a Champion.
  • the example method 600 can be performed by one or more computing devices (e.g., by the Targeted Content computing system 110 described above in relation to FIG. 1 ).
  • a plurality of Users is grouped into a shared advertising group.
  • the plurality of Users e.g., along with their associated computing devices, such as smartphones
  • the advertising system can then detect that the Champion is available (e.g., is part of the shared advertising group) and ask if the Champion is willing to promote the Product and/or service (e.g., by providing a payout offer that the Champion will receive).
  • one or more targeted advertisements are determined for presentation (e.g., audio and/or video playback) to the shared advertising group.
  • the one or more targeted advertisements are determined based, at least in part, on the Champion. For example, an advertisement for a Product and/or service that is listed in the Profile of the Champion can be selected.
  • the one or more targeted advertisements can be presented on a First Device (e.g., a television on a home or business setting) and/or on personal Devices (e.g., on displays of the computing devices, such as smartphones, of the Users in the shared advertising group).
  • the one or more targeted advertisements can be also determined based, at least in part, on Profiles of the Users in the shared advertising group (e.g., selected to maximize payout amount for one or more of the Users, selected based on a minimum payout amount across all Users of the group, or selected based on other criteria).
  • Profiles of the Users in the shared advertising group e.g., selected to maximize payout amount for one or more of the Users, selected based on a minimum payout amount across all Users of the group, or selected based on other criteria.
  • the one or more targeted advertisements are provided for presentation to the shared advertising group with a corresponding presentation by the Champion.
  • the targeted advertisements and Champion presentation can be presented on a First Device and/or on personal computing Devices (e.g., smartphones).
  • the targeted advertisements and Champion presentation also can be presented on a Device instead of generic advertisements (e.g., in place of generic television commercials that are not targeted to the shared advertising group).
  • a business could create their own Targeted Marketing Content for prospective clients and when in a public situation, such as taking the prospective clients out to a sports bar, the company's salesperson could sponsor their own advertising to serve as Targeted Content for delivery to the screens near their prospective clients to further reinforce the message the salesperson has given them during the day of a sales pitch.
  • the Content could be personally tailored for the particular clients they are entertaining and refer specifically to them.
  • the sponsor could get an alert on their phone right before their message is going to be sent so they are sure not to miss it. It could also be a simple message, for example, a brief message that states “This quarter is brought to you with premium content and commercial free by Hank!” and shows his profile picture or a quick video blurb instead of any commercials to allow for extra Premium Content.
  • the following example usage scenario describes how personally directed public advertising may be implemented through the Arki ⁇ sTM system.
  • George and Frank are in Atlanta trying to make a sale of their time tracking software to improve employee productivity.
  • George allocated a budget of up to $100 to fund inserting their company's ads into the targeted advertising stream around them while they wine and dine their prospective clients in the evening.
  • George set it up using his Arki ⁇ sTM app so that shared Device ads will only air if both he and Frank are together in front of a First Device and so that they will each get a notification on their smartphone 15 seconds before each time their ads will be presented. The first opportunity arises while they are waiting for a table in the restaurant in its bar area.
  • each of the urinals has silent video advertising messages. Their company's message is cycled into the selection of messages being displayed on these screens for another $2 while they are in the restaurant. After dinner, they take their prospective clients to their corporate skybox to see the basketball game. For $40 they buy all the Targeted Marketing Content to cover the entire time they are in their private skybox and may be viewing either of the two screens in their room. George configured the targeted advertisements using his smartphone app so that in each commercial break, a sixty second spot for their company is to be shown with the rest of the time filled in with behind the scenes Premium Content for the game.
  • the radio plays a selection of tunes streamed from their connected smartphones that are commercial free and match the interests of the clients in each respective car for a total charge of another $2.
  • the total cost for advertising during the evening was $87, an Arki ⁇ sTM way to mix business with pleasure.
  • the Arki ⁇ sTM system facilitates the fortuitous location of brick and mortar stores that have Products of interest to a User.
  • Stores may be fortuitously located in the present moment for a User by monitoring their location as provided by GPS, Wi-Fi triangulation, mobile cell tower proximity, or the like.
  • a User's affirmation of their future plans including calendar entries, navigation requests, or explicit Arki ⁇ sTM Assertions (e.g. I'm going to drive down to my mom's on next Monday) may also be used to facilitate the fortuitous location of brick and mortar stores whose proximity is predicted to occur in the future.
  • a prediction of their near future path based upon the vector of their current travel may be used to locate candidate stores whose proximity is predicted to occur in the future.
  • a User may receive a recommendation to travel to a location outside their normal typical daily range when the confluence of several buying opportunities combines to make such a special trip desirable.
  • a User's Profile may include Assertions of Products they are considering buying and Arki ⁇ sTM may alert them when they are in the vicinity of a store offering a particular Product they are interested in.
  • a User's Profile may record either an exact Product or a general Product they desire.
  • An exact Product may be identified by many means including its UPC code, Stock Keeping Unit (SKU) for a particular store, manufacturer and description, manufacturer and model, website URL description page, or internal Arki ⁇ sTM identifier.
  • General Product interest may be identified by associated keywords and/or categories of products.
  • Brick and mortar stores may integrate with the Arki ⁇ sTM platform to publish information for the Products they have in stock that may include, pricing, location within particular stores, quantity in stock, related Products, or competing Products.
  • Store integration with the Arki ⁇ sTM system may include Product keyword and/or category associations for Products they carry.
  • brick and mortar store information may be augmented, extended, corrected, or built from crowdsourcing and/or computed from Arki ⁇ sTM member purchase histories.
  • FIG. 7 illustrates by way of a flow diagram how the examples in the prior two paragraphs may be implemented.
  • the Arki ⁇ sTM servers ( 710 ) receive information from the User Profile database ( 720 ) and Goods & Services Provider Profile database ( 730 ).
  • the User mobile Device ( 740 ) adds information ( 745 ) to the User Profile database ( 720 ) including current location information and selected choices ( 780 ).
  • the Arki ⁇ sTM servers identify matches for the User ( 750 ) based upon in part upon their User Profile database ( 720 ) such as their current location and current time and the Goods & Services Provider Profile database ( 730 ) such as store locations, Products, prices, shelf information, services, hours, and interests.
  • the Arki ⁇ sTM servers may send detailed suggestions ( 790 ) including shelf locations within a store to the User's mobile Device ( 740 ) and the User ( 750 ) may be alerted and offered choices ( 770 ) to select ( 780 ), where selected choices are sent to the User Profile database ( 720 ) and accessed by the Arki ⁇ sTM servers ( 710 ) to provide further suggestions ( 790 ) including an optimal path to traverse to User Mobile Device ( 740 ) that then directs ( 760 ) the User ( 750 ), in the prioritized efficient order as suggested ( 790 ) to one or more particular locations in one or more stores where one or more selected ( 780 ) items of interest may be found.
  • the guidance may direct the User to the exact location within the store where the particular product may be located including directions to the correct aisle and shelf.
  • the final guidance may be fine-tuned by a User's mobile device detecting the RFID tags of the Product.
  • This guidance may also apply to shopping lists such as for a grocery store that are stored in their Profile.
  • the Arki ⁇ sTM system may know what a User wants to buy at the store by the User making Assertions and by the Arki ⁇ sTM system detecting the frequency at which various Products are purchased and proactively suggesting further items to add to such a shopping list.
  • the Arki ⁇ sTM system may recommend the configuration that is the most cost-efficient after taking into consideration any shelf life limitations of the Product and the rate at which the User typically consumes the Product.
  • Such computations may satisfy a confidence factor from a User's Profile such that the probability of the optimum size determination being correct exceeds the confidence level. For example, a 90% confidence level would mean that for the recommended purchase size, 90% of the time, that purchase size will be the least expensive choice in the long run after future predictions on pricing and consumption rates become actual.
  • the Arki ⁇ sTM system may direct the User through the store using a traveling salesman problem (TSP) solution/heuristic from computational complexity theory to provide a short path or the shortest path to get all the items they need/desire in a store.
  • TSP traveling salesman problem
  • the traveling purchaser problem may be applied to select the least expensive method to procure all items on a shopping list from a plurality of possible stores where costs may include travel expenses and time.
  • the purchase price of the traveling purchaser problem may be replaced by a formula for an adjusted purchase price that accounts for the value a User places on their travel time and/or the actual travel costs in addition to the actual purchase price, further the adjusted price may be computed to account for an assigned value that reflects the perceived/judged costs of negative externalities.
  • a User may place a high value on the environment and thus may ascribe a monetary cost to the carbon footprint of competing Products and also upon the footprint to travel to the Product's location to acquire it.
  • a Certifier see Section 11—Providing Feedback on Content, Goods, and Services
  • the User trusts such as an NGO providing an assessment of, for example, the carbon footprint of a Product.
  • a User may provide their own formula for computing an adjusted price that includes as input the various metrics of Independent Reviewer Certification for Products in the Arki ⁇ sTM system.
  • Such formulas may weigh the various factors that are inputs differently according to their relative assessed importance.
  • Such formulas may require as input information from a User's Profile, information from an Independent Reviewer Certification, and/or information about a Product, merchant, or store.
  • Such computations are too complex and time consuming for one or more humans to carry out, even more so considering their need to be computed nearly instantly to have any real value to the User, and thus require the automation of one or more computational devices, which when using this method enables each individual User to more effectively compare competing Products along dimensions of interest to themselves than a simple comparison of just price and/or features of a Product or service.
  • Such non-conventional computations are far from routine activities and not previously known in the full form explained herein.
  • the Arki ⁇ sTM system may communicate with a store's smart shelf technologies whereby a shelf or product packaging may include computer devices and the ability to display information or provide auditory prompts or other sensory output (e.g. emit a scent or vibrate).
  • a shelf or product packaging may include computer devices and the ability to display information or provide auditory prompts or other sensory output (e.g. emit a scent or vibrate).
  • auditory prompts or other sensory output e.g. emit a scent or vibrate.
  • LED indicators along a shelf to attract attention or indicate a customized and or time limited level of discount, or highlight Product features of interest to you, like non-GMO ingredients.
  • Another example is a reusable packaging enclosure that lights up to bring attention to it. These features may be activated through the use of Near Field Communication (NFC), Wi-Fi, or GPS, for example.
  • NFC Near Field Communication
  • Wi-Fi Wireless Fidelity
  • free samples might be dispersed conditionally based upon Profiles that are good candidates for a Product.
  • a vending machine may only supply free samples to identified selected shoppers whose Profiles in general or whose ratings within their Profiles satisfy Marketer requirements.
  • Selected Users' smartphones may offer Users the Products and allow Users to accept or reject the one or more offers. If accepted, their smartphones may communicate with the vending machine dispenser to cause the matching accepted Products to be dispensed. Communication may be by sending Infrared (IR) codes, Near Field Communication (NFC), displaying a QR code that is read by the vending machine, submitting a response back to Arki ⁇ sTM cloud servers for network dissemination back to the vending machine, etc.
  • IR Infrared
  • NFC Near Field Communication
  • a human worker may dispense freshly created samples when either alerted to do so by a mobile device that may present a photo of the recipient, light up green when a matching User's smartphone is waved, or when a designated recipient produces a distinctly recognizable supplied photo on their smartphone.
  • the store's shelves may communicate with the Arki ⁇ sTM system to coordinate with Users such that the shelves respond to Users as they traverse the store and help them locate Products of interest to them such as those being on their shopping list.
  • individually addressable LEDs may line store shelves where such LEDs are activated by the Arki ⁇ sTM system when a User is nearby a Product for which they are searching/interested in order to draw attention to its exact location.
  • the lights may be turned on and off in patterns to create the appearance of a focal point for the Product's exact location.
  • the map of a store's inventory may be provided directly by a store or it may be grown organically/crowdsourced by Arki ⁇ sTM Users contributing the information incrementally as they find and buy Products at a store.
  • Users may grow the database of items, prices, configurations, and their locations within a store by scanning the UPC of items (or other identifying features such as QR code) as they place them in their basket and thus providing the location of the item within the store and optionally its price.
  • the Users that benefit from the foregoing data being collected may compensate the Users within the Arki ⁇ sTM system that provide the data.
  • the Users that provide the data may also have their integrity rating in a given area improved. Users may be presented with the last known price of an item and offered the ability to correct it if the price has changed.
  • the average location of all Users scanning an item may be combined to give a good fine-tuned approximation of an item's location in a store. If Users start reporting a completely new location, the item must have been moved to a new location in the store or is now available in more than one location in a store.
  • the history of an item's location as provided by all the contributing Users might weight recent logging of its location more heavily when directing a User to its location in a store.
  • Users may also log the absence of a Product at its predicted location to further refine the database information and accuracy. Users may also contribute pricing information to the system and help other Users decide where to buy an item if they are going to visit several stores.
  • the following example usage scenario shows how the shopping assistant feature may be implemented.
  • Maria recently discovered she is gluten intolerant and puts this information on her Arki ⁇ sTM Profile so that she will be targeted with advertisements of gluten-free Products.
  • She drives to her local supermarket to buy groceries for the week every Tuesday at 6 PM.
  • her smartphone's GPS confirms that she is heading towards the supermarket at 5:50 PM, so Arki ⁇ sTM offers her an audio advertisement for a new brand of gluten-free bagels available at the supermarket, which will pay for the cost of her commercial-free satellite radio station.
  • Her audible “Wow!” is picked up by her smartphone's microphone and informs the Arki ⁇ sTM system that she had a positive reaction to the advertisement.
  • the Arki ⁇ sTM system may allow a User to specify a set of stores they are going to shop at in a day and Arki ⁇ sTM may direct the User to optimize their purchases by directing them to only those items that are least expensive at a given store and deferring the other items to a later store where they cost less.
  • the Arki ⁇ sTM system may also suggest new stores to consider adding or replacing to a User's current shopping stores based upon pricing information being better optimized with the new suggested store.
  • Suggested stores may be based in part upon the route a User is planning to take or the route that Arki ⁇ sTM may recommend to minimize distance, travel time, parking costs, walking distances, and or other expense during the day as they shop at multiple stores so as to minimize the time and expense required for the suggested added stop.
  • the User's Profile may include a numeric dollar attribution at which they value their time (e.g. $20 per hour) and such an attribution may be incorporated into their suggested shopping plan such that any time saved or extra time required at that rate would have to be offset by an even greater cost savings in the Products they buy to produce a shopping plan that looks at the big picture of savings vs. time.
  • Arki ⁇ sTM may allow for targeted product placement within Premium Content. For example, at present during baseball games, there is already a green-screen billboard being used behind the batter. During live broadcast, the Content Provider digitally overlays Content on the billboard, typically changing the message each half-inning. However, with Arki ⁇ s, this content may now be targeted specifically to the viewer. This may be done by the broadcaster providing the Arki ⁇ sTM servers a feed where the green-screen has not been substituted and Arki ⁇ sTM may arrange, internally or through a third party depending on the embodiment, for Targeted Content to replace the green-screen before delivering to the end viewer.
  • the static live action product placement of today can also be supplanted dynamically with targeted product placement.
  • Today, Premium Content sells static product placement in movies and television shows.
  • Florida's Natural® may place their carton of orange juice in a show where, during a scene, a character takes the carton out of the refrigerator and pours a glass.
  • this substitution can be deferred and dynamic Rather than using an actual fixed product placement, the actor uses a green-screen version in the shape of the Product to be substituted.
  • an unlabeled carton of juice, a can of soda, or a tube of toothpaste may be used.
  • the green-screen version of the Product contains keying locations to help the computer recognize the 3-dimensional orientation of the Product.
  • the product orientation is then computed during production and editing and the video feed encodes sufficient information for a dynamic product placement during final playback.
  • the audio portion can even likewise be synchronized to provide an audio component of the product placement by having the actors record the words for the various placement choices desired or by having a computer construct the alternate words based upon samples of the actor's voice.
  • Arki ⁇ sTM implementing dynamic product placement is described: Heather is watching The Newsroom on HBO as streamed to her by the Arki ⁇ sTM cloud servers and in one scene, Jeff Daniels takes a carton of juice out of the refrigerator and pours himself a glass and leaves the carton on the counter. Because Heather's Profile shows that she prefers grapefruit juice over orange juice, the Arki ⁇ sTM cloud servers provide a feed in which her targeted product placement chooses grapefruit juice over orange, further, based upon her Profile, Tropicana® is chosen over Florida's Natural®. In the dialog, Jeff Daniels offers his friend a glass of grapefruit juice instead of offering orange juice as it was originally recorded by the cloud server software splicing in the alternate dialog in Heather's streaming feed. Further, the green-screen colored carton he holds during filming is substituted with the Tropicana® version of grapefruit juice in Heather's feed. To Heather, it appears that the original scene was filmed specifically for her targeted product placement selection.
  • Alternate Content is also available by way of product placement in video and/or audio only games. Alternate Content may be inserted into, depending on the embodiment: computer games, mobile (smartphone, tablet) games, console-accessed video games, etc.
  • a User may optionally consume a Targeted Marketing Content commercial to buy an in-game advantage.
  • a Targeted Marketing Content commercial to buy an in-game advantage.
  • a video game could be optimized based upon the nutritional density of in-game food based upon its real world value. In this way, nutritious branded foods could be placed in the game and have in-game value proportional to their real world nutritional value.
  • the targeted product placement in the game is based upon the User's Arki ⁇ sTM Profile characteristics. By linking a User's Arki ⁇ sTM Profile with their online gaming accounts (e.g. Xbox Live®, PlayStation® Network Account, Club Nintendo® Account, etc.) targeted advertisements and product placement in games may closely reflect a User's gaming persona.
  • Joey is nine years old and has recently become interested in skateboarding. His parents have configured Joey's Arki ⁇ sTM Profile to require in varying degrees that all Content include things that encourage him to think and act in ways that enhances his moral, physical, and mental abilities. So his parents have configured his Profile online to require that all advertising include an educational component that is approved by one of the third party non-governmental organizations they designate. JumpSport® has recently come out with a safer skateboard design for children and has an approved educational advertisement to target Joey's professed interest in buying his first skateboard. JumpSport's® targeted ad wins placement by satisfying his Profile requirements and bidding highest and pays Joey $0.25 to play and complete it.
  • the advertisement is an interactive video game that requires Joey to complete a series of multiplication problems that are tailored to his individual educational needs as determined by his linked standardized test results or certain approved online math educational programs that are linked to his Arki ⁇ sTM Profile.
  • Completed problems allow Joey to virtually build and configure his proposed new skateboard to gather the parts and then assemble them followed by his selecting and virtually donning his safety gear. Only once his skateboard is fully assembled and he is wearing all the safety gear is he able to ride the virtual skateboard and unlock a video tutorial that teaches him his first skateboarding trick. Because Joey completes the multiplication problems quickly and correctly, he is also awarded with a coupon for free shipping on a new JumpSport® skateboard.
  • Joey's parents have sweetened the deal by agreeing to contribute their own Arki ⁇ sTM credits to increase Joey's advertising credit by $5 for each education advertisement Joey completes that demonstrates his improvement.
  • Joey's performance on the JumpSport® advertisement demonstrated improvement in his multiplication skills and thus earned him the $5 bonus supplied by his parents through the Arki ⁇ sTM system, sufficiently raising his Arki ⁇ sTM User Profile balance so that he can now afford the skateboard with his own money.
  • Joey places the order online using JumpSport's® Arki ⁇ sTM enabled website. The website notifies the Arki ⁇ sTM servers of the order and awaits final authorization for the payment.
  • the Arki ⁇ sTM servers route the order to Joey's parents for final approval along with a targeted advertisement that explains the safety advantages of their Product to his parents. Once his parents approve the order, JumpSport® is notified that the funds are now available. JumpSport® ships the skateboard and requests disbursement from the Arki ⁇ sTM servers.
  • Joey's parents may also have Content pushed to their son that reflects their ethics, beliefs and/or values. For example, positive phrases that reflect their values or beliefs may be embedded in or adjacent to the advertisements that Joey sees related to his interest area. Thus, Joey may also see a positive statement before or after the advertisement that displays a value the parent wants Joey to reflect upon or see. For example, a statement saying, “Courage is not the absence of fear, but doing your best in spite of your fear.” Other value statements, biblical quotes, or the like can be included in the material consumed by their children, so that parents can transmit their values to their children even when they are not present with them.
  • Users may add a plug-in to their browser that automatically replaces Internet ads with more highly targeted Arki ⁇ sTM ads. This may be done similarly to how the Adblock Plus or AdBlock plug-ins block advertising on web pages displayed in a browser—for example, by intercepting requests from the browser to particular domains, hiding advertisements based on CSS formatting, hiding page elements which fit the dimensions of standard web advertisements, or hiding page elements whose source domain is recognized to be for advertising (e.g. doubleclick.net). However, instead of blocking, the ads are substituted with Arki ⁇ sTM ads based upon the User's Profile and the layout position and dimensions of each ad being replaced.
  • the page layout may be dynamically reconfigured to allow Arki ⁇ sTM to substitute more highly targeted ads. This may be accomplished by marking areas of a page (e.g. page position of top left/bottom right corner, width and height of area) where advertisements may be displayed, and overlaying ads within these areas that may not be the same size as the originally displayed advertisement(s). The User may be paid for display of ads and/or for clicking on ads. Additionally, a portion of the ad revenue may be shared with the website whose ads are being replaced.
  • One possible method of revenue sharing is by having the Arki ⁇ sTM plug-in detect websites that are Arki ⁇ s-enabled (e.g.
  • an identifier or token may be uniquely supplied to participating websites with each new website being visited receiving a new unique identifier.
  • an identifier or token may be reused across multiple websites or sessions for a set time period such as ten minutes and upon expiration a new identifier supplied for subsequent sites being visited or even within an active session at a site that spans the expiration, a replacement identifier or token may be supplied in the middle of a User's visit to a web site.
  • Users sharing a display and browsing together may form a SyncGroup and receive ads for the group and may have a shared identifier or token that represents the group's identity. Additionally, Users may combine into a SyncGroup so that even when they are independently browsing, they may receive ads targeted to their SyncGroup and may have the same or different identifiers but which are all associated by Arki ⁇ sTM with the identity of their SyncGroup.
  • Content Producers may not initially choose to cooperate with Arki ⁇ s, but advertisements can be served in a separate window while still sharing a portion of revenues with them. Such ads would be selected while still knowing the content of the page being viewed so that such history is taken into the User's Profile and ads are more contextually based.
  • the following example usage scenario describes an embodiment of the system utilizing online advertising.
  • Doug installs the Arki ⁇ sTM plug-in into his Chrome browser and, using the plug-in, logs into the Arki ⁇ sTM servers and receives a set of 256 bit identifiers (or any other size appropriate for hashing security) that each uniquely and or anonymously identify himself as a particular Arki ⁇ sTM member or classification/type of member to participating websites.
  • He goes to Amazon®, an Arki ⁇ sTM participant, and the plug-in provides one of these identifiers.
  • the identifier may be supplied by adding it to the URL his browser navigates to at Amazon®.
  • This may include Amazon® supplying a database or directory of Products and advertisements and the corresponding desired target demographics of the customers they are trying to attract for each of those Products and advertisements that may be matched and selected by Arki ⁇ sTM for Amazon® for the User.
  • This allows Amazon® to customize the web pages including any suggestions they wish to make to the Arki ⁇ sTM
  • User Amazon® servers build their web page for Doug utilizing the information supplied and or facilitated by Arki ⁇ sTM and serve up their page, customized for Doug, but without Amazon® learning of Doug's actual identity or his demographic information. If Doug clicks on any of the sponsored links, the Arki ⁇ s servers will automatically credit Doug and Amazon® a portion of the proceeds.
  • Substitution works by determining the window location and size of each ad to be blocked and individually querying the Arki ⁇ sTM servers for Doug's targeted ads that may adhere and fit in the available real estate, creating an overlaid web page that contains the core Content from eBay® but with all ads being replaced by Doug's targeted advertising from Arki ⁇ s.
  • Arki ⁇ sTM automatically shares a portion of the ad revenues with both Doug and eBay®. (Sites may fall along a spectrum of varying levels integration, beginning with the most basic level of just accepting payments from Arki ⁇ s, continuing onto accepting ad substitution, and finally offering complete seamless site integration.
  • any cookies related to his unique Arki ⁇ sTM identifiers may be automatically purged and deleted from his computer by the Arki ⁇ sTM browser plug-in.
  • Arki ⁇ sTM Through the functionality granted by the Arki ⁇ sTM system, Users may control the direct mail advertising they receive from participating Marketers who may use detailed criteria to precisely select recipients who are receptive to their messages.
  • Such mail may contain custom QR codes that recipients may scan with their phone to get paid for reviewing the mail piece and possibly lead to follow up ads on their smartphone.
  • the mail may contain a unique piece number and Arki ⁇ sTM telephone number the recipient may call and enter their piece's number to get paid for reviewing the mail and possibly lead to follow up audio ads over their phone.
  • a User's caller id and voiceprint may be used to authenticate and confirm their identity in a preferred embodiment.
  • Users may avoid receiving duplicate copies of direct mail that is addressed to different people at the same address by requesting such in their Profiles to receive shared mail that may contain individual QR codes or unique piece numbers for each intended recipient in a household.
  • recipients may send Feedback on received mail through their Arki ⁇ sTM Profile via a Device for additional payouts including Feedback that the advertisement was poorly targeted and not of interest to them.
  • Arki ⁇ sTM may partner with delivery services to allow advertisers to supply unaddressed bulk mailings to a shipper who addresses each mailing as selected out of the Arki ⁇ sTM databases, thus insulating recipients from divulging their identity to advertisers.
  • Users may control the newspapers, magazines, and other periodicals they receive from participating publishers. Control may include advertising Content (or lack thereof) and Premium Content to customize a periodical to better match the specific interests of a reader. Users could pay publishers for Content directly or share revenues they receive from targeted advertising in the periodicals. Advertisers may be aware of the contextual Content within which they would be placed in selecting their target audience. By linking their wearable computing devices with their Arki ⁇ sTM Profile, Users may use wearable computing devices such as Google® Glasses to track consumption of Content and only pay for what they actually read. Alternatively, representative samples from the population may be used (representatives may be compensated to facilitate sampling) to track typical consumption patterns and apply them as norms for matching groups from the general population.
  • Users may choose to compose their own custom periodicals and associated targeted advertising that pull Content from multiple sources into a single customized printed or electronic periodical that they control through their Arki ⁇ sTM Profile.
  • Users may request Content selection be prioritized by Content highly rated by other Users with similar Arki ⁇ sTM Profiles in the Content's interest area.
  • Companies like The Wall Street Journal may wish to encourage potential readers to subscribe through Arki ⁇ sTM because more highly targeted advertisements and Content generate higher revenues and thus they may, for example, offer potential subscribers three months of free access in return for receiving their subscription integrated with Arki ⁇ s.
  • Users may pay for and select Content based upon its value to them and they may be asked to rate or grade the Content on a sliding scale along metrics such as quality of writing, value, and interestingness.
  • the User Before reading an article, the User may be presented (via a Device) with a sliding cost the article may cost along with a predicted likely cost based upon their predicted rating. The article cost would then be finalized based upon how much of the article the User consumed together with how highly the User rated the article and optionally together with the ratings of everyone else or only like-minded others as determined by their Profiles.
  • Placard advertisements in public places may contain generic QR codes that a User may scan with their location-aware, Arki ⁇ sTM enabled smartphone to confirm receipt, get paid, and possibly receive follow up advertising with additional payouts.
  • Users may take a picture of the entire advertisement and submit the picture for pattern recognition and identification to confirm receipt together with smartphone location information.
  • these advertisements may contain a unique advertisement number and telephone number that they may call and enter the advertisement's number to get paid for reviewing it and possibly lead to follow up paid audio advertisements over their phone.
  • their phone's caller ID number may be used to identify them, or alternatively, they may enter their unique User ID.
  • a User's voiceprint may be used to further confirm their identity.
  • These public advertisements may indicate a minimum payout recipients will receive for confirming viewing.
  • a User While traveling, a User may automatically be credited for billboards they pass by their location-aware smartphone in return for allowing Arki ⁇ sTM to provide the advertiser some of their demographic information, possibly anonymously. This information may also include a timestamp of when the advertisement was passed. The User may be credited by matching their location found though GPS, Wi-Fi triangulation, mobile cell tower proximity, or other means to a billboard location database, after confirming the direction a User is facing on the road. In an alternate embodiment, a User's direction may be inferred (and possibly still confirmed) by analyzing the direction of the vector of their travel with the presumption that they are facing forward in their vehicle unless otherwise specified in the User's Profile.
  • Users may automatically be queried as to whether they wish to provide Feedback on the billboard at the time of passing or at a later time if they are a driver.
  • the billboard may adapt to the automatic SyncGroup of Users currently in range to view the billboard to optimize for the current group of potential viewers. This optimization may, in some embodiments, partition a billboard screen up into multiple advertisements that divide up the screen to allow individual optimization for different subsets of the passing population and may entail independent switching of advertisements for different subsets at different times. Subsets may even target down to the individual and offer Champion messages featuring their friends.
  • Arki ⁇ sTM may direct Users, such as through their smartphone, to the display region corresponding to the advertisement that most closely targets their interest.
  • the advertisements may be color-coded, such as with a colored outline that your smartphone directs you to locate.
  • your smartphone may alert you to pay attention, such as by emitting an audible alarm. This direction may indicate contextual cues such as look for red, look for the puppy, or look for their friend (a Champion) to direct the User to the appropriate advertisement.
  • a User may be offered targeted advertisements on their Arki ⁇ sTM radio feed for follow up audio messages to reinforce the billboard or at a later time they may get a reinforcing television, Internet advertisement, or subsequent dynamic billboard advertisement.
  • Badges can be awarded (as an added entry/record as part of a User's Profile) for accomplishments: for example, an “iBadge” that is earned upon buying an iPhone®, iPad®, and MacBook Air®. Users may configure in their Profile the visibility of their digital Badges, causing some to be invisible to others or only visible to a select set of friends.
  • Badges can be earned based upon Content consumed, such as a Game of Thrones Badge for watching every episode of season 1.
  • Badges may be awarded along competitive metrics such as the amount of advertising a User has consumed, amount of Feedback provided to advertisers, or amount of Feedback provided on items purchased.
  • Arki ⁇ sTM There may be a scoring system managed by the Arki ⁇ sTM cloud servers based upon accomplishments recorded in User Profiles such as purchases made and a leaderboard view into the Arki ⁇ sTM databases may show which Users are doing the best within a group of Users or globally.
  • Badges may include the date they were earned as part of a database entry. Other Badges could reflect values and social responsibility, such as Arki ⁇ sTM tracking your carbon footprint based upon your activities and awarding Badges for improvement or being below a level.
  • Users may compete with their friends to get a green score, for example to have the lowest carbon footprint for the month.
  • Other values could also be tracked and Badges awarded such as, for example, a Badge or competition for eating well or buying goods that are socially responsible in their manufacture.
  • Another Badge area could be for Arki ⁇ sTM participation such as a Badge for providing Feedback on some number of commercials, reaching a certain trust level, maintaining an active Profile for a certain number of years, or providing some number of reviews.
  • Earned Badges may include payout bonuses that may be agreed upon by advertisers and included in their payout formulas, for example, a User that uses a complete suite of Products within a month may earn a 5% bonus payout on all advertisements related to that suite of Products.
  • one Badge may possess multiple rankings as to behavior, integrity (honesty as to stated intent, Assertions, and actual behavior), as well as other valuations.
  • Such a single emblem could be a wheel with various quadrants showing standing in multiple areas of User behavior and values.
  • the quadrants of the wheel can show the top ten or twenty areas of User activity or importance in a pie chart based on other criteria or values.
  • Other polygonal and/or color-coded visuals may be created to reflect User information and/or standing. If a person is colorblind, emblems or Badges can be modified to depict Badge rankings by other means that allow for differentiation by the colorblind person.
  • Another kind of Badge is the right to have distinctive notifications which, depending on the embodiment, may be one or more of: auditory, visual, and or tactile (e.g. vibration) on your computing devices that are only available to Users currently satisfying the Badge's criteria. This can be done to enable Users with physical and/or mental disabilities to receive information as well as a non-disabled User.
  • other Users near Users having earned such Badges or virtually interacting with such Users may receive Arki ⁇ sTM notifications on their computing devices certifying such Badges and notifying them with audio, visual, or vibration alerts.
  • a User may earn a low carbon footprint for the month and thus be allowed to use a distinctive ringtone that others may recognize as meaning you have earned this Badge and which goes away in subsequent months if you do not maintain the Badge's criteria.
  • Such audio alerts may be combined with smartphone screen alerts that identify the Badge associated with the audio alert and teach others its meaning.
  • other Users may hear a distinctive ringtone when you call their phone or get a vibration alert on their smartwatch when you are near them if they have configured their Profiles to allow their Devices to receive such information.
  • a User may authorize the sharing of aspects of their Profile so that other Users may receive this data on their digital devices (e.g. Google® Glasses when looking at them or a representation of them such as their printed name or photograph.)
  • Users may be awarded Profile Badges or emblems, coupons, or bonus payouts for being confirmed to have received every one in a series of related ads.
  • An advertiser could have an ad campaign that consists of ten different ads placed throughout a subway system and when a User is confirmed to have viewed all ten ads, they receive one of these bonus awards. For example, after viewing all five ads for five new summer Starbucks iced coffee flavors, a User may receive a coupon for one free cup of iced coffee as well as a Badge depicting a golden cup of coffee for possible display on their public User Profile as viewed by others.
  • the viewing of public placard advertisements to receive Profile Badges, coupons, and/or bonuses may be verified by one or more of the following: scanning a QR code located on the public placard via the User's smartphone, comparing a user-submitted picture of the public placard to the known image on the public placard, verifying the User's location through GPS or other location determining data and prompting the User to answer a question related to the public placard, image verification or QR code scanning through wearable technology such as Google® Glass, and the like.
  • Artists may perform in public (e.g. street performers) and receive payment through the Arki ⁇ sTM system by posting a QR code which passersby may scan, allowing Users to check in using GPS data, or the like and choose a contribution they wish to make to support the performances. Users may rate the performances and help like-minded Users to locate public performances that may be of interest to them. Performers may be graduates and may offer free samples. To facilitate the tracking of free samples, the Champion may receive an audible alert each time their QR code or the sample QR code is scanned or a User confirms receipt on their smartphone depending on the embodiment. The QR code may require the User's scanning smartphone is location-aware and in the vicinity of the Champion.
  • Arki ⁇ sTM may know the location of the performer due to the performer being a User who has registered as a performer with Arki ⁇ sTM and submitted their location to the Arki ⁇ sTM servers or enabled location tracking on their phone for the duration of the performance.
  • Users may get alerts because their smartphones are location-aware and in the performer's vicinity. These alerts may allow the User to acknowledge they are watching the performance and to easily make a contribution if they desire. Such alerts may also indicate when the performer is a Champion and/or when they are providing free samples. Alerts may also include a schedule of performance information.
  • Arki ⁇ sTM Another kind of advertising possible through the Arki ⁇ sTM system is a live pitch delivered one-on-one to a User over a telephone, videophone, Internet chat, text messages, in person, etc.
  • Such advertising may be coordinated by the Arki ⁇ sTM system to match up the live Content with Users selected by Arki ⁇ sTM for targeting.
  • a person or computer simulation of a person, in some embodiments contacts the User directly using audio and/or video or by physically meeting up with the User to provide direct Content.
  • Such contact is coordinated by the Arki ⁇ sTM system, including its being offered to a User and whether they accept such contact.
  • Content may be Marketing Content or Premium Content or a combination such as an advertisement that leads into Premium Content if the person accepts the offer being sold as the Premium Content.
  • the User's Profile may contain requirements to control the contact and Content, such as an outline or flow chart of how the interaction shall transpire. If the live Content violates a User's requirements the Provider may be required to compensate the User as a penalty for violating the requirements agreed to before contact was initiated.
  • Arki ⁇ sTM may serve as broker to connect the two parties in order that their identities may be kept anonymous, undesired follow up contact outside the Arki ⁇ sTM system is inhibited, and/or Arki ⁇ sTM systems may maintain accounting of the transaction.
  • Such brokering may take the form of Arki ⁇ sTM interposing itself between the parties where each party individually connects with the Arki ⁇ s system and Arki ⁇ s connects the parties together within the Arki ⁇ sTM system. For example, each party dials a telephone number for Arki ⁇ sTM and upon each party properly identifying themselves to Arki ⁇ s, their telephone calls are bridged or conferenced together.
  • Some Users may watch pirated Content and advertisers may be motivated to provide targeted advertising in and around such Content and to target Users that enjoy particular titles regardless of how the User comes to consume the Content.
  • the consumption of pirated materials may affect a User's integrity rating and the like at the exact same time targeted advertising is being successfully provided to that same User.
  • the Arki ⁇ sTM identification of Content such as by matching audio signatures applies equally well to pirated Content and thus allows Arki ⁇ sTM to detect when Content is being consumed, regardless of how it was acquired by the User.
  • targeted advertising revenue may be shared with Content Producers even in the case that their Content has been pirated.
  • Content Providers may wish to target those pirating their Content with offers to sell paraphernalia related to the Content.
  • targeted advertising can be provided in a combined system comprising one or more First Devices (e.g., one or more televisions being viewed by one or more people) and one or more personal computing devices (e.g., one or more individual smartphones or tablet devices).
  • First Devices e.g., one or more televisions being viewed by one or more people
  • personal computing devices e.g., one or more individual smartphones or tablet devices.
  • Targeted advertising can be provided in an individual or in a group environment.
  • advertisements can be targeted to a group of Users (e.g., based on Profile information of one or more members of the group).
  • Targeted advertising can also be provided in a system with just one or more First Devices, or with just one or more personal computing devices.
  • Content is to be interpreted as experiential information delivered to a User and may include interactions and/or artistic expression such as video, audio, still photos, words, comic strips, and live performances.
  • Content varies across a Content Spectrum that may range from high-value/Premium Content to low or negative value Content—like advertising that pays Consumers (i.e. a User or a SyncGroup of Users).
  • Content may be Targeted by selecting it based upon a Consumer's Profile information (e.g. an advertiser's search criteria matches information in a Consumer's Profile such as their demographics, stated interests, buying history, future intentions, etc.).
  • the Arki ⁇ sTM system provides mechanisms to overlay Targeted Content on top of minimally Targeted Content (i.e., Generic Content).
  • Digital Content ( 900 ) is Content that may be stored by digital means for subsequent reproduction on a Device ( 910 ) (e.g. a radio, television, or smartphone) on behalf of a Consumer ( 920 ).
  • An advertising overlay using a First Device such as a television, radio, and/or other Alternative Devices—such as a smartphone or wearable device, which provide targeted advertisements that may be received in place of general (non-targeted) advertisements by a Consumer.
  • a custom set-top box e.g. DVR
  • a streaming media service e.g. on-demand television
  • Advertisements may involve consumption of other sensory input (i.e., viewing, listening, feeling, tasting, and smelling).
  • advertisements are overlaid on a television.
  • a television For example, using both an Alternate Device (e.g., smartphone) and a First Device (e.g., television), targeted advertisements can be provided that are presented in place of general (non-targeted) advertisements. Overlaying can be performed, for example, via a custom set-top box (e.g., DVR), a cloud-based DVR, or a streaming media service (e.g., on-demand television). Targeted advertisements can be presented on the First Device and/or on the mobile device (e.g., the mobile device can be called the Alternate Device). There are embodiments for a Consumer (a User or a SyncGroup of Users). There are also embodiments without an Alternate Device (e.g., where only the mobile device(s) are utilized).
  • Users are grouped into a shared advertising group and can be grouped on the basis of contextual or User supplied information, rather than mined data. For example, a number of Users consuming the same Content can be grouped together (e.g., a number of Users viewing a football game on one or more televisions in a sports bar). Users can be grouped into a shared advertising group based, at least in part, on whether the Users participate in the same targeted advertising system and/or based on other criteria (e.g., Physical Proximity, Virtual Proximity, explicit grouping by the Users, etc.). Users can join or leave a shared advertising group (e.g., when a new User enters a location with an existing shared advertising group or when an existing User leaves the location).
  • a shared advertising group e.g., when a new User enters a location with an existing shared advertising group or when an existing User leaves the location.
  • Two or more shared advertising groups can merge, and a shared advertising group can split into multiple groups. Independent groups can also be created at the same location (e.g., for a sports bar with multiple televisions, those Users of the sports bar watching a particular television can be grouped together).
  • Users are paid for receiving targeted advertising.
  • Users can be paid an amount based on various criteria, such as User Profile information (e.g., demographic information, purchase history, and/or other Profile information), Feedback (e.g., whether the User confirms that the advertisement was consumed, answers to specific questions, and/or other types of Feedback), etc.
  • Feedback can also be used in determining future targeted advertisements to be presented to a User (e.g., to present a follow-up targeted advertisement to a User that expressed an interest in a particular Product or service during prior Feedback).
  • Ted and Mary have decided to buy a custom-made armoire from a local artisan to celebrate their fifth wedding anniversary.
  • Ted logs into his Arki ⁇ sTM Profile in the cloud and adds, to his shared marriage SyncGroup Profile, a listing indicating their intention to buy such an armoire on one of the next two weekends with a budget not to exceed $5,000.
  • Ted receives an email and Mary receives a text message confirming the addition to their shared SyncGroup Profile.
  • Mary reviews the text message and notices that Ted's listing in their shared SyncGroup Profile failed to include the fact that the furniture is to be crafted by a local artisan.
  • Mary responds by texting back to Arki ⁇ sTM the new listing with the word ‘local’ added to the description.
  • Arki ⁇ sTM receives the text and updates their listing to reflect her addition, sending a new alert to both Ted and Mary.
  • Ted indicated in his Profile that he is most receptive to ads when he is alone driving home from work.
  • Arki ⁇ sTM has detected a pattern in Ted's behavior indicating that he is most responsive to ads delivered on Thursday afternoons on his way home from work in San Francisco, after he has been on the highway for two minutes. Additionally, Arki ⁇ sTM has detected that Ted often travels with others on Wednesdays and Fridays due to his regular participation in SyncGroups with his carpool friends on those days. On Thursday, Ted is driving home and listening to his smartphone over his car's connected audio system.
  • the Arki ⁇ sTM app on his smartphone detects the Bluetooth or wired connection and surmises that Ted is in his car and communicates this to the Arki ⁇ sTM cloud servers to include this information in his Profile.
  • Ted is in his car
  • the Arki ⁇ sTM cloud servers After he gets onto the highway, detected by the GPS on his smartphone, either his phone preferences and/or his Arki ⁇ sTM cloud Profile preferences are matched against his current situation to detect an optimal time for message delivery.
  • Arki ⁇ sTM continues and checks to see that no other Arki ⁇ sTM registered smartphones are in continuous ongoing proximity to his location and turns on his smartphone's microphone to listen for any other voice prints that might be in the car.
  • Arki ⁇ sTM queries Ted audibly via his smartphone to see whether he is indeed alone and Ted confirms ‘yes’ which Arki ⁇ sTM receives by way of his smartphone's microphone. Arki ⁇ sTM knows that there are three local artisans that can meet Ted and Mary's requirements.
  • the first is Jim's Custom Furniture that offers to pay him $20 to listen and respond to their two-minute ad.
  • the second is Angela's Armoires that offers $30 to review and send Feedback on a three-minute television commercial.
  • the third is Phillip's Fine Furniture that offers $60 if Ted is willing to take a five-minute phone call within five minutes of receiving a one-minute audio commercial, or if the call is declined after listening it only offers $10.
  • Arki ⁇ sTM sends an alert to Phillip via text message, email, or phone call querying whether he will be available to take a call with Ted, if he agrees after listening to the commercial. Phillip acknowledges his availability.
  • Arki ⁇ sTM After being on the freeway for two minutes, Ted is told by Arki ⁇ sTM that Phillip's Fine Furniture is currently selected to present a one-minute commercial now if he would be available after the message for a short phone call with the owner who is standing by and available. Ted could counter the offer, but instead decides to agree to the proposed terms and the commercial begins and Phillip is notified that the call is imminent. 30 seconds into the commercial, Arki ⁇ sTM detects sudden deceleration in his smartphone's accelerometer due to Ted's accident avoidance braking together with a dramatically increased heart rate detected through his Arki ⁇ sTM enabled smartwatch or smartphone-linked FitBit-like device. As a result, Arki ⁇ sTM interrupts Phillip's advertisement because the advertising terms require attentive focus.
  • Arki ⁇ sTM then substitutes music known to be soothing to Ted. After Ted's detected heart rate lowers significantly and the car is traveling normally again, the music is faded and the advertisement is resumed by replaying from the last designated entry point before it was interrupted, in this case the beginning. This satisfies the agreed-upon payout structure that requires that the entire ad be listened to without interruption. While the ad is playing, Phillip's Arki ⁇ sTM app calls an Arki ⁇ sTM virtual conference room where he then waits for Ted. Alternatively, Phillip uses his Arki ⁇ sTM app on his smartphone to call Ted's phone.
  • Arki ⁇ sTM serves up the two-minute ad for Jim's Custom Furniture. Ted is interested by their use of sustainably harvested wood from a local source. At the end of the message, Ted is queried about his interest and he audibly indicates that the local sustainably harvested wood was the most appealing feature to him from their message. Arki ⁇ sTM sends Ted a message containing a link to a video where he can view examples of Jim's Custom Furniture that Jim has already selected to most closely match Ted and Mary's professed desires. The link includes notification that viewing the video within the next 2 hours will earn him another $5. During the rest of Ted's drive home, he listens to a podcast selected by Arki ⁇ sTM about the history of custom furniture craftsmanship in America.
  • Mary accepts and hears Jim's voice indicating his keen interest on having an armoire fashioned from local sustainably harvested wood.
  • Mary is concerned that local wood may not offer the range of grains and tones she was imagining.
  • Mary responds to Jim, and copies Ted, indicating that she was imagining an armoire made from cherry and walnut wood.
  • Mary asks if these can be locally sourced, or if not, if there is a comparable wood that could be substituted. That evening after watching the third Provider's video ad and reviewing the follow-up pictures and videos provided by the other two, after discussion Ted and Mary make their final choice of Phillip.
  • their credit card purchase data may already be collected by a website like Mint or Upromise and they have linked that website to their Arki ⁇ sTM Profile so that all data collected by the third party is automatically integrated into their Arki ⁇ sTM Profile in return for sharing a very small portion of their earnings or a fixed monthly fee debited from their earnings.
  • An Arki ⁇ sTM User may control one or more Master Profiles that are connected to their identity and help to delineate their individual identity. Profiles may be persistently stored in one or more computer databases (e.g. object oriented, relational, etc.) for manipulation, query, and retrieval into computer processing memory, such as in a cloud server computer. As seen in FIG. 10 , each Master Profile may contain one or more Sub Profiles of select information from the Master Profile of the User's choosing. Some Sub Profiles may be public facing. Public facing Profiles may represent how Users appear to others and contain the information a User specifically elects to share with others. In some embodiments, a User may remain anonymous from others by using a private Profile to anonymously receive Targeted Content from Marketers whose queries match their private Profile.
  • a private Profile to anonymously receive Targeted Content from Marketers whose queries match their private Profile.
  • Profiles may be a subset of a User's Master Profile, which in a preferred embodiment contains the maximum of their personal information available to be shared. Profiles may also be salted with false information to provide heightened User privacy. For example, whole fictitious Profiles unlinked to real Users may be created, and the use of this false profile information could trigger security alerts. In some additional embodiments, Profiles may be fictitiously created whereby one creates a separate persona for oneself, but payouts would be based upon the performance of that fictitious persona, for example, one could have a Second Life® persona which would be served ads that target that persona within the game. Fictitious Profiles may be created as either a completely new Master Profile that is unrelated and unconnected to any other Master Profile or as a Sub Profile that may override information from an existing Master Profile.
  • the minor children's Profiles may be configured to be accessible by proxy from one or more guardians' Individual User Profiles.
  • the User may select what portions of their Arki ⁇ sTM Master Profile are included in a given Sub Profile to control the privacy of their information.
  • the choices of what information to publish in their Profiles may change over time.
  • no one is allowed to attempt to correlate and connect together any of a User's public facing Profiles without permission; however, internal to Arki ⁇ s′® servers, consumption history of the User's own Content across all of a User's Sub Profiles may be utilized for the purpose of avoiding oversaturation of similar Content messages.
  • Arki ⁇ s' Content Users may be required to prove their identity for a Master Profile through various means such as by successfully answering LexisNexis® identity questions.
  • a User may be allowed to use the system without proving their identity, but in such cases, their rights and abilities may be limited for that Master Profile. For example, a User may not earn referral bonuses for the creation of other Master Profiles they referred if either the referrer or referral has not proved their identity. Additionally, a User may not be allowed to vote in the governance of Arki ⁇ sTM if their identity has not been proven. In a preferred embodiment, Business Users never vote in the governance of Arki ⁇ s.
  • a User may be given the option, for example through a check box on their Arki ⁇ sTM preferences page, to begin using their Master Profile without proving their identity but later decide to supply proof of their identity and thus gain the rights and privileges granted to fully identified Users starting at the point they prove their identity.
  • a Master Profile once a Master Profile is linked with a proven identity, all the other Master Profiles of that proven identity may be linked internally, however, the visibility of other linked Master Profiles may be hidden from Marketers. This allows the User some manner of privacy between their Profiles but might make recovery of their credentials to their unlinked Master Profiles more difficult depending upon the level of isolation. For example, providing the login account name of one Master Profile might allow recovery of the password from a linked Master Profile whose credentials are still retained.
  • An Arki ⁇ sTM User may elect to register their existing grocery loyalty cards and credit cards to allow their Master Profile to automatically reflect actual purchasing decisions (as is already the practice with sites such as eScrip.com and uPromise.com) as illustrated in FIG. 11 with Data collected by loyalty cards such as grocery purchases 1180 . Additionally, they may register their online accounts at merchants such as Amazon® (Amazon.com) and NewEgg (newegg.com) so that details of specific purchases may also be automatically included in their Master Profile. In some embodiments, social networking sites such as Facebook and LinkedIn may be integrated with your Arki ⁇ sTM Profile to help you get recommendations (e.g. Sam is a friend of your best friend Mary, Sam has received the highest integrity rating grade from Mary, and Sam is a Champion of a Product that you are interested in.)
  • Controls may include, but are not limited to, various biometrics such as face, voiceprint, and handprint recognition together with challenge questions they have configured to which generally only they know the correct answers, depending on the embodiment.
  • An Individual User's Arki ⁇ sTM Profile as depicted in FIG. 12 may include information such as the following examples:
  • a User may elect to work with third parties to help and ease population of their Profile, examples of which are shown in FIG. 13 and illustrated in FIG. 11 with data collected by 3 rd party data aggregators and/or websites on User's behalf 1160 .
  • a User may choose to work with a Provider such as Google® or Facebook® to have their mined demographic information automatically populated into their Profile. The User may review and edit such automatically gathered data to make corrections and fill in missing details is illustrated in FIG. 11 with data corrections/edits/deletions by User 1150 .
  • Google® may receive a portion of advertising revenue that was targeted based upon Profile information derived from Google®.
  • a User may also choose to partner with their credit card issuer to populate their spending history and provide third-party confirmation in return for sharing a portion of their revenues derived from such information as illustrated in FIG. 11 with data collected by credit card and banking transactions 1170 .
  • Each custom targeted streaming source for a Device may be associated with its owner's Profile.
  • this Profile is often the owner's family's SyncGroup Profile. Registering a shared Device eases deducing the audience due to the association with its owner's Profile, minimizing the chance that another adjacent User's settings will influence the Device's presented Content.
  • a Device's registration status may be stored within a database, allowing for simple identification of all Devices linked to a User.
  • numerous Users may register the same Device, either submitting a hierarchy of Users to determine whose settings override the settings of other Users linked to the Device or jointly agreeing on the Device's settings (through creating a SyncGroup for the Device, or submitting some form of mutual consent).
  • this further simplifies deducing the audience in a situation where multiple Users consume Content from a Device frequently.
  • the Consumer is generally assumed to remain static unless otherwise explicitly overridden (e.g., my daughter is using my tablet to view Content).
  • different heuristics can also be applied to detect alternate Users (e.g., other family members).
  • the Premium Content consumption patterns may suggest that someone other than the registered owner is using a personal Device. Facial recognition and gesture patterns can also be used to detect alternate Users.
  • an alternate User When an alternate User is suspected, they may be challenged to provide the owner's password if they claim to be the owner or may select from suggested alternates and enter their own password.
  • any of their personal Profile Filters or parentally assigned limitations may apply in addition to or instead of the owner's Filtered or parentally assigned Content limitations depending on the embodiment.
  • the owner of a source Device may place strictures upon what Content may be consumed on a Device registered in their Arki ⁇ sTM Profile. Any Filtering requirements may be honored regardless of whether the source Device owner is present.
  • Michele is the owner of a sports bar and has strong beliefs about the need to consume Products made in the USA and has configured her Profile so that no ads for non-USA made goods may ever be displayed on the screens in her sports bar that are linked to her Profile.
  • the Google® cloud servers stream Content to her configured screens
  • the Google® servers first query the Arki ⁇ sTM servers for approval based upon her Profile so that Google® may deliver Content that meets her requirements.
  • the only way to receive such Content that does not conform to Michele's requirements in her sports bar is on a different User's personal mobile Device brought into the bar.
  • minor children may be tagged with Filtering requirements to limit, modify and/or control the Content ( 1440 ) they are exposed to.
  • a child may be tagged by registering a Device ( 1420 ) generally present on the child and tracking the tagged Device's distance from other Family Friendly Devices ( 1428 ) such as a shared television and other Adult ( 1412 ) Family Friendly Devices ( 1422 ) such as a personal mobile device that are presenting Content ( 1440 ), as well as submitting the child's face, likeness, or voiceprint to secure Arki ⁇ sTM servers ( 1430 ) for automatic recognition and subsequent Filtering.
  • each of the linked Devices may be configured as family friendly engaged when the child ( 1410 ) is tagged as being located near any of the Devices ( 1422 , 1428 ).
  • Devices may be configured and/or locked down to be Family Friendly engaged, and when so configured, always adhere to the strictest parental control or parent/guardian-defined Content Filtering ( 1450 ) settings in any situation that is known to include children, in such configuration, Devices only reproduce authorized Family Friendly Content ( 1442 ) while Filtering ( 1450 ) out all unauthorized Other Content ( 1444 ).
  • such Filtering may include controlling what files, websites, audio, and video may be accessed with a Device.
  • an environment or location such as another family's household with more relaxed Filtering requirements or presently allowing ( 1452 ) unauthorized Other Content ( 1444 )
  • all Family Friendly Devices such as Adult ( 1414 , 1416 ) personal phones ( 1424 , 1426 ) and televisions ( 1429 ) may automatically honor the stricter Filtering requirements placed upon that child and only reproduce authorized Family Friendly Content ( 1442 ).
  • the foregoing more restrictive filtering may include locking down previously allowed ( 1452 ) downloaded Content on such Devices so that such Content cannot be accessed or reproduced during the minor child's presence.
  • An immediate audio, visual, or tactile alert may be sent by Arki ⁇ sTM servers ( 1430 ) to any or all Devices of profile-configured guardians/Adults ( 1412 ) if a child ever comes in contact with a Device that is not an engaged Family Friendly Device.
  • a parent may view a log of all the Marketing and Premium Content ( 1440 ) that has been served up to their child in the recent past, to monitor and be aware of what they are watching when out of their direct supervision.
  • a registered parent or guardian may request a certification through Arki ⁇ sTM that some or all Devices registered to a different family were engaged as family friendly during the duration of the minor child's stay.
  • data is sent to a database every time a User's or household's Family Friendly Content mode is engaged or disengaged on a Family Friendly Device to facilitate this certification.
  • a Device can be guaranteed to remain family friendly engaged for a set period and not allow relaxation of the control until the guaranteed time has elapsed. Advertisers may also place their own restrictions and refuse to advertise in situations where unauthorized children might see their messages.
  • Content Producers may agree to voluntarily label, classify, and/or tag the Content ( 1520 ) they produce along various metrics that may be used for Filtering ( 1550 ). Consumers ( 1560 ) do not receive ( 1570 ) Content ( 1520 ) that is Filtered ( 1550 ). Such designations may be attached to the work as a whole or on individual sections or pieces of a work (e.g. on specific dialog or text words or on subsections of a photo or video.) Producers that inappropriately label/tag their Content may be required to pay penalties and fund third-party certification during a probationary period.
  • Arki ⁇ sTM Consumers may choose Profile preferences ( 1540 ) for Filtering ( 1550 ) all Content supplied by Content Providers ( 1530 ) through third-party Independent Reviewer Certification (see Section 11—Providing Feedback on Content, Goods, and Services), which may audit such labeling, tagging, and or classifications in return for a portion of Targeted Marketing Content revenues related to the consumption of such Content in some embodiments.
  • Any User may flag Content as inappropriately labeled, tagged, or classified.
  • Producers found to repeatedly produce Content that is inappropriately labeled by a representative plurality or by a competent, certified review panel may be barred from participation and have all their Content treated as being inappropriate for all children whose Content is filtered.
  • a generic or specific child certificate may also be employed as a backup for new advertisers to self-govern whether they send a new advertisement (not yet vetted by others) to self-regulate what may be sent to that child.
  • Such certificates may also be utilized in the same manner for adults.
  • Other controls may be employed to prevent inadvertent exposure to material that a Consumer has stated is undesirable.
  • Arki ⁇ sTM When Content is delivered through Arki ⁇ sTM cloud servers, such as when viewing a personalized RokuTM channel, Content may be individually customized and automatically censored when delivered to such feeds to “bleep out” or substitute profanity or other Content matching a User's Filtering preferences, depending on the embodiment. In alternate embodiments, portions of videos or images to be Filtered may be overlaid with checkerboard pattern substitutions to obfuscate portions deemed inappropriate. Arki ⁇ sTM may be presented with a feed without any Filtering and perform transformations on it to automatically Filter and replace objectionable portions, as determined by a particular User's Profile, before forwarding the feed on to that User.
  • the original signal may contain tagging to aid automated Filtering and/or analysis may be applied to automatically block Content when tagging is absent or suspect.
  • a Content feed may be delayed by a few seconds so that the Arki ⁇ sTM servers can detect profanities and other inappropriate Content through audio and video recognition, then censor the inappropriate Content before showing it to a viewer.
  • Arki ⁇ sTM cloud servers detect this and immediately send an alert to both parents specifying the details of the violation, or in the case of a potential violation, giving them the ability to outbid such undesired messages before they can appear.
  • they Before going out to a restaurant, they also first confirm that the restaurant is a Family Friendly Location and thus adheres all its Devices to all child Profile Filtering requirements.
  • Juan and Clarita are married and have two girls, ages 13 and 15, and configure their Profile to only accept advertising that is labeled as Family Friendly Content by the independent Family Values Coalition (FVC) non-profit that has 12 million subscribers in the Arki ⁇ sTM network.
  • the FVC enlists the aid of volunteers like Juan and Clarita to review Content (including both premium and advertising) and use the Arki ⁇ sTM cloud servers, by way of for example their smartphone, to give it a letter grade of ‘A’, ‘B’, ‘C’, ‘D’, or ‘F’ to indicate how well the Content represents the “family values” they wish to bring to their family.
  • Juan and Clarita have designated that only Content achieving at least a ‘B’ on this scale is to be served to their family. They decide to watch “Castle” (a crime drama) but the software Filters out the latest episode that features a murder with a backdrop of sexually provocative dancers that is given a ‘C’ rating by FVC and instead they view an older episode rated with a ‘B’ that Arki ⁇ sTM knows they have not previously viewed. Because they have a well-established Profile in Arki ⁇ sTM and a household income of $90K, they only need to view two 30-second commercials to cover the cost of the hour-long “Castle” episode they are going to watch. They decide to watch these two commercials up front.
  • the system pauses briefly while all four are queried for Feedback on their smartphones with specific questions based upon their individual Profiles. Once all four have provided their Feedback on their smartphones, their Arki ⁇ sTM app forwards the Feedback to the Arki ⁇ sTM cloud servers, the servers are also providing the streaming Content and the playback on their television automatically resumes. After the “Castle” episode completes they are also asked on their smartphones to rate that episode on the Family Values scale. They also rate how well they enjoyed the programming and which aspects were the most appealing so that future Premium Content system recommendations from the Arki ⁇ sTM cloud servers can be more effective.
  • FIG. 16 is a Venn diagram that shows the various kinds of User Profiles ( 1600 ).
  • Business Users may have and control Business User Profiles ( 1620 ) for their business similarly to Individual User Profiles ( 1610 ).
  • An individual person e.g., an employee
  • they use an individual business Sub Profile that is owned and controlled by the individual.
  • a business has administrator (i.e. root) privileges over its individual Sub Profiles and can, for example, change the access level/rights or delete Sub Profiles if desired (e.g., due to an employee leaving the company).
  • Profiles Just as Individual Users have Profiles, other business Participants have Profiles such as Content Producer Profiles ( 1655 ), Content Provider Profiles ( 1650 ), Marketer Profiles ( 1640 ) and Goods & Services Provider Profiles ( 1630 ) have their own Business User Profiles ( 1620 ) in the preferred embodiment.
  • a Business' Arki ⁇ sTM Profile may include information such as the following:
  • Arki ⁇ sTM also has provisions to accommodate those Participants (i.e., Consumers, Reviewers, Marketers, Content Providers, Content Producers, and Goods & Services Providers) who may prefer complete anonymity for some interrelationships and thus wish to, for example, review, market, produce/provide Content, or buy/sell goods and services that are provided through Arki ⁇ sTM with cash or the like.
  • Participants may choose anonymous interactions by default and only explicitly select to reveal their identity, on an interaction-by-interaction basis.
  • a Participant may create a secret virtual identity Profile and bank account and privately fund it with traditional currencies (e.g. US dollars) and/or cryptocurrencies (e.g. Bitcoin).
  • this may be done in two ways, either by creating a separate anonymous Master Profile, or by creating a new anonymous Sub Profile in their already existing Master Profile. They then may use their anonymous Profile to purchase or sell goods that are, for example, paid out of or into their funded bank account and delivered to or picked up from a prearranged locker box.
  • Such mechanisms allow the Participants to have the anonymity of cash or cryptocurrency while still being a part of the reviewing, marketing, delivery or shipment of goods & services to and from a convenient location, such as their home.
  • the seller may be given a coded address label from Arki ⁇ sTM to anonymously address a package and ship it with a standard shipping service.
  • the seller may only know the cost to ship the package and perhaps its zone or general delivery area, but not its exact destination. This approach may also be applied to delivery to and from drop boxes.
  • the tracking software to ship the package may use a system analogous to Tor's onion routing Internet communication (see wikipedia.org/wiki/Onion_Routing) to hide the addresses of the sender and receiver, only in this case, even the sender and receiver do not know each other's address, it is only the Arki ⁇ sTM system that has this knowledge.
  • the Arki ⁇ sTM system may know the sender and receiver Profiles and may compute a circuit or route for the package's delivery. Arki ⁇ sTM may then provide the original delivery circuit information and pricing to the shipper in an encrypted or coded format. This may, for example, include attaching the package to a reusable individual token generating apparatus where the tokens are required to prove the package's identity and location in order to learn each next step in the circuit from sender to receiver. Alternatively, at each step of the circuit, the shipper may contact the Arki ⁇ sTM servers to retrieve the next step of the circuit after proving the location and identity of the package by providing, for example, a code number.
  • the Arki ⁇ sTM servers may no longer respond to requests for the next code number once a code number has already been processed. This may take effect immediately when the next code is provided or occur once the package has proceeded to some number of steps forward along the circuit or continuum of distribution.
  • the shipper may only know the general originating area and delivery area and compute its own circuit or route between these, and only contact Arki ⁇ sTM for final delivery instructions.
  • An anonymous buyer may receive a code from Arki ⁇ sTM that allows the bearer to retrieve the package without further identifying themselves.
  • Arki ⁇ sTM verifies the Eugene UPS location and scanner as valid together with the package code and provides a new code that is put on the package in place of the first code.
  • the new code directs UPS to send the package to Springfield, Oreg.
  • Arki ⁇ sTM provides the next package code and removes the original Eugene package code from its outward facing servers to hinder any reverse engineering to determine the package's ultimate sender or receiver.
  • the supplied next code directs UPS to now send the package to Portland, Oreg. At Portland, the Springfield code information is removed from the outward facing Arki ⁇ sTM interface and the next code is generated for the package to now be sent to Ontario, Calif. However, due to error, UPS misroutes the package to Dallas.
  • Arki ⁇ sTM adjusts the route in consultation with UPS to omit Ontario and instead go directly to Oakland, Calif. and generates a new 18-digit code to route the package to Oakland, Calif. while clearing the Portland code information.
  • the Ontario code is removed and a new code is generated to take the package to Sunnyvale, Calif.
  • the recipient gets a notification that their package has arrived at the designated UPS location and may be picked up using their retrieval code or they may release an address for delivery.
  • the final route information is expunged from the Arki ⁇ sTM outward-facing servers.
  • Anonymous Feedback may be provided for any interaction a Participant engages in or is connected to. When such Feedback is subsequently reviewed, it may be identified as anonymous.
  • a Participant Before initiating an interaction, a Participant may opt out of the right to provide Feedback or to have Feedback written about them. This election is divulged to the interacting parties.
  • a User may elect to temporarily select a contrived Profile that does not actually reflect their demographics, this may be for the purpose of seeing what would happen to their Targeted Content were aspects of their real Profile to change.
  • This mode is revealed to the Content Producers who may prohibit their Content from being consumed under hypothetical Profiles.
  • actual advertising payouts and Premium Content charges are still based upon your real Profile, although you may be able to see what the payout or charge would have been under the hypothetical Profile, were it to be actual.
  • This feature might be used is to see what it would feel like to be a multi-millionaire. From an earlier example, a Consumer interested in looking at yachts, but without the means or intention to purchase one, may explore the subject through such a hypothetical Profile. In such a manner, the Consumer's integrity rating of their Profile is undamaged or otherwise affected.
  • a User may also elect to enter a mode where they are represented by a fictitious Profile or avatar that represents a virtual persona that they take on in virtual worlds such as video games.
  • a User may enter this mode by selecting an option within their settings page that specifies that all activity will be attributed to their virtual persona Profile until the option is deselected. Such designation may occur on one Device but may apply to one or more other Devices.
  • such designation may be specified to automatically be activated or queried for confirmation when one or more conditions occur such as being in Proximity (Virtual or Physical) of one or more particular Users, based upon a calendar or time schedule, based upon an activity or purchase, based upon arrival or departure to or from a location, based upon a Device, based upon an application being entered, particular Content or genre of Content being consumed, etc.
  • Proximity Virtual or Physical
  • This allows the User to more fully engage in the role-playing of their persona and receive ads that target their virtual persona.
  • the User may earn payouts but the payouts are determined by the performance of their persona-specific Arki ⁇ sTM Profile.
  • a User may appreciate playing Second Life® and may create an Arki ⁇ sTM persona or avatar that represents their alternate identity in Second Life®. This allows them to receive in-game advertising that is targeted to their persona to purchase in-game goods for their persona.
  • a User may snapshot, borrow, or copy a Profile from a friend to help build a fictitious Profile. This may be done with their friend's permission.
  • fictitious Profiles may import or auto-fill data from other Profiles, and may prompt Users to manually input certain fields or approve their importation. Such Profiles may be useful for the purpose of selecting a birthday gift that is well suited for a friend. These Profiles may be further contrived or edited such as to adjust financial demographics to more closely align with any User. Users may also adjust preferences in order to limit such a Profile to overlaps between their own Profile and their friend's tastes and preferences.
  • overlaps between a User's Profile and their friend's Profile may be determined by analyzing shared interest keywords or similar browsing history data.
  • any similar, common, or shared demographic information may be emphasized.
  • Similar, shared, or common forward looking Assertions may also be emphasized. This may be useful for identifying a gift that would appeal to both themselves and their friend or to find a gift they can share together.
  • Such joint Profile generating techniques may be correspondingly applied to SyncGroup Profiles, for example, using a husband and wife's SyncGroup Profile to buy a wedding gift for their friends based upon their wedding SyncGroup Profile or alternatively for a couple to buy a birthday gift for a shared friend, or alternatively for an individual to buy a wedding present for a SyncGroup couple.
  • Such Profiles may be informed by what objects or activities feature most prominently in your life in order to help others effectively shop for you.
  • the following example shows how a User may create and utilize a fictitious Profile combining the interests of multiple Users.
  • Kevin is shopping for his friend Lisa, and the shopping website he visits links into Arki ⁇ s.
  • the browser app accepts Kevin's Assertion that he is shopping for Lisa and, honoring Lisa's permission settings, Kevin's shopping is guided and he may see Lisa's information including: her interests, her wish list, things she is looking for, proposed gift's correlation with other things she already owns, and Assertions of gifts she desires from Kevin.
  • the shopping site displays a score on each possible gift to rate Lisa's likely reception of the gift as determined by Arki ⁇ s.
  • Such grading may take into account emotional appeal, whether she needs it right now, whether it is on her wish list, its practicality, her likely emotional response, and coordination/match level with her wardrobe.
  • Kevin does not have full access to Lisa's actual Profile, but is limited to seeing what is necessary and according to Lisa's permission settings, e.g. it does not disclose what kind of toilet paper she uses, or show intimate details about her personal hygiene or hygienic purchases.
  • Such a search includes the price point Kevin is looking for and the prediction that Lisa will like it. Kevin may get ads targeting him based upon this purchase intent for Lisa; such ads may be ranked based upon the likelihood of Lisa liking the Product. While shopping for Lisa, Kevin may be targeted based upon other aspects of his Profile unrelated to his gift buying for Lisa.
  • Such ads may relate to purchasing for him or for gift buying for others he has asserted. While his focus may be upon buying for Lisa at a given point in time, he may fortuitously come across other opportunities that are particularly well suited for his current context and thus may warrant interrupting his search for Lisa with these other targeted ads. Such ads that deviate from his immediate goal may be clearly marked as detours that may be advantageous, allowing him to decide for himself whether he wants to take any such detours.
  • a t-shirt may contain a display (e.g. through use of LEDs/light-emitting diodes) that varies the Content shown based upon their interaction with other Arki ⁇ sTM Users in their vicinity to display their shared rankings and or interests related to their carbon footprint, charitable giving, music, professional activities, sports, achievements, awards, etc.
  • a computing device in the possession of those physically near them or virtually interacting with them.
  • a User may alter their Profile settings to automatically share information (or configure to query for approval) with other Users in physical or Virtual Proximity, or may actively share selected Profile facts with friends or Users in physical or Virtual Proximity at any moment, or may be prompted to approve sharing of information requested by those in physical or Virtual Proximity
  • a User may have different levels of such divulging of information about themselves. They may choose to manually increase the level over time.
  • Arki ⁇ sTM may automatically assess a User based upon their Profile information, such as their integrity rating, and choose the level of revealing of information based upon preselected Profile controls.
  • Arki ⁇ sTM may also choose to allow the Arki ⁇ sTM cloud to utilize their identity information and associate it with information collected by a computing device in the possession of those physically near them or virtually interacting with them in order to provide hints to help facilitate the identification of individual sources within such collected data. For example, Alice may be speaking to Bob and alerted by Arki ⁇ sTM (e.g.
  • Arki ⁇ sTM cloud servers may use Alice's Physical Proximity to Bob, as indicated by Alice's smartphone being in proximity to Bob's smartphone or by their being joined together in a SyncGroup, as a strong indicator to the identification algorithm used in the Arki ⁇ sTM cloud servers that one of the identified voices in Bob's smartphone audio stream is highly likely to be Alice.
  • a SyncGroup a strong indicator to the identification algorithm used in the Arki ⁇ sTM cloud servers that one of the identified voices in Bob's smartphone audio stream is highly likely to be Alice.
  • Bob takes a photograph with his smartphone while they are near each other there is a strong indicator to the identification algorithm in the Arki ⁇ sTM cloud servers that one of the faces and/or bodies identified in Bob's smartphone picture is highly likely to be Alice.
  • Arki ⁇ sTM members receive a Marketing Performance Score (which is analogous to a FICO® credit score and is a specific kind of integrity rating) that varies from one Product or service to another and is objectively based upon professed and demonstrated preferences, forward-looking Assertions (e.g. I'm getting married in March), past purchasing behavior, track record of fulfilling their own previous predictions, and other measurable behavior data in their Profile. If a Consumer lacks a track record with respect to fulfilling their own previous predictions in a given area then Arki ⁇ sTM instead deduces an average track record based upon similar Profiles.
  • a Marketing Performance Score which is analogous to a FICO® credit score and is a specific kind of integrity rating
  • a Profile may be considered to be similar by the use of marketing geodemographic segmentation, or in other embodiments, the use of multivariate statistical classification to discover whether Arki ⁇ sTM Profiles segment into different groups whose marketing performance scores are closely correlated. For example, statistical analysis may reveal that single, college educated women aged 25-30 are 82% likely to fulfill Assertions related to durable goods purchases with a time horizon of six months or less. Alternatively, when a Consumer lacks a track record in a new area, their score can be predicted by looking at their track record in other synergistic areas and finding like-minded Profiles of others in those areas that also have a track record in the new area and using these like-minded individuals to predict the Consumer's behavior in the new area.
  • Phoebe has a 95% rate of fulfilling her purchase predictions in consumer electronics and has recently made a bunch of predictions about purchasing household appliances for which she does not yet have any track record. Therefore, her Profile is matched against other Arki ⁇ sTM Profiles for individuals with similar demographics and who also have a similar rate of fulfilling their predictions in consumer electronics. These matching profiles are then used to predict her fulfillment rate in this new area of household appliances. The prediction weights the predictive factor from matching Profiles based upon how well those Profiles correspond to her own profile.
  • Arki ⁇ sTM allows Consumers to link their Profiles as illustrated in FIG. 11 (User's Profile 1100 ) with data aggregators such as credit card companies (data collected by credit card and banking transactions 1170 ) and merchants (data collected by merchants 1190 ). Members may also enlist an expert (or a parent may act as an expert for their child) to build and automate the continued expansion of their Profile in order to optimize their payouts in return for a small portion of the gain.
  • data aggregators such as credit card companies (data collected by credit card and banking transactions 1170 ) and merchants (data collected by merchants 1190 ).
  • Members may also enlist an expert (or a parent may act as an expert for their child) to build and automate the continued expansion of their Profile in order to optimize their payouts in return for a small portion of the gain.
  • a User may enable the access to their Profile by such an expert who may access their Profile using login credentials unique to that expert but with proxy access to the User's profile so that the expert may make changes to the Profile as if they were the User but creating an audit trail that identifies the source of such changes as being the expert.
  • These independent sources of information together with other information such as personal and professional references, help to increase the accuracy of their score, leading to greater payouts. For example, Jim's credit card purchase history helps validate his ability to buy a new BMW® sports car that was also recently purchased by his close friend, Andy, both of these facts support the accuracy of the high score he received for buying the BMW® in the next two months.
  • Arki ⁇ sTM may deduce which aspects of a User's Profile are not easily automatically built from collected data sources and occasionally prompt the User to fill in some of these details. For example, a large portion of a User's Profile may be automatically built from the details of their purchasing histories, but statistical analysis may show that purchase histories poorly correlates with a User's political preferences, therefore, a User may be asked to manually supply information about their political ideology such as illustrated in FIG. 11 data entered manually by User on web page 1120 , data entered manually by User on telephone call prompt tree 1130 , or data entered manually by User on mobile device app 1140 . Similarly, purchase history may not correlate with a person's eye color, and thus a User may be asked to supply the color of their eyes.
  • Arki ⁇ sTM This allows Arki ⁇ sTM to gather details of a User's Profile via periodic prompts over time to build up the Arki ⁇ sTM Profile with greater depth.
  • Such prompts may include simple questions with simple multiple-choice answers to allow easy responses from the User analogous to dating compatibility questions on OkCupid®.
  • subsequent questions may be adjusted to account for previous answers and follow on questions may drill down for more detail in areas of interest to advertisers based upon previously supplied answers (through use of, for example, filter or contingency questions) as demonstrated by those advertiser's search criteria and payout offers.
  • Arki ⁇ sTM may recognize patterns in such ad requests (for example, through association rule learning algorithms including the Frequent Pattern-growth (FP-growth) algorithm and the Apriori algorithm, which highlight relations between variables in large databases), and project the added ad payout value a User might receive by providing certain types of information. Arki ⁇ sTM may direct the User to supply those pieces of information for which the greatest value is estimated to be derived for them.
  • FP-growth Frequent Pattern-growth
  • Apriori algorithm which highlight relations between variables in large databases
  • Sam is presented with an opportunity to expand his Profile with information on the home he owns and told by Arki ⁇ sTM that by spending 15 minutes to fill out a survey about his home, he will likely increase his ad revenue by 20% over the next six months.
  • Sam agrees and during the survey he indicates that he last replaced his hot water heater five years ago with a 50-gallon gas fired water heater and that he does not anticipate replacing it for another five years.
  • a Marketing Performance Score ( 410 ) may also be used to predict the effect a particular ad will have on a Consumer's buying tendency for a specific Product and thus help determine how much an advertiser is willing to offer in an actualized bid ( 430 ) to present that ad to the Consumer's Content selector ( 208 ).
  • Arki ⁇ sTM detects a pattern where individuals who highly rated a certain racing school ad and who also specified they were going to buy a luxury car in the next 12 months, became 15% more likely to buy a BMW after watching an ad including an offer for free racing school lessons with any BMW® purchase.
  • This example broadens across groups of ads and or Content which together create synergies that may, in aggregate, increase or decrease a Consumer's buying tendencies towards a specific Product. For example, Arki ⁇ sTM statistics may show that viewers are more likely to respond positively to a milk ad when preceded by an ad for chocolate chip cookies when followed by a cooking show featuring cupcakes. Unlike the FICO® credit score, the Consumer is allowed to see and dig into the complete calculation details to fully understand their score and how they can improve it by changing their future behavior.
  • Julia states in her Profile, by logging into her Arki ⁇ sTM Profile online, using her computer, that she is 90% likely to buy her first new car, a sedan, for less than $35K in the next 3 to 6 months and to finance the purchase. This is called an Arki ⁇ sTM Assertion.
  • Her performance will be tracked by Arki ⁇ sTM and used to influence her Consumer Marketing Performance Score generally, and weighted more heavily for other potential purchases related to her other pending Assertions with similar characteristics (e.g. purchase price magnitude, time horizon, or Product category) these types of projections.
  • her Profile is statistically matched by the Arki ⁇ sTM cloud servers against similar historical Consumers and found to be 63% likely to follow through on her Arki ⁇ sTM commitment to purchase a car.
  • Ford Motors decides to run a targeted advertising campaign to recent college graduates whose Arki ⁇ sTM Profile transcript confirms they did well in math. The campaign is for their Fusion Energi in the hopes of building brand loyalty for future car purchases. Ford submits to the Arki ⁇ sTM servers a request to deliver one of several customized ads to those Users who graduated from college within the last year, averaged B or better in their math curriculum or participated in classes or clubs that focus on protecting the environment, intend to buy a car in the next year, have a professed interest in the environment, and can afford the payments based upon a price of $500 above dealer invoice at $38K with a five year loan at 1%. Ford also provides Arki ⁇ sTM a formula that calculates how much potential targeted viewers would be paid based upon their Profile contents.
  • Profile criteria utilized include the projected likelihood of actually buying any car in each of the next twelve months as shown in FIG. 26 .
  • Julia's Profile matches and Arki ⁇ sTM applies the formula to her Profile and computes a $5 offer, which she accepts. This car would be a bit out of her price range, but based upon her Profile's matching characteristics Ford offers the pre-negotiated price together with financing that would make it fit her budget. Additionally, since her Profile shows her favorite color is purple, the ad she receives is the variant that shows the car in its blue-purple exterior paint color.
  • Julia ends up purchasing a Prius and not the Fusion Energi but because the Prius purchase matches her professed intention that she recorded, she builds positive history.
  • All Content provided by Arki ⁇ sTM may be Filtered based upon the application of Content preferences in a User's Profile. For example, if a person desires to exclude Content related to the sale of guns, they can ensure, through their Profile, that no gun advertising reaches them through Arki ⁇ s. For Content that passes a User's Filtering preferences, it may then be graded as to how well the Content matches the User's Profile stated interests and desires. There are multiple dimensions upon which Content may be independently graded. Dimensions of grading may include how well the Content matches a User's point of view in: humor, emotion, politics, demographics, present physical location, present social context, projected travel path, and preferences, etc.
  • the Filtering and grading of Content may vary contextually (e.g., location, likely travel path, current or recent activity, or state of mind) by what a User has recently done by deduction from clues in the User's Profile together with mobile device data such as GPS, motion, accelerometer data, calendar data, etc.
  • Filtering and grading may also vary by the User's emotional state (e.g. mood), recent activity, recent Content consumption, current news events, and whom they are SyncGrouped with. This may include their recent communication history culled from their caller ID log, Skyping, texting, etc. and the identity of communicating parties and the nature of those parties' typical interaction for the present context as captured in their Profile and the vocabulary, tone of voice, etc.
  • Content might also be Filtered out at one time based on context, but not at another time, in a different context. Similarly, Content might be graded differently in different contexts.
  • the following example usage scenario describes how contextual clues can influence the Content delivered to a User.
  • Carol has been using Siri on her iPhone® to dictate messages for the past year and has become comfortable with her words being recorded and sent into the cloud to be transcribed. Therefore, she has decided to allow Arki ⁇ sTM to listen in on her smartphone's and/or smartwatch's microphone during phone calls and when she is not on the phone but comfortable being recorded (e.g. in public locations) for the purpose of better targeting her state of mind and has configured her Profile using her Arki ⁇ sTM app on the smartphone to allow this or configured using the Facebook interface which is linked to her Arki ⁇ sTM Profile.
  • Arki ⁇ sTM As she talks on the phone her recorded words are submitted to the Arki ⁇ sTM cloud servers for transcription and tonal quality analysis to help deduce emotional state and this information is mined for clues as to what she is thinking and feeling.
  • Arki ⁇ sTM When Arki ⁇ sTM is monitoring the audio of her phone it may use her phone's location in order to alert other Arki ⁇ sTM Users whose Profile preferences request notice when they are within proximity of an Arki ⁇ sTM enabled Device that is actively recording and thus their words could be recorded.
  • Arki ⁇ sTM servers combine this information with the context of to whom she is talking that is based in part upon matching up their phone number or other means of connection (e.g. Skype® handle) with her Profile information.
  • Arki ⁇ sTM discovers that Carol is talking to her mother and asking for advice about dating given an unpleasant date she was on the prior night, at Benihana's Steak House, where she ended up arguing with her date about women's rights and he left her with the bill and no ride home. From this information, Carol is subsequently targeted with an advertisement for OkCupid® dating site that focuses on philosophical compatibility. However, Benihana omits sending her a message, which, in the absence of her conversation with her mom, would otherwise have been inappropriately targeted toward her.
  • An advertiser may place a premium on sending a message when a User is in a particular location or is projected to soon be in a location interesting to the advertiser (e.g. near their store or near a competitor.)
  • An advertiser may offer to provide, pay for, or subsidize a User's travel to their store. This may take the form of premium parking reservations, valet services, or subsidy and defraying transportation costs including fuel and public transportation fares.
  • An advertiser may provide a shuttle bus to bring customers to and from their location and locate passengers by way of their Arki ⁇ sTM Profiles by sending targeted ads that query whether the User would like a lift, and direct the User and a shuttle to efficiently meet by creating a SyncGroup led by the shuttle.
  • Arki ⁇ sTM can target ads to potential nearby customers providing offers on a limited first-come basis to fill in unbooked time and facilitate directing customers to the mobile business efficiently when, for example, parked outside an office building or on a public street.
  • the cloud servers decide in conjunction with a Marketer that they will send Juanita a targeted advertisement when she is next projected to be on her way to the Gym and is in her car listening to a custom streaming audio feed from her smartphone that is fed by the Arki ⁇ sTM cloud servers.
  • the ad is to be for a competing Gym that would offer her a free personal training session in a small group workout using fitness trampolines if she comes then instead of going to her normal Gym.
  • the closely targeted ad pays her three dollars since it is playing shortly before her next gym visit and offers her free valet parking at their entrance.
  • Another commercial targets her on her way home from the Gym (as detected by her smartphone's location and movement monitored by her Yelp app that is connected to her Arki ⁇ sTM Profile on the Arki ⁇ sTM servers) and is for a new yogurt shop that just opened around the corner from the gym where she is now and that serves high-protein non-fat yogurt and offers her a full serving for free for coming by in the next fifteen minutes and trying it out in the hopes that she will make them a part of her gym ritual. They also offer her reserved on-street pre-paid parking within a one-minute walking distance of the entrance.
  • the Arki ⁇ sTM system may utilize a certificate that indicates a prediction of how any given marketing message, Content, Product, or service matches an individual's (or SyncGroup's) Profile(s).
  • FIG. 17 a shows a variety of different Visualizations for the certificate that may be employed. Different areas of the Visualization represent different aspects of a person such as their predicted emotional or logical response to a message, or whether it relates more to their personal or family life. Color-coding also encapsulates aspects of the message's fit to one's Profile.
  • the Visualization may be a two-dimensional or three-dimensional geometric shape, which may depend on the number of parameters a Consumer would like to view in conjunction with each marketing message—for example, a Consumer specifying six parameters could have a cube as a Visualization with each side a different color and representing a different aspect of the message's fit to the Consumer's Profile. If only five out of six aspects are fulfilled, the cube will appear to have one side missing, corresponding with the aspect that was not fulfilled.
  • the Visualization may also be depicted as a DNA helix, with base pairs that are depicted in different colors corresponding with aspects of the message's fit to the Consumer's Profile. Connected base pairs may represent matching aspects, and unlinked base pairs may represent aspects that do not match.
  • Visualizations include a pyramid with separate levels each representing an aspect, a star with each point representing an aspect of the message's fit to the Consumer's Profile, an emoticon or table of emoticons which are happy, sad, or neutral depending on whether or not marketing matches are predicted to match an individual's or SyncGroup's Profiles, etc.
  • a horizontal bar may depict a user-defined threshold as a vertical line intersecting the bar, and the matching aspects may be depicted in different colors on the bar, with their percentages added up denoting whether an advertisement meets the matching threshold shown on the bar.
  • a Consumer may specify in their Profile that certain aspects are absolute requirements and others are relative, for example, a User may require that a trusted NGO certifies that a Product is absolutely child-labor free but is willing to accept an environmental requirement that a Product is carbon-neutral relatively and thus accept messages about a non-carbon-neutral Product if the message pays them enough or has other mitigating characteristics such as being humorous enough.
  • Visualizations may have features that only appear when a marketing message or Product matches with the Consumer completely, or matching is past a certain triggering threshold.
  • a star Visualization may light up, a pyramid may depict a beam of light coming out of its apex, colored beams of light may combine together into a white beam of light through a prism, an outline of a shape may be filled in, etc.
  • Third-party add-ons to the Arki ⁇ sTM system may allow the Visualization to be customized.
  • the Visualization may also be utilized for providing Feedback on a marketing message. Once a message has been consumed, the Consumer may adjust the visualization to correct it to match their actual perception of the message's relation to their subjective preferences. For example, if a message was predicted to rate very funny for a User, but the User only found it somewhat funny then they could correct the Visualization to reflect their actual subjective feeling of how funny it was.
  • Such Feedback may be used to refine the system's prediction of funniness of that message for other Users, and with stronger weight for those Users with similar tastes to the User, further, such Feedback may also be used by the system to learn and better predict the User's feelings for future messages in a manner similar to Netflix's movie prediction ratings.
  • the Visualization may be represented completely or in part by an audio depiction (e.g., an easily recognizable series of chords being played).
  • the initial Visualization values may be predicted using a neural network based on Profiles of other Consumers that have already viewed and corrected their predicted Visualization to reflect their actual response and how those Consumers' Profiles relate to one's own Profile.
  • FIG. 17 b shows a sample certificate which takes the form of a Visualization derived from something like da Vinci's Vitruvian Man where the head, heart, hands, etc. may light up to depict a relative match level for logical thinking, feelings, skills, etc.
  • a User may scan the Product or a QR code in order for the Product to be identified to the Arki ⁇ s system and a customized certificate retrieved for that product for a particular User.
  • certificate may be viewed on a User's mobile device.
  • a Product may have packaging or shelving that detects a User's presence by the proximity of their mobile device and retrieves the certificate for that User and displays such certificate on the Product packaging or shelving.
  • Such packaging may be reusable and removed at the point of purchase for reuse.
  • a User can choose alternate grading algorithm plug-ins.
  • a portion of their earnings may be shared with the author(s) of the alternate grading system for the period that such system is employed.
  • the following example usage scenario describes how an alternate grading algorithm plug-in may be utilized within the Arki ⁇ sTM system. Jerry learns that his friends, Joe and Mike, are working on a new Arki ⁇ sTM plug-in that is specialized for sports fans. Jerry configures his Profile using his laptop and an Arki ⁇ sTM web page in a browser to start using it to support his friends and because he is an avid sports fan of the Lakers. Once configured, the Arki ⁇ sTM cloud servers update his streaming feed to utilize the plug-in and his digital on-screen graphic is updated to a basketball, hoop, and backboard to depict how well Content matches his Profile, with a swish indicating a perfect match. This algorithm weights his interests in sports, and particularly the Lakers more heavily than normal and utilizes the recommendations of famous sports figures. After using it for a week, Arki ⁇ sTM servers have automatically shared 0.35 of his $12 in earnings that week with Joe and Mike.
  • the grade of Content may be visually represented using a standardized graphic that represents how well the Content matches a User's Profile overall and in various dimensions such as humor, logic, emotion, and politics.
  • the shared First Device may show the match for the group as a whole and each User's Alternate Device may show their individual match level.
  • the Visualization may be shown on the screen like a digital on-screen graphic (i.e., off in one corner and semi-transparent, see wikipedia.org/wiki/Digital_on-screen_graphic). By default, the graphic may appear temporarily at the beginning of Content and then disappear after a short period, however, the User may configure this behavior or use their remote control to pull it up again or hide it in a particular instance.
  • the grade of live Content may be provided on each User's Alternate Device.
  • the grading system uses an adaptive algorithm and statistical analysis to predict how well Content matches your interests and objectives.
  • a User may choose to follow the recommendations of other Users they trust. For example, a User may select likeminded humor critics in their Profile and only consume Content that has been previously reviewed by one of these critics that they trust and given a positive rating in the humor dimension. In return, the humor critic may get a small payout taken from the User's earnings for consumed Content that is selected based in part upon their recommendations and guidance.
  • FIG. 18 is an information flow diagram in an exemplary Content ranking, Filtering, and alerting system that can be used in conjunction with the technologies described herein.
  • Profile Information 1800 together with Contextual Information 1820 are applied to Content Meta Information 1810 (e.g. certifications, certifiers, reviews, reviewers, Product, etc.) in the Content Ranking/Filtering Engine 1830 to find the Highest Ranked Content 1840 for transmission to the User.
  • a User's Profile Information 1800 may specify that the User will be alerted if Content surpasses certain thresholds (e.g. the payout amount for Content surpasses a certain threshold, or the humor rating of Content surpasses a certain threshold). If Content ranked by the Content Ranking/Filtering Engine 1830 surpasses any of these User-specified thresholds, a Threshold Alert Transmission 1850 will occur. Threshold Alert Transmission 1850 may involve sending an alert (e.g. audio, visual, haptic feedback, etc.) to the Device or Devices (e.g. smartphone, tablet, wearable computing device) of a User identified with Profile Information 1800 .
  • an alert e.g. audio, visual, haptic feedback, etc.
  • a Goods & Services Provider may receive an Arki ⁇ sTM Goods & Services Provider score to assess the likelihood of a User being satisfied with that Provider.
  • the score combines the assessments of other Users with similar outlooks to the User and Reviewers they may have elected to trust.
  • assessments cover the truthfulness, interestingness, and funniness of the Provider's marketing messages.
  • assessments cover the truthfulness, interestingness, and funniness of the Provider's marketing messages.
  • assessments by those who actually purchased the goods or services being sold also determine the Goods & Services Provider's effectiveness in meeting the marketing message put forth.
  • a User's Profile may include prohibitions that block targeting from Goods & Services Providers that do not meet various metrics of their choosing such as, for example, requiring that at least 80% of their customers are satisfied with their purchases.
  • the integrity rating of Users increases the economic efficiencies by increasing the likelihood of honest interactions.
  • the Alternate Device application/platform may be synchronized with the Content being delivered on the First Device by configuration of the exact channel or station source being consumed (e.g., being watched or listened to) on the First Device. This may be done heuristically by gathering contextual information along with hints previously provided by the Alternate Device User in their Profile and presently, specifically about what they are consuming to deduce the likely channel source and Content being consumed along with alternative matches that are ranked by their likelihood. The Alternate Device User may confirm or correct the proposed match as required, potentially providing more information resulting in a new set of ranked results.
  • an Alternate Device e.g., a smartphone delivering Targeted Content
  • a First Device e.g., television
  • the Alternate Device application/platform may be synchronized with the Content being delivered on the First Device by configuration of the exact channel or station source being consumed (e.g., being watched or listened to) on the First Device. This may be done heuristically by gathering contextual information along with hints previously provided by
  • Table 1 enumerates contextual information that may be used by the heuristics to identify the Content Provider (e.g., Cox or Dish Network) and Premium Content channel, i.e., Content source, (e.g., Monday Night Football on FOX broadcast channel 2, House Hunters on Comcast HGTV, or The Big Bang Theory on CBS broadcast channel 5):
  • Content Provider e.g., Cox or Dish Network
  • Premium Content channel i.e., Content source, (e.g., Monday Night Football on FOX broadcast channel 2, House Hunters on Comcast HGTV, or The Big Bang Theory on CBS broadcast channel 5):
  • Metric Content Provider Content Source Mobile device location Yes No information gathered from GPS, cell towers, and Wi- Fi networks detected by the mobile device.
  • the present time and date No Yes Using the microphone of Yes Yes the mobile device to listen (using to the audio portion of commercial the Premium Content being audio) delivered on the First Device and submitting this to the cloud to identify the Content being delivered. (This is akin to the Shazam mobile application that identifies a song from brief clips gathered by a mobile device.)
  • Arki ⁇ s TM Profile Yes No information about Content Providers to which User subscribes. e.g., Comcast and Netflix
  • Arki ⁇ s TM Profile No Yes information about Content preferences. e.g., favorite football team is the San Francisco 49ers
  • Arki ⁇ s TM Profile Yes Yes information about friends and family Arki ⁇ s TM historical Yes Yes consumption patterns Hints provided by User No Yes on their mobile device. e.g., “I'm watching football.”
  • this Alternate Device synchronization may be configured to assist in automating the building of a User's Profile.
  • a User's Profile can be expanded to include the history of Content being consumed. This Profile history can facilitate the addition of features such as the seamless ability to begin consuming Content on one Device and completing it on another Device. This may be accomplished by tracking the Content time position (i.e. playback location) a User has reached or in the case of live Content the absolute time at which playback was interrupted.
  • the Content position may be easily known when fed from an Arki ⁇ sTM source or when consuming from a non-Arki ⁇ sTM source the position may be known by the Arki ⁇ sTM servers also monitoring the same non-Arki ⁇ sTM source in the cloud to identify a relative position within a feed. While consuming from a First Device, which is not Arki ⁇ sTM enabled, a User's Alternate Device, which is Arki ⁇ sTM enabled, can follow the First Device by monitoring its audio and video feeds in a Shazam-like fashion. In this way, a User's Alternate Device can detect the Content time position at which they separate from the First Device or the First Device ceases to transmit a particular feed and this position may be recorded in their Profile relative to the Content whose receipt was suspended.
  • This position timestamp may be associated with a corresponding point in the Content independently monitored by the Arki ⁇ sTM cloud servers and thus allow subsequent DVR like resumption from their suspended position on a different Arki ⁇ s-enabled Device.
  • the Arki ⁇ sTM cloud servers may coordinate alternate distribution feeds of the same Content and allow Users to seamlessly switch between feeds (e.g. begin watching a sporting event on a radio and switch part way through to a television or a smartphone.) This coordination across Devices applies to all forms of Content including Premium Content and Targeted Marketing Content.
  • An Arki ⁇ s-enabled Device is one that includes software that communicates with the Arki ⁇ sTM cloud and/or other Arki ⁇ s-enabled Devices through the installation of an app, firmware update, factory-supplied Arki ⁇ sTM chip or ROM, SIM-like card, and/or add-on hardware device like the SquareTM mobile credit card reader that attaches to the host device to make it Arki ⁇ s-enabled.)
  • Helen is using her computer as her Alternate Device and receives a pop-up dialog, email, text message, instant message, and/or other means of notification indicating that she may wish to join into a SyncGroup with Jennifer. She follows the link provided in the notification to an Arki ⁇ sTM dialog or replies to the notification to accept the SyncGroup.
  • Arki ⁇ sTM strongly suspects that Helen and Jennifer are mother and daughter or at least close friends. Helen is queried as to whether Jennifer is indeed her daughter, which she confirms. Jennifer turns to her phone after her mom has accepted and sees that her phone is now asking for confirmation to join into a SyncGroup with her mom, which she accepts. Because they are now linked up and are in Jennifer's apartment, the Arki ⁇ sTM server gathers the contextual information that Jennifer has in her Profile that she receives her Content from Cablevision.
  • HGTV channel is presently broadcasting an episode of House Hunters, but it detects that Helen has already seen this episode and instead sends back a suggestion to both Helen and Jennifer to watch a different episode that neither has seen before (as indicated by their Profiles) and may be shown on demand using Jennifer's personal Arki ⁇ sTM RokuTM channel Jennifer accepts on her Alternate Device and her Device automatically sends IR and RF codes to her First Device to change the Device source to her personal Arki ⁇ sTM channel.
  • the First Device queries via RokuTM how they wish to consume this episode with several on-screen choices including paying for it to be ad-free and watching sufficient commercials to pay for it up front.
  • the First Device feed from RokuTM splits the screen in half and delivers the video to each of them simultaneously, while providing their individual audio via their smartphone's Bluetooth headset or by listening to the smartphone that delivers their audio portion.
  • the smartphone or other Alternate Device may accept the audio directly from the RokuTM box or other DVR-like device feeding their First Device.
  • the audio may be sourced from the cloud or a cellular network and buffered on the audio device and the audio and video are then synchronized by direct communication between the local video device and the audio device by way of Wi-Fi, Bluetooth, or other local low-latency communication up front and periodically during message delivery.
  • the audio on the Alternate Device may need to be buffered further ahead in time if it is downloading more slowly than the video on the First Device to ensure that by the end of the message the audio is completely downloaded.
  • both audio and video may need to be fully downloaded before the message begins and the two signals are synchronized.
  • the User can specify identifying information for the Content currently being consumed (e.g., Content Provider such as a television network, cable network, radio station, streaming Internet provider, etc. and/or Content identifier information such as a broadcast or cable channel number, program name, time and date, geographical location, etc.).
  • Content Provider such as a television network, cable network, radio station, streaming Internet provider, etc.
  • Content identifier information such as a broadcast or cable channel number, program name, time and date, geographical location, etc.
  • the User could select a channel (e.g., a specific broadcast channel, cable channel, etc.), network (e.g., cable network, traditional broadcast network, etc.), Provider (e.g., a specific cable or satellite provider, a specific Internet streaming provider, or another type of Provider), day and time (e.g., the particular day and/or time that the Content begins), and/or location (e.g., whether the User is watching at home, at a sports bar, or at another location).
  • a channel e.g., a specific broadcast channel, cable channel, etc.
  • network e.g., cable network, traditional broadcast network, etc.
  • Provider e.g., a specific cable or satellite provider, a specific Internet streaming provider, or another type of Provider
  • day and time e.g., the particular day and/or time that the Content begins
  • location e.g., whether the User is watching at home, at a sports bar, or at another location.
  • the User could select a channel (e.g., channel 500), a network (e.g., ESPN), a provider (e.g., Comcast cable), and a time (e.g., 6:00 PM PDT).
  • a channel e.g., channel 500
  • a network e.g., ESPN
  • a provider e.g., Comcast cable
  • a time e.g., 6:00 PM PDT.
  • the Arki ⁇ sTM User may consume a spectrum of alternative Content ranging from Premium Content that they must pay to consume to high value, focused, Targeted Marketing Content that may earn them money when consumed. See FIG. 8 .
  • Arki ⁇ sTM may create a standard for broadcasters to follow to indicate the beginning and end of commercial breaks along with dynamic predictions of when a commercial break will end for live broadcasts. These may be encoded in the broadcast signal such that they are not readily apparent to the Consumer. Strategies for encoding could include adding steganographic (hidden message) information to the following portions of the signal:
  • broadcasters may provide a direct confidential feed to Arki ⁇ sTM through the cloud to help ensure only those who will compensate the broadcaster for skipped commercials use the information.
  • This feed may be shared with Arki ⁇ sTM Users such as on their smartphones that may give an estimated countdown to when Premium Content will return.
  • the following example shows how the detection of commercial Content can aid in choosing the best targeted advertisements to show to a user: Peter is a Lakers fan and is watching a Lakers game against Miami Heat from his home. With 30 seconds to go in the game and a score of 110 to 109, Miami calls a time-out with possession of the ball. ABC goes to commercial break during the time-out and transmits an initial estimate of 3 minutes duration or Arki ⁇ sTM computes their own estimate based upon statistical analysis for time-outs in similar basketball game scenarios. Peter begins watching a targeted two-minute commercial.
  • ABC continues to broadcast a 3-minute duration, so at the end of that commercial, Peter is served up a one-minute commercial, however, fifteen seconds into his commercial, ABC changes their estimate to be 2.5 minutes based upon Miami's players returning to the court.
  • Peter's Profile indicates he only wants to view basketball games live and is not willing to view a feed lagging even by a few seconds since he often gets on the phone with rival friends that are Miami fans and wishes to be synced up with their viewing. Therefore, upon ABC's notification, he gets a popup graphic superimposed over the commercial indicating the game is about to return and when the referee is about to put the ball in play and broadcast returns, Peter's second advertisement is truncated mid-stream in order to return to the live TV feed without missing any action.
  • Peter's targeted feed returns to the truncated second advertisement he was watching before and resumes play at the last entry/rewind point (these are encoded in the commercial by the producer) that precedes where he broke out at the end of the last commercial break.
  • Another alternative to consuming targeted advertising made possible by the Arki ⁇ sTM system is a simple countdown clock, reproduced on either the Alternate Device (e.g., mobile device) or First Device, to indicate the estimated time till the end of the commercial break and the resumption of Premium Content.
  • a clock would also include an audio component alarm to audibly alert to when the commercial is nearly finished.
  • the end of the countdown may be estimated through statistical sampling and Shazam-like recognition (through comparing spectrograms and/or other acoustic fingerprints) of individual advertisements so that knowledge of how long particular advertisements run may be used.
  • the countdown time may change as the estimate changes and the User may be alerted to substantial changes to the estimate.
  • the broadcaster may coordinate with Arki ⁇ sTM to provide detailed projections and alerts to make the countdown estimates more accurate.
  • the following scenario exemplifies the utility of implementing a countdown clock within the Arki ⁇ sTM system. Andrea is watching American Idol and is taking a break during the commercials and pauses her alternate Targeted Marketing Content as the Primary Content goes to commercial and her targeted advertising is about to begin. Both the television (First Device) and her smartphone (Alternate Device) count down the dynamically changing estimate of time remaining until the commercials end and the Premium Content resumes by retrieving this evolving estimate from the Arki ⁇ sTM cloud servers. This includes an audio alert at count down intervals beginning at 90 seconds (one beep), 45 seconds (two beeps), and 15 seconds (three beeps) to give Andrea the ability to leave the room but retain awareness of when the commercial break will most likely end.
  • information identifying Content currently being consumed can be provided by a User's mobile device as illustrated in FIG. 19 Alternate Device 1920 providing local coordination and control 1970 of First Device 1910 .
  • the User's Alternate Device 1920 e.g. a mobile device
  • the User selects specific Content to reproduce on the First Device 1910 e.g., selects a specific broadcast channel or cable channel
  • the mobile device can provide identifying information (e.g., channel, network, location, day and time, etc.).
  • the mobile device 1920 can run an application that provides the identifying information to a targeted advertising system 1960 so that the targeted advertising system (servers 1960 ) can provide targeted advertisements to the User at the time generic advertisements are presented on the First Device 1910 .
  • the application on the user's mobile device 1920 can perform other functions.
  • the application can mute (local coordination and control 1970 ) the First Device 1910 while targeted advertisements are consumed by the User on the mobile device 1920 (e.g., so that the User is not interrupted by a generic advertisement being played on the First Device 1910 ).
  • the application can also pause 1970 a DVR 1910 if a targeted advertisement is being played on the mobile device 1920 and if the targeted advertisement runs longer than a corresponding generic advertisement on the First Device 1910 , then the application can resume playback 1970 on the First Device 1910 when the targeted advertisement is over (e.g., by resuming playback 1970 at the beginning of the Content 1930 that the User 1940 was consuming) If the targeted advertisement runs longer, then the application may choose a shorter targeted commercial to compensate in the next commercial break (e.g., by selecting a shorter targeted advertisement(s) such that they do not run longer than the corresponding generic advertisement(s)).
  • an Alternate Device 1920 e.g., smartphone
  • IR infrared
  • RF Radio Frequency
  • targeted advertising can be paused 1970 before and resumed 1970 after such Feedback is provided as directed by the Alternate Device 1920 .
  • the synchronization 1970 of an Alternate Device 1920 may proceed before the First Device 1910 is tuned to the desired Content 1930 , wherein the Alternate Device 1920 performs a search given a description of the desired Content 1930 , and after synchronization 1970 the Alternate Device 1920 may act as a remote control for the First Device 1910 including the option to power it on, select an input source, select a Content channel, and/or adjust the audio levels 1970 .
  • a User may temporarily enter a do-not-disturb period within which they will not be presented with ads.
  • the period may be recurring on a schedule or occur in response to a one-time request. The period may only apply to a particular medium such as television or radio.
  • the do-not-disturb periods may have configurable limits or controls that allow time-sensitive or high priority messages to still be presented.
  • the period may be tied to an event such as the duration of a sports event.
  • the filtering may also be tied to a genre such as no food commercials allowed after 7 pm. In general, the User has complete control over when and what and how advertisements are presented to them.
  • An Arki ⁇ sTM User may configure alerts in their Profile to send a notification to their mobile device which is in signal communication with the Arki ⁇ sTM servers, for example, to cause it to vibrate when a high paying ad is about to be served to a shared First Device that they are SyncGrouped with.
  • Advertisers may wish to send a message during a sporting event when a team has an exciting scoring event to build upon the elation felt by the scoring team's supporters and to deliver a message for which they will be more receptive at that moment and thus would be willing to bid a higher price to reach a targeted audience at that moment.
  • the system may also consider data from voice recognition, facially-based or vocally-based mood recognition, heart rate based on wearable computing devices, accelerometer data, and/or text messages to identify situations during which an advertiser would send a message regarding a temporarily increased payout for consuming or responding to an advertisement.
  • An advertiser's matching criteria and payout formula for their message may contain certain inputs which take advantageous situations for message delivery into account, setting up increased payout in advance.
  • An embodiment of the system exemplifying targeted advertising alerts is as follows: Joseph is a Pittsburgh Steelers fan, as shown in his Arki ⁇ sTM Profile, and he is in a sports bar watching one of their games. With 50 seconds left on the clock, the Steelers have just scored a dramatic touchdown to take the lead. Their opponents have just called a time-out and a commercial message is now ready to be served up. Corvette wants to target Joseph for an ad for their new model year car and offers him $5 to view and respond to their ad at that moment given his elated state as confirmed by his Arki ⁇ sTM enabled smartwatch's detection of an elevated heart rate.
  • His mobile device's Arki ⁇ sTM app causes his phone to vibrate three times to alert him, 15 seconds before the ad airs, that a high paying ad is about to come his way. He pulls out his smartphone and sees the alert that he will earn $5, which just adds to his good mood from the recent score, and he turns his attention to the screen. The ad is displayed and, at the end, he returns his attention to his phone to answer a few short questions in the Arki ⁇ sTM app that are supplied by the Arki ⁇ sTM cloud to confirm he viewed the ad and provide Feedback that takes around 45 seconds and satisfies the payout requirements and he receives his $5.
  • An alert may be in the form of, for example, one or more of: an audible alert through a Device's speakers, light emitted from a Device's screen or camera flash, and vibration.
  • Another kind of advertising alert is for a Product going on sale in which you have previously expressed an interest. For example, Amazon® could have a Lightning Sale for the next fifteen minutes on a laptop you are considering buying as part of your Assertion to purchase a laptop in the next month. Your smartwatch could vibrate and direct you to check your email for the limited-time special offer from Amazon® that additionally includes a coupon for free two-day shipping.
  • Group consumption is best at locations where there is Targeted Content Delivery to First Device to enable shared consumption of targeted advertising.
  • Arki ⁇ sTM Users combine together into a SyncGroup when they join together in a group to collectively share consumption of Content, communicate with other group members, and/or network with other like-minded Users.
  • a SyncGroup may be formed from members that are in Physical Proximity to each other or alternatively that are in Virtual Proximity to each other or a combination of both.
  • An example of a SyncGroup formed due to Virtual Proximity is Arki ⁇ sTM fortuitously noting that your friend or group of friends is also about to watch the same show that you are about to watch. You would be asked, through a visual, audio, and/or tactile notification on any of your Devices, whether you would like to join up with them to watch the show together in a SyncGroup.
  • Virtual Proximity may also include Users with a Physical Proximity to each other. Virtual and/or Physical Proximity may come and go but a User may elect to remain in a SyncGroup. Alternatively, a User may return to a previous SyncGroup they were in that has a persistent Profile even though they may not presently be in Virtual and/or Physical Proximity with other members.
  • Members of a SyncGroup may elect to integrate one or more communication technologies into their group including telephony, video conferencing, text messaging, instant messaging, Skyping, Twitter, Instagram, Facebook posting (e.g. wall posts), etc. depending on the embodiment.
  • Each member may configure, using their Arki ⁇ sTM app on their smartphone, how they wish to receive and send their communications. For shared displays, they may agree to configure the sending and receiving of communications for members using a particular shared display to be via the shared display. While in a group, members may be able to send messages only to specific individuals of the group instead of to the whole group.
  • Third parties such as Twitter, Facebook, and Skype® may choose to provide integrated Arki ⁇ sTM functionality with their Products and directly communicate with the Arki ⁇ sTM cloud servers to notify them of messages sent by other members of SyncGroups.
  • Users may provide their login credentials for third parties and allow Arki ⁇ sTM to log into their third party accounts from the cloud to receive message notification.
  • Users may send text messages to a special number associated with their SyncGroup and have those messages appear to each User, such as by a quote bubble appearing superimposed over the Content they are sharing along with an attribution. Such messages may be omitted from the display being used by the sender to receive group messages.
  • Members may receive their messages on either one or more first Device(s) or their one or more Alternate Device(s).
  • Messages may be integrated into Content feeds by the Arki ⁇ sTM cloud servers or overlaid on top of Content by display and Content feed devices or presented on an Alternate Device that may not be receiving the Primary Content feed.
  • Another type of message is survey/voting results, which may also be integrated into or overlaid upon Content feeds.
  • SyncGroup members may configure their viewing to display survey results for Arki ⁇ sTM surveys or for surveys in third-party applications like Twitter and Facebook. These surveys may provide real-time Feedback as to what Consumers are thinking regarding a show as it unfolds. For example, in TV shows, such surveys may indicate what viewers think should or is likely to happen next.
  • survey results may be configured to display individual responses, SyncGroup average responses, total audience average responses, and/or etc. Such displays of survey results may compare and contrast results across different groupings (e.g. males vs. females or SyncGroup members vs. total audience.)
  • the following example usage scenario describes the use of SyncGroups within the Arki ⁇ sTM system. After graduating from high school, Ashley, Lisa, and Julie have each gone off to different colleges but wish to maintain their friendship. On Wednesdays, they get together in a virtual SyncGroup to view new episodes of their favorite show, Arrested Development. They join up each week and share synchronized viewing of the episodes along with a shared 60-second commercial for the group to pay for their viewing. During the show, they use their smartphones to video chat with each other and talk about the show as it unfolds as if they were in the same room together. Ashley's new friend Jennifer has joined the SyncGroup and is physically present with Ashley.
  • the SyncGroup advertising would be skewed toward Jennifer because she spends ten times as much as the other girls.
  • this SyncGroup Jennifer has configured a separate incognito Sub Profile to represent herself that does not make her stick out relative to her new friends. Without this, the SyncGroup Targeted Marketing Content would be skewed toward her and her proclivity for Coach Products. Instead, the Profile she has adopted for this SyncGroup makes her appear more in line with the norms of her age group and thus with her new friends. Because she is using this alternate Profile, her addition to the SyncGroup has not disrupted the Targeted Marketing Content they would get without her added presence. Because the viewers are in different time zones, the SyncGroup naturally avoids targeted ads that payout more during dinnertime hours. This is because their selection would only payout well for Lisa, who is on the East Coast, since it is only dinnertime for her each week when they view whereas it is well before normal dinnertime for Julie in Mountain Time and Ashley and Jennifer in Pacific Time.
  • Arki ⁇ sTM Users in SyncGroups may elect to maintain a group Profile. For example, an Arki ⁇ sTM User may join together with their spouse to create a persistent or ongoing SyncGroup Profile to share information, such as future intents, spending, and income between their two Individual User Profiles. Their SyncGroup Profile enables joint marketing that may target both of them together as decision makers, such as for purchasing a car.
  • FIG. 20 shows the general steps and factors in creating and updating a SyncGroup Profile.
  • a SyncGroup Profile may be limited by the Profiles of the members of that SyncGroup. For example, a User may prohibit the creation of a SyncGroup Profile for a SyncGroup they are a member of without their consent.
  • SyncGroup Profiles may be configured to allow more or less control over the changes made to that SyncGroup's Profile.
  • a SyncGroup may allow any member to edit its Profile, or may only allow a subset of its members to edit its Profile.
  • the same processes that are used by organizations such as described in the book Democratic Rules of Order by Fred Francis and Peg Francis, available from Cool Heads Publishing, Merville BC, Canada (democraticrules.com), may govern a SyncGroup.
  • a SyncGroup Profile may require a majority to approve proposed changes before they take effect or may require some other plurality of Users agree.
  • a SyncGroup may allow any member to veto proposed changes.
  • a SyncGroup's rules, constitution, and/or preferences may be visible to the public or only visible to members, based on preferences agreed upon by the SyncGroup members.
  • a User's Profile may specify a default authorization for SyncGroups they join and newly created SyncGroups may default to the most stringent authorization of any of its members.
  • a SyncGroup's authorization may change from its initial setting by some form of mutual consent, some of which consent may be offered by default for some members based upon preferences in their own Profile.
  • Mutual consent may take the form of, for example, on-screen electronic display and acceptance, text message query and reply of consent, or voice recognition and/or lip-reading of an affirmation of consent presented verbally or gesture recognition such as nodding the head in agreement, shaking the head to signify no, or giving a thumbs up or down signal.
  • SyncGroups may have a designated member who is the group leader.
  • the group leader may be the only group member whose identity is shared with other group members. With the consent of another group member, the leader may pass their leadership role to the consenting other member.
  • the group leader may serve to indicate the group's location and may serve as a beacon to bring the other group members together.
  • a Product Champion may create a SyncGroup where they are the leader.
  • the group's identity follows the leader when one or more members including the leader leave the group, perhaps to form a new group.
  • FIG. 21 is an exemplary SyncGroup Profile creation and notification system that can be used in conjunction with the technologies described herein.
  • a SyncGroup may be formed intentionally by a group, or grown by spontaneously searching for friends (or compatible Users) that are presently available to join a new virtual group.
  • a User inviting another User to connect their Profiles as being friends in the Arki ⁇ sTM system identifies them as being friends to the Arki ⁇ sTM system.
  • linking ones Profile with other online social networks including Facebook, Google®+, Twitter, and LinkedIn may identify friends or potential friends to the Arki ⁇ sTM system by those friends having also linked their Profiles to their social network accounts. Another method of identifying friends involves importing contacts from linked email accounts or smartphone contact lists.
  • friends may also be suggested by pattern matching of names and demographic information to suggest matches in the Arki ⁇ sTM system that are likely to correspond to real world friendships.
  • Friends may be suggested based upon shared values, ethics, politics, religious beliefs, tastes, preferences, common friends, purchases, or other possible links to each other. Friends may also be suggested based upon shared relationships such as confirmed friends held in common, common interests, locales, and/or employers.
  • invitations to become Arki ⁇ sTM friends may require demonstration of an actual connection such as by answering questions about a member or providing identifying information such as email address, telephone number, or physical address. Demonstration may also include uploading photographs or audio samples of a friend that the system can confirm matches the identity of the target friend.
  • Users may set their discoverability settings to require a one-time passcode (given to the User searching for their friend by the User being found) or require the use of NFC, Infrared communication, etc. so that Users must be in Physical Proximity to become friends on Arki ⁇ s.
  • a friendship connection within the Arki ⁇ sTM system can be used for advertising purposes, e.g. by predicting a User's desires based on those of their friends. For example, if five of a User's friends buy fishing gear, the User may receive advertisements for fishing gear that may list the friends who recently bought fishing gear, so that the User can join their friends.
  • friendship connections can only be used for advertising purposes if both Users agree that the connection can be used for advertising purposes.
  • a User may also seek to create a SyncGroup of like-minded individuals by using Arki ⁇ s' ® targeting capabilities to reach out to other Users that have a high likelihood of sharing their interest and a desire to join together for support and communication.
  • Each User may configure in their Profile the discoverability of their interests by other Users for this purpose. Configuration choices include, private (not discoverable by anyone unless explicitly shared), selected friends or groups of friends, all friends, 2 nd level connections (friends of friends), 3 rd level connections, or everyone. Other configuration choices include matching criteria, such as only by women, or only by those that have a particular interest or trait.
  • a User may change their discoverability preferences for a Sub Profile or subset of information individually, without affecting discoverability preferences for the rest of their information.
  • Arki ⁇ sTM may be used as a platform to aggregate multiple social media feeds, expanding a User's Profile and, thus, increasing their relevance to advertisers while the User browses social media in a streamlined and convenient fashion.
  • the configurability of Arki ⁇ sTM allows a User to fine-tune their feed by limiting the friends and followed accounts whose Content is imported into Arki ⁇ s.
  • a User may choose settings to filter out Content from their feed, for example Content including inappropriate language or external hyperlinks.
  • a User may post directly from the Arki ⁇ sTM social media feed.
  • a User can choose which linked social media accounts to post to from Arki ⁇ sTM for each post, as well as fine-tune privacy settings for each post.
  • Feeds may be imported and posts may be exported using Open API (i.e. public API) technology.
  • a User may utilize Arki ⁇ s' discoverability preferences (e.g. selected friends or groups of friends, all friends, 2 nd level connections (friends of friends), 3 rd level connections, or everyone) to utilize their connections on Arki ⁇ sTM or on social media accounts for networking, advertising, and contributing to causes they find important.
  • Arki ⁇ s' discoverability preferences e.g. selected friends or groups of friends, all friends, 2 nd level connections (friends of friends), 3 rd level connections, or everyone
  • a User may obtain potential friends and/or connections from a variety of sources.
  • a User may specify in their settings that they want to be notified of how many friends, groups of friends, or other Users using Arki ⁇ sTM are within a certain radius (e.g. ten miles) at any given time. This notification may be automatic or in response to a query by the User.
  • the User can notify these friends in close proximity to join them at a location at which the User is currently present, or will be present at a certain time in the near future ( 1310 ).
  • a Goods & Services Provider may be notified that a User is inviting friends to their property, either automatically or through an alert sent by the User, and may offer the User a portion of the profits from any resulting sales and/or donate a certain percentage of the profit to a charity of the User's choice and/or offer the User and his or her friends coupons through Arki ⁇ sTM ( 1314 , 1316 ).
  • the following example embodiment shows how Arki ⁇ sTM can be used to connect with friends and find nearby friends. Since it is Friday, Chloe has decided to take half the day off from work and visit her favorite snow ice café, Arctic Fluff, after lunch. She drives to the complex where the café is located, arriving at around 1, and orders a turkey and avocado sandwich from the restaurant next door. As she waits for her meal, she decides she wouldn't mind some company for dessert and checks Arki ⁇ sTM on her smartphone to see if any of her coworkers, college friends, and close friends are in the area. She has already created these groups, so she selects checkboxes to search for nearby Arki ⁇ sTM Users within these three groups, and drags a slider to limit her search to anyone within a 10-mile radius.
  • Chloe sends an invitation for all 46 nearby connections to meet at Arctic Fluff at 2 , along with a picture she has taken of her favorite snow ice: half strawberry and half mango with strawberries, mangoes, yogurt chips, and strawberry drizzle on top.
  • the owners send to Arki ⁇ s, a coupon for 15% off a medium or large snow ice with a valid Arki ⁇ sTM cash identifier that is distributed to Chloe and the friends she has invited. Seventeen of Chloe's friends show up; by using their Arki ⁇ sTM cash identifiers, they receive 15% off their snow ices and $13.60 is donated to the Women's Global Empowerment Fund.
  • Chloe and her friends have finished their dessert and their conversation, it is already 4:30. Chloe plans on attending happy hour at a dive bar a few miles away and wants to see as many friends as possible, so she changes her Arki ⁇ sTM settings to automatically notify her every 30 minutes of how many friends are within a 5-mile radius.
