WO2000073961A2 - Targeted network video download interface - Google Patents

Targeted network video download interface Download PDF

Info

Publication number
WO2000073961A2
WO2000073961A2 PCT/US2000/014853 US0014853W WO0073961A2 WO 2000073961 A2 WO2000073961 A2 WO 2000073961A2 US 0014853 W US0014853 W US 0014853W WO 0073961 A2 WO0073961 A2 WO 0073961A2
Authority
WO
WIPO (PCT)
Prior art keywords
user
user computer
file
server
viewer program
Prior art date
Application number
PCT/US2000/014853
Other languages
French (fr)
Other versions
WO2000073961A8 (en
Inventor
Robert Buch
Ryan Cunningham
Original Assignee
Netzero, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netzero, Inc. filed Critical Netzero, Inc.
Priority to AU50485/00A priority Critical patent/AU5048500A/en
Publication of WO2000073961A2 publication Critical patent/WO2000073961A2/en
Publication of WO2000073961A8 publication Critical patent/WO2000073961A8/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/53Network services using third party service providers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Definitions

  • This invention relates generally to network access schemes and, more particularly,
  • GUI graphical user interface
  • ISP Internet service provider
  • connection services are gaining popularity. In most cases where a home user has an ISP,
  • the user pays a fee to the ISP in exchange for access to the Internet through the ISP.
  • connection from the user computer to the ISP can be virtually any type of network access
  • connection services include cable modem services and Digital
  • DSL Subscriber Line
  • the user uses a
  • dial-up connection utility program to connect the user computer to the ISP system via the
  • a modem converts the transmitted analog signal back to computer
  • An ISP will usually have several telephone numbers available in a user's local
  • Such a connection system can provide data
  • content is delivered to users for no charge, in exchange for the content being delivered
  • the fees paid by advertisers are typically a function of click-through rate, which is the
  • the Internet advertising typically consists of images that take up a portion of a
  • banner advertising
  • the banner advertising leaves most of the browser window free for viewing, and typically places the banner across a top area of the window.
  • the download may or may not interfere with the user's Internet activity.
  • the advertising does not preempt viewing of Internet content.
  • Video images comprising data files that provide full-motion video displays, can
  • Video files are desirable for providing a moving image
  • Banner ads may require 5K to 25K bytes of data, but a video file of 30
  • seconds duration may require 1.3 M bytes of data, even with data compression
  • banner ads are sufficiently small that they may be
  • ads are sent to users without regard to the demographic profile of individual users.
  • access providers can charge higher rates if they can ensure a target viewing
  • advertising may be directed to a user based on that user's network
  • the present invention fulfills this need.
  • the present invention provides a technique for providing free computer user
  • an access control system sends video advertising files to a network
  • the network applications may include browser and e-mail
  • the user receives advertising files from the access control system and the
  • advertising files are downloaded when the user is not actively using the bandwidth of the
  • one or more video ads are finished, the viewer window is hidden or made an inactive
  • the viewer window for a quiet interval. At the conclusion of the quiet interval, the viewer window is
  • the viewer program manages the ad
  • New ad files are then received over the
  • the invention keeps the ad pool fresh within a predetermined ad pool size
  • user demographic information is collected from
  • each user and is utilized to direct video ad files to targeted users according to their
  • link window that permits users to select a web site that corresponds to
  • the user's browser receiving content from the sponsor's web site.
  • Figure 1 is a representation of a system that provides Internet access in accordance
  • Figure 2 is a representation of a computer of the Figure 1 system.
  • FIG. 3 is a flow diagram that illustrates the processing steps executed by the
  • Figure 4 is a representation of the display viewed by a user at the computer
  • FIG. 5 is a flow diagram that illustrates the processing steps performed by the
  • FIG. 6 is a flow diagram that illustrates the processing steps performed by the
  • Figure 7 is a representation of the viewer window display that is shown during ad
  • Figure 8 is a representation of the Recent Ads pop-up menu selected from the
  • Figure 9 is a representation of the Open Link dialogue box display that is shown
  • FIG. 10 is a flow diagram that illustrates the processing steps performed by the
  • FIG. 11 is a flow diagram that illustrates the processing steps performed by the
  • Figure 1 is a representation of a system 100 that provides Internet access in
  • a user computer 102 gains access to Internet
  • the Internet content that can be received includes e-mail, ftp
  • the user 102 is connected via a network connection line 110 that
  • connection 112 is connected to the Internet via a connection 112 and the Internet content servers 104
  • connection 1 14 The access control and content connections 112, 114
  • the access control system 106 includes a Network
  • NAS Access Server
  • AAA Access, Authorization, and Accounting
  • the NAS identifies dial-up network connections
  • IP Internet protocol
  • the AAA server 1 18 communicates with a standard protocol, such as
  • RADIUS Remote Authentication Dial-In Service
  • TACACS Access Controller Access Control System
  • AAA server 118 authorizes each user to have
  • One such network profile such as loading specific network profile information.
  • One such network profile such as loading specific network profile information.
  • VPN Virtual Private Dial Network
  • the accounting function includes keeping track of each user's logon time
  • the Ad server 120 provides ad
  • Fraud detection is described in greater detail below.
  • server 120 comprise a separate, independent server computer. This provides the greatest
  • the AAA server 118 executes the program that causes the user computer to contact the AAA server 118.
  • the AAA server may access accounting
  • the AAA server provides an approval signal to the NAS server 116, which
  • Access Control System 106 permits the user to have access to the Internet.
  • the Access Control System 106 permits the user to have access to the Internet.
  • the ISP may revoke a user's access by removing the user's account information from the AAA server because of previously
  • a user 102 receives ads from the
  • a viewer program installed at the user maintains a user ad
  • Each video advertising file contains
  • Internet content servers 104 can all have a similar computer construction.
  • Figure 2 is a
  • Each computer 200 operates under control of a central processing unit 102, 104, 106.
  • Each computer 200 operates under control of a central processing unit 102, 104, 106.
  • Each computer 200 operates under control of a central processing unit 102, 104, 106.
  • processor unit (CPU) 202 such as a "Pentium" microprocessor and associated integrated circuit
  • a keyboard 204 and can view inputs and computer output at a display 206.
  • the display is
  • the CPU 202 operates under control of
  • the computer also can receive computer instructions, or data, from a storage media
  • the storage media reader 214 receives storage media 216 from which it can read stored information. That is, the storage media can contain program steps that are
  • the storage media thereby comprises a program product that embodies a storage
  • a viewer program is
  • the viewer client program manages the ad files and may
  • a viewer client program at the user 102 manages
  • the ad pool such that the oldest ad is discarded when a new ad is received, and such that
  • the expected or average time to download an ad file is approximately equal to the total
  • any single ad should have fifteen minutes of total
  • a ratio of 1 :5 may be used, so that 2.5 minutes of ad display will be followed by 12.5 minutes of no display.
  • an initial ad pool of ad files is
  • the user can utilize the Internet access system and viewer program. Thereafter, an
  • video clip using conventional technology can generally be downloaded in no more than
  • the expected average ad file download time sets the number of
  • Internet connection speed (baud rate) of the user's network connection 110 