  • advertisers may create fun games that promote their Products through competitive play amongst friends and also provide some form of compensation such as game winner prizes or Profile Badges that are visible to friends.
  • a company may have a new Product they are rolling out to the market and offer a game around the new Product that allows friends to compete where the winner gets a free Product sample.
  • Games can be audio, video, tactile, and/or movement (accelerometer) based.
  • co-workers could play a friendly audio game as they wait in rush hour traffic.
  • Arki ⁇ sTM provides the infrastructure to link together the friends into a game SyncGroup where they can see each other's progress and relative standing.
  • the game may include linking the group together in real-time for live audio or video so that they can compete directly against each other and see and/or hear each other.
  • the following example embodiment of the system describes group gameplay through Arki ⁇ s. Nancy, Betty, and Kris are friends driving in a car together on their way to the beach. Nancy is driving her own car where she is streaming her virtual Arki ⁇ sTM station from her smartphone that is connected to the car's entertainment system. All three have their smartphones with them and because they have already linked their Profiles as friends on Arki ⁇ s, they are automatically synced up into an Arki ⁇ sTM group after being in close Physical Proximity for more than three minutes. While driving, Nancy's radio is synced up to the group as described in Alternate Device Synchronization and begins streaming Content that is customized based upon their three Profiles combined.
  • the game is a word game where words from the series are incorporated into the play so that the players will become familiar with the series' concepts and themes. The game takes about ten minutes to play while they are driving and the winner, Betty, receives $5 and for participating all receive free commercial-free access to the first three episodes.
  • the Arki ⁇ sTM Alternate Device application e.g., mobile phone app
  • shared First Devices may facilitate Users joining together into a SyncGroup.
  • SyncGroups are formed by detecting group consumption situations due to sustained Device proximity for Users that are logged into their Profile on their mobile device. Such detection can be performed on a server in the cloud, with each Device registering its contextual information with the server, which then organizes Device owners into SyncGroups.
  • SyncGroups are formed through direct communication among pairs of mobile devices. Individual Device owners may join into a SyncGroup that can merge any other Users they may already be paired with into a larger group, merging previous SyncGroups into a larger SyncGroup.
  • direct communication between mobile devices can be through Near Field Communication (NFC), Bump Technologies like validation/coordination (analyzing accelerometer data to match two phones being bumped together, see bu.mp/company/faq), or local communication inside a Wi-Fi network.
  • NFC Near Field Communication
  • Bump Technologies like validation/coordination analyzing accelerometer data to match two phones being bumped together, see bu.mp/company/faq
  • local communication inside a Wi-Fi network can be through Near Field Communication (NFC), Bump Technologies like validation/coordination (analyzing accelerometer data to match two phones being bumped together, see bu.mp/company/faq), or local communication inside a Wi-Fi network.
  • each participant can view on their mobile device how much they will get for consuming the ad (based upon how well it is optimized for their profile) and decide whether they are going to pay attention, opt-out and consume a personally targeted ad on an Alternate Device, such as their mobile device, or leave the room to take care of other business.
  • each participant may also view on their mobile device how much payout they would receive for giving Feedback and they may choose individually whether to leave Feedback on their mobile device or receive further messages expounding on the Marketing Content that interests them while others may continue on with other ads.
  • the following example usage scenario depicts a User independently branching out from group advertising in the Arki ⁇ sTM system. Phillip is hanging out with his college buddies who are all members of Arki ⁇ s. An ad for Samuel Adams beer is selected that is optimal for the group as a whole, but this is not optimal for Phillip individually because his Profile shows he does not drink alcohol. Looking down at his Arki ⁇ s-enabled smartwatch, he is alerted that the ad will only pay him five cents to view and that it does not match his interests, so he decides to instead watch his own personally targeted ad on his smartphone from eTrade to open an IRA while the rest of the group watches a humorous beer commercial on the television.
  • Arki ⁇ sTM cloud servers Since the Arki ⁇ sTM cloud servers know he is in a distracting situation, the servers query him in more in-depth on his smartphone to confirm cognition of the personal ad he views, which he does and earns one dollar. See FIG. 22 and see FIG. 23 .
  • Alice, Bob, and Charlie are in Physical Proximity to each other as detected by their phones and join together into a SyncGroup that includes as a First Device, Alice's registered television which is delivered targeted ads, targeting the SyncGroup as a whole by the Arki ⁇ s server.
  • a SyncGroup that includes as a First Device, Alice's registered television which is delivered targeted ads, targeting the SyncGroup as a whole by the Arki ⁇ s server.
  • FIG. 22 Alice, Bob, and Charlie are in Physical Proximity to each other as detected by their phones and join together into a SyncGroup that includes as a First Device, Alice's registered television which is delivered targeted ads, targeting the SyncGroup as a whole by the Arki ⁇ s
  • Alice, Bob, and Charlie have mobile devices that are connected to the Arki ⁇ s servers and associated with their individual Profiles, additionally, they have joined together into a SyncGroup and are sharing a display that is registered to belong to Alice as noted in her Profile.
  • the Arki ⁇ s server accepts bids to deliver targeted advertising from advertisers whose target audience parameters match the characteristics of the SyncGroup.
  • the Arki ⁇ s server selects from the available bids from Florida Orange Juice, Coke-a-Cola®, and Pepsi-Cola® to choose the advertising message that best fits the Profile preferences of the SyncGroup members individually and collectively and such selected message is delivered to Alice's registered Device.
  • Arki ⁇ sTM system in which Users may branch out from an advertising group is as follows: Bob and Charlie visit Alice in her apartment to watch the Big Game between Stanford (their alma mater) and UC Berkeley. Alice tunes her television to her personal RokuTM Arki ⁇ sTM channel and selects the Big Game. Because each of them is always logged into Arki ⁇ sTM using their mobile device and they are in sustained close Physical Proximity to each other, their Profiles automatically sync up for shared viewing using their previously configured SyncGroup. Because Alice is viewing her personal RokuTM channel and she has synced up with her friends, her channel automatically delivers Targeted Marketing Content optimized for the group as a whole. During halftime, Alice's dad stops by and he also automatically joins into the SyncGroup.
  • a SyncGroup Content consumed by a SyncGroup is earned and paid for by all Consumers of the SnycGroup even though they may be sharing a single Device.
  • a User may choose to sponsor a SyncGroup to allow for a reduced commercial or commercial-free experience, or to tilt a Targeted Premium Content feed toward the perspective they desire.
  • a sponsor may require a portion of any revenue earned by SyncGroup members.
  • conflicting requests may be resolved by selecting the highest bidder.
  • a User who wishes to sponsor a SyncGroup for a party or an event may use Arki ⁇ sTM to send invitations to the event, where an Arki ⁇ sTM User's acceptance of an invite places them into the SyncGroup for the event automatically or after being prompted to join the event's SyncGroup.
  • the following example usage scenario exemplifies group sponsorship within the Arki ⁇ sTM system.
  • Joseph is hosting a party at his house and decides to budget up to $20 to cover a commercial-free feed of the Super Bowl with behind-the-scenes extras during the commercial breaks.
  • Arki ⁇ sTM estimates the viewership at his home by utilizing the number of members in the SyncGroup of Arki ⁇ sTM Users that come to his party.
  • his First Device is coupled with video and audio recording devices to combine the SyncGroup numbers with viewership estimates based on audio identification of voices and facial recognition of faces in the vicinity of the television. This allows for a more accurate estimation of viewers to take into account Arki ⁇ sTM Users whose phones are turned off and non-Arki ⁇ sTM attendees.
  • the final viewership fee ends up being $10.85 based upon the duration and number of viewers coming and going during the game. Eight of his guests are Arki ⁇ sTM Users and each donated $1 towards the cost, leaving Joseph just owing $2.85 for the balance.
  • the video-on-demand service may also be used to deliver Content to public places with commercial Arki ⁇ sTM Profiles.
  • a sports bar or movie theatre could create a Profile that represents their average audience demographics.
  • the DVR could employ video and audio monitoring to gauge the audience size and reaction.
  • the audience size may be determined through face recognition, Jacobs' Method, or other methods. Based on the audience size, the owner is paid for commercials.
  • Arki ⁇ sTM Users at the establishment may register their presence, and may confirm their location though means such as GPS, Wi-Fi triangulation, IPS (indoor positioning systems), cell-tower triangulation, and the like, to receive credit for ads and to help build the demographics model of the establishment.
  • Arki ⁇ sTM Users would have their Profiles coupled with the specific screens in their proximity and thus influence the Targeted Marketing Content being delivered to their locale within the bar.
  • the owner of an establishment may specify in their Arki ⁇ sTM settings whether they would prefer to maximize profit from advertisements by playing Targeted Marketing Content which is heavily influenced by the crowd of Arki ⁇ sTM Users present at any given time, or gain less in profit from advertisements but have more influence on the advertisements that are playing.
  • AMC theatres rolls out Arki ⁇ sTM for their pre-movie Content and offers free movie tickets for a subsequent show for viewers that choose to sign up for the first time to the Arki ⁇ sTM network.
  • Arki ⁇ sTM Users check-in with their phones at the screen they are viewing and are credited for commercials they view in the theatre.
  • the pre-movie Content presented varies dynamically based upon each movie's projected audience demographics and varies as Arki ⁇ sTM theatergoers arrive and register in the theatre.
  • Arki ⁇ sTM Users When Arki ⁇ sTM Users are synchronized together into a SyncGroup, advertisers may compete with each other to deliver Targeted Marketing Content to the group as a whole. In some embodiments, advertisers may place bids that include an attribution of the bid across each of the individual SyncGroup members.
  • a bid may include sub-bids for each proper subset of the SyncGroup and thus may place a premium on some form of group participation (e.g., the whole group or a majority of the group, or some key influencers of the group).
  • the SyncGroup members may choose to redistribute the payout attribution among themselves differently than it was assigned by the bid. For example, one group member that would earn much more than the others might agree to share a portion of their proceeds with the other group members in order to encourage participation and a shared group consumption experience.
  • the SyncGroup members may utilize their individual Profile Content filtering preferences to construct the SyncGroup's Content filtering preferences. There are a variety of ways their individual preferences may be combined, depending on the embodiment. At one end of the spectrum, they may choose to filter Content to that which satisfies all SyncGroup members' individual filtering criteria. At the other end, they may choose to filter Content to that which satisfies any member's individual filtering criteria. In other embodiments they may also pick somewhere in between these two ends of the spectrum, such as Filtering Content to that which satisfies a majority of SyncGroup members' individual criteria.
  • SyncGroup members may also pick and choose how to filter Content, within this spectrum, along different Content filtering dimensions (e.g., humor criteria may be based on satisfying the majority, whereas moral criteria may require satisfying everyone, and interest criteria may only require satisfying one member).
  • the selection of SyncGroup Content filtering choices may be tailored though the SyncGroup's Profile page accessed from a mobile phone, tablet, computer, DVR, etc. and may require mutual consent as discussed in group consumption (See Section 9—Sharing Targeted Advertising between Users).
  • Arki ⁇ sTM Users that purchase ( 2405 ) Products ( 2400 ) of a company can register/request ( 2420 ) the Marketer ( 2415 ) to be Product graduates ( 2410 ) of a company or its Products.
  • a Marketer ( 2415 ) may configure their Business Profile to indicate their desire to solicit registration ( 2420 ) of graduates ( 2410 ) for the company or its Products so that prospective graduates may discover them and submit applications for possible approval by the company.
  • prospective graduates ( 2410 ) may discover businesses potentially matching their preferences by querying the Arki ⁇ sTM databases for companies and Products that are open to Champions and that align with their Profile ( 2440 ) interests.
  • Such results may be ranked by how well the prospective match aligns with the User's Profile.
  • algorithms to rank how well the prospective match aligns with the User's Profile may take into account the percentage of the User's Profile contents which match with the company's Profile, the percentage of the company's Profile which does not match or conflicts with the User's Profile, statistical inferences based on similar Users, etc.
  • a Consumer ( 2430 ) purchases ( 2405 ) a Product ( 2400 ) and they previously consumed a pitch ( 2425 ) for that Product ( 2400 ) the purchase ( 2405 ) is included in the registration ( 2420 ) so that Marketer ( 2415 ) may take action on that information.
  • Such action may include providing compensation to the Champion ( 2410 ) according to the details of the registration ( 2420 ).
  • the Marketer ( 2415 ) may also adjust the registration ( 2420 ) to account for which pitch ( 2425 ) messages are more or less effective and thus more or less likely to be offered to the Consumer ( 2430 ).
  • Marketers ( 2415 ) may receive Champion pitch ( 2425 ) video submission Registration ( 2420 ) and select which messages they approve for inclusion in their advertising campaigns as well as possibly grade them to adjust the Champion's ( 2410 ) payout rate through registration ( 2420 ). This approval/selection process may be done manually by the company, through an external agency or automatically through, for example, voice recognition and/or lip-reading analyzing the Champion's tone and keywords within the video submission depending on the embodiment. Consumers ( 2430 ) may filter their exposure to graduates ( 2410 ) in one or more topic areas by requiring in their Profile ( 2440 ) that graduates ( 2410 ) have a high integrity rating and/or have used the Product ( 2400 ) for at least some minimum time frame.
  • a Champion may substantiate their claim to having used a Product by many means such as the attestation of another User, scanning a QR code included inside the Product's packaging, supplying a confirmation code included inside a product's packaging, linking their Profile to a credit card used to purchase the Product, linking their Profile to a store account used to purchase the Product, providing a receipt of their purchase, providing a video of themselves using the Product, etc.
  • Other types of Champion messages include live performances that integrate the marketing message being promoted by the Champion. This can take many forms such as: standup comedy routine, magic show, juggling act, or simply a straightforward extemporaneous message. Hybrid performances are also possible whereby a live Champion combines their performance with on-screen prerecorded Content.
  • Arki ⁇ sTM Consumers ( 2430 ) that are consuming a Champion's performance pitch ( 2425 ) may offer their services to document the live performance by noting in their Profile ( 2440 ) that they are willing to be a videographer or audiographer.
  • the Arki ⁇ sTM system may allow the Marketer ( 2415 ) to designate via Registration ( 2420 ) and pay a willing recorder to document these live messages so that they may be reused and analyzed by those not present. Such documentation may also allow for feedback ( 2435 ) confirmation of the Champion's message and facilitate payment for their services via Registration ( 2420 ).
  • a Champion ( 2410 ) may register ( 2420 ) a description of their pitch ( 2425 ) performance in the Arki ⁇ sTM system databases that may include show times, criteria required for spontaneous exhibitions, performance descriptions/genre/classifications, etc. in order to facilitate the easy location of Champion messages and performances by other Consumers.
  • Consumers may annotate the database description in Registration ( 2420 ) with the addition of Feedback ( 2435 ) in the form of reviews, ratings, video/audio recordings, confirmation of performance information, etc.
  • Mobile device applications may facilitate the addition of information by detecting or confirming a User's consumption of a performance and facilitating uploading of recordings, reviews, ratings, etc.
  • An example usage scenario describing a User who wishes to Champion a Product or service through the Arki ⁇ sTM system is as follows: Robert can juggle lit torches and has integrated his performance with an advertising message for Geico® auto insurance. He has been invited through his Arki ⁇ sTM Profile to a swimming party next Saturday evening with many friends that know him He decides to publish a Market Request to Champion Geico® auto insurance at the party to see if there is sufficient interest. There are twenty guests invited to the party using the Arki ⁇ sTM system. These guests receive notice of the Market Request and may see Robert's Feedback and reviews of prior performances of his Geico® Champion message. These guests may then decide whether they wish to support the Market Request. Twelve of the guests indicate their support with one objecting and the rest abstaining.
  • a Champion ( 2410 ) may give permission in their Profile ( 2440 ) to create new pitches ( 2425 ) such as in the form of virtual ads (based on samples of their likeness and voice) or reuse existing Champion ads, after their death with the proceeds being paid to their estate.
  • Arki ⁇ sTM provides a system of synchronizing the now-deceased Champion with Products that would have fit with their aspirations and values as determined by independent third parties to ensure integrity.
  • the foregoing embodiment may entail statistical analysis of a Champion's Profile to judge a product's match level being sufficient to be a match. Such analysis may include matching the deceased Profile to find similar Profiles who are known to acknowledge or disavow a Product affinity for the purpose of predicting whether the deceased Champion would have an affinity for the Product.
  • the aforementioned matching may be carried out by a trained neural network, or any other means employed by matching schemes such as prediction algorithms similar to Netflix® movie suggestions.
  • the Champion's Profile may have been configured during their life to require review and approval of prospective matching Products after their death by their family, agent, estate, and/or other approved entity they trusted.
  • similar approval system may apply to living celebrity figures that may not want to spend the time to review and approve all the ways their likeness could be reused to create new virtual advertisements, but are willing to allow their likeness to be reused provided the Product meets their values and constraints.
  • a Marketer may place a premium on delivering messages to a SyncGroup that includes one of the company's registered ( 2420 ) graduates ( 2410 ).
  • the Champion's position is divulged to the group to ensure transparency and integrity.
  • the SyncGroup may be surveyed to see if members are willing to listen to someone from their group that is a Champion for a particular Product and even pay the other group members for answering yes or no and giving their reasons for saying so. Their decision as to whether to listen can be aided by Arki ⁇ sTM presenting the reputation details of the Champion ( 2410 ) based upon Feedback ( 2435 ) they have received within the Arki ⁇ sTM registration ( 2420 ) system.
  • the Marketer ( 2415 ) can decide, based upon survey results, whether to engage the Champion ( 2410 ), perhaps requiring total consensus or a supermajority before so deciding. After consuming the Champion's ( 2410 ) pitch ( 2425 ) message, these Consumers ( 2430 ) may be surveyed for Feedback ( 2435 ) to rate the effectiveness of the Champion's ( 2410 ) pitch ( 2425 ). This Feedback ( 2435 ) rating allows Marketers ( 2415 ) to choose Universities ( 2410 ) who meet their requirements and/or select graduates ( 2410 ) who have been rated highly in Feedback ( 2435 ) by similar audiences in the past.
  • Consumers ( 2430 ) may see a predicted Feedback ( 2435 ) rating of how Consumer ( 2430 ) will likely Feedback ( 2435 ) when rating the pitch ( 2435 ) Content. This may be based upon Content ratings you have already supplied that link you to like-minded people who have already consumed the pitch ( 2425 ) Content (e.g., like the algorithms Netflix utilizes to rate movies in order to predict what you will like).
  • the following example usage scenario describes one embodiment of the system in which a User becomes a Champion for a Product.
  • Dexter is a long-standing customer of CutCo® kitchen knives. He is very impressed with how sharp the knives are and likes the fact that they are made in the USA, and has therefore decided to accept an email invitation he received to register himself as an Arki ⁇ sTM Champion for these knives. He is entertaining another friend at his house and they decide to watch an a la carte HBO movie together. To pay for the movie, they agree to watch a one-minute commercial for CutCo® knives, knowing that Dexter is a Champion for the company. The message ends with reference to the fact that Dexter can demonstrate the knives and talk about his own use of them and offers a 20% discount for any knives purchased that evening. Dexter selects one from the kitchen after the message is delivered and briefly goes over why he is so happy with them (e.g., their ability to cut human flesh so effortlessly). His friend tries to leave early.
  • Users may detect the physical presence of highly rated graduates (through GPS, mobile networks, Wi-Fi triangulation, and the like) and publish a Market Request for the Champion to perform for those present.
  • a User may alert all similar Users within the vicinity whose Profile preferences allow such communication, to support the initial Champion Market Request. This data may be transmitted to the Champion so they can gauge/determine how many Consumers would come to the performance.
  • Champions may decline such requests or offer conditions under which they would be willing to perform. For example, the Champion may require each participant's payout for the Targeted Content be allocated to themselves. If a sufficient number of those present agree to the Market Request terms agreed to by the Champion, then the Champion would perform their act.
  • a performer may also use this method to advertise their act and collect revenues for their accepted on-demand performances.
  • Arki ⁇ sTM may provide software that automatically detects the presence and/or dissemination of Provider goods and services for the purpose of auditing, detecting, and/or measuring such placement and rewarding the Champion. Automatic computer detection of a product's presence may be performed analogously to facial recognition in photographs but adjusted for object detection. Processing to transcribe the audio into text may be searched by computerized means for mention of a Product. Positive matches may be subject to manual human review for confirmation and to ensure usage is not sarcastic or negative in nature. Such confirmation process may be facilitated by the Arki ⁇ sTM system and results stored in the system databases for subsequent reference. In additional embodiments, the Champion or other Users may notify a Provider of such placement.
  • a User may earn a bonus payout offered by an advertiser.
  • Product packages may have a QR code (matrix barcode) to identify the Product being consumed and an Arki ⁇ sTM offer. Near the time that a coordinated message is being consumed, the User would scan the QR code to demonstrate that they are simultaneously consuming the Product being sold while the marketing message is being delivered and earn the bonus payout.
  • QR code matrix barcode
  • the Arki ⁇ sTM system discounts for the distraction from receiving Product samples in the payout formula of the Targeted Content that is competing for attention in some embodiments.
  • Such discounting may be agreed upon by advertisers with Arki ⁇ sTM and included in their agreed upon payout formula and automatically apply whenever the foregoing competing messages are presented such that their delivery overlaps temporally with delivery of the other Targeted Content.
  • the system may increase the payout due to the synergy of the messages as agreed upon by advertisers and included in their agreed upon payout formula in some embodiments.
  • the consumption coupled message delivery may be organized around a SyncGroup that may have as its leader the Champion that is facilitating the delivery.
  • the following scenario is an example of one of the embodiments of the System, in which a User is able to utilize SyncGroup functionality for consumption coupled message delivery.
  • Henry indicates in his Profile that he is hosting a Monday night football party next week for a group of five of his male friends and is presented with a shopping offer on his phone while at the grocery store to buy a case of a new Budweiser dark ale, a jumbo sized new Lime chili Doritos chips, and a case of Coca-Cola® to serve at his party since during the show there will be targeted commercials presented to the group for these three Products.
  • Henry In return for serving the Product and providing Feedback on the Product and the commercial messages, Henry will be credited back with half the sale price and each participant will be credited with coupons for half off a future purchase of these Products.
  • Henry scans the QR code with his phone for each of these Products with the Arki ⁇ sTM application to substantiate their being served at the party. After viewing the Targeted Marketing Content for these Products and providing Feedback, he receives a credit for half of his prior purchase. His friends check-in to the party with their Arki ⁇ sTM application and after the commercial message is supplied and they have provided their Feedback, depending upon their responses they receive coupons to buy these or other Products at half off the normal price.
  • Michiko loves Skittles and has spontaneously decided to Champion Skittles today by passing out free samples at the mall starting at 10 am.
  • Another Champion, Lucy had previously signed up to do this starting at 9:30 am, but because Lucy did not arrive as scheduled, her slot is instead given to Michiko, who creates a SyncGroup where she is the leader.
  • She uses her smartphone to receive directions around the mall to locate open-minded targeted recipients. Possible recipients may see details about the samples Michiko is offering together with information about Michiko so they can decide how credible she is and how well her interests align to their own and may then choose to join her SyncGroup and make themselves visible to Michiko on her smartphone so she can locate them.
  • Michiko Once they have opted into the offer and joined the SyncGroup, they can also see Michiko's location and may choose to locate her, the group leader. When they meet up, they may scan the Skittles QR code or bump their phones together (Bump Technologies validation, as Incorporated by Reference) after locating Michiko so that she will be paid for her work. While receiving their free samples, Michiko extolls the virtues of Skittles and tells the story of how she became such a big fan. Because Michiko is at the mall while she is promoting as a Champion, she shares 5% of her earnings with the mall. However, as lunch time approaches at 11:30 Michiko goes home because the mall's agreement with her states that Michiko must suspend giving out free samples during lunch from 11:30 am to 1:30 pm so as not to compete with the food court.
  • Skittles QR code or bump their phones together Bump Technologies validation, as Incorporated by Reference
  • a Champion may be required to have used a Product before becoming a Champion, and generally is sponsored by a Provider to create new material—whether a video advertisement, a pitch, or a live performance—which supports the Provider's Product.
  • a Provider to create new material—whether a video advertisement, a pitch, or a live performance—which supports the Provider's Product.
  • Influencers The informal graduates who promote a Provider's Products or advertisements may be referred to as Influencers.
  • Influencer is a User who likes a particular ad (e.g., because they find it spectacular) and saves it to their Profile so that they can later replay it for their friends in a group sharing event.
  • the Influencer may be able to see aspects of their friends' Profiles (based on their friends' Profile information sharing settings) in order to determine whether any of their friends have previously purchased similar Products, or alternatively, to see a graded list of how well the Product matches the interests of each of their friends.
  • the Influencer may get paid for each friend that they share it with in some embodiments.
  • the sharing may be done one-on-one in Physical Proximity, or virtually.
  • the ad may be shared together with some Premium Content to help defray the cost of the Premium Content.
  • the recipient of a shared commercial may configure their Profile to rank the foregoing shared ads more highly when choosing advertisements for consumption than they would be ranked without the Champion's advocacy of the shared ads.
  • the foregoing ranking adjustment may vary depending upon the identity of the Influencer, the integrity rating of the Influencer, and/or the Influencer's relationship with the recipient.
  • Influencer is one where a User or group of Users bands together to attract more Users to purchase a Product with the goal of reaching a reward threshold when a sufficient number of Users have joined the group and purchased. For example, the group may get a 10% rebate on their purchase if they are able to link up ten purchasers in a 24-hour period to create a spontaneous cooperative to buy Products.
  • Another form of Champion is one where a Champion agrees to include RFID tags on Products or on their person for things they are promoting when they are being presently worn or used.
  • RFID tags allow for automatic identification of Products (e.g. clothing, mobile devices, shoes, watches, sports equipment, glasses, perfume, foods, drinks, etc.) such that other Users in Physical Proximity to the Champion can detect the RFID tags with their mobile device and retrieve information about such Products on their mobile device.
  • a Champion may include in their wardrobe clothing that they are promoting and when other Users see them and like what they are wearing, they are able to easily retrieve information about what they are wearing.
  • a User likes the shirt a Champion is wearing and such shirt includes an RFID tag because they are championing it, a User can easily bring up details about the shirt if they like it and possibly order their own.
  • a Champion may place or activate an identifying RFID tag on their person.
  • a Champion's own mobile device in Physical Proximity may detect the RFID tags on the champion's own body and communicate such tags to other Users in Virtual Proximity.
  • a Champion may just publish in their Profile the Products they are presently using for detection by other interested Users analogously to RFID tags.
  • cooperating broadcasters may provide Arki ⁇ sTM with an alternate live broadcast feed to continue live coverage while their generic broadcast stream goes to commercial breaks.
  • the broadcasters may be paid by the Consumer through Arki ⁇ sTM for this live feed at a rate commensurate with what they receive from the commercial messages being supplanted by their continued live feed. For example, in live sporting events, added in-depth replays, interviews, and commentary may be provided, or behind-the-scenes locker room discussions and strategy sessions may be exposed.
  • alternate feeds would evolve where a User's Arki ⁇ sTM Profile preferences would automatically select the feed that best matches their interests.
  • the Content could be more focused towards that team, or alternatively, if you are interested in a particular position, such as the quarterback, the feeds would be selected to emphasize that preference.
  • an Arki ⁇ sTM User could pay to sponsor Premium Content ad-free, much like how one used to put money into a jukebox to hear a song, but everyone in the room got to listen.
  • Arki ⁇ sTM may allow live sports events to change how they are played so that they no longer have arbitrary commercial breaks and hold up game play to wait for the commercials to end before resuming play. Instead, the natural breaks that occur in the game between plays and during time-outs become sufficient to consume commercials if desired and pay for the cost of receiving the Premium Content.
  • a live program e.g. a football game
  • other unrelated or independent premium channel Content could be temporarily tuned in and upon the original live Content's return from commercial break, the Device or individually customized feed could automatically return to the Primary Content channel being viewed or split the screen and show two or more feeds.
  • the commercial break Premium Content may even be expanded into the traditional broadcast Premium Content.
  • a broadcast network may produce alternate feeds that target specific demographics in return for a premium from the Consumer.
  • a broadcaster could produce two or more additional feeds beyond their traditional generic broadcast that target the fans of the two teams competing.
  • the team-targeted feeds could include announcers with an affinity towards the team whose fans are being targeted; further, the choice of cameras and instant replay perspectives during the game could be adjusted to serve the desires of the fans of a particular team. Additional feeds could also be created around other target audience metrics, for example, when watching football, one demographic may prefer to only view the game with a focus on the quarterback.
  • a User may associate their Fantasy Football team (or other fantasy sports team) with their Profile in order to receive an anthology of the plays in which each of their Fantasy Football team members featured prominently during the last few hours or days. This can be done by linking a User's Arki ⁇ sTM Profile to a Fantasy Football application on a mobile phone or other computing device.
  • a User's Arki ⁇ sTM Profile may import the lineup and other details of their Fantasy Football team. Such importation may be regularly synchronized by the Arki ⁇ sTM servers or the Fantasy Football application may link a User's information with Arki ⁇ sTM and proactively send updates and changes to a User's team as they are affected.
  • the Content Providers may tag play Content with identifiers for the players who figure prominently in each play.
  • Users may tag plays they are watching to crowdsource the building of the database. Other Users that benefit from the tagging produced may compensate the Users contributing such tagging for their efforts by allocating a portion of the Content fee to those Users.
  • Each player tag may have entry and exit time points within the Content wherein the player's action is most prominent or important.
  • the tags may be graded in terms of the magnitude of their role in a play (either positively or negatively).
  • the Content may be tagged to identify the entry and exit time points for individual plays wherein individual players may come into and out of key action. The plays may be graded in terms of dramatic impact as well as overall scoring potential and actual impact.
  • Grades may be crowdsourced, so that the dramatic impact, scoring potential and actual impact may be denoted as the average grade for each category.
  • Users may also be allowed to leave comments on each play, which may be subject to filtering, review, and deletion for inappropriate Content.
  • Arki ⁇ sTM can easily allow a User's Profile to specify queries of exactly what they value and wish to see in their Fantasy Football team members and thus build custom alternate Premium Content that a User may view in whatever fashion they desire such as during commercial break while they are watching a game or as a standalone custom show without interruption.
  • a User may specify which Fantasy Football rules they would like their Arki ⁇ sTM Profile to reflect.
  • Arki ⁇ sTM may allow the User to select from a drop-down list of league types each with preset rules, for example head-to-head leagues (where a new team is picked every week and matched against one other team), “keeper” leagues (where rules dictate the number of players that can be kept from year to year, and there is a penalty for keeping a player”), etc. Users may submit new sets of rules for approval to Arki ⁇ s.
  • Fantasy Football league SyncGroups may be created where the group leader acts as the league manager, and creates league rules for the other SyncGroup members. These rules may have to be approved by, for example, a majority vote within the SyncGroup.
  • SyncGroups may also be utilized to facilitate trades of players from one User to another. A majority vote within the SyncGroup or some other form of group consent may be required to approve a trade.
  • Users may also use Arki ⁇ sTM credits as a wager, and may transfer credits to another player for gaining more points throughout the Fantasy Football season.
  • Arki ⁇ sTM credits may be used as a wager, and may transfer credits to another player for gaining more points throughout the Fantasy Football season.
  • this feature is subject to state and federal laws and may not be available in all states or countries.
  • a Marketer When a Marketer buys access to deliver Content to a Consumer, by way of the Marketer's criteria matching the Consumer's Profile for the purpose of delivering Content, they may gain the right to report on their relationship with the Consumer such as whether the Consumer commits to making a purchase from them and their performance on any such commitment. In a preferred embodiment, such reporting will retain the anonymity of the Consumer from the Marketer. At the same time, the Consumer may earn the right to report on their relationship with the Marketer such as whether their Products fulfill the promises of any Marketing Content provided to the Consumer.
  • Arki ⁇ sTM may combine the information gathered by all the parties to compute or generate individually custom tailored scores for any pairing of a Consumer and a Marketer, such as shown in FIG. 15 and FIG. 25 .
  • This scoring takes into account the general Consumer's behavior as well as their specific behavior towards the one Marketer being explored.
  • the Consumer's score is actually a set of functions (either calculated instantaneously or over a period of time) that predict the likelihood that the Consumer will have performed a particular action immediately or by a given time point in the future (timeframe of question from marketer 2512 ).
  • Arki ⁇ sTM system databases 2504 calculate (lookup function arguments 2514 ) for each Consumer/Marketer (Consumer profile information 2508 /Marketer information 2510 ) pairing query and context time, location, social, and adjacent Content 2516 , and stored long enough to determine whether or not an advertisement will be added to a Consumer's queue (Does probability justify bidding? 2520 , Determine bid based on Profile+probability 2524 and Submit content into queue of consumer for possible selection 2526 in Content selector 208 ). Examples such as shown in FIG. 26 include a function to predict the likelihood that the Consumer will buy, or lease, a new car in general, or another more specific to buying/leasing a new car through that particular Marketer. Other similar functions might suggest their proclivity to buying a new car or a used car, whether they would likely pay cash or finance, whether they would trade in an old car, etc.
  • the Consumer is given scoring information on the Marketer to predict the likelihood that the Marketer will deliver on its promises or a prediction as to the likelihood that the Consumer will judge the Marketer as meeting their criteria.
  • the database of information is accessed by the Arki ⁇ sTM system through a published API ( 2710 ) that allows licensed third-party applications to be plugged into the platform ( 2720 , 2722 , 2724 , . . . ) and to provide additional value or functionality beyond what Arki ⁇ sTM provides.
  • Such plug-ins generally function within the Arki ⁇ s system and do not export or expose any information to the outside public network ( 2750 ) except under strict security controls and monitoring to ensure privacy.
  • Only the public facing Profiles ( 2730 ) are accessible through the API.
  • the Master Profiles ( 2740 ) are held under strict security controls to reduce the chance of unauthorized access.
  • These controls may include the use of, for example, private networks ( 2760 ) that may employ laser communications systems instead of the Internet when moving the Master Profile data around the world to reduce the chance of unauthorized snooping to glean information.
  • the interface which faces the Internet may only access a single Profile at a time to allow individual maintenance of a Consumer's own Profile and may require authentication. This helps prevent wholesale intrusions of the whole database.
  • the User may choose to omit certain information from their Profiles to aid in privacy preservation. For example, blank fields may be automatically seeded with false demographic information to increase the privacy of the system, should the Master Profile database be breached. Such erroneous information is omitted when queried through the published APIs and is only present as an added security measure in case the Master Profile database was directly breached.
  • the Marketers query for a set of Profiles that meet their criteria; further drilling down for additional details on matching Profiles is subject to tracking and analysis to confirm the database is not being abused.
  • Confirmed abuse can result in a Marketer (or any User) being restricted or barred from accessing the database (or using other elements of the Arki ⁇ sTM system) or being required to hire and pay for an independent overseer to audit and supervise all their activities until such time as they are deemed trustworthy again.
  • Aberrant patterns that are detected include systematic rotation of query parameters that could be used to eventually query the whole public facing database for prohibited replication of the database outside our system, or the use of false demographic information intentionally placed within the system to detect abuse.
  • any set of expansive queries that in aggregate covers large portions of a specific Consumer's public facing Profile are subject to review relative to their legitimate need for the information, or if not, then for flagging for manual review as possible abuse.
  • User may indicate in their Profile that they wish to be omitted from any queries where the set of matching Profiles is small or below a certain threshold to reduce the chance that their identity might be surmised by constructing a query to locate a known person's potentially anonymous public Profile.
  • Consumers ( 1560 ) of Content ( 1520 ) may be asked by Content Producers ( 1510 ) to supply Feedback ( 1580 ) on Targeted Content they consume, receiving a notification (e.g. visual, audio, tactile) on an Arki ⁇ sTM enabled Device that their Feedback is wanted.
  • a notification e.g. visual, audio, tactile
  • the Feedback may be used to confirm that the Consumer actually consumed the Content for which they may be getting paid, additionally, Feedback may be used to gauge a person's interest in a Product after seeing a commercial message and to measure their receptivity to a message to allow a Content Producer to tune their delivery.
  • the Feedback may be used to measure how satisfied the Consumer is with the Content and their likelihood to recommend it and consume follow-up Content.
  • the immediacy of Feedback allows an advertiser to quickly hone their marketing message with a small set of initial Consumers to make it more effective with a larger set of subsequent Consumers.
  • Feedback which is used to gauge whether a Consumer actually consumed the Content may include open-ended or multiple choice questions regarding advertisement details only recognizable to a User who actually consumed the ad, for example: “Were the characters sitting in a) the office, b) a park, c) a restaurant, d) a house?”
  • Feedback which is used to gauge a User's interest in a Product may be supplied by the advertiser and may include one or more of: open-ended questions, multiple choice questions, rating scales, rank order scaling questions, semantic differential scales, constant sum questions, and/or the Likert response scale, etc.
  • Feedback questions which are used to gauge a User's interest in a Product may be presented to the User consecutively, or a survey may be split into portions which are then presented to the User in an order influenced by the time left in a commercial break and the monetary value the User will receive for each survey portion.
  • Feedback may be provided through a User's Alternate Device or entered through an interface presented on their First Device and controlled by their Alternate Device (e.g., smartphone), remote control, or other custom hand-held hardware device.
  • Alternate Device e.g., smartphone
  • the User By turning the commercial message into a bidirectional communication, the User becomes more engaged with the message, more intelligent and thoughtful, and more likely to respond favorably to a message that is providing real value to the User. This should raise the whole playing field of commercial messages and result in smarter buying populations and more interesting and useful commercials while eliminating, through competition, those messages that are not helpful. See FIG. 28 .
  • a User has provided some Feedback on a zero to five sliding scale in three parts, an overall rating of the Content, a rating with respect to how funny the Content is, and a rating of how well the Content matched the User's interests.
  • the Feedback questions may be organized as a tree where, depending upon the response at each level of the tree, the Feedback questions continue on a chosen branch that accounts for their previous responses. Some branches are terminal based upon the Marketer's determination that a sale is unlikely, which may be based upon past experience with similar answers from similar Consumer Profiles and the resulting sales outcomes. In the case of a commercial message, some responses may lead to follow-up Targeted Marketing Content to reinforce the Marketer's message and allay discovered concerns of the Consumer and to ultimately result in a sale. The extent to which a User is willing to answer Feedback questions affects their payout; this also applies to Feedback on Premium Content. Feedback may result in payout that is proportional to the amount of Feedback given.
  • Feedback may also be provided during Content delivery.
  • the User may provide continuous/ongoing Feedback using their smartphone or other Alternate Device.
  • a User may provide Feedback in whatever dimensions the Content Producer desires.
  • a User could give Feedback as to how funny or compelling a message is as it unfolds.
  • sensor input data may be utilized to automate the gathering of Feedback.
  • a microphone on a smartphone may be used to detect and measure laughter levels and correlate them with Content delivery time points.
  • talking during Content may be measured to detect User engagement (talking about the Content, determined by voice recognition and/or lip-reading of keywords) and disengagement (talking about something else).
  • the accelerometer on a smartphone may be utilized to detect when a User gets up out of a chair and how quickly they did so to measure audience excitement such as upon a key scoring event in a sports game.
  • Feedback may be collected if the Consumer actually follows through and purchases the Product being advertised. After purchase, the User may choose to review the original message and judge it relative to the actual Product received. In a preferred embodiment, the Feedback continues to be collected over the lifespan of the product's effectiveness. Consumers that follow through also have increased integrity ratings that better their odds of receiving better payouts from Marketers.
  • Marketers In return for access to the system, Marketers agree to terms of service that may prohibit them from engaging in activity that could be used to identify individuals, retaining any information on Consumers, or attempting to cross-reference information within the system with information aggregated by outside marketing data collectors. In a preferred embodiment, if a Marketer is found to violate any of these provisions, their actions will be publicized as part of their Profile and they will be excluded from marketing to those Consumers whose filters preclude advertisers who are found to violate the terms.
  • audience reaction may be measured by correlating it with the presented Content to gauge the value and effectiveness of Content.
  • audience reaction may also be measured by recording room video and performing facial recognition to determine at what points attention is directed towards the video Device and at what points it is not, to further gauge the value and effectiveness of Content.
  • facial recognition may also gauge audience emotional state/mood by detecting facial gestures such as smiling, frowning, and laughter and/or other gesture recognition such as clapping, thumbs-up or thumbs-down, etc.
  • the Profile preferences of a particular User in the group may prohibit collecting any data while they are in the vicinity.
  • the audio and video and other data collected may be scrubbed to delete or censor out their presence. This may be done using vocal recognition to tie known voice prints of known User Profiles to specific voices in an audio feed and removing any unrecognized prints or prints recognized to match a Profile that controls how their data is collected and has specified they not be recorded.
  • individual video frames may be analyzed to perform facial recognition against known faces so that unknown faces or recognized faces with controls over data collection may be filtered out as required.
  • the Arki ⁇ sTM system may annotate adjacent video frames with the identity of subjects to track and maintain identity across frames where individuals may not be accurately identified, such as when a face turns away or is partially or wholly obscured in some fashion.
  • the audio print recognition may be combined with the video to provide greater accuracy, for example, by combining facial recognition and associated lip movements (lip-reading) in the video with the voiceprint that corresponds to those movements.
  • Other clues, such as clothing being worn can be used to help track an individual once their face is not sufficiently viewable in a video feed where their recognized face is associated with the clothing they are wearing, thus allowing continued recognition when their face is not visible but their clothing is visible.
  • voiceprints when multiple audio feeds are present, voiceprints may be assigned three-dimensional locations by triangulating the voiceprint across the audio sources. Such location aware prints may also be combined with video to further refine identification of an individual in a video. Just as multiple audio signals may be present, so may multiple video signals be present and combined to provide high fidelity identification of Users and their locations and actions in three-dimensional space.
  • Reviewers may share in advertising and/or revenues for goods & services that are purchased in part based upon information in their reviews.
  • the revenue share they receive may decrease over time; for example, their share may decrease by 2% for every day that elapses since their review was last referenced by a User up until the point that User actually makes a purchase of a reviewed item.
  • the revenue share may be diluted across all the reviews a User considers before a purchase. Highly regarded/rated/trusted reviews may garner a disproportionate share of revenues to reflect their greater value.
  • a Provider of a Product may allocate 2% of the sales price to Reviewers that contribute to the User's decision to buy.
  • the User may reject reviews paid for by the Provider/seller and instead pay for access to reviews.
  • Users may also self-gauge the value they feel they received from a Reviewer. This valuation may be compared to the average of all Users self-gauging a Reviewer. When a User's self-gauged value is significantly lower than the average yet the User appears to have followed the recommendation of the Reviewer, the User's value may be attributed a greater value than they self-gauged.
  • the Reviewer may earn a portion of revenue for purchases based upon their reviews that are deemed of value.
  • Reviews may also be treated as targeted commercial messages or incorporated into such messages where the Goods & Services Provider being reviewed targets a potential buyer by presenting them with an advertisement that includes reference to the Reviewer's information. In such cases, the Reviewer may share in the revenues paid to the consumer of the targeted commercial message. In some embodiments, Reviewers may earn money for downstream purchases, for example, if Alice provides a review to Bob and Bob purchases based in part upon Alice's review and Bob now provides a review to Charlie and Charlie purchases based in part upon Bob's review, then Alice earns a portion of Bob's earnings from Charlie's purchase since Bob's original purchase resulted in part from Alice's review.
  • a User may register to follow Reviewers they trust in the Arki ⁇ sTM system and require in their Profile that Content must be recorded in the Arki ⁇ sTM system to have been evaluated by one of their trusted Reviewers or Reviewer groups who report their independent findings to the Arki ⁇ sTM system about the marketing message, checking for factual accuracy and/or testing the Product being sold in dimensions/aspects important to the User (as indicated in their User Profile) such as its reliability, recyclability, ease of use, aesthetic appeal, green manufacturing, fair trade, fair wages for workers, origin of manufacture, etc.
  • a User's Profile may include entries for each Reviewer a User is following as well as include filtering preferences such as any requirements Content must satisfy before it may be presented to a User.
  • a Profile may also record the aspects of a review that are important to a User along with a measure of their relative importance. For example, a User may assign relative percentages to aspects of a review in their Profile, assigning 0% to those aspects that are not important and increasing percentages to those aspects that are increasingly important to them. Aspects may include, both subjective and objective measures, including accuracy of message, efficiency rating of a Product, aesthetic appeal, durability, etc. Reviews may be stored in the Arki ⁇ sTM databases along with aspects or dimensions being judged/assessed by a Reviewer as part of a review. A User may require their Reviewers to have purchased and used a Product, as registered in the Arki ⁇ sTM system, before they will consider paying for a review.
  • Such requirements may be included as part of a User's Profile, and database review entries may include whether a confirmed purchase by the Reviewer is present and may reference the purchase proof.
  • a Reviewer may have their friends attest to their using a Product on a regular basis and such attestations may be recorded in the attester's Profile and/or in the attested Reviewer's Profile.
  • falsely attesting to another's behavior may result in penalties such as reduced revenues, reduced Arki ⁇ sTM integrity score, and/or temporary exclusion from direct participation in Arki ⁇ sTM or required to use a trusted proxy (who is paid a portion of revenues) to access Arki ⁇ sTM on their behalf.
  • This process may be applied to Political Action Committee (PAC) ads and a User may require that only PAC ads that have been fact checked by a specialized reviewing group they trust may be presented to them.
  • PAC Political Action Committee
  • a sufficiently large group of Users may influence the political discourse by only being reachable by candidates and/or PACs that adhere to accepted norms of the group and whose messages are independently audited for accuracy.
  • Content may include metadata stored in the Arki ⁇ sTM databases to associate Content with Reviewers, ratings, scores, blurbs, blog entries, etc.
  • a Reviewer may also include metadata stored in the Arki ⁇ sTM databases to associate the Reviewer with their reviews of Products, Reviewer name, Reviewer integrity rating score, attestations (including visibility e.g., public, only attestor's friends, only Reviewer's friends, only friends of attestor or reviewer, only friends and friends of friends), Reviewer consumption/purchase confirmation of Product including date and time and method of independent verification, etc.
  • An attestor may also include metadata stored in the Arki ⁇ sTM databases to associate the attestor with their attestations, Reviewers attested, attestor integrity score, name of attestor, visibility of attestations, dates of attestations, etc.
  • the Content ranking system of Arki ⁇ sTM prioritizes the presentation of Content according to a Consumer's preferences as stated in their Profile.
  • Such ranking system has a configurable algorithm that can be configured, substituted, or modified by other plug-in algorithms and variable controls. Such algorithms account for these Consumer preferences and create a prioritized queue of Content for the Consumer to consume. Such queue is drawn from all Content whose targeting criteria matches the User's demographics and thus may be presented to the Consumer if the Consumer's preferences also result in a match as determined by the ranking system algorithm.
  • a Consumer may prefer that Targeted Marketing Content only be ranked according to the payout offered by a Marketer.
  • all other aspect variables are weighted with a value of zero and the aspect variable of payout is weighted with a value of one, resulting in a ranking score for each possible Targeted Marketing Content such that the highest paying Content for a Consumer is ranked first, followed by the second highest paying Content, etc. all the way down to the lowest ranked Content being the one that offers the lowest payout.
  • the Targeted Marketing Content that was first (chronologically) offered to a Consumer may be ranked ahead of subsequently offered Targeted Marketing Content with matching score.
  • a Consumer may prefer that Targeted Marketing Content be ranked according to trusted reviews providing grades on a scale of 1 to 10 in the areas of humor, carbon-footprint of Product, and working conditions for manufacture.
  • humor may be weighted 20%
  • carbon-footprint may be weighted 45% and working conditions 35%, such that the average review rating of all Reviewers a Consumer trusts that have provided a review rating in that category for that Targeted Marketing Content/Product is multiplied by the Consumer's weighting in that aspect and summed together with the other aspects to generate a ranking score for each possible Targeted Marketing Content such that Content may be ranked and presented in order of rank.
  • Such rankings may be dynamically computed for each point at which a Consumer is ready to receive a new piece of Content to account for changes including: new trusted reviews, the changing set of available Targeted Marketing Content that is matched to a Consumer over time, and updates to a Consumer's preferences.
  • a Certifier is a special kind of Reviewer, which may be a Non-Governmental Organization (NGO) and which provides Independent Reviewer Certification about Providers and/or Products along specific metrics.
  • NGO Non-Governmental Organization
  • these certifications are stored within the Arki ⁇ sTM system databases and retrieved in response to a User's Product search or other query.
  • these Certifiers may share in advertising revenues, and/or may share in revenues (e.g. advertising and/or purchasing) when goods are purchased based in part upon information in their Independent Reviewer Certifications.
  • An Independent Reviewer Certification provides a trusted independent check on facts put forth by a Provider or on measured standards applied across multiple vendors.
  • a User may wish to only buy goods that are more than 50% manufactured in the United States, and thus may rely upon one or more Certifiers to independently fact check any such claims put forth by a Provider. Just as negative reviews are also credited in a decision, so are reviews that denounce a Provider as not meeting the mark.
  • a Certifier's Profile may include associated metadata stored in the Arki ⁇ sTM databases including: trust level, integrity rating score, the kind of Certifier (e.g. NGO, independent person), certifications provided including scores and ratings applied to Content and Products, number of Users that trust a Certifier, number of Users that trust Certifier above a threshold (e.g. above 75% trust level), number of Users that trust Certifier at a level in the top quartile of all Certifiers they trust (to normalize trust levels across Users), etc.
  • trust level integrity rating score
  • the kind of Certifier e.g. NGO, independent person
  • certifications provided including scores and ratings applied to Content and Products
  • number of Users that trust a Certifier number of Users that trust Certifier above a threshold (e.g. above 75% trust level)
  • number of Users that trust Certifier at a level in the top quartile of all Certifiers they trust to normalize trust levels across Users
  • a Certifier may be paid in many ways through the Arki ⁇ sTM system for their certification services, depending on the embodiment. These ways include all the ways in which a Reviewer may be paid that are described above in Reviewer Revenue.
  • a User may subscribe to a Certifier's certification information by allocating a specific percentage of all the advertising revenues they receive for Products certified by that Certifier. Such a percentage may be under complete control of the User and adjusted in their Arki ⁇ sTM Profile from time to time, as they desire.
  • a Certifier may designate a minimum percentage share that they require in order for a User to subscribe to the certification information they provide. In a preferred embodiment, when a User chooses to subscribe to a Certifier's certification information, an access token is created for the User.
  • This access token is comprised of multiple fields, which may include, but are not limited to the following: an identifier associated with the current session (i.e. attempt to access Content), a User identifier, privileges, restricting group identifiers, etc.
  • Subscribing to a Certifier's certification information may be required by a Certifier in order for any of their certification information to become visible to a User, or alternatively, a Certifier may provide sample selected certification information to all Users while their complete certification information may be reserved for subscribers.
  • Another embodiment involves providing summary or overview certification information, such as only the beginning of an Independent Reviewer Certification report and selected certification facts/grades to all Users and reserving the complete certification report for subscribers.
  • a User Profile which is not associated with an access token for the particular Certifier may temporarily be assigned a “guest” access token—this may include fields identifying the current session (i.e. attempt to access content), privileges of a non-subscribing viewer, restricting group identifiers to restrict access to paid certification information, etc. If a Certifier decides to restrict all of its certification information so that only paying Users can view said information, the lack of an access token associated with a User may bar the User from viewing all information. In these situations, a temporary access token may contain fields where restricting group identifiers bar all access, or all privileges may be disabled.
  • the lack of an access token may generate a “guest” token associated with the session which contains fields giving the User full privileges in accessing the Certifier's Content, or the Content may not require an access token.
  • the presence of a User identifier in these “guest” access tokens may depend on the User's privacy settings or the Certifier's Profile settings.
  • a Certifier may offer à la carte pricing where a User, instead of subscribing, may purchase specific certification information or a specific certification report. Such à la carte pricing may be fixed, suggested, minimum, or variable based upon User demographics.
  • a User may subscribe to a specific kind of certification information a Certifier provides instead of to all the certification information they supply (e.g. a Certifier's certification grade of made in the US or certification of a manufacturer paying a living wage to workers in China).
  • a Certifier's certification grade of made in the US or certification of a manufacturer paying a living wage to workers in China e.g. a Certifier's certification grade of made in the US or certification of a manufacturer paying a living wage to workers in China.
  • the foregoing and following mechanisms describing how a Certifier may be paid, their records maintained, their certifications are shared, etc. can also be adapted and utilized for paying Reviewers for reviews.
  • the Profile of an Certifier may be associated with metadata stored within the Arki ⁇ sTM databases, including but not limited to: the category of Certifier (e.g. political organization, community group, special interest group), the date of the Certifier Profile creation within the Arki ⁇ sTM system, the number of certifications created by the Certifier, and statistics about associated Users who trust or subscribe to the Certifier (in a preferred embodiment, without revealing the identity of these Users).
  • the aforementioned metadata may be public to Users, depending on the privacy settings of the Certifier.
  • the aforementioned metadata may also be selected, deselected, or given a relative importance (e.g. 28%) by a User in order to find Certifiers matching the interests listed within their User Profiles.
  • Statistics about Users may include, but are not limited to: the number of Users who subscribe to the Certifier, the percentage of Users who have unsubscribed from the Certifier, the number of Users who trust the Certifier (e.g. the percentage of Users who have given the Certifier a minimum trust level rating, for example 70%; the percentage of Users for whom the Certifier appears in the top quartile of trust levels associated with Certifiers, etc.) Certifier Profiles may also be associated with metadata related to pricing. This metadata may include, but is not limited to, the minimum acceptable price per view, review, or session; pricing scheme options available to a User (e.g. fixed, one-time subscription, yearly subscription, a la carte reviews, required minimum percentage of revenue from a User); the acceptable price range or percentage of revenue range that a User must pay in order to access the certification information.
  • This metadata may include, but is not limited to, the minimum acceptable price per view, review, or session; pricing scheme options available to a User (e.g. fixed, one-time subscription, yearly
  • a User's filtering capabilities extend into certified values and metrics such that a User may filter out advertising messages that do not adhere to the User's specified values and metrics.
  • a User may mix and choose values and metrics that they require be met through their Profile preferences (e.g. require that eight out of ten values be met and two out of three metrics be met.) Examples of values and metrics that a User could filter upon include:
  • the values and metrics listed above may be stored within the Arki ⁇ sTM databases as metadata associated with a Provider.
  • the values and metrics may be listed alphabetically or by category on, for example, a search page, where Users can select or deselect values and metrics, or assign relative importance ratings to each value and/or metric.
  • relative importance ratings may add up to 100%, or they may be chosen by the User as any percentage from 0-100%, then normalized by the Arki ⁇ sTM engine so that their relative importance scores (from 0.000 to 1.000 and in aggregate totaling 1.000) can be assigned.
  • a User may choose to copy the settings of another User or a standard published/recommended by a Reviewer.
  • the number of parameters which Content does not satisfy may be added together, multiplied by a factor depending on how important the User feels their metrics and values are, and subtracted from the score, representing the suitability of Content for a User, used to rank Content.
  • this relative importance score may be multiplied with a value of 1.0 for each factor which is unmet by the Content. If a User feels a value or metric is 0% important, the value/metric will receive an adjusted relative importance score of 0. Then, in the aforementioned embodiments, the adjusted relative importance scores may be added together and subtracted from the score, representing the suitability of Content for a User, used to rank Content.
  • most of the value and metric requirements are certified by independent Certifiers that have the resources required to effectively provide certification, however, individual Reviewers may also certify values and metrics as part of their reviews.
  • these certifications are stored within the Arki ⁇ sTM databases and can be accessed in response to a User's query.
  • the Certifiers may register value and metric certifications they support. Multiple Certifiers may register for the same value or metric certification.
  • a Member may submit a Market Request for value or metric certifications that are not sufficiently available from a source they trust. Some Certifiers may certify the practices and integrity of other Certifiers or Reviewers.
  • the certifications may be part of the metadata associated with the Certifier or Reviewer who has been certified.
  • Certifiers supply a yes or no certification to be saved into the Arki ⁇ sTM databases as of a particular date for a particular company or product/service of a company.
  • More complex value and metric certifications may entail a grading system such as a letter grade (e.g. A, B, C, D, or F and possibly fine-tuned with a + or ⁇ ) or numerical percentage of adherence or a numerical grade.
  • a letter grade e.g. A, B, C, D, or F and possibly fine-tuned with a + or ⁇
  • numerical percentage of adherence or a numerical grade e.g. A, B, C, D, or F and possibly fine-tuned with a + or ⁇
  • Each value and metric certification specifies the scale upon which it is certified and the meaning of the possible grades.
  • Some value and metric certifications may specify an expiration time period before which a certification must be reassessed by a Certifier to remain current.
  • the expiration date of a certification will, in a preferred embodiment, be stored as one of the data fields/tags associated with the certification.
  • the date of certification may be stored as one of the data fields/tags associated with the certification and each User may specify in their Profile preferences the criteria for expiration for one or more value and/or metric certifications.
  • a User may choose to follow Certifiers they trust, linking their User Profiles to the Content produced by the Certifier.
  • the Arki ⁇ sTM system may check for new certifications by looking at all of the Certifier identifiers associated with a User's Profile. Alternatively, when a User chooses to follow a Certifier, an identifier associated with the User may be linked to the Certifier's Profile. When the Certifier posts new material, the Arki ⁇ sTM system may access the list of User identifiers, using it to send a notification to any Users who have enabled such notifications within their Profile settings or alternatively, recording such activity in the User Profiles of each listed User for subsequent efficient retrieval on behalf of each such User.
  • a User's connection to a Certifier through following the Certifier may influence their payout for watching advertisements if the advertiser chooses to target their advertisements or hide their advertisements from Users who follow a certain Certifier or group/category of Certifiers.
  • Trust may be provided on a sliding scale between 0% (untrusted) and 100% (absolute trust).
  • a User's relative trust level of a Certifier may be used to sort certifications and allocate payments across Certifiers. Certifiers may also possess integrity ratings to assist others in evaluating their trustworthiness.
  • a User may designate value and metric requirements for Certifiers and automatically trust them if the Certifier is itself certified to meet their value and metric requirements by a Certifier they already trust.
  • Arki ⁇ sTM provides mechanisms (create match custom certificate 2970 ) to associate Products ( 2950 ) with a User's personalized ratings/certifications (match certificate customized for User 2980 ) deemed important to them.
  • These personalized ratings are available in many different contexts ( 2962 ) such as when shopping online or when in a brick and mortar store.
  • the personalized (customized for User) ratings match certificate ( 2980 ) may be visualized by a wheel with spokes divided into multiple pie sections, each with a size weighted by its relative importance to the User together with perimeter icons identifying the type of measurement in the adjacent pie section.
  • each section may contain ratings, metrics, and values (some of which may be certified) that are individualized based upon User Profile information ( 2964 ) preferences.
  • a perimeter leaf icon may identify one piece of the pie for a User's specified environmental impact manufacturing requirements. This section may be visualized by red meaning few requirements are met, yellow meaning an average amount are met, and green meaning most are met.
  • Some of the metrics included within such visual representations of personalized ratings may include how readily the Product ( 2950 ) itself may be recycled at the end of its life or the relative amount of energy the production of that Product ( 2950 ) required as compared to similar Products as noted in database of information on detected items ( 2966 ).
  • the pie section may be overlaid with the symbol for the certifying Certifier in black print.
  • a Product in a store may contain a small QR code or RFID tag to identify the Product to a User's Google® Glasses and/or other mobile device (item detected by User's device 2960 ) and allow the product's values certifications to be presented (delivered to User by their device 2990 ) and customized for the Profile of the User ( 2964 ) viewing the Product.
  • the customized values certification may be displayed in a standardized presentation for easy recognition and comparison with other Products. More easily on a website, a distinct Arki ⁇ sTM template could be present for participating Products that also identifies their individualized values certification for the User viewing a webpage offering Products.
  • a User may be willing to pay, for example, 15% more for a Product that adheres to values standards they require, and may wish to show their stance to the world by having an easily recognizable unique look and feel for Products that adhere to such a values standard.
  • the system's platform allows for these desires to be made known to Providers, who can then meet these desires if enough Users stand behind a request.
  • Apple could offer a special iPhone® whose case is colored with a distinctive green plaid pattern that is readily identifiable and only placed on these special phones that are produced in factories certified to be manufacturing using sustainable techniques including: paying a living wage, carbon neutral production and shipping, and with a recyclable battery.
  • the same distinctive packaging could also be offered on other Products such as iPad®s and MacBooks that are also certified to adhere to the same standard. Users may band together to make a Market Request for such branding where it is not currently offered.
  • a Market Request is a published request for Products (e.g. Content, goods, services, certifications, or reviews) that do not exist yet or are out of stock but which may be desired by Users.
  • a User may publish a Market Request for something they conceive of and would like to acquire, or for an item they would like to locate in used condition.
  • a Market Request may be published through some sort of forum, discussion board, poll, or “wall” allowing Users to post their own Market Requests and endorse those of other Users.
  • These requests will be stored in the Arki ⁇ sTM databases and may have associated data fields including, but not limited to: date of request creation, number of endorsements, encrypted identifiers of Users who have endorsed the Market Request, etc.
  • Market Requests may require associated keywords when creating the request, in order to facilitate simple searches.
  • Market Requests may be placed into categories in some embodiments, and may be sorted, either automatically or by the User, through different variables depending on the embodiment including number of votes, percentage of positive votes, etc.
  • a User may support their own or another's Market Request at a level of their choosing to encourage its being created or offered.
  • Simple support may just entail a positive vote in support of a Market Request.
  • Each vote may augment a variable integer within metadata associated with the Market Request in order to keep track of the number of votes, which may be used to rank Market Requests for display to Users.
  • an encrypted identifier of each User who has voted for a Market Request may be stored within the Market Request metadata.
  • More substantial support may be making a commitment to buy the object of the published request in advance of its creation or availability, perhaps even putting down a deposit in advance.
  • a Provider may publish a request to spur and gauge the interest of Users to proposed Content, goods, services, or reviews they are considering offering.
  • a User may disseminate a Market Request by using Arki ⁇ s′® targeting capabilities to reach other Users that are more likely to respond positively.
  • this dissemination may be done through the use of SyncGroups or friendship networks or linked social media networks.
  • a Market Request may include requirement of anonymity-preserving notification from a supplier once requested goods or services are in stock or available.
  • the sender may help prioritize their message with the recipient by paying them to accept it.
  • the recipient may encourage notification by agreeing to cover the nominal Arki ⁇ sTM fee for anonymously brokering the message.
  • the Market Request mechanism may be applied to services and goods, whereby a Consumer may commit to purchase something they want but does not yet exist, such that when a sufficient body of Consumers commits a Goods & Services Provider may step in and fulfill the need.
  • a segment of the population may desire a smartphone made from recycled materials, while another segment may desire one completely manufactured in the United States.
  • Members of these segments may commit to buying a smartphone that satisfies their criteria, and by banding together with other Arki ⁇ sTM Users, entice a Goods & Services Provider to fulfill the need, given the Provider's reduced risk from the committed pre-orders.
  • This feature of the Arki ⁇ sTM system may allow Providers to reduce the uncertainty and costs of maintaining speculative inventories and move more toward demand-driven manufacturing. If more than one Marketer is competing to meet a Market Request, the Consumers may choose from among the competing Marketers and may make a monetary commitment/deposit/“pre-order” to select a particular Marketer of their choosing.
  • a User may find that there are no Reviewers in a Product or service area in which they are interested in purchasing. In such cases, they may publish a Market Request via Arki ⁇ sTM indicating the need for such independent reviews and may commit to pay for such reviews out of their future ad payouts in that area. Potential Reviewers may be required to satisfy the User's predefined criteria for gaining their trust as a Reviewer in order to claim the User's pre-commitment.
  • Arki ⁇ sTM allows for the efficient discovery of markets for non-existing reviews by connecting the stated Market Requests of Consumers with those potentially able to fulfill them. This may reduce the risk of the review Providers since they may anticipate a certain level of preallocated payout in addition to whatever payouts they normally accumulate as their reviews are utilized. This may make it easier for the Reviewer to judge whether it is worth their time to invest in reviewing a new area since the preallocated payouts may help them judge the return they can expect. This market may also produce competition among the Reviewers that may reduce the cost of reviews over time.
  • Arki ⁇ sTM may provide the infrastructure and technology to share a small portion of revenues with those people or groups that helped to direct the User's Content choices. Arki ⁇ sTM may maintain the accounting and distribution of funds to reward those who assist helping a User decide what Content to consume.
  • Arki ⁇ sTM provides payment systems that allow for multiple ways to pay for goods and/or services. Submitting a payment through Arki ⁇ sTM ensures the safeguarding of a User's personal information and simplifies the verification of purchases in order to track a User's Arki ⁇ sTM credits and boost their Consumer Marketing Performance Score to reflect their integrity rating. These payment systems may be used while retaining the anonymity of the payment initiator and/or recipient from each other.
  • a Marketer may have the ability to create whatever formulas they desire to value how much they will (bid 404 ) pay a User to consume their Targeted Marketing Content.
  • the formula may take as input information in a User's Profile ( 414 ) such as traditional demographic information, as well as novel information not present in those models such as the Consumer's Arki ⁇ sTM marketing performance score ( 410 ) that predicts the likelihood of a purchase.
  • the formula may apportion the payout across the SyncGroup members either evenly or by a weighted metric such as their relative contribution to the SyncGroup's Arki ⁇ sTM marketing score.
  • These new metrics include the context ( 412 ) such as the User's purchase intents, current emotional state (e.g. mood), friends and business associates that they are currently interacting with, current events in the world, Content recently consumed, etc.
  • Inputs to a bid's ( 404 ) payout formula may vary widely over time to reflect the value (actualize bid offered 430 ) an advertiser places on delivering (yes 426 ) a Content ( 406 ) message during a particular context ( 412 ) such as the current time.
  • Such formulas in the bid ( 404 ) allow for a negative payout/actualize bid offered ( 430 ) at times when the Marketer ( 402 ) does not want the Content ( 406 ) to be consumed by a User, thus requiring at times for a User to pay Marketer ( 402 ) to consume Content ( 406 ).
  • a Marketer may even require an infinite negative payout to signify that in the current context ( 406 ) a User is prohibited (no 424 , not delivered 422 ) from consuming their Content ( 406 ) message through the Arki ⁇ sTM system.
  • a Marketer may include in their payout formula an aspect to account for when an advertisement has been recommended or forwarded by another User to possibly apportion some of the payout to the recommending or forwarding User and/or to reduce or increase the payout to the consuming User.
  • Such sharing may, in some embodiments, be apportioned up the chain transitively in a decaying manner (e.g. geometrically by halving) to reward key recommenders that contribute to a Content message becoming viral. For example, if Alice watches and then forwards the message to Bob, who watches and forwards it to Charlie, who watches and forwards it to Dawn, the payout related to Dawn consuming the message Content may pay Dawn $2.00 with Charlie receiving $1.00, and Bob getting $0.50, and finally Alice getting $0.25.
  • a Marketer may vary the payout formula to account for how much a message has been viewed, such as for example, to account for a message going viral and being suddenly watched by huge numbers of individuals. Such payout adjustment may reduce or increase the payout according to the number of views, likes, or other recommendations and comments a Content message has received.
  • Another aspect of the changing formula is that if a User suspends watching a message mid-stream, when they are ready to resume play, the formula may no longer provide the same payout that was originally promised when they first started watching the commercial and thus the User may choose to defer resuming the message until the same or similar circumstances/context return (if ever) such that the payout is comparable to the original promised amount.
  • a User may see average Targeted Marketing Content payouts for those Users whose Profile demographics are similar to their own profile's demographics. This may aid the User in configuring their own profile's filters related to minimum Targeted Marketing Content payouts that they are willing to accept based upon norms for their demographics.
  • a User may configure their Profile to filter out advertising whose payout is disadvantageous to their current situation, needs, and/or desires. For example, Users may configure their Profiles such that when watching live sporting events, their feed is never to be delayed. Because Targeted Marketing Content may be cut off, due to, for example, being at the end of a commercial break, the User, Arki ⁇ s, or another service provider may select Targeted Marketing Content to statistically maximize the User's average payout.
  • the following scenario depicts an example of advertisement selection based on a User's Profile preferences.
  • Daniel is watching live volleyball using his customized Arki ⁇ sTM RokuTM channel.
  • the live broadcast goes to commercial break that is expected to be 3 minutes long.
  • Daniel's Profile preferences require commercials that are rated as funny by others with similar tastes to Daniel as long as their pay is not more than 20% below the highest paying commercial available to him at any given time.
  • the Arki ⁇ sTM cloud servers determine, based upon Daniel's Profile, that the following commercials in Table 2 could be served to Daniel:
  • the software-enabled algorithm on the Arki ⁇ sTM cloud servers computes that the highest paying commercial is OfficeMax at $1.70 per minute; however, there are three funnier commercials that may be given priority based upon Daniel's Profile. Per Daniel's Profile requirements the servers do not select the Pepsi® Elton John commercial because it is not within 80% of the highest paying commercial; instead the servers stream Coors and then Geico to Daniel in the first one and a half minutes of the break. The servers compute that OfficeMax plays third, leaving one minute in the current break and Lexus as the highest paying and Pepsi® as the funniest remaining. The servers play Pepsi® as the last commercial before returning from break since it is now within 20% of the highest paying remaining commercial. Daniel has earned a total of $5.95.
  • Daniel receives the list of available targeted commercials before they are played and using his smartphone he reviews the list and rejects the OfficeMax commercial and gives his reason as not being in the mood.
  • the rejection and reason are transmitted to the Arki ⁇ sTM cloud servers that do not immediately adjust his Profile since his reason was given as being very transitory, however, the rejection is recorded for future reference to see if a pattern develops.
  • the server's selection algorithm honors his rejection and adjusts the computation of which commercials he is served.
  • Inputs to the formula may include portions of the ad that have been consumed, and in what fashion.
  • the simplest such description is a User consuming an ad in its entirety from beginning to end in a single uninterrupted session. More complex descriptions include scenarios where the User does not finish the ad in a single session and returns to it later to complete, perhaps rewinding to an encoded entry point before resuming. The Consumer may even fast-forward and skip some portions altogether.
  • the Marketer may structure their payout formula such that partial payouts may be earned as the ad is consumed based upon how far into the ad a User has consumed (e.g., viewed or listened) and in what manner was that point reached. For example, all payouts may be withheld until the first ten seconds of the ad has been consumed, or withheld until the whole ad is consumed in its entirety, or even require the consuming to be uninterrupted (never paused).
  • red-flagging the User may explain the reason(s) for rejection and, in a preferred embodiment, in return they may receive the full payout as if they had consumed the complete message.
  • This Feedback allows the Content Producer to adjust their targeting to potentially reduce future conflicts.
  • a User's red-flagging history may be recorded as part of their Profile and abuse of the feature could lead to advertisers reducing their payout formula to such a User or avoiding them altogether.
  • FIG. 30 is an exemplary stream selector system that can be used in conjunction with the technologies described herein.
  • Stream Selector 3000 is fed an assortment of Live Broadcast Streams 3070 together with Static Stored Streams 3071 as inputs and selects one such stream to be the Deliver Stream 3010 .
  • the selection is performed by analyzing Contextual Information 3080 , Stream Meta Information 3072 , and Profile Information 3050 .
  • Profile Information 3050 may be augmented by the Create Feedback 3020 in response to Delivered Stream 3010 .
  • FIG. 31 shows exemplary matching multiple Marketer 402 Bid(s) 404 that are actualized bid(s) offered 430 via static stored streams 3071 .
  • FIG. 31 shows two examples. On the left is an example of a single User receiving bids from multiple advertisers.
  • FIG. 31 shows an example for a single Marketer 402 with multiple Bid(s) 404 for different User Profile(s) 414 where only bolded outline circles/blocks are yes 426 Deliver bid 420 in actualize bid offered 430 and unbolded outline circles/blocks are No 424 Not delivered 422 .
  • content selector 208 receives the three bids. Only the bolded bid is delivered to User 210 resulting in a payment module credit of $0.25 at 216 .
  • Each of the bids has associated therewith meta-data as shown generally at 204 .
  • five Users 210 submit bids for an advertisement.
  • the examples in FIG. 31 can also be seen from the perspective of FIG. 4 where the marketer's perspective is shown.
  • On the left example there are three marketers 402 . All three marketers 402 generated bids 404 and all three became actualized 430 . Each marketer generates its bid without necessarily having knowledge of the bids by other marketers.
  • Advertisers may provide payouts for such ads that are divided between the standard cash portion for watching this type of advertisement and a coupon or rebate for any Product in that category (not necessarily that advertiser's product) representing the added value due to the Consumer's forward looking Assertions. In this way, advertisers only pay for forward-looking Assertions that are actually fulfilled. This allows an advertiser to value a User's statements in an area where the User has no track record by tying payment to fulfillment of their forward-looking Assertion.
  • the payout may include a bonus that triggers if the purchase has additional qualities not originally specified in the User's professed Assertion. For example, if a User indicated they were going to buy a TV, an advertiser might offer a bonus if they chose an OLED type of TV because the advertiser believes that if the purchaser researches OLED TVs that they are more likely to buy their brand.
  • the following example shows one embodiment of the system which utilizes ensured integrity payouts:
  • Frank is in the market for a new large screen television and Samsung targets him with an ad that will pay him $25 if he buys any 50′′ or larger television in the next three months because they are so confident that if they can reach him with this message about their new OLED technology that he will buy their television based on his Profile showing that he is a videophile.
  • He receives a coupon or rebate offer that requires proof of purchase of a television and is paid, even though he buys the competing LG OLED television instead.
  • an Arki ⁇ sTM identifier When using an Arki ⁇ sTM identifier, a User may choose to shop at brick and mortar stores with cash while retaining the traceability features of using a credit card. For example, many stores can locate a receipt in their systems electronically by the shopper presenting the credit card used for purchase. When paying with cash, a User may present an Arki ⁇ sTM identifier in one of several possible ways including: swiping an Arki ⁇ sTM card using the credit card terminals, waving their Arki ⁇ s-enabled phone (e.g. using Near Field Communication (NFC) feature), scanning an Arki ⁇ sTM loyalty card barcode or QR code, and/or manually typing in their Arki ⁇ sTM identifier number on a terminal.
  • NFC Near Field Communication
  • a store may transmit a receipt to Arki ⁇ sTM for storage with the purchaser's Profile, thus allowing easy retrieval by the User at a future time.
  • Arki ⁇ sTM may offer a feature that is configurable by each User such that whenever that User is shopping at the store either physically or online, the store may receive temporary access to their complete purchase history at that store for the duration of their shopping experience.
  • the Arki ⁇ sTM identifier may vary by time or by store in some embodiments. For example, there may be a handshake protocol (an exchange of signals between a store and a customer when initiating communications in order to ensure anonymous synchronization) whereby the store presents an identifier to uniquely identify the store (e.g. Target or Safeway) and a unique version of the User's Arki ⁇ sTM identifier is generated from the store's identifier for use each time the User visits that store to allow the store to retrieve permissible details about the User from Arki ⁇ s.
  • the store-specific identifier may be provided using many of the same techniques in which a general identifier could be given by first supplying the store's identifier to the process which generates the User's store specific identifier.
  • a smartphone could see the names of wireless networks in its vicinity and deduce the store in which it is present and put forth a digital identifier (e.g. a QR code) on the smartphone's display for scanning by the register or transmitted to the register such as by NFC.
  • a digital identifier e.g. a QR code
  • GPS could be used to identify the store or NFC, or some combination of several methods.
  • the User's identifier may vary by date, with the identifier changing periodically, such as monthly, or every two weeks. Were the customer to return to the store wishing to locate their receipt, they could provide their identifier as of the date of their purchase, or if unsure, provide a range of identifiers until a match is found, or check their Profile to see what identifiers were passed out and only supply those.
  • the cash identifier may also be used to build a User's Profile to include a record of confirmed purchases paid for by cash. These verified purchases will boost a User's Consumer Marketing Performance Score, especially if the purchase was the fulfillment of an Assertion. Therefore, the use of an Arki ⁇ sTM identifier when making a purchase will augment the value of a User's attention to Providers and increase the profits the User makes when receiving advertisements relevant to a verified purchase.
  • Arki ⁇ sTM facilitates, preferably with existing credit card providers, the generation and integration of these virtual credit card numbers and allows for purchases made with these cards to automatically be tracked in a User's Profile like a cash identifier. Arki ⁇ sTM preferably maintains the total or partial anonymity of the User from vendors while partnering with other payment technology companies and servicers to facilitate returns and find receipts, thus opening a new market for these cards at brick and mortar stores to have the anonymity of cash.
  • Arki ⁇ sTM may offer a new kind of virtual credit card number that only places restrictions on charges while allowing unlimited credits (e.g. Product returns or advertising payouts to Users) to further facilitate returns using the same card which may no longer be valid for purchases at the time of return.
  • Arki ⁇ sTM may also provide a virtual card number in alternate embodiments that may only be used at one merchant, specified either at the time of virtual number generation or upon the first use of the virtual card number.
  • a card number may be generated that may only be used for a predetermined number of purchase transactions.
  • Arki ⁇ sTM may allow virtual credit card numbers to be used with credit card providers that do not provide this service by acting as an intermediary that does provide such numbers, then charges the original credit card provider using a traditional card number without revealing that number to the merchant and/or optionally not revealing what was purchased or what store to the credit card issuer.
  • the User may request Arki ⁇ sTM to properly categorize their purchase with the credit card issuer (e.g. gasoline or restaurant) so that they are properly credited with the appropriate premium rebate category (e.g. 5% for gasoline or 3% for restaurants).
  • Arki ⁇ sTM may integrate support for virtual credit card numbers through any of the mechanisms used for supplying a cash identifier.
  • Chip-n-Pin i.e. an integrated circuit chip card that requires a PIN to make a purchase
  • virtual credit card numbers where the circuit on the credit card automatically generates and supplies a virtual credit card number.
  • Such credit cards may be integrated with smartphone or smartwatch technology to provide an electronic wallet that securely contains all a User's payment options together with Arki ⁇ sTM solutions to retain anonymity and tracking of confirmed purchases to build a rich profile.
  • the Arki ⁇ sTM system of tools and processes includes multiple mechanisms by which third parties (preferably independent) may provide value including the addition of information, reviews, add-on tools (e.g. plug-ins), certifications, rankings, and ratings to Users in areas such as ranking or filtering Content and judging values and metrics of advertisements as well as goods and services. Users may wish to share their revenue and/or directly pay for these services because the value created by these services is great, and without payment the benefit of such services would likely not be available.
  • the Arki ⁇ sTM system includes multiple ways in which remuneration may be supplied to third parties. It may be allocated as a percentage of payouts and/or purchases. Based on the embodiment, this allocation may be distributed across multiple third parties based upon their applicability, trust level, usage and/or value. For example, the period of time a User reviews the Content may be used to prorate the portion of the overall allocation that is attributed to the Content or alternatively, Content remuneration may be prorated based upon the trust level, grade or value the User places on information, possibly combined with the average or aggregate trust level, grade or value of all other Users or of only those Users with similar Profiles. Alternatively, allocations may be assigned to third parties individually.
  • the suppliers of Content, goods, or services and the like may wish to compensate third-party Providers (e.g. Reviewers, advocates, and Champions) that in any way increase the probability of their wares being purchased and/or consumed.
  • Sellers may choose to allocate a percentage of the purchase price of Products toward third parties whose work impacts the likelihood of a sale or participates in a buyer's decision process.
  • the seller may pay third parties regardless of whether their Product is actually purchased. Payments may be triggered whenever a potential buyer accesses that third party's information about their Product.
  • the allocation may be a total allocation that is divided up proportionately across contributing third parties based upon their statistically determined contribution value. In alternate embodiments, each third party may be given a specific allocation.
  • third parties may have minimum payout requirements that must be agreed to before their Content is visible or alternatively, their Content may only be partially visible if terms are not agreed to, or they may have multiple tiers of revelation and acceptance of each tier's terms (e.g. clicking to reveal more information) additionally reveals that tier's information.
  • Required terms may be a fixed cost for information or a conditional cost that is only triggered if a particular action is taken or event occurs such as a purchase.
  • payment structures may be prorated or adjusted based upon the relative portion of information considered, relied upon, and/or the amount of time such information is perused.
  • the following example usage scenario describes one embodiment of the disclosed system.
  • Melody wants to buy a Blu-Ray player in the next month and posts her intent in her Arki ⁇ sTM Profile.
  • Her Profile shows that she only wants to buy consumer goods Products that are manufactured using sustainable techniques as certified by The Nature conserveancy.
  • She also wants a Product with an interface that scores at least 4 out of 5 in usability as scored by a Human Computer Interaction expert she trusts. Because of this, she is offered a commercial for a Sony player that pays $1 for a Product that meets her criteria except that it does not have a usability certification from a Reviewer she already trusts but it has been highly reviewed by Joe, someone she does not yet trust. She accepts the commercial and the commercial ends with a link to Joe's review.
  • General purpose computing systems may include, laptops, desktop computers, DVR players, RokuTM devices, Blu-Ray players, set top boxes, cable boxes, etc.
  • Specialized devices may include a DVR that is designed especially for the Arki ⁇ sTM system to automatically collect data about a User and prepare Content for their on demand viewing. Such devices may be wholly or partially implemented with cloud functionality.
  • FIG. 32 depicts a generalized example of a suitable general purpose computing system 3200 in which the described innovations may be implemented.
  • the computing system 3200 is not intended to suggest any limitation as to scope of use or functionality, as the innovations may be implemented in diverse general-purpose or special-purpose computing systems.
  • the computing system 3200 can be any of a variety of computing devices (e.g., desktop computer, laptop computer, server computer, tablet computer, media player, gaming system, mobile device, etc.).
  • the computing system 3200 includes one or more processing units 3210 , 3215 and memory 3220 , 3225 .
  • the processing units 3210 , 3215 execute computer-executable instructions.
  • a processing unit can be a general-purpose central processing unit (CPU), processor in an application-specific integrated circuit (ASIC) or any other type of processor.
  • ASIC application-specific integrated circuit
  • FIG. 32 shows a central processing unit 3210 as well as a graphics processing unit or co-processing unit 3215 .
  • the tangible memory 3220 , 3225 may be volatile memory (e.g., registers, cache, RAM), non-volatile memory (e.g., ROM, EEPROM, flash memory, etc.), or some combination of the two, accessible by the processing unit(s).
  • the memory 3220 , 3225 stores software 3280 implementing, at least in part, one or more innovations described herein, in the form of computer-executable instructions suitable for execution by the processing unit(s).
  • a computing system may have additional features.
  • the computing system 3200 includes storage 3240 , one or more input devices 3250 , one or more output devices 3260 , and one or more communication connections 3270 .
  • An interconnection mechanism such as a bus, controller, or network interconnects the components of the computing system 3200 .
  • operating system software provides an operating system for other software executing in the computing system 3200 , and coordinates activities of the components of the computing system 3200 .
  • the tangible storage 3240 may be removable or non-removable, and includes magnetic disks, magnetic tapes or cassettes, CD-ROMs, DVDs, or any other medium which can be used to store information in a non-transitory way and which can be accessed within the computing system 3200 .
  • the storage 3240 stores instructions for the software 3280 implementing one or more innovations described herein.
  • the input device(s) 3250 may be a touch input device such as a keyboard, mouse, pen, or trackball, a voice input device, a scanning device, or another device that provides input to the computing system 3200 .
  • the input device(s) 3250 may be a camera, video card, TV tuner card, or similar device that accepts video input in analog or digital form, or a CD-ROM or CD-RW that reads video samples into the computing system 3200 .
  • the output device(s) 3260 may be a display, printer, speaker, CD-writer, or another device that provides output from the computing system 3200 .
  • the communication connection(s) 3270 enable communication over a communication medium to another computing entity.
  • the communication medium conveys information such as computer-executable instructions, audio or video input or output, or other data in a modulated data signal.
  • a modulated data signal is a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
  • communication media can use an electrical, optical, RF, or other carrier.
  • program modules include routines, programs, libraries, objects, classes, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • the functionality of the program modules may be combined or split between program modules as desired in various embodiments.
  • Computer-executable instructions for program modules may be executed within a local or distributed computing system.
  • system and “computing device” are used interchangeably herein. Unless the context clearly indicates otherwise, neither term implies any limitation on a type of computing system or computing device. In general, a computing system or computing device can be local or distributed, and can include any combination of special-purpose hardware and/or general-purpose hardware with software implementing the functionality described herein.
  • General-purpose devices may include, iPhone®, iPad®, Android Tablet, Android Smartphone, Smartwatch, etc.
  • Specialized devices may include a smartwatch or similar mobile device that is designed especially for the Arki ⁇ sTM system to automatically collect data about a User and coordinate with the various devices a User interacts with. Such devices may be wholly or partially implemented with cloud functionality.
  • FIG. 33 is a system diagram depicting an exemplary general purpose mobile device 3300 including a variety of optional hardware and software components, shown generally at 3302 . Any components 3302 in the mobile device can communicate with any other component, although not all connections are shown, for ease of illustration.
  • the mobile device can be any of a variety of computing devices (e.g., cell phone, smartphone, handheld computer, Personal Digital Assistant (PDA), etc.) and can allow wireless two-way communications with one or more mobile communications networks 3304 , such as a cellular, satellite, or other network.
  • PDA Personal Digital Assistant
  • the illustrated mobile device 3300 can include a controller or processor 3310 (e.g., signal processor, microprocessor, ASIC, or other control and processing logic circuitry) for performing such tasks as signal coding, data processing, input/output processing, power control, and/or other functions.
  • An operating system 3312 can control the allocation and usage of the components 3302 and support for one or more application programs 3314 .
  • the application programs can include common mobile computing applications (e.g., email applications, calendars, contact managers, web browsers, messaging applications), or any other computing application.
  • Functionality 3313 for accessing an application store can also be used for acquiring and updating applications 3314 .
  • the illustrated mobile device 3300 can include memory 3320 .
  • Memory 3320 can include non-removable memory 3322 and/or removable memory 3324 .
  • the non-removable memory 3322 can include RAM, ROM, flash memory, a hard disk, or other well-known memory storage technologies.
  • the removable memory 3324 can include flash memory or a Subscriber Identity Module (SIM) card, which is well known in GSM communication systems, or other well-known memory storage technologies, such as “smart cards.”
  • SIM Subscriber Identity Module
  • the memory 3320 can be used for storing data and/or code for running the operating system 3312 and the applications 3314 .
  • Example data can include web pages, text, images, sound files, video data, or other data sets to be sent to and/or received from one or more network servers or other devices via one or more wired or wireless networks.
  • the memory 3320 can be used to store a subscriber identifier, such as an International Mobile Subscriber Identity (IMSI), and an equipment identifier, such as an International Mobile Equipment Identifier (IMEI).
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identifier
  • the mobile device 3300 can support one or more input devices 3330 , such as a touchscreen 3332 , microphone 3334 , camera 3336 , physical keyboard 3338 and/or trackball 3340 and one or more output devices 3350 , such as a speaker 3352 and a display 3354 .
  • input devices 3330 such as a touchscreen 3332 , microphone 3334 , camera 3336 , physical keyboard 3338 and/or trackball 3340
  • output devices 3350 such as a speaker 3352 and a display 3354 .
  • Other possible output devices can include piezoelectric or other haptic output devices. Some devices can serve more than one input/output function.
  • touchscreen 3332 and display 3354 can be combined in a single input/output device.
  • the input devices 3330 can include a Natural User Interface (NUI).
  • NUI is any interface technology that enables a user to interact with a device in a “natural” manner, free from artificial constraints imposed by input devices such as mice, keyboards, remote controls, and the like. Examples of NUI methods include those relying on speech recognition (including using lip-reading technology to improve accuracy), touch and stylus recognition, gesture recognition both on screen and adjacent to the screen, air gestures, head and eye tracking, voice and speech, vision, touch, gestures, and machine intelligence.
  • NUI examples include motion gesture detection using accelerometers/gyroscopes, facial recognition, 3D displays, head, eye, and gaze tracking, immersive augmented reality and virtual reality systems, all of which provide a more natural interface, as well as technologies for sensing brain activity using electric field sensing electrodes (EEG and related methods).
  • the operating system 3312 or applications 3314 can comprise speech-recognition software, that may optionally include lip-reading technology for improved accuracy, as part of a voice user interface that allows a user to operate the device 3300 via voice commands.
  • the device 3300 can comprise input devices and software that allows for user interaction via a user's spatial gestures, such as detecting and interpreting gestures to provide input to a gaming application.
  • a wireless modem 3360 can be coupled to an antenna (not shown) and can support two-way communications between the processor 3310 and external devices, as is well understood in the art.
  • the modem 3360 is shown generically and can include a cellular modem for communicating with the mobile communication network 3304 and/or other radio-based modems (e.g., Bluetooth 3364 or Wi-Fi 3362 ).
  • the wireless modem 3360 is typically configured for communication with one or more cellular networks, such as a GSM network for data and voice communications within a single cellular network, between cellular networks, or between the mobile device and a public switched telephone network (PSTN).
  • GSM Global System for Mobile communications
  • PSTN public switched telephone network
  • the mobile device can further include at least one input/output port 3380 , a power supply 3382 , a satellite navigation system receiver 3384 , such as a Global Positioning System (GPS) receiver, an accelerometer 3386 , one or more other sensors 3387 (e.g., thrust/jerk sensor, barometer, thermometer, hygrometer, and/or other types of sensors), and/or a physical connector 3390 , which can be a USB port, IEEE 1394 (FireWire) port, and/or RS-232 port.
  • GPS Global Positioning System
  • sensors 3387 e.g., thrust/jerk sensor, barometer, thermometer, hygrometer, and/or other types of sensors
  • a physical connector 3390 which can be a USB port, IEEE 1394 (FireWire) port, and/or RS-232 port.
  • the illustrated components 3302 are not required or all-inclusive, as any components can be deleted and other components can be added.
  • Mobile devices afford the opportunity to automatically collect vast amounts of detailed Profile information, such as illustrated in FIG. 11 with data generated by User's mobile devices and computers 1110 .
  • Users may view and change their collection controls whenever and however they desire, and have complete control over the flow of their data into the system.
  • the User may control collection at various levels of granularity depending on the embodiment as well as create rules that specify different collection criteria under different circumstances. Users may also configure rules to notify and/or alert them when they could potentially and/or are actually being recorded (e.g. audio, video, photo, social interaction history) by the automated collection of Profile information being performed by the Arki ⁇ sTM system on behalf of another Arki ⁇ sTM User on the other User's device.
  • a User may have rules triggered by their location (Spatial Rule), other Users if they are around and engaged in activity (Social Rule), or time (Temporal Rule).
  • rules are either default, whitelist, or blacklist rules. In one embodiment, initially, all collection is off and this is overridden by default rules that specifically enable collection of specific kinds of data. Default rules specify a static collection Profile, indicating the kinds of data to collect, the frequency of collection, and the accuracy to be retained for the collected data.
  • a default rule may specify that a kind of data is not collected by default yet still specify a default frequency of collection and/or a default accuracy to retain, the purpose being to supply a default value for these fields in the event that a whitelist rule enables collection but does not specify frequency and/or accuracy.
  • the static collection profile is then continually adjusted according to the whitelist and blacklist rules as they come into and out of applicability over time.
  • the whitelist and blacklist rules are maintained in a sequential ordering that represents their relative priority and are applied in the priority order in which they are listed. In a preferred embodiment, once an aspect of collection is specified by a rule that triggers, no further lower priority rules are applied to that aspect at that moment in time (e.g.
  • a blacklist rule can be thought of as being equivalent to a whitelist rule with the same trigger that specifies a frequency of collection of zero, meaning the data is never collected.
  • the ordered whitelist and blacklist rules are processed in priority order and each rule's condition is tested and if true, the rule is applied to enable some aspect of data collection (e.g. turning collection on or off, specifying the frequency of collection, or specifying the accuracy of the collected data).
  • Condition building blocks are time, location, and social that may be combined together using Boolean operators including: AND, OR, XOR, and NOT.
  • the whitelist and blacklist functionality may be hidden, partially disabled, and/or completely disabled when the User Profile does not specify them as being an expert and/or according to the User Profile preference. Selecting what data to collect is too complex and time consuming for one or more humans to carry out and thus requires the automation of a rule based system implemented with a one or more computing devices, which when using this method is able to meet the exact desires of a User to control their data collection, previously unattainable without this method.
  • a temporal condition for a rule tests the local time for the User to see whether it falls between a start and end time.
  • such tests are time zone relative so that a rule set in the Pacific Time Zone to trigger between 9 am and 10 am still applies between 9 am and 10 am when the User happens to be located in the Eastern Time Zone instead of shifting it to between noon and 1 ⁇ m.
  • a User may designate that a temporal condition be absolute and thus is adjusted for the local time zone as compared to the time zone in which it was created.
  • Temporal conditions may also specify calendar components similar to how a calendar application functions such as allowing selection of days of the week, a recurrence interval, etc.
  • a spatial condition for a rule tests whether the User's present location falls within a specified geographical area.
  • the geographical area of a spatial condition may be specified as either a circle defined by its center and radius or as a polygon specified by its vertices.
  • Such a test may be configured to be neutral, aggressive, or conservative to take into account possible error in the location determination method being used (e.g. GPS or Wi-Fi triangulation).
  • Aggressive and conservative configuration settings include a confidence probability setting that may default to 99% likely.
  • An aggressive configuration may include locations outside the specified area such that the probability of mistakenly not triggering the rule matches the confidence level assigned to that condition building block.
  • a conservative configuration may exclude locations just within the specified area such that the probability of mistakenly triggering the rule matches the confidence level assigned.
  • a social condition tests whether the User is presently engaged in a SyncGroup or in Physical or Virtual Proximity of other Users or of others not identified as being Users.
  • a social condition may test whether the User is presently engaged in an activity, e.g. playing golf or eating a meal. This may be determined by a User's input describing what activity they are taking part in currently, or by location data (e.g. through GPS or Wi-Fi triangulation) which matches a location where an activity generally takes place (e.g. a golf course) or by analyzing microphone data, accelerometer data, camera and video data, or a combination of the aforementioned factors.
  • a social condition may specify not to record microphone data when in Physical Proximity to others, whether they are identified as Users or not.
  • Others not identified as being Users may include the detection of Bluetooth signals from other phones in the vicinity of a User not known to be registered to the User.
  • Boolean condition tests one or more temporal, spatial, or social conditions and combines them together using Boolean operators such as AND, OR, NOT, XOR, NAND, NOR, etc.
  • a Boolean condition may also be combined recursively within another Boolean condition, for example (Between 6 pm and 7 pm AND at home) OR (between 7 am and 8 am AND (NOT at work))) is an OR rule that itself combines two Boolean conditions that are each using an AND condition, one of which further combines a temporal condition together with a Boolean NOT condition.
  • Mobile devices allow for the automated collection at points in time along various metrics that include:
  • Rules for automated data collection for data types may specify how accurately the data may be recorded. For example, for location data, a User may prefer that their location only be recorded to the nearest 100 meters even though their mobile device can provide a much more accurate measure. For example, such obfuscation may be done as either rounding to the nearest 100 meters, or adding in a random plus or minus 50 meters, or some combination of both.
  • time stamp data a User may prefer that the time stamp on their data measurements only be recorded to the nearest five minutes, by again either rounding, adding a random noise factor, or both.
  • a rule may specify the frequency of data collection, for example, taking a sample every six seconds or only once every 15 minutes. Such accuracy controls may have a random variation built in, e.g. sample once every 60 seconds plus or minus 10 seconds.
  • a User may prefer that audio data only be collected when they are engaged in a telephone call, engaged in video call, or present in a public location such as a restaurant or bar.
  • Users may wish for wholly fictitious data to be generated and added to their Profile, possibly mixed together with data actually based upon their real (non-fictitious) information.
  • General purpose cloud computing systems may include, Amazon® EC3, etc.
  • Specialized cloud computing systems may include a cloud with hardware, configuration, and/or characteristics designed especially for the Arki ⁇ sTM system to optimize services such as automatically collecting data about a User and coordinating with the various devices a User interacts with.
  • FIG. 35 depicts an example general-purpose cloud computing system 3500 in which the described technologies can be implemented.
  • the cloud computing system 3500 comprises cloud computing services 3510 .
  • the cloud computing services 3510 can comprise various types of cloud computing resources, such as computer servers, data storage repositories, networking resources, etc.
  • the cloud computing services 3510 can be centrally located (e.g., provided by a data center of a business or organization) or distributed (e.g., provided by various computing resources located at different locations, such as different data centers and/or located in different cities or countries).
  • the cloud computing services 3510 are utilized by various types of computing devices (e.g., client computing devices), such as computing devices 3520 , 3522 , and 3524 .
  • the computing devices e.g., 3520 , 3522 , and 3524
  • the computing devices can be computers (e.g., desktop or laptop computers), mobile devices (e.g., tablet computers or smartphones), or other types of computing devices.
  • the computing devices e.g., 3520 , 3522 , and 3524
  • Computer-readable storage media are any available tangible media that can be accessed within a computing system (e.g., non-transitory computer-readable media, such as one or more optical media discs, volatile memory components (such as DRAM or SRAM), or nonvolatile memory components (such as flash memory or hard drives)).
  • non-transitory computer-readable media such as one or more optical media discs, volatile memory components (such as DRAM or SRAM), or nonvolatile memory components (such as flash memory or hard drives)
  • computer-readable storage media include memory 3220 and 3225 , and storage 3240 .
  • computer-readable storage media include memory and storage 3320 , 3322 , and 3324 .
  • the term computer-readable storage media does not include communication connections (e.g., 3270 , 3360 , 3362 , and 3364 ) such as signals and carrier waves.
  • any of the computer-executable instructions for implementing the disclosed techniques as well as any data created and used during implementation of the disclosed embodiments can be stored on one or more computer-readable storage media.
  • the computer-executable instructions can be part of, for example, a dedicated software application or a software application that is accessed or downloaded via a web browser or other software application (such as a remote computing application).
  • Such software can be executed, for example, on a single local computer (e.g., any suitable commercially available computer) or in a network environment (e.g., via the Internet, a wide-area network, a local-area network, a client-server network (such as a cloud computing network), or other such network) using one or more network computers.
  • any functionality described herein can be performed, at least in part, by one or more hardware logic components, instead of software.
  • illustrative types of hardware logic components include Field-programmable Gate Arrays (FPGAs), Program-specific Integrated Circuits (ASICs), Program-specific Standard Products (ASSPs), System-on-a-chip systems (SOCs), Complex Programmable Logic Devices (CPLDs), etc.
  • any of the software-based embodiments can be uploaded, downloaded, or remotely accessed through a suitable communication means.
  • suitable communication means include, for example, the Internet, the World Wide Web, an intranet, software applications, cable (including fiber optic cable), magnetic communications, electromagnetic communications (including RF, microwave, and infrared communications), electronic communications, or other such communication means.
  • Hand-held device to allow interactive time coded feedback and control while viewing Content and to allow multiple devices to be simultaneously registered to individual profiles when watching in a group.
  • DVR to record broadcast content and instantaneously substitute commercials with those matching the viewer's profile and share revenue with the original content provider.
  • a shared message may be more generic (e.g., a message about BMWs in general) and this may be complemented by individually targeted messages (before during or after the shared messages) delivered to each User's individual device that is more tailored to them (e.g., offers a specific BMW model that best matches their Profile).
  • Large screen devices which automatically register the set of Users collectively watching content and either automatically choose to deliver group messages on the large screen or individual messages on personal devices or to ask for current preference of a viewing session.
  • the large screen is split in two and one half of the room watches one side and the other half takes the other side while each viewer gets the audio for the side appropriate for themselves delivered by the application on their smart phone or my Wi-Fi from the large display that is picked up by the individual devices.
  • Filters on content may be combined such that content satisfies all members content filters or a member may cooperate with the group and allow content outside their normal parameters but would be alerted on their phone whenever such messages are forthcoming so they could excuse themselves from the room if so desired.
  • some members may choose to listen on their own using headphones while others may sync up with the group as selected on their phones or defaulted based upon their personal settings.
  • their application on their phone asks directed customized questions about the content and indicates how much they would be paid to answer, for example, what was most interesting to you about this commercial or did you get enough information about the technical details of the advertised product? It might even show you an alternate commercial and have you decide which one is more compelling.
  • a User While watching shared content, a User may choose to publish their comments on the shared display (e.g., by sending a text with their smartphone that gets momentarily displayed on top of the ad and this may be shared with the Content Producer).
  • SyncGroups may elect to view highly rated comments originating in other SyncGroups viewing of the same content during their own viewing. Users could create subtitles to describe what a character is thinking. Advertisements could be created with thought bubbles to be filled in by viewers to make a game where the best scripts wins prizes. Marketers may provide a beginning scenario to seed the game.
  • Users may store their favorite ads (or links to them) onto their phone and then use their phone to send the ad to a shared display.
  • the testimonials can be coupled with traditional advertising messages during group shared viewing of content. For example, a professional commercial includes a space in its message where the testimonial is inserted midstream.
  • the personal content being delivered may adapt by enabling closed captions or switching to a different feed where the audio portion is not important to content message delivery.
  • the content may adapt to messages where the audio portion is primary or where the visual portion may be effectively gathered when only snippets are being viewed.
  • Identity metrics may be seamlessly gathered to reduce conscious intrusions to the viewer through the use of cameras and facial recognition.
  • the system may have built in measures to minimize one's ability to consistently cheat the system. Users that are deemed to be likely cheating may be penalized in their marketing score.
  • the measures may include random challenge questions being presented to the User to test their knowledge of content presented. Additionally, random biometric challenges may also be provided to ensure the User's identity is maintained. Some of the biometric challenges may be ongoing and not require direct User action. Failing challenge questions may cause them to be put forth more frequently while passing them may reduce their frequency.
  • Ad placement based upon viewing context such as in a group of male friends or with spouse. Emotional location of thought, e.g. end of day kicking back. App inhibits volume maximum.
  • Ad placement is contextual, e.g. volume of prior commercial exit is linked with next commercial start so that the transition is more natural by choosing commercials that transition well from one to the next, that is, volume delta does not exceed a threshold.
  • Gestures such as taps during a commercial to give feedback as it is being viewed. Gestures are slowly taught to the user as popups explaining shortcuts.
  • Content can be viewed at any time, not just coupled with TV so that you can view content specific to your location, such as at the Mall etc.
  • Roku uses Apple's HTTP Live Streaming (HLS) over TCP.
  • HLS HTTP Live Streaming
  • RTP Real-time Transport Protocol
  • Arki ⁇ sTM is a trademarked name. It is used herein to refer to an exemplary system. A commercially available implementation of Arki ⁇ sTM may differ from the exemplary system described herein in form, function, and/or name.
  • Embodiments disclosed herein recognize that the more closely a person guards their private information, the more value it is to them. Retailers and advertisers will pay to gain that information, and already do, but the customer does not see any of that money. Where does it go? Clearing houses, search engine companies, and publicly traded corporations. Embodiments disclosed herein permit an individual's information to be controlled in a manner to permit the individual to be paid for usage of that information.
  • the disclosed system is constructed as a coop, owned by its users. Thus, any profit generated that is not fed back into the growth of the company is distributed among its members, the end users. This can also encourage networking through bonuses and such.
  • the disclosed system is constructed as a coop (or a standard corporation or a hybrid of the two), owned in a greater of lesser degree by its users (and investors, in the latter cases). Thus, some portion of profit generated that is not fed back into the growth of the company is distributed among its members, the end users.
  • a hybrid of the two involves stock but as value increases they reach a threshold, and everything above that line goes back/can be bought back by the coop.
  • the end user when signing up for the system, the end user downloads a profile generator to the hard drive 3605 , 3606 , 3607 and a customizable profile is securely stored for use by the engine.
  • a key to this profile is that it is completely up to the individual user how much information to provide. There are NO required fields except for the most standard information to set up a deposit/credit account with the system. Beyond this, any information provided by the end user performs two main functions:
  • the user profile is uploaded to the cooperative's user profile database 3611 .
  • this profile database 3611 is dynamic, and any alterations the user wishes to make to the desktop profile will automatically upload to the online user profile database 3611 .
  • the user profile is uploaded to the coop's user profile database and formulates a number to place them within a range of people within the database. That number defines how that user will be shown to the advertiser as buying potential.
  • this profile database is dynamic, and any alterations the user wishes to make to the desktop profile will automatically upload to the online user profile database. This could be limited by honesty/normalcy tolerances provided by the Cooperative.
  • the search engine page 3700 has a standard, simple search engine interface 3720 for use as a standard search engine. It also has a user login option 3710 on the side. A user can only make money when he is logged into the system. Auto-login of some kind may be provided along with the system browser, password storage and homepage.
  • the user can get paid while browsing 3822 , as well as manage a completely self-sufficient online banking system 3820 to add another level of security to online transactions by filtering them all through the system.
  • the online retailer no longer obtains any information from the end user during the transaction because the purchase is paid for using credits 3826 and paid out through the system 3830 . This further protects the end user from unsuspectingly giving out personal information and compels retailers/advertisers to join the system, because otherwise they cannot gather information about the types of users buying their products.
  • a credit account comes automatically with signup to track credits earned through browsing; users can purchase additional credits 3810 to be used on any online transaction (protecting information from retailer and verifying follow-through conversion on keyword search intentions, as well as boosting click quality); a credit card can be ordered to use U-Dollars in physical transactions (also verifies purchases from “Brick & Mortar” retailers, boosts click quality).
  • the search bar 3722 , 3724 resembles any other search engine.
  • FIG. 39 beneath the search bar, however, is a list of possible intentions 3900 that the user can click to tailor the search results and advertisements to his needs for that keyword search: Definite Buyer 3910 (Brick and Mortar buyer 3920 increases click value to local advertisers, decreases to others 3922 ), Potential Buyer 3930 /Price Comparison (time frames to estimate when it will be bought 3932 ), Research to Buy 3940 (increases appeal to informational sites 3942 ), Just Browsing, Rather Not Say 3950 (advertisers will determine their own Max CPC (cost per click) for unspecified users just like standard search engines 3952 ).
  • the results 3760 are organized according to a user-specified ranking of factors.
  • the advertisement results are dynamic columns that can be reorganized and reranked 3750 by:
  • the ads displayed in response to a search query 3760 have a few additional features 3770 compared to other search engine advertisements.
  • the system's ads display Click value 3772 , Focus Spectrum statistics 3774 , 3776 .
  • the Focus Spectrum is one of the most dynamic and uniquely appealing aspects of the search engine.
  • users specify not only their personal information, but the range of interests to which they would like their ads tailored. For example, a high-income user might want to only view ads for high-end consumer products. Rather than allow the advertiser to determine what the user wants to see, the engine uses a statistical grouping formula to determine other users with similar profiles in the specified area. Thus, a high-income user who selects income as a key focus spectrum factor would see the click and purchase choices of other high-income users displayed beneath the advertisements.
  • the statistics show the percentage of similar users who decided to click on the product 3774 and the smaller percentage that followed through with a conversion 3776 .
  • a simple focus statistics toolbar 3730 above the listing of advertisements has a customizable percentage that jumps between discrete amounts 3734 to change the range of the focus group.
  • the engine recalculates the relevancy of advertisements and adjusts their rankings accordingly.
  • a user's click value directly affects the amount that a user is offered by advertisers for clicking on an ad 3800 .
  • the click value is based on: click quality—loosely determined by: (# of conversions)/(# of clicks) ⁇ 100%, demographic, income level, interests, geographic location, search intentions, any other profile information that the end user may provide.
  • Each advertiser can specify what aspects of a user's profile most enhance the click value to that advertiser.
  • advertisers can target demographics, income levels, interests, geographic locations, and search intentions to fit their specific product or goal, but only for each individual end user insofar as that user supplies the information.
  • the advertiser cannot obtain the identity of the specific end user. This is a part of the security promise of the system.
  • the advertiser can never obtain the identity of the specific end user unless the user agrees to provide some personal info. This is crucial to the security promise of the system.
  • the focus spectrum uses complex statistical analysis of end user profile data to quantify the similarity of two users.
  • the end user specifies what similarities are most important to him or her, and each keyword search groups other user data accordingly.
  • the focus spectrum can be shifted based on: Income, Demographic, Interests/Hobbies, Geographic location (IP address), Conversion Rate (Frequent Buyer, Occasional Buyer, Brick and Mortar Buyer, Rare Buyer) 3732 .
  • One or more factors can be selected to filter the advertisements even more thoroughly. For example, let's say an 18 year old female is searching for digital cameras online. The focus spectrum uses the groupings according to her demographic (e.g. 16-20) and expressed interest in professional photography to quantify the relevancy of the advertisements based on other similar users. The resulting ad rankings display the advertisements for higher-end cameras that garnered the most click-throughs and conversions among the 16-20 year old demographic. If she wanted to expand the search to high-end digital cameras among all ages, she could deselect 3736 the demographic factor and focus solely on the most popular and successful advertisements among those with an interest in professional photography.
  • her demographic e.g. 16-20
  • the focus spectrum uses the groupings according to her demographic (e.g. 16-20) and expressed interest in professional photography to quantify the relevancy of the advertisements based on other similar users.
  • the resulting ad rankings display the advertisements for higher-end cameras that garnered the most click-throughs and conversions among the 16-20 year old demographic. If she wanted to expand
  • the value of an end user's click may be listed underneath the ad, which states the amount paid to get through and the determined relevancy factor.
  • the Focus Spectrum is based on statistical data about other users with similar profiles. Personalized data provides information on other conversion profiles, using variable matching (within 5%, 10%, etc.). Users may also be paid bonuses for survey information in addition to click/conversion dollars, and also may be paid lead bonuses—newsletters, subscriptions, etc.
  • Customizable advertisement ranking is a more robust targeting mechanism for the end user, not the advertiser. It allows the viewing of statistics for other buyers without revealing the identity of those other buyers.
  • a user can prioritize ad rankings by price (that advertisers are willing to pay for your click), relevancy, Focus Spectrum (based on end user-specified group of similar users), interests, and intention (serious buyer, research etc.)
  • Advertisers 4020 see only delivery numbers for UPS 4022 , not personal buyer information. As shown in FIG. 40 , complete self-sufficient banking online allows complete anonymity: the end user 4000 buys online credit through a credit card, spends the credit on online products 4002 , the retailer ships to UPS, and UPS ships to a local address 4004 based on a unique scan code 4030 which changes with every transaction.
  • a time-dependent click value is a model for checking the veracity of a user's click intention. For example, if claiming “Definite Buyer,” the user will be paid the full amount promised by the advertiser only if they follow through with a conversion within the given time frame. If the user does not follow through, the initial SX paid for the amount will be cut to a fraction determined by the advertiser. Retailers can also choose not to cut cost no matter what, to enhance their ad's appeal to the end user.
  • Click quality conversions/clicks. Time- and keyword-specific search purposes are specified for each keyword search by a selection underneath the search toolbar.
  • the matching of users with relevant advertisers has a general formula based on the user-specified profile.
  • the engine uses a combination of overall click value and more significant and targeted keyword-specific click value to determine how much the advertiser is willing to pay.
  • the first factor in matching the user with relevant and interested advertisers is relevancy, which is based on:
  • the relevant advertisers then scale the user based on the user's self-expressed/determined buying potential (ex. “I promise to buy within 3 clicks”; “Frequent Buyer”; etc.), click value (performance history), keyword-specific click value (performance history within the keyword-specified area).
  • User profile numbers could be 100 digits long or more, where only specific digits apply to each advertiser (i.e. there is a number for camping specifically).
  • a matching system joins two people together; we want to join the buyer and advertiser. It includes not just user-defined information, but performance-based info (“I promise to buy within the first 3 clicks”).
  • Rating sites by other users a user can select to show results with only certain ratings.
  • the click value scales the maximum cost per click. Rate different aspects of advertisers to tailor business to end user preference.
  • geographic location is a much less significant factor than income, especially when searching for computer hardware, per se.
  • the geographic location may come into play much more when searching for sleeping bags.
  • the combination and weight of the different qualifiers in creating a focus spectrum for each individual search is dynamic and largely dependent on the keyword itself.
  • the number derived from the focus spectrum is the Relevancy Factor of the ad for those within the spectrum. This percentage is displayed underneath each advertisement to show how relevant other users thought that advertisement to be. The percentage is based not solely on click-throughs, but also on conversions. A conversion is worth significantly more than a click-through. Accordingly, the number generated, although a percentage, is not solely (clicks)/(impressions) for the focus group. It may look something more like [(clicks)+100*(conversions)]/(impressions).
  • FIG. 41 is a flowchart of a particular system for purchasing goods online.
  • the end user signs up for the system and downloads software for use on a local computer.
  • the user then uses the software to create a customized profile, which may include one or more of demographic information, income level, interests/hobbies, geographic location, type of buyer, and search intentions.
  • the user then uploads the customized profile to a database.
  • the system assigns an initial Click Value 4210 to the user based on profile information.
  • the customized profile is also used to determine Focus Spectrum Statistics, which encompasses the range of interests for the ads that the user will view.
  • the user then logs in to the system and selects an intention, specifying a choice of definite buyer, potential buyer, research to buy, just browsing or rather not say.
  • the user then performs standard keyword searches for items and the system returns advertisement results based on the Focus Spectrum Statistics, Click Value, relevancy and product price.
  • the user then has a yes/no choice to rerank the results based on any of these factors. Choosing yes allows the user to rerank the results and obtain a new set of advertisement results based on the user's choice. Choosing no allows the user to continue to make a purchasing decision. Depending on the nature of a purchasing decision, the system assigns a conversion value.
  • the system described herein can also be implemented through interactive television or radio, particularly via satellite television and radio systems and cable television systems.
  • a customizable profile is securely stored for use by the system's engine.
  • the end user downloads a profile generator to the hard drive.
  • a key to this profile is that it is completely up to the individual user how much information to provide. There are NO required fields except for the most standard information to set up a deposit/credit account through the system.
  • the user profile is uploaded to the system's user profile database.
  • This profile database is dynamic, so any alterations the user wishes to make to the desktop profile will automatically upload to the online user profile database, ensuring that the user's Click Value stays up to date.
  • the system is constructed as a cooperative, so users own their own data and the system's members own the system. Thus, any profit generated that is not fed back into the growth of the company is distributed among its members, the end users.
  • the system is constructed as a standard corporation, owned in a greater or lesser degree by its users and investors. Thus, in these embodiments, some portion of profit generated that is not fed back into the growth of the company is distributed among its members, the end users.
  • the system is a hybrid between a cooperative and a standard corporation. For example, stock can be owned by investors, but as the value of the company increases and reaches a threshold, any additional value goes back to the cooperative, or can be bought by the cooperative.
  • the system's search engine page has a standard, simple search engine interface for use as a standard search engine. It also has a user login option on the side. A user can only make money when he is logged into the system.
  • the system's search bar resembles any other search engine. Beneath the search bar, however, is a list of possible intentions that the user can click to tailor the advertisements, and in some embodiments the search results, to his needs for that keyword search.
  • these intentions comprise: Definite Buyer, Brick and Mortar buyer (increases Click Value to local advertisers, decreases to others), Potential Buyer/Price Comparison (user discloses a time frame to estimate when an item will be bought), Research to Buy (increases Click Value to informational sites), Just Browsing, Rather Not Say. For a ‘Rather Not Say buyer, advertisers may determine their own Max CPC (cost per click) for unspecified users just like standard search engines.
  • the advertisement results may be dynamic columns that can be reorganized and reranked by factors including: Click Value (amount that advertisers are willing to pay a user for their click, determined by the advertiser and based on specificity and details of a user's profile), relevancy (as determined by normal search engine relevancy), product price (if the user is searching for a specific product), Intention (serious buyer, research, etc.), Rating (site and/or advertiser rating by other end users) and Focus Spectrum (popularity among group of similar users as specified by end user according to, for example: interests, income, and/or demographic.)
  • the first factor in matching the user with relevant and interested advertisers is relevancy, which may be based on: the user-specified interests (advertisers create a similar interest page when creating an advertisement to select which users they would like to see their advertisements), the keyword itself (the system functions like a normal search engine, but combined with the other unique relevancy factors in determining the overall relevancy of advertisements) income level (for example, a high-end user would more likely buy camping supplies from REI than Target, and REI may pay more for the advertisement), demographic (for example, certain companies sell the same products but target different age groups), geographic location (local businesses that do not sell online or ship products are only concerned with local customers; location may be based on IP address or the user's profile)
  • This provides a more robust targeting mechanism for the end user, not the advertiser. Furthermore, it makes transparent the behind-the-scenes workings of Google and other search engines.
  • the user-specified advertisement ranking feature allows an end user to view statistics for other buyers without revealing the identity of those other buyers.
  • the system will only list advertisements for pages within the cooperative advertising group, creating a completely sheltered cooperative bubble. Advertisers must mirror their sites into the system for approval and advertisement listing, to ensure the end user's privacy protection.
  • All of the advertisements displayed in response to search queries are preapproved and hosted within the network to ensure end user privacy in all click-throughs from a search through the system's search engine.
  • the software/transfer page interface may check for cookies on landing sites to stop other advertisers from placing cookies unknowingly on users, preventing pages within the advertisement network from tracking end users.
  • the user can manage an online banking account.
  • This account works as a completely self-sufficient online banking system to add another level of security to online transactions by filtering each transaction through the system.
  • the online retailer no longer obtains any information from the end user during the transaction because the end user completes purchases through the system using the end user's credits, and the retailer is paid through the system.
  • the filtering of each transaction by routing it through the system further protects the end user from unsuspectingly giving out personal information and compels retailers/advertisers to join the system, because otherwise they cannot gather information about the types of users buying their products.
  • user profile numbers could be, for example, 100 digits long or more, where only specific digits apply to each advertiser. For example, there may be a number for camping specifically, which is embedded within the long profile number.
  • the online banking system automatically grants each user a credit account upon signup with the disclosed system, which may be linked to the user profile number.
  • This credit account allows users to track the money they have earned through browsing as well as other conversions. Users may purchase additional account credit to be used on any online transaction.
  • the use of credit for purchases protects the privacy of end user information from the retailer (by only identifying, for example, a portion of a user's profile number), verifies follow-through conversion on keyword search intentions, and boosts Click Quality.
  • a credit card can be ordered to use the account's credit in physical transactions. The credit card can be used to verify purchases from brick & mortar retailers, boosting Click Quality.
  • UPS personal buyer info
  • retailers ship packages to UPS, and UPS fulfills a purchase by shipping the package to an end user's local address based on a unique scan code. In some embodiments, this code changes with every transaction.
  • the advertisements displayed in response to a search query contain more information relevant to the end user's search needs compared to other search engine advertisements.
  • advertisements within the system display values including the Click Value, as well as Focus Spectrum statistics.
  • a user's Click Value directly affects the amount that an end user is offered by advertisers for clicking on an advertisement.
  • the Click Value is the monetary value an end user is paid for clicking on an advertisement.
  • Each advertiser can specify what aspects of a user's profile most enhance the Click Value to that advertiser. Thus, advertisers can target users within demographics, income levels, interests, geographic locations, and search intentions to fit their specific product or goal, but only target each individual end user insofar as that user supplies the information. Still, the advertiser cannot obtain the identity of any specific end user. This is a part of the security promise of the disclosed system.
  • the Click Value is based on, for example: Click Quality (which in some embodiments, may be determined by: (# of conversions)/(# of clicks) ⁇ 100%), user demographic, income level, interests, geographic location, search intentions, and/or any other profile information that the end user may provide which matches the advertiser's preferences.
  • the Click Quality formula shows that the more a user browses without making any purchases or other types of advertiser-defined conversions (leads, signups, page views, etc.), the lower the user's quality score drops.
  • conversions have variable values, not necessarily integers.
  • the Search Intention is used to tailor the advertisements, and in some embodiments the search results, to a user's purchase plans for a keyword search.
  • a list of possible Search Intentions comprises one or more of: Definite Buyer, Potential Buyer/Price Comparison, Brick & Mortar Buyer, Research to Buy, Just Browsing, Rather Not Say.
  • the Click Value is time dependent. This provides a model for checking the veracity of an end user's Search Intention. For example, if a user claims “Definite Buyer” as a search intention, the user may be paid the full amount promised by the advertiser only if they follow through with a conversion within a given time frame. If the user does not follow through, the initial SX paid for the amount may be cut to a fraction determined by the advertiser. In some embodiments, the retailer can also choose not to cut payout no matter what to enhance their advertisement's appeal to the end user.
  • the user's Click Value is increased for local advertisers and decreased for other advertisers.
  • the Focus Spectrum is one of the most dynamic and uniquely appealing aspects of the system's search engine.
  • users specify not only their personal information, but the range of demographic variables to which they would like their advertisements tailored. For example, a high-income user might want to only view advertisements for high-end consumer products.
  • the engine uses a statistical grouping formula to determine other users with similar profiles in the specified area, quantifying the similarity of a plurality of users. The end user specifies what similarities are most important to him or her, and each keyword search groups results based on other user data accordingly.
  • the Focus Spectrum can be shifted based on factors including: income, demographic, interests/hobbies, geographic location (IP address), conversion rate (in some embodiments, users may be denoted as, for example, Frequent Buyer, Occasional Buyer, Brick and Mortar Buyer, Rare Buyer)
  • the statistics show the percentage of similar users who decided to click on the product and the smaller percentage that followed through with a conversion. For example, a high-income user who selects income as a key Focus Spectrum factor would see the click and purchase choices of other high-income users displayed beneath the advertisements.
  • the user also specifies the range of the Focus Spectrum to narrow or broaden the focus group.
  • a simple focus statistics toolbar above the listing of advertisements has a customizable percentage that jumps between discrete amounts to change the range of the focus group.
  • a user may specify that profile variables relevant to the Focus Spectrum must match within 5%, 10%, etc. As the user expands or restricts the focus group size, the engine may recalculate the relevancy of advertisements and adjust their rankings accordingly.
  • One or more factors can be modified to filter the advertisements through the controls offered by the Focus Spectrum. For example, let's say an 18 year old female is searching for digital cameras online.
  • the Focus Spectrum uses the groupings according to her demographic (16-20, for example) and expressed interest in professional photography to quantify the relevancy of the advertisements based on other similar users.
  • the resulting advertisement rankings display the advertisements for higher-end cameras that garnered the most click-throughs and conversions among the 16-20 year old demographic. If she wanted to expand the search to high-end digital cameras among all ages, she could deselect the demographic factor and focus solely on the most popular and successful advertisements among those with an interest in professional photography.
  • certain factors come into play more often than others.
  • geographic location may be a much less significant factor than income, especially when searching for computer hardware, for example.
  • the geographic location may come into play much more when searching for sleeping bags.
  • the combination and weight of the different qualifiers in creating a Focus Spectrum for each individual search are dynamic and largely dependent on the keyword itself.
  • the number derived from the Focus Spectrum is the Relevancy Factor of the advertisement for those within the spectrum. This percentage is displayed underneath each advertisement to show how relevant other users thought that advertisement to be. The percentage is based not solely on click-throughs, but also on conversions. A conversion is worth significantly more than a click-through. Accordingly, the number generated, although a percentage, is not solely (clicks)/(impressions) for the focus group. It may look something more like [(clicks)+100*(conversions)]/(impressions) For a definite buyer, (conversions)/(clicks) for the Focus Spectrum may be more useful information.
  • system described herein can also be implemented through interactive television or radio, particularly via satellite television and radio systems and cable television systems.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computational Linguistics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Graphics (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Targeted Content solutions can be provided using a variety of techniques. Targeted Content can be provided in place of generic advertisements on a first device or on personal computing devices. Targeted Content can be presented during, or in place of, generic advertisements in Content (e.g., television content, streaming content, etc.). Targeted Content can be provided in individual and/or group environments. In a group environment, Users and/or Devices can be grouped into a shared advertising group and Targeted Content can be selected based on Profiles of one or more members of the group. Feedback can be received regarding Targeted Content and payout amount can be determined.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 16/730,917, filed Dec. 30, 2019, which is a continuation of U.S. patent application Ser. No. 14/916,151, filed Mar. 2, 2016, which is the U.S. National Stage of International Application No. PCT/US2014/057532, filed Sep. 25, 2014, which was published in English under PCT Article 21(2), which in turn claims the benefit of U.S. Provisional Patent Application No. 61/883,180, filed Sep. 26, 2013, U.S. Provisional Patent Application No. 61/891,323, filed Oct. 15, 2013, U.S. Provisional Patent Application No. 61/970,878, filed Mar. 26, 2014, U.S. Provisional Patent Application No. 62/024,964, filed Jul. 15, 2014, and U.S. Provisional Patent Application No. 62/024,973, filed Jul. 15, 2014, all of which are hereby incorporated by reference in their entirety.
  • BACKGROUND
  • Today there exists a massive vacuum in the free market capitalist system that is largely blind to the destructive onslaught of the negative externalities (e.g. pollution, unsafe labor conditions, etc.) it generates. The current market has no effective methodology or technologically systematic solution for effectively dealing with, or accounting for, these negative externalities. Today's market measures businesses primarily by their short-term profits, consequently businesses are heavily incentivized to ignore the long-term costs of negative externalities. Developed countries have created regulations that require businesses to account for negative externalities and price them into their decision-making processes, so to increase their competitive advantages, nearly all large corporations have offshored manufacturing to developing nations with lax or non-existent regulations. Furthermore, since the market has no effective mechanism for adding the costs of negative externalities into the final retail price, consumers in Western economies are insulated from these negative consequences—they demand low priced products that last just a few years, while unconsciously supporting the destruction of the environment and health of people in Eastern economies for the next one hundred years. A recent study showed that 64% of wealthy Chinese are seeking to emigrate and flee their homeland, due to pollution. Pollution in China is now so bad that nearly one-third of the PM2.5 particulate pollution on the West Coast of North America originates in the East. Clearly, our economic model is broken.
  • In the preindustrial economy, products were locally crafted by individuals or small teams that took pride in their work. The rapid advance of technology broke up the product making process into thousands of specialized pieces, causing a major shift in the economy away from personal, community-focused trade and toward impersonal and complex global exchanges where buyers and sellers are isolated and emotionally disconnected. The modern economy disenfranchises consumers from the decision-making processes that determine the way resources and capital are used and allocated to produce products and services for them. As a result, consumers focus on low prices and businesses on short-term profits at the expense of our human values.
  • Marketing and advertising drive the vast majority of sales in a today's economy. As long as advertising is predominantly controlled by businesses that are incentivized to push a propagandized, sexy image of their products with impunity, consumers will continue to be seduced into remaining largely oblivious and separated from the negative impacts surrounding the manufacture of the products they buy. Under this system, consumers have no way to filter and control the advertising targeting them or to efficiently project their human values into the market to govern the quality, standards, and values of the information delivered to them and the products they consume. Instead of an intelligent discourse between consumers and producers, the market has trivialized and reduced the interchange to a simplistic price point that marginalizes and in many ways excludes the humane values that should be at the center of the dialog to inform and direct our economic activity. Online reviews are a step forward, but since most individuals are not informed about the destructive environmental and health consequences of unregulated manufacturing, almost all reviews focus exclusively on the pros and cons of the product's performance
  • In addition, in this current digital age, our personal and private transactions and lives are increasingly exposed to either the public, corporate, or governmental domains against our will. This exposure has become so pervasive as of this writing, that people are fearful of taking full advantage of all of the possibilities and conveniences implied and possible with the Internet and mobile devices. We feel like our lives are increasingly no longer our own simply because we wish to purchase a product, get directions to a destination, or communicate for work or with our friends and loved ones.
  • Computerized targeted advertising is increasingly being used to target potential consumers. The ubiquity of social networks and the large volume of data generated by such networks is increasingly being used to further target advertising within electronic systems. Computerized advertising permits a degree of targeting not possible in other realms. Yet, the ubiquity of social networks and other online services entice us to sacrifice our privacy in order to receive the benefits of these “free” services. This approach creates an escalating tension between our desire to control our personal information and the service provider's need to continually improve profits by selling increasingly targeted advertising.
  • Current targeted advertising systems suffer from a number of other limitations. For example, such systems may not be able to provide targeted advertising in a shared system with multiple devices, such as televisions and mobile phones. In addition, such systems may not provide for targeted advertising to participants in a group setting. Another area of concern for Consumers is that they are unable to control the subject matter or kind of advertising that is being pushed to them; and there is currently no technological solution way to have their values, morals, and privacy respected and reflected in a more meaningful way than is available currently.
  • Therefore, there exists ample opportunity for improvement in technologies related to providing targeted advertising solutions in a variety of different situations.
  • With current advertising and fulfillment systems, retailers have access to a great deal of a potential customers' information. The information is valuable to retailers but customers have a desire to guard the information.
  • Keyword advertising is booming across the Internet today, and behind the scenes, money changes hands with every click of a user's mouse. Retailers and advertisers are more than willing to pay for access to a user's information—but the user is forced to give up this information for free. The money may be diverted to clearing houses, search engine companies, or publicly traded corporations. The end user fuels the economics of online advertising; however, the end user does not obtain his or her rightful portion of the generated cash flow accompanying every click.
  • Although it may be too melodramatic to compare the constant surveillance of user data on the Internet to Big Brother of Orwellian fame, it is well known that advertisers place cookies unknowingly on users, tracking end users without their consent.
  • There is a need to improve advertising methods so that they are more protective of an end user's privacy, while ensuring that they are as accurate as possible by paying users to view advertisements that are targeted to an end user using personal information that is voluntarily provided by the end user. Additionally, there exists a profound need for consumers of the digital age to gain the advantages of real time location and activity tracking without sacrificing their privacy or their values in the process. And a way needs to be made to empower consumers to compel and reward producers to do better for the world.
  • SUMMARY
  • This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
  • The present invention relates to computerized advertising and fulfillment systems.
  • Embodiments of the disclosed systems (referred to generally herein by the trade name Arkiïs™) resolve the above noted conflict by aligning the interests between Providers and Consumers. The Arkiïs™ platform safeguards member privacy, providing tools to create and control in-depth Profiles. As these Profiles become more exhaustive, the advertising becomes more highly targeted and thus more valuable for both Marketers/Providers and Users who are paid to watch and engage with these ads. (Payouts may be used to purchase Content (e.g. TV shows) and Products.) Members may increase their advertising payouts by providing Feedback, sharing an ad with a friend, or using a coupon. To maintain integrity, honesty, and payout equity, the Arkiïs™ system rates each User's buying performance by analyzing numerous metrics including how accurately their Assertions (e.g. buying predictions) match their future actions (e.g. subsequent purchases) and the rate at which they buy advertised Products. Additionally, Arkiïs™ enables Users to project their values into the marketplace by joining with other like-minded Users to create buying groups that influence the way goods and services are produced for them, and to maintain their privacy in the process.
  • There are other important social and moral values that are also not being reflected in our ability to control what we purchase while still gaining the advantages of a competitive environment that helps lower price and increase economic efficiency. For example, people may have ethical or even religious reasons to control the content of what they purchase and see being pushed to them in the form of advertisements for goods and services into their personal or electronic sphere. And while people may desire greater control over what they see and hear, they are not enamored with the idea that free speech and a free market be limited. How to reconcile these seemingly opposing goals? How do people control their content in a free market manner while not interfering with another's desire to control their content? John Stewart Mill famously wrote “the freedom to swing your arm ends where my nose begins.” The idea that all of our digital noses can be protected from the swinging arms of advertisers, corporations, government propaganda and other information pushers and acquirers; while at the same time, gaining better disclosure and transparency as to any damage being caused by these entities for our personal consumption choices (environmental, moral and ethical), has not been practical and achievable until the advent of the innovations, methods, and concepts described herein.
  • A variety of techniques and tools are described for providing targeted advertising solutions that can provide privacy protection. For example, targeted advertisements can be provided to a User based on the User's Profile. Targeted advertisements can also be provided to a group of Users based on Profiles of one or more of the Users in the group. Targeted advertisements can be presented instead of generic advertisements (e.g., non-targeted advertisements). For example, targeted advertisements can be provided (e.g., provided seamlessly or transparently to the User) instead of generic advertisements in audio and/or video Content (e.g., broadcast television, streaming content, etc.). Targeted advertisements can also be provided on a computing device (e.g., a mobile computing device, such as a smartphone or tablet computer) for consumption by Users while engaged with a First Device (e.g., watching a television display).
  • For example, a method can be provided for providing targeted advertising to a group of Users. The method comprises grouping a plurality of Users into a shared advertising group, determining one or more targeted advertisements to be presented to the shared advertising group, where the determining the one or more targeted advertisements is based, at least in part, on Profiles (that can be kept private) of the plurality of Users in the shared advertising group, and providing the one or more targeted advertisements for presentation to the shared advertising group. Such method is too complex and time consuming for one or more humans to carry out and thus requires automation through one of more computing devices, which when using this method is able to more effectively deliver Targeted Content, that can be privacy protected, to a group of Users than it could by considering them individually. Such method is not a previously well-understood, routine, or conventional activity, being a significant improvement in the field of selecting and delivering targeted advertising.
  • As another example, a method can be provided for participating in a group receiving shared advertisements, comprising a plurality of Users. The method comprises associating with the shared advertising group comprising the plurality of Users, providing Context Information associated with Content, where the Content is being consumed by a User, who is a member of the group, on a First Device, reproducing one or more targeted advertisements, where the one or more targeted advertisements have been selected for presentation to the shared advertising group, and where the one or more targeted advertisements have been selected based, at least in part, on Profiles of the plurality of Users, that can be privacy protected, in the shared advertising group. The method can also comprise receiving Feedback for at least one of the one or more targeted advertisements. The User can also receive a payout for receiving one or more of the advertisements, and the payout can be based, at least in part, on the provided Feedback. The group can be formed for any reason, based upon shared purchasing interests, shared values and goals, or any other reason why association in the group benefits its members, and therefore benefits potential advertisers desiring to connect with such a group even though the connection may be opaque and private as to the User group such that the advertiser cannot see or access the personal Profile, name, or digital address of the group or its participants.
  • In addition, a symbol, certificate, or Visualization can be utilized that quickly surmises how well an item matches the values and desires of the one or more Users. Such a certificate can display information in a clear and concise manner by format, terminology, imagery or symbols, to concisely convey and/or summarize information to a User without that User being compelled to delve into the body of the advertisements or information being pushed to them, and can be performed without that User's privacy being infringed. In addition, it is possible for Users and groups (or even Providers and Advertisers) to receive some sort of integrity rating that quantifies how well a User or group matches their stated purchasing predictions and behavior. This rating permits advertisers to more accurately gauge whether paying a User or group to consume their advertisement is reasonable in light of the relationship between their stated intentions and their actual behavior. For example, if a group indicates that it intends to purchase a yacht within the next six months, but actually does not come close to possessing the capability or true intent to do so, a yacht company may not want to pay such a group to receive their yacht advertisements. Such integrity ratings may go both ways as to Providers and Users and help ensure that proper economic (or moral) efficiencies are being sustained within the system. Finally, while the integrity rating can influence a user or group's standing within the system, it may do so without exposing who they are personally because their privacy can be protected. And because it is not personal, it increases the likelihood of honesty and accuracy, which in turn, increases economic efficiency for all concerned.
  • Embodiments of the present invention concern systems for selling goods online via a global computer network. The end user signs up for the disclosed system and, in some embodiments, downloads profile creation software for use on a local computer. The user then creates a customized profile, that can remain private, which may include one or more of: demographic information, income level, interests/hobbies, geographic location, type of buyer, and search intentions which can remain opaque or anonymous to any potential advertiser or producer. The user then uploads the customized profile information to a database. Based on profile information, the disclosed system assigns an initial Click Value to the user (amount that advertisers are willing to pay a user for their click, determined by the advertiser and partially based on specificity and details of a user's profile). The customized profile is also used to determine Focus Spectrum Statistics (including the percentage of similar users who decided to click on the product and the smaller percentage that followed through with a conversion), which encompass the range of interests for the advertisements that the user, who may remain anonymous, will view.
  • The user then logs into the system, which can protect their external privacy as to potential advertisers, and is offered the choice to select an intention representing the user's conversion plans for the near or immediate future, specifying a choice of, for example, definite buyer, potential buyer, research to buy, just browsing or rather not say. The user then performs standard keyword searches for items and the system returns advertisement results based on, in a preferred environment, Focus Spectrum Statistics, Click Value, relevancy and product price. The user then has a choice to rerank the results based on any of these factors.
  • In one embodiment, the user has a yes/no choice to reorder the results based on factors including the Focus Spectrum Statistics, Click Value, relevancy, advertiser or site rating, and product price. Choosing yes allows the user to rerank the results and obtain a new set of advertisement results based on the user's choice. Choosing no allows the user to continue to make a purchasing decision. Depending on the nature of a purchasing decision, the system assigns a conversion value (for example, Sale=1; Subscription=0.5; Lead=0.75; Page View=0.05×# of pages; and No Action=0), which affects the user's Click Value.
  • The disclosed system eliminates the need for real-life focus groups, joining the buyer and advertiser digitally. A rating system where end users can rate different sites or aspects of advertisers allows advertisers to ascertain what advertisements and products work, and what needs to be improved. The system allows advertisers to gain more input from end users, while maintaining the identity protection which is always granted to end users within the system. Users can make their opinions known, directly affecting new products and advertisements and tailoring businesses to their preference.
  • The methods described herein are for implementation via computing devices. For example, mobile computing devices (e.g., mobile phones, smartphones, tablet computers, etc.) can implement the methods described herein to more effectively provide targeted advertising solutions (e.g., provide User Profile information for storage in a server or cloud database, provide Context Information regarding programming currently being consumed, provide targeted advertising options and payout information, present targeted advertising for consumption by Users, receive Feedback regarding targeted advertising, etc.).
  • As described herein, a variety of other improvements, efficiencies, features, and advantages can be incorporated into the technologies as desired.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of an example system for providing targeted advertising.
  • FIG. 2 is a diagram depicting the selection of Content to deliver to a Consumer based upon the Consumer's Profile that includes preferences and rules, the present context including the time, location, social, and adjacent Content of the User, and the matching Content information including Independent Reviewer Certifications and bid amount.
  • FIG. 3 is a flowchart of an example method providing targeted advertising to a group of Users.
  • FIG. 4 is an illustration of the generation of an actualize bid offered by a Marketer for use by content selector.
  • FIG. 5 is a flowchart of an example method for participating in a shared advertising group comprising a plurality of Users.
  • FIG. 6 is a flowchart of an example method providing targeted advertising to a group of Users including a Champion.
  • FIG. 7 is a flowchart of an exemplary depiction of how Users and Merchants are connected together to provide opportunities to a User based upon their location.
  • FIG. 8 is a diagram depicting the Spectrum of Targeted Content.
  • FIG. 9 is a diagram of the flow of digital Content to a Consumer.
  • FIG. 10 is a Venn diagram of the relationship between a Master Profile and Public Profiles.
  • FIG. 11 is a diagram depicting many of sources of information for building a User's Profile in the Arkiïs system including corrections, edits, and deletions by the User.
  • FIG. 12 is a diagram depicting a User Profile, that can be privacy protected, and many of the constituent pieces of a User Profile.
  • FIG. 13 is a flowchart of friendship, networking, and social media integration.
  • FIG. 14 is a diagram of the workings of a Family Friendly Location.
  • FIG. 15 is a flow chart depicting how Content is created, provided, filtered, and fed back upon.
  • FIG. 16 is a Venn diagram showing the different kinds of User Profiles.
  • FIG. 17a is a series of exemplary depictions of the match level between the interests of a Profile and a particular piece of Targeted Content.
  • FIG. 17b is an exemplary depiction of the match level between the interests of a Profile and a particular piece of Targeted Content.
  • FIG. 18 is an information flow diagram in an exemplary Content ranking, Filtering, and alerting system that can be used in conjunction with the technologies described herein.
  • FIG. 19 is a diagram depicting the various Devices that a Consumer may receive digital content from along with their ability to provide Feedback back to those Devices.
  • FIG. 20 is a flowchart of SyncGroup Profiles, that can be privacy protected.
  • FIG. 21 is an exemplary SyncGroup Profile creation and notification system that can be used in conjunction with the technologies described herein.
  • FIG. 22 is an exemplary depiction of a SyncGroup of three individuals coordinated by their mobile phones with targeted advertising delivered to a shared First Device.
  • FIG. 23 is a flowchart of an exemplary depiction of a SyncGroup of three individuals coordinated by their mobile phones with targeted advertising delivered to a shared First Device.
  • FIG. 24 is a diagram of the Champion process.
  • FIG. 25 is a flow chart depicting a Content Producer asking a question about Consumers that is answered by a function that takes as input the context, the Consumer's Profile, and the producer's information to receive the probability of a positive answer to the question that is used to inform the decision as to whether to bid and how much to bid to submit Content to a particular Consumer for possible consumption by the Consumer.
  • FIG. 26 is a graph depicting the likelihood a User will purchase a new car over the time of a year.
  • FIG. 27 is a diagram depicting the use of 3rd party plug-ins to extend the Arkiïs system through published APIs while maintaining security of Profile information.
  • FIG. 28 is an exemplary depiction of how well a particular piece of Targeted Content matches the interests of a profile along various dimensions and in aggregate.
  • FIG. 29 is the illustration of creating a Product's User customized match level certificate that is presented to the User.
  • FIG. 30 is an exemplary stream selector system that can be used in conjunction with the technologies described herein.
  • FIG. 31 is an exemplary bidding scenario wherein the highest bidding advertiser wins the right to deliver advertising to a public profile and the public profile shares in the proceeds. It is also an exemplary bidding scenario of a single advertiser bidding on several Profiles at different rates and winning a subset of these bids.
  • FIG. 32 is a diagram of an exemplary computing system in which some described embodiments can be implemented.
  • FIG. 33 is an exemplary mobile device that can be used in conjunction with the technologies described herein.
  • FIG. 34 is a flowchart of an example method governing the automated collection of data that can be privacy protected.
  • FIG. 35 is an exemplary cloud computing system that can be used in conjunction with the technologies described herein.
  • FIG. 36 is a representation of the system components and users: the system network and software interface, end users' local computers, and advertisers.
  • FIG. 37 is an example GUI (graphical user interface) depicting a search through the system, from the user's perspective.
  • FIG. 38 is a flowchart depicting the transfer of money and credit through the provided online banking system, between the user (who may maintain anonymity) and the advertiser.
  • FIG. 39 is a flowchart depicting the Search Intention and the different effects caused by selecting its choices.
  • FIG. 40 is a visual representation of a shipping method that hides the user's identity from the advertiser supplying a product.
  • FIG. 41 is a flowchart of a system for purchasing goods online.
  • FIG. 42 is a visual representation of the Click Value and how its value can change.
  • DETAILED DESCRIPTION
  • 1. Table of Contents
    1. Table of Contents 13
    2. Key Terms 13
    3. System for Providing Targeted Advertising 19
    4. Providing Targeted Content 26
    5. Operational Overview 56
    6. User Profiles 61
    7. Alternate Device Synchronization 89
    8. Coordination between Devices 94
    9. Sharing Targeted Advertising between Users 99
    10. Providing Premium Content 121
    11. Providing Feedback on Content, Goods, and Services 123
    12. Providing Payment for Content, Goods, and Services 142
    13. Exemplary General Purpose Computing System 151
    14. Exemplary General Purpose Mobile Device 154
    15. Exemplary General Purpose Cloud Computing System 161
    16. Exemplary Implementations 162
    17. Advertising and Fulfillment System 172
    18. Privacy 177
    19. Alternative Advertising and Fulfillment System 180
    20. Alternatives 187
  • 2. Key Terms
  • Certain words within the description of the disclosed system have specific meanings, and are generally capitalized within the text of the description. These words whether in singular or plural form, shall have the meanings as defined below.
  • Alternate Device: A Device that may provide alternate Targeted Content to that of a First Device. In some embodiments, the Alternate Device is a mobile device being used by a single User where the First Device may be shared by a plurality of Users. Other Alternate Devices include a DVR, a Roku™ player, and a networked Blu-Ray player.
  • Assertion: A forward-looking declaration of a User's intention to take future action(s) related to a targeted marketing profile (e.g. make a purchase, travel, go to college in fall, adopt a baby) and which may be qualified with a probability (e.g. 80% likely to go to Europe) and/or a condition (e.g. if my portfolio grows by 10% then I will buy a new car).
  • Business User: An Individual User that is acting on behalf of a business, non-profit, governmental, or other incorporeal entity.
  • Business User Profile: Either a Goods & Services Provider Profile, Marketer Profile, Content Producer Profile, or Content Provider Profile.
  • Badge: Awarded recognition in a publicly visible manner that a User is independently certified to have achieved an accomplishment. Sometimes described as an emblem.
  • Certifier: A Reviewer that provides independent certification about suppliers for specific metrics and often is a Non-Governmental Organization (NGO) or individual.
  • Certifier Profile: A collection of delineating information about a Certifier that may be used by Consumers to filter associated certification content.
  • Consumer: A User or SyncGroup of Users, who can remain anonymous, that receives content from Content Producers, which may be received by way of Content Providers and may buy from Goods & Services Providers.
  • Content: Any experiential information consumed by a User, that may include interactions and/or artistic expression such as video, audio, still photos, words, comic strips, and live performances. Content is a continuum from paid premium to targeted advertising that may pay the User, who can remain anonymous.
  • Content Producer: An entity that creates Content for consumption.
  • Content Producer Profile: Any delineating information about a Content Producer that may be used by Consumers to Filter their Content delivery.
  • Content Provider: An entity that delivers Content for consumption.
  • Content Provider Profile: Any delineating information about a Content Provider that may be used by Consumers to Filter their Content delivery.
  • Content Spectrum: The range of available Content that spans from high-value/Premium Content to low or negative value Content—like advertising that pays Consumers. A particular Content's value may vary depending upon Consumer's preferences, context, etc.
  • Context Information: Data points, often from a User's Profile, that can remain private, which may be utilized to deduce the Content likely being consumed by the Consumer.
  • Device: An instrument that reproduces digital Content for a Consumer.
  • Family Friendly Location: A location where all Content being delivered adheres to Profile Filtering of all detected persons present.
  • Family Friendly Content: Content that may be audited, rated, and/or judged by a Content Producer, a User, and/or a third party to adhere to certain individual, family, and/or community standards that one or more Users may wish to govern.
  • Family Friendly Device: A device that may be configured to detect the presence of minor children with Filtering requirements and automatically Filter Content to that which satisfies the Filtering criteria for all the detected children present. Adults may also configure Filtering requirements for themselves to be protected through Content filtration.
  • Feedback: Assessment of consumed Content by a Consumer provided either unsolicited or in response to solicitation by the Content Producer. Feedback may also be an assessment of a Consumer's transactional performance by a Goods & Services Provider party of a transaction.
  • Filter: The control of blocking Consumer visibility of Products, Content, Marketers, Reviewers, and Content Producers based upon preferences in a Consumer's Profile.
  • First Device: The initial Device or Devices a User engages with in a Content consumption session whose Content may be superseded by the addition of one or more Alternate Devices. An Alternate Device may itself be the First Device of a further superseding Alternate Device.
  • Generic Advertisement: Generic Content where the Content is Marketing Content.
  • Generic Content: Content that is not individually Targeted toward a Consumer.
  • Goods & Services Provider: An entity, such as a manufacturer or service provider, that sells goods and/or services for consumption.
  • Goods & Services Provider Profile: A collection of delineating information about a Goods & Services Provider that may be used by Consumers to Filter associated Marketing Content.
  • Independent Reviewer Certification: A trusted check on facts and source for specific comparative metrics about a Provider, Product, or service, often provided by an NGO or individual.
  • Individual User: A User that is an individual person, representing themselves that can maintain their anonymity.
  • Individual User Profile: A collection of delineating information about an Individual User.
  • Market Request: A process by which Consumers publish desires and/or commitments to buy goods or services for which there is nothing exactly matching and presently available. This allows Users to extend their values into the marketplace to influence the way goods and services are created for them. Consumers may also publish Market Requests related to Product Champions, Champion performances, reviews, or certifications.
  • Marketer: An entity that targets Marketing Content to select Consumers. (Sometimes described as an advertiser.)
  • Marketer Profile: A collection of delineating information about a Marketer that may be used by Consumers to Filter their Marketing Content.
  • Marketing Content: Content created in an attempt to induce a Consumer action and that may be the basis for a payment to the Consumer and may be targeted.
  • Master Profile: A private Profile connected to a single User that helps to delineate their individual identity.
  • Participants: Consumers, Reviewers, Marketers, Content Providers, Content Producers, and Goods & Services Providers that are included in the Arkiïs™ system.
  • Physical Proximity: A plurality of Users in the same general physical location (near each other, such as in the same room) at the same time such that Users may readily share one or more Devices or interact with each other such as by smelling, touching, talking, or hand signals.
  • Premium Content: Content that a Consumer usually pays to consume and which may be targeted. Broadcast television is also premium and paid for by the included generic advertisements.
  • Primary Content: Content for which Arkiïs™ Targeted Content may be overlaid.
  • Product: Goods or services including Content or anything that can be consumed, viewed, used, or received.
  • Product Champion: A Consumer that promotes, compares, or disparages Products to other Consumers and may be compensated by an interested Marketer. (Sometimes described as a Champion.)
  • Profile: A collection of information that delineates an identity and can be accessed for targeting purposes while remaining anonymous.
  • Provider: A Goods & Services Provider, Reviewer, Product Champion, or Content Producer. An entity that supplies something to a User.
  • Reviewer: A User or SyncGroup of Users who provide detailed Feedback related to transactions, Content, goods, services, or others' Feedback.
  • Reviewer Profile: A collection of delineating information about a Reviewer that may be used by Consumers to Filter associated review Content.
  • Sub Profile: A User-designated subset (possibly an improper subset) of their Master Profile's demographic information about them that is used for the purpose of helping select the Content they receive. This may contain false information in order to protect a User's privacy. Sub Profiles may be private or public.
  • SyncGroup: A plurality of Users who join together into a group to synchronize their consumption of Content and who may elect to maintain a group Profile. Sometimes described as a shared advertising group.
  • SyncGroup Profile: A Profile that is created to identify a SyncGroup that is persistent or ongoing.
  • Targeted Content: Content that is selected based upon a Consumer's Profile information.
  • Targeted Marketing Content: Marketing Content that is also Targeted Content.
  • Targeted Premium Content: Premium Content that is also Targeted Content.
  • User: A person who logs into the Arkiïs™ system, on behalf of themselves, another individual, or another entity and can maintain a privacy protected identity.
  • User Profile: A Profile that is created to identify a User.
  • Visualization: A compound pictogram that communicates how well a Product matches a Consumer's stated values, ethics, goals, and standards. (Also referred to as a certificate or graphic.)
  • Virtual Proximity: A plurality of Users consuming the same Content at the same time.
  • 3. System for Providing Targeted Advertising
  • FIG. 1 is a block diagram of an example system 100 for providing targeted advertising solutions to implement the Arkiïs™ system. An operational overview of the system 100 is provided in Section 3—System for Providing Targeted Advertising and describes providing targeted advertising solutions to Users of computing devices (e.g., mobile computing devices) that are also receiving Content on a First Device (e.g., viewing a television). Providing targeted advertising solutions can comprise providing Targeted Content (e.g., targeted advertising content and/or other types of Content provided in association with targeted advertising) to Users of computing devices.
  • The example system 100 comprises a Targeted Content computing system 110. The Targeted Content computing system 110 can comprise various types of computing resources (e.g., computer servers, database servers, streaming media servers, networking resources, and/or other types of computing resources) for providing targeted advertising solutions to user devices 160 and their associated users. For example, the Targeted Content computing system 110 can be implemented as a cloud computing system.
  • The example system 100 also comprises User Devices 160. The User Devices 160 are computing Devices associated with Users (e.g., mobile phones, smartphones, tablet devices, smartwatches, etc.).
  • The system 100 also comprises a First Device 140 (e.g., a television or another type of display Device). The Device 140 can be a shared First Device (e.g., a display that is shared by the Users of the User Devices 160, such as a television in a home being viewed by multiple Users or a television in a business such as a sports bar or a movie screen in a theater). In some situations, multiple First Devices can be provided (e.g., multiple televisions can be viewed by multiple Users in a shared viewing system, such as a sports bar).
  • While mobile devices offer a quick way to bootstrap the Arkiïs™ system, in the long run, it will be easier for Users to have Arkiïs™ functionality integrated with the devices that provide Content to First Devices that can be simultaneously shared with Users present. There are several ways this may be accomplished, including:
  • Custom DVR boxes (or audio only equivalent, DAR) that interleave live broadcast feeds with prerecorded Targeted Marketing Content. In some embodiments, the live broadcast is time shifted by several seconds to allow more seamless feed integration, commercial detection, and synchronization of targeted advertising end (including Consumer Feedback). Such buffering adjusts automatically from one commercial break to the next to keep the live lag to a minimal amount sufficient to allow seamless integration of the live and pre-recorded streams. A Custom DVR adds integration with the Arkiïs™ system to a traditional DVR by allowing one or more Arkiïs™ Profiles to be associated with the DVR. When consuming Content, an Arkiïs™ Profile is activated either by manual designation on the DVR, one or more Consumers designating to Arkiïs™ their current First Device source as being the Custom DVR, automatically by facial recognition of audience members, etc. The active Profile of a Custom DVR determines the Targeted Marketing Content presented to Consumers. The Custom DVR is in communication with the Arkiïs™ cloud servers to receive Targeted Marketing Content for presentation and for recording for future presentation. The Custom DVR keeps track of the Profile(s) to which Targeted Marketing Content applies. Such Content may have expiration dates by which time it must be received or deleted. The Custom DVR communicates to the Arkiïs™ servers information about which Content is presented at what time. The Custom DVR may detect commercial segment start/entry and end/exit points in any of several methods including through local video feed algorithmic analysis, communicating its current primary source feed channel to the Arkiïs™ servers and receiving notification of segment start and end points as computed by the Arkiïs™ cloud, detecting primary source feed signal encoding of entry and exit points, etc.
  • Remote virtual cloud DVR technology where the DVR functionality is provided in the cable owner's facilities and with licensing agreements with Content Providers, efficiencies are achieved that allow for a single copy (due to compensation agreements with copyright holders) of all Content to be stored and shared among all Users. This allows Users to not have to specify their intention to record a show in advance since a dedicated copy is not needed for each Consumer.
  • Blu-Ray streaming application or custom Roku™ channel to provide Targeted Content that is interleaved with traditional live streaming Primary Content sources.
  • Customized hardware to provide the alternate Content presented to Users of the system may also include sensing equipment such as video cameras, microphones, and Near Field Communication (NFC). These sensors are used to dynamically determine the consuming audience so that Targeted Content may be automatically adjusted and optimized for group consumption.
  • Alternatively, in some alternate embodiments, rather than having the First Device's streaming source communicate directly with nearby Alternate Devices or deduce its audience through environmental detection strategies (e.g., video cameras, microphones, etc.), coordination can instead be done with the help of the Arkiïs™ servers. The coordinated group consumption of Alternate Devices is facilitated by the Arkiïs™ servers and thus the Content delivery device for the First Device may be aware and join such groups with hints from the source Device and its linked Profile.
  • The example system 100 supports providing Targeted Content solutions. For example, the Device 140 can present Content (e.g., television programs, movies, streaming content, advertising, and/or other types of audio and/or video Content) for consumption by Users associated with the User Devices 160. The Content can be received from a number of sources for presentation by the Device 140. For example, the Content can be received via a connecting network 130 (e.g., as streaming television or streaming video Content supported by other computing systems 120). The Content can also be received from other Content sources 150 (e.g., Content Provider, over-the-air broadcast television, cable television, etc.).
  • The example system 100 supports providing Targeted Marketing Content to Users in place of Generic Advertisements (i.e. non-targeted). For example, the Device 140 can present Content (e.g., television Content and/or other Content with associated Generic Advertisements) to the Users of the User Devices 160. During a Generic Advertisement (e.g., a generic commercial), a targeted advertisement can be presented to the Users in example system 100. In some implementations, the targeted advertisement is presented on the Device 140 instead of the Generic Advertisement (e.g., the targeted advertisement can be inserted by the Targeted Content computing system 110, by other computing systems 120, or by an optional media device 142 such as a set-top box, DVR, cable box, streaming media player, etc.). In other implementations, the targeted advertisement is presented on the User Devices 160 (e.g., provided by the Targeted Content computing system 110 for reproduction at the User Devices 160). The User Devices 160 can reproduce the same targeted advertisement or different advertisements. The User Devices 160 can reproduce targeted advertisements alone (e.g., while the Device 140 is reproducing a Generic Advertisement) as well as in combination with the Device (e.g., while the Device 140 is reproducing the same or a different targeted advertisement).
  • In the event that connectivity is lost between the First Device and the Arkiïs™ Content servers (e.g., the power goes out in your home), the Arkiïs™ Content feed being broadcast may automatically fail over to any Alternate Devices (e.g., smartphones) that are synchronized with the First Device. Such connectivity loss may be detected in many ways including: explicit designation by the User on their Alternate Device, the failure of the First Device to respond to a ping-like request in a reasonable time period, or the loss of ability for the Alternate Device to see the First Device such as on a local Wi-Fi network. In a preferred embodiment, if complete connectivity is lost and even the Alternate Devices are not reachable (or none are present), the Arkiïs™ Content servers may automatically begin recording the Content being consumed for subsequent resumption at the point of disconnect. In the case of failover to an Alternate Device, the servers back up/record the Content so as to resume on the Alternate Device at the point that contact was lost with the First Device even though it may take several seconds for the failover to be negotiated.
  • In a preferred embodiment, each Device maintains communication with the Arkiïs™ cloud servers through a heartbeat mechanism whereby at periodic regular intervals (e.g. once per second) each Device notifies the cloud servers what Content is being presented to the Consumers on the Device. When the Arkiïs™ servers stop receiving the heartbeat and no shutdown notification was just sent, Device connectivity to the servers is deemed to be lost.
  • The example system 100 supports targeted advertising in a group setting. For example, the Users of the User Devices 160 can be grouped into a static or dynamic shared advertising group (e.g., based on various criteria, such as Physical Proximity, Virtual Proximity, explicit grouping by the Users, grouping based on receiving the same Content on the Device 140, or based upon the group's values, ethics, goals, standards, stated Consumer Assertions, etc.). Targeted advertising can be provided to the shared advertising group (i.e. SyncGroup). For example, Profile information can be used by the Targeted Content computing system 110 to select targeted advertisements (e.g., based on the Profiles, payout information, and/or other criteria) to be presented to the Users (e.g., on the User Devices 160 and/or overlaid on the Device 140). Profile information can include information about a User voluntarily uploaded by the same User for targeting purposes, it can also include User authorized aggregation of information collected from disparate sources, and it can omit information deleted by a User. For example, a group may indicate intent to only ever purchase certified organic food, or non-GMO food. Such a Profile may prevent such a group from receiving fast-food advertisements or the like. Nor would a fast-food advertiser likely desire to push its advertising to such a group. Thus, both Consumer and Marketer benefit and the system gains increased economic efficiencies.
  • The example system 100 can determine the specific Content being watched by the Users in order to provided targeted advertisements at appropriate times (e.g., during generic advertisements). For example, the Targeted Content computing system 110 can use Context Information to determine the specific Content being received by the Users of the User Devices 160. The Context Information can include various types of information, such as information provided by the Users of the User Devices 160 (e.g., the Users can enter the specific program, channel, time, and/or other information about the Content), location information (e.g., location of the user devices 160), Profile information, information from the media device 142, information from other computing systems 120 (e.g., programming and commercial information provided by a streaming service), and/or other types of information.
  • Custom DVR hardware, as described above, may allow the Arkiïs™ User to seamlessly consume Targeted Marketing or Alternate Premium Content that is interleaved into live broadcast streams (e.g. television or radio) to overlay the generic advertising that such streams contain. The Arkiïs™ User may log into their Arkiïs™ Profile on the DVR and the Arkiïs™ server may then provide Targeted Content feeds that are queued up while the User is consuming Premium Content. When a commercial break is detected in the Primary Content feed, the DVR may seamlessly switch to the Targeted Marketing Content. Based upon the Arkiïs™ User's Profile, either Targeted Marketing Content may be automatically selected or the User may be given a menu of subjects and how much they would pay, and how well other Users have rated them. From this menu, the User may be allowed to choose the Content they would like to consume. A reference certificate or symbol may be shown to further permit a User to quickly evaluate the rating of a Product or Products to match their interests and values. On the other side, a potential provider of Targeted Marketing Content may either decrease or increase the likelihood of sending information to a Consumer via the use of an integrity rating tied or linked to the Consumer which indicate the relationship between the Consumer's stated purchasing intentions (i.e. Assertions) and timelines and their actual purchasing conduct. The Marketing Content may be automatically packed to fit into the projected commercial space of the live feed. Based on a User's Profile preferences, the live feed may be queued up when it returns from commercial break until the current Targeted Marketing Content advertisement completes. The buffer on the live feed may actively be managed to drive it back towards a zero second delay compared to the live feed.
  • In some preferred embodiments, Arkiïs™ may provide a custom hardware DVR that accepts broadcast, cable, or satellite feeds and dynamically detects commercial breaks on the fly to substitute previously downloaded Targeted Marketing Content that is queued up on the DVR.
  • In other embodiments, cable providers may provide an interface box in the User's home or business to access DVR capability. Such cloud based DVRs may be housed and maintained in data centers maintained by the cable company and accessed on demand over the Internet.
  • FIG. 2 provides a flow diagram to illustrate operation of certain embodiments. In FIG. 2 Arkiïs™ 201 Servers include functional modules a User Profile 202 includes preferences and rules regarding the User such as certification preferences. Further details for the User Profile 202 are provided in connection with FIG. 12. A source for Content, such as described in further detail in connection with FIG. 15 is shown at 204. The Content 206 includes meta-data regarding the Content and the source of the Content. A Content Producer and Content Provider are shown generally in connection with Content 206. The Content Producer and Content Provider may be the same or different entities. As set forth in the definitions in Section 2—Key Terms the Content Producer creates the Content and the Content Provider delivers the Content. The Content Producer and/or Content Provider and/or a third entity receives input from the content selector 208 and payment module 216. These inputs are shown generally for purposes of illustrating the general flow of information and the exact manner in which the inputs are processed may take a variety of forms.
  • Content selector 208 operates to select Content for delivery to the User shown at 210. The content selector 208 receives portions of the User Profile 202 and other information regarding the present context 212 of the User. Present context 212 may include the User's recent communication history culled from their caller ID log, Skyping, texting, etc. and the identity of communicating parties and the nature of those parties' typical interaction for the present context as captured in their Profile and the vocabulary, tone of voice, etc. in the communication (e.g., Sally's mood usually improves after communicating with her mom, for example, they shared a joke with each other and laughing could be detected in the communication.) Content might also be filtered out at one time based on context, but not at another time, in a different context. Similarly, Content might be graded differently in different contexts. Rating manager 214, generates an integrity rating that indicates a correlation between the User's actual purchase of goods and services and the intention indicated in that Assertion by the User. The rating manager compares the integrity rating to an integrity rating requirement that may be provided by the Content Provider. Further details of the operation of rating manager 214 are provided in Section 11—Providing Feedback on Content, Goods, and Services. Payment module 216 computes credits and debits that are indicative of payments to be made to the User for consuming advertising. The payment module is responsive to the meta-data associated with the Content 206. Further details of payment module 216 are provided in Section 12 Providing Payment for Content, Goods, and Services.
  • The Content selector 208 receives Content 206 and retrieves from the User Profile consumption preferences that indicate goods and services that the User prefers. The Content selector 208 performs a comparison between the retrieved consumption preferences and meta-data associated with the Content 206. The comparison yields a match level indicator that indicates a correlation (which may take a variety of known forms) between the Content and the consumption preferences. The match level indicator is then employed to determine whether to provide the Content to the User. For example, the User may have provided in their preference a threshold that must be exceeded by the match level indicator in order to be provided the Content. Alternatively, the User may choose to be presented with all Content, or Content that exceeds the threshold and be permitted to decide whether to experience the Content. The presentation to the User of the match level indicator (or Visualization) may be performed in accordance with the embodiments shown in FIGS. 17a, 17b , and 29.
  • FIG. 4 illustrates the generation of an actualize bid offered by a Marketer for use by Content selector 208 to select Content 206. As seen in FIG. 4 the Marketer 402 supplies a bid 404 (that may include a payout formula) in connection with Content 406. A deliver bid module 420 receives the bid 404, the Content 406, along with context 412, and user profile information 414, together with the marketing performance score 410. The deliver bid module 420 operates in accordance with a variety of known techniques to determine whether to deliver (yes 426) the bid 404 or to not deliver (422) it (no 424). In embodiments where the bid 404 includes a variable function, the function is evaluated as part of the deliver bid module 420 together with one or more variable inputs (406, 410, 412, 414) to compute an actual bid amount to be offered. (See Section 6—User Profiles paragraph [0328] for examples where a Marketing Performance Score (410) or context (412) affect how much a Marketer is willing to offer for actualize bid (430). Also see Section 12—Providing Payment for Content, Goods, and Services paragraphs [0482] and [0483] for examples of formulas in bid 404 and bid delivery 420.) The actualize bid offered 430 is delivered to content selector 208. Additional details of marketing performance score 410 may be found in Section 6—User Profiles. The actualize bid offered 430 is compared by content selector 210 to criteria pertaining to the User to determine if the Content 206 is to be delivered to the User.
  • 4. Providing Targeted Content
  • FIG. 3 is a flowchart of an exemplary method 300 for providing Targeted Content to a group of Users. For example, the example method 300 can be performed by one or more computing devices (e.g., by the Targeted Content computing system 110 described above in relation to FIG. 1).
  • At 310, a plurality of Users is grouped into a shared advertising group (SyncGroup) and can be affected through use of a temporary or permanent grouping variable. For example, the plurality of Users (e.g., along with their associated computing devices, such as smartphones) can be grouped, manually or automatically, based on Physical Proximity, Virtual Proximity, explicit grouping, consuming a shared First Device at the same location, etc.
  • At 320, one or more Targeted Content are determined for presentation (e.g., audio and/or video playback) to the shared advertising group. For example, the one or more Targeted Content can be presented on a First Device (e.g., a television on a home or business setting) and/or on personal Alternate Devices (e.g., on displays of the computing devices, such as smartphones, of the Users in the shared advertising group). The one or more Targeted Content can be determined based, at least in part, on Profiles or only voluntarily supplied or only authorized information in Profiles of the Users in the shared advertising group which may be selected to maximize payout amount for one or more of the Users, selected based on a minimum payout amount across all Users of the group, or selected based on other criteria such as Physical Proximity using GPS or similar data where the User may have given permission to use such criteria for the purpose of receiving Targeted Content.
  • At 330, the one or more Targeted Content are provided for presentation to the shared advertising group. The Targeted Content can be presented (i.e. reproduced) on a First Device and/or on personal computing Devices (e.g., smartphone displays). The Targeted Content can be presented on a Device instead of generic advertisements (e.g., in place of generic television commercials that are not targeted to the shared advertising group).
  • The most basic alternative Content is substitution of the generic mass-market advertising with that which is targeted specifically to the Consumer based upon their Arkiïs™ Profile. Given the estimated amount of time available before the live broadcast feed returns, Arkiïs™ may optimize the selection of targeted advertising to fit in the available time duration. In the case that the specific duration to be filled is not exactly known, the server may heuristically pack the space with the targeted commercials. Longer commercials or ones that may not be interrupted due to advertiser requirements may be packed at the beginning of an indeterminate commercial segment break while shorter ones or those for which a partial message may effectively be delivered may be packed towards the end. As each message draws towards an end, the follow on messages may be repacked to account for any new information that affects the time of the break's end.
  • When consuming live broadcasts with commercial breaks of indeterminate length, the Arkiïs™ system may allow a User to configure their Profile to allow the targeted advertising to overrun the commercial break by a short period and automatically pause the live feed when it returns and await the completion of the targeted advertising overrun before resuming the now slightly delayed live feed. Any such overrun is subtracted out of the following commercial break. In one embodiment, when consuming targeted advertising on their personal mobile device, the User's mobile device may automatically send the remote control codes to pause the live feed when it returns, and resume play and unmute it when the targeted advertisement completes on their mobile device. This is most useful when their First Device is not playing an integrated Arkiïs™ feed.
  • The producer of a targeted advertisement may encode reentry points (i.e., rewind points) for their message that a Consumer must return to when a targeted advertisement is interrupted (e.g., due to return to live play or a Consumer's override action) and subsequently resumed to satisfy the originally promised consuming payout. These rewind points may be stored within Arkiïs™ servers, or may be recognized by software as an advertisement is played. By default, the beginning of an advertisement is used for reentry when resuming an interrupted message. (Note that some message payouts are context dependent and thus if resumed at a later point in time, the beneficial context may be diminished or gone and the payout computation may have consequently changed. In such cases, the User may request or the Marketer and/or producer may require deferral of resumption until the same or similar circumstances have returned or disadvantageous circumstances have disappeared.) When reentry points are supplied, by default, upon resumption of a targeted message, the first reentry point that directly precedes the point of interruption may be generally used and the message may resume play from that entry point. However, the User may choose to ignore the reentry point and instead resume at the exact point at which they left off at the risk of sacrificing some of the payout as configured by the Marketer that is supplying the message. Selection of how to resume may automatically be configured in the User's Profile or specifically chosen in an instance. In one embodiment, Consumer override actions include: simply stopping a message and doing something else, pausing a message briefly before returning to it, and even common DVR actions such as variable fast-forward/rewind, and skip forward/backward. In some embodiments, the Content Producer may encode more complex reentry point information, for example, specifying different reentry points that vary as a function of how long the Consumer has been away (e.g., how much time has elapsed since the message was originally interrupted) or vary depending upon the User's Profile information (such as their integrity rating as to their actual behavior versus their Assertions over time) which may predict the Consumer's likelihood of effecting a purchase or vary depending upon what other Content the Consumer has consumed such as other messages from the same Marketer.
  • In addition to targeted advertisement selection based upon optimizing payout and space, an individual's Arkiïs™ Profile may weight other factors such as the level of humor in a commercial, or the category the commercial falls into. They may also combine criteria (e.g., give me a funny commercial that pays the most). Their Profile may also indicate when and how they wish to consume commercials. Additionally, a Consumer may have a pattern related to their most likely time or day or seasons of purchases, and/or for what items are more likely to be purchased and when. This data may be added to their Profile and criteria that a Provider may use to affect what Targeted Marketing Content they send or push and the amount they may offer to pay or charge for consuming such Content.
  • The following example describes an embodiment of the disclosed system: Greg's Profile, stored in the Arkiïs™ cloud servers, shows that he is willing to watch ads during football games placed only at time-outs and during half time. Further, he requires that only one ad may be served per break period and that it should be no longer than 30 seconds unless the advertiser is willing to pay quadruple or more than his average payout rate over the last seven days as computed by the Arkiïs™ cloud servers. If the ads are insufficient to cover the broadcast Content cost, he wishes to take the remainder due out of his Arkiïs™ Profile earnings balance, or if his balance is insufficient, to accept just enough more advertisements to keep his balance positive at all times. During the times that the regular broadcast feed is delivering generic commercials and Greg is not watching targeted advertising, he is instead watching behind the scenes extra Targeted Premium Content that is streamed to his Device from the Arkiïs™ cloud servers. This includes extra commentary and interviews that are oriented towards his favorite football team. The Arkiïs™ cloud servers automatically charge his Arkiïs™ Profile for the extra Targeted Premium Content he consumes. Greg may have a high integrity rating related to his Assertions about his football viewing behavior and his purchases that are correlated to advertisements presented related to football, as he may never miss a game of his favorite teams and often buys Products advertised during games. Thus, Providers may adjust their Targeted Marketing Content and payouts because Greg's rating indicates that he will be watching a game regularly and tends to purchase items that are being advertised to him during a game. Thus, his integrity rating can be related to the Content Greg consumes and to his purchases.
  • Celebrities (e.g. LeBron James or Miley Cyrus) may be listed in your Profile of people you admire, trust, and like to listen to. Arkiïs™ Profile settings may indicate that if they are a spokesperson for a commercial that you will want to consume it regardless of other criteria in your Profile. Because you love a particular sports figure, artist, singer, or other person you know, you may agree to watch messages that would otherwise not meet your Profile criteria.
  • Example packing of a commercial break during live football with no assistance from the television broadcaster:
      • During Premium Content consumption, the User's Device has downloaded targeted advertising in advance to prepare for the next commercial break:
        • One 120 second commercial requiring detailed Feedback
        • Two 90 second commercials requiring quick Feedback
        • Two 60 second commercials requiring quick Feedback
        • One 50 second commercial with optional Feedback
        • One 30 second commercial requiring quick Feedback
        • One 30 second commercial with optional Feedback
        • Two 15 second commercials with optional Feedback
      • Based upon historical sampling, the server begins by assuming the break will be between 3 and 5 minutes long.
      • The User's Device begins with the two-minute commercial.
      • After the commercial, the User spends 30 seconds answering detailed questions about the commercial just consumed.
      • During the break, the server has been monitoring the live television feed and 2.5 minutes have now elapsed. The live broadcast is now on its fourth commercial that is recognized to be a 60 second spot with 45 seconds remaining. The server directs the User's Device to now select the 30 second spot that requires quick Feedback.
      • The User's Device begins the 30 second commercial.
      • After the commercial, the User spends 10 seconds answering one quick question.
      • The server has 5 seconds remaining on the 45 second commercial in the live feed and directs the User's Device to begin one of the 15 second commercials and be prepared to terminate mid-stream if the Premium Content returns in five seconds.
      • The User's Device begins the 15 second commercial.
      • The server detects a 60 second spot begin in the live feed and directs the User's Device to play the 50 second commercial next.
      • The User's Device begins the 50 second commercial.
      • The server directs the User's Device to play the 2nd 15 second commercial next.
      • The server detects the resumption of live Premium Content and directs the User's Device to halt the targeted advertisement based upon the User's preference to not delay the live feed.
      • The User's Device fades one second into the 15 second spot.
      • All commercials that were not used are retained for a subsequent commercial break and the very briefly shown 2nd 15 second spot is also retained for reuse at a later time.
  • Once an Arkiïs™ User's Alternate Device, usually a mobile Device, is synchronized with the First Device, they may receive Targeted Content on their Alternate Device to substitute for or overlay on top of the Generic Content (i.e., not targeted) delivered through their Content Provider. In some preferred embodiments when such Content is being overlaid on a User's Alternate Device, their Alternate Device may be configured to automatically subdue or mute the First Device using remote control technology during consumption of the alternate stream on their Alternate Device. Ideally, the broadcaster has a cooperative deal with Arkiïs™ so that they transmit commercial intention information as it becomes available, of when a break to commercial will begin, and when it will end. However, lacking that, the breaks can be detected live/extemporaneously as done by the AdSkip Project (phys.org/news/2012-08-commercial-free-tv-device-technology-contest.html). Additionally, previously known commercial messages may be detected on the Arkiïs™ servers when they are being rebroadcast for the purpose of knowing how long such messages last (e.g., 30 seconds or 60 seconds) and thus providing a more accurate gauge of when the broadcast commercials will end. Detection of previously known commercial messages may be carried out through video recognition methods (for example, ordered or non-ordered tree matching algorithms) or audio recognition methods (for example, hidden Markov modeling or spectrogram/acoustic fingerprint comparison). When receiving live broadcasts such as sporting events where the broadcaster is an Arkiïs™ partner, the broadcaster may provide live Alternate Premium Content (e.g. additional behind the scenes interviews or commentary and game analysis) that is coordinated with the generic live broadcast. Such feeds may also be delivered on a User's Alternate Device. Such feeds may also be auxiliary and continue in parallel with the broadcast Generic Content and afford the User simultaneous alternate feeds on the live action.
  • In anticipation of commercial breaks, the Arkiïs™ Alternate Device application may download substitute Targeted Marketing or Alternate Premium Content. Downloading may occur in advance, during the Primary Content's non-commercial portions, and/or during the breaks themselves. Given that the non-commercial portion of a typical broadcast program is typically much longer than the commercial sequences (approximately 2.75 times as long), Targeted Content may be downloaded in less than real time. Thus, Targeted Content may be shown in high-definition even if the User's Alternate Device connection does not have enough band-width to support real-time high-definition downloads; assuming the above premium to advertising content ratio, overlaid Targeted Content may be shown at a quality level that exceeds the User's real-time bandwidth limitation by a factor of almost 4. If an Arkiïs™ User configures their consuming to not completely fill the commercial time with Targeted Content, this ratio grows even higher and allows for even higher quality Content (e.g., higher resolution video). For example, a User may leave during the commercial break to use a bathroom and get a snack to eat.
  • At the detected beginning of a generic commercial in a broadcast stream, the Alternate Device application may turn on the interface, for example the screen (stackoverflow.com/questions/9569529/android-face-detector-using-android-camera) through the remote-control behavior described previously, and await User attention to begin the targeted ad's playback. If their Alternate Device does not support that, it may await a touch of the play button on the Alternate Device's interface.
  • In the following example, embodiments of Targeted Content selection are described. John is a junior at Northeastern University and has gone to the local sports bar to watch his home team of the San Francisco 49ers play the New England Patriots. He has logged into Arkiïs™ using his smartphone and his smartphone has automatically detected that he is watching football by listening to the room and detecting the audio feed of the game in a Shazam-like or IntoNow-like manner and/or John pointing his smartphone camera at the screen to detect the game by matching the screenshot or video feed to match the video analogously to how audio is matched. The application determines from his Wi-Fi, GPS and/or microphone that he is also in a noisy location (a sports bar) and that his Bluetooth headset is not turned on and/or paired; therefore, during game play, his phone downloads from the sports bar's wireless Ethernet connection the substitute targeted advertisements that he will watch during the next commercial break. The targeted ads are selected for John by Arkiïs™ based upon his Profile and to best fit his contextual location of a noisy bar, being ones that do not depend upon the audio portion to best deliver their message. While the television is showing a Coke commercial, John sees a Pepsi® commercial on his phone that features references to his favorite team, the San Francisco 49ers. At the end of the Pepsi® ad, John is presented with a coupon for $1 off a Pepsi® at the bar in the next ten minutes. He turns to the bartender and presents the coupon on his smartphone that they accept and give him $1 off the price of a Pepsi®. He then rates the Pepsi® commercial and is offered the option to view an alternative Pepsi® commercial to compare against the first. He accepts on his phone and watches the alternate. At the end he provides a side-by-side rating of the first versus the second Pepsi® commercial along ten metrics provided by Pepsi®. He then checks his earnings in the Arkiïs™ app to see that the last comparison earned him $2 and that three minutes are projected to remain in this commercial break. He decides to forgo further commercials and instead use the bathroom.
  • The disclosed system allows for an individual to provide simple targeted advertising that may require little effort to produce (e.g., a simple video, web page, or email message). Such may be the case for selling a used item or their unique artwork. One may wish to sell a used Mercedes® and could create a simple video showing the car, along with some text detailing its history, and a link to a free CARFAX® report on the car. This simple marketing message could be targeted to individuals at the seller's choosing. Their query criteria might include those who live near the seller, have bought used cars from a private seller in the past, have sufficient income to afford the car, have indicated they are in the market for a Mercedes® class of car, and have a track record of performing that exceeds 85%. They may decide they are willing to pay $2 for such viewers. They may choose alternate criteria along with alternate payouts; they may also allow anyone to view the ad for free.
  • The targeted advertisements can be presented to the shared advertising group (at 330) at the same time as generic advertisements (e.g., inserted on a shared First Device in place of the generic advertisements and/or presented on personal computing devices of the Users). In order to present the targeted advertisements at the same (e.g., substantially simultaneous) time as the generic advertisements, the specific Content being watched by the Users of the shared advertising group can be determined. For example, the specific Content being watched (e.g., on a shared First Device) can be determined based on Context Information. For example, the Context Information can include location information for the Users in the group, time and date information, audio information from the Content being watched, video information from the Content being watched, Profile information associated with the Users of the group, explicit selection of Content (e.g., program name, channel, network, time, etc.) by one or more of the Users, and/or other types of Context Information.
  • The Users of the shared advertising group can provide Feedback regarding the targeted advertisements. For example, Feedback may be used to adjust payout amount that the Users will receive. Feedback can be received from one or more of the Users of the shared advertising group independently (e.g., via each User's computing device). Feedback can also be received from Users jointly (e.g., a number of the Users can agree on joint Feedback).
  • In some implementations, one or more Users of a shared advertising group can opt-out of a particular targeted advertisement being provided to the group. For example, if a specific User does not wish to view a particular targeted advertisement, then the specific User can opt-out of viewing the particular targeted advertisement. For example, the specific User who opts-out can be presented with a different targeted advertisement (e.g., an individually targeted advertisement) than the targeted advertisement being presented to the remainder of the shared advertising group. The different targeted advertisement that is presented to the specific User who opts-out can be selected, for example, based on priority information (e.g., the highest payout advertisement that fits in the duration of the targeted advertisement being presented to the remainder of the group). Or, a different targeted advertisement may be employed in response to a User's values, ethics or standards.
  • In some implementations, targeted advertisements are selected based, at least in part, on duration (e.g., to fit within the duration of a generic advertisement). Selection of targeted advertisements can also take into account time needed for Feedback (e.g., a time period, such as 15 seconds, can be saved for Feedback). For example, if a generic advertisement is 1 minute in duration, then a targeted advertisement can be selected that is 45 seconds in duration with 15 seconds remaining for User Feedback. Feedback can be provided after the targeted advertisement (e.g., immediately following the targeted advertisement) and/or Feedback can be provided at a later time (e.g., after the User is finished consuming Content).
  • FIG. 5 is a flowchart of an exemplary method 500 for participating in a shared content advertising group comprising a plurality of Users. For example, the example method 500 can be performed by one or more computing devices (e.g., by the user devices 160 described above in relation to FIG. 1).
  • At 510 a computing device (e.g., a mobile computing device associated with a User, such as a mobile phone or tablet device) is associated with a shared advertising group. The shared advertising group comprises a plurality of Users (including the User of the computing device) and their associated computing devices. The computing device can be associated with the shared advertising group based on various criteria, such as sharing the same general physical location, sharing the same content at the same time, explicit association by the User of the Device, etc.
  • At 520, the computing device provides Context Information associated with Content being consumed by the User. For example, the Context Information can be received from the User (e.g., entered via a user interface of the computing device). The Context Information can include location information of the computing device and/or other devices in the group, time and date information, audio information from the Content being watched, video information from the Content being watched, Profile information associated with the User and/or other Users in the group, explicit selection of Content (e.g., program name, channel, network, time, etc.) by the User and/or other Users in the group, and/or other types of Context Information).
  • At 530, one or more targeted advertisements are reproduced by the computing device. The one or more advertisements are selected for presentation to the shared advertising group based, at least in part, on Profile information of the Users of the group. The targeted advertisements can be reproduced on the computing device at the same time as generic advertisements are reproduced on a shared First Device (e.g., a shared television being watched by the Users of the shared advertising group).
  • At 540, Feedback is received from the User regarding one or more of the reproduced targeted advertisements. For example, the Feedback can be used, at least in part, to determine payout amount that the User will receive. Feedback can be provided via the user's computing device. Feedback can also be provided using another device (e.g., on a First Device, on an Alternate Device, etc.).
  • Users can be paid for receiving targeted advertisements. The amount that Users are paid can vary depending on a variety of criteria. For example, payout amount can vary depending on User Profile information (e.g., demographic information) of one or more Users. Payout amount can be provided as a range, which can depend on Feedback (e.g., the payout amount can be more if the User agrees to provide Feedback) or some other type of indication that the User has received the Content. Or payout amount can be adjusted based upon a User's integrity rating, measuring the relationship between the User's stated intended needs and activities (i.e. Assertions), and the User's actual implementation of same in actual practice over time.
  • FIG. 6 is a flowchart of an exemplary method 600 for providing targeted advertising to a group of Users including a Champion. For example, the example method 600 can be performed by one or more computing devices (e.g., by the Targeted Content computing system 110 described above in relation to FIG. 1).
  • At 610, a plurality of Users is grouped into a shared advertising group. For example, the plurality of Users (e.g., along with their associated computing devices, such as smartphones) can be grouped based on Physical Proximity, Virtual Proximity, explicit grouping, consuming from a shared First Device at the same location, etc.
  • At 620, a determination is made that a User has agreed to be a Champion. For example, a User can pre-select a number of Products and/or services with which the User has personal experience and is willing to Champion, which are then saved to a Profile associated with the Champion for use later. The advertising system can then detect that the Champion is available (e.g., is part of the shared advertising group) and ask if the Champion is willing to promote the Product and/or service (e.g., by providing a payout offer that the Champion will receive).
  • At 630, one or more targeted advertisements are determined for presentation (e.g., audio and/or video playback) to the shared advertising group. The one or more targeted advertisements are determined based, at least in part, on the Champion. For example, an advertisement for a Product and/or service that is listed in the Profile of the Champion can be selected. The one or more targeted advertisements can be presented on a First Device (e.g., a television on a home or business setting) and/or on personal Devices (e.g., on displays of the computing devices, such as smartphones, of the Users in the shared advertising group). The one or more targeted advertisements can be also determined based, at least in part, on Profiles of the Users in the shared advertising group (e.g., selected to maximize payout amount for one or more of the Users, selected based on a minimum payout amount across all Users of the group, or selected based on other criteria).
  • At 640, the one or more targeted advertisements are provided for presentation to the shared advertising group with a corresponding presentation by the Champion. The targeted advertisements and Champion presentation can be presented on a First Device and/or on personal computing Devices (e.g., smartphones). The targeted advertisements and Champion presentation also can be presented on a Device instead of generic advertisements (e.g., in place of generic television commercials that are not targeted to the shared advertising group).
  • Using the platform created by the Arkiïs™ system, a business could create their own Targeted Marketing Content for prospective clients and when in a public situation, such as taking the prospective clients out to a sports bar, the company's salesperson could sponsor their own advertising to serve as Targeted Content for delivery to the screens near their prospective clients to further reinforce the message the salesperson has given them during the day of a sales pitch. In some embodiments, the Content could be personally tailored for the particular clients they are entertaining and refer specifically to them. In further embodiments, the sponsor could get an alert on their phone right before their message is going to be sent so they are sure not to miss it. It could also be a simple message, for example, a brief message that states “This quarter is brought to you with premium content and commercial free by Hank!” and shows his profile picture or a quick video blurb instead of any commercials to allow for extra Premium Content.
  • The following example usage scenario describes how personally directed public advertising may be implemented through the Arkiïs™ system. George and Frank are in Atlanta trying to make a sale of their time tracking software to improve employee productivity. George allocated a budget of up to $100 to fund inserting their company's ads into the targeted advertising stream around them while they wine and dine their prospective clients in the evening. George set it up using his Arkiïs™ app so that shared Device ads will only air if both he and Frank are together in front of a First Device and so that they will each get a notification on their smartphone 15 seconds before each time their ads will be presented. The first opportunity arises while they are waiting for a table in the restaurant in its bar area. The television is not very large and cannot be heard very well in the crowded bar, so the first ad only costs them $3. During dinner, there are no televisions, however, in the bathroom, each of the urinals has silent video advertising messages. Their company's message is cycled into the selection of messages being displayed on these screens for another $2 while they are in the restaurant. After dinner, they take their prospective clients to their corporate skybox to see the basketball game. For $40 they buy all the Targeted Marketing Content to cover the entire time they are in their private skybox and may be viewing either of the two screens in their room. George configured the targeted advertisements using his smartphone app so that in each commercial break, a sixty second spot for their company is to be shown with the rest of the time filled in with behind the scenes Premium Content for the game. After the game, they go to a pool hall and spend $40 to take over the two screens in view of the two pool tables they are congregating around. George has configured the presentation of Premium Content to align with his clients' interests as delineated in their client's Profiles. This is possible because several of the prospective clients are Arkiïs™ customers and joined into his SyncGroup early in the evening. Arkiïs™ servers select stand-up comedy and sports commentary shows as best fitting his client's profiled interests. Each show begins and ends with a short 15-second message for his company indicating that they are sponsoring the selected Premium Content. At the end of the evening, the group splits up into two cars, one driven by Frank and the other by George, to return the clients to their workplace. In the car, the radio plays a selection of tunes streamed from their connected smartphones that are commercial free and match the interests of the clients in each respective car for a total charge of another $2. The total cost for advertising during the evening was $87, an Arkiïs™ way to mix business with pleasure.
  • The Arkiïs™ system facilitates the fortuitous location of brick and mortar stores that have Products of interest to a User. Stores may be fortuitously located in the present moment for a User by monitoring their location as provided by GPS, Wi-Fi triangulation, mobile cell tower proximity, or the like. A User's affirmation of their future plans including calendar entries, navigation requests, or explicit Arkiïs™ Assertions (e.g. I'm going to drive down to my mom's on next Monday) may also be used to facilitate the fortuitous location of brick and mortar stores whose proximity is predicted to occur in the future. Additionally, a prediction of their near future path based upon the vector of their current travel, optionally combined with their historical travel paths, may be used to locate candidate stores whose proximity is predicted to occur in the future. In some embodiments, a User may receive a recommendation to travel to a location outside their normal typical daily range when the confluence of several buying opportunities combines to make such a special trip desirable. A User's Profile may include Assertions of Products they are considering buying and Arkiïs™ may alert them when they are in the vicinity of a store offering a particular Product they are interested in. A User's Profile may record either an exact Product or a general Product they desire. An exact Product may be identified by many means including its UPC code, Stock Keeping Unit (SKU) for a particular store, manufacturer and description, manufacturer and model, website URL description page, or internal Arkiïs™ identifier. General Product interest may be identified by associated keywords and/or categories of products. Brick and mortar stores may integrate with the Arkiïs™ platform to publish information for the Products they have in stock that may include, pricing, location within particular stores, quantity in stock, related Products, or competing Products. Store integration with the Arkiïs™ system may include Product keyword and/or category associations for Products they carry. In some embodiments, brick and mortar store information may be augmented, extended, corrected, or built from crowdsourcing and/or computed from Arkiïs™ member purchase histories.
  • FIG. 7 illustrates by way of a flow diagram how the examples in the prior two paragraphs may be implemented. As seen in FIG. 7, the Arkiïs™ servers (710) receive information from the User Profile database (720) and Goods & Services Provider Profile database (730). The User mobile Device (740) adds information (745) to the User Profile database (720) including current location information and selected choices (780). The Arkiïs™ servers identify matches for the User (750) based upon in part upon their User Profile database (720) such as their current location and current time and the Goods & Services Provider Profile database (730) such as store locations, Products, prices, shelf information, services, hours, and interests. For example, the Arkiïs™ servers may send detailed suggestions (790) including shelf locations within a store to the User's mobile Device (740) and the User (750) may be alerted and offered choices (770) to select (780), where selected choices are sent to the User Profile database (720) and accessed by the Arkiïs™ servers (710) to provide further suggestions (790) including an optimal path to traverse to User Mobile Device (740) that then directs (760) the User (750), in the prioritized efficient order as suggested (790) to one or more particular locations in one or more stores where one or more selected (780) items of interest may be found.
  • The guidance may direct the User to the exact location within the store where the particular product may be located including directions to the correct aisle and shelf. The final guidance may be fine-tuned by a User's mobile device detecting the RFID tags of the Product. This guidance may also apply to shopping lists such as for a grocery store that are stored in their Profile. In a preferred embodiment, the Arkiïs™ system may know what a User wants to buy at the store by the User making Assertions and by the Arkiïs™ system detecting the frequency at which various Products are purchased and proactively suggesting further items to add to such a shopping list. When a product is offered in multiple configurations such as size or quantity, the Arkiïs™ system may recommend the configuration that is the most cost-efficient after taking into consideration any shelf life limitations of the Product and the rate at which the User typically consumes the Product. Such computations may satisfy a confidence factor from a User's Profile such that the probability of the optimum size determination being correct exceeds the confidence level. For example, a 90% confidence level would mean that for the recommended purchase size, 90% of the time, that purchase size will be the least expensive choice in the long run after future predictions on pricing and consumption rates become actual.
  • The Arkiïs™ system may direct the User through the store using a traveling salesman problem (TSP) solution/heuristic from computational complexity theory to provide a short path or the shortest path to get all the items they need/desire in a store. More generally, the traveling purchaser problem may be applied to select the least expensive method to procure all items on a shopping list from a plurality of possible stores where costs may include travel expenses and time. The purchase price of the traveling purchaser problem may be replaced by a formula for an adjusted purchase price that accounts for the value a User places on their travel time and/or the actual travel costs in addition to the actual purchase price, further the adjusted price may be computed to account for an assigned value that reflects the perceived/judged costs of negative externalities. For example, a User may place a high value on the environment and thus may ascribe a monetary cost to the carbon footprint of competing Products and also upon the footprint to travel to the Product's location to acquire it. Such assignment of monetary cost in a formula may be facilitated by a Certifier (see Section 11—Providing Feedback on Content, Goods, and Services) the User trusts such as an NGO providing an assessment of, for example, the carbon footprint of a Product. Alternatively, a User may provide their own formula for computing an adjusted price that includes as input the various metrics of Independent Reviewer Certification for Products in the Arkiïs™ system. Such formulas may weigh the various factors that are inputs differently according to their relative assessed importance. Such formulas may require as input information from a User's Profile, information from an Independent Reviewer Certification, and/or information about a Product, merchant, or store. Such computations are too complex and time consuming for one or more humans to carry out, even more so considering their need to be computed nearly instantly to have any real value to the User, and thus require the automation of one or more computational devices, which when using this method enables each individual User to more effectively compare competing Products along dimensions of interest to themselves than a simple comparison of just price and/or features of a Product or service. Such non-conventional computations are far from routine activities and not previously known in the full form explained herein.
  • The Arkiïs™ system may communicate with a store's smart shelf technologies whereby a shelf or product packaging may include computer devices and the ability to display information or provide auditory prompts or other sensory output (e.g. emit a scent or vibrate). One example is the addition of LED indicators along a shelf to attract attention or indicate a customized and or time limited level of discount, or highlight Product features of interest to you, like non-GMO ingredients. Another example is a reusable packaging enclosure that lights up to bring attention to it. These features may be activated through the use of Near Field Communication (NFC), Wi-Fi, or GPS, for example.
  • In some embodiments, free samples might be dispersed conditionally based upon Profiles that are good candidates for a Product. For example, a vending machine may only supply free samples to identified selected shoppers whose Profiles in general or whose ratings within their Profiles satisfy Marketer requirements. Selected Users' smartphones, detecting proximity to such vending machines, may offer Users the Products and allow Users to accept or reject the one or more offers. If accepted, their smartphones may communicate with the vending machine dispenser to cause the matching accepted Products to be dispensed. Communication may be by sending Infrared (IR) codes, Near Field Communication (NFC), displaying a QR code that is read by the vending machine, submitting a response back to Arkiïs™ cloud servers for network dissemination back to the vending machine, etc. Alternatively, a human worker may dispense freshly created samples when either alerted to do so by a mobile device that may present a photo of the recipient, light up green when a matching User's smartphone is waved, or when a designated recipient produces a distinctly recognizable supplied photo on their smartphone.
  • The store's shelves may communicate with the Arkiïs™ system to coordinate with Users such that the shelves respond to Users as they traverse the store and help them locate Products of interest to them such as those being on their shopping list. For example, individually addressable LEDs may line store shelves where such LEDs are activated by the Arkiïs™ system when a User is nearby a Product for which they are searching/interested in order to draw attention to its exact location. The lights may be turned on and off in patterns to create the appearance of a focal point for the Product's exact location. For example, turning on the whole Product's shelf's lights to direct attention to the correct shelf, following by turning them off from the left and right sides of the shelf in succession until the position directly under the Product is reached simultaneously from both the left and right sides would easily direct a User's attention to the exact Product location by the animating effect of the lights being individually controlled.
  • The map of a store's inventory may be provided directly by a store or it may be grown organically/crowdsourced by Arkiïs™ Users contributing the information incrementally as they find and buy Products at a store. Users may grow the database of items, prices, configurations, and their locations within a store by scanning the UPC of items (or other identifying features such as QR code) as they place them in their basket and thus providing the location of the item within the store and optionally its price. The Users that benefit from the foregoing data being collected may compensate the Users within the Arkiïs™ system that provide the data. The Users that provide the data may also have their integrity rating in a given area improved. Users may be presented with the last known price of an item and offered the ability to correct it if the price has changed. The average location of all Users scanning an item, possibly after screening out the outliers, may be combined to give a good fine-tuned approximation of an item's location in a store. If Users start reporting a completely new location, the item must have been moved to a new location in the store or is now available in more than one location in a store. The history of an item's location as provided by all the contributing Users might weight recent logging of its location more heavily when directing a User to its location in a store. Users may also log the absence of a Product at its predicted location to further refine the database information and accuracy. Users may also contribute pricing information to the system and help other Users decide where to buy an item if they are going to visit several stores.
  • The following example usage scenario shows how the shopping assistant feature may be implemented. Elena recently discovered she is gluten intolerant and puts this information on her Arkiïs™ Profile so that she will be targeted with advertisements of gluten-free Products. She drives to her local supermarket to buy groceries for the week every Tuesday at 6 PM. On this specific Tuesday, her smartphone's GPS confirms that she is heading towards the supermarket at 5:50 PM, so Arkiïs™ offers her an audio advertisement for a new brand of gluten-free bagels available at the supermarket, which will pay for the cost of her commercial-free satellite radio station. Elena agrees, and is impressed by the selection of flavors available. Her audible “Wow!” is picked up by her smartphone's microphone and informs the Arkiïs™ system that she had a positive reaction to the advertisement. After listening to the advertisement, Elena receives a coupon on her smartphone, containing a QR code that can be scanned to receive $2 off of a dozen bagels. Since she seemed to react positively to the gluten-free bagels advertisement, the Product is automatically added to the shopping list Arkiïs™ has curated for her, which is based on her prior purchase patterns. When Elena enters the store, she checks Arkiïs™ for her optimized shopping route and is initially directed towards the gluten-free baked goods section of the supermarket. As Elena approaches the gluten-free baked goods section of the store, the shelves around the advertised bagels flash violet and aqua, which are her favorite colors listed on her Arkiïs™ Profile. A bakery employee is alerted by the Arkiïs™ system to offer Elena samples of the bagel flavors so that she can choose her favorites. Deciding on jalapeno cheddar and cinnamon walnut, she grabs half a dozen of each, and then uses her smartphone to find the next closest item's location within the store using Arkiïs.
  • The Arkiïs™ system may allow a User to specify a set of stores they are going to shop at in a day and Arkiïs™ may direct the User to optimize their purchases by directing them to only those items that are least expensive at a given store and deferring the other items to a later store where they cost less. In some embodiments, the Arkiïs™ system may also suggest new stores to consider adding or replacing to a User's current shopping stores based upon pricing information being better optimized with the new suggested store. Suggested stores may be based in part upon the route a User is planning to take or the route that Arkiïs™ may recommend to minimize distance, travel time, parking costs, walking distances, and or other expense during the day as they shop at multiple stores so as to minimize the time and expense required for the suggested added stop. The User's Profile may include a numeric dollar attribution at which they value their time (e.g. $20 per hour) and such an attribution may be incorporated into their suggested shopping plan such that any time saved or extra time required at that rate would have to be offset by an even greater cost savings in the Products they buy to produce a shopping plan that looks at the big picture of savings vs. time.
  • Arkiïs™ may allow for targeted product placement within Premium Content. For example, at present during baseball games, there is already a green-screen billboard being used behind the batter. During live broadcast, the Content Provider digitally overlays Content on the billboard, typically changing the message each half-inning. However, with Arkiïs, this content may now be targeted specifically to the viewer. This may be done by the broadcaster providing the Arkiïs™ servers a feed where the green-screen has not been substituted and Arkiïs™ may arrange, internally or through a third party depending on the embodiment, for Targeted Content to replace the green-screen before delivering to the end viewer.
  • In a preferred embodiment, the static live action product placement of today can also be supplanted dynamically with targeted product placement. Today, Premium Content sells static product placement in movies and television shows. For example, Florida's Natural® may place their carton of orange juice in a show where, during a scene, a character takes the carton out of the refrigerator and pours a glass. With the functionality made possible by Arkiïs, this substitution can be deferred and dynamic Rather than using an actual fixed product placement, the actor uses a green-screen version in the shape of the Product to be substituted. For example, an unlabeled carton of juice, a can of soda, or a tube of toothpaste may be used. The green-screen version of the Product contains keying locations to help the computer recognize the 3-dimensional orientation of the Product. The product orientation is then computed during production and editing and the video feed encodes sufficient information for a dynamic product placement during final playback. The audio portion can even likewise be synchronized to provide an audio component of the product placement by having the actors record the words for the various placement choices desired or by having a computer construct the alternate words based upon samples of the actor's voice.
  • An embodiment of Arkiïs™ implementing dynamic product placement is described: Heather is watching The Newsroom on HBO as streamed to her by the Arkiïs™ cloud servers and in one scene, Jeff Daniels takes a carton of juice out of the refrigerator and pours himself a glass and leaves the carton on the counter. Because Heather's Profile shows that she prefers grapefruit juice over orange juice, the Arkiïs™ cloud servers provide a feed in which her targeted product placement chooses grapefruit juice over orange, further, based upon her Profile, Tropicana® is chosen over Florida's Natural®. In the dialog, Jeff Daniels offers his friend a glass of grapefruit juice instead of offering orange juice as it was originally recorded by the cloud server software splicing in the alternate dialog in Heather's streaming feed. Further, the green-screen colored carton he holds during filming is substituted with the Tropicana® version of grapefruit juice in Heather's feed. To Heather, it appears that the original scene was filmed specifically for her targeted product placement selection.
  • Alternate Content is also available by way of product placement in video and/or audio only games. Alternate Content may be inserted into, depending on the embodiment: computer games, mobile (smartphone, tablet) games, console-accessed video games, etc. During gameplay, a User may optionally consume a Targeted Marketing Content commercial to buy an in-game advantage. In some embodiments, based on your Profile, there can be targeted product placement in the game. For example, an in-game potion could be branded with Coca-Cola® and the potion appears as a Coca-Cola® bottle and color in the game and offers an extra in-game bonus compared to the non-productized default version of the potion. In an alternate embodiment, a video game could be optimized based upon the nutritional density of in-game food based upon its real world value. In this way, nutritious branded foods could be placed in the game and have in-game value proportional to their real world nutritional value. The targeted product placement in the game is based upon the User's Arkiïs™ Profile characteristics. By linking a User's Arkiïs™ Profile with their online gaming accounts (e.g. Xbox Live®, PlayStation® Network Account, Club Nintendo® Account, etc.) targeted advertisements and product placement in games may closely reflect a User's gaming persona.
  • The following is an example usage scenario of the Arkiïs™ system implementing video game product placement. Tom is playing Diablo III® and has linked his character in the game to his real-life Arkiïs™ Profile. Tom prefers Pepsi®, as it is his favorite kind of soda. He has agreed in the game to Pepsi's® product placement. His rejuvenation potions are rendered in the game to appear as Pepsi® cans and bottles, and in return for the product placement, his rejuvenation potions offer a 20% extra effect each time they are imbibed.
  • An example usage scenario describing product placement in a video game is as follows: Joey is nine years old and has recently become interested in skateboarding. His parents have configured Joey's Arkiïs™ Profile to require in varying degrees that all Content include things that encourage him to think and act in ways that enhances his moral, physical, and mental abilities. So his parents have configured his Profile online to require that all advertising include an educational component that is approved by one of the third party non-governmental organizations they designate. JumpSport® has recently come out with a safer skateboard design for children and has an approved educational advertisement to target Joey's professed interest in buying his first skateboard. JumpSport's® targeted ad wins placement by satisfying his Profile requirements and bidding highest and pays Joey $0.25 to play and complete it. The advertisement is an interactive video game that requires Joey to complete a series of multiplication problems that are tailored to his individual educational needs as determined by his linked standardized test results or certain approved online math educational programs that are linked to his Arkiïs™ Profile. Completed problems allow Joey to virtually build and configure his proposed new skateboard to gather the parts and then assemble them followed by his selecting and virtually donning his safety gear. Only once his skateboard is fully assembled and he is wearing all the safety gear is he able to ride the virtual skateboard and unlock a video tutorial that teaches him his first skateboarding trick. Because Joey completes the multiplication problems quickly and correctly, he is also awarded with a coupon for free shipping on a new JumpSport® skateboard. Additionally, Joey's parents have sweetened the deal by agreeing to contribute their own Arkiïs™ credits to increase Joey's advertising credit by $5 for each education advertisement Joey completes that demonstrates his improvement. Joey's performance on the JumpSport® advertisement demonstrated improvement in his multiplication skills and thus earned him the $5 bonus supplied by his parents through the Arkiïs™ system, sufficiently raising his Arkiïs™ User Profile balance so that he can now afford the skateboard with his own money. Joey places the order online using JumpSport's® Arkiïs™ enabled website. The website notifies the Arkiïs™ servers of the order and awaits final authorization for the payment. The Arkiïs™ servers route the order to Joey's parents for final approval along with a targeted advertisement that explains the safety advantages of their Product to his parents. Once his parents approve the order, JumpSport® is notified that the funds are now available. JumpSport® ships the skateboard and requests disbursement from the Arkiïs™ servers.
  • It can be appreciated that Joey's parents may also have Content pushed to their son that reflects their ethics, beliefs and/or values. For example, positive phrases that reflect their values or beliefs may be embedded in or adjacent to the advertisements that Joey sees related to his interest area. Thus, Joey may also see a positive statement before or after the advertisement that displays a value the parent wants Joey to reflect upon or see. For example, a statement saying, “Courage is not the absence of fear, but doing your best in spite of your fear.” Other value statements, biblical quotes, or the like can be included in the material consumed by their children, so that parents can transmit their values to their children even when they are not present with them.
  • In a preferred embodiment, Users may add a plug-in to their browser that automatically replaces Internet ads with more highly targeted Arkiïs™ ads. This may be done similarly to how the Adblock Plus or AdBlock plug-ins block advertising on web pages displayed in a browser—for example, by intercepting requests from the browser to particular domains, hiding advertisements based on CSS formatting, hiding page elements which fit the dimensions of standard web advertisements, or hiding page elements whose source domain is recognized to be for advertising (e.g. doubleclick.net). However, instead of blocking, the ads are substituted with Arkiïs™ ads based upon the User's Profile and the layout position and dimensions of each ad being replaced. In an alternate embodiment, instead of substituting existing ads with like-sized ads, the page layout may be dynamically reconfigured to allow Arkiïs™ to substitute more highly targeted ads. This may be accomplished by marking areas of a page (e.g. page position of top left/bottom right corner, width and height of area) where advertisements may be displayed, and overlaying ads within these areas that may not be the same size as the originally displayed advertisement(s). The User may be paid for display of ads and/or for clicking on ads. Additionally, a portion of the ad revenue may be shared with the website whose ads are being replaced. One possible method of revenue sharing is by having the Arkiïs™ plug-in detect websites that are Arkiïs-enabled (e.g. through matching the URL with URLs within an Arkiïs-enabled site's database) and supplying an Arkiïs™ anonymous ID to uniquely identify the User that is browsing and having the website serve up its own Arkiïs™ ads that are targeted by Arkiïs™ for that User. Such anonymous identifiers or tokens may be uniquely supplied to participating websites with each new website being visited receiving a new unique identifier. In another embodiment, an identifier or token may be reused across multiple websites or sessions for a set time period such as ten minutes and upon expiration a new identifier supplied for subsequent sites being visited or even within an active session at a site that spans the expiration, a replacement identifier or token may be supplied in the middle of a User's visit to a web site. In yet another embodiment, Users sharing a display and browsing together may form a SyncGroup and receive ads for the group and may have a shared identifier or token that represents the group's identity. Additionally, Users may combine into a SyncGroup so that even when they are independently browsing, they may receive ads targeted to their SyncGroup and may have the same or different identifiers but which are all associated by Arkiïs™ with the identity of their SyncGroup.
  • Content Producers may not initially choose to cooperate with Arkiïs, but advertisements can be served in a separate window while still sharing a portion of revenues with them. Such ads would be selected while still knowing the content of the page being viewed so that such history is taken into the User's Profile and ads are more contextually based.
  • The following example usage scenario describes an embodiment of the system utilizing online advertising. Doug installs the Arkiïs™ plug-in into his Chrome browser and, using the plug-in, logs into the Arkiïs™ servers and receives a set of 256 bit identifiers (or any other size appropriate for hashing security) that each uniquely and or anonymously identify himself as a particular Arkiïs™ member or classification/type of member to participating websites. He goes to Amazon®, an Arkiïs™ participant, and the plug-in provides one of these identifiers. The identifier may be supplied by adding it to the URL his browser navigates to at Amazon®. (Periodically, when his set of identifiers runs low or will expire soon, his plug-in may request additional identifiers from the Arkiïs™ servers.) On Amazon®, all sponsored links are selected by the Amazon® web servers by utilizing Doug's supplied identifier and submitting it to Arkiïs, along with the current Amazon® page he is about to view, in order for Amazon® to receive targeted sponsored links from Arkiïs. Alternatively, Amazon® may query Arkiïs for areas of interest for the given Profile with respect to Products for sale on Amazon® and or advertisements being used on Amazon's® site. This may include Amazon® supplying a database or directory of Products and advertisements and the corresponding desired target demographics of the customers they are trying to attract for each of those Products and advertisements that may be matched and selected by Arkiïs™ for Amazon® for the User. This allows Amazon® to customize the web pages including any suggestions they wish to make to the Arkiïs™ User Amazon® servers build their web page for Doug utilizing the information supplied and or facilitated by Arkiïs™ and serve up their page, customized for Doug, but without Amazon® learning of Doug's actual identity or his demographic information. If Doug clicks on any of the sponsored links, the Arkiïs servers will automatically credit Doug and Amazon® a portion of the proceeds. After finding a Product he is interested in on Amazon®, Doug decides to check eBay®, in a new tab, to see if one is available used. Because eBay® is not yet an Arkiïs™ integrated site, his plug-in does not supply one of his identifiers in the eBay® URL and instead may use ad blocking technology to detect the advertisements that are included in the eBay® pages and either block them, or if eBay® has agreed to accept Arkiïs™ payments, then the ads which are blocked could be substituted with Arkiïs™ ads. Substitution works by determining the window location and size of each ad to be blocked and individually querying the Arkiïs™ servers for Doug's targeted ads that may adhere and fit in the available real estate, creating an overlaid web page that contains the core Content from eBay® but with all ads being replaced by Doug's targeted advertising from Arkiïs. Arkiïs™ automatically shares a portion of the ad revenues with both Doug and eBay®. (Sites may fall along a spectrum of varying levels integration, beginning with the most basic level of just accepting payments from Arkiïs, continuing onto accepting ad substitution, and finally offering complete seamless site integration. Sites may be rewarded with higher revenue shares as they proceed along this Content Spectrum.) When Doug completes his Amazon® session or exits his browsing session, any cookies related to his unique Arkiïs™ identifiers may be automatically purged and deleted from his computer by the Arkiïs™ browser plug-in.
  • Through the functionality granted by the Arkiïs™ system, Users may control the direct mail advertising they receive from participating Marketers who may use detailed criteria to precisely select recipients who are receptive to their messages. Such mail may contain custom QR codes that recipients may scan with their phone to get paid for reviewing the mail piece and possibly lead to follow up ads on their smartphone. Alternatively, the mail may contain a unique piece number and Arkiïs™ telephone number the recipient may call and enter their piece's number to get paid for reviewing the mail and possibly lead to follow up audio ads over their phone. When calling in to confirm receipt, a User's caller id and voiceprint may be used to authenticate and confirm their identity in a preferred embodiment. Users may avoid receiving duplicate copies of direct mail that is addressed to different people at the same address by requesting such in their Profiles to receive shared mail that may contain individual QR codes or unique piece numbers for each intended recipient in a household. In a preferred embodiment, recipients may send Feedback on received mail through their Arkiïs™ Profile via a Device for additional payouts including Feedback that the advertisement was poorly targeted and not of interest to them. Arkiïs™ may partner with delivery services to allow advertisers to supply unaddressed bulk mailings to a shipper who addresses each mailing as selected out of the Arkiïs™ databases, thus insulating recipients from divulging their identity to advertisers.
  • Users may control the newspapers, magazines, and other periodicals they receive from participating publishers. Control may include advertising Content (or lack thereof) and Premium Content to customize a periodical to better match the specific interests of a reader. Users could pay publishers for Content directly or share revenues they receive from targeted advertising in the periodicals. Advertisers may be aware of the contextual Content within which they would be placed in selecting their target audience. By linking their wearable computing devices with their Arkiïs™ Profile, Users may use wearable computing devices such as Google® Glasses to track consumption of Content and only pay for what they actually read. Alternatively, representative samples from the population may be used (representatives may be compensated to facilitate sampling) to track typical consumption patterns and apply them as norms for matching groups from the general population. Users may choose to compose their own custom periodicals and associated targeted advertising that pull Content from multiple sources into a single customized printed or electronic periodical that they control through their Arkiïs™ Profile. In a preferred embodiment, Users may request Content selection be prioritized by Content highly rated by other Users with similar Arkiïs™ Profiles in the Content's interest area. Companies like The Wall Street Journal may wish to encourage potential readers to subscribe through Arkiïs™ because more highly targeted advertisements and Content generate higher revenues and thus they may, for example, offer potential subscribers three months of free access in return for receiving their subscription integrated with Arkiïs.
  • Users may pay for and select Content based upon its value to them and they may be asked to rate or grade the Content on a sliding scale along metrics such as quality of writing, value, and interestingness. Before reading an article, the User may be presented (via a Device) with a sliding cost the article may cost along with a predicted likely cost based upon their predicted rating. The article cost would then be finalized based upon how much of the article the User consumed together with how highly the User rated the article and optionally together with the ratings of everyone else or only like-minded others as determined by their Profiles.
  • Placard advertisements in public places such as billboards, public transportation advertising, etc., may contain generic QR codes that a User may scan with their location-aware, Arkiïs™ enabled smartphone to confirm receipt, get paid, and possibly receive follow up advertising with additional payouts. In some preferred embodiments, Users may take a picture of the entire advertisement and submit the picture for pattern recognition and identification to confirm receipt together with smartphone location information. In other preferred embodiments, these advertisements may contain a unique advertisement number and telephone number that they may call and enter the advertisement's number to get paid for reviewing it and possibly lead to follow up paid audio advertisements over their phone. When a User calls the number, their phone's caller ID number may be used to identify them, or alternatively, they may enter their unique User ID. A User's voiceprint may be used to further confirm their identity. These public advertisements may indicate a minimum payout recipients will receive for confirming viewing.
  • While traveling, a User may automatically be credited for billboards they pass by their location-aware smartphone in return for allowing Arkiïs™ to provide the advertiser some of their demographic information, possibly anonymously. This information may also include a timestamp of when the advertisement was passed. The User may be credited by matching their location found though GPS, Wi-Fi triangulation, mobile cell tower proximity, or other means to a billboard location database, after confirming the direction a User is facing on the road. In an alternate embodiment, a User's direction may be inferred (and possibly still confirmed) by analyzing the direction of the vector of their travel with the presumption that they are facing forward in their vehicle unless otherwise specified in the User's Profile. In another embodiment, Users may automatically be queried as to whether they wish to provide Feedback on the billboard at the time of passing or at a later time if they are a driver. For dynamic electronic billboards, the billboard may adapt to the automatic SyncGroup of Users currently in range to view the billboard to optimize for the current group of potential viewers. This optimization may, in some embodiments, partition a billboard screen up into multiple advertisements that divide up the screen to allow individual optimization for different subsets of the passing population and may entail independent switching of advertisements for different subsets at different times. Subsets may even target down to the individual and offer Champion messages featuring their friends. Arkiïs™ may direct Users, such as through their smartphone, to the display region corresponding to the advertisement that most closely targets their interest. In some embodiments, the advertisements may be color-coded, such as with a colored outline that your smartphone directs you to locate. When an advertisement is particularly interesting or appropriate, your smartphone may alert you to pay attention, such as by emitting an audible alarm. This direction may indicate contextual cues such as look for red, look for the puppy, or look for their friend (a Champion) to direct the User to the appropriate advertisement. Additionally, after seeing a billboard and still traveling, a User may be offered targeted advertisements on their Arkiïs™ radio feed for follow up audio messages to reinforce the billboard or at a later time they may get a reinforcing television, Internet advertisement, or subsequent dynamic billboard advertisement.
  • In a preferred embodiment, Badges (either physical, digital/electronic, or both) can be awarded (as an added entry/record as part of a User's Profile) for accomplishments: for example, an “iBadge” that is earned upon buying an iPhone®, iPad®, and MacBook Air®. Users may configure in their Profile the visibility of their digital Badges, causing some to be invisible to others or only visible to a select set of friends. In some embodiments, Badges can be earned based upon Content consumed, such as a Game of Thrones Badge for watching every episode of season 1. Badges may be awarded along competitive metrics such as the amount of advertising a User has consumed, amount of Feedback provided to advertisers, or amount of Feedback provided on items purchased. There may be a scoring system managed by the Arkiïs™ cloud servers based upon accomplishments recorded in User Profiles such as purchases made and a leaderboard view into the Arkiïs™ databases may show which Users are doing the best within a group of Users or globally. Badges may include the date they were earned as part of a database entry. Other Badges could reflect values and social responsibility, such as Arkiïs™ tracking your carbon footprint based upon your activities and awarding Badges for improvement or being below a level. In some embodiments, Users may compete with their friends to get a green score, for example to have the lowest carbon footprint for the month. Other values could also be tracked and Badges awarded such as, for example, a Badge or competition for eating well or buying goods that are socially responsible in their manufacture. Another Badge area could be for Arkiïs™ participation such as a Badge for providing Feedback on some number of commercials, reaching a certain trust level, maintaining an active Profile for a certain number of years, or providing some number of reviews. Earned Badges may include payout bonuses that may be agreed upon by advertisers and included in their payout formulas, for example, a User that uses a complete suite of Products within a month may earn a 5% bonus payout on all advertisements related to that suite of Products. Or, alternatively, one Badge may possess multiple rankings as to behavior, integrity (honesty as to stated intent, Assertions, and actual behavior), as well as other valuations. Such a single emblem could be a wheel with various quadrants showing standing in multiple areas of User behavior and values. Or the quadrants of the wheel can show the top ten or twenty areas of User activity or importance in a pie chart based on other criteria or values. Other polygonal and/or color-coded visuals may be created to reflect User information and/or standing. If a person is colorblind, emblems or Badges can be modified to depict Badge rankings by other means that allow for differentiation by the colorblind person.
  • Another kind of Badge is the right to have distinctive notifications which, depending on the embodiment, may be one or more of: auditory, visual, and or tactile (e.g. vibration) on your computing devices that are only available to Users currently satisfying the Badge's criteria. This can be done to enable Users with physical and/or mental disabilities to receive information as well as a non-disabled User. In some embodiments, other Users near Users having earned such Badges or virtually interacting with such Users, may receive Arkiïs™ notifications on their computing devices certifying such Badges and notifying them with audio, visual, or vibration alerts. For example, you may earn a low carbon footprint for the month and thus be allowed to use a distinctive ringtone that others may recognize as meaning you have earned this Badge and which goes away in subsequent months if you do not maintain the Badge's criteria. Such audio alerts may be combined with smartphone screen alerts that identify the Badge associated with the audio alert and teach others its meaning. When authorized by a User in their Profile, other Users may hear a distinctive ringtone when you call their phone or get a vibration alert on their smartwatch when you are near them if they have configured their Profiles to allow their Devices to receive such information. Also, in certain embodiments, a User may authorize the sharing of aspects of their Profile so that other Users may receive this data on their digital devices (e.g. Google® Glasses when looking at them or a representation of them such as their printed name or photograph.)
  • Users may be awarded Profile Badges or emblems, coupons, or bonus payouts for being confirmed to have received every one in a series of related ads. An advertiser could have an ad campaign that consists of ten different ads placed throughout a subway system and when a User is confirmed to have viewed all ten ads, they receive one of these bonus awards. For example, after viewing all five ads for five new summer Starbucks iced coffee flavors, a User may receive a coupon for one free cup of iced coffee as well as a Badge depicting a golden cup of coffee for possible display on their public User Profile as viewed by others. Depending on the embodiment, the viewing of public placard advertisements to receive Profile Badges, coupons, and/or bonuses may be verified by one or more of the following: scanning a QR code located on the public placard via the User's smartphone, comparing a user-submitted picture of the public placard to the known image on the public placard, verifying the User's location through GPS or other location determining data and prompting the User to answer a question related to the public placard, image verification or QR code scanning through wearable technology such as Google® Glass, and the like.
  • Artists may perform in public (e.g. street performers) and receive payment through the Arkiïs™ system by posting a QR code which passersby may scan, allowing Users to check in using GPS data, or the like and choose a contribution they wish to make to support the performances. Users may rate the performances and help like-minded Users to locate public performances that may be of interest to them. Performers may be Champions and may offer free samples. To facilitate the tracking of free samples, the Champion may receive an audible alert each time their QR code or the sample QR code is scanned or a User confirms receipt on their smartphone depending on the embodiment. The QR code may require the User's scanning smartphone is location-aware and in the vicinity of the Champion. Alternatively, Arkiïs™ may know the location of the performer due to the performer being a User who has registered as a performer with Arkiïs™ and submitted their location to the Arkiïs™ servers or enabled location tracking on their phone for the duration of the performance. In some embodiments, Users may get alerts because their smartphones are location-aware and in the performer's vicinity. These alerts may allow the User to acknowledge they are watching the performance and to easily make a contribution if they desire. Such alerts may also indicate when the performer is a Champion and/or when they are providing free samples. Alerts may also include a schedule of performance information.
  • Another kind of advertising possible through the Arkiïs™ system is a live pitch delivered one-on-one to a User over a telephone, videophone, Internet chat, text messages, in person, etc. Such advertising may be coordinated by the Arkiïs™ system to match up the live Content with Users selected by Arkiïs™ for targeting. In these pitches, a person (or computer simulation of a person, in some embodiments) contacts the User directly using audio and/or video or by physically meeting up with the User to provide direct Content. Such contact is coordinated by the Arkiïs™ system, including its being offered to a User and whether they accept such contact. Content may be Marketing Content or Premium Content or a combination such as an advertisement that leads into Premium Content if the person accepts the offer being sold as the Premium Content. The User's Profile may contain requirements to control the contact and Content, such as an outline or flow chart of how the interaction shall transpire. If the live Content violates a User's requirements the Provider may be required to compensate the User as a penalty for violating the requirements agreed to before contact was initiated. In embodiments where contact is by electronic means (i.e. not in person) Arkiïs™ may serve as broker to connect the two parties in order that their identities may be kept anonymous, undesired follow up contact outside the Arkiïs™ system is inhibited, and/or Arkiïs™ systems may maintain accounting of the transaction. Such brokering may take the form of Arkiïs™ interposing itself between the parties where each party individually connects with the Arkiïs system and Arkiïs connects the parties together within the Arkiïs™ system. For example, each party dials a telephone number for Arkiïs™ and upon each party properly identifying themselves to Arkiïs, their telephone calls are bridged or conferenced together.
  • Some Users may watch pirated Content and advertisers may be motivated to provide targeted advertising in and around such Content and to target Users that enjoy particular titles regardless of how the User comes to consume the Content. However, the consumption of pirated materials may affect a User's integrity rating and the like at the exact same time targeted advertising is being successfully provided to that same User. The Arkiïs™ identification of Content such as by matching audio signatures applies equally well to pirated Content and thus allows Arkiïs™ to detect when Content is being consumed, regardless of how it was acquired by the User. As such, targeted advertising revenue may be shared with Content Producers even in the case that their Content has been pirated. Content Providers may wish to target those pirating their Content with offers to sell paraphernalia related to the Content.
  • 5. Operational Overview
  • The following description is directed to computerized techniques and solutions for more effectively providing targeted advertising (e.g., by providing Targeted Marketing Content and/or other types of Content in association with targeted advertising). For example, targeted advertising can be provided in a combined system comprising one or more First Devices (e.g., one or more televisions being viewed by one or more people) and one or more personal computing devices (e.g., one or more individual smartphones or tablet devices). Targeted advertising can be provided in an individual or in a group environment. For example, advertisements can be targeted to a group of Users (e.g., based on Profile information of one or more members of the group). Targeted advertising can also be provided in a system with just one or more First Devices, or with just one or more personal computing devices.
  • Content is to be interpreted as experiential information delivered to a User and may include interactions and/or artistic expression such as video, audio, still photos, words, comic strips, and live performances. As shown in FIG. 8, Content varies across a Content Spectrum that may range from high-value/Premium Content to low or negative value Content—like advertising that pays Consumers (i.e. a User or a SyncGroup of Users). Content may be Targeted by selecting it based upon a Consumer's Profile information (e.g. an advertiser's search criteria matches information in a Consumer's Profile such as their demographics, stated interests, buying history, future intentions, etc.). The Arkiïs™ system provides mechanisms to overlay Targeted Content on top of minimally Targeted Content (i.e., Generic Content). As shown in FIG. 9, Digital Content (900) is Content that may be stored by digital means for subsequent reproduction on a Device (910) (e.g. a radio, television, or smartphone) on behalf of a Consumer (920).
  • An advertising overlay using a First Device—such as a television, radio, and/or other Alternative Devices—such as a smartphone or wearable device, which provide targeted advertisements that may be received in place of general (non-targeted) advertisements by a Consumer. A custom set-top box (e.g. DVR) or a streaming media service (e.g. on-demand television) may deliver the overlay. Advertisements may involve consumption of other sensory input (i.e., viewing, listening, feeling, tasting, and smelling).
  • In some embodiments, advertisements are overlaid on a television. For example, using both an Alternate Device (e.g., smartphone) and a First Device (e.g., television), targeted advertisements can be provided that are presented in place of general (non-targeted) advertisements. Overlaying can be performed, for example, via a custom set-top box (e.g., DVR), a cloud-based DVR, or a streaming media service (e.g., on-demand television). Targeted advertisements can be presented on the First Device and/or on the mobile device (e.g., the mobile device can be called the Alternate Device). There are embodiments for a Consumer (a User or a SyncGroup of Users). There are also embodiments without an Alternate Device (e.g., where only the mobile device(s) are utilized).
  • In some implementations, Users are grouped into a shared advertising group and can be grouped on the basis of contextual or User supplied information, rather than mined data. For example, a number of Users consuming the same Content can be grouped together (e.g., a number of Users viewing a football game on one or more televisions in a sports bar). Users can be grouped into a shared advertising group based, at least in part, on whether the Users participate in the same targeted advertising system and/or based on other criteria (e.g., Physical Proximity, Virtual Proximity, explicit grouping by the Users, etc.). Users can join or leave a shared advertising group (e.g., when a new User enters a location with an existing shared advertising group or when an existing User leaves the location). Two or more shared advertising groups can merge, and a shared advertising group can split into multiple groups. Independent groups can also be created at the same location (e.g., for a sports bar with multiple televisions, those Users of the sports bar watching a particular television can be grouped together).
  • In preferred implementations, Users are paid for receiving targeted advertising. For example, Users can be paid an amount based on various criteria, such as User Profile information (e.g., demographic information, purchase history, and/or other Profile information), Feedback (e.g., whether the User confirms that the advertisement was consumed, answers to specific questions, and/or other types of Feedback), etc. Feedback can also be used in determining future targeted advertisements to be presented to a User (e.g., to present a follow-up targeted advertisement to a User that expressed an interest in a particular Product or service during prior Feedback).
  • The following is an example usage scenario that illustrates one way in which the technology described herein can be embodied.
  • Ted and Mary have decided to buy a custom-made armoire from a local artisan to celebrate their fifth wedding anniversary. On Sunday afternoon, Ted logs into his Arkiïs™ Profile in the cloud and adds, to his shared marriage SyncGroup Profile, a listing indicating their intention to buy such an armoire on one of the next two weekends with a budget not to exceed $5,000. Based upon their individual Profile preferences, Ted receives an email and Mary receives a text message confirming the addition to their shared SyncGroup Profile. Mary reviews the text message and notices that Ted's listing in their shared SyncGroup Profile failed to include the fact that the furniture is to be crafted by a local artisan. Mary responds by texting back to Arkiïs™ the new listing with the word ‘local’ added to the description. Arkiïs™ receives the text and updates their listing to reflect her addition, sending a new alert to both Ted and Mary. Ted indicated in his Profile that he is most receptive to ads when he is alone driving home from work. Arkiïs™ has detected a pattern in Ted's behavior indicating that he is most responsive to ads delivered on Thursday afternoons on his way home from work in San Francisco, after he has been on the highway for two minutes. Additionally, Arkiïs™ has detected that Ted often travels with others on Wednesdays and Fridays due to his regular participation in SyncGroups with his carpool friends on those days. On Thursday, Ted is driving home and listening to his smartphone over his car's connected audio system. The Arkiïs™ app on his smartphone detects the Bluetooth or wired connection and surmises that Ted is in his car and communicates this to the Arkiïs™ cloud servers to include this information in his Profile. After he gets onto the highway, detected by the GPS on his smartphone, either his phone preferences and/or his Arkiïs™ cloud Profile preferences are matched against his current situation to detect an optimal time for message delivery. Arkiïs™ continues and checks to see that no other Arkiïs™ registered smartphones are in continuous ongoing proximity to his location and turns on his smartphone's microphone to listen for any other voice prints that might be in the car. Detecting none other, Arkiïs™ queries Ted audibly via his smartphone to see whether he is indeed alone and Ted confirms ‘yes’ which Arkiïs™ receives by way of his smartphone's microphone. Arkiïs™ knows that there are three local artisans that can meet Ted and Mary's requirements.
  • The first is Jim's Custom Furniture that offers to pay him $20 to listen and respond to their two-minute ad. The second is Angela's Armoires that offers $30 to review and send Feedback on a three-minute television commercial. The third is Phillip's Fine Furniture that offers $60 if Ted is willing to take a five-minute phone call within five minutes of receiving a one-minute audio commercial, or if the call is declined after listening it only offers $10. With the knowledge that Ted is alone and getting on the highway, Arkiïs™ sends an alert to Phillip via text message, email, or phone call querying whether he will be available to take a call with Ted, if he agrees after listening to the commercial. Phillip acknowledges his availability. After being on the freeway for two minutes, Ted is told by Arkiïs™ that Phillip's Fine Furniture is currently selected to present a one-minute commercial now if he would be available after the message for a short phone call with the owner who is standing by and available. Ted could counter the offer, but instead decides to agree to the proposed terms and the commercial begins and Phillip is notified that the call is imminent. 30 seconds into the commercial, Arkiïs™ detects sudden deceleration in his smartphone's accelerometer due to Ted's accident avoidance braking together with a dramatically increased heart rate detected through his Arkiïs™ enabled smartwatch or smartphone-linked FitBit-like device. As a result, Arkiïs™ interrupts Phillip's advertisement because the advertising terms require attentive focus. Arkiïs™ then substitutes music known to be soothing to Ted. After Ted's detected heart rate lowers significantly and the car is traveling normally again, the music is faded and the advertisement is resumed by replaying from the last designated entry point before it was interrupted, in this case the beginning. This satisfies the agreed-upon payout structure that requires that the entire ad be listened to without interruption. While the ad is playing, Phillip's Arkiïs™ app calls an Arkiïs™ virtual conference room where he then waits for Ted. Alternatively, Phillip uses his Arkiïs™ app on his smartphone to call Ted's phone. Either Phillip's smartphone has Ted's number and calls him directly or Arkiïs™ blocks Ted's number and routes the call indirectly through an Arkiïs™ call routing center. Ted's Arkiïs™ app detects the incoming phone call from Phillip and automatically answers it without ringing or vibrating and places Phillip into an immediate hold. At the end of the one-minute message, Ted accepts the invitation to speak with Phillip and his phone retrieves Phillip's connection, sending an audible alert to Phillip to notify him that Ted is now on the line. Phillip greets Ted and proceeds to learn more about Ted's needs in-depth while showing how his Products will meet those needs. They wind up the call after six minutes with Ted agreeing to discuss visiting Phillip that weekend with his wife. Ted earns the full $60 having satisfied all the ad terms. Next Arkiïs™ serves up the two-minute ad for Jim's Custom Furniture. Ted is intrigued by their use of sustainably harvested wood from a local source. At the end of the message, Ted is queried about his interest and he audibly indicates that the local sustainably harvested wood was the most appealing feature to him from their message. Arkiïs™ sends Ted a message containing a link to a video where he can view examples of Jim's Custom Furniture that Jim has already selected to most closely match Ted and Mary's professed desires. The link includes notification that viewing the video within the next 2 hours will earn him another $5. During the rest of Ted's drive home, he listens to a podcast selected by Arkiïs™ about the history of custom furniture craftsmanship in America. While Ted is still on the road home, Mary finishes the calculus class she teaches at Foothill Community College and heads home in her car. She is offered ads from the same two companies that contacted Phillip. Because Ted expressed interest in Jim's Custom Furniture, their ad is presented first to Mary. Given Ted's Feedback that he loved that they sourced their wood from a local supplier employing sustainable methods, Arkiïs™ serves Mary an alternate advertisement where Jim highlights this point in much greater detail in a three-minute message that pays $20 and requires no Feedback. At the end of the message, because Ted sent his Feedback while using their SyncGroup Profile, Arkiïs™ asks Mary if she would like to hear Ted's Feedback to Jim of what he liked. Mary accepts and hears Jim's voice indicating his keen interest on having an armoire fashioned from local sustainably harvested wood. Mary is concerned that local wood may not offer the range of grains and tones she was imagining. Mary responds to Jim, and copies Ted, indicating that she was imagining an armoire made from cherry and walnut wood. Mary asks if these can be locally sourced, or if not, if there is a comparable wood that could be substituted. That evening after watching the third Provider's video ad and reviewing the follow-up pictures and videos provided by the other two, after discussion Ted and Mary make their final choice of Phillip. To purchase, they may call Phillip directly and have Phillip enter the purchase through a Square-like app (such as available from Square, Inc., San Francisco, Calif.) that links with the Arkiïs™ app and credits Ted and Mary for their performance. Alternatively, they can use their PayPal®-like account that is linked to/included in their Arkiïs™ Profile to pay Phillip. Additionally, they may make the purchase online using Phillip's Arkiïs™ enabled website that accepts their Arkiïs™ credentials as part of a PayPal® like purchase. Alternatively, they may go in person and supply their Arkiïs™ identification barcode that is swiped together with their credit card. Alternatively, their credit card provider may be linked with Arkiïs™ and transfer their credit card purchase data into their Arkiïs™ Profile. Alternatively, their credit card purchase data may already be collected by a website like Mint or Upromise and they have linked that website to their Arkiïs™ Profile so that all data collected by the third party is automatically integrated into their Arkiïs™ Profile in return for sharing a very small portion of their earnings or a fixed monthly fee debited from their earnings.
  • The following is another example usage scenario that illustrates one way the disclosed system can be implemented. Josh and Tyler share an apartment in New York City and decide to splurge on the new Xbox® One system. They have not chosen where they will buy it; however, they do want to ensure that wherever they buy it, the store provides at least a living wage to all its employees. Therefore, they edit their shared SyncGroup Profile to record their intent and requirements. During a Rangers game that evening, they receive a message from Arkiïs™ cloud servers that retailer J&R Music World® has recently put in place a living wage standard for its employees in New York as validated by a non-governmental organization their SyncGroup Profile indicates they trust.
  • 6. User Profiles
  • An Arkiïs™ User may control one or more Master Profiles that are connected to their identity and help to delineate their individual identity. Profiles may be persistently stored in one or more computer databases (e.g. object oriented, relational, etc.) for manipulation, query, and retrieval into computer processing memory, such as in a cloud server computer. As seen in FIG. 10, each Master Profile may contain one or more Sub Profiles of select information from the Master Profile of the User's choosing. Some Sub Profiles may be public facing. Public facing Profiles may represent how Users appear to others and contain the information a User specifically elects to share with others. In some embodiments, a User may remain anonymous from others by using a private Profile to anonymously receive Targeted Content from Marketers whose queries match their private Profile. Profiles may be a subset of a User's Master Profile, which in a preferred embodiment contains the maximum of their personal information available to be shared. Profiles may also be salted with false information to provide heightened User privacy. For example, whole fictitious Profiles unlinked to real Users may be created, and the use of this false profile information could trigger security alerts. In some additional embodiments, Profiles may be fictitiously created whereby one creates a separate persona for oneself, but payouts would be based upon the performance of that fictitious persona, for example, one could have a Second Life® persona which would be served ads that target that persona within the game. Fictitious Profiles may be created as either a completely new Master Profile that is unrelated and unconnected to any other Master Profile or as a Sub Profile that may override information from an existing Master Profile.
  • Individual Users may also control Sub Profiles for minor children and consequently control the subject matter of Content that reaches them. The minor children's Profiles may be configured to be accessible by proxy from one or more guardians' Individual User Profiles.
  • The User may select what portions of their Arkiïs™ Master Profile are included in a given Sub Profile to control the privacy of their information. The choices of what information to publish in their Profiles may change over time. In a preferred embodiment, no one is allowed to attempt to correlate and connect together any of a User's public facing Profiles without permission; however, internal to Arkiïs′® servers, consumption history of the User's own Content across all of a User's Sub Profiles may be utilized for the purpose of avoiding oversaturation of similar Content messages.
  • To ensure the accuracy of Arkiïs' Content and to protect its integrity, Users may be required to prove their identity for a Master Profile through various means such as by successfully answering LexisNexis® identity questions. A User may be allowed to use the system without proving their identity, but in such cases, their rights and abilities may be limited for that Master Profile. For example, a User may not earn referral bonuses for the creation of other Master Profiles they referred if either the referrer or referral has not proved their identity. Additionally, a User may not be allowed to vote in the governance of Arkiïs™ if their identity has not been proven. In a preferred embodiment, Business Users never vote in the governance of Arkiïs. A User may be given the option, for example through a check box on their Arkiïs™ preferences page, to begin using their Master Profile without proving their identity but later decide to supply proof of their identity and thus gain the rights and privileges granted to fully identified Users starting at the point they prove their identity.
  • In some embodiments, once a Master Profile is linked with a proven identity, all the other Master Profiles of that proven identity may be linked internally, however, the visibility of other linked Master Profiles may be hidden from Marketers. This allows the User some manner of privacy between their Profiles but might make recovery of their credentials to their unlinked Master Profiles more difficult depending upon the level of isolation. For example, providing the login account name of one Master Profile might allow recovery of the password from a linked Master Profile whose credentials are still retained.
  • An Arkiïs™ User may elect to register their existing grocery loyalty cards and credit cards to allow their Master Profile to automatically reflect actual purchasing decisions (as is already the practice with sites such as eScrip.com and uPromise.com) as illustrated in FIG. 11 with Data collected by loyalty cards such as grocery purchases 1180. Additionally, they may register their online accounts at merchants such as Amazon® (Amazon.com) and NewEgg (newegg.com) so that details of specific purchases may also be automatically included in their Master Profile. In some embodiments, social networking sites such as Facebook and LinkedIn may be integrated with your Arkiïs™ Profile to help you get recommendations (e.g. Sam is a friend of your best friend Mary, Sam has received the highest integrity rating grade from Mary, and Sam is a Champion of a Product that you are interested in.)
  • To ensure the confidence and trust of the User, the security of the Arkiïs™ system is carefully controlled and monitored. The User may configure the security controls that gate access to viewing and editing of their Profiles. Controls may include, but are not limited to, various biometrics such as face, voiceprint, and handprint recognition together with challenge questions they have configured to which generally only they know the correct answers, depending on the embodiment.
  • An Individual User's Arkiïs™ Profile as depicted in FIG. 12 may include information such as the following examples:
      • Proof of identity through answering a series of credit history questions provided by LexisNexis® (1216)
      • Income and their sources (1240)
      • Assets (1240)
      • Credit obligations (1240)
      • Mortgage/Rent obligations (1240)
      • Credit FICO® score for the three major bureaus (1240)
      • Gender (1218)
      • Sexual orientation (1218)
      • Religion (1218)
      • Political views (1218)
      • Age, Height, Weight, and Blood Pressure (1218)
      • Ethnicity (1218)
      • Education level (1218)
      • Children and optionally link to children's Profile (1224)
      • Marital Status and optionally link to spouse's Profile (1224)
      • Grocery purchases of individual and family as recorded through loyalty cards (1220)
      • Spending patterns of individual and family as recorded through linked credit card transactions (1220)
      • Consumer goods purchases as recorded through linked shopping sites (1220)
      • Geographical location information through linked Foursquare (Foursquare.com) account (1230)
      • Anticipated purchases and timelines of big-ticket items (1202)
      • Advertising to which they desire or wish to exclude Content (1236)
      • Desired Products or features which are not available today (1210)
      • Badges earned for accomplishments (1204)
      • Registered televisions and cable providers (1206)
      • Reviews and ratings of Products (1208)
      • Persistent SyncGroups the User is a member of (1212)
      • Facebook posts and likes (1222)
      • Internet browsing history of pages visited and bookmarks (1226)
      • Wi-Fi networks visible from smartphone (1232)
      • Operating system and installed software on laptop computer (1234)
      • Google Nest data including preferred temperature and patterns of room usage at home (1234)
      • History of television shows watched on DVR (1238)
      • Coupons and rebates received and redeemed (1242)
      • Any other information that help identify an individual and that may be used for targeting purposes (1298)
      • Associations based upon values, ethics, public or private service (1214)
  • A User may elect to work with third parties to help and ease population of their Profile, examples of which are shown in FIG. 13 and illustrated in FIG. 11 with data collected by 3rd party data aggregators and/or websites on User's behalf 1160. For example, a User may choose to work with a Provider such as Google® or Facebook® to have their mined demographic information automatically populated into their Profile. The User may review and edit such automatically gathered data to make corrections and fill in missing details is illustrated in FIG. 11 with data corrections/edits/deletions by User 1150. In return for saving the User the time required to manually populate their Profile, Google® may receive a portion of advertising revenue that was targeted based upon Profile information derived from Google®. A User may also choose to partner with their credit card issuer to populate their spending history and provide third-party confirmation in return for sharing a portion of their revenues derived from such information as illustrated in FIG. 11 with data collected by credit card and banking transactions 1170.
  • Each custom targeted streaming source for a Device, whether it is a dedicated piece of hardware (e.g., local DVR or remote DVR), a Blu-Ray streaming application, a Roku™ channel, an HD radio, a tablet, or a smartphone, may be associated with its owner's Profile. In the case of source Devices that feed large displays that are shared, this Profile is often the owner's family's SyncGroup Profile. Registering a shared Device eases deducing the audience due to the association with its owner's Profile, minimizing the chance that another adjacent User's settings will influence the Device's presented Content. A Device's registration status may be stored within a database, allowing for simple identification of all Devices linked to a User. In some embodiments, numerous Users may register the same Device, either submitting a hierarchy of Users to determine whose settings override the settings of other Users linked to the Device or jointly agreeing on the Device's settings (through creating a SyncGroup for the Device, or submitting some form of mutual consent). When multiple Users register a shared Device, this further simplifies deducing the audience in a situation where multiple Users consume Content from a Device frequently.
  • For personal Devices, the Consumer is generally assumed to remain static unless otherwise explicitly overridden (e.g., my daughter is using my tablet to view Content). However, depending on the embodiment, different heuristics can also be applied to detect alternate Users (e.g., other family members). For example, the Premium Content consumption patterns may suggest that someone other than the registered owner is using a personal Device. Facial recognition and gesture patterns can also be used to detect alternate Users. When an alternate User is suspected, they may be challenged to provide the owner's password if they claim to be the owner or may select from suggested alternates and enter their own password. When an alternate User is selected, any of their personal Profile Filters or parentally assigned limitations may apply in addition to or instead of the owner's Filtered or parentally assigned Content limitations depending on the embodiment.
  • The owner of a source Device may place strictures upon what Content may be consumed on a Device registered in their Arkiïs™ Profile. Any Filtering requirements may be honored regardless of whether the source Device owner is present.
  • The following is a description of an embodiment of the Arkiïs™ system where a Device is linked to a Profile: Michele is the owner of a sports bar and has strong beliefs about the need to consume Products made in the USA and has configured her Profile so that no ads for non-USA made goods may ever be displayed on the screens in her sports bar that are linked to her Profile. When the Google® cloud servers stream Content to her configured screens, the Google® servers first query the Arkiïs™ servers for approval based upon her Profile so that Google® may deliver Content that meets her requirements. The only way to receive such Content that does not conform to Michele's requirements in her sports bar is on a different User's personal mobile Device brought into the bar.
  • Similarly, as shown in FIG. 14, minor children (or other content controlled User) (1410) may be tagged with Filtering requirements to limit, modify and/or control the Content (1440) they are exposed to. A child may be tagged by registering a Device (1420) generally present on the child and tracking the tagged Device's distance from other Family Friendly Devices (1428) such as a shared television and other Adult (1412) Family Friendly Devices (1422) such as a personal mobile device that are presenting Content (1440), as well as submitting the child's face, likeness, or voiceprint to secure Arkiïs™ servers (1430) for automatic recognition and subsequent Filtering. Furthermore, if multiple Devices are listed in the Arkiïs™ servers (1430) as being located in the same house or dwelling or location (1400), each of the linked Devices may be configured as family friendly engaged when the child (1410) is tagged as being located near any of the Devices (1422, 1428). Devices may be configured and/or locked down to be Family Friendly engaged, and when so configured, always adhere to the strictest parental control or parent/guardian-defined Content Filtering (1450) settings in any situation that is known to include children, in such configuration, Devices only reproduce authorized Family Friendly Content (1442) while Filtering (1450) out all unauthorized Other Content (1444). Depending on the embodiment, such Filtering may include controlling what files, websites, audio, and video may be accessed with a Device. When a child enters an environment or location (1402), such as another family's household with more relaxed Filtering requirements or presently allowing (1452) unauthorized Other Content (1444), all Family Friendly Devices (1424, 1426, 1429) such as Adult (1414, 1416) personal phones (1424, 1426) and televisions (1429) may automatically honor the stricter Filtering requirements placed upon that child and only reproduce authorized Family Friendly Content (1442). In some embodiments, the foregoing more restrictive filtering may include locking down previously allowed (1452) downloaded Content on such Devices so that such Content cannot be accessed or reproduced during the minor child's presence. An immediate audio, visual, or tactile alert may be sent by Arkiïs™ servers (1430) to any or all Devices of profile-configured guardians/Adults (1412) if a child ever comes in contact with a Device that is not an engaged Family Friendly Device. A parent may view a log of all the Marketing and Premium Content (1440) that has been served up to their child in the recent past, to monitor and be aware of what they are watching when out of their direct supervision. In some embodiments, a registered parent or guardian may request a certification through Arkiïs™ that some or all Devices registered to a different family were engaged as family friendly during the duration of the minor child's stay. In these embodiments, data is sent to a database every time a User's or household's Family Friendly Content mode is engaged or disengaged on a Family Friendly Device to facilitate this certification. In a preferred embodiment, a Device can be guaranteed to remain family friendly engaged for a set period and not allow relaxation of the control until the guaranteed time has elapsed. Advertisers may also place their own restrictions and refuse to advertise in situations where unauthorized children might see their messages.
  • As shown in FIG. 15, Content Producers (1510) may agree to voluntarily label, classify, and/or tag the Content (1520) they produce along various metrics that may be used for Filtering (1550). Consumers (1560) do not receive (1570) Content (1520) that is Filtered (1550). Such designations may be attached to the work as a whole or on individual sections or pieces of a work (e.g. on specific dialog or text words or on subsections of a photo or video.) Producers that inappropriately label/tag their Content may be required to pay penalties and fund third-party certification during a probationary period. Arkiïs™ Consumers (1560) may choose Profile preferences (1540) for Filtering (1550) all Content supplied by Content Providers (1530) through third-party Independent Reviewer Certification (see Section 11—Providing Feedback on Content, Goods, and Services), which may audit such labeling, tagging, and or classifications in return for a portion of Targeted Marketing Content revenues related to the consumption of such Content in some embodiments. Any User may flag Content as inappropriately labeled, tagged, or classified. Producers found to repeatedly produce Content that is inappropriately labeled by a representative plurality or by a competent, certified review panel may be barred from participation and have all their Content treated as being inappropriate for all children whose Content is filtered. In addition, a generic or specific child certificate may also be employed as a backup for new advertisers to self-govern whether they send a new advertisement (not yet vetted by others) to self-regulate what may be sent to that child. Such certificates may also be utilized in the same manner for adults. Other controls may be employed to prevent inadvertent exposure to material that a Consumer has stated is undesirable.
  • When Content is delivered through Arkiïs™ cloud servers, such as when viewing a personalized Roku™ channel, Content may be individually customized and automatically censored when delivered to such feeds to “bleep out” or substitute profanity or other Content matching a User's Filtering preferences, depending on the embodiment. In alternate embodiments, portions of videos or images to be Filtered may be overlaid with checkerboard pattern substitutions to obfuscate portions deemed inappropriate. Arkiïs™ may be presented with a feed without any Filtering and perform transformations on it to automatically Filter and replace objectionable portions, as determined by a particular User's Profile, before forwarding the feed on to that User. In both audio and video, the original signal may contain tagging to aid automated Filtering and/or analysis may be applied to automatically block Content when tagging is absent or suspect. In other embodiments, a Content feed may be delayed by a few seconds so that the Arkiïs™ servers can detect profanities and other inappropriate Content through audio and video recognition, then censor the inappropriate Content before showing it to a viewer.
  • The following two example embodiments portray different Family Friendly Device settings possible through the Arkiïs™ system. Richard and Phoebe do not want their children to be exposed to messages promoting alcohol, drugs, or smoking and have therefore configured all the screens in their house and all their family's mobile devices to prohibit any advertising or entertainment that contains non-Family Friendly Content which promotes any of these activities. Additionally, they have flagged their children's Profiles with this limitation and before allowing their children to go to a friend's house, they first confirm that the Devices in that child's home are configured to unconditionally honor their filtering requirements with a Family Friendly Device engagement registration guaranteed for at least the time they will be in attendance at that house. In the event that somehow their children are exposed to such messages or enter an environment where there is a potential for such, the Arkiïs™ cloud servers detect this and immediately send an alert to both parents specifying the details of the violation, or in the case of a potential violation, giving them the ability to outbid such undesired messages before they can appear. Before going out to a restaurant, they also first confirm that the restaurant is a Family Friendly Location and thus adheres all its Devices to all child Profile Filtering requirements. They may check a restaurant's Family Friendly Location status in many ways, including, using the Arkiïs™ website to look up the restaurant, viewing the restaurant's Arkiïs-enabled Facebook page, sending a text message with the establishment's telephone number to a special Arkiïs™ number that automatically texts back the status of the requested phone number's establishment, sending a request via an Arkiïs-enabled Twitter hashtag, entering the proximity of the restaurant and checking their Arkiïs™ app on their smartphone for statuses in their vicinity, etc.
  • Juan and Clarita are married and have two girls, ages 13 and 15, and configure their Profile to only accept advertising that is labeled as Family Friendly Content by the independent Family Values Coalition (FVC) non-profit that has 12 million subscribers in the Arkiïs™ network. The FVC enlists the aid of volunteers like Juan and Clarita to review Content (including both premium and advertising) and use the Arkiïs™ cloud servers, by way of for example their smartphone, to give it a letter grade of ‘A’, ‘B’, ‘C’, ‘D’, or ‘F’ to indicate how well the Content represents the “family values” they wish to bring to their family. Alternatively, they use the Twitter network of cloud servers to report their grading and Twitter automatically links with their Arkiïs™ Profile to register their grade. Juan and Clarita have designated that only Content achieving at least a ‘B’ on this scale is to be served to their family. They decide to watch “Castle” (a crime drama) but the software Filters out the latest episode that features a murder with a backdrop of sexually provocative dancers that is given a ‘C’ rating by FVC and instead they view an older episode rated with a ‘B’ that Arkiïs™ knows they have not previously viewed. Because they have a well-established Profile in Arkiïs™ and a household income of $90K, they only need to view two 30-second commercials to cover the cost of the hour-long “Castle” episode they are going to watch. They decide to watch these two commercials up front. Their Arkiïs™ Profile indicates they do not drink alcohol so two beer commercials that would have otherwise bid the highest are rejected. Instead, the first commercial is for automobile insurance and specifically targets their situation of having a teenager who is about to begin driving with a program that recognizes her good grades in school and offers a lower rate as a result. The second commercial is for a Disney cruise ship 5-day family vacation in the Caribbean that caters to families with teenagers. Because their Profile indicates that they are Latinos and that Spanish is their preferred language, both commercials are presented with Spanish audio and feature Latino actors. Both commercials were rated an ‘A’ by the FVC and after paying $2 for the otherwise commercial free viewing of “Castle” they still net $1 in earnings. After each commercial is viewed, the system pauses briefly while all four are queried for Feedback on their smartphones with specific questions based upon their individual Profiles. Once all four have provided their Feedback on their smartphones, their Arkiïs™ app forwards the Feedback to the Arkiïs™ cloud servers, the servers are also providing the streaming Content and the playback on their television automatically resumes. After the “Castle” episode completes they are also asked on their smartphones to rate that episode on the Family Values scale. They also rate how well they enjoyed the programming and which aspects were the most appealing so that future Premium Content system recommendations from the Arkiïs™ cloud servers can be more effective.
  • FIG. 16 is a Venn diagram that shows the various kinds of User Profiles (1600). In a preferred embodiment, Business Users may have and control Business User Profiles (1620) for their business similarly to Individual User Profiles (1610). At the point that an individual person (e.g., an employee) working for the business interfaces with Arkiïs™ on behalf of the business, they use an individual business Sub Profile that is owned and controlled by the individual. A business has administrator (i.e. root) privileges over its individual Sub Profiles and can, for example, change the access level/rights or delete Sub Profiles if desired (e.g., due to an employee leaving the company).
  • Just as Individual Users have Profiles, other business Participants have Profiles such as Content Producer Profiles (1655), Content Provider Profiles (1650), Marketer Profiles (1640) and Goods & Services Provider Profiles (1630) have their own Business User Profiles (1620) in the preferred embodiment.
  • A Business' Arkiïs™ Profile may include information such as the following:
      • Proof of identity (e.g., government/certified documents)
      • Revenues, expenses, debt, and capital
      • Average, median, lowest, and highest wages of employees
      • Contractors providing services to the company
      • Benefits provided to employees such as health insurance and retirement
      • Philosophical vision and goals of the company
      • Goods and Services categories and specific Products for sale and/or planned for production.
      • Location(s) of stores or venues
      • Indexes of Products sold that specify their variations (e.g. different sized packaging, different movie cuts), showings, price, inventory and location(s) within store(s) and may include aisle and shelf designations as well.
      • Hours of operation and performance schedules
      • Competitor(s)
  • In some preferred embodiments, Arkiïs™ also has provisions to accommodate those Participants (i.e., Consumers, Reviewers, Marketers, Content Providers, Content Producers, and Goods & Services Providers) who may prefer complete anonymity for some interrelationships and thus wish to, for example, review, market, produce/provide Content, or buy/sell goods and services that are provided through Arkiïs™ with cash or the like. Some Participants may choose anonymous interactions by default and only explicitly select to reveal their identity, on an interaction-by-interaction basis. To achieve this, a Participant may create a secret virtual identity Profile and bank account and privately fund it with traditional currencies (e.g. US dollars) and/or cryptocurrencies (e.g. Bitcoin). For Users, this may be done in two ways, either by creating a separate anonymous Master Profile, or by creating a new anonymous Sub Profile in their already existing Master Profile. They then may use their anonymous Profile to purchase or sell goods that are, for example, paid out of or into their funded bank account and delivered to or picked up from a prearranged locker box. Such mechanisms allow the Participants to have the anonymity of cash or cryptocurrency while still being a part of the reviewing, marketing, delivery or shipment of goods & services to and from a convenient location, such as their home.
  • Alternatively, if the User desires anonymous shipment to their home or from their business, the seller may be given a coded address label from Arkiïs™ to anonymously address a package and ship it with a standard shipping service. The seller may only know the cost to ship the package and perhaps its zone or general delivery area, but not its exact destination. This approach may also be applied to delivery to and from drop boxes. To help ensure privacy, the tracking software to ship the package may use a system analogous to Tor's onion routing Internet communication (see wikipedia.org/wiki/Onion_Routing) to hide the addresses of the sender and receiver, only in this case, even the sender and receiver do not know each other's address, it is only the Arkiïs™ system that has this knowledge. The Arkiïs™ system may know the sender and receiver Profiles and may compute a circuit or route for the package's delivery. Arkiïs™ may then provide the original delivery circuit information and pricing to the shipper in an encrypted or coded format. This may, for example, include attaching the package to a reusable individual token generating apparatus where the tokens are required to prove the package's identity and location in order to learn each next step in the circuit from sender to receiver. Alternatively, at each step of the circuit, the shipper may contact the Arkiïs™ servers to retrieve the next step of the circuit after proving the location and identity of the package by providing, for example, a code number. In such a system, the Arkiïs™ servers may no longer respond to requests for the next code number once a code number has already been processed. This may take effect immediately when the next code is provided or occur once the package has proceeded to some number of steps forward along the circuit or continuum of distribution. Alternatively, the shipper may only know the general originating area and delivery area and compute its own circuit or route between these, and only contact Arkiïs™ for final delivery instructions. An anonymous buyer may receive a code from Arkiïs™ that allows the bearer to retrieve the package without further identifying themselves.
  • The following example describes how anonymous shipping may be implemented in the system. Justin wishes to anonymously ship his package to an anonymous purchaser through Arkiïs. He purchases shipping for $10.85 and receives instructions to use UPS. He prints out an 18-digit alphanumeric coded anonymous address label provided by Arkiïs in consultation with UPS that represents the circuit or route to the destination. To help maintain his anonymity, Justin deposits the prepaid package at a UPS drop box in Eugene, Oreg. When UPS picks up the package, they bring it to the Eugene pickup center where a location aware scanner that is registered with Arkiïs™ reads and submits the 18-digit code to Arkiïs. Arkiïs™ verifies the Eugene UPS location and scanner as valid together with the package code and provides a new code that is put on the package in place of the first code. The new code directs UPS to send the package to Springfield, Oreg. When the package arrives in Springfield and is location scanned, Arkiïs™ provides the next package code and removes the original Eugene package code from its outward facing servers to hinder any reverse engineering to determine the package's ultimate sender or receiver. The supplied next code directs UPS to now send the package to Portland, Oreg. At Portland, the Springfield code information is removed from the outward facing Arkiïs™ interface and the next code is generated for the package to now be sent to Ontario, Calif. However, due to error, UPS misroutes the package to Dallas. When the package is location scanned in Dallas, the error/exception is detected and Arkiïs™ adjusts the route in consultation with UPS to omit Ontario and instead go directly to Oakland, Calif. and generates a new 18-digit code to route the package to Oakland, Calif. while clearing the Portland code information. Once location scanned at Oakland, the Ontario code is removed and a new code is generated to take the package to Sunnyvale, Calif. Once the package is location scanned in Sunnyvale, the recipient gets a notification that their package has arrived at the designated UPS location and may be picked up using their retrieval code or they may release an address for delivery. The final route information is expunged from the Arkiïs™ outward-facing servers.
  • Even though the Participant may be using an anonymous Profile, they may still receive credit for their performance. Anonymous Feedback may be provided for any interaction a Participant engages in or is connected to. When such Feedback is subsequently reviewed, it may be identified as anonymous.
  • Before initiating an interaction, a Participant may opt out of the right to provide Feedback or to have Feedback written about them. This election is divulged to the interacting parties.
  • In a preferred embodiment, a User may elect to temporarily select a contrived Profile that does not actually reflect their demographics, this may be for the purpose of seeing what would happen to their Targeted Content were aspects of their real Profile to change. This mode is revealed to the Content Producers who may prohibit their Content from being consumed under hypothetical Profiles. In preferred embodiments with this mode enabled, actual advertising payouts and Premium Content charges are still based upon your real Profile, although you may be able to see what the payout or charge would have been under the hypothetical Profile, were it to be actual. One way this feature might be used is to see what it would feel like to be a multi-millionaire. From an earlier example, a Consumer interested in looking at yachts, but without the means or intention to purchase one, may explore the subject through such a hypothetical Profile. In such a manner, the Consumer's integrity rating of their Profile is undamaged or otherwise affected.
  • A User may also elect to enter a mode where they are represented by a fictitious Profile or avatar that represents a virtual persona that they take on in virtual worlds such as video games. In one embodiment, a User may enter this mode by selecting an option within their settings page that specifies that all activity will be attributed to their virtual persona Profile until the option is deselected. Such designation may occur on one Device but may apply to one or more other Devices. Alternatively, such designation may be specified to automatically be activated or queried for confirmation when one or more conditions occur such as being in Proximity (Virtual or Physical) of one or more particular Users, based upon a calendar or time schedule, based upon an activity or purchase, based upon arrival or departure to or from a location, based upon a Device, based upon an application being entered, particular Content or genre of Content being consumed, etc. This allows the User to more fully engage in the role-playing of their persona and receive ads that target their virtual persona. In this mode, the User may earn payouts but the payouts are determined by the performance of their persona-specific Arkiïs™ Profile. For example, a User may appreciate playing Second Life® and may create an Arkiïs™ persona or avatar that represents their alternate identity in Second Life®. This allows them to receive in-game advertising that is targeted to their persona to purchase in-game goods for their persona.
  • A User may snapshot, borrow, or copy a Profile from a friend to help build a fictitious Profile. This may be done with their friend's permission. In some preferred embodiments, fictitious Profiles may import or auto-fill data from other Profiles, and may prompt Users to manually input certain fields or approve their importation. Such Profiles may be useful for the purpose of selecting a birthday gift that is well suited for a friend. These Profiles may be further contrived or edited such as to adjust financial demographics to more closely align with any User. Users may also adjust preferences in order to limit such a Profile to overlaps between their own Profile and their friend's tastes and preferences. In some embodiments, overlaps between a User's Profile and their friend's Profile may be determined by analyzing shared interest keywords or similar browsing history data. Alternatively, any similar, common, or shared demographic information may be emphasized. Similar, shared, or common forward looking Assertions may also be emphasized. This may be useful for identifying a gift that would appeal to both themselves and their friend or to find a gift they can share together. Such joint Profile generating techniques may be correspondingly applied to SyncGroup Profiles, for example, using a husband and wife's SyncGroup Profile to buy a wedding gift for their friends based upon their wedding SyncGroup Profile or alternatively for a couple to buy a birthday gift for a shared friend, or alternatively for an individual to buy a wedding present for a SyncGroup couple. Such Profiles may be informed by what objects or activities feature most prominently in your life in order to help others effectively shop for you.
  • The following example shows how a User may create and utilize a fictitious Profile combining the interests of multiple Users. Kevin is shopping for his friend Lisa, and the shopping website he visits links into Arkiïs. During shopping, the browser app accepts Kevin's Assertion that he is shopping for Lisa and, honoring Lisa's permission settings, Kevin's shopping is guided and he may see Lisa's information including: her interests, her wish list, things she is looking for, proposed gift's correlation with other things she already owns, and Assertions of gifts she desires from Kevin. The shopping site displays a score on each possible gift to rate Lisa's likely reception of the gift as determined by Arkiïs. Such grading may take into account emotional appeal, whether she needs it right now, whether it is on her wish list, its practicality, her likely emotional response, and coordination/match level with her wardrobe. Kevin does not have full access to Lisa's actual Profile, but is limited to seeing what is necessary and according to Lisa's permission settings, e.g. it does not disclose what kind of toilet paper she uses, or show intimate details about her personal hygiene or hygienic purchases. Such a search includes the price point Kevin is looking for and the prediction that Lisa will like it. Kevin may get ads targeting him based upon this purchase intent for Lisa; such ads may be ranked based upon the likelihood of Lisa liking the Product. While shopping for Lisa, Kevin may be targeted based upon other aspects of his Profile unrelated to his gift buying for Lisa. Such ads may relate to purchasing for him or for gift buying for others he has asserted. While his focus may be upon buying for Lisa at a given point in time, he may fortuitously come across other opportunities that are particularly well suited for his current context and thus may warrant interrupting his search for Lisa with these other targeted ads. Such ads that deviate from his immediate goal may be clearly marked as detours that may be advantageous, allowing him to decide for himself whether he wants to take any such detours.
  • Users may choose to associate their Profile with any wearable gadgets they adorn that change their appearance based upon their location, context, and other Users around them. For example, a t-shirt may contain a display (e.g. through use of LEDs/light-emitting diodes) that varies the Content shown based upon their interaction with other Arkiïs™ Users in their vicinity to display their shared rankings and or interests related to their carbon footprint, charitable giving, music, professional activities, sports, achievements, awards, etc. Alternatively, Users may share such information to a computing device in the possession of those physically near them or virtually interacting with them. A User may alter their Profile settings to automatically share information (or configure to query for approval) with other Users in physical or Virtual Proximity, or may actively share selected Profile facts with friends or Users in physical or Virtual Proximity at any moment, or may be prompted to approve sharing of information requested by those in physical or Virtual Proximity A User may have different levels of such divulging of information about themselves. They may choose to manually increase the level over time. Alternatively, Arkiïs™ may automatically assess a User based upon their Profile information, such as their integrity rating, and choose the level of revealing of information based upon preselected Profile controls.
  • Users may also choose to allow the Arkiïs™ cloud to utilize their identity information and associate it with information collected by a computing device in the possession of those physically near them or virtually interacting with them in order to provide hints to help facilitate the identification of individual sources within such collected data. For example, Alice may be speaking to Bob and alerted by Arkiïs™ (e.g. via text message or an Arkiïs™ smartphone alert) that Bob's smartphone is recording and her voice and Arkiïs™ cloud servers may use Alice's Physical Proximity to Bob, as indicated by Alice's smartphone being in proximity to Bob's smartphone or by their being joined together in a SyncGroup, as a strong indicator to the identification algorithm used in the Arkiïs™ cloud servers that one of the identified voices in Bob's smartphone audio stream is highly likely to be Alice. Alternatively, when Bob takes a photograph with his smartphone while they are near each other, there is a strong indicator to the identification algorithm in the Arkiïs™ cloud servers that one of the faces and/or bodies identified in Bob's smartphone picture is highly likely to be Alice.
  • In a preferred embodiment, Arkiïs™ members receive a Marketing Performance Score (which is analogous to a FICO® credit score and is a specific kind of integrity rating) that varies from one Product or service to another and is objectively based upon professed and demonstrated preferences, forward-looking Assertions (e.g. I'm getting married in March), past purchasing behavior, track record of fulfilling their own previous predictions, and other measurable behavior data in their Profile. If a Consumer lacks a track record with respect to fulfilling their own previous predictions in a given area then Arkiïs™ instead deduces an average track record based upon similar Profiles. A Profile may be considered to be similar by the use of marketing geodemographic segmentation, or in other embodiments, the use of multivariate statistical classification to discover whether Arkiïs™ Profiles segment into different groups whose marketing performance scores are closely correlated. For example, statistical analysis may reveal that single, college educated women aged 25-30 are 82% likely to fulfill Assertions related to durable goods purchases with a time horizon of six months or less. Alternatively, when a Consumer lacks a track record in a new area, their score can be predicted by looking at their track record in other synergistic areas and finding like-minded Profiles of others in those areas that also have a track record in the new area and using these like-minded individuals to predict the Consumer's behavior in the new area.
  • The following is an example usage scenario of the disclosed system. Phoebe has a 95% rate of fulfilling her purchase predictions in consumer electronics and has recently made a bunch of predictions about purchasing household appliances for which she does not yet have any track record. Therefore, her Profile is matched against other Arkiïs™ Profiles for individuals with similar demographics and who also have a similar rate of fulfilling their predictions in consumer electronics. These matching profiles are then used to predict her fulfillment rate in this new area of household appliances. The prediction weights the predictive factor from matching Profiles based upon how well those Profiles correspond to her own profile.
  • To assist in building a Profile that includes detailed and objective information, Arkiïs™ allows Consumers to link their Profiles as illustrated in FIG. 11 (User's Profile 1100) with data aggregators such as credit card companies (data collected by credit card and banking transactions 1170) and merchants (data collected by merchants 1190). Members may also enlist an expert (or a parent may act as an expert for their child) to build and automate the continued expansion of their Profile in order to optimize their payouts in return for a small portion of the gain. A User may enable the access to their Profile by such an expert who may access their Profile using login credentials unique to that expert but with proxy access to the User's profile so that the expert may make changes to the Profile as if they were the User but creating an audit trail that identifies the source of such changes as being the expert. These independent sources of information, together with other information such as personal and professional references, help to increase the accuracy of their score, leading to greater payouts. For example, Jim's credit card purchase history helps validate his ability to buy a new BMW® sports car that was also recently purchased by his close friend, Andy, both of these facts support the accuracy of the high score he received for buying the BMW® in the next two months.
  • Arkiïs™ may deduce which aspects of a User's Profile are not easily automatically built from collected data sources and occasionally prompt the User to fill in some of these details. For example, a large portion of a User's Profile may be automatically built from the details of their purchasing histories, but statistical analysis may show that purchase histories poorly correlates with a User's political preferences, therefore, a User may be asked to manually supply information about their political ideology such as illustrated in FIG. 11 data entered manually by User on web page 1120, data entered manually by User on telephone call prompt tree 1130, or data entered manually by User on mobile device app 1140. Similarly, purchase history may not correlate with a person's eye color, and thus a User may be asked to supply the color of their eyes. This allows Arkiïs™ to gather details of a User's Profile via periodic prompts over time to build up the Arkiïs™ Profile with greater depth. Such prompts may include simple questions with simple multiple-choice answers to allow easy responses from the User analogous to dating compatibility questions on OkCupid®. Depending upon answers supplied, subsequent questions may be adjusted to account for previous answers and follow on questions may drill down for more detail in areas of interest to advertisers based upon previously supplied answers (through use of, for example, filter or contingency questions) as demonstrated by those advertiser's search criteria and payout offers.
  • In some embodiments, advertisers may place a premium on targeting based upon more detailed information and thus pay more for ads delivered to Users with matching detailed Profiles. Arkiïs™ may recognize patterns in such ad requests (for example, through association rule learning algorithms including the Frequent Pattern-growth (FP-growth) algorithm and the Apriori algorithm, which highlight relations between variables in large databases), and project the added ad payout value a User might receive by providing certain types of information. Arkiïs™ may direct the User to supply those pieces of information for which the greatest value is estimated to be derived for them.
  • The following is an example usage scenario of the disclosed system. Sam is presented with an opportunity to expand his Profile with information on the home he owns and told by Arkiïs™ that by spending 15 minutes to fill out a survey about his home, he will likely increase his ad revenue by 20% over the next six months. Sam agrees and during the survey he indicates that he last replaced his hot water heater five years ago with a 50-gallon gas fired water heater and that he does not anticipate replacing it for another five years. He is then targeted with an ad asking if he realizes his current water heater is wasting approximately S200 per year and in 2.5 years, this new on-demand hot water heater could pay for itself, and over five years you would save 5500 compared to sticking with his current hot water heater plus get the benefit of not running out of hot water when multiple showers are being taken at once. The ad is so compelling—and fact checked by his trusted consumer household goods Reviewer who he shares part of his ad revenue with in return for unbiased fact checking on goods being marketed to him—that he decides to go ahead and replace his hot water heater today instead of waiting five years as he originally was planning.
  • A Marketing Performance Score (410) may also be used to predict the effect a particular ad will have on a Consumer's buying tendency for a specific Product and thus help determine how much an advertiser is willing to offer in an actualized bid (430) to present that ad to the Consumer's Content selector (208). For example, Arkiïs™ detects a pattern where individuals who highly rated a certain racing school ad and who also specified they were going to buy a luxury car in the next 12 months, became 15% more likely to buy a BMW after watching an ad including an offer for free racing school lessons with any BMW® purchase. This example broadens across groups of ads and or Content which together create synergies that may, in aggregate, increase or decrease a Consumer's buying tendencies towards a specific Product. For example, Arkiïs™ statistics may show that viewers are more likely to respond positively to a milk ad when preceded by an ad for chocolate chip cookies when followed by a cooking show featuring cupcakes. Unlike the FICO® credit score, the Consumer is allowed to see and dig into the complete calculation details to fully understand their score and how they can improve it by changing their future behavior.
  • The following scenario exemplifies how a Marketing Performance Score may be used within the disclosed system. Julia states in her Profile, by logging into her Arkiïs™ Profile online, using her computer, that she is 90% likely to buy her first new car, a sedan, for less than $35K in the next 3 to 6 months and to finance the purchase. This is called an Arkiïs™ Assertion. Her performance will be tracked by Arkiïs™ and used to influence her Consumer Marketing Performance Score generally, and weighted more heavily for other potential purchases related to her other pending Assertions with similar characteristics (e.g. purchase price magnitude, time horizon, or Product category) these types of projections. Given that she has no Arkiïs™ history but is confirmed to be a recent graduate of college (as demonstrated by her diploma supplied to Arkiïs™ or a school-validated transcript or her confirmed membership in the school's alumni SyncGroup or the school's Profile links with her Profile and Julia has sent an Arkiïs™ data release to the school and the school has provided her confirmed school records) and is also confirmed to have just started her first job earning $40K a year (as demonstrated by two recent paystubs supplied to Arkiïs), her Profile is statistically matched by the Arkiïs™ cloud servers against similar historical Consumers and found to be 63% likely to follow through on her Arkiïs™ commitment to purchase a car. Ford Motors decides to run a targeted advertising campaign to recent college graduates whose Arkiïs™ Profile transcript confirms they did well in math. The campaign is for their Fusion Energi in the hopes of building brand loyalty for future car purchases. Ford submits to the Arkiïs™ servers a request to deliver one of several customized ads to those Users who graduated from college within the last year, averaged B or better in their math curriculum or participated in classes or clubs that focus on protecting the environment, intend to buy a car in the next year, have a professed interest in the environment, and can afford the payments based upon a price of $500 above dealer invoice at $38K with a five year loan at 1%. Ford also provides Arkiïs™ a formula that calculates how much potential targeted viewers would be paid based upon their Profile contents. Profile criteria utilized include the projected likelihood of actually buying any car in each of the next twelve months as shown in FIG. 26. Julia's Profile matches and Arkiïs™ applies the formula to her Profile and computes a $5 offer, which she accepts. This car would be a bit out of her price range, but based upon her Profile's matching characteristics Ford offers the pre-negotiated price together with financing that would make it fit her budget. Additionally, since her Profile shows her favorite color is purple, the ad she receives is the variant that shows the car in its blue-purple exterior paint color. Four months later, Julia ends up purchasing a Prius and not the Fusion Energi, but because the Prius purchase matches her professed intention that she recorded, she builds positive history. This allows future advertisers to ascertain that her likelihood of following through on future purchase intentions based upon her past behavior now shows she is 87% likely to follow through on big-ticket items and thus now the ad she was previously paid $5 to view would now be worth 7 were the same scenario to repeat today.
  • All Content provided by Arkiïs™ may be Filtered based upon the application of Content preferences in a User's Profile. For example, if a person desires to exclude Content related to the sale of guns, they can ensure, through their Profile, that no gun advertising reaches them through Arkiïs. For Content that passes a User's Filtering preferences, it may then be graded as to how well the Content matches the User's Profile stated interests and desires. There are multiple dimensions upon which Content may be independently graded. Dimensions of grading may include how well the Content matches a User's point of view in: humor, emotion, politics, demographics, present physical location, present social context, projected travel path, and preferences, etc.
  • The Filtering and grading of Content may vary contextually (e.g., location, likely travel path, current or recent activity, or state of mind) by what a User has recently done by deduction from clues in the User's Profile together with mobile device data such as GPS, motion, accelerometer data, calendar data, etc. Depending on the embodiment, Filtering and grading may also vary by the User's emotional state (e.g. mood), recent activity, recent Content consumption, current news events, and whom they are SyncGrouped with. This may include their recent communication history culled from their caller ID log, Skyping, texting, etc. and the identity of communicating parties and the nature of those parties' typical interaction for the present context as captured in their Profile and the vocabulary, tone of voice, etc. in the communication (e.g., Sally's mood usually improves after communicating with her mom, for example, they shared a joke with each other and laughing could be detected in the communication.) Content might also be Filtered out at one time based on context, but not at another time, in a different context. Similarly, Content might be graded differently in different contexts.
  • The following example usage scenario describes how contextual clues can influence the Content delivered to a User. Carol has been using Siri on her iPhone® to dictate messages for the past year and has become comfortable with her words being recorded and sent into the cloud to be transcribed. Therefore, she has decided to allow Arkiïs™ to listen in on her smartphone's and/or smartwatch's microphone during phone calls and when she is not on the phone but comfortable being recorded (e.g. in public locations) for the purpose of better targeting her state of mind and has configured her Profile using her Arkiïs™ app on the smartphone to allow this or configured using the Facebook interface which is linked to her Arkiïs™ Profile. As she talks on the phone her recorded words are submitted to the Arkiïs™ cloud servers for transcription and tonal quality analysis to help deduce emotional state and this information is mined for clues as to what she is thinking and feeling. When Arkiïs™ is monitoring the audio of her phone it may use her phone's location in order to alert other Arkiïs™ Users whose Profile preferences request notice when they are within proximity of an Arkiïs™ enabled Device that is actively recording and thus their words could be recorded. Arkiïs™ servers combine this information with the context of to whom she is talking that is based in part upon matching up their phone number or other means of connection (e.g. Skype® handle) with her Profile information. Arkiïs™ discovers that Carol is talking to her mother and asking for advice about dating given an unpleasant date she was on the prior night, at Benihana's Steak House, where she ended up arguing with her date about women's rights and he left her with the bill and no ride home. From this information, Carol is subsequently targeted with an advertisement for OkCupid® dating site that focuses on philosophical compatibility. However, Benihana omits sending her a message, which, in the absence of her conversation with her mom, would otherwise have been inappropriately targeted toward her.
  • An advertiser may place a premium on sending a message when a User is in a particular location or is projected to soon be in a location interesting to the advertiser (e.g. near their store or near a competitor.) An advertiser may offer to provide, pay for, or subsidize a User's travel to their store. This may take the form of premium parking reservations, valet services, or subsidy and defraying transportation costs including fuel and public transportation fares. An advertiser may provide a shuttle bus to bring customers to and from their location and locate passengers by way of their Arkiïs™ Profiles by sending targeted ads that query whether the User would like a lift, and direct the User and a shuttle to efficiently meet by creating a SyncGroup led by the shuttle. An advertiser could coordinate with idle taxis for reduced-rate short shuttle rides also coordinated by the Arkiïs™ system. For mobile businesses such as a dog grooming service on wheels, Arkiïs™ can target ads to potential nearby customers providing offers on a limited first-come basis to fill in unbooked time and facilitate directing customers to the mobile business efficiently when, for example, parked outside an office building or on a public street.
  • The following is an example embodiment of the disclosed system. Juanita just completed exercising at the gym. Arkiïs™ was able to deduce this activity by observing that her phone's GPS showed her location at Planet Fitness and corroborated by connecting to the Wi-Fi at Planet Fitness while she was there and also identifying her pattern of repeatedly visiting this location on Tuesday and Thursday afternoons each week. Additionally, her Arkiïs-enabled smartwatch detected elevated heart levels consistent with a workout regimen for the past 45 minutes. Further, in her Profile, she indicated that she has a Planet Fitness membership and her smartphone's and/or smartwatch's accelerometer picked up a pattern of motion consistent with exercise for the past 45 minutes. Finally, Juanita has linked her Fitbit® account (where she records her workout) to her Arkiïs™ Profile. Together, these data points give the software running on the Arkiïs™ cloud servers a very high confidence level to the conclusion that she has just been exercising and is now on her way home from the Gym. Therefore, the cloud servers decide in conjunction with a Marketer that they will send Juanita a targeted advertisement when she is next projected to be on her way to the Gym and is in her car listening to a custom streaming audio feed from her smartphone that is fed by the Arkiïs™ cloud servers. The ad is to be for a competing Gym that would offer her a free personal training session in a small group workout using fitness trampolines if she comes then instead of going to her normal Gym. The closely targeted ad pays her three dollars since it is playing shortly before her next gym visit and offers her free valet parking at their entrance. Another commercial targets her on her way home from the Gym (as detected by her smartphone's location and movement monitored by her Yelp app that is connected to her Arkiïs™ Profile on the Arkiïs™ servers) and is for a new yogurt shop that just opened around the corner from the gym where she is now and that serves high-protein non-fat yogurt and offers her a full serving for free for coming by in the next fifteen minutes and trying it out in the hopes that she will make them a part of her gym ritual. They also offer her reserved on-street pre-paid parking within a one-minute walking distance of the entrance.
  • The Arkiïs™ system may utilize a certificate that indicates a prediction of how any given marketing message, Content, Product, or service matches an individual's (or SyncGroup's) Profile(s). FIG. 17a shows a variety of different Visualizations for the certificate that may be employed. Different areas of the Visualization represent different aspects of a person such as their predicted emotional or logical response to a message, or whether it relates more to their personal or family life. Color-coding also encapsulates aspects of the message's fit to one's Profile. Alternatively, the Visualization may be a two-dimensional or three-dimensional geometric shape, which may depend on the number of parameters a Consumer would like to view in conjunction with each marketing message—for example, a Consumer specifying six parameters could have a cube as a Visualization with each side a different color and representing a different aspect of the message's fit to the Consumer's Profile. If only five out of six aspects are fulfilled, the cube will appear to have one side missing, corresponding with the aspect that was not fulfilled. The Visualization may also be depicted as a DNA helix, with base pairs that are depicted in different colors corresponding with aspects of the message's fit to the Consumer's Profile. Connected base pairs may represent matching aspects, and unlinked base pairs may represent aspects that do not match. Other possible Visualizations include a pyramid with separate levels each representing an aspect, a star with each point representing an aspect of the message's fit to the Consumer's Profile, an emoticon or table of emoticons which are happy, sad, or neutral depending on whether or not marketing matches are predicted to match an individual's or SyncGroup's Profiles, etc. Alternatively, Consumers may choose certain aspects they would like an advertisement to match and pick percentages depicting how important each aspect is to them, with the sum of the percentages adding up to 100% (e.g. humor=25%, family values=10%, alcohol-free=5%, local company=20%, scientifically correct=20%, contains animals=2%, good videography=13%, NGO certified=5%). Consumers may vary their choices for how matching is determined and may create temporal, spatial, and social rules that automatically control such choices, for example, a User may desire funny messages in the evening and serious messages in the day or alcohol-free when at home or family values when in a SyncGroup with their partner/spouse. A horizontal bar may depict a user-defined threshold as a vertical line intersecting the bar, and the matching aspects may be depicted in different colors on the bar, with their percentages added up denoting whether an advertisement meets the matching threshold shown on the bar. A Consumer may specify in their Profile that certain aspects are absolute requirements and others are relative, for example, a User may require that a trusted NGO certifies that a Product is absolutely child-labor free but is willing to accept an environmental requirement that a Product is carbon-neutral relatively and thus accept messages about a non-carbon-neutral Product if the message pays them enough or has other mitigating characteristics such as being humorous enough. Visualizations may have features that only appear when a marketing message or Product matches with the Consumer completely, or matching is past a certain triggering threshold. For example, a star Visualization may light up, a pyramid may depict a beam of light coming out of its apex, colored beams of light may combine together into a white beam of light through a prism, an outline of a shape may be filled in, etc. Third-party add-ons to the Arkiïs™ system may allow the Visualization to be customized. The Visualization may also be utilized for providing Feedback on a marketing message. Once a message has been consumed, the Consumer may adjust the visualization to correct it to match their actual perception of the message's relation to their subjective preferences. For example, if a message was predicted to rate very funny for a User, but the User only found it somewhat funny then they could correct the Visualization to reflect their actual subjective feeling of how funny it was. Such Feedback may be used to refine the system's prediction of funniness of that message for other Users, and with stronger weight for those Users with similar tastes to the User, further, such Feedback may also be used by the system to learn and better predict the User's feelings for future messages in a manner similar to Netflix's movie prediction ratings. There are embodiments where the Visualization may be represented completely or in part by an audio depiction (e.g., an easily recognizable series of chords being played). The initial Visualization values may be predicted using a neural network based on Profiles of other Consumers that have already viewed and corrected their predicted Visualization to reflect their actual response and how those Consumers' Profiles relate to one's own Profile. FIG. 17b shows a sample certificate which takes the form of a Visualization derived from something like da Vinci's Vitruvian Man where the head, heart, hands, etc. may light up to depict a relative match level for logical thinking, feelings, skills, etc.
  • In the case of physical world Products, a User may scan the Product or a QR code in order for the Product to be identified to the Arkiïs system and a customized certificate retrieved for that product for a particular User. Such certificate may be viewed on a User's mobile device. Alternatively, a Product may have packaging or shelving that detects a User's presence by the proximity of their mobile device and retrieves the certificate for that User and displays such certificate on the Product packaging or shelving. Such packaging may be reusable and removed at the point of purchase for reuse.
  • Just as a User can choose to follow Reviewers, a User can choose alternate grading algorithm plug-ins. When a User configures their Profile to use an alternate grading algorithm plug-in, a portion of their earnings may be shared with the author(s) of the alternate grading system for the period that such system is employed.
  • The following example usage scenario describes how an alternate grading algorithm plug-in may be utilized within the Arkiïs™ system. Jerry learns that his friends, Joe and Mike, are working on a new Arkiïs™ plug-in that is specialized for sports fans. Jerry configures his Profile using his laptop and an Arkiïs™ web page in a browser to start using it to support his friends and because he is an avid sports fan of the Lakers. Once configured, the Arkiïs™ cloud servers update his streaming feed to utilize the plug-in and his digital on-screen graphic is updated to a basketball, hoop, and backboard to depict how well Content matches his Profile, with a swish indicating a perfect match. This algorithm weights his interests in sports, and particularly the Lakers more heavily than normal and utilizes the recommendations of famous sports figures. After using it for a week, Arkiïs™ servers have automatically shared 0.35 of his $12 in earnings that week with Joe and Mike.
  • The grade of Content may be visually represented using a standardized graphic that represents how well the Content matches a User's Profile overall and in various dimensions such as humor, logic, emotion, and politics. In group consumption (see Section 9—Sharing Targeted Advertising between Users) situations, the shared First Device may show the match for the group as a whole and each User's Alternate Device may show their individual match level. The Visualization may be shown on the screen like a digital on-screen graphic (i.e., off in one corner and semi-transparent, see wikipedia.org/wiki/Digital_on-screen_graphic). By default, the graphic may appear temporarily at the beginning of Content and then disappear after a short period, however, the User may configure this behavior or use their remote control to pull it up again or hide it in a particular instance. The grade of live Content may be provided on each User's Alternate Device.
  • In a preferred embodiment, the grading system uses an adaptive algorithm and statistical analysis to predict how well Content matches your interests and objectives. Additionally, a User may choose to follow the recommendations of other Users they trust. For example, a User may select likeminded humor critics in their Profile and only consume Content that has been previously reviewed by one of these critics that they trust and given a positive rating in the humor dimension. In return, the humor critic may get a small payout taken from the User's earnings for consumed Content that is selected based in part upon their recommendations and guidance.
  • FIG. 18 is an information flow diagram in an exemplary Content ranking, Filtering, and alerting system that can be used in conjunction with the technologies described herein.
  • In FIG. 18 Profile Information 1800 together with Contextual Information 1820 are applied to Content Meta Information 1810 (e.g. certifications, certifiers, reviews, reviewers, Product, etc.) in the Content Ranking/Filtering Engine 1830 to find the Highest Ranked Content 1840 for transmission to the User. A User's Profile Information 1800 may specify that the User will be alerted if Content surpasses certain thresholds (e.g. the payout amount for Content surpasses a certain threshold, or the humor rating of Content surpasses a certain threshold). If Content ranked by the Content Ranking/Filtering Engine 1830 surpasses any of these User-specified thresholds, a Threshold Alert Transmission 1850 will occur. Threshold Alert Transmission 1850 may involve sending an alert (e.g. audio, visual, haptic feedback, etc.) to the Device or Devices (e.g. smartphone, tablet, wearable computing device) of a User identified with Profile Information 1800.
  • Similar to the Arkiïs™ marketing score, a Goods & Services Provider may receive an Arkiïs™ Goods & Services Provider score to assess the likelihood of a User being satisfied with that Provider. The score combines the assessments of other Users with similar outlooks to the User and Reviewers they may have elected to trust. In some embodiments, assessments cover the truthfulness, interestingness, and funniness of the Provider's marketing messages. Assessments by those who actually purchased the goods or services being sold also determine the Goods & Services Provider's effectiveness in meeting the marketing message put forth. A User's Profile may include prohibitions that block targeting from Goods & Services Providers that do not meet various metrics of their choosing such as, for example, requiring that at least 80% of their customers are satisfied with their purchases. Thus, the integrity rating of Users increases the economic efficiencies by increasing the likelihood of honest interactions.
  • 7. Alternate Device Synchronization
  • To optimize the coordination of an Alternate Device (e.g., a smartphone delivering Targeted Content) with a First Device (e.g., television), the Alternate Device application/platform may be synchronized with the Content being delivered on the First Device by configuration of the exact channel or station source being consumed (e.g., being watched or listened to) on the First Device. This may be done heuristically by gathering contextual information along with hints previously provided by the Alternate Device User in their Profile and presently, specifically about what they are consuming to deduce the likely channel source and Content being consumed along with alternative matches that are ranked by their likelihood. The Alternate Device User may confirm or correct the proposed match as required, potentially providing more information resulting in a new set of ranked results.
  • The following table (Table 1) enumerates contextual information that may be used by the heuristics to identify the Content Provider (e.g., Cox or Dish Network) and Premium Content channel, i.e., Content source, (e.g., Monday Night Football on FOX broadcast channel 2, House Hunters on Comcast HGTV, or The Big Bang Theory on CBS broadcast channel 5):
  • TABLE 1
    Metric Content Provider Content Source
    Mobile device location Yes No
    information gathered from
    GPS, cell towers, and Wi-
    Fi networks detected by
    the mobile device.
    The present time and date No Yes
    Using the microphone of Yes Yes
    the mobile device to listen (using
    to the audio portion of commercial
    the Premium Content being audio)
    delivered on the First
    Device and submitting
    this to the cloud to
    identify the Content
    being delivered. (This
    is akin to the Shazam
    mobile application that
    identifies a song from
    brief clips gathered by a
    mobile device.)
    Using the video camera Yes Yes
    in the mobile device to (using (also using
    watch (and listen as commercial digital
    above) the video portion video) on-screen
    of the Premium Content graphic to
    being delivered on the identify
    First Device and Content
    submitting this to the Provider)
    cloud to identify the
    Content being delivered.
    (This is an extension
    of the Shazam idea, but
    applied to video instead
    of audio.)
    Arkiïs ™ Profile Yes No
    information about
    Content Providers to
    which User subscribes.
    (e.g., Comcast and
    Netflix)
    Arkiïs ™ Profile No Yes
    information about
    Content preferences.
    (e.g., favorite football
    team is the San Francisco
    49ers)
    Arkiïs ™ Profile Yes Yes
    information about
    friends and family
    Arkiïs ™ historical Yes Yes
    consumption patterns
    Hints provided by User No Yes
    on their mobile device.
    (e.g., “I'm watching
    football.”)
  • In a preferred embodiment, this Alternate Device synchronization may be configured to assist in automating the building of a User's Profile. Once Arkiïs™ is aware of Content being consumed on a Device that is not integrated with the Arkiïs™ system or when consuming Content on an Arkiïs™ integrated Device or from a Device reproducing a feed from an Arkiïs™ coordinated source, a User's Profile can be expanded to include the history of Content being consumed. This Profile history can facilitate the addition of features such as the seamless ability to begin consuming Content on one Device and completing it on another Device. This may be accomplished by tracking the Content time position (i.e. playback location) a User has reached or in the case of live Content the absolute time at which playback was interrupted. The Content position may be easily known when fed from an Arkiïs™ source or when consuming from a non-Arkiïs™ source the position may be known by the Arkiïs™ servers also monitoring the same non-Arkiïs™ source in the cloud to identify a relative position within a feed. While consuming from a First Device, which is not Arkiïs™ enabled, a User's Alternate Device, which is Arkiïs™ enabled, can follow the First Device by monitoring its audio and video feeds in a Shazam-like fashion. In this way, a User's Alternate Device can detect the Content time position at which they separate from the First Device or the First Device ceases to transmit a particular feed and this position may be recorded in their Profile relative to the Content whose receipt was suspended. This position timestamp may be associated with a corresponding point in the Content independently monitored by the Arkiïs™ cloud servers and thus allow subsequent DVR like resumption from their suspended position on a different Arkiïs-enabled Device. The Arkiïs™ cloud servers may coordinate alternate distribution feeds of the same Content and allow Users to seamlessly switch between feeds (e.g. begin watching a sporting event on a radio and switch part way through to a television or a smartphone.) This coordination across Devices applies to all forms of Content including Premium Content and Targeted Marketing Content.
  • The following is an example usage scenario that illustrates one way in which the technology described herein can be implemented. Helen is visiting her daughter, Jennifer, in her new, sparsely decorated apartment. They both decide to watch an episode of House Hunters that is just now airing. Both of them are Arkiïs™ Participants, and because Helen is in close Physical Proximity to Jennifer, their Alternate Devices offer to hook up into a SyncGroup (see Section 9—Sharing Targeted Advertising between Users) for group coordinated shared consumption. (Their computers, smartphones, smartwatches, or other wearable computing devices that are Arkiïs™ enabled hook up due to Physical Proximity detected by one or more of the following means: using Bump Technologies—like technology, using GPS, using Wi-Fi router location triangulation technology, or using direct communication via Bluetooth, Wi-Fi, Near-Field Communication, and/or infrared communication (IR), etc. An Arkiïs-enabled Device is one that includes software that communicates with the Arkiïs™ cloud and/or other Arkiïs-enabled Devices through the installation of an app, firmware update, factory-supplied Arkiïs™ chip or ROM, SIM-like card, and/or add-on hardware device like the Square™ mobile credit card reader that attaches to the host device to make it Arkiïs-enabled.) Helen is using her computer as her Alternate Device and receives a pop-up dialog, email, text message, instant message, and/or other means of notification indicating that she may wish to join into a SyncGroup with Jennifer. She follows the link provided in the notification to an Arkiïs™ dialog or replies to the notification to accept the SyncGroup. Because she shares several key demographics (e.g. they shared the same old address in their Profiles for a long period when Jennifer was a child), Arkiïs™ strongly suspects that Helen and Jennifer are mother and daughter or at least close friends. Helen is queried as to whether Jennifer is indeed her daughter, which she confirms. Jennifer turns to her phone after her mom has accepted and sees that her phone is now asking for confirmation to join into a SyncGroup with her mom, which she accepts. Because they are now linked up and are in Jennifer's apartment, the Arkiïs™ server gathers the contextual information that Jennifer has in her Profile that she receives her Content from Cablevision. Helen speaks into her Alternate Device, “We are watching House Hunters.” This is recorded and submitted to the Arkiïs™ cloud which processes Helen's speech in a Siri-like fashion to understand (possibly combined with lip-reading technology for improved accuracy) what she said and combine this hint together with their viewing location to deduce that House Hunters is being viewed through Cablevision. It sees that only the HGTV channel is presently broadcasting an episode of House Hunters, but it detects that Helen has already seen this episode and instead sends back a suggestion to both Helen and Jennifer to watch a different episode that neither has seen before (as indicated by their Profiles) and may be shown on demand using Jennifer's personal Arkiïs™ Roku™ channel Jennifer accepts on her Alternate Device and her Device automatically sends IR and RF codes to her First Device to change the Device source to her personal Arkiïs™ channel. The First Device queries via Roku™ how they wish to consume this episode with several on-screen choices including paying for it to be ad-free and watching sufficient commercials to pay for it up front. They decide to watch their ads up front and Jennifer scrolls through these choices using her smartphone Arkiïs™ app and selects their choice on the First Device. They are given a single 30 second Targeted Marketing Content advertisement for a local consignment furniture store that has several couches in stock since Jennifer's Profile indicates she is actively looking to buy a couch and it sees that her mother has already purchased some furnishings for Jennifer since she has moved in. It further offers her a 10% discount coupon if they come by the store today together. This one targeted spot covers the cost of viewing the whole House Hunters episode without any further commercials. After House Hunters, they decide to earn some cash and select their next most valuable commercial, which in this case is not the same ad. Consequently, the First Device feed from Roku™ splits the screen in half and delivers the video to each of them simultaneously, while providing their individual audio via their smartphone's Bluetooth headset or by listening to the smartphone that delivers their audio portion. To synchronize the audio and video being delivered on separate Devices, the smartphone or other Alternate Device may accept the audio directly from the Roku™ box or other DVR-like device feeding their First Device. Alternatively, the audio may be sourced from the cloud or a cellular network and buffered on the audio device and the audio and video are then synchronized by direct communication between the local video device and the audio device by way of Wi-Fi, Bluetooth, or other local low-latency communication up front and periodically during message delivery. The audio on the Alternate Device may need to be buffered further ahead in time if it is downloading more slowly than the video on the First Device to ensure that by the end of the message the audio is completely downloaded. Alternatively, to ensure uninterrupted message delivery, both audio and video may need to be fully downloaded before the message begins and the two signals are synchronized.
  • As another heuristic approach (e.g., in combination with other heuristic approaches), the User can specify identifying information for the Content currently being consumed (e.g., Content Provider such as a television network, cable network, radio station, streaming Internet provider, etc. and/or Content identifier information such as a broadcast or cable channel number, program name, time and date, geographical location, etc.). For example, if the User is consuming particular Content (e.g., a specific television show, movie, or another type of programming Content), then the User could select a channel (e.g., a specific broadcast channel, cable channel, etc.), network (e.g., cable network, traditional broadcast network, etc.), Provider (e.g., a specific cable or satellite provider, a specific Internet streaming provider, or another type of Provider), day and time (e.g., the particular day and/or time that the Content begins), and/or location (e.g., whether the User is watching at home, at a sports bar, or at another location). As an example, if the User is watching Monday Night Football, the User could select a channel (e.g., channel 500), a network (e.g., ESPN), a provider (e.g., Comcast cable), and a time (e.g., 6:00 PM PDT).
  • 8. Coordination Between Devices
  • The Arkiïs™ User may consume a spectrum of alternative Content ranging from Premium Content that they must pay to consume to high value, focused, Targeted Marketing Content that may earn them money when consumed. See FIG. 8.
  • Various technologies exist today to automatically detect the transition to and from commercial Content in a live Content feed. For example, a black screen is sometime inserted, or a change in the Content volume can be detected, or a large change in scenery. To date, broadcasters have not wished to facilitate such detection since it works against their advertising interests when it is coupled with DVR ad-skipping technology such as Dish Network's Ad Hopper.
  • However, with the revenue sharing possibilities of Arkiïs, this dynamic is changed and broadcasters can benefit from such ad detection in their feeds. Arkiïs™ may create a standard for broadcasters to follow to indicate the beginning and end of commercial breaks along with dynamic predictions of when a commercial break will end for live broadcasts. These may be encoded in the broadcast signal such that they are not readily apparent to the Consumer. Strategies for encoding could include adding steganographic (hidden message) information to the following portions of the signal:
      • Digital video feed
      • Closed captioning feed
      • Digital audio feed
      • Guide Plus+ feed
      • Radio Data System (RDS)
      • Vertical Blanking Interval (VBI) lines
  • Alternatively, broadcasters may provide a direct confidential feed to Arkiïs™ through the cloud to help ensure only those who will compensate the broadcaster for skipped commercials use the information. This feed may be shared with Arkiïs™ Users such as on their smartphones that may give an estimated countdown to when Premium Content will return.
  • The following example shows how the detection of commercial Content can aid in choosing the best targeted advertisements to show to a user: Peter is a Lakers fan and is watching a Lakers game against Miami Heat from his home. With 30 seconds to go in the game and a score of 110 to 109, Miami calls a time-out with possession of the ball. ABC goes to commercial break during the time-out and transmits an initial estimate of 3 minutes duration or Arkiïs™ computes their own estimate based upon statistical analysis for time-outs in similar basketball game scenarios. Peter begins watching a targeted two-minute commercial. ABC continues to broadcast a 3-minute duration, so at the end of that commercial, Peter is served up a one-minute commercial, however, fifteen seconds into his commercial, ABC changes their estimate to be 2.5 minutes based upon Miami's players returning to the court. Peter's Profile indicates he only wants to view basketball games live and is not willing to view a feed lagging even by a few seconds since he often gets on the phone with rival friends that are Miami fans and wishes to be synced up with their viewing. Therefore, upon ABC's notification, he gets a popup graphic superimposed over the commercial indicating the game is about to return and when the referee is about to put the ball in play and broadcast returns, Peter's second advertisement is truncated mid-stream in order to return to the live TV feed without missing any action. At the next commercial break, Peter's targeted feed returns to the truncated second advertisement he was watching before and resumes play at the last entry/rewind point (these are encoded in the commercial by the producer) that precedes where he broke out at the end of the last commercial break.
  • Another alternative to consuming targeted advertising made possible by the Arkiïs™ system is a simple countdown clock, reproduced on either the Alternate Device (e.g., mobile device) or First Device, to indicate the estimated time till the end of the commercial break and the resumption of Premium Content. Such a clock would also include an audio component alarm to audibly alert to when the commercial is nearly finished. The end of the countdown may be estimated through statistical sampling and Shazam-like recognition (through comparing spectrograms and/or other acoustic fingerprints) of individual advertisements so that knowledge of how long particular advertisements run may be used. The countdown time may change as the estimate changes and the User may be alerted to substantial changes to the estimate. The broadcaster may coordinate with Arkiïs™ to provide detailed projections and alerts to make the countdown estimates more accurate.
  • The following scenario exemplifies the utility of implementing a countdown clock within the Arkiïs™ system. Andrea is watching American Idol and is taking a break during the commercials and pauses her alternate Targeted Marketing Content as the Primary Content goes to commercial and her targeted advertising is about to begin. Both the television (First Device) and her smartphone (Alternate Device) count down the dynamically changing estimate of time remaining until the commercials end and the Premium Content resumes by retrieving this evolving estimate from the Arkiïs™ cloud servers. This includes an audio alert at count down intervals beginning at 90 seconds (one beep), 45 seconds (two beeps), and 15 seconds (three beeps) to give Andrea the ability to leave the room but retain awareness of when the commercial break will most likely end.
  • In some implementations, information identifying Content currently being consumed can be provided by a User's mobile device as illustrated in FIG. 19 Alternate Device 1920 providing local coordination and control 1970 of First Device 1910. For example, the User's Alternate Device 1920 (e.g. a mobile device) can function as a remote control for a First Device 1910 (e.g., a television). When the User selects specific Content to reproduce on the First Device 1910 (e.g., selects a specific broadcast channel or cable channel), then the mobile device can provide identifying information (e.g., channel, network, location, day and time, etc.). For example, the mobile device 1920 can run an application that provides the identifying information to a targeted advertising system 1960 so that the targeted advertising system (servers 1960) can provide targeted advertisements to the User at the time generic advertisements are presented on the First Device 1910. In some implementations, the application on the user's mobile device 1920 can perform other functions. For example, the application can mute (local coordination and control 1970) the First Device 1910 while targeted advertisements are consumed by the User on the mobile device 1920 (e.g., so that the User is not interrupted by a generic advertisement being played on the First Device 1910). The application can also pause 1970 a DVR 1910 if a targeted advertisement is being played on the mobile device 1920 and if the targeted advertisement runs longer than a corresponding generic advertisement on the First Device 1910, then the application can resume playback 1970 on the First Device 1910 when the targeted advertisement is over (e.g., by resuming playback 1970 at the beginning of the Content 1930 that the User 1940 was consuming) If the targeted advertisement runs longer, then the application may choose a shorter targeted commercial to compensate in the next commercial break (e.g., by selecting a shorter targeted advertisement(s) such that they do not run longer than the corresponding generic advertisement(s)).
  • As illustrated in FIG. 19, an Alternate Device 1920 (e.g., smartphone), after synchronization 1970 with the First Device 1910 previously described above, can help orchestrate 1970 the behavior of the First Device 1910 by acting as a remote control 1970 and sending infrared (IR) or Radio Frequency (RF) commands to the First Device 1910, to 1970 mute and unmute or change channels to alternate (possibly targeted) Premium Content 1930, or to a specialized Roku™ channel that contains the targeted advertising 1930 for an individual Arkiïs™ Consumer 1940. Additionally, in embodiments where the User 1940 provides Feedback 1950 using their Alternate Device 1951 (instead of providing Feedback 1950 using their First Device 1952) while consuming the targeted advertising using the First Device 1910, targeted advertising can be paused 1970 before and resumed 1970 after such Feedback is provided as directed by the Alternate Device 1920. Alternatively, the synchronization 1970 of an Alternate Device 1920 may proceed before the First Device 1910 is tuned to the desired Content 1930, wherein the Alternate Device 1920 performs a search given a description of the desired Content 1930, and after synchronization 1970 the Alternate Device 1920 may act as a remote control for the First Device 1910 including the option to power it on, select an input source, select a Content channel, and/or adjust the audio levels 1970.
  • In some embodiments, a User may temporarily enter a do-not-disturb period within which they will not be presented with ads. The period may be recurring on a schedule or occur in response to a one-time request. The period may only apply to a particular medium such as television or radio. The do-not-disturb periods may have configurable limits or controls that allow time-sensitive or high priority messages to still be presented. The period may be tied to an event such as the duration of a sports event. The filtering may also be tied to a genre such as no food commercials allowed after 7 pm. In general, the User has complete control over when and what and how advertisements are presented to them.
  • An Arkiïs™ User may configure alerts in their Profile to send a notification to their mobile device which is in signal communication with the Arkiïs™ servers, for example, to cause it to vibrate when a high paying ad is about to be served to a shared First Device that they are SyncGrouped with. Advertisers may wish to send a message during a sporting event when a team has an exciting scoring event to build upon the elation felt by the scoring team's supporters and to deliver a message for which they will be more receptive at that moment and thus would be willing to bid a higher price to reach a targeted audience at that moment. In addition to contextual First Device data, the system may also consider data from voice recognition, facially-based or vocally-based mood recognition, heart rate based on wearable computing devices, accelerometer data, and/or text messages to identify situations during which an advertiser would send a message regarding a temporarily increased payout for consuming or responding to an advertisement. An advertiser's matching criteria and payout formula for their message may contain certain inputs which take advantageous situations for message delivery into account, setting up increased payout in advance.
  • An embodiment of the system exemplifying targeted advertising alerts is as follows: Joseph is a Pittsburgh Steelers fan, as shown in his Arkiïs™ Profile, and he is in a sports bar watching one of their games. With 50 seconds left on the clock, the Steelers have just scored a dramatic touchdown to take the lead. Their opponents have just called a time-out and a commercial message is now ready to be served up. Corvette wants to target Joseph for an ad for their new model year car and offers him $5 to view and respond to their ad at that moment given his elated state as confirmed by his Arkiïs™ enabled smartwatch's detection of an elevated heart rate. His mobile device's Arkiïs™ app causes his phone to vibrate three times to alert him, 15 seconds before the ad airs, that a high paying ad is about to come his way. He pulls out his smartphone and sees the alert that he will earn $5, which just adds to his good mood from the recent score, and he turns his attention to the screen. The ad is displayed and, at the end, he returns his attention to his phone to answer a few short questions in the Arkiïs™ app that are supplied by the Arkiïs™ cloud to confirm he viewed the ad and provide Feedback that takes around 45 seconds and satisfies the payout requirements and he receives his $5.
  • Similarly to alerts about high paying advertising, when consuming Content on Devices owned or controlled by someone else, in the case that forthcoming Content would violate your Profile requirements, you may get an alert on your phone giving you the chance to separate yourself from the Device before the offending Content is served up. An alert may be in the form of, for example, one or more of: an audible alert through a Device's speakers, light emitted from a Device's screen or camera flash, and vibration.
  • Another kind of advertising alert is for a Product going on sale in which you have previously expressed an interest. For example, Amazon® could have a Lightning Sale for the next fifteen minutes on a laptop you are considering buying as part of your Assertion to purchase a laptop in the next month. Your smartwatch could vibrate and direct you to check your email for the limited-time special offer from Amazon® that additionally includes a coupon for free two-day shipping.
  • 9. Sharing Targeted Advertising Between Users
  • Group consumption is best at locations where there is Targeted Content Delivery to First Device to enable shared consumption of targeted advertising.
  • Arkiïs™ Users combine together into a SyncGroup when they join together in a group to collectively share consumption of Content, communicate with other group members, and/or network with other like-minded Users. A SyncGroup may be formed from members that are in Physical Proximity to each other or alternatively that are in Virtual Proximity to each other or a combination of both. An example of a SyncGroup formed due to Virtual Proximity is Arkiïs™ fortuitously noting that your friend or group of friends is also about to watch the same show that you are about to watch. You would be asked, through a visual, audio, and/or tactile notification on any of your Devices, whether you would like to join up with them to watch the show together in a SyncGroup. Automatic SyncGroup creation with certain Users watching the same show may also be enabled in a User's Arkiïs™ preferences. Virtual Proximity may also include Users with a Physical Proximity to each other. Virtual and/or Physical Proximity may come and go but a User may elect to remain in a SyncGroup. Alternatively, a User may return to a previous SyncGroup they were in that has a persistent Profile even though they may not presently be in Virtual and/or Physical Proximity with other members.
  • Members of a SyncGroup may elect to integrate one or more communication technologies into their group including telephony, video conferencing, text messaging, instant messaging, Skyping, Twitter, Instagram, Facebook posting (e.g. wall posts), etc. depending on the embodiment. Each member may configure, using their Arkiïs™ app on their smartphone, how they wish to receive and send their communications. For shared displays, they may agree to configure the sending and receiving of communications for members using a particular shared display to be via the shared display. While in a group, members may be able to send messages only to specific individuals of the group instead of to the whole group. Third parties such as Twitter, Facebook, and Skype® may choose to provide integrated Arkiïs™ functionality with their Products and directly communicate with the Arkiïs™ cloud servers to notify them of messages sent by other members of SyncGroups. In an alternate embodiment, Users may provide their login credentials for third parties and allow Arkiïs™ to log into their third party accounts from the cloud to receive message notification. For example, in some embodiments Users may send text messages to a special number associated with their SyncGroup and have those messages appear to each User, such as by a quote bubble appearing superimposed over the Content they are sharing along with an attribution. Such messages may be omitted from the display being used by the sender to receive group messages. Members may receive their messages on either one or more first Device(s) or their one or more Alternate Device(s). Messages may be integrated into Content feeds by the Arkiïs™ cloud servers or overlaid on top of Content by display and Content feed devices or presented on an Alternate Device that may not be receiving the Primary Content feed. Another type of message is survey/voting results, which may also be integrated into or overlaid upon Content feeds. SyncGroup members may configure their viewing to display survey results for Arkiïs™ surveys or for surveys in third-party applications like Twitter and Facebook. These surveys may provide real-time Feedback as to what Consumers are thinking regarding a show as it unfolds. For example, in TV shows, such surveys may indicate what viewers think should or is likely to happen next. Depending on the embodiment, survey results may be configured to display individual responses, SyncGroup average responses, total audience average responses, and/or etc. Such displays of survey results may compare and contrast results across different groupings (e.g. males vs. females or SyncGroup members vs. total audience.)
  • The following example usage scenario describes the use of SyncGroups within the Arkiïs™ system. After graduating from high school, Ashley, Lisa, and Julie have each gone off to different colleges but wish to maintain their friendship. On Wednesdays, they get together in a virtual SyncGroup to view new episodes of their favorite show, Arrested Development. They join up each week and share synchronized viewing of the episodes along with a shared 60-second commercial for the group to pay for their viewing. During the show, they use their smartphones to video chat with each other and talk about the show as it unfolds as if they were in the same room together. Ashley's new friend Jennifer has joined the SyncGroup and is physically present with Ashley. By default, the SyncGroup advertising would be skewed toward Jennifer because she spends ten times as much as the other girls. However, in this SyncGroup Jennifer has configured a separate incognito Sub Profile to represent herself that does not make her stick out relative to her new friends. Without this, the SyncGroup Targeted Marketing Content would be skewed toward her and her proclivity for Coach Products. Instead, the Profile she has adopted for this SyncGroup makes her appear more in line with the norms of her age group and thus with her new friends. Because she is using this alternate Profile, her addition to the SyncGroup has not disrupted the Targeted Marketing Content they would get without her added presence. Because the viewers are in different time zones, the SyncGroup naturally avoids targeted ads that payout more during dinnertime hours. This is because their selection would only payout well for Lisa, who is on the East Coast, since it is only dinnertime for her each week when they view whereas it is well before normal dinnertime for Julie in Mountain Time and Ashley and Jennifer in Pacific Time.
  • Arkiïs™ Users in SyncGroups may elect to maintain a group Profile. For example, an Arkiïs™ User may join together with their spouse to create a persistent or ongoing SyncGroup Profile to share information, such as future intents, spending, and income between their two Individual User Profiles. Their SyncGroup Profile enables joint marketing that may target both of them together as decision makers, such as for purchasing a car.
  • FIG. 20 shows the general steps and factors in creating and updating a SyncGroup Profile. A SyncGroup Profile may be limited by the Profiles of the members of that SyncGroup. For example, a User may prohibit the creation of a SyncGroup Profile for a SyncGroup they are a member of without their consent. SyncGroup Profiles may be configured to allow more or less control over the changes made to that SyncGroup's Profile. In some embodiments, a SyncGroup may allow any member to edit its Profile, or may only allow a subset of its members to edit its Profile. The same processes that are used by organizations such as described in the book Democratic Rules of Order by Fred Francis and Peg Francis, available from Cool Heads Publishing, Merville BC, Canada (democraticrules.com), may govern a SyncGroup. In alternate embodiments, a SyncGroup Profile may require a majority to approve proposed changes before they take effect or may require some other plurality of Users agree. In other embodiments, a SyncGroup may allow any member to veto proposed changes. A SyncGroup's rules, constitution, and/or preferences may be visible to the public or only visible to members, based on preferences agreed upon by the SyncGroup members. A User's Profile may specify a default authorization for SyncGroups they join and newly created SyncGroups may default to the most stringent authorization of any of its members. In some preferred embodiments, a SyncGroup's authorization may change from its initial setting by some form of mutual consent, some of which consent may be offered by default for some members based upon preferences in their own Profile. Mutual consent may take the form of, for example, on-screen electronic display and acceptance, text message query and reply of consent, or voice recognition and/or lip-reading of an affirmation of consent presented verbally or gesture recognition such as nodding the head in agreement, shaking the head to signify no, or giving a thumbs up or down signal.
  • SyncGroups may have a designated member who is the group leader. The group leader may be the only group member whose identity is shared with other group members. With the consent of another group member, the leader may pass their leadership role to the consenting other member. The group leader may serve to indicate the group's location and may serve as a beacon to bring the other group members together. A Product Champion may create a SyncGroup where they are the leader. In some embodiments, when a SyncGroup has a leader, the group's identity follows the leader when one or more members including the leader leave the group, perhaps to form a new group.
  • FIG. 21 is an exemplary SyncGroup Profile creation and notification system that can be used in conjunction with the technologies described herein.
  • In FIG. 21 User Profiles 2100, 2101, . . . , 2109 are combined together to Create SyncGroup Profile 2110. Upon Profile Edit 2120 of SyncGroup Profile 2110, Notify Participants 2130 occurs via Email 2140, Text Message 2141, Phone Call 2142, . . . , App Alert 2149.
  • A SyncGroup may be formed intentionally by a group, or grown by spontaneously searching for friends (or compatible Users) that are presently available to join a new virtual group. In some embodiments, a User inviting another User to connect their Profiles as being friends in the Arkiïs™ system identifies them as being friends to the Arkiïs™ system. Additionally, linking ones Profile with other online social networks including Facebook, Google®+, Twitter, and LinkedIn may identify friends or potential friends to the Arkiïs™ system by those friends having also linked their Profiles to their social network accounts. Another method of identifying friends involves importing contacts from linked email accounts or smartphone contact lists. In some embodiments, friends may also be suggested by pattern matching of names and demographic information to suggest matches in the Arkiïs™ system that are likely to correspond to real world friendships. Friends may be suggested based upon shared values, ethics, politics, religious beliefs, tastes, preferences, common friends, purchases, or other possible links to each other. Friends may also be suggested based upon shared relationships such as confirmed friends held in common, common interests, locales, and/or employers. In some embodiments, invitations to become Arkiïs™ friends may require demonstration of an actual connection such as by answering questions about a member or providing identifying information such as email address, telephone number, or physical address. Demonstration may also include uploading photographs or audio samples of a friend that the system can confirm matches the identity of the target friend. In other embodiments, to prevent advertisers or other Users from adding Profiles they do not personally know to glean information from Users, Users may set their discoverability settings to require a one-time passcode (given to the User searching for their friend by the User being found) or require the use of NFC, Infrared communication, etc. so that Users must be in Physical Proximity to become friends on Arkiïs.
  • A friendship connection within the Arkiïs™ system can be used for advertising purposes, e.g. by predicting a User's desires based on those of their friends. For example, if five of a User's friends buy fishing gear, the User may receive advertisements for fishing gear that may list the friends who recently bought fishing gear, so that the User can join their friends. However, in a preferred embodiment, friendship connections can only be used for advertising purposes if both Users agree that the connection can be used for advertising purposes.
  • A User may also seek to create a SyncGroup of like-minded individuals by using Arkiïs' ® targeting capabilities to reach out to other Users that have a high likelihood of sharing their interest and a desire to join together for support and communication. Each User may configure in their Profile the discoverability of their interests by other Users for this purpose. Configuration choices include, private (not discoverable by anyone unless explicitly shared), selected friends or groups of friends, all friends, 2nd level connections (friends of friends), 3rd level connections, or everyone. Other configuration choices include matching criteria, such as only by women, or only by those that have a particular interest or trait. A User may change their discoverability preferences for a Sub Profile or subset of information individually, without affecting discoverability preferences for the rest of their information.
  • In a preferred embodiment, Arkiïs™ may be used as a platform to aggregate multiple social media feeds, expanding a User's Profile and, thus, increasing their relevance to advertisers while the User browses social media in a streamlined and convenient fashion. The configurability of Arkiïs™ allows a User to fine-tune their feed by limiting the friends and followed accounts whose Content is imported into Arkiïs. Furthermore, a User may choose settings to filter out Content from their feed, for example Content including inappropriate language or external hyperlinks. In some embodiments, a User may post directly from the Arkiïs™ social media feed. A User can choose which linked social media accounts to post to from Arkiïs™ for each post, as well as fine-tune privacy settings for each post. Feeds may be imported and posts may be exported using Open API (i.e. public API) technology.
  • A User may utilize Arkiïs' discoverability preferences (e.g. selected friends or groups of friends, all friends, 2nd level connections (friends of friends), 3rd level connections, or everyone) to utilize their connections on Arkiïs™ or on social media accounts for networking, advertising, and contributing to causes they find important. As shown in FIG. 13 at 1302, 1304, 1306, 1308, a User may obtain potential friends and/or connections from a variety of sources. As seen at 1310, A User may specify in their settings that they want to be notified of how many friends, groups of friends, or other Users using Arkiïs™ are within a certain radius (e.g. ten miles) at any given time. This notification may be automatic or in response to a query by the User. The User can notify these friends in close proximity to join them at a location at which the User is currently present, or will be present at a certain time in the near future (1310). A Goods & Services Provider may be notified that a User is inviting friends to their property, either automatically or through an alert sent by the User, and may offer the User a portion of the profits from any resulting sales and/or donate a certain percentage of the profit to a charity of the User's choice and/or offer the User and his or her friends coupons through Arkiïs™ (1314, 1316).
  • The following example embodiment shows how Arkiïs™ can be used to connect with friends and find nearby friends. Since it is Friday, Chloe has decided to take half the day off from work and visit her favorite snow ice café, Arctic Fluff, after lunch. She drives to the complex where the café is located, arriving at around 1, and orders a turkey and avocado sandwich from the restaurant next door. As she waits for her meal, she decides she wouldn't mind some company for dessert and checks Arkiïs™ on her smartphone to see if any of her coworkers, college friends, and close friends are in the area. She has already created these groups, so she selects checkboxes to search for nearby Arkiïs™ Users within these three groups, and drags a slider to limit her search to anyone within a 10-mile radius. Chloe is surprised to see that she has 46 connections within this radius who allow friends to view their location. On the same page, she searches for Arctic Fluff to see if they have an Arkiïs™ Profile, and finds that they do indeed have one. After selecting Arctic Fluff as a message recipient on the same search page, she sends an anonymous message to the owners stipulating that she will invite all 46 connections to their café within the hour if 10% of all proceeds are donated to the Women's Global Empowerment Fund, a charity she supports monthly which aids women in northern Uganda through education programs and microfinance loans. The owners agree to these conditions and Chloe sends an invitation for all 46 nearby connections to meet at Arctic Fluff at 2, along with a picture she has taken of her favorite snow ice: half strawberry and half mango with strawberries, mangoes, yogurt chips, and strawberry drizzle on top. The owners send to Arkiïs, a coupon for 15% off a medium or large snow ice with a valid Arkiïs™ cash identifier that is distributed to Chloe and the friends she has invited. Seventeen of Chloe's friends show up; by using their Arkiïs™ cash identifiers, they receive 15% off their snow ices and $13.60 is donated to the Women's Global Empowerment Fund. By the time Chloe and her friends have finished their dessert and their conversation, it is already 4:30. Chloe plans on attending happy hour at a dive bar a few miles away and wants to see as many friends as possible, so she changes her Arkiïs™ settings to automatically notify her every 30 minutes of how many friends are within a 5-mile radius.
  • In some preferred embodiments, advertisers may create fun games that promote their Products through competitive play amongst friends and also provide some form of compensation such as game winner prizes or Profile Badges that are visible to friends. For example, a company may have a new Product they are rolling out to the market and offer a game around the new Product that allows friends to compete where the winner gets a free Product sample. Games can be audio, video, tactile, and/or movement (accelerometer) based. During the evening commute, co-workers could play a friendly audio game as they wait in rush hour traffic. Arkiïs™ provides the infrastructure to link together the friends into a game SyncGroup where they can see each other's progress and relative standing. In some embodiments, the game may include linking the group together in real-time for live audio or video so that they can compete directly against each other and see and/or hear each other.
  • The following example embodiment of the system describes group gameplay through Arkiïs. Nancy, Betty, and Kris are friends driving in a car together on their way to the beach. Nancy is driving her own car where she is streaming her virtual Arkiïs™ station from her smartphone that is connected to the car's entertainment system. All three have their smartphones with them and because they have already linked their Profiles as friends on Arkiïs, they are automatically synced up into an Arkiïs™ group after being in close Physical Proximity for more than three minutes. While driving, Nancy's radio is synced up to the group as described in Alternate Device Synchronization and begins streaming Content that is customized based upon their three Profiles combined. Because their Profiles all allow it, their radio prompts them asking if they would like to play a new game that promotes a new romantic comedy that is coming to NBC. The game is a word game where words from the series are incorporated into the play so that the players will become familiar with the series' concepts and themes. The game takes about ten minutes to play while they are driving and the winner, Betty, receives $5 and for participating all receive free commercial-free access to the first three episodes.
  • The Arkiïs™ Alternate Device application (e.g., mobile phone app) and shared First Devices may facilitate Users joining together into a SyncGroup. In some embodiments, SyncGroups are formed by detecting group consumption situations due to sustained Device proximity for Users that are logged into their Profile on their mobile device. Such detection can be performed on a server in the cloud, with each Device registering its contextual information with the server, which then organizes Device owners into SyncGroups. In other embodiments, SyncGroups are formed through direct communication among pairs of mobile devices. Individual Device owners may join into a SyncGroup that can merge any other Users they may already be paired with into a larger group, merging previous SyncGroups into a larger SyncGroup. Depending on the embodiment, direct communication between mobile devices can be through Near Field Communication (NFC), Bump Technologies like validation/coordination (analyzing accelerometer data to match two phones being bumped together, see bu.mp/company/faq), or local communication inside a Wi-Fi network. Once a SyncGroup is detected, each User within the group may select how they wish to consume Targeted Content. Such a selection may be preselected or chosen manually in each instance as they occur. In group consumption situations, Alternate Device Synchronization is shared across the mobile devices so that they do not need to all specify the show being watched, but instead piggyback on the selection of others in the group.
  • In group consumption situations, there are multiple metrics to coordinate. These include filtering and interest preferences as well as payout preferences. One may choose to loosen one's filtering requirements (e.g., allow advertising for alcoholic beverages that are normally suppressed) and to optionally specify that advance warning be given on one's personal mobile device before such messages are to be delivered to allow one to either switch to consuming alternate Content on one's mobile device, or to briefly leave the First Device's room. On the payout side, one can choose between optimizing the group's payout as a whole versus optimizing the minimum payout across the whole group. Users may tailor or customize all of these choices, in some embodiments, this is accomplished by a SyncGroup settings page that stores User input within a database to affect filtering and payout according to the User's preferences. In some embodiments, during viewing, the First Device could split in half with SyncGroup members using their mobile device to receive audio for whichever half of the split screen applies best to their profile.
  • During shared Targeted Marketing Content, each participant can view on their mobile device how much they will get for consuming the ad (based upon how well it is optimized for their profile) and decide whether they are going to pay attention, opt-out and consume a personally targeted ad on an Alternate Device, such as their mobile device, or leave the room to take care of other business.
  • Additionally, in a preferred embodiment during shared Targeted Marketing Content, each participant may also view on their mobile device how much payout they would receive for giving Feedback and they may choose individually whether to leave Feedback on their mobile device or receive further messages expounding on the Marketing Content that interests them while others may continue on with other ads.
  • The following example usage scenario depicts a User independently branching out from group advertising in the Arkiïs™ system. Phillip is hanging out with his college buddies who are all members of Arkiïs. An ad for Samuel Adams beer is selected that is optimal for the group as a whole, but this is not optimal for Phillip individually because his Profile shows he does not drink alcohol. Looking down at his Arkiïs-enabled smartwatch, he is alerted that the ad will only pay him five cents to view and that it does not match his interests, so he decides to instead watch his own personally targeted ad on his smartphone from eTrade to open an IRA while the rest of the group watches a humorous beer commercial on the television. Since the Arkiïs™ cloud servers know he is in a distracting situation, the servers query him in more in-depth on his smartphone to confirm cognition of the personal ad he views, which he does and earns one dollar. See FIG. 22 and see FIG. 23. In FIG. 22, Alice, Bob, and Charlie are in Physical Proximity to each other as detected by their phones and join together into a SyncGroup that includes as a First Device, Alice's registered television which is delivered targeted ads, targeting the SyncGroup as a whole by the Arkiïs server. In FIG. 23, Alice, Bob, and Charlie have mobile devices that are connected to the Arkiïs servers and associated with their individual Profiles, additionally, they have joined together into a SyncGroup and are sharing a display that is registered to belong to Alice as noted in her Profile. The Arkiïs server accepts bids to deliver targeted advertising from advertisers whose target audience parameters match the characteristics of the SyncGroup. The Arkiïs server selects from the available bids from Florida Orange Juice, Coke-a-Cola®, and Pepsi-Cola® to choose the advertising message that best fits the Profile preferences of the SyncGroup members individually and collectively and such selected message is delivered to Alice's registered Device.
  • Another embodiment of the Arkiïs™ system in which Users may branch out from an advertising group is as follows: Bob and Charlie visit Alice in her apartment to watch the Big Game between Stanford (their alma mater) and UC Berkeley. Alice tunes her television to her personal Roku™ Arkiïs™ channel and selects the Big Game. Because each of them is always logged into Arkiïs™ using their mobile device and they are in sustained close Physical Proximity to each other, their Profiles automatically sync up for shared viewing using their previously configured SyncGroup. Because Alice is viewing her personal Roku™ channel and she has synced up with her friends, her channel automatically delivers Targeted Marketing Content optimized for the group as a whole. During halftime, Alice's dad stops by and he also automatically joins into the SyncGroup. Because his net worth is so much greater than these recent college graduates, the targeting switches to weighting his Profile much more heavily and his presence triggers a quick one-minute ad for the new BMW® 7 Series ActiveHybrid 750i earning him $15. He decides to allocate a small portion of his earnings (the total amount of which only he knows) to cover the cost of the rest of the game so they can watch the remainder commercial free, and he also purchases the premium behind-the-scenes interviews of the Stanford players and coaches to substitute for the normal commercial breaks. Right before his BMW® commercial airs, Bob and Charlie receive alerts on their phone that the upcoming advertisement falls below their watching threshold since it would only pay them five cents. They both choose to temporarily switch to Alternate Device viewing of personally targeted advertisements because the BMW® advertisement would pay them so little. Alice does not get such an alert because her payout is fifty cents, since she might influence her father's decision.
  • Content consumed by a SyncGroup is earned and paid for by all Consumers of the SnycGroup even though they may be sharing a single Device. A User may choose to sponsor a SyncGroup to allow for a reduced commercial or commercial-free experience, or to tilt a Targeted Premium Content feed toward the perspective they desire. In commercial venues such as a sports bar or movie theatre, a sponsor may require a portion of any revenue earned by SyncGroup members. In some embodiments, conflicting requests may be resolved by selecting the highest bidder. A User who wishes to sponsor a SyncGroup for a party or an event may use Arkiïs™ to send invitations to the event, where an Arkiïs™ User's acceptance of an invite places them into the SyncGroup for the event automatically or after being prompted to join the event's SyncGroup.
  • The following example usage scenario exemplifies group sponsorship within the Arkiïs™ system. Joseph is hosting a party at his house and decides to budget up to $20 to cover a commercial-free feed of the Super Bowl with behind-the-scenes extras during the commercial breaks. Arkiïs™ estimates the viewership at his home by utilizing the number of members in the SyncGroup of Arkiïs™ Users that come to his party. Additionally, his First Device is coupled with video and audio recording devices to combine the SyncGroup numbers with viewership estimates based on audio identification of voices and facial recognition of faces in the vicinity of the television. This allows for a more accurate estimation of viewers to take into account Arkiïs™ Users whose phones are turned off and non-Arkiïs™ attendees. The final viewership fee ends up being $10.85 based upon the duration and number of viewers coming and going during the game. Eight of his guests are Arkiïs™ Users and each donated $1 towards the cost, leaving Joseph just owing $2.85 for the balance.
  • The following is an example embodiment of the system, in which Users can influence the advertising shown to a group: Sarah and Jessica are vegetarians and go to the movie theatre. Before the movie starts, there are targeted commercials being shown. Sarah and Jessica have put up a budget of $5 to possibly inhibit any advertising for meat Products that may arise. If at any point during the pre-movie show a targeted advertisement for meat would be the highest bidding commercial, the next highest bidding non-meat advocating commercial would be selected instead as long as the total payout difference between the two is less than the $5 they have allocated. The difference between the two commercials is subtracted from their budgeted amount and redistributed to the Arkiïs™ Users present proportionally to their respective payouts for the replacement targeted advertisement. The ad they bought out is then treated as if it had played and may not be resubmitted for that session. Their remaining budget is then applied to any different additional meat advocating commercials that may arise, and if inadequate and not replenished, subsequent different meat commercials may still air.
  • The video-on-demand service may also be used to deliver Content to public places with commercial Arkiïs™ Profiles. For example, a sports bar or movie theatre could create a Profile that represents their average audience demographics. The DVR could employ video and audio monitoring to gauge the audience size and reaction. The audience size may be determined through face recognition, Jacobs' Method, or other methods. Based on the audience size, the owner is paid for commercials. In a preferred embodiment, Arkiïs™ Users at the establishment may register their presence, and may confirm their location though means such as GPS, Wi-Fi triangulation, IPS (indoor positioning systems), cell-tower triangulation, and the like, to receive credit for ads and to help build the demographics model of the establishment. Many establishments have multiple screens so Arkiïs™ Users would have their Profiles coupled with the specific screens in their proximity and thus influence the Targeted Marketing Content being delivered to their locale within the bar. The owner of an establishment may specify in their Arkiïs™ settings whether they would prefer to maximize profit from advertisements by playing Targeted Marketing Content which is heavily influenced by the crowd of Arkiïs™ Users present at any given time, or gain less in profit from advertisements but have more influence on the advertisements that are playing.
  • The following is an example usage scenario of the disclosed system: AMC theatres rolls out Arkiïs™ for their pre-movie Content and offers free movie tickets for a subsequent show for viewers that choose to sign up for the first time to the Arkiïs™ network. Arkiïs™ Users check-in with their phones at the screen they are viewing and are credited for commercials they view in the theatre. The pre-movie Content presented varies dynamically based upon each movie's projected audience demographics and varies as Arkiïs™ theatergoers arrive and register in the theatre.
  • The following is an exemplary usage scenario of the disclosed system. Regal Cinemas offers a special Arkiïs™ promotion (possibly spearheaded by a Champion) for their 4 pm showing of The Hobbit, if the show is sold to at least 25% capacity and at least 80% of attendees are Arkiïs™ Users with confirmed attendance (by either bringing their mobile device to confirm their attendance or buying their ticket using an Arkiïs™ enabled payment system method to document their purchase or submitting their ticket stub) then all such confirmed Arkiïs™ attendees will receive a $2 rebate on their movie ticket price.
  • When Arkiïs™ Users are synchronized together into a SyncGroup, advertisers may compete with each other to deliver Targeted Marketing Content to the group as a whole. In some embodiments, advertisers may place bids that include an attribution of the bid across each of the individual SyncGroup members. A bid may include sub-bids for each proper subset of the SyncGroup and thus may place a premium on some form of group participation (e.g., the whole group or a majority of the group, or some key influencers of the group). The SyncGroup members may choose to redistribute the payout attribution among themselves differently than it was assigned by the bid. For example, one group member that would earn much more than the others might agree to share a portion of their proceeds with the other group members in order to encourage participation and a shared group consumption experience.
  • The SyncGroup members may utilize their individual Profile Content filtering preferences to construct the SyncGroup's Content filtering preferences. There are a variety of ways their individual preferences may be combined, depending on the embodiment. At one end of the spectrum, they may choose to filter Content to that which satisfies all SyncGroup members' individual filtering criteria. At the other end, they may choose to filter Content to that which satisfies any member's individual filtering criteria. In other embodiments they may also pick somewhere in between these two ends of the spectrum, such as Filtering Content to that which satisfies a majority of SyncGroup members' individual criteria. In further embodiments, SyncGroup members may also pick and choose how to filter Content, within this spectrum, along different Content filtering dimensions (e.g., humor criteria may be based on satisfying the majority, whereas moral criteria may require satisfying everyone, and interest criteria may only require satisfying one member). The selection of SyncGroup Content filtering choices may be tailored though the SyncGroup's Profile page accessed from a mobile phone, tablet, computer, DVR, etc. and may require mutual consent as discussed in group consumption (See Section 9—Sharing Targeted Advertising between Users).
  • As shown in FIG. 24, Arkiïs™ Users that purchase (2405) Products (2400) of a company can register/request (2420) the Marketer (2415) to be Product Champions (2410) of a company or its Products. A Marketer (2415) may configure their Business Profile to indicate their desire to solicit registration (2420) of Champions (2410) for the company or its Products so that prospective Champions may discover them and submit applications for possible approval by the company. In a preferred embodiment, prospective Champions (2410) may discover businesses potentially matching their preferences by querying the Arkiïs™ databases for companies and Products that are open to Champions and that align with their Profile (2440) interests. Such results may be ranked by how well the prospective match aligns with the User's Profile. Depending on the embodiment, algorithms to rank how well the prospective match aligns with the User's Profile may take into account the percentage of the User's Profile contents which match with the company's Profile, the percentage of the company's Profile which does not match or conflicts with the User's Profile, statistical inferences based on similar Users, etc.
  • Champions agree to pitch a company or Product based upon their own personal experience. Product Champions may compare different Products, or criticize a competitor's Products. Champions (2410) may create pitches (2425) in the form of testimonial video messages that may be integrated into Marketer (2415) Content messages when delivered to a consuming (2430) group that may include the Champion (2410). One example of this is the Champion recording a testimonial against a green-screen backdrop to allow the advertiser to easily place Content behind the Champion to enhance their presentation.
  • In some embodiments, when a Consumer (2430) purchases (2405) a Product (2400) and they previously consumed a pitch (2425) for that Product (2400) the purchase (2405) is included in the registration (2420) so that Marketer (2415) may take action on that information. Such action may include providing compensation to the Champion (2410) according to the details of the registration (2420). The Marketer (2415) may also adjust the registration (2420) to account for which pitch (2425) messages are more or less effective and thus more or less likely to be offered to the Consumer (2430).
  • In some embodiments, Marketers (2415) may receive Champion pitch (2425) video submission Registration (2420) and select which messages they approve for inclusion in their advertising campaigns as well as possibly grade them to adjust the Champion's (2410) payout rate through registration (2420). This approval/selection process may be done manually by the company, through an external agency or automatically through, for example, voice recognition and/or lip-reading analyzing the Champion's tone and keywords within the video submission depending on the embodiment. Consumers (2430) may filter their exposure to Champions (2410) in one or more topic areas by requiring in their Profile (2440) that Champions (2410) have a high integrity rating and/or have used the Product (2400) for at least some minimum time frame. A Champion may substantiate their claim to having used a Product by many means such as the attestation of another User, scanning a QR code included inside the Product's packaging, supplying a confirmation code included inside a product's packaging, linking their Profile to a credit card used to purchase the Product, linking their Profile to a store account used to purchase the Product, providing a receipt of their purchase, providing a video of themselves using the Product, etc.
  • Other types of Champion messages include live performances that integrate the marketing message being promoted by the Champion. This can take many forms such as: standup comedy routine, magic show, juggling act, or simply a straightforward extemporaneous message. Hybrid performances are also possible whereby a live Champion combines their performance with on-screen prerecorded Content. In some embodiments, Arkiïs™ Consumers (2430) that are consuming a Champion's performance pitch (2425) may offer their services to document the live performance by noting in their Profile (2440) that they are willing to be a videographer or audiographer. The Arkiïs™ system may allow the Marketer (2415) to designate via Registration (2420) and pay a willing recorder to document these live messages so that they may be reused and analyzed by those not present. Such documentation may also allow for feedback (2435) confirmation of the Champion's message and facilitate payment for their services via Registration (2420). In some embodiments, a Champion (2410) may register (2420) a description of their pitch (2425) performance in the Arkiïs™ system databases that may include show times, criteria required for spontaneous exhibitions, performance descriptions/genre/classifications, etc. in order to facilitate the easy location of Champion messages and performances by other Consumers. Consumers may annotate the database description in Registration (2420) with the addition of Feedback (2435) in the form of reviews, ratings, video/audio recordings, confirmation of performance information, etc. Mobile device applications may facilitate the addition of information by detecting or confirming a User's consumption of a performance and facilitating uploading of recordings, reviews, ratings, etc.
  • An example usage scenario describing a User who wishes to Champion a Product or service through the Arkiïs™ system is as follows: Robert can juggle lit torches and has integrated his performance with an advertising message for Geico® auto insurance. He has been invited through his Arkiïs™ Profile to a swimming party next Saturday evening with many friends that know him He decides to publish a Market Request to Champion Geico® auto insurance at the party to see if there is sufficient interest. There are twenty guests invited to the party using the Arkiïs™ system. These guests receive notice of the Market Request and may see Robert's Feedback and reviews of prior performances of his Geico® Champion message. These guests may then decide whether they wish to support the Market Request. Twelve of the guests indicate their support with one objecting and the rest abstaining. This support level being sufficient, the Market Request proceeds to actualization and Robert prepares for his performance on Saturday and schedules it for 8 pm. On Saturday evening, there are 24 Arkiïs™ Users present at the party when the appointed time arrives. Karen has registered with Geico® to record the performance and submit it to Geico® for their review in return for $5. Robert receives $20 for his ten-minute performance. The guests that know Robert well receive on average $2 for watching while those that do not know him well receive on average $1. Robert's friend Justin, who is in the process of buying his first car, is particularly well-targeted and receives $4.
  • A Champion (2410) may give permission in their Profile (2440) to create new pitches (2425) such as in the form of virtual ads (based on samples of their likeness and voice) or reuse existing Champion ads, after their death with the proceeds being paid to their estate. In such embodiments, Arkiïs™ provides a system of synchronizing the now-deceased Champion with Products that would have fit with their aspirations and values as determined by independent third parties to ensure integrity. The foregoing embodiment may entail statistical analysis of a Champion's Profile to judge a product's match level being sufficient to be a match. Such analysis may include matching the deceased Profile to find similar Profiles who are known to acknowledge or disavow a Product affinity for the purpose of predicting whether the deceased Champion would have an affinity for the Product. The aforementioned matching may be carried out by a trained neural network, or any other means employed by matching schemes such as prediction algorithms similar to Netflix® movie suggestions. The Champion's Profile may have been configured during their life to require review and approval of prospective matching Products after their death by their family, agent, estate, and/or other approved entity they trusted. In other embodiments, similar approval system may apply to living celebrity figures that may not want to spend the time to review and approve all the ways their likeness could be reused to create new virtual advertisements, but are willing to allow their likeness to be reused provided the Product meets their values and constraints.
  • When bidding, a Marketer (2415) may place a premium on delivering messages to a SyncGroup that includes one of the company's registered (2420) Champions (2410). The Champion's position is divulged to the group to ensure transparency and integrity. The SyncGroup may be surveyed to see if members are willing to listen to someone from their group that is a Champion for a particular Product and even pay the other group members for answering yes or no and giving their reasons for saying so. Their decision as to whether to listen can be aided by Arkiïs™ presenting the reputation details of the Champion (2410) based upon Feedback (2435) they have received within the Arkiïs™ registration (2420) system. In some embodiments, the Marketer (2415) can decide, based upon survey results, whether to engage the Champion (2410), perhaps requiring total consensus or a supermajority before so deciding. After consuming the Champion's (2410) pitch (2425) message, these Consumers (2430) may be surveyed for Feedback (2435) to rate the effectiveness of the Champion's (2410) pitch (2425). This Feedback (2435) rating allows Marketers (2415) to choose Champions (2410) who meet their requirements and/or select Champions (2410) who have been rated highly in Feedback (2435) by similar audiences in the past. It also aids future potential Consumers (2430) in deciding whether to consume the Champion's (2410) pitch (2425) message and to see whether others with similar interests provided Feedback (2435) indicating they liked it. For example, Consumer (2430) may see a predicted Feedback (2435) rating of how Consumer (2430) will likely Feedback (2435) when rating the pitch (2435) Content. This may be based upon Content ratings you have already supplied that link you to like-minded people who have already consumed the pitch (2425) Content (e.g., like the algorithms Netflix utilizes to rate movies in order to predict what you will like).
  • The following example usage scenario describes one embodiment of the system in which a User becomes a Champion for a Product. Dexter is a long-standing customer of CutCo® kitchen knives. He is very impressed with how sharp the knives are and likes the fact that they are made in the USA, and has therefore decided to accept an email invitation he received to register himself as an Arkiïs™ Champion for these knives. He is entertaining another friend at his house and they decide to watch an a la carte HBO movie together. To pay for the movie, they agree to watch a one-minute commercial for CutCo® knives, knowing that Dexter is a Champion for the company. The message ends with reference to the fact that Dexter can demonstrate the knives and talk about his own use of them and offers a 20% discount for any knives purchased that evening. Dexter selects one from the kitchen after the message is delivered and briefly goes over why he is so happy with them (e.g., their ability to cut human flesh so effortlessly). His friend tries to leave early.
  • In some embodiments, Users may detect the physical presence of highly rated Champions (through GPS, mobile networks, Wi-Fi triangulation, and the like) and publish a Market Request for the Champion to perform for those present. A User may alert all similar Users within the vicinity whose Profile preferences allow such communication, to support the initial Champion Market Request. This data may be transmitted to the Champion so they can gauge/determine how many Consumers would come to the performance. Champions may decline such requests or offer conditions under which they would be willing to perform. For example, the Champion may require each participant's payout for the Targeted Content be allocated to themselves. If a sufficient number of those present agree to the Market Request terms agreed to by the Champion, then the Champion would perform their act. In other embodiments, a performer may also use this method to advertise their act and collect revenues for their accepted on-demand performances.
  • Goods & Services Providers (e.g., Coca-Cola) may agree to compensate Champions for creating Content that includes placement of their Products (either actual placement or virtual via agreed upon digital substitution for revised product placement). To achieve this purpose, in some embodiments Arkiïs™ may provide software that automatically detects the presence and/or dissemination of Provider goods and services for the purpose of auditing, detecting, and/or measuring such placement and rewarding the Champion. Automatic computer detection of a product's presence may be performed analogously to facial recognition in photographs but adjusted for object detection. Processing to transcribe the audio into text may be searched by computerized means for mention of a Product. Positive matches may be subject to manual human review for confirmation and to ensure usage is not sarcastic or negative in nature. Such confirmation process may be facilitated by the Arkiïs™ system and results stored in the system databases for subsequent reference. In additional embodiments, the Champion or other Users may notify a Provider of such placement.
  • In a preferred embodiment, if a Product is being simultaneously consumed while it is being advertised, a User may earn a bonus payout offered by an advertiser. Product packages may have a QR code (matrix barcode) to identify the Product being consumed and an Arkiïs™ offer. Near the time that a coordinated message is being consumed, the User would scan the QR code to demonstrate that they are simultaneously consuming the Product being sold while the marketing message is being delivered and earn the bonus payout.
  • In the case that Product samples are being distributed and Championed in an environment (e.g., a theatre) where other Targeted Content is competing for User attention, the Arkiïs™ system discounts for the distraction from receiving Product samples in the payout formula of the Targeted Content that is competing for attention in some embodiments. Such discounting may be agreed upon by advertisers with Arkiïs™ and included in their agreed upon payout formula and automatically apply whenever the foregoing competing messages are presented such that their delivery overlaps temporally with delivery of the other Targeted Content. In the case that the Targeted Content is aligned with the Product sample, the system may increase the payout due to the synergy of the messages as agreed upon by advertisers and included in their agreed upon payout formula in some embodiments.
  • The consumption coupled message delivery may be organized around a SyncGroup that may have as its leader the Champion that is facilitating the delivery.
  • The following scenario is an example of one of the embodiments of the System, in which a User is able to utilize SyncGroup functionality for consumption coupled message delivery. Henry indicates in his Profile that he is hosting a Monday night football party next week for a group of five of his male friends and is presented with a shopping offer on his phone while at the grocery store to buy a case of a new Budweiser dark ale, a jumbo sized new Lime Chili Doritos chips, and a case of Coca-Cola® to serve at his party since during the show there will be targeted commercials presented to the group for these three Products. In return for serving the Product and providing Feedback on the Product and the commercial messages, Henry will be credited back with half the sale price and each participant will be credited with coupons for half off a future purchase of these Products. Right before the party begins, Henry scans the QR code with his phone for each of these Products with the Arkiïs™ application to substantiate their being served at the party. After viewing the Targeted Marketing Content for these Products and providing Feedback, he receives a credit for half of his prior purchase. His friends check-in to the party with their Arkiïs™ application and after the commercial message is supplied and they have provided their Feedback, depending upon their responses they receive coupons to buy these or other Products at half off the normal price.
  • The following is an example embodiment of the system: Michiko loves Skittles and has spontaneously decided to Champion Skittles today by passing out free samples at the mall starting at 10 am. Another Champion, Lucy, had previously signed up to do this starting at 9:30 am, but because Lucy did not arrive as scheduled, her slot is instead given to Michiko, who creates a SyncGroup where she is the leader. She uses her smartphone to receive directions around the mall to locate open-minded targeted recipients. Possible recipients may see details about the samples Michiko is offering together with information about Michiko so they can decide how credible she is and how well her interests align to their own and may then choose to join her SyncGroup and make themselves visible to Michiko on her smartphone so she can locate them. Once they have opted into the offer and joined the SyncGroup, they can also see Michiko's location and may choose to locate her, the group leader. When they meet up, they may scan the Skittles QR code or bump their phones together (Bump Technologies validation, as Incorporated by Reference) after locating Michiko so that she will be paid for her work. While receiving their free samples, Michiko extolls the virtues of Skittles and tells the story of how she became such a big fan. Because Michiko is at the mall while she is promoting as a Champion, she shares 5% of her earnings with the mall. However, as lunch time approaches at 11:30 Michiko goes home because the mall's agreement with her states that Michiko must suspend giving out free samples during lunch from 11:30 am to 1:30 pm so as not to compete with the food court.
  • A Champion may be required to have used a Product before becoming a Champion, and generally is sponsored by a Provider to create new material—whether a video advertisement, a pitch, or a live performance—which supports the Provider's Product. However, there are other methods of promoting a Provider's Products or advertisements that do not require company support or approval. The informal Champions who promote a Provider's Products or advertisements may be referred to as Influencers.
  • One type of Influencer is a User who likes a particular ad (e.g., because they find it hilarious) and saves it to their Profile so that they can later replay it for their friends in a group sharing event. In one embodiment, the Influencer may be able to see aspects of their friends' Profiles (based on their friends' Profile information sharing settings) in order to determine whether any of their friends have previously purchased similar Products, or alternatively, to see a graded list of how well the Product matches the interests of each of their friends. As a reward for promoting the commercial itself (not its message) the Influencer may get paid for each friend that they share it with in some embodiments. The sharing may be done one-on-one in Physical Proximity, or virtually. In some cases, the ad may be shared together with some Premium Content to help defray the cost of the Premium Content. The recipient of a shared commercial may configure their Profile to rank the foregoing shared ads more highly when choosing advertisements for consumption than they would be ranked without the Champion's advocacy of the shared ads. The foregoing ranking adjustment may vary depending upon the identity of the Influencer, the integrity rating of the Influencer, and/or the Influencer's relationship with the recipient.
  • Another type of Influencer is one where a User or group of Users bands together to attract more Users to purchase a Product with the goal of reaching a reward threshold when a sufficient number of Users have joined the group and purchased. For example, the group may get a 10% rebate on their purchase if they are able to link up ten purchasers in a 24-hour period to create a spontaneous cooperative to buy Products.
  • Another form of Champion is one where a Champion agrees to include RFID tags on Products or on their person for things they are promoting when they are being presently worn or used. Such tags allow for automatic identification of Products (e.g. clothing, mobile devices, shoes, watches, sports equipment, glasses, perfume, foods, drinks, etc.) such that other Users in Physical Proximity to the Champion can detect the RFID tags with their mobile device and retrieve information about such Products on their mobile device. For example, a Champion may include in their wardrobe clothing that they are promoting and when other Users see them and like what they are wearing, they are able to easily retrieve information about what they are wearing. If a User likes the shirt a Champion is wearing and such shirt includes an RFID tag because they are championing it, a User can easily bring up details about the shirt if they like it and possibly order their own. Alternatively, when adorning a perfume or consuming food or drink, a Champion may place or activate an identifying RFID tag on their person. In the case of Virtual Proximity, a Champion's own mobile device in Physical Proximity may detect the RFID tags on the champion's own body and communicate such tags to other Users in Virtual Proximity. Alternatively, a Champion may just publish in their Profile the Products they are presently using for detection by other interested Users analogously to RFID tags.
  • 10. Providing Premium Content
  • In some preferred embodiments, cooperating broadcasters may provide Arkiïs™ with an alternate live broadcast feed to continue live coverage while their generic broadcast stream goes to commercial breaks. The broadcasters may be paid by the Consumer through Arkiïs™ for this live feed at a rate commensurate with what they receive from the commercial messages being supplanted by their continued live feed. For example, in live sporting events, added in-depth replays, interviews, and commentary may be provided, or behind-the-scenes locker room discussions and strategy sessions may be exposed. As this use of continuous Content feeds/programming matures, alternate feeds would evolve where a User's Arkiïs™ Profile preferences would automatically select the feed that best matches their interests. For example, if you are a 49ers fan, the Content could be more focused towards that team, or alternatively, if you are interested in a particular position, such as the quarterback, the feeds would be selected to emphasize that preference. In a public situation such as a bar, an Arkiïs™ User could pay to sponsor Premium Content ad-free, much like how one used to put money into a jukebox to hear a song, but everyone in the room got to listen.
  • Arkiïs™ may allow live sports events to change how they are played so that they no longer have arbitrary commercial breaks and hold up game play to wait for the commercials to end before resuming play. Instead, the natural breaks that occur in the game between plays and during time-outs become sufficient to consume commercials if desired and pay for the cost of receiving the Premium Content.
  • In some embodiments, during commercial break of a live program (e.g. a football game), other unrelated or independent premium channel Content (not necessarily live) could be temporarily tuned in and upon the original live Content's return from commercial break, the Device or individually customized feed could automatically return to the Primary Content channel being viewed or split the screen and show two or more feeds.
  • The commercial break Premium Content may even be expanded into the traditional broadcast Premium Content. For example, a broadcast network may produce alternate feeds that target specific demographics in return for a premium from the Consumer. For sports programming, a broadcaster could produce two or more additional feeds beyond their traditional generic broadcast that target the fans of the two teams competing. The team-targeted feeds could include announcers with an affinity towards the team whose fans are being targeted; further, the choice of cameras and instant replay perspectives during the game could be adjusted to serve the desires of the fans of a particular team. Additional feeds could also be created around other target audience metrics, for example, when watching football, one demographic may prefer to only view the game with a focus on the quarterback.
  • In a preferred embodiment, a User may associate their Fantasy Football team (or other fantasy sports team) with their Profile in order to receive an anthology of the plays in which each of their Fantasy Football team members featured prominently during the last few hours or days. This can be done by linking a User's Arkiïs™ Profile to a Fantasy Football application on a mobile phone or other computing device. In an alternate embodiment, a User's Arkiïs™ Profile may import the lineup and other details of their Fantasy Football team. Such importation may be regularly synchronized by the Arkiïs™ servers or the Fantasy Football application may link a User's information with Arkiïs™ and proactively send updates and changes to a User's team as they are affected. In some embodiments, the Content Providers may tag play Content with identifiers for the players who figure prominently in each play. In other embodiments, Users may tag plays they are watching to crowdsource the building of the database. Other Users that benefit from the tagging produced may compensate the Users contributing such tagging for their efforts by allocating a portion of the Content fee to those Users. Each player tag may have entry and exit time points within the Content wherein the player's action is most prominent or important. The tags may be graded in terms of the magnitude of their role in a play (either positively or negatively). Additionally, the Content may be tagged to identify the entry and exit time points for individual plays wherein individual players may come into and out of key action. The plays may be graded in terms of dramatic impact as well as overall scoring potential and actual impact. Grades may be crowdsourced, so that the dramatic impact, scoring potential and actual impact may be denoted as the average grade for each category. In some embodiments, Users may also be allowed to leave comments on each play, which may be subject to filtering, review, and deletion for inappropriate Content. By providing all these grades and tags upon the array of all games being played in a league and thus building up a rich database of Content, Arkiïs™ can easily allow a User's Profile to specify queries of exactly what they value and wish to see in their Fantasy Football team members and thus build custom alternate Premium Content that a User may view in whatever fashion they desire such as during commercial break while they are watching a game or as a standalone custom show without interruption.
  • A User may specify which Fantasy Football rules they would like their Arkiïs™ Profile to reflect. Arkiïs™ may allow the User to select from a drop-down list of league types each with preset rules, for example head-to-head leagues (where a new team is picked every week and matched against one other team), “keeper” leagues (where rules dictate the number of players that can be kept from year to year, and there is a penalty for keeping a player”), etc. Users may submit new sets of rules for approval to Arkiïs. In some embodiments, Fantasy Football league SyncGroups may be created where the group leader acts as the league manager, and creates league rules for the other SyncGroup members. These rules may have to be approved by, for example, a majority vote within the SyncGroup. SyncGroups may also be utilized to facilitate trades of players from one User to another. A majority vote within the SyncGroup or some other form of group consent may be required to approve a trade.
  • In some embodiments, Users may also use Arkiïs™ credits as a wager, and may transfer credits to another player for gaining more points throughout the Fantasy Football season. However, this feature is subject to state and federal laws and may not be available in all states or countries.
  • 11. Providing Feedback on Content, Goods, and Services
  • When a Marketer buys access to deliver Content to a Consumer, by way of the Marketer's criteria matching the Consumer's Profile for the purpose of delivering Content, they may gain the right to report on their relationship with the Consumer such as whether the Consumer commits to making a purchase from them and their performance on any such commitment. In a preferred embodiment, such reporting will retain the anonymity of the Consumer from the Marketer. At the same time, the Consumer may earn the right to report on their relationship with the Marketer such as whether their Products fulfill the promises of any Marketing Content provided to the Consumer.
  • Arkiïs™ may combine the information gathered by all the parties to compute or generate individually custom tailored scores for any pairing of a Consumer and a Marketer, such as shown in FIG. 15 and FIG. 25. This scoring takes into account the general Consumer's behavior as well as their specific behavior towards the one Marketer being explored. The Consumer's score is actually a set of functions (either calculated instantaneously or over a period of time) that predict the likelihood that the Consumer will have performed a particular action immediately or by a given time point in the future (timeframe of question from marketer 2512). These functions may be stored within the Arkiïs™ system databases 2504, calculated (lookup function arguments 2514) for each Consumer/Marketer (Consumer profile information 2508/Marketer information 2510) pairing query and context time, location, social, and adjacent Content 2516, and stored long enough to determine whether or not an advertisement will be added to a Consumer's queue (Does probability justify bidding? 2520, Determine bid based on Profile+probability 2524 and Submit content into queue of consumer for possible selection 2526 in Content selector 208). Examples such as shown in FIG. 26 include a function to predict the likelihood that the Consumer will buy, or lease, a new car in general, or another more specific to buying/leasing a new car through that particular Marketer. Other similar functions might suggest their proclivity to buying a new car or a used car, whether they would likely pay cash or finance, whether they would trade in an old car, etc.
  • Conversely, the Consumer is given scoring information on the Marketer to predict the likelihood that the Marketer will deliver on its promises or a prediction as to the likelihood that the Consumer will judge the Marketer as meeting their criteria.
  • In a preferred embodiment, as illustrated in FIG. 27, the database of information is accessed by the Arkiïs™ system through a published API (2710) that allows licensed third-party applications to be plugged into the platform (2720, 2722, 2724, . . . ) and to provide additional value or functionality beyond what Arkiïs™ provides. Such plug-ins generally function within the Arkiïs system and do not export or expose any information to the outside public network (2750) except under strict security controls and monitoring to ensure privacy. Only the public facing Profiles (2730) are accessible through the API. The Master Profiles (2740) are held under strict security controls to reduce the chance of unauthorized access. These controls may include the use of, for example, private networks (2760) that may employ laser communications systems instead of the Internet when moving the Master Profile data around the world to reduce the chance of unauthorized snooping to glean information. The interface which faces the Internet may only access a single Profile at a time to allow individual maintenance of a Consumer's own Profile and may require authentication. This helps prevent wholesale intrusions of the whole database.
  • The User may choose to omit certain information from their Profiles to aid in privacy preservation. For example, blank fields may be automatically seeded with false demographic information to increase the privacy of the system, should the Master Profile database be breached. Such erroneous information is omitted when queried through the published APIs and is only present as an added security measure in case the Master Profile database was directly breached. The Marketers query for a set of Profiles that meet their criteria; further drilling down for additional details on matching Profiles is subject to tracking and analysis to confirm the database is not being abused. Confirmed abuse can result in a Marketer (or any User) being restricted or barred from accessing the database (or using other elements of the Arkiïs™ system) or being required to hire and pay for an independent overseer to audit and supervise all their activities until such time as they are deemed trustworthy again. Aberrant patterns that are detected include systematic rotation of query parameters that could be used to eventually query the whole public facing database for prohibited replication of the database outside our system, or the use of false demographic information intentionally placed within the system to detect abuse. Additionally, once a Marketer has a set of targeted Consumers for which they are querying for ever more detailed information (drilling down for more information), any set of expansive queries that in aggregate covers large portions of a specific Consumer's public facing Profile are subject to review relative to their legitimate need for the information, or if not, then for flagging for manual review as possible abuse. In a preferred embodiment, User may indicate in their Profile that they wish to be omitted from any queries where the set of matching Profiles is small or below a certain threshold to reduce the chance that their identity might be surmised by constructing a query to locate a known person's potentially anonymous public Profile.
  • As shown in FIG. 15, Consumers (1560) of Content (1520) may be asked by Content Producers (1510) to supply Feedback (1580) on Targeted Content they consume, receiving a notification (e.g. visual, audio, tactile) on an Arkiïs™ enabled Device that their Feedback is wanted. This applies to both Premium Content and Marketing Content. In the case of Marketing Content, the Feedback may be used to confirm that the Consumer actually consumed the Content for which they may be getting paid, additionally, Feedback may be used to gauge a person's interest in a Product after seeing a commercial message and to measure their receptivity to a message to allow a Content Producer to tune their delivery. In the case of Premium Content, the Feedback may be used to measure how satisfied the Consumer is with the Content and their likelihood to recommend it and consume follow-up Content. The immediacy of Feedback allows an advertiser to quickly hone their marketing message with a small set of initial Consumers to make it more effective with a larger set of subsequent Consumers.
  • Feedback which is used to gauge whether a Consumer actually consumed the Content may include open-ended or multiple choice questions regarding advertisement details only recognizable to a User who actually consumed the ad, for example: “Were the characters sitting in a) the office, b) a park, c) a restaurant, d) a house?” Feedback which is used to gauge a User's interest in a Product may be supplied by the advertiser and may include one or more of: open-ended questions, multiple choice questions, rating scales, rank order scaling questions, semantic differential scales, constant sum questions, and/or the Likert response scale, etc. Feedback questions which are used to gauge a User's interest in a Product may be presented to the User consecutively, or a survey may be split into portions which are then presented to the User in an order influenced by the time left in a commercial break and the monetary value the User will receive for each survey portion.
  • Feedback may be provided through a User's Alternate Device or entered through an interface presented on their First Device and controlled by their Alternate Device (e.g., smartphone), remote control, or other custom hand-held hardware device. By turning the commercial message into a bidirectional communication, the User becomes more engaged with the message, more intelligent and thoughtful, and more likely to respond favorably to a message that is providing real value to the User. This should raise the whole playing field of commercial messages and result in smarter buying populations and more interesting and useful commercials while eliminating, through competition, those messages that are not helpful. See FIG. 28. In FIG. 28, a User has provided some Feedback on a zero to five sliding scale in three parts, an overall rating of the Content, a rating with respect to how funny the Content is, and a rating of how well the Content matched the User's interests.
  • In some embodiments, the Feedback questions may be organized as a tree where, depending upon the response at each level of the tree, the Feedback questions continue on a chosen branch that accounts for their previous responses. Some branches are terminal based upon the Marketer's determination that a sale is unlikely, which may be based upon past experience with similar answers from similar Consumer Profiles and the resulting sales outcomes. In the case of a commercial message, some responses may lead to follow-up Targeted Marketing Content to reinforce the Marketer's message and allay discovered concerns of the Consumer and to ultimately result in a sale. The extent to which a User is willing to answer Feedback questions affects their payout; this also applies to Feedback on Premium Content. Feedback may result in payout that is proportional to the amount of Feedback given.
  • Feedback may also be provided during Content delivery. For example, as a message is being delivered, the User may provide continuous/ongoing Feedback using their smartphone or other Alternate Device. A User may provide Feedback in whatever dimensions the Content Producer desires. For example, a User could give Feedback as to how funny or compelling a message is as it unfolds. Additionally, sensor input data may be utilized to automate the gathering of Feedback. For example, a microphone on a smartphone may be used to detect and measure laughter levels and correlate them with Content delivery time points. Alternatively, talking during Content may be measured to detect User engagement (talking about the Content, determined by voice recognition and/or lip-reading of keywords) and disengagement (talking about something else). The accelerometer on a smartphone may be utilized to detect when a User gets up out of a chair and how quickly they did so to measure audience excitement such as upon a key scoring event in a sports game.
  • Other aspects of Feedback may be collected if the Consumer actually follows through and purchases the Product being advertised. After purchase, the User may choose to review the original message and judge it relative to the actual Product received. In a preferred embodiment, the Feedback continues to be collected over the lifespan of the product's effectiveness. Consumers that follow through also have increased integrity ratings that better their odds of receiving better payouts from Marketers.
  • In return for access to the system, Marketers agree to terms of service that may prohibit them from engaging in activity that could be used to identify individuals, retaining any information on Consumers, or attempting to cross-reference information within the system with information aggregated by outside marketing data collectors. In a preferred embodiment, if a Marketer is found to violate any of these provisions, their actions will be publicized as part of their Profile and they will be excluded from marketing to those Consumers whose filters preclude advertisers who are found to violate the terms.
  • Monitoring of room audio through the microphone of a device connected to the Arkiïs™ system may allow audience reaction to be measured by correlating it with the presented Content to gauge the value and effectiveness of Content. In some embodiments, audience reaction may also be measured by recording room video and performing facial recognition to determine at what points attention is directed towards the video Device and at what points it is not, to further gauge the value and effectiveness of Content. In further embodiments, facial recognition may also gauge audience emotional state/mood by detecting facial gestures such as smiling, frowning, and laughter and/or other gesture recognition such as clapping, thumbs-up or thumbs-down, etc.
  • In group situations, the Profile preferences of a particular User in the group may prohibit collecting any data while they are in the vicinity. Alternatively, depending on the embodiment, the audio and video and other data collected may be scrubbed to delete or censor out their presence. This may be done using vocal recognition to tie known voice prints of known User Profiles to specific voices in an audio feed and removing any unrecognized prints or prints recognized to match a Profile that controls how their data is collected and has specified they not be recorded. Similarly, individual video frames may be analyzed to perform facial recognition against known faces so that unknown faces or recognized faces with controls over data collection may be filtered out as required. The Arkiïs™ system may annotate adjacent video frames with the identity of subjects to track and maintain identity across frames where individuals may not be accurately identified, such as when a face turns away or is partially or wholly obscured in some fashion. The audio print recognition may be combined with the video to provide greater accuracy, for example, by combining facial recognition and associated lip movements (lip-reading) in the video with the voiceprint that corresponds to those movements. Other clues, such as clothing being worn, can be used to help track an individual once their face is not sufficiently viewable in a video feed where their recognized face is associated with the clothing they are wearing, thus allowing continued recognition when their face is not visible but their clothing is visible. In some embodiments, when multiple audio feeds are present, voiceprints may be assigned three-dimensional locations by triangulating the voiceprint across the audio sources. Such location aware prints may also be combined with video to further refine identification of an individual in a video. Just as multiple audio signals may be present, so may multiple video signals be present and combined to provide high fidelity identification of Users and their locations and actions in three-dimensional space.
  • Reviewers (a User or SyncGroup of Users providing detailed Feedback related to transactions, Content, goods, services, or others' Feedback) may share in advertising and/or revenues for goods & services that are purchased in part based upon information in their reviews. In some embodiments, the revenue share they receive may decrease over time; for example, their share may decrease by 2% for every day that elapses since their review was last referenced by a User up until the point that User actually makes a purchase of a reviewed item. In other embodiments, the revenue share may be diluted across all the reviews a User considers before a purchase. Highly regarded/rated/trusted reviews may garner a disproportionate share of revenues to reflect their greater value. For example, a Provider of a Product may allocate 2% of the sales price to Reviewers that contribute to the User's decision to buy. In alternate embodiments, the User may reject reviews paid for by the Provider/seller and instead pay for access to reviews. Users may also self-gauge the value they feel they received from a Reviewer. This valuation may be compared to the average of all Users self-gauging a Reviewer. When a User's self-gauged value is significantly lower than the average yet the User appears to have followed the recommendation of the Reviewer, the User's value may be attributed a greater value than they self-gauged. The Reviewer may earn a portion of revenue for purchases based upon their reviews that are deemed of value. Reviews may also be treated as targeted commercial messages or incorporated into such messages where the Goods & Services Provider being reviewed targets a potential buyer by presenting them with an advertisement that includes reference to the Reviewer's information. In such cases, the Reviewer may share in the revenues paid to the consumer of the targeted commercial message. In some embodiments, Reviewers may earn money for downstream purchases, for example, if Alice provides a review to Bob and Bob purchases based in part upon Alice's review and Bob now provides a review to Charlie and Charlie purchases based in part upon Bob's review, then Alice earns a portion of Bob's earnings from Charlie's purchase since Bob's original purchase resulted in part from Alice's review.
  • Depending on the embodiment of the disclosed system, there are many different ways a Reviewer may be paid for providing their reviews including:
      • Receiving a portion of sales revenue related to viewing their reviews.
      • Receiving subscriptions from User(s) for unlimited access to their reviews.
      • Selling timed, block access to all reviews in a particular domain.
      • Selling pre-paid access to a fixed number of subsequently selected reviews.
      • Selling a-la-carte access to individual reviews that may include a minimum payment and optional bonus based upon the User's rating of the review (e.g. a review receives a 3 out of 5-star rating and is paid $0.07 whereas a 4-star rating by the User would have earned the Reviewer $0.10).
      • Receiving a portion of all ad revenue from a User and allocated across the reviews most informative to the User's buying decision(s).
      • Receiving a portion of ad revenue from a User in a particular product domain and allocated across the reviews (including those of other Reviewers) most informative to the User's buying decision(s) in that domain. (e.g. the top five reviews divvy up the User's allocation equally or weighted based upon the ranking of each review).
      • Joining together with other Reviewers of a Product and selling bundled access where the User ranks the bundled reviews by their value and the sales price is allocated according to the User's ranking of their review.
      • Selling access by the number of words, diagrams, and pictures within their review that the User sees combined with a User's rating of the review's usefulness to compute a payout (analogous to the newspaper articles by the word payment scheme, e.g. 100% of the word rate for a top rating).
      • By banding together with other Reviewers to form a review library and offering access to their collective reviews using the payment schemes available to individual Reviewers.
  • Licensing their reviews with cooperatives where Users join and pay for access and the member's access fees are allocated by the cooperative according to the Member's collective judgment of the value of the various licensed reviews.
  • For Marketing Content, a User may register to follow Reviewers they trust in the Arkiïs™ system and require in their Profile that Content must be recorded in the Arkiïs™ system to have been evaluated by one of their trusted Reviewers or Reviewer groups who report their independent findings to the Arkiïs™ system about the marketing message, checking for factual accuracy and/or testing the Product being sold in dimensions/aspects important to the User (as indicated in their User Profile) such as its reliability, recyclability, ease of use, aesthetic appeal, green manufacturing, fair trade, fair wages for workers, origin of manufacture, etc. In a preferred embodiment, a User's Profile may include entries for each Reviewer a User is following as well as include filtering preferences such as any requirements Content must satisfy before it may be presented to a User. A Profile may also record the aspects of a review that are important to a User along with a measure of their relative importance. For example, a User may assign relative percentages to aspects of a review in their Profile, assigning 0% to those aspects that are not important and increasing percentages to those aspects that are increasingly important to them. Aspects may include, both subjective and objective measures, including accuracy of message, efficiency rating of a Product, aesthetic appeal, durability, etc. Reviews may be stored in the Arkiïs™ databases along with aspects or dimensions being judged/assessed by a Reviewer as part of a review. A User may require their Reviewers to have purchased and used a Product, as registered in the Arkiïs™ system, before they will consider paying for a review. Such requirements may be included as part of a User's Profile, and database review entries may include whether a confirmed purchase by the Reviewer is present and may reference the purchase proof. A Reviewer may have their friends attest to their using a Product on a regular basis and such attestations may be recorded in the attester's Profile and/or in the attested Reviewer's Profile. In a preferred embodiment, falsely attesting to another's behavior may result in penalties such as reduced revenues, reduced Arkiïs™ integrity score, and/or temporary exclusion from direct participation in Arkiïs™ or required to use a trusted proxy (who is paid a portion of revenues) to access Arkiïs™ on their behalf.
  • This process may be applied to Political Action Committee (PAC) ads and a User may require that only PAC ads that have been fact checked by a specialized reviewing group they trust may be presented to them. In this way, a sufficiently large group of Users may influence the political discourse by only being reachable by candidates and/or PACs that adhere to accepted norms of the group and whose messages are independently audited for accuracy.
  • Content may include metadata stored in the Arkiïs™ databases to associate Content with Reviewers, ratings, scores, blurbs, blog entries, etc. A Reviewer may also include metadata stored in the Arkiïs™ databases to associate the Reviewer with their reviews of Products, Reviewer name, Reviewer integrity rating score, attestations (including visibility e.g., public, only attestor's friends, only Reviewer's friends, only friends of attestor or reviewer, only friends and friends of friends), Reviewer consumption/purchase confirmation of Product including date and time and method of independent verification, etc. An attestor may also include metadata stored in the Arkiïs™ databases to associate the attestor with their attestations, Reviewers attested, attestor integrity score, name of attestor, visibility of attestations, dates of attestations, etc.
  • The Content ranking system of Arkiïs™ prioritizes the presentation of Content according to a Consumer's preferences as stated in their Profile. Such ranking system has a configurable algorithm that can be configured, substituted, or modified by other plug-in algorithms and variable controls. Such algorithms account for these Consumer preferences and create a prioritized queue of Content for the Consumer to consume. Such queue is drawn from all Content whose targeting criteria matches the User's demographics and thus may be presented to the Consumer if the Consumer's preferences also result in a match as determined by the ranking system algorithm. In one embodiment, a Consumer may prefer that Targeted Marketing Content only be ranked according to the payout offered by a Marketer. In such a case, all other aspect variables are weighted with a value of zero and the aspect variable of payout is weighted with a value of one, resulting in a ranking score for each possible Targeted Marketing Content such that the highest paying Content for a Consumer is ranked first, followed by the second highest paying Content, etc. all the way down to the lowest ranked Content being the one that offers the lowest payout. In the case of a tied ranking score, the Targeted Marketing Content that was first (chronologically) offered to a Consumer may be ranked ahead of subsequently offered Targeted Marketing Content with matching score. In another embodiment, a Consumer may prefer that Targeted Marketing Content be ranked according to trusted reviews providing grades on a scale of 1 to 10 in the areas of humor, carbon-footprint of Product, and working conditions for manufacture. In such a case, humor may be weighted 20%, carbon-footprint may be weighted 45% and working conditions 35%, such that the average review rating of all Reviewers a Consumer trusts that have provided a review rating in that category for that Targeted Marketing Content/Product is multiplied by the Consumer's weighting in that aspect and summed together with the other aspects to generate a ranking score for each possible Targeted Marketing Content such that Content may be ranked and presented in order of rank. Such rankings may be dynamically computed for each point at which a Consumer is ready to receive a new piece of Content to account for changes including: new trusted reviews, the changing set of available Targeted Marketing Content that is matched to a Consumer over time, and updates to a Consumer's preferences.
  • A Certifier is a special kind of Reviewer, which may be a Non-Governmental Organization (NGO) and which provides Independent Reviewer Certification about Providers and/or Products along specific metrics. In a preferred embodiment, these certifications are stored within the Arkiïs™ system databases and retrieved in response to a User's Product search or other query. Just like Reviewer revenue, these Certifiers may share in advertising revenues, and/or may share in revenues (e.g. advertising and/or purchasing) when goods are purchased based in part upon information in their Independent Reviewer Certifications. An Independent Reviewer Certification provides a trusted independent check on facts put forth by a Provider or on measured standards applied across multiple vendors. For example, a User may wish to only buy goods that are more than 50% manufactured in the United States, and thus may rely upon one or more Certifiers to independently fact check any such claims put forth by a Provider. Just as negative reviews are also credited in a decision, so are reviews that denounce a Provider as not meeting the mark.
  • A Certifier's Profile may include associated metadata stored in the Arkiïs™ databases including: trust level, integrity rating score, the kind of Certifier (e.g. NGO, independent person), certifications provided including scores and ratings applied to Content and Products, number of Users that trust a Certifier, number of Users that trust Certifier above a threshold (e.g. above 75% trust level), number of Users that trust Certifier at a level in the top quartile of all Certifiers they trust (to normalize trust levels across Users), etc.
  • A Certifier may be paid in many ways through the Arkiïs™ system for their certification services, depending on the embodiment. These ways include all the ways in which a Reviewer may be paid that are described above in Reviewer Revenue. A User may subscribe to a Certifier's certification information by allocating a specific percentage of all the advertising revenues they receive for Products certified by that Certifier. Such a percentage may be under complete control of the User and adjusted in their Arkiïs™ Profile from time to time, as they desire. A Certifier may designate a minimum percentage share that they require in order for a User to subscribe to the certification information they provide. In a preferred embodiment, when a User chooses to subscribe to a Certifier's certification information, an access token is created for the User. This access token is comprised of multiple fields, which may include, but are not limited to the following: an identifier associated with the current session (i.e. attempt to access Content), a User identifier, privileges, restricting group identifiers, etc. Subscribing to a Certifier's certification information may be required by a Certifier in order for any of their certification information to become visible to a User, or alternatively, a Certifier may provide sample selected certification information to all Users while their complete certification information may be reserved for subscribers. Another embodiment involves providing summary or overview certification information, such as only the beginning of an Independent Reviewer Certification report and selected certification facts/grades to all Users and reserving the complete certification report for subscribers. If a Certifier decides to offer limited Independent Reviewer Certification information to Users, a User Profile which is not associated with an access token for the particular Certifier may temporarily be assigned a “guest” access token—this may include fields identifying the current session (i.e. attempt to access content), privileges of a non-subscribing viewer, restricting group identifiers to restrict access to paid certification information, etc. If a Certifier decides to restrict all of its certification information so that only paying Users can view said information, the lack of an access token associated with a User may bar the User from viewing all information. In these situations, a temporary access token may contain fields where restricting group identifiers bar all access, or all privileges may be disabled. For a Certifier wishing to make all of their certification information freely available to the public, the lack of an access token may generate a “guest” token associated with the session which contains fields giving the User full privileges in accessing the Certifier's Content, or the Content may not require an access token. The presence of a User identifier in these “guest” access tokens may depend on the User's privacy settings or the Certifier's Profile settings. A Certifier may offer à la carte pricing where a User, instead of subscribing, may purchase specific certification information or a specific certification report. Such à la carte pricing may be fixed, suggested, minimum, or variable based upon User demographics. Alternatively, a User may subscribe to a specific kind of certification information a Certifier provides instead of to all the certification information they supply (e.g. a Certifier's certification grade of made in the US or certification of a manufacturer paying a living wage to workers in China). The foregoing and following mechanisms describing how a Certifier may be paid, their records maintained, their certifications are shared, etc. can also be adapted and utilized for paying Reviewers for reviews.
  • The Profile of an Certifier may be associated with metadata stored within the Arkiïs™ databases, including but not limited to: the category of Certifier (e.g. political organization, community group, special interest group), the date of the Certifier Profile creation within the Arkiïs™ system, the number of certifications created by the Certifier, and statistics about associated Users who trust or subscribe to the Certifier (in a preferred embodiment, without revealing the identity of these Users). The aforementioned metadata may be public to Users, depending on the privacy settings of the Certifier. The aforementioned metadata may also be selected, deselected, or given a relative importance (e.g. 28%) by a User in order to find Certifiers matching the interests listed within their User Profiles. Statistics about Users (as listed above) may include, but are not limited to: the number of Users who subscribe to the Certifier, the percentage of Users who have unsubscribed from the Certifier, the number of Users who trust the Certifier (e.g. the percentage of Users who have given the Certifier a minimum trust level rating, for example 70%; the percentage of Users for whom the Certifier appears in the top quartile of trust levels associated with Certifiers, etc.) Certifier Profiles may also be associated with metadata related to pricing. This metadata may include, but is not limited to, the minimum acceptable price per view, review, or session; pricing scheme options available to a User (e.g. fixed, one-time subscription, yearly subscription, a la carte reviews, required minimum percentage of revenue from a User); the acceptable price range or percentage of revenue range that a User must pay in order to access the certification information.
  • A User's filtering capabilities extend into certified values and metrics such that a User may filter out advertising messages that do not adhere to the User's specified values and metrics. A User may mix and choose values and metrics that they require be met through their Profile preferences (e.g. require that eight out of ten values be met and two out of three metrics be met.) Examples of values and metrics that a User could filter upon include:
      • Customer support phone calls are answered at an average rate of less than 3 minutes.
      • Wall Street Journal ranks the company's employee satisfaction above 60%.
      • Average customer overall rating of at least 3 out of 5 stars.
      • Products manufactured in their home country.
      • Products sold by corporations where the CEO does not make more than 500 times their least paid worker or 250 times their median paid worker.
      • Products produced with at least 20% post-consumer recycled composition.
      • Products packaged and shipped with minimal packaging as certified by trusted Certifier(s).
      • Products produced using environmentally sustainable methods as certified by trusted Certifier(s).
  • The values and metrics listed above may be stored within the Arkiïs™ databases as metadata associated with a Provider. The values and metrics may be listed alphabetically or by category on, for example, a search page, where Users can select or deselect values and metrics, or assign relative importance ratings to each value and/or metric. Depending on the embodiment, relative importance ratings may add up to 100%, or they may be chosen by the User as any percentage from 0-100%, then normalized by the Arkiïs™ engine so that their relative importance scores (from 0.000 to 1.000 and in aggregate totaling 1.000) can be assigned. Alternatively, a User may choose to copy the settings of another User or a standard published/recommended by a Reviewer. In some embodiments, for metrics/values that can be selected or deselected, the number of parameters which Content does not satisfy may be added together, multiplied by a factor depending on how important the User feels their metrics and values are, and subtracted from the score, representing the suitability of Content for a User, used to rank Content. In embodiments where the metrics or values have a relative importance score, this relative importance score may be multiplied with a value of 1.0 for each factor which is unmet by the Content. If a User feels a value or metric is 0% important, the value/metric will receive an adjusted relative importance score of 0. Then, in the aforementioned embodiments, the adjusted relative importance scores may be added together and subtracted from the score, representing the suitability of Content for a User, used to rank Content.
  • In a preferred embodiment, most of the value and metric requirements are certified by independent Certifiers that have the resources required to effectively provide certification, however, individual Reviewers may also certify values and metrics as part of their reviews. In a preferred embodiment, these certifications are stored within the Arkiïs™ databases and can be accessed in response to a User's query. The Certifiers may register value and metric certifications they support. Multiple Certifiers may register for the same value or metric certification. A Member may submit a Market Request for value or metric certifications that are not sufficiently available from a source they trust. Some Certifiers may certify the practices and integrity of other Certifiers or Reviewers. In such embodiments, the certifications may be part of the metadata associated with the Certifier or Reviewer who has been certified. In the simplest case, Certifiers supply a yes or no certification to be saved into the Arkiïs™ databases as of a particular date for a particular company or product/service of a company. More complex value and metric certifications may entail a grading system such as a letter grade (e.g. A, B, C, D, or F and possibly fine-tuned with a + or −) or numerical percentage of adherence or a numerical grade. Each value and metric certification specifies the scale upon which it is certified and the meaning of the possible grades. Some value and metric certifications may specify an expiration time period before which a certification must be reassessed by a Certifier to remain current. The expiration date of a certification will, in a preferred embodiment, be stored as one of the data fields/tags associated with the certification. Alternatively, the date of certification may be stored as one of the data fields/tags associated with the certification and each User may specify in their Profile preferences the criteria for expiration for one or more value and/or metric certifications.
  • As with Reviewers, a User may choose to follow Certifiers they trust, linking their User Profiles to the Content produced by the Certifier. Depending on the embodiment and a User's settings, when a User follows a Certifier they may receive notifications when a Certifier provides a new certification for a Product or shares Content. This may be done in multiple ways—for example, every time a User decides to follow a Certifier the User's Profile may accrue a data index that is a unique identifier of the Certifier's Profile. Upon each login, or after a specified time interval once logged in, or as a periodic batch process or cron job executed in the background, the Arkiïs™ system may check for new certifications by looking at all of the Certifier identifiers associated with a User's Profile. Alternatively, when a User chooses to follow a Certifier, an identifier associated with the User may be linked to the Certifier's Profile. When the Certifier posts new material, the Arkiïs™ system may access the list of User identifiers, using it to send a notification to any Users who have enabled such notifications within their Profile settings or alternatively, recording such activity in the User Profiles of each listed User for subsequent efficient retrieval on behalf of each such User. Furthermore, depending on the embodiment, a User's connection to a Certifier through following the Certifier may influence their payout for watching advertisements if the advertiser chooses to target their advertisements or hide their advertisements from Users who follow a certain Certifier or group/category of Certifiers. Trust may be provided on a sliding scale between 0% (untrusted) and 100% (absolute trust). A User's relative trust level of a Certifier may be used to sort certifications and allocate payments across Certifiers. Certifiers may also possess integrity ratings to assist others in evaluating their trustworthiness. Additionally, a User may designate value and metric requirements for Certifiers and automatically trust them if the Certifier is itself certified to meet their value and metric requirements by a Certifier they already trust. This may be done dynamically whenever a User accesses a Certifier's Profile within the Arkiïs™ system. Alternatively, these Certifiers may be suggested as possible Certifiers the User might like to trust. Alternatively, Users may initially base their trust of a Certifier upon the average trust level they have achieved by others or only by others with similar Profiles.
  • As shown in FIG. 29, Arkiïs™ provides mechanisms (create match custom certificate 2970) to associate Products (2950) with a User's personalized ratings/certifications (match certificate customized for User 2980) deemed important to them. These personalized ratings are available in many different contexts (2962) such as when shopping online or when in a brick and mortar store. In one embodiment, the personalized (customized for User) ratings match certificate (2980) may be visualized by a wheel with spokes divided into multiple pie sections, each with a size weighted by its relative importance to the User together with perimeter icons identifying the type of measurement in the adjacent pie section. In this embodiment, each section may contain ratings, metrics, and values (some of which may be certified) that are individualized based upon User Profile information (2964) preferences. For example, a perimeter leaf icon may identify one piece of the pie for a User's specified environmental impact manufacturing requirements. This section may be visualized by red meaning few requirements are met, yellow meaning an average amount are met, and green meaning most are met. Some of the metrics included within such visual representations of personalized ratings may include how readily the Product (2950) itself may be recycled at the end of its life or the relative amount of energy the production of that Product (2950) required as compared to similar Products as noted in database of information on detected items (2966). In the aforementioned embodiment, the pie section may be overlaid with the symbol for the certifying Certifier in black print. A Product in a store may contain a small QR code or RFID tag to identify the Product to a User's Google® Glasses and/or other mobile device (item detected by User's device 2960) and allow the product's values certifications to be presented (delivered to User by their device 2990) and customized for the Profile of the User (2964) viewing the Product. The customized values certification may be displayed in a standardized presentation for easy recognition and comparison with other Products. More easily on a website, a distinct Arkiïs™ template could be present for participating Products that also identifies their individualized values certification for the User viewing a webpage offering Products.
  • A User may be willing to pay, for example, 15% more for a Product that adheres to values standards they require, and may wish to show their stance to the world by having an easily recognizable unique look and feel for Products that adhere to such a values standard. The system's platform allows for these desires to be made known to Providers, who can then meet these desires if enough Users stand behind a request. For example, Apple could offer a special iPhone® whose case is colored with a distinctive green plaid pattern that is readily identifiable and only placed on these special phones that are produced in factories certified to be manufacturing using sustainable techniques including: paying a living wage, carbon neutral production and shipping, and with a recyclable battery. The same distinctive packaging could also be offered on other Products such as iPad®s and MacBooks that are also certified to adhere to the same standard. Users may band together to make a Market Request for such branding where it is not currently offered.
  • A Market Request is a published request for Products (e.g. Content, goods, services, certifications, or reviews) that do not exist yet or are out of stock but which may be desired by Users. A User may publish a Market Request for something they conceive of and would like to acquire, or for an item they would like to locate in used condition. Depending on the embodiment, a Market Request may be published through some sort of forum, discussion board, poll, or “wall” allowing Users to post their own Market Requests and endorse those of other Users. These requests will be stored in the Arkiïs™ databases and may have associated data fields including, but not limited to: date of request creation, number of endorsements, encrypted identifiers of Users who have endorsed the Market Request, etc. Market Requests may require associated keywords when creating the request, in order to facilitate simple searches. Market Requests may be placed into categories in some embodiments, and may be sorted, either automatically or by the User, through different variables depending on the embodiment including number of votes, percentage of positive votes, etc. A User may support their own or another's Market Request at a level of their choosing to encourage its being created or offered. Simple support may just entail a positive vote in support of a Market Request. Each vote may augment a variable integer within metadata associated with the Market Request in order to keep track of the number of votes, which may be used to rank Market Requests for display to Users. Alternatively, an encrypted identifier of each User who has voted for a Market Request may be stored within the Market Request metadata. More substantial support may be making a commitment to buy the object of the published request in advance of its creation or availability, perhaps even putting down a deposit in advance. Alternatively, a Provider may publish a request to spur and gauge the interest of Users to proposed Content, goods, services, or reviews they are considering offering. A User may disseminate a Market Request by using Arkiïs′® targeting capabilities to reach other Users that are more likely to respond positively. Depending on the embodiment, this dissemination may be done through the use of SyncGroups or friendship networks or linked social media networks. A Market Request may include requirement of anonymity-preserving notification from a supplier once requested goods or services are in stock or available. The sender may help prioritize their message with the recipient by paying them to accept it. Alternatively, the recipient may encourage notification by agreeing to cover the nominal Arkiïs™ fee for anonymously brokering the message.
  • The Market Request mechanism may be applied to services and goods, whereby a Consumer may commit to purchase something they want but does not yet exist, such that when a sufficient body of Consumers commits a Goods & Services Provider may step in and fulfill the need. For example, a segment of the population may desire a smartphone made from recycled materials, while another segment may desire one completely manufactured in the United States. Members of these segments may commit to buying a smartphone that satisfies their criteria, and by banding together with other Arkiïs™ Users, entice a Goods & Services Provider to fulfill the need, given the Provider's reduced risk from the committed pre-orders. This feature of the Arkiïs™ system may allow Providers to reduce the uncertainty and costs of maintaining speculative inventories and move more toward demand-driven manufacturing. If more than one Marketer is competing to meet a Market Request, the Consumers may choose from among the competing Marketers and may make a monetary commitment/deposit/“pre-order” to select a particular Marketer of their choosing.
  • A User may find that there are no Reviewers in a Product or service area in which they are interested in purchasing. In such cases, they may publish a Market Request via Arkiïs™ indicating the need for such independent reviews and may commit to pay for such reviews out of their future ad payouts in that area. Potential Reviewers may be required to satisfy the User's predefined criteria for gaining their trust as a Reviewer in order to claim the User's pre-commitment.
  • Arkiïs™ allows for the efficient discovery of markets for non-existing reviews by connecting the stated Market Requests of Consumers with those potentially able to fulfill them. This may reduce the risk of the review Providers since they may anticipate a certain level of preallocated payout in addition to whatever payouts they normally accumulate as their reviews are utilized. This may make it easier for the Reviewer to judge whether it is worth their time to invest in reviewing a new area since the preallocated payouts may help them judge the return they can expect. This market may also produce competition among the Reviewers that may reduce the cost of reviews over time.
  • Arkiïs™ may provide the infrastructure and technology to share a small portion of revenues with those people or groups that helped to direct the User's Content choices. Arkiïs™ may maintain the accounting and distribution of funds to reward those who assist helping a User decide what Content to consume.
  • 12. Providing Payment for Content, Goods, and Services
  • Arkiïs™ provides payment systems that allow for multiple ways to pay for goods and/or services. Submitting a payment through Arkiïs™ ensures the safeguarding of a User's personal information and simplifies the verification of purchases in order to track a User's Arkiïs™ credits and boost their Consumer Marketing Performance Score to reflect their integrity rating. These payment systems may be used while retaining the anonymity of the payment initiator and/or recipient from each other.
  • In a preferred embodiment, a Marketer (402) may have the ability to create whatever formulas they desire to value how much they will (bid 404) pay a User to consume their Targeted Marketing Content. The formula may take as input information in a User's Profile (414) such as traditional demographic information, as well as novel information not present in those models such as the Consumer's Arkiïs™ marketing performance score (410) that predicts the likelihood of a purchase. In the case of SyncGroup Profiles, the formula may apportion the payout across the SyncGroup members either evenly or by a weighted metric such as their relative contribution to the SyncGroup's Arkiïs™ marketing score. These new metrics include the context (412) such as the User's purchase intents, current emotional state (e.g. mood), friends and business associates that they are currently interacting with, current events in the world, Content recently consumed, etc.
  • Inputs to a bid's (404) payout formula may vary widely over time to reflect the value (actualize bid offered 430) an advertiser places on delivering (yes 426) a Content (406) message during a particular context (412) such as the current time. Such formulas in the bid (404) allow for a negative payout/actualize bid offered (430) at times when the Marketer (402) does not want the Content (406) to be consumed by a User, thus requiring at times for a User to pay Marketer (402) to consume Content (406). A Marketer may even require an infinite negative payout to signify that in the current context (406) a User is prohibited (no 424, not delivered 422) from consuming their Content (406) message through the Arkiïs™ system.
  • A Marketer may include in their payout formula an aspect to account for when an advertisement has been recommended or forwarded by another User to possibly apportion some of the payout to the recommending or forwarding User and/or to reduce or increase the payout to the consuming User. Such sharing may, in some embodiments, be apportioned up the chain transitively in a decaying manner (e.g. geometrically by halving) to reward key recommenders that contribute to a Content message becoming viral. For example, if Alice watches and then forwards the message to Bob, who watches and forwards it to Charlie, who watches and forwards it to Dawn, the payout related to Dawn consuming the message Content may pay Dawn $2.00 with Charlie receiving $1.00, and Bob getting $0.50, and finally Alice getting $0.25. Likewise, when Charlie viewed, he may have received $4.00, and Bob getting $2.00 and Alice receiving $1.00. If Alice sends it to multiple people and ultimately significantly contributes to a viral campaign, she may be duly compensated in this matter for her network effect in some embodiments. A Marketer may vary the payout formula to account for how much a message has been viewed, such as for example, to account for a message going viral and being suddenly watched by huge numbers of individuals. Such payout adjustment may reduce or increase the payout according to the number of views, likes, or other recommendations and comments a Content message has received.
  • Another aspect of the changing formula is that if a User suspends watching a message mid-stream, when they are ready to resume play, the formula may no longer provide the same payout that was originally promised when they first started watching the commercial and thus the User may choose to defer resuming the message until the same or similar circumstances/context return (if ever) such that the payout is comparable to the original promised amount.
  • In some embodiments, a User may see average Targeted Marketing Content payouts for those Users whose Profile demographics are similar to their own profile's demographics. This may aid the User in configuring their own profile's filters related to minimum Targeted Marketing Content payouts that they are willing to accept based upon norms for their demographics.
  • A User may configure their Profile to filter out advertising whose payout is disadvantageous to their current situation, needs, and/or desires. For example, Users may configure their Profiles such that when watching live sporting events, their feed is never to be delayed. Because Targeted Marketing Content may be cut off, due to, for example, being at the end of a commercial break, the User, Arkiïs, or another service provider may select Targeted Marketing Content to statistically maximize the User's average payout.
  • The following scenario depicts an example of advertisement selection based on a User's Profile preferences. Daniel is watching live volleyball using his customized Arkiïs™ Roku™ channel. At the end of one of the games, the live broadcast goes to commercial break that is expected to be 3 minutes long. Daniel's Profile preferences require commercials that are rated as funny by others with similar tastes to Daniel as long as their pay is not more than 20% below the highest paying commercial available to him at any given time. At this time the Arkiïs™ cloud servers determine, based upon Daniel's Profile, that the following commercials in Table 2 could be served to Daniel:
  • TABLE 2
    Title Duration Payout Rate/Min. Funniness
    Pepsi ® Elton 1.0 min $1.25 $1.25 9
    John
    Coors Beer 1.0 min $1.50 $1.50 6
    Geico 0.5 min $0.75 $1.50 5
    Insurance
    OfficeMax 0.5 min $0.85 $1.70 3
    eTrade 1.0 min $1.33 $1.33 1
    Lexus Hybrid 1.0 min $1.65 $1.55 0
  • The software-enabled algorithm on the Arkiïs™ cloud servers computes that the highest paying commercial is OfficeMax at $1.70 per minute; however, there are three funnier commercials that may be given priority based upon Daniel's Profile. Per Daniel's Profile requirements the servers do not select the Pepsi® Elton John commercial because it is not within 80% of the highest paying commercial; instead the servers stream Coors and then Geico to Daniel in the first one and a half minutes of the break. The servers compute that OfficeMax plays third, leaving one minute in the current break and Lexus as the highest paying and Pepsi® as the funniest remaining. The servers play Pepsi® as the last commercial before returning from break since it is now within 20% of the highest paying remaining commercial. Daniel has earned a total of $5.95. Alternatively, Daniel receives the list of available targeted commercials before they are played and using his smartphone he reviews the list and rejects the OfficeMax commercial and gives his reason as not being in the mood. The rejection and reason are transmitted to the Arkiïs™ cloud servers that do not immediately adjust his Profile since his reason was given as being very transitory, however, the rejection is recorded for future reference to see if a pattern develops. The server's selection algorithm honors his rejection and adjusts the computation of which commercials he is served.
  • Inputs to the formula may include portions of the ad that have been consumed, and in what fashion. The simplest such description is a User consuming an ad in its entirety from beginning to end in a single uninterrupted session. More complex descriptions include scenarios where the User does not finish the ad in a single session and returns to it later to complete, perhaps rewinding to an encoded entry point before resuming. The Consumer may even fast-forward and skip some portions altogether. The Marketer may structure their payout formula such that partial payouts may be earned as the ad is consumed based upon how far into the ad a User has consumed (e.g., viewed or listened) and in what manner was that point reached. For example, all payouts may be withheld until the first ten seconds of the ad has been consumed, or withheld until the whole ad is consumed in its entirety, or even require the consuming to be uninterrupted (never paused).
  • A Consumer always has the option to red-flag Content as being inappropriately targeted toward them. This could be because they judge it to not match their objectives, interests or moral thresholds. When red-flagging, the User may explain the reason(s) for rejection and, in a preferred embodiment, in return they may receive the full payout as if they had consumed the complete message. This Feedback allows the Content Producer to adjust their targeting to potentially reduce future conflicts. A User's red-flagging history may be recorded as part of their Profile and abuse of the feature could lead to advertisers reducing their payout formula to such a User or avoiding them altogether.
  • FIG. 30 is an exemplary stream selector system that can be used in conjunction with the technologies described herein.
  • As seen in FIG. 30 Stream Selector 3000 is fed an assortment of Live Broadcast Streams 3070 together with Static Stored Streams 3071 as inputs and selects one such stream to be the Deliver Stream 3010. The selection is performed by analyzing Contextual Information 3080, Stream Meta Information 3072, and Profile Information 3050. Profile Information 3050 may be augmented by the Create Feedback 3020 in response to Delivered Stream 3010. FIG. 31 shows exemplary matching multiple Marketer 402 Bid(s) 404 that are actualized bid(s) offered 430 via static stored streams 3071. FIG. 31 shows two examples. On the left is an example of a single User receiving bids from multiple advertisers. On the right is an example of a single advertiser sending bids to multiple Users. As shown in FIG. 31, only bolded bids are delivered, stream 3010. Additionally FIG. 31 shows an example for a single Marketer 402 with multiple Bid(s) 404 for different User Profile(s) 414 where only bolded outline circles/blocks are yes 426 Deliver bid 420 in actualize bid offered 430 and unbolded outline circles/blocks are No 424 Not delivered 422. Explaining the left side example from the perspective of the flow diagram of FIG. 2, content selector 208 receives the three bids. Only the bolded bid is delivered to User 210 resulting in a payment module credit of $0.25 at 216. Each of the bids has associated therewith meta-data as shown generally at 204. Turning to the example on the right side of FIG. 31, five Users 210 submit bids for an advertisement. The examples in FIG. 31 can also be seen from the perspective of FIG. 4 where the marketer's perspective is shown. On the left example, there are three marketers 402. All three marketers 402 generated bids 404 and all three became actualized 430. Each marketer generates its bid without necessarily having knowledge of the bids by other marketers. On the right example, there is a single marketer 402 that is looking at five profiles 414. Of the five bids, three pass through content selector and delivered to User 210 resulting in a credit by payment module 216 to each corresponding User 210.
  • If a Consumer makes a forward-looking Assertion about their intention to purchase a particular Product in a given time frame, this may increase the payout value for receiving related ads. Advertisers may provide payouts for such ads that are divided between the standard cash portion for watching this type of advertisement and a coupon or rebate for any Product in that category (not necessarily that advertiser's product) representing the added value due to the Consumer's forward looking Assertions. In this way, advertisers only pay for forward-looking Assertions that are actually fulfilled. This allows an advertiser to value a User's statements in an area where the User has no track record by tying payment to fulfillment of their forward-looking Assertion. This can be accomplished in many ways including: providing a coupon for a purchase that matches the User's professed intentions, providing a rebate where a proof-of-purchase matching the professed Assertion qualifies for the rebate, or providing a monetary payout that is contingent upon confirmed Assertion fulfillment (e.g. purchases) by Arkiïs. The payout may include a bonus that triggers if the purchase has additional qualities not originally specified in the User's professed Assertion. For example, if a User indicated they were going to buy a TV, an advertiser might offer a bonus if they chose an OLED type of TV because the advertiser believes that if the purchaser researches OLED TVs that they are more likely to buy their brand.
  • The following example shows one embodiment of the system which utilizes ensured integrity payouts: Frank is in the market for a new large screen television and Samsung targets him with an ad that will pay him $25 if he buys any 50″ or larger television in the next three months because they are so confident that if they can reach him with this message about their new OLED technology that he will buy their television based on his Profile showing that he is a videophile. He receives a coupon or rebate offer that requires proof of purchase of a television and is paid, even though he buys the competing LG OLED television instead.
  • When using an Arkiïs™ identifier, a User may choose to shop at brick and mortar stores with cash while retaining the traceability features of using a credit card. For example, many stores can locate a receipt in their systems electronically by the shopper presenting the credit card used for purchase. When paying with cash, a User may present an Arkiïs™ identifier in one of several possible ways including: swiping an Arkiïs™ card using the credit card terminals, waving their Arkiïs-enabled phone (e.g. using Near Field Communication (NFC) feature), scanning an Arkiïs™ loyalty card barcode or QR code, and/or manually typing in their Arkiïs™ identifier number on a terminal. Subsequently, if the shopper were to return to the store and needed their receipt, for example, because they wished to return an item, the store would be able to locate it using their Arkiïs™ identifier presented again in one of these ways. Alternatively, at the time of purchase, a store may transmit a receipt to Arkiïs™ for storage with the purchaser's Profile, thus allowing easy retrieval by the User at a future time.
  • In some embodiments, Arkiïs™ may offer a feature that is configurable by each User such that whenever that User is shopping at the store either physically or online, the store may receive temporary access to their complete purchase history at that store for the duration of their shopping experience.
  • The Arkiïs™ identifier may vary by time or by store in some embodiments. For example, there may be a handshake protocol (an exchange of signals between a store and a customer when initiating communications in order to ensure anonymous synchronization) whereby the store presents an identifier to uniquely identify the store (e.g. Target or Safeway) and a unique version of the User's Arkiïs™ identifier is generated from the store's identifier for use each time the User visits that store to allow the store to retrieve permissible details about the User from Arkiïs. The store-specific identifier may be provided using many of the same techniques in which a general identifier could be given by first supplying the store's identifier to the process which generates the User's store specific identifier. In some embodiments, a smartphone could see the names of wireless networks in its vicinity and deduce the store in which it is present and put forth a digital identifier (e.g. a QR code) on the smartphone's display for scanning by the register or transmitted to the register such as by NFC. Alternatively, GPS could be used to identify the store or NFC, or some combination of several methods. The User's identifier may vary by date, with the identifier changing periodically, such as monthly, or every two weeks. Were the customer to return to the store wishing to locate their receipt, they could provide their identifier as of the date of their purchase, or if unsure, provide a range of identifiers until a match is found, or check their Profile to see what identifiers were passed out and only supply those.
  • In addition, the cash identifier may also be used to build a User's Profile to include a record of confirmed purchases paid for by cash. These verified purchases will boost a User's Consumer Marketing Performance Score, especially if the purchase was the fulfillment of an Assertion. Therefore, the use of an Arkiïs™ identifier when making a purchase will augment the value of a User's attention to Providers and increase the profits the User makes when receiving advertisements relevant to a verified purchase.
  • For years, some credit card suppliers have allowed their customers to generate virtual credit card numbers that may only be used for a single purchase, for a set amount of time, and/or which may have a dollar limit on that purchase as selected by their customer. These one-time credit card numbers are traditionally used for online purchases to help reduce fraud and ensure unauthorized recurring charges do not appear on a credit card. Arkiïs™ facilitates, preferably with existing credit card providers, the generation and integration of these virtual credit card numbers and allows for purchases made with these cards to automatically be tracked in a User's Profile like a cash identifier. Arkiïs™ preferably maintains the total or partial anonymity of the User from vendors while partnering with other payment technology companies and servicers to facilitate returns and find receipts, thus opening a new market for these cards at brick and mortar stores to have the anonymity of cash.
  • In some embodiments, Arkiïs™ may offer a new kind of virtual credit card number that only places restrictions on charges while allowing unlimited credits (e.g. Product returns or advertising payouts to Users) to further facilitate returns using the same card which may no longer be valid for purchases at the time of return. Arkiïs™ may also provide a virtual card number in alternate embodiments that may only be used at one merchant, specified either at the time of virtual number generation or upon the first use of the virtual card number. In further embodiments, a card number may be generated that may only be used for a predetermined number of purchase transactions. Arkiïs™ may allow virtual credit card numbers to be used with credit card providers that do not provide this service by acting as an intermediary that does provide such numbers, then charges the original credit card provider using a traditional card number without revealing that number to the merchant and/or optionally not revealing what was purchased or what store to the credit card issuer. In the case of rebate credit cards, the User may request Arkiïs™ to properly categorize their purchase with the credit card issuer (e.g. gasoline or restaurant) so that they are properly credited with the appropriate premium rebate category (e.g. 5% for gasoline or 3% for restaurants). Depending on the embodiment, Arkiïs™ may integrate support for virtual credit card numbers through any of the mechanisms used for supplying a cash identifier. The likes of Chip-n-Pin (i.e. an integrated circuit chip card that requires a PIN to make a purchase) may be combined with virtual credit card numbers where the circuit on the credit card automatically generates and supplies a virtual credit card number. Such credit cards may be integrated with smartphone or smartwatch technology to provide an electronic wallet that securely contains all a User's payment options together with Arkiïs™ solutions to retain anonymity and tracking of confirmed purchases to build a rich profile.
  • The Arkiïs™ system of tools and processes includes multiple mechanisms by which third parties (preferably independent) may provide value including the addition of information, reviews, add-on tools (e.g. plug-ins), certifications, rankings, and ratings to Users in areas such as ranking or filtering Content and judging values and metrics of advertisements as well as goods and services. Users may wish to share their revenue and/or directly pay for these services because the value created by these services is great, and without payment the benefit of such services would likely not be available.
  • The Arkiïs™ system includes multiple ways in which remuneration may be supplied to third parties. It may be allocated as a percentage of payouts and/or purchases. Based on the embodiment, this allocation may be distributed across multiple third parties based upon their applicability, trust level, usage and/or value. For example, the period of time a User reviews the Content may be used to prorate the portion of the overall allocation that is attributed to the Content or alternatively, Content remuneration may be prorated based upon the trust level, grade or value the User places on information, possibly combined with the average or aggregate trust level, grade or value of all other Users or of only those Users with similar Profiles. Alternatively, allocations may be assigned to third parties individually.
  • Additionally, the suppliers of Content, goods, or services and the like may wish to compensate third-party Providers (e.g. Reviewers, advocates, and Champions) that in any way increase the probability of their wares being purchased and/or consumed. Sellers may choose to allocate a percentage of the purchase price of Products toward third parties whose work impacts the likelihood of a sale or participates in a buyer's decision process. In some embodiments, the seller may pay third parties regardless of whether their Product is actually purchased. Payments may be triggered whenever a potential buyer accesses that third party's information about their Product. The allocation may be a total allocation that is divided up proportionately across contributing third parties based upon their statistically determined contribution value. In alternate embodiments, each third party may be given a specific allocation.
  • In some embodiments, third parties may have minimum payout requirements that must be agreed to before their Content is visible or alternatively, their Content may only be partially visible if terms are not agreed to, or they may have multiple tiers of revelation and acceptance of each tier's terms (e.g. clicking to reveal more information) additionally reveals that tier's information. Required terms may be a fixed cost for information or a conditional cost that is only triggered if a particular action is taken or event occurs such as a purchase.
  • When information may be partially considered or consumed, payment structures may be prorated or adjusted based upon the relative portion of information considered, relied upon, and/or the amount of time such information is perused.
  • The following example usage scenario describes one embodiment of the disclosed system. Melody wants to buy a Blu-Ray player in the next month and posts her intent in her Arkiïs™ Profile. Her Profile shows that she only wants to buy consumer goods Products that are manufactured using sustainable techniques as certified by The Nature Conservancy. She also wants a Product with an interface that scores at least 4 out of 5 in usability as scored by a Human Computer Interaction expert she trusts. Because of this, she is offered a commercial for a Sony player that pays $1 for a Product that meets her criteria except that it does not have a usability certification from a Reviewer she already trusts but it has been highly reviewed by Joe, someone she does not yet trust. She accepts the commercial and the commercial ends with a link to Joe's review. She clicks on the link and reads the review from Joe, the Reviewer she is not familiar with, but who has a following of several hundred Users that give him high trust marks, including her friend Kristen. She studies the review and watches some of the review's attached video segments that demonstrate the usability features of the Sony player. Given Joe's review and the low price tag, Melody decides to take a chance on Joe and buy the player. Sony pays Joe $0.50 for presenting his review to Melody and when she subsequently follows through and purchases it, Sony pays him another $2.00. After receiving the player and using it for two weeks, Melody decides she is happy and raises her trust level on Joe from 0% to 50% and agrees to pay Joe $0.20 for each review she reads of his. A few months later, after not buying another Product based upon Joe's review and hearing of a friend who did end up buying it and was unhappy, as predicted by Joe, she raises her trust level on Joe to 75% and now agrees to pay him $0.30 for each review of his that she considers. Sony also pays The Nature Conservancy $0.25 for showing in their ad the Nature Conservancy's certification that the player's manufacture in China is using sustainable practices such as paying a living wage, buying carbon offsets, and not polluting the environment. Sony pays another 1 upon Melody's purchase since the certification was a prerequisite she listed in her buying Assertion.
  • 13. Exemplary General Purpose Computing System
  • The system described herein may be implemented on a variety of general purpose or specialized computing systems. General purpose computing systems may include, laptops, desktop computers, DVR players, Roku™ devices, Blu-Ray players, set top boxes, cable boxes, etc. Specialized devices may include a DVR that is designed especially for the Arkiïs™ system to automatically collect data about a User and prepare Content for their on demand viewing. Such devices may be wholly or partially implemented with cloud functionality.
  • FIG. 32 depicts a generalized example of a suitable general purpose computing system 3200 in which the described innovations may be implemented. The computing system 3200 is not intended to suggest any limitation as to scope of use or functionality, as the innovations may be implemented in diverse general-purpose or special-purpose computing systems. For example, the computing system 3200 can be any of a variety of computing devices (e.g., desktop computer, laptop computer, server computer, tablet computer, media player, gaming system, mobile device, etc.).
  • With reference to FIG. 32, the computing system 3200 includes one or more processing units 3210, 3215 and memory 3220, 3225. In FIG. 32, this basic configuration 3230 is included within a dashed line. The processing units 3210, 3215 execute computer-executable instructions. A processing unit can be a general-purpose central processing unit (CPU), processor in an application-specific integrated circuit (ASIC) or any other type of processor. In a multi-processing system, multiple processing units execute computer-executable instructions to increase processing power. For example, FIG. 32 shows a central processing unit 3210 as well as a graphics processing unit or co-processing unit 3215. The tangible memory 3220, 3225 may be volatile memory (e.g., registers, cache, RAM), non-volatile memory (e.g., ROM, EEPROM, flash memory, etc.), or some combination of the two, accessible by the processing unit(s). In some implementations, the memory 3220, 3225 stores software 3280 implementing, at least in part, one or more innovations described herein, in the form of computer-executable instructions suitable for execution by the processing unit(s).
  • A computing system may have additional features. For example, the computing system 3200 includes storage 3240, one or more input devices 3250, one or more output devices 3260, and one or more communication connections 3270. An interconnection mechanism (not shown) such as a bus, controller, or network interconnects the components of the computing system 3200. Typically, operating system software (not shown) provides an operating system for other software executing in the computing system 3200, and coordinates activities of the components of the computing system 3200.
  • The tangible storage 3240 may be removable or non-removable, and includes magnetic disks, magnetic tapes or cassettes, CD-ROMs, DVDs, or any other medium which can be used to store information in a non-transitory way and which can be accessed within the computing system 3200. The storage 3240 stores instructions for the software 3280 implementing one or more innovations described herein.
  • The input device(s) 3250 may be a touch input device such as a keyboard, mouse, pen, or trackball, a voice input device, a scanning device, or another device that provides input to the computing system 3200. For video encoding, the input device(s) 3250 may be a camera, video card, TV tuner card, or similar device that accepts video input in analog or digital form, or a CD-ROM or CD-RW that reads video samples into the computing system 3200. The output device(s) 3260 may be a display, printer, speaker, CD-writer, or another device that provides output from the computing system 3200.
  • The communication connection(s) 3270 enable communication over a communication medium to another computing entity. The communication medium conveys information such as computer-executable instructions, audio or video input or output, or other data in a modulated data signal. A modulated data signal is a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media can use an electrical, optical, RF, or other carrier.
  • The innovations can be described in the general context of computer-executable instructions, such as those included in program modules, being executed in a computing system on a target real or virtual processor. Generally, program modules include routines, programs, libraries, objects, classes, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or split between program modules as desired in various embodiments. Computer-executable instructions for program modules may be executed within a local or distributed computing system.
  • The terms “system” and “computing device” are used interchangeably herein. Unless the context clearly indicates otherwise, neither term implies any limitation on a type of computing system or computing device. In general, a computing system or computing device can be local or distributed, and can include any combination of special-purpose hardware and/or general-purpose hardware with software implementing the functionality described herein.
  • 14. Exemplary General Purpose Mobile Device
  • The system described herein may be implemented on a variety of general purpose or specialized mobile devices. General-purpose devices may include, iPhone®, iPad®, Android Tablet, Android Smartphone, Smartwatch, etc. Specialized devices may include a smartwatch or similar mobile device that is designed especially for the Arkiïs™ system to automatically collect data about a User and coordinate with the various devices a User interacts with. Such devices may be wholly or partially implemented with cloud functionality.
  • FIG. 33 is a system diagram depicting an exemplary general purpose mobile device 3300 including a variety of optional hardware and software components, shown generally at 3302. Any components 3302 in the mobile device can communicate with any other component, although not all connections are shown, for ease of illustration. The mobile device can be any of a variety of computing devices (e.g., cell phone, smartphone, handheld computer, Personal Digital Assistant (PDA), etc.) and can allow wireless two-way communications with one or more mobile communications networks 3304, such as a cellular, satellite, or other network.
  • The illustrated mobile device 3300 can include a controller or processor 3310 (e.g., signal processor, microprocessor, ASIC, or other control and processing logic circuitry) for performing such tasks as signal coding, data processing, input/output processing, power control, and/or other functions. An operating system 3312 can control the allocation and usage of the components 3302 and support for one or more application programs 3314. The application programs can include common mobile computing applications (e.g., email applications, calendars, contact managers, web browsers, messaging applications), or any other computing application. Functionality 3313 for accessing an application store can also be used for acquiring and updating applications 3314.
  • The illustrated mobile device 3300 can include memory 3320. Memory 3320 can include non-removable memory 3322 and/or removable memory 3324. The non-removable memory 3322 can include RAM, ROM, flash memory, a hard disk, or other well-known memory storage technologies. The removable memory 3324 can include flash memory or a Subscriber Identity Module (SIM) card, which is well known in GSM communication systems, or other well-known memory storage technologies, such as “smart cards.” The memory 3320 can be used for storing data and/or code for running the operating system 3312 and the applications 3314. Example data can include web pages, text, images, sound files, video data, or other data sets to be sent to and/or received from one or more network servers or other devices via one or more wired or wireless networks. The memory 3320 can be used to store a subscriber identifier, such as an International Mobile Subscriber Identity (IMSI), and an equipment identifier, such as an International Mobile Equipment Identifier (IMEI). Such identifiers can be transmitted to a network server to identify users and equipment.
  • The mobile device 3300 can support one or more input devices 3330, such as a touchscreen 3332, microphone 3334, camera 3336, physical keyboard 3338 and/or trackball 3340 and one or more output devices 3350, such as a speaker 3352 and a display 3354. Other possible output devices (not shown) can include piezoelectric or other haptic output devices. Some devices can serve more than one input/output function. For example, touchscreen 3332 and display 3354 can be combined in a single input/output device.
  • The input devices 3330 can include a Natural User Interface (NUI). An NUI is any interface technology that enables a user to interact with a device in a “natural” manner, free from artificial constraints imposed by input devices such as mice, keyboards, remote controls, and the like. Examples of NUI methods include those relying on speech recognition (including using lip-reading technology to improve accuracy), touch and stylus recognition, gesture recognition both on screen and adjacent to the screen, air gestures, head and eye tracking, voice and speech, vision, touch, gestures, and machine intelligence. Other examples of a NUI include motion gesture detection using accelerometers/gyroscopes, facial recognition, 3D displays, head, eye, and gaze tracking, immersive augmented reality and virtual reality systems, all of which provide a more natural interface, as well as technologies for sensing brain activity using electric field sensing electrodes (EEG and related methods). Thus, in one specific example, the operating system 3312 or applications 3314 can comprise speech-recognition software, that may optionally include lip-reading technology for improved accuracy, as part of a voice user interface that allows a user to operate the device 3300 via voice commands. Further, the device 3300 can comprise input devices and software that allows for user interaction via a user's spatial gestures, such as detecting and interpreting gestures to provide input to a gaming application.
  • A wireless modem 3360 can be coupled to an antenna (not shown) and can support two-way communications between the processor 3310 and external devices, as is well understood in the art. The modem 3360 is shown generically and can include a cellular modem for communicating with the mobile communication network 3304 and/or other radio-based modems (e.g., Bluetooth 3364 or Wi-Fi 3362). The wireless modem 3360 is typically configured for communication with one or more cellular networks, such as a GSM network for data and voice communications within a single cellular network, between cellular networks, or between the mobile device and a public switched telephone network (PSTN).
  • The mobile device can further include at least one input/output port 3380, a power supply 3382, a satellite navigation system receiver 3384, such as a Global Positioning System (GPS) receiver, an accelerometer 3386, one or more other sensors 3387 (e.g., thrust/jerk sensor, barometer, thermometer, hygrometer, and/or other types of sensors), and/or a physical connector 3390, which can be a USB port, IEEE 1394 (FireWire) port, and/or RS-232 port. The illustrated components 3302 are not required or all-inclusive, as any components can be deleted and other components can be added.
  • Mobile devices (and more generally computers) afford the opportunity to automatically collect vast amounts of detailed Profile information, such as illustrated in FIG. 11 with data generated by User's mobile devices and computers 1110. Within the Arkiïs™ system, Users may view and change their collection controls whenever and however they desire, and have complete control over the flow of their data into the system. The User may control collection at various levels of granularity depending on the embodiment as well as create rules that specify different collection criteria under different circumstances. Users may also configure rules to notify and/or alert them when they could potentially and/or are actually being recorded (e.g. audio, video, photo, social interaction history) by the automated collection of Profile information being performed by the Arkiïs™ system on behalf of another Arkiïs™ User on the other User's device. For example, in some embodiments, such as illustrated in FIG. 34, a User may have rules triggered by their location (Spatial Rule), other Users if they are around and engaged in activity (Social Rule), or time (Temporal Rule). As further shown in FIG. 34, rules are either default, whitelist, or blacklist rules. In one embodiment, initially, all collection is off and this is overridden by default rules that specifically enable collection of specific kinds of data. Default rules specify a static collection Profile, indicating the kinds of data to collect, the frequency of collection, and the accuracy to be retained for the collected data. A default rule may specify that a kind of data is not collected by default yet still specify a default frequency of collection and/or a default accuracy to retain, the purpose being to supply a default value for these fields in the event that a whitelist rule enables collection but does not specify frequency and/or accuracy. The static collection profile is then continually adjusted according to the whitelist and blacklist rules as they come into and out of applicability over time. The whitelist and blacklist rules are maintained in a sequential ordering that represents their relative priority and are applied in the priority order in which they are listed. In a preferred embodiment, once an aspect of collection is specified by a rule that triggers, no further lower priority rules are applied to that aspect at that moment in time (e.g. if collection of a kind of data is turned on by a whitelist rule or turned off by a black list rule, lower priority rules for that kind of data do not apply until the triggering rule no longer applies). A blacklist rule can be thought of as being equivalent to a whitelist rule with the same trigger that specifies a frequency of collection of zero, meaning the data is never collected. The ordered whitelist and blacklist rules are processed in priority order and each rule's condition is tested and if true, the rule is applied to enable some aspect of data collection (e.g. turning collection on or off, specifying the frequency of collection, or specifying the accuracy of the collected data). Condition building blocks are time, location, and social that may be combined together using Boolean operators including: AND, OR, XOR, and NOT. To make the app easier to use for those not wishing to have app complexity, the whitelist and blacklist functionality may be hidden, partially disabled, and/or completely disabled when the User Profile does not specify them as being an expert and/or according to the User Profile preference. Selecting what data to collect is too complex and time consuming for one or more humans to carry out and thus requires the automation of a rule based system implemented with a one or more computing devices, which when using this method is able to meet the exact desires of a User to control their data collection, previously unattainable without this method.
  • A temporal condition for a rule tests the local time for the User to see whether it falls between a start and end time. By default, such tests are time zone relative so that a rule set in the Pacific Time Zone to trigger between 9 am and 10 am still applies between 9 am and 10 am when the User happens to be located in the Eastern Time Zone instead of shifting it to between noon and 1 μm. However, a User may designate that a temporal condition be absolute and thus is adjusted for the local time zone as compared to the time zone in which it was created. Temporal conditions may also specify calendar components similar to how a calendar application functions such as allowing selection of days of the week, a recurrence interval, etc.
  • A spatial condition for a rule tests whether the User's present location falls within a specified geographical area. The geographical area of a spatial condition may be specified as either a circle defined by its center and radius or as a polygon specified by its vertices. Such a test may be configured to be neutral, aggressive, or conservative to take into account possible error in the location determination method being used (e.g. GPS or Wi-Fi triangulation). Aggressive and conservative configuration settings include a confidence probability setting that may default to 99% likely. An aggressive configuration may include locations outside the specified area such that the probability of mistakenly not triggering the rule matches the confidence level assigned to that condition building block. Conversely, a conservative configuration may exclude locations just within the specified area such that the probability of mistakenly triggering the rule matches the confidence level assigned. For example, if the current location identification method were accurate 99% of the time to be within two meters of the User's actual location, then an aggressive rule set to 99% confidence would expand the target area outward by two meters. Similarly, a conservative configuration set to 99% confidence level would contract the target area inward by two meters. As such, it is possible for a conservative configuration to never trigger in the case that the contraction would result in an empty area. When an empty area would result, the User may be warned that their rule would have no effect. Finally, a neutral configuration is neither expanded nor contracted.
  • A social condition tests whether the User is presently engaged in a SyncGroup or in Physical or Virtual Proximity of other Users or of others not identified as being Users. Alternatively, a social condition may test whether the User is presently engaged in an activity, e.g. playing golf or eating a meal. This may be determined by a User's input describing what activity they are taking part in currently, or by location data (e.g. through GPS or Wi-Fi triangulation) which matches a location where an activity generally takes place (e.g. a golf course) or by analyzing microphone data, accelerometer data, camera and video data, or a combination of the aforementioned factors. For example, a social condition may specify not to record microphone data when in Physical Proximity to others, whether they are identified as Users or not. Others not identified as being Users may include the detection of Bluetooth signals from other phones in the vicinity of a User not known to be registered to the User.
  • Boolean condition tests one or more temporal, spatial, or social conditions and combines them together using Boolean operators such as AND, OR, NOT, XOR, NAND, NOR, etc. A Boolean condition may also be combined recursively within another Boolean condition, for example (Between 6 pm and 7 pm AND at home) OR (between 7 am and 8 am AND (NOT at work))) is an OR rule that itself combines two Boolean conditions that are each using an AND condition, one of which further combines a temporal condition together with a Boolean NOT condition.
  • Mobile devices allow for the automated collection at points in time along various metrics that include:
      • Location
        • GPS
        • Wi-Fi Triangulation (WLAN)
        • Mobile Tower ID Triangulation
        • Magnetic field detection (e.g. compass for orientation)
      • Accelerometer
      • Climate
        • Humidity
        • Temperature
        • Air Pressure
      • Biometric
        • Pulse rate
        • Blood pressure
        • Blood sugar level
        • Blood oxygen level
        • Pupil dilation
        • Eye tracking point
        • Facial expression
        • Voice level and emotional quality
      • Bluetooth (e.g. visible or connected devices)
      • Audio
      • Video
      • Call log
      • SMS log
      • Browser history
      • Contacts
      • Installed/Running apps
      • Purchases made via NFC (e.g. Google® Wallet) and credit card
      • Screen status
      • Battery status
      • Social media (Facebook, Twitter, etc.) activity
  • Rules for automated data collection for data types may specify how accurately the data may be recorded. For example, for location data, a User may prefer that their location only be recorded to the nearest 100 meters even though their mobile device can provide a much more accurate measure. For example, such obfuscation may be done as either rounding to the nearest 100 meters, or adding in a random plus or minus 50 meters, or some combination of both. Alternatively, for time stamp data, a User may prefer that the time stamp on their data measurements only be recorded to the nearest five minutes, by again either rounding, adding a random noise factor, or both. Similarly, a rule may specify the frequency of data collection, for example, taking a sample every six seconds or only once every 15 minutes. Such accuracy controls may have a random variation built in, e.g. sample once every 60 seconds plus or minus 10 seconds. As another example, a User may prefer that audio data only be collected when they are engaged in a telephone call, engaged in video call, or present in a public location such as a restaurant or bar.
  • In some embodiments, Users may wish for wholly fictitious data to be generated and added to their Profile, possibly mixed together with data actually based upon their real (non-fictitious) information.
  • 15. Exemplary General Purpose Cloud Computing System
  • The system described herein may be implemented on a variety of general purpose or specialized cloud computing systems. General purpose cloud computing systems may include, Amazon® EC3, etc. Specialized cloud computing systems may include a cloud with hardware, configuration, and/or characteristics designed especially for the Arkiïs™ system to optimize services such as automatically collecting data about a User and coordinating with the various devices a User interacts with.
  • FIG. 35 depicts an example general-purpose cloud computing system 3500 in which the described technologies can be implemented. The cloud computing system 3500 comprises cloud computing services 3510. The cloud computing services 3510 can comprise various types of cloud computing resources, such as computer servers, data storage repositories, networking resources, etc. The cloud computing services 3510 can be centrally located (e.g., provided by a data center of a business or organization) or distributed (e.g., provided by various computing resources located at different locations, such as different data centers and/or located in different cities or countries).
  • The cloud computing services 3510 are utilized by various types of computing devices (e.g., client computing devices), such as computing devices 3520, 3522, and 3524. For example, the computing devices (e.g., 3520, 3522, and 3524) can be computers (e.g., desktop or laptop computers), mobile devices (e.g., tablet computers or smartphones), or other types of computing devices. For example, the computing devices (e.g., 3520, 3522, and 3524) can utilize the cloud computing services 3510 to perform computing operators (e.g., data processing, data storage, and the like).
  • 16. Exemplary Implementations
  • Although the operations of some of the disclosed methods are described in a particular, sequential order for convenient presentation, it should be understood that this manner of description encompasses rearrangement, unless a particular ordering is required by specific language set forth below. For example, operations described sequentially may in some cases be rearranged or performed concurrently. Moreover, for the sake of simplicity, the attached figures may not show the various ways in which the disclosed methods can be used in conjunction with other methods.
  • Any of the disclosed methods can be implemented as computer-executable instructions stored on one or more computer-readable storage media and executed on a computing device (e.g., any available computing device, including smartphones or other mobile devices that include computing hardware). Computer-readable storage media are any available tangible media that can be accessed within a computing system (e.g., non-transitory computer-readable media, such as one or more optical media discs, volatile memory components (such as DRAM or SRAM), or nonvolatile memory components (such as flash memory or hard drives)). By way of example and with reference to FIG. 32, computer-readable storage media include memory 3220 and 3225, and storage 3240. By way of example and with reference to FIG. 33, computer-readable storage media include memory and storage 3320, 3322, and 3324. The term computer-readable storage media does not include communication connections (e.g., 3270, 3360, 3362, and 3364) such as signals and carrier waves.
  • Any of the computer-executable instructions for implementing the disclosed techniques as well as any data created and used during implementation of the disclosed embodiments can be stored on one or more computer-readable storage media. The computer-executable instructions can be part of, for example, a dedicated software application or a software application that is accessed or downloaded via a web browser or other software application (such as a remote computing application). Such software can be executed, for example, on a single local computer (e.g., any suitable commercially available computer) or in a network environment (e.g., via the Internet, a wide-area network, a local-area network, a client-server network (such as a cloud computing network), or other such network) using one or more network computers.
  • For clarity, only certain selected aspects of the software-based implementations are described. Other details that are well known in the art are omitted. For example, it should be understood that the disclosed technology is not limited to any specific computer language or program. For instance, the disclosed technology can be implemented by software written in C++, Java, Python, Perl, JavaScript, Adobe Flash, or any other suitable programming language. Likewise, the disclosed technology is not limited to any particular computer or type of hardware. Certain details of suitable computers and hardware are well known and need not be set forth in detail in this disclosure.
  • It should also be well understood that any functionality described herein can be performed, at least in part, by one or more hardware logic components, instead of software. For example, and without limitation, illustrative types of hardware logic components that can be used include Field-programmable Gate Arrays (FPGAs), Program-specific Integrated Circuits (ASICs), Program-specific Standard Products (ASSPs), System-on-a-chip systems (SOCs), Complex Programmable Logic Devices (CPLDs), etc.
  • Furthermore, any of the software-based embodiments (comprising, for example, computer-executable instructions for causing a computer to perform any of the disclosed methods) can be uploaded, downloaded, or remotely accessed through a suitable communication means. Such suitable communication means include, for example, the Internet, the World Wide Web, an intranet, software applications, cable (including fiber optic cable), magnetic communications, electromagnetic communications (including RF, microwave, and infrared communications), electronic communications, or other such communication means.
  • The disclosed methods, apparatus, and systems should not be construed as limiting in any way. Instead, the present disclosure is directed toward all novel and unique features and aspects of the various disclosed embodiments, alone and in various combinations and sub combinations with one another. The disclosed methods, apparatus, and systems are not limited to any specific aspect or feature or combination thereof, nor do the disclosed embodiments require that any one or more specific advantages be present or problems be solved.
  • Further potential features, operating modes and methods of using the disclosed technology described above are disclosed below.
  • Hand-held device to allow interactive time coded feedback and control while viewing Content and to allow multiple devices to be simultaneously registered to individual profiles when watching in a group.
  • DVR to record broadcast content and instantaneously substitute commercials with those matching the viewer's profile and share revenue with the original content provider.
  • Smart phone and tablet applications to dynamically interact with the system and that allow individuals watching collectively in a group to choose to view custom messages on their personal device as well as give individual feedback on shared content messages. Additionally, a shared message may be more generic (e.g., a message about BMWs in general) and this may be complemented by individually targeted messages (before during or after the shared messages) delivered to each User's individual device that is more tailored to them (e.g., offers a specific BMW model that best matches their Profile).
  • Large screen devices which automatically register the set of Users collectively watching content and either automatically choose to deliver group messages on the large screen or individual messages on personal devices or to ask for current preference of a viewing session. Alternatively, the large screen is split in two and one half of the room watches one side and the other half takes the other side while each viewer gets the audio for the side appropriate for themselves delivered by the application on their smart phone or my Wi-Fi from the large display that is picked up by the individual devices. Ability to detect the set of smart phones around a content reproducing device such as a radio in a car or on a train and know who the audience is that is listening based upon them being logged into their accounts on their phones and know the context such as driving down the highway or stopped in traffic or parked outside the football stadium or with strangers riding the train together but not sharing content. The phones communicate with each other to link together and reach agreement that they are in the same car traveling at the same rate and in close proximity to each other and thus allowing the assumption that they are indeed in the same vehicle together. The set of Users viewing collectively is used to optimize the messages being delivered to the group to best match each of the individual preferences of each group member. Filters on content may be combined such that content satisfies all members content filters or a member may cooperate with the group and allow content outside their normal parameters but would be alerted on their phone whenever such messages are forthcoming so they could excuse themselves from the room if so desired. After their smart phone shows them what they will earn for a particular shared ad, some members may choose to listen on their own using headphones while others may sync up with the group as selected on their phones or defaulted based upon their personal settings. After any content delivered to a group of viewers or listeners, their application on their phone asks directed customized questions about the content and indicates how much they would be paid to answer, for example, what was most intriguing to you about this commercial or did you get enough information about the technical details of the advertised product? It might even show you an alternate commercial and have you decide which one is more compelling.
  • While watching shared content, a User may choose to publish their comments on the shared display (e.g., by sending a text with their smartphone that gets momentarily displayed on top of the ad and this may be shared with the Content Producer). SyncGroups may elect to view highly rated comments originating in other SyncGroups viewing of the same content during their own viewing. Users could create subtitles to describe what a character is thinking. Advertisements could be created with thought bubbles to be filled in by viewers to make a game where the best scripts wins prizes. Marketers may provide a beginning scenario to seed the game.
  • Users may store their favorite ads (or links to them) onto their phone and then use their phone to send the ad to a shared display.
  • Ability for customers to deliver sanctioned live or pre-recorded testimonials regarding products they have purchased to their friends and other members with similar profiles and be compensated both for delivery and in the event a friend or similarly profiled person ends up purchasing the product. Any such compensation can optionally be pledged to a charity to increase the testimonial's impact. Additionally this compensation is shared with their audience of friends. The testimonials can be coupled with traditional advertising messages during group shared viewing of content. For example, a professional commercial includes a space in its message where the testimonial is inserted midstream.
  • Technology to mark product placement in content or detect it when it is not marked and either replace or eliminate it within such content. For example, coke is being drunk on American Idol, but this is now digitized and you as a viewer being a Pepsi drinker see content that replaces the Coke with Pepsi through the broadcast.
  • Technology to automatically recognize the individuals comprising an audience and provide content that satisfies the combined restrictions of the audience as a whole.
  • Technology to share a percentage of the revenue derived from viewing a message with each piece of the whole technological solution that enables the viewing.
  • Technology to share loyalty card information and credit card information is already being done by websites such as eScrip (escrip.com) and uPromise (upromise.com). Perhaps we can patent the ownership and control of the information collected by the consumer? To be most effective, this would require the existing collector to no longer retain the information.
  • Technology to allow configuration of triggers based upon live events to override camera angle being presented on broadcast stream. Technology to allow configuration of interests to override default camera angle being presented on broadcast stream to highlight action around one's interests.
  • Technology to consistently visualize in a small recognizable collection of pictograms depicting scales to show how well the content being delivered by Arkiïs™ matches a consumer's profile interests and needs along several dimensions. Technology to allow replacement plug-ins to override interest and match visualization iconography presented with all content delivered with Arkiïs™.
  • Technology to automatically adapt to the environment of the User or to the User's stated present desires. For example, in a noisy location, the personal content being delivered may adapt by enabling closed captions or switching to a different feed where the audio portion is not important to content message delivery. Alternatively, when the User's focus may not remain constant on the visual portion of message delivery, the content may adapt to messages where the audio portion is primary or where the visual portion may be effectively gathered when only snippets are being viewed.
  • Technology to adaptively challenge the viewer to prove comprehension and identity to ensure the integrity of the system. Identity metrics may be seamlessly gathered to reduce conscious intrusions to the viewer through the use of cameras and facial recognition.
  • Track that a User is talking on the phone while watching an ad, listening to room to hear only the ad is present, etc. to ensure integrity measure of user watching ad. They are paid more to enable these integrity checks.
  • Building a consumer marketing score based on the accuracy of their profile based upon external confirmation of correlating information. Details include using the person's email domain as an early indicator of their reliability.
  • To ensure the integrity of the User's participation and thus its value to Marketers, the system may have built in measures to minimize one's ability to consistently cheat the system. Users that are deemed to be likely cheating may be penalized in their marketing score. The measures may include random challenge questions being presented to the User to test their knowledge of content presented. Additionally, random biometric challenges may also be provided to ensure the User's identity is maintained. Some of the biometric challenges may be ongoing and not require direct User action. Failing challenge questions may cause them to be put forth more frequently while passing them may reduce their frequency.
  • Ad placement based upon viewing context such as in a group of male friends or with spouse. Emotional location of thought, e.g. end of day kicking back. App inhibits volume maximum.
  • Ad placement is contextual, e.g. volume of prior commercial exit is linked with next commercial start so that the transition is more natural by choosing commercials that transition well from one to the next, that is, volume delta does not exceed a threshold.
  • Dump button during a commercial that you do not like and do not wish to view anymore.
  • Gestures such as taps during a commercial to give feedback as it is being viewed. Gestures are slowly taught to the user as popups explaining shortcuts.
  • Content can be viewed at any time, not just coupled with TV so that you can view content specific to your location, such as at the Mall etc.
  • Deduce contextual scenarios such as finding you are often meeting with 4 friends on Sunday nights and thus it deduces a pattern and gives commercials that contextually fit automatically.
  • Go to Zumba class and get an offer to bring your friends from the class and sign up for Arkiïs™ and get the jump sport class for free and be rewarded based upon how many Zumba friends sign up for and take the class from JumpSport.
  • Roku uses Apple's HTTP Live Streaming (HLS) over TCP. An alternative to HLS is Real-time Transport Protocol (RTP) over UDP.
  • Specific formulas for allotment. Revenue sharing formulas. Intention to buy percentage likelihood to buy and track performance and tie to payout.
  • Table of some of the processes and to whom they apply:
  • Process For Whom?
    Record plan to make purchase (Assertion) Consumer
    Update plan to make purchase (Assertion) Consumer
    Link Profiles in a SyncGroup Profile Consumer
    Suggest linking Profiles Consumer
    Confirm/alert Profile changes Consumer
    Detect Consumer behaviors and patterns Consumer
    (what is being viewed, where they are
    likely to be, etc.)
    Match detected behaviors and patterns to Consumer
    Profile preferences
    Match detected behaviors across Profiles Consumer
    Confirm detected status is accurate with Consumer
    Consumer
    Store Marketer business information Marketer
    Store Marketer advertising offers Marketer
    Confirm Marketer availability Marketer
    Suggest content based on User Profile Consumer
    Record purchases made Consumer
    Ship package anonymously Shipper
    Receive package anonymously Consumer
    Match similar User Profiles for purchase Consumer
    prediction estimated accuracy
    Calculate Consumer Marketing Performance Consumer
    Score
    Target advertisements based on User Profiles Marketer
    Link to third-party data Consumer
    Track Consumers' content viewing habits Consumer
    Communicate with content providers re Content
    length of commercial breaks provider
    Serve Targeted Premium Content Consumer &
    Content
    provider
    Select advertisements to view from selection Consumer
    Calculate which advertisements to serve Consumer
    “Photoshop” product placement in content Marketer
    based on User Profile
  • Another table of some of the disclosed processes and to whom they apply:
  • Process For Whom?
    Create a private Profile Consumer
    Create Sub Profiles within Master Profile Consumer
    Create anonymous Profile for targeted Consumer
    advertising
    Create fictitious Profile for targeted Consumer and
    advertising Marketer
    Create fictitious Profiles within a Profile Consumer
    which override the master Profile
    Select portions of a Profile to make public Consumer
    Select portions of a Profile to hide Consumer
    Access viewing history Consumer
    Provide different tiers of access to Arkiïs ™
    Consumers Staff
    Grant Consumer referral bonuses Staff,
    Consumers
    Proving identity to use a service Consumer
    Linking proven identity to a Profile Consumer
    provided by a service
    Electronically voting in the governance Consumer
    of a system
    Linking separate Profiles created by a Consumer
    Consumer
    Linking separate Profiles of multiple Consumers
    Consumers into an online group
    Providing targeted advertisement to an Marketers,
    electronically created group Consumers
    Creating and maintaining a group Profile Consumers
    Parental settings controlling privacy of Consumers
    minors online
    Discrete, combinable levels of group Consumers
    privacy settings
    Electronic forms of mutual consent Consumers
    Register grocery loyalty cards to reflect Consumers
    purchasing decisions
    Register credit cards to reflect Consumers
    purchasing decisions
    Register online purchasing accounts to Consumers
    reflect purchasing decisions
    Integration of external websites to receive Consumers
    recommendations
    Text message confirmation from a website Consumers
    Email notifications from a website Consumers
    Functionality to edit website fields Consumers
    through text message data
    Analysis of past Consumer activity data Consumers
    for targeted advertisements
    Analysis of data from smartphone Consumers
    microphone for targeted advertisement
    Analysis of data from GPS data for Consumers
    targeted advertisement
    Analysis of smartphone accelerometer data Consumers
    for targeted advertisement
    Analysis of biometric data from smart Consumers
    wearable devices for targeted advertisement
    Electronic credits in exchange for a Consumers
    purchase through credit card data
    Electronic credits in exchange for a Consumers
    purchase online
    Consumer identification barcodes Consumers
    Supply website credentials to receive Consumers
    credits for a third-party purchase
    Create a Profile for a business for Consumers
    targeted advertisement
    Administrator privileges over other Consumers
    accounts of a social network
    Anonymous shipping through randomly Consumers,
    generated address “nodes” Mail delivery
    Encrypted shipping, sender/recipient data Consumers,
    Mail delivery
    Anonymous online feedback Consumers
    Consumer-generated Profile for the intent Consumers
    of receiving targeted advertising
    Method of predicting and altering a Consumers
    Consumer's performance score
    Method of using a consumer performance System
    score to predict future purchases
    Method of mapping a store's contents and Consumers
    item prices through UPC, QR codes
  • The term Arkiïs™ is a trademarked name. It is used herein to refer to an exemplary system. A commercially available implementation of Arkiïs™ may differ from the exemplary system described herein in form, function, and/or name.
  • 17. Advertising and Fulfillment System
  • Embodiments disclosed herein recognize that the more closely a person guards their private information, the more value it is to them. Retailers and advertisers will pay to gain that information, and already do, but the customer does not see any of that money. Where does it go? Clearing houses, search engine companies, and publicly traded corporations. Embodiments disclosed herein permit an individual's information to be controlled in a manner to permit the individual to be paid for usage of that information.
  • The disclosed system is constructed as a coop, owned by its users. Thus, any profit generated that is not fed back into the growth of the company is distributed among its members, the end users. This can also encourage networking through bonuses and such.
  • The disclosed system is constructed as a coop (or a standard corporation or a hybrid of the two), owned in a greater of lesser degree by its users (and investors, in the latter cases). Thus, some portion of profit generated that is not fed back into the growth of the company is distributed among its members, the end users. A hybrid of the two involves stock but as value increases they reach a threshold, and everything above that line goes back/can be bought back by the coop.
  • As shown in FIG. 36, when signing up for the system, the end user downloads a profile generator to the hard drive 3605, 3606, 3607 and a customizable profile is securely stored for use by the engine. A key to this profile is that it is completely up to the individual user how much information to provide. There are NO required fields except for the most standard information to set up a deposit/credit account with the system. Beyond this, any information provided by the end user performs two main functions:
      • 1 Enhances his click value to the advertiser, thus increasing the amount of money the user will make off of each click.
      • 2. Increases the relevance of the advertisements shown in response to each keyword, potentially saving the user the time and energy of browsing by pointing him more directly towards what he wants.
  • Once created, the user profile is uploaded to the cooperative's user profile database 3611. However, this profile database 3611 is dynamic, and any alterations the user wishes to make to the desktop profile will automatically upload to the online user profile database 3611.
  • Once created, the user profile is uploaded to the coop's user profile database and formulates a number to place them within a range of people within the database. That number defines how that user will be shown to the advertiser as buying potential. However, this profile database is dynamic, and any alterations the user wishes to make to the desktop profile will automatically upload to the online user profile database. This could be limited by honesty/normalcy tolerances provided by the Cooperative.
  • The search engine page 3700 has a standard, simple search engine interface 3720 for use as a standard search engine. It also has a user login option 3710 on the side. A user can only make money when he is logged into the system. Auto-login of some kind may be provided along with the system browser, password storage and homepage.
  • As seen in FIG. 38, once logged in, the user can get paid while browsing 3822, as well as manage a completely self-sufficient online banking system 3820 to add another level of security to online transactions by filtering them all through the system. The online retailer no longer obtains any information from the end user during the transaction because the purchase is paid for using credits 3826 and paid out through the system 3830. This further protects the end user from unsuspectingly giving out personal information and compels retailers/advertisers to join the system, because otherwise they cannot gather information about the types of users buying their products.
  • How the account online banking system works: a credit account comes automatically with signup to track credits earned through browsing; users can purchase additional credits 3810 to be used on any online transaction (protecting information from retailer and verifying follow-through conversion on keyword search intentions, as well as boosting click quality); a credit card can be ordered to use U-Dollars in physical transactions (also verifies purchases from “Brick & Mortar” retailers, boosts click quality).
  • Turning back to FIG. 37, the search bar 3722, 3724 resembles any other search engine. As seen in FIG. 39, beneath the search bar, however, is a list of possible intentions 3900 that the user can click to tailor the search results and advertisements to his needs for that keyword search: Definite Buyer 3910 (Brick and Mortar buyer 3920 increases click value to local advertisers, decreases to others 3922), Potential Buyer 3930/Price Comparison (time frames to estimate when it will be bought 3932), Research to Buy 3940 (increases appeal to informational sites 3942), Just Browsing, Rather Not Say 3950 (advertisers will determine their own Max CPC (cost per click) for unspecified users just like standard search engines 3952).
  • Turning back to FIG. 37, after an intention 3740 is specified and the keyword search 3722 is submitted, the results 3760 are organized according to a user-specified ranking of factors. The advertisement results are dynamic columns that can be reorganized and reranked 3750 by:
      • Click Value (amount that advertisers are willing to pay for your click 3705 determined by advertiser, but based on specificity and details of user profile),
      • Relevancy (as determined by normal search engine relevancy),
      • Product Price (if specific product),
      • Focus Spectrum (popularity among group of similar users, as specified by end user according to interests, income, demographic, etc.)
  • The ads displayed in response to a search query 3760 have a few additional features 3770 compared to other search engine advertisements. Underneath the standard ad display, the system's ads display: click value 3772, Focus Spectrum statistics 3774, 3776.
  • The Focus Spectrum is one of the most dynamic and uniquely appealing aspects of the search engine. In the profile generator, users specify not only their personal information, but the range of interests to which they would like their ads tailored. For example, a high-income user might want to only view ads for high-end consumer products. Rather than allow the advertiser to determine what the user wants to see, the engine uses a statistical grouping formula to determine other users with similar profiles in the specified area. Thus, a high-income user who selects income as a key focus spectrum factor would see the click and purchase choices of other high-income users displayed beneath the advertisements. The statistics show the percentage of similar users who decided to click on the product 3774 and the smaller percentage that followed through with a conversion 3776.
  • The user also specifies the range of the Focus Spectrum to narrow or broaden the focus group. A simple focus statistics toolbar 3730 above the listing of advertisements has a customizable percentage that jumps between discrete amounts 3734 to change the range of the focus group. As the user expands or restricts the focus group size, the engine recalculates the relevancy of advertisements and adjusts their rankings accordingly.
  • All of the ads displayed in response to search queries are preapproved and within the network 3610 to ensure end user privacy in all click-throughs from a search. Our software/transfer page interface 3615 checks for cookies on landing sites to prevent pages within the ad network from tracking end users.
  • Click Value
  • A user's click value directly affects the amount that a user is offered by advertisers for clicking on an ad 3800. The click value is based on: click quality—loosely determined by: (# of conversions)/(# of clicks)×100%, demographic, income level, interests, geographic location, search intentions, any other profile information that the end user may provide.
  • The click quality formula shows that the longer a user browses without making any purchases or other types of advertiser-defined conversions (leads, signups, page views, etc.), the lower the user's quality score drops. Clicks always have an integer value (1 click=1 ad). Conversions have variable values, not necessarily integers. For example: Sale=1, Newsletter/Subscription=0.5, Lead (request for follow-up call)=0.75, Page View (length of visit)=0.05×(# of pages viewed after landing page), No Action=0.
  • Each advertiser can specify what aspects of a user's profile most enhance the click value to that advertiser. Thus, advertisers can target demographics, income levels, interests, geographic locations, and search intentions to fit their specific product or goal, but only for each individual end user insofar as that user supplies the information. However, the advertiser cannot obtain the identity of the specific end user. This is a part of the security promise of the system.
  • The advertiser can never obtain the identity of the specific end user unless the user agrees to provide some personal info. This is crucial to the security promise of the system.
  • Focus Spectrum
  • The focus spectrum uses complex statistical analysis of end user profile data to quantify the similarity of two users. The end user specifies what similarities are most important to him or her, and each keyword search groups other user data accordingly. The focus spectrum can be shifted based on: Income, Demographic, Interests/Hobbies, Geographic location (IP address), Conversion Rate (Frequent Buyer, Occasional Buyer, Brick and Mortar Buyer, Rare Buyer) 3732.
  • One or more factors can be selected to filter the advertisements even more thoroughly. For example, let's say an 18 year old female is searching for digital cameras online. The focus spectrum uses the groupings according to her demographic (e.g. 16-20) and expressed interest in professional photography to quantify the relevancy of the advertisements based on other similar users. The resulting ad rankings display the advertisements for higher-end cameras that garnered the most click-throughs and conversions among the 16-20 year old demographic. If she wanted to expand the search to high-end digital cameras among all ages, she could deselect 3736 the demographic factor and focus solely on the most popular and successful advertisements among those with an interest in professional photography.
  • The value of an end user's click may be listed underneath the ad, which states the amount paid to get through and the determined relevancy factor.
  • The Focus Spectrum is based on statistical data about other users with similar profiles. Personalized data provides information on other conversion profiles, using variable matching (within 5%, 10%, etc.). Users may also be paid bonuses for survey information in addition to click/conversion dollars, and also may be paid lead bonuses—newsletters, subscriptions, etc.
  • Advertisement Matrix
  • Customizable advertisement ranking is a more robust targeting mechanism for the end user, not the advertiser. It allows the viewing of statistics for other buyers without revealing the identity of those other buyers. A user can prioritize ad rankings by price (that advertisers are willing to pay for your click), relevancy, Focus Spectrum (based on end user-specified group of similar users), interests, and intention (serious buyer, research etc.)
  • 18. Privacy
  • Advertisers 4020 see only delivery numbers for UPS 4022, not personal buyer information. As shown in FIG. 40, complete self-sufficient banking online allows complete anonymity: the end user 4000 buys online credit through a credit card, spends the credit on online products 4002, the retailer ships to UPS, and UPS ships to a local address 4004 based on a unique scan code 4030 which changes with every transaction.
  • A time-dependent click value is a model for checking the veracity of a user's click intention. For example, if claiming “Definite Buyer,” the user will be paid the full amount promised by the advertiser only if they follow through with a conversion within the given time frame. If the user does not follow through, the initial SX paid for the amount will be cut to a fraction determined by the advertiser. Retailers can also choose not to cut cost no matter what, to enhance their ad's appeal to the end user.
  • Only advertisements for pages within the cooperative ad group are listed, for a completely sheltered coop bubble. Advertisers must mirror their sites into our system for approval and ad listing 3612, which ensures end user 3600 privacy protection. The required software interface 3615 stops other advertisers 3621, 3622, 3623 from placing cookies unknowingly on users.
  • Factors in Determining User Quality Score
  • Click quality=conversions/clicks. Time- and keyword-specific search purposes are specified for each keyword search by a selection underneath the search toolbar.
  • The matching of users with relevant advertisers has a general formula based on the user-specified profile. With each keyword search, the engine uses a combination of overall click value and more significant and targeted keyword-specific click value to determine how much the advertiser is willing to pay.
  • The first factor in matching the user with relevant and interested advertisers is relevancy, which is based on:
      • the user-specified interests (advertisers create a similar interest page when creating an advertisement to select which users they would like to see their ads),
      • the keyword itself (functions like a normal search engine, but combined with the other unique relevancy factors in determining the overall relevancy of ads),
      • income level (for example, a high-end user would most likely buy camping supplies from REI than Target, and REI may pay more for the advertisement),
      • demographic (certain companies sell the same products but target different age groups),
      • geographic location (local businesses that do not sell online or ship products are only concerned with local customers, based on IP address or user profile)
  • The relevant advertisers then scale the user based on the user's self-expressed/determined buying potential (ex. “I promise to buy within 3 clicks”; “Frequent Buyer”; etc.), click value (performance history), keyword-specific click value (performance history within the keyword-specified area).
  • User profile numbers could be 100 digits long or more, where only specific digits apply to each advertiser (i.e. there is a number for camping specifically).
  • A matching system joins two people together; we want to join the buyer and advertiser. It includes not just user-defined information, but performance-based info (“I promise to buy within the first 3 clicks”).
  • Rating sites by other users: a user can select to show results with only certain ratings. The click value scales the maximum cost per click. Rate different aspects of advertisers to tailor business to end user preference.
  • Focus Spectrum Expanded
  • Certain factors come into play more often than others. For example, geographic location is a much less significant factor than income, especially when searching for computer hardware, per se. The geographic location may come into play much more when searching for sleeping bags. In this way, the combination and weight of the different qualifiers in creating a focus spectrum for each individual search is dynamic and largely dependent on the keyword itself.
  • The number derived from the focus spectrum is the Relevancy Factor of the ad for those within the spectrum. This percentage is displayed underneath each advertisement to show how relevant other users thought that advertisement to be. The percentage is based not solely on click-throughs, but also on conversions. A conversion is worth significantly more than a click-through. Accordingly, the number generated, although a percentage, is not solely (clicks)/(impressions) for the focus group. It may look something more like [(clicks)+100*(conversions)]/(impressions).
  • For a definite buyer, (conversions)/(clicks) for the focus spectrum may be more useful information.
  • FIG. 41 is a flowchart of a particular system for purchasing goods online. The end user signs up for the system and downloads software for use on a local computer. The user then uses the software to create a customized profile, which may include one or more of demographic information, income level, interests/hobbies, geographic location, type of buyer, and search intentions. The user then uploads the customized profile to a database.
  • As described in FIG. 42, the system assigns an initial Click Value 4210 to the user based on profile information. The customized profile is also used to determine Focus Spectrum Statistics, which encompasses the range of interests for the ads that the user will view.
  • The user then logs in to the system and selects an intention, specifying a choice of definite buyer, potential buyer, research to buy, just browsing or rather not say. The user then performs standard keyword searches for items and the system returns advertisement results based on the Focus Spectrum Statistics, Click Value, relevancy and product price. The user then has a yes/no choice to rerank the results based on any of these factors. Choosing yes allows the user to rerank the results and obtain a new set of advertisement results based on the user's choice. Choosing no allows the user to continue to make a purchasing decision. Depending on the nature of a purchasing decision, the system assigns a conversion value.
  • Purchasing decision information is used to adjust the Click Value. A positive performance adds to Click Quality and a negative performance subtracts from Click Quality. These Click Quality values are then used to adjust the user's Click Value 4220, 4230.
  • The system described herein can also be implemented through interactive television or radio, particularly via satellite television and radio systems and cable television systems.
  • 19. Alternative Advertising and Fulfillment System
  • When signing up and/or enrolling for the disclosed system as seen in FIG. 41, a customizable profile is securely stored for use by the system's engine. In one embodiment, the end user downloads a profile generator to the hard drive.
  • A key to this profile is that it is completely up to the individual user how much information to provide. There are NO required fields except for the most standard information to set up a deposit/credit account through the system.
  • Beyond this, any information provided by the end user performs two main functions:
      • 1. Enhances the user's Click Value to the advertiser, thus increasing the amount of money the user will make off of each click.
      • 2. Increases the relevance of the advertisements shown in response to each keyword, potentially saving the user the time and energy of browsing by pointing him more directly towards what he wants.
  • Once created, the user profile is uploaded to the system's user profile database. This profile database is dynamic, so any alterations the user wishes to make to the desktop profile will automatically upload to the online user profile database, ensuring that the user's Click Value stays up to date.
  • In one embodiment, the system is constructed as a cooperative, so users own their own data and the system's members own the system. Thus, any profit generated that is not fed back into the growth of the company is distributed among its members, the end users.
  • In other embodiments, the system is constructed as a standard corporation, owned in a greater or lesser degree by its users and investors. Thus, in these embodiments, some portion of profit generated that is not fed back into the growth of the company is distributed among its members, the end users. In yet another embodiment, the system is a hybrid between a cooperative and a standard corporation. For example, stock can be owned by investors, but as the value of the company increases and reaches a threshold, any additional value goes back to the cooperative, or can be bought by the cooperative.
  • The system's search engine page has a standard, simple search engine interface for use as a standard search engine. It also has a user login option on the side. A user can only make money when he is logged into the system.
  • The system's search bar resembles any other search engine. Beneath the search bar, however, is a list of possible intentions that the user can click to tailor the advertisements, and in some embodiments the search results, to his needs for that keyword search. In one embodiment, these intentions comprise: Definite Buyer, Brick and Mortar buyer (increases Click Value to local advertisers, decreases to others), Potential Buyer/Price Comparison (user discloses a time frame to estimate when an item will be bought), Research to Buy (increases Click Value to informational sites), Just Browsing, Rather Not Say. For a ‘Rather Not Say buyer, advertisers may determine their own Max CPC (cost per click) for unspecified users just like standard search engines.
  • After prompting the user to specify an intention and receiving the user's keyword search, the results are organized according to, in some embodiments, a user-specified ranking of factors. The advertisement results may be dynamic columns that can be reorganized and reranked by factors including: Click Value (amount that advertisers are willing to pay a user for their click, determined by the advertiser and based on specificity and details of a user's profile), relevancy (as determined by normal search engine relevancy), product price (if the user is searching for a specific product), Intention (serious buyer, research, etc.), Rating (site and/or advertiser rating by other end users) and Focus Spectrum (popularity among group of similar users as specified by end user according to, for example: interests, income, and/or demographic.)
  • In some embodiments, the first factor in matching the user with relevant and interested advertisers is relevancy, which may be based on: the user-specified interests (advertisers create a similar interest page when creating an advertisement to select which users they would like to see their advertisements), the keyword itself (the system functions like a normal search engine, but combined with the other unique relevancy factors in determining the overall relevancy of advertisements) income level (for example, a high-end user would more likely buy camping supplies from REI than Target, and REI may pay more for the advertisement), demographic (for example, certain companies sell the same products but target different age groups), geographic location (local businesses that do not sell online or ship products are only concerned with local customers; location may be based on IP address or the user's profile)
  • This provides a more robust targeting mechanism for the end user, not the advertiser. Furthermore, it makes transparent the behind-the-scenes workings of Google and other search engines. The user-specified advertisement ranking feature allows an end user to view statistics for other buyers without revealing the identity of those other buyers.
  • Privacy
  • The system will only list advertisements for pages within the cooperative advertising group, creating a completely sheltered cooperative bubble. Advertisers must mirror their sites into the system for approval and advertisement listing, to ensure the end user's privacy protection.
  • All of the advertisements displayed in response to search queries are preapproved and hosted within the network to ensure end user privacy in all click-throughs from a search through the system's search engine. The software/transfer page interface may check for cookies on landing sites to stop other advertisers from placing cookies unknowingly on users, preventing pages within the advertisement network from tracking end users.
  • Once logged in, the user can manage an online banking account. This account works as a completely self-sufficient online banking system to add another level of security to online transactions by filtering each transaction through the system. The online retailer no longer obtains any information from the end user during the transaction because the end user completes purchases through the system using the end user's credits, and the retailer is paid through the system. The filtering of each transaction by routing it through the system further protects the end user from unsuspectingly giving out personal information and compels retailers/advertisers to join the system, because otherwise they cannot gather information about the types of users buying their products.
  • In some preferred embodiments, user profile numbers could be, for example, 100 digits long or more, where only specific digits apply to each advertiser. For example, there may be a number for camping specifically, which is embedded within the long profile number.
  • In a preferred embodiment, the online banking system automatically grants each user a credit account upon signup with the disclosed system, which may be linked to the user profile number. This credit account allows users to track the money they have earned through browsing as well as other conversions. Users may purchase additional account credit to be used on any online transaction. The use of credit for purchases protects the privacy of end user information from the retailer (by only identifying, for example, a portion of a user's profile number), verifies follow-through conversion on keyword search intentions, and boosts Click Quality. In some embodiments, a credit card can be ordered to use the account's credit in physical transactions. The credit card can be used to verify purchases from brick & mortar retailers, boosting Click Quality.
  • To ensure anonymity, advertisers may see only delivery numbers for delivery services including UPS, not personal buyer info. In some embodiments, retailers ship packages to UPS, and UPS fulfills a purchase by shipping the package to an end user's local address based on a unique scan code. In some embodiments, this code changes with every transaction.
  • The advertisements displayed in response to a search query contain more information relevant to the end user's search needs compared to other search engine advertisements. Underneath the standard advertisement display, advertisements within the system display values including the Click Value, as well as Focus Spectrum statistics.
  • Click Value
  • A user's Click Value directly affects the amount that an end user is offered by advertisers for clicking on an advertisement. In some embodiments, the Click Value is the monetary value an end user is paid for clicking on an advertisement. Each advertiser can specify what aspects of a user's profile most enhance the Click Value to that advertiser. Thus, advertisers can target users within demographics, income levels, interests, geographic locations, and search intentions to fit their specific product or goal, but only target each individual end user insofar as that user supplies the information. Still, the advertiser cannot obtain the identity of any specific end user. This is a part of the security promise of the disclosed system.
  • The Click Value is based on, for example: Click Quality (which in some embodiments, may be determined by: (# of conversions)/(# of clicks)×100%), user demographic, income level, interests, geographic location, search intentions, and/or any other profile information that the end user may provide which matches the advertiser's preferences.
  • Purchasing decision information is then used to adjust the Click Value. A positive performance adds to Click Quality and a negative performance subtracts from Click Quality. These Click Quality values are then used to adjust the user's Click Value.
  • The Click Quality formula shows that the more a user browses without making any purchases or other types of advertiser-defined conversions (leads, signups, page views, etc.), the lower the user's quality score drops. In a preferred embodiment, clicks always have an integer value (1 click=1 advertisement). In some embodiments, conversions have variable values, not necessarily integers. In one embodiment, the weight of various conversions may be: Sale=1, Newsletter/Subscription=0.5, Lead (request for follow-up call)=0.75, Page View (length of visit)=0.05×(# of pages viewed after landing page), No Action=0.
  • Search Intention
  • The Search Intention is used to tailor the advertisements, and in some embodiments the search results, to a user's purchase plans for a keyword search.
  • In one embodiment, a list of possible Search Intentions comprises one or more of: Definite Buyer, Potential Buyer/Price Comparison, Brick & Mortar Buyer, Research to Buy, Just Browsing, Rather Not Say.
  • In a preferred embodiment, the Click Value is time dependent. This provides a model for checking the veracity of an end user's Search Intention. For example, if a user claims “Definite Buyer” as a search intention, the user may be paid the full amount promised by the advertiser only if they follow through with a conversion within a given time frame. If the user does not follow through, the initial SX paid for the amount may be cut to a fraction determined by the advertiser. In some embodiments, the retailer can also choose not to cut payout no matter what to enhance their advertisement's appeal to the end user.
  • In one preferred embodiment, if a user claims “Brick and Mortar Buyer” as a Search Intention, the user's Click Value is increased for local advertisers and decreased for other advertisers.
  • In another preferred embodiment, if a user claims “Potential Buyer”/“Price Comparison” as a Search Intention, the user is prompted to disclose a time frame to estimate when an item will be bought.
  • In another preferred embodiment, if a user claims “Research to Buy” as a Search Intention, the user's Click Value is increased to informational sites.
  • In another preferred embodiment, if a user claims “Rather Not Say” buyer, advertisers may determine their own Max CPC (cost per click) for unspecified users just like standard search engines.
  • Focus Spectrum
  • The Focus Spectrum is one of the most dynamic and uniquely appealing aspects of the system's search engine. In their profile, users specify not only their personal information, but the range of demographic variables to which they would like their advertisements tailored. For example, a high-income user might want to only view advertisements for high-end consumer products. Rather than allow the advertiser to determine what the user wants to see, the engine uses a statistical grouping formula to determine other users with similar profiles in the specified area, quantifying the similarity of a plurality of users. The end user specifies what similarities are most important to him or her, and each keyword search groups results based on other user data accordingly. The Focus Spectrum can be shifted based on factors including: income, demographic, interests/hobbies, geographic location (IP address), conversion rate (in some embodiments, users may be denoted as, for example, Frequent Buyer, Occasional Buyer, Brick and Mortar Buyer, Rare Buyer) The statistics show the percentage of similar users who decided to click on the product and the smaller percentage that followed through with a conversion. For example, a high-income user who selects income as a key Focus Spectrum factor would see the click and purchase choices of other high-income users displayed beneath the advertisements.
  • The user also specifies the range of the Focus Spectrum to narrow or broaden the focus group. In a preferred embodiment, a simple focus statistics toolbar above the listing of advertisements has a customizable percentage that jumps between discrete amounts to change the range of the focus group. In one embodiment, a user may specify that profile variables relevant to the Focus Spectrum must match within 5%, 10%, etc. As the user expands or restricts the focus group size, the engine may recalculate the relevancy of advertisements and adjust their rankings accordingly.
  • One or more factors can be modified to filter the advertisements through the controls offered by the Focus Spectrum. For example, let's say an 18 year old female is searching for digital cameras online. The Focus Spectrum uses the groupings according to her demographic (16-20, for example) and expressed interest in professional photography to quantify the relevancy of the advertisements based on other similar users. The resulting advertisement rankings display the advertisements for higher-end cameras that garnered the most click-throughs and conversions among the 16-20 year old demographic. If she wanted to expand the search to high-end digital cameras among all ages, she could deselect the demographic factor and focus solely on the most popular and successful advertisements among those with an interest in professional photography.
  • In some embodiments, certain factors come into play more often than others. For example, geographic location may be a much less significant factor than income, especially when searching for computer hardware, for example. The geographic location may come into play much more when searching for sleeping bags. In such embodiments, the combination and weight of the different qualifiers in creating a Focus Spectrum for each individual search are dynamic and largely dependent on the keyword itself.
  • In yet another embodiment, the number derived from the Focus Spectrum is the Relevancy Factor of the advertisement for those within the spectrum. This percentage is displayed underneath each advertisement to show how relevant other users thought that advertisement to be. The percentage is based not solely on click-throughs, but also on conversions. A conversion is worth significantly more than a click-through. Accordingly, the number generated, although a percentage, is not solely (clicks)/(impressions) for the focus group. It may look something more like [(clicks)+100*(conversions)]/(impressions) For a definite buyer, (conversions)/(clicks) for the Focus Spectrum may be more useful information.
  • In some embodiments, the system described herein can also be implemented through interactive television or radio, particularly via satellite television and radio systems and cable television systems.
  • 20. Alternatives
  • The technologies from any example can be combined with the technologies described in any one or more of the other examples. In view of the many possible embodiments to which the principles of the disclosed technology may be applied, it should be recognized that the illustrated embodiments are examples of the disclosed technology and should not be taken as a limitation on the scope of the disclosed technology. Rather, the scope of the disclosed technology includes what is covered by the following claims. We therefore claim as our invention all that comes within the scope of these claims.

Claims (21)

1-75. (canceled)
76. A method for computerized distribution of content by way of a content management system comprising:
receiving an identity for a first individual user;
receiving from a content provider, content meta-data and business preference information, the content meta-data comprising one or more identities of a provider, an author, or a subject of content associated with the content provider;
utilizing the identity of the first individual user to access individual user preference information provided and/or authorized by the first individual user, wherein the user preference information includes at least a first assertion comprising a forward-looking declaration of the first individual user's intention to take future action related to the provider, the author, or the subject of content and further utilizing the identity of the first individual user to derive business preference fit data by determining a degree to which the first individual user satisfies the business preference information; and
provisioning the content associated with the content provider to the first individual user in accordance with the business preference fit data.
77. The method of claim 76 wherein provisioning content associated with the content provider to the first individual user in accordance with the business preference fit data is further provisioned in accordance with the user preference information.
78. The method of claim 76 wherein the first assertion is qualified with a probability and/or a condition.
79. The method of claim 76 further comprising:
generating an integrity rating that is indicative of a correlation between the first individual user's action and the first assertion.
80. The method of claim 76 further comprising:
identifying an action by the first individual user that matches the first assertion and crediting an account associated with the first individual user.
81. The method of claim 76 further comprising:
receiving an identity from each of a plurality of individual users in addition to the first individual user;
grouping the first individual user and the plurality of individual users into a shared content group to generate shared content group preference information by aggregating individual user preference information of each of the individual users in the shared content group wherein the shared content group preference information includes at least a first shared assertion comprising a forward-looking declaration of the shared content group's intention to take future action related to the provider, the author, or the subject of content and utilizing identities of users of the shared content group to derive business preference fit data by determining a degree to which the shared content group satisfies the business preference information; and
provisioning the content to the individual users in the shared content group in accordance with the business preference fit data.
82. The method of claim 76 further comprising:
utilizing the business preference fit data to permit one or more of filtering, prioritizing or modifying content associated with the content provider in its provision to the first individual user.
83. The method of claim 76 further comprising:
accepting an input from the first individual user indicating rejection of content by the first individual user.
84. The method of claim 76 further comprising:
receiving from a champion, registered as a second individual user having an identity distinct from the identity of the first individual user, content regarding one or more products, the content comprising information pertaining to at least a first specified goods and services provided by a goods and services provider, and
wherein the content associated with the content provider provisioned to the first individual user includes the content received from the champion regarding the one or more products.
85. A method for computerized management of content by way of a content management system, comprising:
receiving an identity from each of a plurality of individual users;
receiving from a content provider content and content meta-data and business preference information, the content meta-data comprising one or more identities of the provider, an author, or a subject of the content;
grouping the plurality of individual users into a shared content group to generate shared content group preference information by aggregating individual user preference information of each of the individual users in the shared content group;
utilizing the identities of the provider, the author, or the subject of the content to derive shared content group fit data by determining a degree to which the provider, the author or the subject of the content satisfies the shared content group preference information;
utilizing the shared content group preference information to derive business preference fit data by determining a degree to which the shared content group preference information satisfies the business preference information; and
providing to the content provider the shared content group fit data and the business preference fit data to permit one or more of filtering, prioritizing, or modifying content associated with the content provider in its provision to the shared content group.
86. The method of claim 85 further comprising:
determining for each individual user in the shared content group, individual user content fit data by determining a degree to which the content satisfies for each individual user in the shared content group, individual user preference information for each corresponding individual user;
grouping one or more individual users of the shared content group whose corresponding individual user content fit data falls below a predetermined threshold into a shared content sub-group; and
provisioning to the individual users in the shared content sub-group alternate content to the content provisioned to the shared content group.
87. The method of claim 85 wherein the shared content group preference information further comprises a determination of whether individual users in the shared content group are in virtual and/or physical proximity to one another.
88. The method of claim 85 further comprising:
accepting an input indicating rejection of the content by an individual user in the shared content group.
89. The method of claim 85 wherein the shared content group preference information further comprises an assertion comprising a forward-looking declaration of the shared content group's intention to take a future action related to the provider, the author, or the subject of the content.
90. A method for computerized distribution of content by way of a content management system comprising:
receiving an identity for an individual user;
receiving from a content provider, content and content meta-data and business preference information pertaining to the content, the content meta-data comprising an identity of the champion and an identity of a subject of the content;
receiving an identity for a champion, wherein the champion is the author of the content, and the identity of the champion is distinct from the identity of the individual user;
utilizing the identity of the first individual user to access individual user preference information provided and/or authorized by the first individual user;
utilizing the identity of the champion to access champion preference information provided and/or authorized by the champion;
deriving champion fit data as an aggregation of the individual user preference information, the champion preference information, and the subject of the content; and
providing to the content provider the champion fit data to permit the provision of the content to the first individual user, wherein the provision of the content to the first individual user comprises filtering, prioritizing, modifying and/or delivery of content associated with the content provider in whole or in part to the first individual user.
91. The method of claim 90 further comprising:
after delivery of the content to the individual user, receiving feedback from the individual user, wherein the feedback indicates, at least in part, performance of the champion; and
determining a payout amount for the champion based, at least in part, on the received feedback.
92. The method of claim 90 further comprising:
crediting an account associated with the champion upon the one or more of filtering, prioritizing, or modifying the content in its provision to the first individual user or upon the provisioning of the content to the first individual user.
93. The method of claim 90 wherein deriving champion fit data further comprises:
receiving, from a third-party, verification data pertaining to the champion and utilizing the verification data in the derivation of the champion fit data.
94. The method of claim 90 wherein the individual user preference information further comprises an assertion comprising a forward-looking declaration of the individual user's intention to take a future action related to the subject of the content.
95. The method of claim 90 further comprising:
receiving an identity from each of one or more of additional individual users in addition to the individual user;
grouping the individual user and the one or more of additional individual users into a shared content group of users;
utilizing the identity of each individual user in the shared content group to access user preference information provided and/or authorized by the users in the shared content group;
generating shared content group preference information by aggregating user preference information of each of the users in the shared content group; and
wherein deriving champion fit data is further performed as an aggregation of the shared content group preference information.
US17/585,255 2013-09-26 2022-01-26 Providing targeted content based on a user's preferences Abandoned US20220261853A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/585,255 US20220261853A1 (en) 2013-09-26 2022-01-26 Providing targeted content based on a user's preferences

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
US201361883180P 2013-09-26 2013-09-26
US201361891323P 2013-10-15 2013-10-15
US201461970878P 2014-03-26 2014-03-26
US201462024973P 2014-07-15 2014-07-15
US201462024964P 2014-07-15 2014-07-15
PCT/US2014/057532 WO2015048338A1 (en) 2013-09-26 2014-09-25 Providing targeted content based on a user's moral values
US201614916151A 2016-03-02 2016-03-02
US16/730,917 US20200349610A1 (en) 2013-09-26 2019-12-30 Providing targeted content based on a user's preferences
US17/585,255 US20220261853A1 (en) 2013-09-26 2022-01-26 Providing targeted content based on a user's preferences

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US16/730,917 Continuation US20200349610A1 (en) 2013-09-26 2019-12-30 Providing targeted content based on a user's preferences

Publications (1)

Publication Number Publication Date
US20220261853A1 true US20220261853A1 (en) 2022-08-18

Family

ID=52744470

Family Applications (6)

Application Number Title Priority Date Filing Date
US14/916,151 Active 2035-12-19 US10546326B2 (en) 2013-09-26 2014-09-25 Providing targeted content based on a user's preferences
US15/128,917 Active US10580043B2 (en) 2013-09-26 2015-03-25 Computerized method and system for providing customized entertainment content
US16/730,917 Abandoned US20200349610A1 (en) 2013-09-26 2019-12-30 Providing targeted content based on a user's preferences
US16/784,120 Active US11127048B2 (en) 2013-09-26 2020-02-06 Computerized method and system for providing customized entertainment content
US17/399,751 Active US11687976B2 (en) 2013-09-26 2021-08-11 Computerized method and system for providing customized entertainment content
US17/585,255 Abandoned US20220261853A1 (en) 2013-09-26 2022-01-26 Providing targeted content based on a user's preferences

Family Applications Before (5)

Application Number Title Priority Date Filing Date
US14/916,151 Active 2035-12-19 US10546326B2 (en) 2013-09-26 2014-09-25 Providing targeted content based on a user's preferences
US15/128,917 Active US10580043B2 (en) 2013-09-26 2015-03-25 Computerized method and system for providing customized entertainment content
US16/730,917 Abandoned US20200349610A1 (en) 2013-09-26 2019-12-30 Providing targeted content based on a user's preferences
US16/784,120 Active US11127048B2 (en) 2013-09-26 2020-02-06 Computerized method and system for providing customized entertainment content
US17/399,751 Active US11687976B2 (en) 2013-09-26 2021-08-11 Computerized method and system for providing customized entertainment content

Country Status (5)

Country Link
US (6) US10546326B2 (en)
EP (2) EP3534318A1 (en)
AU (2) AU2014324893B2 (en)
CA (1) CA2923041A1 (en)
WO (1) WO2015048338A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190278461A1 (en) * 2018-03-06 2019-09-12 Mudpie, Sa De Cv Recommendation acknowledgement and tracking
US20220092615A1 (en) * 2020-09-24 2022-03-24 Line Corporation Method, system, and non-transitory computer readable record medium for providing information data using transportation method
US20230004997A1 (en) * 2021-06-29 2023-01-05 The Nielsen Company (Us), Llc Methods and apparatus to estimate cardinality across multiple datasets represented using bloom filter arrays
US11651386B1 (en) * 2022-04-05 2023-05-16 Watch Skins Corporation Systems and methods to track display of a digital content item and distribute rewards based on the display
US11676160B2 (en) 2020-02-11 2023-06-13 The Nielsen Company (Us), Llc Methods and apparatus to estimate cardinality of users represented in arbitrarily distributed bloom filters
US11711236B2 (en) * 2018-05-18 2023-07-25 Alarm.Com Incorporated Machine learning for home understanding and notification
US11741068B2 (en) 2020-06-30 2023-08-29 The Nielsen Company (Us), Llc Methods and apparatus to estimate cardinality of users represented across multiple bloom filter arrays
US20230281548A1 (en) * 2022-03-02 2023-09-07 At&T Intellectual Property I, L.P. System for machine learned embedding and assessment of actor value attributes
US11757958B1 (en) * 2015-09-02 2023-09-12 Confinement Telephony Technology, Llc Systems and methods for secure, controlled virtual visitation with confinement institution inmates
US11755924B2 (en) 2018-05-18 2023-09-12 Objectvideo Labs, Llc Machine learning for home understanding and notification
US11755545B2 (en) 2020-07-31 2023-09-12 The Nielsen Company (Us), Llc Methods and apparatus to estimate audience measurement metrics based on users represented in bloom filter arrays
US11768471B1 (en) 2021-07-02 2023-09-26 Watch Skins Corporation Systems and methods for creating a customized watch face and retrieving the watch face to be displayed

Families Citing this family (487)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8688517B2 (en) * 2009-02-13 2014-04-01 Cfph, Llc Method and apparatus for advertising on a mobile gaming device
US9538003B2 (en) * 2009-09-18 2017-01-03 Audionow Ip Holdings, Llc System and method for interactive advertisement augmentation via a called voice connection
BR112014002827B1 (en) 2011-08-05 2021-09-28 Fox Sports Productions, Llc METHOD AND SYSTEM FOR SELECTIVE CAPTURE AND PRESENTATION OF PORTIONS OF NATIVE DIFFUSION IMAGES IN A MULTIPLE DIFFUSION CAMERA SYSTEM; AND METHOD AND SYSTEM FOR SELECTIVE CAPTURE AND DISPLAY PORTIONS OF NATIVE IMAGE DIFFUSION IN A MULTIPLE DIFFUSION CAMERA SYSTEM
US11039109B2 (en) 2011-08-05 2021-06-15 Fox Sports Productions, Llc System and method for adjusting an image for a vehicle mounted camera
CA2791935A1 (en) 2012-03-30 2013-09-30 Disternet Technology, Inc. Transcoding system and method
US9015744B1 (en) * 2012-06-25 2015-04-21 IMBD.com, Inc. Ascertaining events in media
CN103546517B (en) * 2012-07-16 2018-03-20 腾讯科技(深圳)有限公司 Network information push system and method
GB2505535B (en) * 2012-09-03 2015-06-10 Nds Ltd Method and apparatus for selection of advertisements to fill a commercial break of an unknown duration
US9654591B2 (en) * 2012-10-01 2017-05-16 Facebook, Inc. Mobile device-related measures of affinity
US11259087B2 (en) 2012-10-03 2022-02-22 Mimik Technology Inc. System and method for managing streaming services
US9450907B2 (en) * 2013-03-14 2016-09-20 Facebook, Inc. Bundled event memories
US9691428B2 (en) * 2013-03-15 2017-06-27 Fitbit, Inc. Identifying available exercises for customizing an exercise session
CN104052782B (en) 2013-03-15 2020-09-11 腾讯科技(深圳)有限公司 Information sharing method and system
US10242347B1 (en) * 2013-04-01 2019-03-26 Sundaram Natarajan System for rapid development of schedule controled networkable merchant ecommerce sites
US10943213B1 (en) * 2013-04-01 2021-03-09 Sundaram Natarajan Back-end production and delivery system for schedule controlled networkable merchant e-commerce sites
US11291920B2 (en) * 2013-05-22 2022-04-05 David S. Thompson Interaction interleaver
US11392987B2 (en) 2013-10-09 2022-07-19 Mobile Technology Corporation Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices
WO2015054291A1 (en) 2013-10-09 2015-04-16 Mobile Technology Corporation, LLC Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices
US10783554B1 (en) * 2014-02-25 2020-09-22 Groupon, Inc. Generation of promotion in an augmented reality
US10679151B2 (en) 2014-04-28 2020-06-09 Altair Engineering, Inc. Unit-based licensing for third party access of digital content
US9842507B1 (en) * 2014-05-01 2017-12-12 Grokker Inc. Video filming and discovery system
US20150324810A1 (en) * 2014-05-07 2015-11-12 Ebay Inc. Personal universal profile
US9729933B2 (en) 2014-06-30 2017-08-08 Rovi Guides, Inc. Systems and methods for loading interactive media guide data based on user history
US10120932B2 (en) * 2014-07-24 2018-11-06 Adobe Systems Incorporated Social capture rules
ES2875048T3 (en) * 2014-08-12 2021-11-08 Groupon Inc Method, apparatus and software product for controlling the distribution of content via transceivers to a display
KR102337509B1 (en) * 2014-08-29 2021-12-09 삼성전자주식회사 Method for providing content and electronic device thereof
US20160080810A1 (en) * 2014-09-16 2016-03-17 Samsung Electronics Co., Ltd. System and method for content recommendation in home network
US11250081B1 (en) * 2014-09-24 2022-02-15 Amazon Technologies, Inc. Predictive search
US10405044B1 (en) * 2014-09-30 2019-09-03 Apple Inc. Content notification system and method
WO2016049835A1 (en) * 2014-09-30 2016-04-07 Hewlett-Packard Development Company, L.P. Communication of event-based content
US10560418B2 (en) * 2014-10-02 2020-02-11 Facebook, Inc. Techniques for managing discussion sharing on a mobile platform
EP3205379A4 (en) * 2014-10-10 2018-01-24 Fujitsu Limited Skill determination program, skill determination method, skill determination device, and server
US9655034B2 (en) * 2014-10-31 2017-05-16 At&T Intellectual Property I, L.P. Transaction sensitive access network discovery and selection
US9629076B2 (en) 2014-11-20 2017-04-18 At&T Intellectual Property I, L.P. Network edge based access network discovery and selection
US10051069B2 (en) * 2014-11-26 2018-08-14 International Business Machines Corporation Action based trust modeling
CN105721523B (en) * 2014-12-02 2019-06-11 阿里巴巴集团控股有限公司 Delet method, server and the terminal device of PUSH message
US11205193B2 (en) * 2014-12-08 2021-12-21 Vungle, Inc. Systems and methods for communicating with devices with a customized adaptive user experience
US11100536B2 (en) 2014-12-08 2021-08-24 Vungle, Inc. Systems and methods for providing advertising services to devices with a customized adaptive user experience based on adaptive algorithms
US11758238B2 (en) 2014-12-13 2023-09-12 Fox Sports Productions, Llc Systems and methods for displaying wind characteristics and effects within a broadcast
US11159854B2 (en) 2014-12-13 2021-10-26 Fox Sports Productions, Llc Systems and methods for tracking and tagging objects within a broadcast
CN105791906A (en) * 2014-12-15 2016-07-20 深圳Tcl数字技术有限公司 Information pushing method and system
US10762534B1 (en) * 2014-12-29 2020-09-01 Groupon, Inc. Motion data based consumer interfaces
US20160189173A1 (en) * 2014-12-30 2016-06-30 The Nielsen Company (Us), Llc Methods and apparatus to predict attitudes of consumers
US11295343B1 (en) * 2014-12-30 2022-04-05 Groupon, Inc. System and apparatus for self-forming ad-hoc group promotions
US10176457B2 (en) * 2015-02-05 2019-01-08 Sap Se System and method automatically learning and optimizing sequence order
US20160260340A1 (en) * 2015-02-07 2016-09-08 Alan Discount Automated sports training workflow, delivery and tracking system
US10284537B2 (en) 2015-02-11 2019-05-07 Google Llc Methods, systems, and media for presenting information related to an event based on metadata
US11048855B2 (en) * 2015-02-11 2021-06-29 Google Llc Methods, systems, and media for modifying the presentation of contextually relevant documents in browser windows of a browsing application
US10223459B2 (en) 2015-02-11 2019-03-05 Google Llc Methods, systems, and media for personalizing computerized services based on mood and/or behavior information from multiple data sources
US9769564B2 (en) 2015-02-11 2017-09-19 Google Inc. Methods, systems, and media for ambient background noise modification based on mood and/or behavior information
US11392580B2 (en) 2015-02-11 2022-07-19 Google Llc Methods, systems, and media for recommending computerized services based on an animate object in the user's environment
US20180025424A1 (en) * 2015-02-17 2018-01-25 Tsx Inc. System and method for electronic data submission processing
US10389844B2 (en) * 2015-02-23 2019-08-20 International Business Machines Corporation Populating a user network for a focus user
KR101551656B1 (en) * 2015-02-25 2015-09-09 이진혁 The method and apparatus for changeable social network service
US10409464B2 (en) * 2015-03-18 2019-09-10 Microsoft Technology Licensing, Llc Providing a context related view with a wearable apparatus
EP3073718B1 (en) * 2015-03-27 2019-01-30 Deutsche Telekom AG Method for the individual prediction of the use and/or customisation of the use of a personalized telecommunication terminal to be operated by a user, telecommunication terminal, computer program and a computer program product
US10387173B1 (en) * 2015-03-27 2019-08-20 Intuit Inc. Method and system for using emotional state data to tailor the user experience of an interactive software system
US10915232B1 (en) * 2015-04-09 2021-02-09 Integral Ad Science, Inc. Methods, systems, and media for specifying different content management techniques across various publishing platforms
US20160321547A1 (en) * 2015-04-30 2016-11-03 Globalfoundries Inc. Intelligent wardrobe program
US10147118B2 (en) * 2015-05-14 2018-12-04 International Business Machines Corporation Detection of mobile device pairing patterns using transactional proximity
US10129706B2 (en) 2015-06-05 2018-11-13 At&T Intellectual Property I, L.P. Context sensitive communication augmentation
US10162351B2 (en) 2015-06-05 2018-12-25 At&T Intellectual Property I, L.P. Remote provisioning of a drone resource
KR20160146311A (en) * 2015-06-12 2016-12-21 삼성전자주식회사 Method for providing user preference program notification in a electronic device and the electronic device therefor
EP3311352A1 (en) * 2015-06-18 2018-04-25 Thomson Licensing User-controlled distribution and collection of tracked data
US10462524B2 (en) * 2015-06-23 2019-10-29 Facebook, Inc. Streaming media presentation system
US10187684B2 (en) 2015-06-23 2019-01-22 Facebook, Inc. Streaming media presentation system
US10719710B2 (en) * 2015-06-24 2020-07-21 Intel Corporation Capturing media moments of people using an aerial camera system
US20160379214A1 (en) * 2015-06-25 2016-12-29 International Business Machines Corporation Privacy protection in ecommerce/logistics
US11403710B1 (en) * 2015-07-06 2022-08-02 Daniel Scott Davidson Reward system and method for a user vehicle equipped with monitoring sensors
US10262375B1 (en) 2015-07-13 2019-04-16 United Services Automobile Association (“USAA”) Gamification of renter's/homeowner's insurance products
KR101813901B1 (en) * 2015-07-29 2018-01-03 성 완 김 Online advertising method using a free advertising website
WO2017024058A1 (en) * 2015-08-03 2017-02-09 Ingalls Information Security Ip, L.L.C. Network security monitoring and correlation system and method of using same
US10554611B2 (en) * 2015-08-10 2020-02-04 Google Llc Privacy aligned and personalized social media content sharing recommendations
US11258868B2 (en) * 2015-09-04 2022-02-22 Meta Platforms, Inc. Identifying interactions performed by users of an online system with third party content based on information received by the online system from a tracking mechanism
US10872354B2 (en) * 2015-09-04 2020-12-22 Robin S Slomkowski System and method for personalized preference optimization
US9832504B2 (en) * 2015-09-15 2017-11-28 Google Inc. Event-based content distribution
US10326702B2 (en) * 2015-09-17 2019-06-18 Facebook, Inc. Data service levels
US10685055B2 (en) 2015-09-23 2020-06-16 Altair Engineering, Inc. Hashtag-playlist content sequence management
US10419788B2 (en) * 2015-09-30 2019-09-17 Nathan Dhilan Arimilli Creation of virtual cameras for viewing real-time events
CN108141460B (en) * 2015-10-14 2020-12-04 三星电子株式会社 System and method for privacy management of unlimited data streams
US10178421B2 (en) * 2015-10-30 2019-01-08 Rovi Guides, Inc. Methods and systems for monitoring content subscription usage
US9652896B1 (en) 2015-10-30 2017-05-16 Snap Inc. Image based tracking in augmented reality systems
CN106683593A (en) * 2015-11-06 2017-05-17 沈维 Billboard containing coding information
US10586300B2 (en) 2015-11-10 2020-03-10 Gt Gettaxi Limited Graphical user interface (GUI) for implementing controls for geographic conveyance
US20180240304A1 (en) * 2015-11-16 2018-08-23 Flo, Llc Rewards-Based Gaming System with In-game Ordering
US20170149719A1 (en) * 2015-11-19 2017-05-25 Sungyoung Yeh Method for providing social network service with dual accounts of interest and identification
US9984499B1 (en) 2015-11-30 2018-05-29 Snap Inc. Image and point cloud based tracking and in augmented reality systems
US10540627B2 (en) * 2015-12-04 2020-01-21 Facebook, Inc. Content relevance in a social networking system using population-representative human rater pool
US20170164357A1 (en) * 2015-12-08 2017-06-08 At&T Intellectual Property I, Lp Automated Diplomatic Interactions For Multiple Users Of A Shared Device
US10528985B2 (en) * 2015-12-14 2020-01-07 International Business Machines Corporation Determining a personalized advertisement channel
US10534866B2 (en) 2015-12-21 2020-01-14 International Business Machines Corporation Intelligent persona agents for design
US10621213B2 (en) * 2015-12-23 2020-04-14 Intel Corporation Biometric-data-based ratings
JP6727805B2 (en) * 2015-12-25 2020-07-22 ザ コカ・コーラ カンパニーThe Coca‐Cola Company Vending machines and mobile terminals
US10360296B2 (en) * 2016-01-07 2019-07-23 American Express Travel Related Services Company, Inc. System and method for online purchase autofill
US11159519B2 (en) * 2016-01-13 2021-10-26 American Express Travel Related Services Company, Inc. Contextual injection
JP6132037B1 (en) * 2016-01-15 2017-05-24 カシオ計算機株式会社 Wireless communication method and program
US11227243B2 (en) * 2016-01-29 2022-01-18 At&T Intellectual Property I, L.P. Communication system with enterprise analysis and methods for use therewith
US10262331B1 (en) * 2016-01-29 2019-04-16 Videomining Corporation Cross-channel in-store shopper behavior analysis
US11301572B2 (en) 2016-02-27 2022-04-12 Gryphon Online Safety, Inc. Remotely controlling access to online content
US10440025B2 (en) * 2016-06-07 2019-10-08 Gryphon Online Safety, Inc Remotely controlling access to online content
FR3048522B1 (en) * 2016-03-02 2018-03-16 Bull Sas SYSTEM FOR SUGGESTION OF A LIST OF ACTIONS TO A USER AND ASSOCIATED METHOD
US10471304B2 (en) 2016-03-08 2019-11-12 Sportsmedia Technology Corporation Systems and methods for integrated automated sports data collection and analytics platform
US10086231B2 (en) * 2016-03-08 2018-10-02 Sportsmedia Technology Corporation Systems and methods for integrated automated sports data collection and analytics platform
US10970723B2 (en) * 2016-03-19 2021-04-06 DealCoachPro, Inc. Computer-implemented system and methods for providing sales information to sales professionals
US11100447B1 (en) * 2016-03-19 2021-08-24 DealCoachPro Inc. Managing sales opportunities within an organization
US10223424B2 (en) * 2016-03-22 2019-03-05 International Business Machines Corporation Management of information from verified experts
MX2018012578A (en) 2016-04-15 2019-03-01 Walmart Apollo Llc Systems and methods for providing content-based product recommendations.
US10592959B2 (en) * 2016-04-15 2020-03-17 Walmart Apollo, Llc Systems and methods for facilitating shopping in a physical retail facility
WO2017181017A1 (en) 2016-04-15 2017-10-19 Wal-Mart Stores, Inc. Partiality vector refinement systems and methods through sample probing
TW201737124A (en) * 2016-04-15 2017-10-16 鴻海精密工業股份有限公司 System and method for recommending music
US10581943B2 (en) * 2016-04-22 2020-03-03 Home Box Office, Inc. Streaming media state machine
US10387896B1 (en) * 2016-04-27 2019-08-20 Videomining Corporation At-shelf brand strength tracking and decision analytics
CN105974802B (en) * 2016-04-27 2017-09-29 腾讯科技(深圳)有限公司 A kind of methods, devices and systems of control smart machine
US10824932B2 (en) * 2016-04-29 2020-11-03 Microsoft Technology Licensing, Llc Context-aware digital personal assistant supporting multiple accounts
US10939164B2 (en) * 2016-05-10 2021-03-02 Rovi Guides, Inc. Method and system for transferring an interactive feature to another device
US10304115B2 (en) * 2016-05-24 2019-05-28 Uber Technologies, Inc. Quantification of user receptiveness via machine learning
US20170345085A1 (en) * 2016-05-31 2017-11-30 International Business Machines Corporation Item location management using distributed sensors
US10546229B2 (en) 2016-06-02 2020-01-28 Kodak Alaris Inc. System and method for predictive curation, production infrastructure, and personal content assistant
US10354262B1 (en) * 2016-06-02 2019-07-16 Videomining Corporation Brand-switching analysis using longitudinal tracking of at-shelf shopper behavior
US11257171B2 (en) 2016-06-10 2022-02-22 Understory, LLC Data processing system for managing activities linked to multimedia content
US9852480B1 (en) 2016-06-10 2017-12-26 Understory, LLC Data processing system for managing activities linked to multimedia content
US10102593B2 (en) 2016-06-10 2018-10-16 Understory, LLC Data processing system for managing activities linked to multimedia content when the multimedia content is changed
US10691749B2 (en) 2016-06-10 2020-06-23 Understory, LLC Data processing system for managing activities linked to multimedia content
US10038602B2 (en) * 2016-06-13 2018-07-31 International Business Machines Corporation Monitoring resource consumption based on fixed cost for threshold use and additional cost for use above the threshold
US11278807B2 (en) * 2016-06-13 2022-03-22 Sony Interactive Entertainment LLC Game play companion application
US20170364968A1 (en) * 2016-06-16 2017-12-21 Conduent Business Services, Llc Method and system for cost sharing in a pooled vehicle
US20170366592A1 (en) * 2016-06-21 2017-12-21 Facebook, Inc. Systems and methods for event broadcasts
US20170364962A1 (en) * 2016-06-21 2017-12-21 Wal-Mart Stores, Inc. Systems and methods for communicating sourcing information to customers
EP3476067B1 (en) * 2016-06-22 2021-12-22 Luehrs, Doug Devices, methods, and user interfaces for facilitating time-shifted broadcast program recording and playback with ad play credit calculation
US20170372337A1 (en) * 2016-06-28 2017-12-28 Linkedin Corporation Evaluating and comparing predicted customer purchase behavior for educational technology products
US20170372225A1 (en) * 2016-06-28 2017-12-28 Microsoft Technology Licensing, Llc Targeting content to underperforming users in clusters
US10346872B2 (en) * 2016-06-29 2019-07-09 International Business Machines Corporation System, method, and recording medium for splitting and merging advertisements to a plurality of devices
WO2018005903A1 (en) * 2016-06-30 2018-01-04 Zowdow, Inc. Systems and methods for enhanced search, content, and advertisement delivery
US10885478B2 (en) * 2016-07-06 2021-01-05 Palo Alto Research Center Incorporated Computer-implemented system and method for providing contextually relevant task recommendations to qualified users
US10373464B2 (en) 2016-07-07 2019-08-06 Walmart Apollo, Llc Apparatus and method for updating partiality vectors based on monitoring of person and his or her home
US10664899B2 (en) * 2016-08-15 2020-05-26 Google Llc Systems and methods for detection of navigation to physical venue and suggestion of alternative actions
CA2976505A1 (en) * 2016-08-15 2018-02-15 Royal Bank Of Canada System and method for predictive digital profiles
US11004100B2 (en) 2016-08-17 2021-05-11 Observa, Inc. System and method for coordinating a campaign for observers of real-world data
US10902439B2 (en) 2016-08-17 2021-01-26 Observa, Inc. System and method for collecting real-world data in fulfillment of observation campaign opportunities
US10990986B2 (en) 2016-08-17 2021-04-27 Observa, Inc. System and method for optimizing an observation campaign in response to observed real-world data
US10838992B2 (en) * 2016-08-17 2020-11-17 International Business Machines Corporation Content selection for usage within a policy
US10614076B2 (en) * 2016-08-18 2020-04-07 International Business Machines Corporation Modification of ground truth tables based on real-time user interaction
US10121513B2 (en) * 2016-08-30 2018-11-06 International Business Machines Corporation Dynamic image content overlaying
US10375352B2 (en) * 2016-08-31 2019-08-06 Amazon Technologies, Inc. Location-weighted remuneration for audio/video recording and communication devices
US10650621B1 (en) 2016-09-13 2020-05-12 Iocurrents, Inc. Interfacing with a vehicular controller area network
SG10201608061XA (en) * 2016-09-27 2018-04-27 Mastercard International Inc Method and system for communicating advertisement materials
US10055891B2 (en) * 2016-10-07 2018-08-21 Bank Of America Corporation System for prediction of future circumstances and generation of real-time interactive virtual reality user experience
US10789630B2 (en) * 2016-10-10 2020-09-29 Paypal, Inc. Predictive engine for online distribution of sensitive transaction processing information
JP7098610B2 (en) * 2016-10-14 2022-07-11 ロヴィ ガイズ, インコーポレイテッド Systems and methods for providing slow motion video streams at the same time as normal speed video streams in response to event detection
US10984460B2 (en) * 2016-10-14 2021-04-20 Under Armour, Inc. Medium, method and apparatus for native page generation
US9756607B1 (en) * 2016-10-26 2017-09-05 International Business Machines Corporation Automated notification muting responsive to predicted location
US10417663B2 (en) 2016-10-28 2019-09-17 International Busienss Machines Corporation Ephemeral geofence campaign system
US20180129795A1 (en) * 2016-11-09 2018-05-10 Idefend Ltd. System and a method for applying dynamically configurable means of user authentication
US10470241B2 (en) 2016-11-15 2019-11-05 At&T Intellectual Property I, L.P. Multiple mesh drone communication
US10515390B2 (en) * 2016-11-21 2019-12-24 Nio Usa, Inc. Method and system for data optimization
US11488135B2 (en) * 2016-11-23 2022-11-01 Observa, Inc. System and method for using user rating in real-world data observation campaign
US10997616B2 (en) 2016-11-23 2021-05-04 Observa, Inc. System and method for correlating collected observation campaign data with sales data
US11093958B2 (en) 2016-11-23 2021-08-17 Observa, Inc. System and method for facilitating real-time feedback in response to collection of real-world data
US11023909B1 (en) * 2016-12-16 2021-06-01 Worldpay, Llc Systems and methods for predicting consumer spending behavior based on historical transaction activity progressions
US11017427B1 (en) * 2016-12-16 2021-05-25 Worldpay, Llc Systems and methods for attributing electronic purchase events to previous online and offline activity of the purchaser
US11049121B1 (en) * 2016-12-16 2021-06-29 Worldpay, Llc Systems and methods for tracking consumer electronic spend behavior to predict attrition
MX2019007272A (en) * 2016-12-20 2020-01-21 Walmart Apollo Llc Systems and methods for customizing content of a billboard.
US10503770B2 (en) * 2016-12-27 2019-12-10 Rovi Guides, Inc. Methods and systems for generating a media clip library
US10992973B2 (en) 2016-12-31 2021-04-27 Turner Broadcasting System, Inc. Publishing a plurality of disparate live media output stream manifests using live input streams and pre-encoded media assets
US11546400B2 (en) 2016-12-31 2023-01-03 Turner Broadcasting System, Inc. Generating a live media segment asset
US10856016B2 (en) 2016-12-31 2020-12-01 Turner Broadcasting System, Inc. Publishing disparate live media output streams in mixed mode based on user selection
US11962821B2 (en) 2016-12-31 2024-04-16 Turner Broadcasting System, Inc. Publishing a disparate live media output stream using pre-encoded media assets
US10965967B2 (en) 2016-12-31 2021-03-30 Turner Broadcasting System, Inc. Publishing a disparate per-client live media output stream based on dynamic insertion of targeted non-programming content and customized programming content
US11109086B2 (en) 2016-12-31 2021-08-31 Turner Broadcasting System, Inc. Publishing disparate live media output streams in mixed mode
US11503352B2 (en) 2016-12-31 2022-11-15 Turner Broadcasting System, Inc. Dynamic scheduling and channel creation based on external data
US10425700B2 (en) 2016-12-31 2019-09-24 Turner Broadcasting System, Inc. Dynamic scheduling and channel creation based on real-time or near-real-time content context analysis
US11051074B2 (en) 2016-12-31 2021-06-29 Turner Broadcasting System, Inc. Publishing disparate live media output streams using live input streams
US10694231B2 (en) * 2016-12-31 2020-06-23 Turner Broadcasting System, Inc. Dynamic channel versioning in a broadcast air chain based on user preferences
US12022142B2 (en) 2016-12-31 2024-06-25 Turner Broadcasting System, Inc. Publishing a plurality of disparate live media output stream manifests using live input streams and pre-encoded media assets
US10075753B2 (en) 2016-12-31 2018-09-11 Turner Broadcasting System, Inc. Dynamic scheduling and channel creation based on user selection
US11051061B2 (en) 2016-12-31 2021-06-29 Turner Broadcasting System, Inc. Publishing a disparate live media output stream using pre-encoded media assets
US11038932B2 (en) 2016-12-31 2021-06-15 Turner Broadcasting System, Inc. System for establishing a shared media session for one or more client devices
US10645462B2 (en) 2016-12-31 2020-05-05 Turner Broadcasting System, Inc. Dynamic channel versioning in a broadcast air chain
US11134309B2 (en) 2016-12-31 2021-09-28 Turner Broadcasting System, Inc. Creation of channels using pre-encoded media assets
US9924315B1 (en) 2017-01-03 2018-03-20 International Business Machines Corporation Dynamic geofence
US9820097B1 (en) 2017-01-05 2017-11-14 International Business Machines Corporation Geofence location detection
US10482327B1 (en) 2017-01-18 2019-11-19 Snap Inc. Media overlay selection system
US10860461B2 (en) * 2017-01-24 2020-12-08 Transform Sr Brands Llc Performance utilities for mobile applications
US10404804B2 (en) * 2017-01-30 2019-09-03 Global Tel*Link Corporation System and method for personalized virtual reality experience in a controlled environment
DE212017000296U1 (en) * 2017-02-13 2019-12-06 Google Llc Predicting break durations in content streams
CN106952063A (en) * 2017-02-14 2017-07-14 合肥市群智科技有限公司 A kind of driver's work flow based on mobile Internet can customize transportation management system with content
US10319149B1 (en) 2017-02-17 2019-06-11 Snap Inc. Augmented reality anamorphosis system
US10074381B1 (en) 2017-02-20 2018-09-11 Snap Inc. Augmented reality speech balloon system
US10692107B2 (en) * 2017-02-27 2020-06-23 Verizon Media Inc. Methods and systems for determining exposure to fixed-location dynamic displays
US20180260792A1 (en) * 2017-03-07 2018-09-13 Facebook, Inc. Intelligent Errand Planner
US10169973B2 (en) 2017-03-08 2019-01-01 International Business Machines Corporation Discontinuing display of virtual content and providing alerts based on hazardous physical obstructions
US10728313B2 (en) * 2017-03-09 2020-07-28 Microsoft Technology Licensing, Llc Future connection score of a new connection
CN107087017B (en) * 2017-03-09 2020-02-21 阿里巴巴集团控股有限公司 Method and device for service drainage
WO2018170041A1 (en) * 2017-03-14 2018-09-20 Walmart Apollo, Llc Rules-based declination of delivery fulfillment
US10389827B2 (en) * 2017-03-20 2019-08-20 International Business Machines Corporation Process for streaming content modification through remote and local user entanglement
CN106992012A (en) * 2017-03-24 2017-07-28 联想(北京)有限公司 Method of speech processing and electronic equipment
KR102611085B1 (en) * 2017-04-07 2023-12-08 킴벌리-클라크 월드와이드, 인크. Methods and systems for allocating resources in response to social media conversations
US20180300764A1 (en) * 2017-04-13 2018-10-18 Linkedin Corporation Modeling customer acquisition propensities for educational technology products
WO2018191591A1 (en) * 2017-04-13 2018-10-18 Walmart Apollo, Llc Vector-based characterizations of products and individuals with respect to personal partialities such as a propensity to behave as a first adopter
US10387730B1 (en) 2017-04-20 2019-08-20 Snap Inc. Augmented reality typography personalization system
US10922706B2 (en) * 2017-04-24 2021-02-16 Target Brands, Inc. Purchase referral incentivizer
US11037118B2 (en) * 2017-04-28 2021-06-15 International Business Machines Corporation Zero knowledge third party guarantee of service on decentralized computing platform
WO2018216271A1 (en) * 2017-05-24 2018-11-29 ソニー株式会社 Information processing device, information processing method, and program
US11245964B2 (en) 2017-05-25 2022-02-08 Turner Broadcasting System, Inc. Management and delivery of over-the-top services over different content-streaming systems
US11756106B1 (en) * 2017-05-26 2023-09-12 Qubit Digital Ltd. System and method for personalized portal interface
US10581953B1 (en) * 2017-05-31 2020-03-03 Snap Inc. Real-time content integration based on machine learned selections
SG10201705221TA (en) * 2017-06-23 2019-01-30 Mastercard International Inc Adaptive payment card system and process
US10762895B2 (en) 2017-06-30 2020-09-01 International Business Machines Corporation Linguistic profiling for digital customization and personalization
JP6522695B2 (en) * 2017-07-13 2019-05-29 本田技研工業株式会社 Life log utilization system, method and program
US10691945B2 (en) 2017-07-14 2020-06-23 International Business Machines Corporation Altering virtual content based on the presence of hazardous physical obstructions
US10440009B1 (en) * 2017-07-18 2019-10-08 Walgreen Co. Cross-device user identification and content access control using cookie stitchers
US10198843B1 (en) * 2017-07-21 2019-02-05 Accenture Global Solutions Limited Conversion of 2D diagrams to 3D rich immersive content
CN107388296B (en) * 2017-07-24 2019-06-25 杭州家亮云科技有限公司 A kind of cigarette stove inter-linked controlling method based on program cloud
US10958953B2 (en) * 2017-07-27 2021-03-23 Google Llc Methods, systems, and media for presenting notifications indicating recommended content
CN107388301B (en) * 2017-07-28 2019-06-25 杭州家亮云科技有限公司 A kind of Intelligent electromagnetic range control method based on program cloud
US11023345B1 (en) * 2017-07-28 2021-06-01 Groupon, Inc. System and apparatus for automated evaluation of compatibility of data structures and user devices based on explicit user feedback
US11323398B1 (en) * 2017-07-31 2022-05-03 Snap Inc. Systems, devices, and methods for progressive attachments
US10891219B1 (en) * 2017-08-07 2021-01-12 Electronic Arts Inc. Code failure prediction system
US10789536B2 (en) 2017-08-08 2020-09-29 International Business Machines Corporation Using Trie structures to efficiently identify similarities among topical subjects
US10949325B1 (en) 2017-08-18 2021-03-16 Electronic Arts Inc. Automated cross-session video game testing
US10171940B1 (en) 2017-09-07 2019-01-01 International Business Machines Corporation Transportation activated geofence
KR101967859B1 (en) * 2017-09-08 2019-08-13 전자부품연구원 System and method for managing digital signage
US20190087832A1 (en) 2017-09-15 2019-03-21 Pearson Education, Inc. Digital credential field data mapping
US10740974B1 (en) * 2017-09-15 2020-08-11 Snap Inc. Augmented reality system
WO2019059213A1 (en) * 2017-09-20 2019-03-28 パナソニックIpマネジメント株式会社 Product suggestion system, product suggestion method, and program
US11593865B2 (en) * 2017-09-29 2023-02-28 X Development Llc Customer experience
US11205171B2 (en) * 2017-10-05 2021-12-21 Mastercard International Incorporated Method and system for contextual offers on checkout
US10587933B2 (en) * 2017-10-10 2020-03-10 Via Cogito Design Llc System and method for providing an alert on delivering digital content
GB2567483B (en) * 2017-10-13 2022-07-20 Global Media Group Services Ltd Media break management
GB2553247B (en) 2017-10-21 2018-08-15 Bruce Kelman Alistair Apparatus and method for protecting the privacy of viewers of commercial television
US10931854B2 (en) * 2017-10-26 2021-02-23 Facebook, Inc. Aggregating video streams from cameras based on social connections in an online system
US10002259B1 (en) 2017-11-14 2018-06-19 Xiao Ming Mai Information security/privacy in an always listening assistant device
US11354590B2 (en) 2017-11-14 2022-06-07 Adobe Inc. Rule determination for black-box machine-learning models
US10659544B2 (en) * 2017-11-14 2020-05-19 Google Llc Opt-out compliance
US11146837B2 (en) 2017-12-08 2021-10-12 Hulu, LLC Audience location for media programs in live linear programming
US11157139B2 (en) 2017-12-19 2021-10-26 Google Llc Optimizing object displays on user interfaces
US11398302B2 (en) * 2017-12-21 2022-07-26 Fuelogics, LLC Comparing performance feedback with output of performance model to calibrate resource consumption control system and improve performance criterion
US11308480B2 (en) * 2017-12-22 2022-04-19 Paypal, Inc. Anonymizing user identity via machine-readable codes
US11397978B2 (en) * 2017-12-22 2022-07-26 Ryan Cmich Method and apparatus for identifying desire consensus through anonymous inputs
CN108134947A (en) * 2017-12-25 2018-06-08 横琴国际知识产权交易中心有限公司 A kind of video intercepting method and device
US11270071B2 (en) * 2017-12-28 2022-03-08 Comcast Cable Communications, Llc Language-based content recommendations using closed captions
US11157980B2 (en) 2017-12-28 2021-10-26 International Business Machines Corporation Building and matching electronic user profiles using machine learning
US11176486B2 (en) 2017-12-28 2021-11-16 International Business Machines Corporation Building and matching electronic standards profiles using machine learning
US10057257B1 (en) 2017-12-29 2018-08-21 Ringcentral, Inc. Systems and methods for authenticating a user for access to a conference session by validating the user's location
US20190208247A1 (en) 2017-12-29 2019-07-04 Dish Network L.L.C. Systems and methods for targeted television commercials based on viewer presence
US20210056112A1 (en) * 2018-01-05 2021-02-25 Oovvuu Pty Ltd. Method and system for context-aware provision of content
US11164181B2 (en) 2018-01-12 2021-11-02 Visa International Service Association Techniques for conducting transactions utilizing cryptocurrency
US10911807B2 (en) * 2018-01-19 2021-02-02 Microsoft Technology Licensing, Llc Optimization of an automation setting through selective feedback
EP3740841A4 (en) 2018-01-21 2021-10-20 Stats Llc System and method for predicting fine-grained adversarial multi-agent motion
CN111954564B (en) 2018-01-21 2024-07-26 斯塔特斯公司 Method and system for interactive, descriptive and improved game and player performance prediction in team sports
US10936438B2 (en) * 2018-01-24 2021-03-02 International Business Machines Corporation Automated and distributed backup of sensor data
US10832055B2 (en) 2018-01-31 2020-11-10 Sportsmedia Technology Corporation Systems and methods for providing video presentation and video analytics for live sporting events
US10909588B2 (en) 2018-02-01 2021-02-02 Givewith LLC Social platform promotion system and method
US20210365937A1 (en) * 2018-02-14 2021-11-25 Telefonaktiebolaget Lm Ericsson (Publ) Managing a smart contract in real-time
AU2019228502A1 (en) * 2018-02-27 2020-09-17 DraftKings, Inc. System and methods for prioritizing content packets based on a dynamically updated list of profile attributes
US11610222B1 (en) * 2018-02-27 2023-03-21 Meta Platforms, Inc. Lead user quality score
US10869105B2 (en) * 2018-03-06 2020-12-15 Dish Network L.L.C. Voice-driven metadata media content tagging
CN111989650A (en) 2018-03-12 2020-11-24 谷歌有限责任公司 System, method and apparatus for managing incomplete automated assistant actions
CA3051747C (en) * 2018-03-16 2023-10-17 Intersection Parent, Inc. Systems, methods and programmed products for electronic bidding on and electronic tracking, delivery and performance of digital advertisements on non-personal digital devices
US11093972B1 (en) * 2018-03-18 2021-08-17 Edatanetworks Inc Linking a transaction between a merchant and a resident of the same vicinity to the resident viewing the merchant broadcast advertisement
CN110322310B (en) * 2018-03-30 2022-08-26 杭州海康威视数字技术股份有限公司 Umbrella renting method and device under bus station scene, computer equipment and system
US10902514B2 (en) * 2018-04-10 2021-01-26 Wells Fargo Bank, N.A. Systems and methods for private loan creation
US11386412B1 (en) 2018-04-12 2022-07-12 Wells Fargo Bank, N.A. Authentication circle management
US11481837B1 (en) 2018-04-12 2022-10-25 Wells Fargo Bank, N.A. Authentication circle management
US11010999B2 (en) * 2018-04-16 2021-05-18 The Chamberlain Group, Inc. Systems and methods for voice-activated control of an access control platform
US10943308B1 (en) 2018-05-03 2021-03-09 Wells Fargo Bank, N.A. Systems and methods for pervasive advisor for major expenditures
US11030650B2 (en) * 2018-05-14 2021-06-08 Facebook, Inc. Selecting a third party website on which an action associated with a content item may be performed
US10531154B2 (en) * 2018-05-31 2020-01-07 International Business Machines Corporation Viewer-relation broadcasting buffer
US10412434B1 (en) * 2018-06-05 2019-09-10 Rovi Guides, Inc. Systems and methods for seamlessly connecting to a user's device to share and display a relevant media asset
KR102441087B1 (en) * 2018-06-05 2022-09-07 주식회사 네트워크디파인즈 Method and Apparatus for Proof of Delivery in a Trustless Network
US10375432B1 (en) 2018-06-05 2019-08-06 Rovi Guides, Inc. Systems and methods for seamlessly connecting devices based on relationships between the users of the respective devices
US20190384616A1 (en) * 2018-06-18 2019-12-19 Muthukrishnan Govindaraj Method for displaying and changing mobile commerce elements within native application instantly without code build
US11488182B2 (en) 2018-06-22 2022-11-01 Observa, Inc. System and method for identifying content in a web-based marketing environment
US20200019982A1 (en) * 2018-07-11 2020-01-16 Svm, Lp System and method for marketing incentive offers via the internet of things
US20200019979A1 (en) * 2018-07-11 2020-01-16 Svm, Lp System and method to market incentive offers via voice assistants
US11216786B2 (en) * 2018-07-17 2022-01-04 Kavita Ramchandani Snyder System and method for dispatching intelligent invitations to users within a network
CN110766489B (en) * 2018-07-25 2024-04-19 北京三星通信技术研究有限公司 Method for requesting content and providing content and corresponding device
JP6430059B1 (en) * 2018-07-26 2018-11-28 株式会社ドワンゴ Server and program
US11107115B2 (en) 2018-08-07 2021-08-31 Adobe Inc. Machine-learning based multi-step engagement strategy modification
US10609434B2 (en) 2018-08-07 2020-03-31 Adobe Inc. Machine-learning based multi-step engagement strategy generation and visualization
US10970766B2 (en) * 2018-08-09 2021-04-06 Eric Beans System and method for adjusting environmental conditions at a venue based on real time user-specified data
WO2020031102A1 (en) * 2018-08-09 2020-02-13 Vivi International Pty Ltd Real time synchronization of client device actions with presented content
US11532007B2 (en) 2018-08-16 2022-12-20 Frank S. Maggio Systems and methods for implementing user-responsive reactive advertising via voice interactive input/output devices
US10671315B2 (en) 2018-08-17 2020-06-02 Bank Of America Corporation Blockchain architecture for selective data restore and migration
US11468139B2 (en) 2018-08-31 2022-10-11 Data Skrive, Inc. Content opportunity scoring and automation
US10997760B2 (en) 2018-08-31 2021-05-04 Snap Inc. Augmented reality anthropomorphization system
US10681401B2 (en) * 2018-09-04 2020-06-09 At&T Intellectual Property I, L.P. System and method for verifying presentation of an advertisement inserted in a video stream
US10937011B1 (en) * 2018-09-11 2021-03-02 Rodan & Fields, Llc System and method for monitoring and updating content for an e-commerce platform
US10438224B1 (en) * 2018-09-12 2019-10-08 Barry Layne Engagement choice based marketing platform
US20200090143A1 (en) * 2018-09-14 2020-03-19 Andrea Iervolino System, Method, and Apparatus for Online Content Platform and Related Cryptocurrency
US20210256622A1 (en) * 2018-09-15 2021-08-19 Zillion Insurance Services, Inc. Method and collaborative platform for intelligent purchase decisions
US10871935B2 (en) * 2018-09-18 2020-12-22 Roku, Inc. Audio cancellation and content recognition of audio received over HDMI/ARC
US11704635B2 (en) * 2018-09-25 2023-07-18 T-Mobile Usa, Inc. Virtual currency for managing advertising and content delivery
US10898807B2 (en) 2018-10-07 2021-01-26 Music Powered Games, Llc System and method for dynamic generation and integration of interactive textual video game content
US10478729B1 (en) * 2018-10-07 2019-11-19 Music Powered Games, Llc System and method for dynamic generation and integration of interactive textual video game content
US11126416B2 (en) * 2018-10-15 2021-09-21 Affle (India) Limited Method and system for application installation and interaction during a podcast
US11762927B2 (en) * 2018-10-23 2023-09-19 Zeta Global Corp. Personalized content system
US11449880B2 (en) * 2018-11-01 2022-09-20 Nielsen Consumer Llc Methods, systems, apparatus and articles of manufacture to model eCommerce sales
CN109598537B (en) 2018-11-06 2020-07-31 阿里巴巴集团控股有限公司 Outdoor advertisement putting method and device
US11074456B2 (en) * 2018-11-14 2021-07-27 Disney Enterprises, Inc. Guided training for automation of content annotation
US11803590B2 (en) * 2018-11-16 2023-10-31 Dell Products L.P. Smart and interactive book audio services
EP3657810A1 (en) * 2018-11-21 2020-05-27 Telefonica Innovacion Alpha S.L Electronic device, method and system for inferring the impact of the context on user's wellbeing
US10671515B1 (en) 2018-11-30 2020-06-02 Bank Of America Corporation Recording and playback of electronic event sequence in a distributed ledger system
US10817912B2 (en) * 2018-12-04 2020-10-27 Capital One Services, Llc Identification of targets for a campaign by referencing a blockchain and/or a distributed system file system
KR20200067765A (en) * 2018-12-04 2020-06-12 키포인트 테크놀로지스 인디아 프라이비트 리미티드 System and method for serving hyper-contextual content in real-time
US11741376B2 (en) * 2018-12-07 2023-08-29 Opensesame Inc. Prediction of business outcomes by analyzing voice samples of users
US11997368B2 (en) * 2018-12-12 2024-05-28 GREE Inc. Video distribution system, video distribution method, and storage medium storing video distribution program
US11551115B2 (en) * 2018-12-21 2023-01-10 Ashraf Yussouff Systems and methods utilizing machine learning techniques to manage content in standalone multi-tenancy environments
US10880606B2 (en) 2018-12-21 2020-12-29 Turner Broadcasting System, Inc. Disparate live media output stream playout and broadcast distribution
US11082734B2 (en) 2018-12-21 2021-08-03 Turner Broadcasting System, Inc. Publishing a disparate live media output stream that complies with distribution format regulations
US10873774B2 (en) 2018-12-22 2020-12-22 Turner Broadcasting System, Inc. Publishing a disparate live media output stream manifest that includes one or more media segments corresponding to key events
CN109831698B (en) * 2018-12-28 2021-07-23 广州华多网络科技有限公司 Information auditing method and device, electronic equipment and computer readable storage medium
US11631289B2 (en) * 2019-01-22 2023-04-18 ACV Auctions Inc. Vehicle audio capture and diagnostics
US10887273B2 (en) * 2019-01-23 2021-01-05 Braze, Inc. Systems and methods for controlling delivery of user messages
US11014004B2 (en) * 2019-01-31 2021-05-25 Cardboard Live, Inc. Method and system for supplementing a video stream of a fantasy card videogame
US11972529B2 (en) 2019-02-01 2024-04-30 Snap Inc. Augmented reality system
US10917494B2 (en) 2019-02-01 2021-02-09 Google Llc Dynamic application content analysis
US11799864B2 (en) 2019-02-07 2023-10-24 Altair Engineering, Inc. Computer systems for regulating access to electronic content using usage telemetry data
US11082109B2 (en) 2019-02-22 2021-08-03 Aerial Technologies Inc. Self-learning based on Wi-Fi-based monitoring and augmentation
US11593837B2 (en) 2019-02-22 2023-02-28 Aerial Technologies Inc. Advertisement engagement measurement
US11586952B2 (en) 2019-02-22 2023-02-21 Aerial Technologies Inc. Robotic H matrix creation
WO2020170221A1 (en) 2019-02-22 2020-08-27 Aerial Technologies Inc. Handling concept drift in wi-fi-based localization
US11218769B2 (en) * 2019-02-22 2022-01-04 Aerial Technologies Inc. Smart media display
US11913970B2 (en) 2019-02-22 2024-02-27 Aerial Technologies Inc. Wireless motion detection using multiband filters
US11561963B1 (en) 2019-02-26 2023-01-24 Intuit Inc. Method and system for using time-location transaction signatures to enrich user profiles
US11178085B2 (en) * 2019-02-27 2021-11-16 A Social Company Social media platform for sharing reactions to videos
US11196692B2 (en) 2019-02-27 2021-12-07 A Social Company Social contract based messaging platform
CN113544697B (en) 2019-03-01 2024-09-06 斯塔特斯公司 Analyzing athletic performance with data and body gestures to personalize predictions of the performance
US20200286103A1 (en) * 2019-03-04 2020-09-10 Iris.Tv, Inc. Selecting digital media assets based on transitions across categories
US20200296462A1 (en) * 2019-03-11 2020-09-17 Wci One, Llc Media content presentation
US20200296316A1 (en) * 2019-03-11 2020-09-17 Quibi Holdings, LLC Media content presentation
US11232129B2 (en) * 2019-03-26 2022-01-25 At&T Intellectual Property I, L.P. Method for content synchronization and replacement
US10938942B2 (en) * 2019-03-27 2021-03-02 International Business Machines Corporation Dynamically modified delivery of elements in a sports related presentation
US20200351561A1 (en) * 2019-05-03 2020-11-05 Taylor A. Spencer Integrated social network and media streaming platform
WO2020227614A1 (en) 2019-05-08 2020-11-12 Stats Llc System and method for content and style predictions in sports
US12120396B2 (en) * 2019-05-15 2024-10-15 Google Llc Dynamic integration of customized supplemental media content
US11743130B2 (en) * 2019-05-15 2023-08-29 International Business Machines Corporation Smart edge network management
US11553026B2 (en) 2019-05-27 2023-01-10 International Business Machines Corporation Regulating content associated with a streaming platform
US20200380560A1 (en) * 2019-05-30 2020-12-03 Ncr Corporation Automated digital advertising using behavioral intelligence
US10861037B1 (en) * 2019-06-14 2020-12-08 Comcast Spectacor, LLC System and method for incorporating cross platform metrics for increased user engagement
US11941623B2 (en) 2019-06-25 2024-03-26 Paypal, Inc. Device manager to control data tracking on computing devices
US11317129B1 (en) * 2019-06-26 2022-04-26 Snap Inc. Targeted content distribution in a messaging system
US11405341B1 (en) 2019-06-26 2022-08-02 Snap Inc. Audience-based content optimization in a messaging system
CN113692563A (en) * 2019-06-27 2021-11-23 苹果公司 Modifying existing content based on target audience
US11321745B1 (en) 2019-06-27 2022-05-03 Enrico Chionna Ad banner overlay
US11109104B2 (en) * 2019-07-10 2021-08-31 Dish Network L.L.C. Viewer compositing for enhanced media recommendation and consumption
US20210027302A1 (en) * 2019-07-25 2021-01-28 Intuit Inc. Detecting life events by applying anomaly detection methods to transaction data
US11010775B2 (en) * 2019-07-29 2021-05-18 Capital One Services, Llc Determining shopping duration based on a movement of a user device and transaction data
US11178152B2 (en) * 2019-07-29 2021-11-16 The Meet Group, Inc. Method and system for live dating
US11216850B2 (en) * 2019-08-02 2022-01-04 Roku Dx Holdings, Inc. Predictive platform for determining incremental lift
JP6877499B2 (en) * 2019-08-02 2021-05-26 楽天グループ株式会社 Information processing equipment, information processing methods, and information processing programs
JP2022543864A (en) * 2019-08-05 2022-10-14 ホップラ リミテッド Method and system for providing content to media playback devices
CN110413431B (en) * 2019-08-05 2020-05-08 吉林吉大通信设计院股份有限公司 Intelligent identification early warning method for large data platform fault
KR20210016975A (en) * 2019-08-06 2021-02-17 현대자동차주식회사 Dialogue processing appratus, vehicle comprising the same and dialogue processing method
US11113713B2 (en) * 2019-08-22 2021-09-07 Edatanetworks Inc. Linking a transaction with a merchant to an interaction with an augmented reality advertisement
CN110535849A (en) * 2019-08-23 2019-12-03 深圳市新系区块链技术有限公司 Account information management method and device
US11322033B2 (en) * 2019-08-27 2022-05-03 International Business Machines Corporation Remote surface condition assessment
US11448726B2 (en) 2019-08-28 2022-09-20 Aerial Technologies Inc. System and method for presence and pulse detection from wireless signals
US10893329B1 (en) * 2019-09-03 2021-01-12 International Business Machines Corporation Dynamic occlusion of livestreaming
US11523253B2 (en) 2019-09-06 2022-12-06 Aerial Technologies Inc. Monitoring activity using Wi-Fi motion detection
US20210081862A1 (en) * 2019-09-16 2021-03-18 Lucas Parry System for managing a shared resource pool
US10687174B1 (en) 2019-09-25 2020-06-16 Mobile Technology, LLC Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices
CN112559098B (en) * 2019-09-26 2022-04-26 华为技术有限公司 Card rendering method and electronic equipment
CN110634035B (en) * 2019-09-27 2023-09-05 广州南翼信息科技有限公司 Face recognition popup advertisement system
WO2021067840A1 (en) * 2019-10-02 2021-04-08 Sudhir Diddee Connecting over the air radio transmission content to digital devices
US20210117814A1 (en) * 2019-10-17 2021-04-22 Manyworlds, Inc. Explanatory Integrity Determination Method and System
US20240040180A1 (en) * 2019-10-18 2024-02-01 Novi Digital Entertainment Private Limited System and method for real-time delivery of a target content in a streaming content
US11277653B2 (en) 2019-10-18 2022-03-15 Capital One Services, Llc Systems and methods for navigating vehicle inventory
US20210133908A1 (en) * 2019-10-30 2021-05-06 2Manycars Inc. Integrated social networking mobile application with ride sharing program
CN110597083B (en) * 2019-10-30 2022-12-06 广州市果豆科技有限责任公司 Intelligent household control method and system based on user weight
US11652893B2 (en) 2019-11-01 2023-05-16 Oracle International Corporation Enhanced processing of user profiles using data structures specialized for graphical processing units (GPUs)
US12056720B2 (en) 2019-11-05 2024-08-06 International Business Machines Corporation System and method for unsupervised abstraction of sensitive data for detection model sharing across entities
US11461793B2 (en) * 2019-11-05 2022-10-04 International Business Machines Corporation Identification of behavioral pattern of simulated transaction data
US11455656B2 (en) * 2019-11-18 2022-09-27 Walmart Apollo, Llc Methods and apparatus for electronically providing item advertisement recommendations
US11392984B2 (en) 2019-11-20 2022-07-19 Walmart Apollo, Llc Methods and apparatus for automatically providing item advertisement recommendations
WO2021113393A1 (en) * 2019-12-02 2021-06-10 Qwqer Llc Buyer and seller interaction system
WO2021113870A1 (en) * 2019-12-04 2021-06-10 Graciela Chichilnisky Offtake-based asset backed securities and co2 removal models
CN111045869B (en) * 2019-12-16 2023-03-10 上海钧正网络科技有限公司 Data backup method and device and readable storage medium
US11562084B2 (en) * 2019-12-19 2023-01-24 Augustine Fou System and method for secure, trustful internet interactions
CN111125432B (en) * 2019-12-25 2023-07-11 重庆能投渝新能源有限公司石壕煤矿 Video matching method and training rapid matching system based on same
CN116346762B (en) * 2019-12-28 2024-05-24 腾讯科技(深圳)有限公司 Resource value transfer method, system and related device
US11321651B2 (en) 2019-12-30 2022-05-03 Coupang Corp. Cycle and safety stock determination systems
US12026749B2 (en) * 2020-01-06 2024-07-02 Capital One Services, Llc Content optimization on a social media platform based on third-party data
US11228544B2 (en) * 2020-01-09 2022-01-18 International Business Machines Corporation Adapting communications according to audience profile from social media
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
WO2021161523A1 (en) * 2020-02-14 2021-08-19 三菱電機株式会社 Drive control device and drive control system
CN113327121A (en) * 2020-02-28 2021-08-31 阿里巴巴集团控股有限公司 Anchor selection related system, method, device and equipment
GB202003379D0 (en) * 2020-03-09 2020-04-22 Echobox Ltd Split testing system and methods
US11556953B2 (en) * 2020-03-10 2023-01-17 Google Llc Methods, systems, and media for timing presentation of content
US20210287118A1 (en) * 2020-03-11 2021-09-16 Versus Llc Artificial intelligence based techniques for generating dynamic content for online gaming systems
US11379884B2 (en) * 2020-03-16 2022-07-05 Virtual Rights Management Llc Celebrity-based AR advertising and social network
US11756052B2 (en) * 2020-03-30 2023-09-12 Arris Enterprises Llc Personal program source validation system
US11179644B2 (en) 2020-03-30 2021-11-23 Electronic Arts Inc. Videogame telemetry data and game asset tracker for session recordings
US20210304259A1 (en) * 2020-03-31 2021-09-30 Salesforce.Com, Inc. Methods and systems for delivery of customized content via voice recognition
TWI822419B (en) * 2020-04-17 2023-11-11 華南商業銀行股份有限公司 Portable and interactive system and operating method thereof
TWI822420B (en) * 2020-04-17 2023-11-11 華南商業銀行股份有限公司 Interactive system with handheld donation device and operating method thereof
TWI779279B (en) * 2020-04-17 2022-10-01 華南商業銀行股份有限公司 Interactive system and method thereof
JP7510273B2 (en) * 2020-04-21 2024-07-03 キヤノン株式会社 Information processing device and information processing method
EP4143694A4 (en) * 2020-04-29 2023-12-13 Brave Software, Inc. Decentralized privacy-preserving rewards with cryptographic black box accumulators
WO2021222874A1 (en) * 2020-04-30 2021-11-04 Halo Innovative Solutions Llc Method of multi-platform social media and/or streaming media advertising and revenue sharing via digital overlays on real-time video feeds
US11379875B2 (en) * 2020-04-30 2022-07-05 At&T Intellectual Property I, L.P. Systems and methods for time-based advertising
US11334613B2 (en) * 2020-05-01 2022-05-17 Yahoo Ad Tech Llc Group profile generation and content item selection based upon group profiles
US11446570B2 (en) 2020-05-08 2022-09-20 Electronic Arts Inc. Automated test multiplexing system
US11429182B2 (en) 2020-05-18 2022-08-30 Capital One Services, Llc Augmented reality virtual number generation
US12066883B2 (en) 2020-05-19 2024-08-20 Electronic Arts Inc. Glitch detection system
US11188902B1 (en) * 2020-05-20 2021-11-30 Louise Dorothy Saulog Sano Live time connection application method and devices
US11458409B2 (en) * 2020-05-27 2022-10-04 Nvidia Corporation Automatic classification and reporting of inappropriate language in online applications
CN111708938B (en) * 2020-05-27 2023-04-07 北京百度网讯科技有限公司 Method, apparatus, electronic device, and storage medium for information processing
CN111683135A (en) * 2020-06-04 2020-09-18 江南大学 Spectral nondestructive testing system for fresh meat
CN115715385A (en) 2020-06-05 2023-02-24 斯塔特斯公司 System and method for predicting formation in sports
US11669341B2 (en) 2020-06-09 2023-06-06 Meta Platforms, Inc. Secondary account creation
US11470051B1 (en) * 2020-06-18 2022-10-11 Meta Platforms, Inc. Secret user account
USD968439S1 (en) 2020-06-18 2022-11-01 Meta Platforms, Inc. Display screen or portion thereof with a graphical user interface
US12067518B2 (en) * 2020-07-09 2024-08-20 Leslie Sheridan Method and system for measuring computable climate action transactions as a benefit, gift, engagement, incentive, recognition, reward, teambuilding and training tool
CA3189815A1 (en) * 2020-07-22 2022-01-27 Bond Brand Loyalty Inc. Consumer analysis engines
US20220070501A1 (en) * 2020-08-27 2022-03-03 Warner Bros. Entertainment Inc. Social video platform for generating and experiencing content
GB2598748A (en) * 2020-09-10 2022-03-16 Advanced Commerce Ltd Scheduling displays on a terminal device
US11729247B2 (en) * 2020-09-24 2023-08-15 Capital One Services, Llc Systems and methods for decentralized detection of software platforms operating on website pages
WO2022069920A1 (en) * 2020-09-30 2022-04-07 Chan Tai Yan Paul Resource reallocation method and system for information and content delivery
CN116324668A (en) 2020-10-01 2023-06-23 斯塔特斯公司 Predicting NBA zenithal and quality from non-professional tracking data
US11763919B1 (en) 2020-10-13 2023-09-19 Vignet Incorporated Platform to increase patient engagement in clinical trials through surveys presented on mobile devices
US11783386B2 (en) * 2020-10-27 2023-10-10 Ncr Corporation Crowd-sourced activity processing
CN112291497B (en) * 2020-10-28 2023-04-07 上海赛连信息科技有限公司 Intelligent video customer service access method and device
US11700178B2 (en) 2020-10-30 2023-07-11 Nutanix, Inc. System and method for managing clusters in an edge network
US11290330B1 (en) 2020-10-30 2022-03-29 Nutanix, Inc. Reconciliation of the edge state in a telemetry platform
US11374807B2 (en) 2020-10-30 2022-06-28 Nutanix, Inc. Handling dynamic command execution in hybrid cloud environments
US11503130B2 (en) * 2020-11-04 2022-11-15 At&T Intellectual Property I, L.P. Methods and apparatuses for expanding targets of creatives based on signatures
US11523183B2 (en) * 2020-11-09 2022-12-06 Comcast Cable Communications, Llc Audio assistance during trick play operations
CN112101317B (en) * 2020-11-17 2021-02-19 深圳壹账通智能科技有限公司 Page direction identification method, device, equipment and computer readable storage medium
CN112418924B (en) * 2020-11-17 2021-08-20 上海东方财富金融数据服务有限公司 Advertisement pushing method based on big data and cloud computing and artificial intelligence platform
JP7089005B2 (en) * 2020-11-27 2022-06-21 株式会社スクウェア・エニックス Video game processing program and video game processing system
US11750569B2 (en) * 2020-12-09 2023-09-05 International Business Machines Corporation Private cloud user insight privacy
US12072781B2 (en) * 2020-12-23 2024-08-27 Intel Corporation Methods and apparatus for continuous monitoring of telemetry in the field
EP4271492A1 (en) * 2020-12-30 2023-11-08 Sony Interactive Entertainment Inc. Recommending game streams for spectating based on recognized or predicted gaming activity
US20220222716A1 (en) * 2021-01-13 2022-07-14 Samsung Electronics Co., Ltd. Electronic apparatus and control method thereof
WO2022153094A1 (en) * 2021-01-18 2022-07-21 Paresh Pravin Nanda System and method for controlling advertisement circulation on digital platforms
US20220245686A1 (en) * 2021-01-29 2022-08-04 HCL America Inc. Method and system for generating recommendations for users
EP4288167A1 (en) * 2021-02-05 2023-12-13 Stats Llc System and method for evaluating defensive performance using graph convolutional network
US20220256218A1 (en) * 2021-02-11 2022-08-11 Roku, Inc. Content-Modification System With Feature For Exposing Multiple Devices In A Household To The Same Or Similar Advertisements
CN113014564B (en) * 2021-02-19 2022-10-21 提亚有限公司 User matching method and device, computer equipment and storage medium
TWI823453B (en) * 2021-03-15 2023-11-21 神達數位股份有限公司 Advertisement push method and system
TWI785536B (en) * 2021-03-15 2022-12-01 神達數位股份有限公司 Advertisement push method and system
CN113032029A (en) * 2021-03-26 2021-06-25 北京字节跳动网络技术有限公司 Continuous listening processing method, device and equipment for music application
JP2022152630A (en) * 2021-03-29 2022-10-12 パナソニックIpマネジメント株式会社 Online video distribution support method and online video distribution support apparatus
US11880875B2 (en) 2021-04-01 2024-01-23 The Toronto-Dominion Bank Systems and methods for providing product recommendations
US20230145040A1 (en) * 2021-11-09 2023-05-11 Actv8, Inc. Method and apparatus for using a single qr code to provide varying user experiences
US11755763B2 (en) * 2021-04-30 2023-09-12 Rovi Guides, Inc. User-controlled viewing preferences
WO2022256566A1 (en) * 2021-06-03 2022-12-08 EyCrowd, Inc Advocate engagement systems and methods
US20220391943A1 (en) * 2021-06-03 2022-12-08 EyCrowd, Inc Advocate engagement systems and methods
US11586816B2 (en) 2021-06-11 2023-02-21 International Business Machines Corporation Content tailoring for diverse audiences
US11849160B2 (en) * 2021-06-22 2023-12-19 Q Factor Holdings LLC Image analysis system
US11917263B2 (en) 2021-06-23 2024-02-27 Rivit TV, Inc. Device, method, and graphical user interface for alternative advert system
US12056735B2 (en) 2021-06-23 2024-08-06 Rivit TV, Inc. Systems and methods of providing alternative advert (AA) query items and AA offers for an AA system
CN113486007A (en) * 2021-06-29 2021-10-08 天九共享网络科技集团有限公司 Information acquisition method, system, electronic device and storage medium
US11783001B2 (en) 2021-07-08 2023-10-10 Bank Of America Corporation System and method for splitting a video stream using breakpoints based on recognizing workflow patterns
WO2023283475A2 (en) * 2021-07-09 2023-01-12 Rally Inc. System and method for determining content effectiveness
US11724198B2 (en) 2021-08-11 2023-08-15 Sony Interactive Entertainment LLC Intelligent recommendations for gameplay session adjustment
US11724199B2 (en) * 2021-08-16 2023-08-15 Sony Interactive Entertainment LLC Parental controls of gameplay sessions
US20230068465A1 (en) * 2021-08-27 2023-03-02 Coupang Corp. Fully automated customer targeting algorithm optimized to maximize commercial value using machine learning methods
US11790400B2 (en) * 2021-09-20 2023-10-17 ConversionRobots Inc. System and method for tracking recipient interactions with physical, advertising mail
US20230086901A1 (en) * 2021-09-21 2023-03-23 Elizabeth Gearhart Video directory method
US20230093690A1 (en) * 2021-09-23 2023-03-23 Pumpjack Dataworks, Inc. Fan Valuation Method, System, and Uses Thereof
CN113868522B (en) * 2021-09-26 2024-08-09 北京达佳互联信息技术有限公司 Object recommendation method and device, electronic equipment and storage medium
US20230106411A1 (en) * 2021-10-05 2023-04-06 Allen Borza Systems and methods for tracking receipt of a gift
US12063416B2 (en) 2021-11-10 2024-08-13 International Business Machines Corporation Contextual smart switching via multi-modal learning mechanism
US12081632B2 (en) * 2021-12-23 2024-09-03 Apple Inc. Content customization and presentation based on user presence and identification
US11783851B2 (en) 2021-12-23 2023-10-10 ACV Auctions Inc. Multi-sensor devices and systems for evaluating vehicle conditions
DE102022101086A1 (en) 2022-01-18 2023-07-20 Uniqfeed Ag Video distribution system with switching facility for switching between multiple enhanced directional image sequences of a recorded real event
US20230231822A1 (en) * 2022-01-20 2023-07-20 Capital One Services, Llc Computer-based systems programmed for automatic adaptive content-based processing of electronic messages and methods of use thereof
US20230252506A1 (en) * 2022-02-04 2023-08-10 Felipe Juan Joaquin Polito System and method for real-time remote surveying
US12047253B2 (en) 2022-02-11 2024-07-23 Nutanix, Inc. System and method to provide priority based quality of service for telemetry data
WO2023158685A1 (en) * 2022-02-15 2023-08-24 Engle Davis Reed Method and server device for implementing non-fungible token (nft) round-by-round elimination tournaments
US11895368B2 (en) * 2022-03-04 2024-02-06 Humane, Inc. Generating, storing, and presenting content based on a memory metric
CN114302351B (en) * 2022-03-09 2022-06-17 太平金融科技服务(上海)有限公司深圳分公司 Short message service processing method and device, computer equipment and storage medium
US11765065B1 (en) 2022-03-23 2023-09-19 Nutanix, Inc. System and method for scalable telemetry
US20230368527A1 (en) * 2022-05-10 2023-11-16 Google Llc Object Filtering and Information Display in an Augmented-Reality Experience
US20230376968A1 (en) * 2022-05-17 2023-11-23 Fmr Llc Digital enrollment systems and methods
US20230419236A1 (en) * 2022-06-28 2023-12-28 Hallmark Cards, Incorporated Facilitating physical gifting from a virtual environment
US20240064379A1 (en) * 2022-08-17 2024-02-22 Baakhapaa IT and Marketing Solutions LLC System and Application for Streaming Video
US20240095731A1 (en) * 2022-09-21 2024-03-21 Community Gaming, Inc. Blockchain distribution of tournament rewards
US12106309B2 (en) * 2022-10-05 2024-10-01 Jpmorgan Chase Bank, N.A. Method and system for fraud prevention
TWI839908B (en) * 2022-10-24 2024-04-21 臺灣土地銀行股份有限公司 Consumer service integration and forecasting system and methods thereof
MX2022015861A (en) * 2022-12-09 2023-04-14 Jose Luis Vite Orozco System for the presentation, verification, and metrics of advertising content on screens or speakers of commercial establishments.
US20240330987A1 (en) * 2023-03-31 2024-10-03 Intuit Inc. Brand engine for extracting and presenting brand data with user interfaces
CN116166735B (en) * 2023-04-21 2023-07-04 民航成都信息技术有限公司 Aviation data processing method and device, electronic equipment and storage medium
US11960629B1 (en) * 2023-10-06 2024-04-16 PrivacyHawk, Inc. Determining an exposure rating to help prevent fraud risk from user data exposure
CN118411212B (en) * 2024-05-13 2024-10-29 广州畅想互动网络科技有限公司 Information directional delivery system based on big data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100281364A1 (en) * 2005-01-11 2010-11-04 David Sidman Apparatuses, Methods and Systems For Portable Universal Profile
US20120110032A1 (en) * 2010-10-29 2012-05-03 Fractor, LLC Methods and systems for concatenating and transferring web accessible content and metadata between networked computers or mobile devices
US20130157614A1 (en) * 2011-12-16 2013-06-20 Amana Future, Llc. Communication tracking and billing system
US20140214541A1 (en) * 2013-01-30 2014-07-31 Kiosked Oy Method and system for user-controlled rendering of mobile advertisements

Family Cites Families (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5724521A (en) * 1994-11-03 1998-03-03 Intel Corporation Method and apparatus for providing electronic advertisements to end users in a consumer best-fit pricing manner
US6460036B1 (en) 1994-11-29 2002-10-01 Pinpoint Incorporated System and method for providing customized electronic newspapers and target advertisements
US7171480B2 (en) 2001-01-29 2007-01-30 Sony Computer Entertainment America Inc. Method and system for providing auxiliary content located on local storage during download/access of primary content over a network
US5794210A (en) 1995-12-11 1998-08-11 Cybergold, Inc. Attention brokerage
US20060020614A1 (en) * 1997-08-08 2006-01-26 Kolawa Adam K Method and apparatus for automated selection, organization, and recommendation of items based on user preference topography
US6009410A (en) 1997-10-16 1999-12-28 At&T Corporation Method and system for presenting customized advertising to a user on the world wide web
US6134532A (en) 1997-11-14 2000-10-17 Aptex Software, Inc. System and method for optimal adaptive matching of users to most relevant entity and information in real-time
US6141010A (en) 1998-07-17 2000-10-31 B. E. Technology, Llc Computer interface method and apparatus with targeted advertising
US6263362B1 (en) * 1998-09-01 2001-07-17 Bigfix, Inc. Inspector for computed relevance messaging
JP2000113334A (en) 1998-09-30 2000-04-21 Ncr Internatl Inc Method and device for displaying advertisement message for customer by using sales management terminal equipment
US7260823B2 (en) 2001-01-11 2007-08-21 Prime Research Alliance E., Inc. Profiling and identification of television viewers
IL127889A0 (en) 1998-12-31 1999-10-28 Almondnet Ltd A method for transacting an advertisement transfer
US20040260653A1 (en) 1999-04-19 2004-12-23 First Data Corporation Anonymous transactions
US7038797B1 (en) 1999-05-25 2006-05-02 Silverbrook Research Pty Ltd Method and system for delivery of mail
US6519571B1 (en) 1999-05-27 2003-02-11 Accenture Llp Dynamic customer profile management
US8527337B1 (en) 1999-07-20 2013-09-03 Google Inc. Internet based system and apparatus for paying users to view content and receiving micropayments
US7181438B1 (en) * 1999-07-21 2007-02-20 Alberti Anemometer, Llc Database access system
US6449657B2 (en) 1999-08-06 2002-09-10 Namezero.Com, Inc. Internet hosting system
US20020099607A1 (en) 1999-08-27 2002-07-25 Bertrand Sosa Online promotional scheme
US20010042002A1 (en) 1999-08-30 2001-11-15 Jeff Koopersmith Method and system for communicating targeted information
US7010492B1 (en) 1999-09-30 2006-03-07 International Business Machines Corporation Method and apparatus for dynamic distribution of controlled and additional selective overlays in a streaming media
US20020010757A1 (en) 1999-12-03 2002-01-24 Joel Granik Method and apparatus for replacement of on-line advertisements
US6868525B1 (en) 2000-02-01 2005-03-15 Alberti Anemometer Llc Computer graphic display visualization system and method
US20010034647A1 (en) 2000-02-03 2001-10-25 Marks Michael B. Providing benefits by the internet to minimally identified users
US20020042741A1 (en) 2000-04-28 2002-04-11 Wilson William Whiteside System, method and article of manufacture to facilitate remote station advertising
US8352331B2 (en) 2000-05-03 2013-01-08 Yahoo! Inc. Relationship discovery engine
US20020032906A1 (en) 2000-06-02 2002-03-14 Grossman Avram S. Interactive marketing and advertising system and method
US7599851B2 (en) 2000-09-05 2009-10-06 Renee Frengut Method for providing customized user interface and targeted marketing forum
US6959319B1 (en) 2000-09-11 2005-10-25 International Business Machines Corporation System and method for automatically personalizing web portals and web services based upon usage history
US20020128908A1 (en) 2000-09-15 2002-09-12 Levin Brian E. System for conducting user-specific promotional campaigns using multiple communications device platforms
US20020099605A1 (en) 2000-10-06 2002-07-25 Searchcactus, Llc Search engine with demographic-based advertising
US20040122730A1 (en) 2001-01-02 2004-06-24 Tucciarone Joel D. Electronic messaging system and method thereof
US20030028415A1 (en) 2001-01-19 2003-02-06 Pavilion Technologies, Inc. E-commerce system using modeling of inducements to customers
US7065550B2 (en) 2001-02-14 2006-06-20 International Business Machines Corporation Information provision over a network based on a user's profile
US6950804B2 (en) 2001-02-26 2005-09-27 Pika Media Systems and methods for distributing targeted multimedia content and advertising
WO2002091186A1 (en) 2001-05-08 2002-11-14 Ipool Corporation Privacy protection system and method
US20030046149A1 (en) 2001-06-18 2003-03-06 Wong Yean Yee Method, an apparatus, and a computer program for effectively reaching a target audience and significantly increasing the efficiency of internet banner advertisement
EP1440398A1 (en) 2001-10-23 2004-07-28 Koninklijke Philips Electronics N.V. Anonymous network-access method and client
US7141683B2 (en) * 2002-05-02 2006-11-28 Degussa Ag Process for the epoxidation of olefins
US20070055566A1 (en) 2005-09-02 2007-03-08 Aws Convergence Technologies, Inc. System, method, apparatus and computer media for user control of advertising
US20040064361A1 (en) 2002-09-30 2004-04-01 Gateway, Inc. Sale closing software
US20040073437A1 (en) 2002-10-15 2004-04-15 Halgas Joseph F. Methods and systems for providing enhanced access to televised sporting events
GB0304612D0 (en) 2003-02-28 2003-04-02 Koninkl Philips Electronics Nv Method and system for obtaining a profile
JP2004310561A (en) 2003-04-09 2004-11-04 Hitachi Ltd Information retrieval method, information retrieval system and retrieval server
US8620732B2 (en) 2003-09-11 2013-12-31 Catalina Marketing Corporation Method and system for presenting banners having direct link to user profile information
US8321278B2 (en) 2003-09-30 2012-11-27 Google Inc. Targeted advertisements based on user profiles and page profile
US20090018918A1 (en) 2004-11-04 2009-01-15 Manyworlds Inc. Influence-based Social Network Advertising
US7545784B2 (en) 2004-02-11 2009-06-09 Yahoo! Inc. System and method for wireless communication between previously known and unknown users
US20070067297A1 (en) 2004-04-30 2007-03-22 Kublickis Peter J System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users
US20060041477A1 (en) 2004-08-17 2006-02-23 Zhiliang Zheng System and method for providing targeted information to users
US7565627B2 (en) 2004-09-30 2009-07-21 Microsoft Corporation Query graphs indicating related queries
US20060136335A1 (en) * 2004-12-17 2006-06-22 Ferguson Joseph M Iii System and methods for accessing high-profile individuals
US7988560B1 (en) 2005-01-21 2011-08-02 Aol Inc. Providing highlights of players from a fantasy sports team
US8768766B2 (en) 2005-03-07 2014-07-01 Turn Inc. Enhanced online advertising system
US20060206381A1 (en) 2005-03-12 2006-09-14 Felix Frayman Method and system for creating interactive guides and information exchange services
US10740722B2 (en) 2005-04-25 2020-08-11 Skyword Inc. User-driven media system in a computer network
US8214264B2 (en) 2005-05-02 2012-07-03 Cbs Interactive, Inc. System and method for an electronic product advisor
US7562304B2 (en) 2005-05-03 2009-07-14 Mcafee, Inc. Indicating website reputations during website manipulation of user information
US7822620B2 (en) 2005-05-03 2010-10-26 Mcafee, Inc. Determining website reputations using automatic testing
US10510043B2 (en) 2005-06-13 2019-12-17 Skyword Inc. Computer method and apparatus for targeting advertising
US20070129123A1 (en) 2005-12-02 2007-06-07 Robert Eryou System and method for game creation
US20070130005A1 (en) 2005-12-02 2007-06-07 Michael Jaschke Method for consumer data brokerage
US7620725B2 (en) * 2005-12-05 2009-11-17 About Us, Inc. Metadata collection within a trusted relationship to increase search relevance
US20070179849A1 (en) 2006-02-02 2007-08-02 Microsoft Corporation Ad publisher performance and mitigation of click fraud
US20070179846A1 (en) 2006-02-02 2007-08-02 Microsoft Corporation Ad targeting and/or pricing based on customer behavior
US20070179845A1 (en) 2006-02-02 2007-08-02 Microsoft Corporation Merchant rankings in ad referrals
US8584174B1 (en) 2006-02-17 2013-11-12 Verizon Services Corp. Systems and methods for fantasy league service via television
US20070239534A1 (en) 2006-03-29 2007-10-11 Hongche Liu Method and apparatus for selecting advertisements to serve using user profiles, performance scores, and advertisement revenue information
WO2008016617A2 (en) 2006-07-31 2008-02-07 United Video Properties, Inc. Systems and methods for providing enhanced sports watching media guidance
US20080082417A1 (en) 2006-07-31 2008-04-03 Publicover Mark W Advertising and fulfillment system
US8267790B2 (en) 2006-09-29 2012-09-18 At&T Intellectual Property I, Lp Interactive games on a television via internet protocol
WO2008098163A2 (en) 2007-02-09 2008-08-14 Hopton Robert M Method to facilitate confidential network sales
US20120109755A1 (en) * 2007-05-31 2012-05-03 Birch James R Content recognition for targeted advertising capability
US20100205628A1 (en) 2009-02-12 2010-08-12 Davis Bruce L Media processing methods and arrangements
US20110265169A1 (en) * 2008-12-30 2011-10-27 Nokia Siemens Networks Oy User-dependent content delivery
US20110177774A1 (en) * 2010-01-13 2011-07-21 Qualcomm Incorporated Dynamic generation, delivery, and execution of interactive applications over a mobile broadcast network
US20110183654A1 (en) 2010-01-25 2011-07-28 Brian Lanier Concurrent Use of Multiple User Interface Devices
KR101582436B1 (en) * 2010-05-04 2016-01-04 샤잠 엔터테인먼트 리미티드 Methods and systems for syschronizing media
US9204193B2 (en) 2010-05-14 2015-12-01 Rovi Guides, Inc. Systems and methods for media detection and filtering using a parental control logging application
US20110295988A1 (en) 2010-05-28 2011-12-01 Le Jouan Herve Managing data on computer and telecommunications networks
US8763060B2 (en) 2010-07-11 2014-06-24 Apple Inc. System and method for delivering companion content
US20120304206A1 (en) 2011-05-26 2012-11-29 Verizon Patent And Licensing, Inc. Methods and Systems for Presenting an Advertisement Associated with an Ambient Action of a User
US8966520B2 (en) * 2011-10-03 2015-02-24 Hulu, LLC Video ad swapping in a video streaming system
US20150046254A1 (en) 2012-07-18 2015-02-12 Simon Raab System and method for display relevance watch
CN102843589B (en) 2012-09-29 2016-08-03 乐视致新电子科技(天津)有限公司 Intelligent advertisement cut system and intelligent advertisement inserting method
US20140095603A1 (en) * 2012-09-29 2014-04-03 Deepti Bhardwaj One stop for multiple perspectives on somebody's personality from qualified associations

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100281364A1 (en) * 2005-01-11 2010-11-04 David Sidman Apparatuses, Methods and Systems For Portable Universal Profile
US20120110032A1 (en) * 2010-10-29 2012-05-03 Fractor, LLC Methods and systems for concatenating and transferring web accessible content and metadata between networked computers or mobile devices
US20130157614A1 (en) * 2011-12-16 2013-06-20 Amana Future, Llc. Communication tracking and billing system
US20140214541A1 (en) * 2013-01-30 2014-07-31 Kiosked Oy Method and system for user-controlled rendering of mobile advertisements

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Madara’s Ghost, Display Alternative Content for User’s with AdBlockers, dated 24 December 2011, downloaded 14 June 2021 from https://stackoverflow.com/questions/8625514/display-alternative-content-for-users-with-adblockers (Year: 2011) *
Shaughnessy, Haydn, Who Are The Top 50 Social Media Power Influencers, 2013?, Forbes [online], dated 17 April 2013, retrieved from https://www.forbes.com/sites/haydnshaughnessy/2013/04/17/who-are-the-top-50-social-media-power-influencers-2013/?sh=7b4e152c1e03 on 20 December 2022 (Year: 2013) *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12120160B1 (en) 2015-09-02 2024-10-15 Confinement Telephony Technology, Llc Systems and methods for secure, controlled virtual visitation with confinement institution inmates
US11757958B1 (en) * 2015-09-02 2023-09-12 Confinement Telephony Technology, Llc Systems and methods for secure, controlled virtual visitation with confinement institution inmates
US20190278461A1 (en) * 2018-03-06 2019-09-12 Mudpie, Sa De Cv Recommendation acknowledgement and tracking
US11711236B2 (en) * 2018-05-18 2023-07-25 Alarm.Com Incorporated Machine learning for home understanding and notification
US11755924B2 (en) 2018-05-18 2023-09-12 Objectvideo Labs, Llc Machine learning for home understanding and notification
US11676160B2 (en) 2020-02-11 2023-06-13 The Nielsen Company (Us), Llc Methods and apparatus to estimate cardinality of users represented in arbitrarily distributed bloom filters
US11741068B2 (en) 2020-06-30 2023-08-29 The Nielsen Company (Us), Llc Methods and apparatus to estimate cardinality of users represented across multiple bloom filter arrays
US11755545B2 (en) 2020-07-31 2023-09-12 The Nielsen Company (Us), Llc Methods and apparatus to estimate audience measurement metrics based on users represented in bloom filter arrays
US20220092615A1 (en) * 2020-09-24 2022-03-24 Line Corporation Method, system, and non-transitory computer readable record medium for providing information data using transportation method
US20230004997A1 (en) * 2021-06-29 2023-01-05 The Nielsen Company (Us), Llc Methods and apparatus to estimate cardinality across multiple datasets represented using bloom filter arrays
US11854030B2 (en) * 2021-06-29 2023-12-26 The Nielsen Company (Us), Llc Methods and apparatus to estimate cardinality across multiple datasets represented using bloom filter arrays
US11768471B1 (en) 2021-07-02 2023-09-26 Watch Skins Corporation Systems and methods for creating a customized watch face and retrieving the watch face to be displayed
US11822296B2 (en) 2021-07-02 2023-11-21 Watch Skins Corporation Systems and methods for creating a customized watch face and retrieving the watch face to be displayed
US11853014B2 (en) 2021-07-02 2023-12-26 Watch Skins Corporation Systems and methods for creating a customized watch face and retrieving the watch face to be displayed
US20230281548A1 (en) * 2022-03-02 2023-09-07 At&T Intellectual Property I, L.P. System for machine learned embedding and assessment of actor value attributes
US11651386B1 (en) * 2022-04-05 2023-05-16 Watch Skins Corporation Systems and methods to track display of a digital content item and distribute rewards based on the display

Also Published As

Publication number Publication date
US10546326B2 (en) 2020-01-28
AU2014324893B2 (en) 2020-05-14
AU2020217433A1 (en) 2020-09-03
AU2014324893A1 (en) 2016-03-10
WO2015048338A1 (en) 2015-04-02
EP3049952A4 (en) 2017-03-15
US20200349611A1 (en) 2020-11-05
US20200349610A1 (en) 2020-11-05
US11127048B2 (en) 2021-09-21
EP3049952A1 (en) 2016-08-03
CA2923041A1 (en) 2015-04-02
US20170201779A1 (en) 2017-07-13
EP3534318A1 (en) 2019-09-04
US10580043B2 (en) 2020-03-03
US11687976B2 (en) 2023-06-27
US20160253710A1 (en) 2016-09-01
US20220036405A1 (en) 2022-02-03

Similar Documents

Publication Publication Date Title
US20220261853A1 (en) Providing targeted content based on a user's preferences
EP3712832A1 (en) Computerized method and system for providing customized entertainment content
Ghose TAP: Unlocking the mobile economy
Zook et al. Marketing communications: offline and online integration, engagement and analytics
Puthussery Digital marketing: an overview
Kimmel Connecting with consumers: Marketing for new marketplace realities
US9172915B2 (en) Method of operating a channel recommendation system
Qualman Socialnomics: How social media transforms the way we live and do business
KR20050109919A (en) Content creation, distribution, interaction, and monitoring system
Schadler et al. The mobile mind shift: Engineer your business to win in the mobile moment
Singh Social media marketing for dummies
Pearson The loyalty leap: Turning customer information into customer intimacy
Berkley Marketing in the new media
Smith The opt-out effect: Marketing strategies that empower consumers and win customer-driven brand loyalty
Leboff Stickier marketing: How to win customers in a digital age
Papakonstantinidis et al. RU# SoLoMo ready?: Consumers and brands in the digital era
Hasen Mobilized marketing: how to drive sales, engagement, and loyalty through mobile devices
Pritchard Kick Ass Business and Marketing Secrets: How to Blitz Your Competition
Furlan Food delivery: an analysis of existing and future business models based on digital platforms
Leyva Facebook marketing for small business: easy strategies to engage your Facebook community
Reina Mobile advertising: An exploration of innovative formats and the adoption in the Italian market
Kotler Kellogg on Advertising and Media: The Kellogg School of Management
Brubaker et al. Taking Your Customer CareTM to the Next Level: Customer Retention Depends Upon Customer Care
Kotler Bt. bm. 521Marketing 4.0 Moving from Traditional to Digital
Pan Understanding Consumer Perceptions of Cha House: A Digital Advertising and Marketing Campaign

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION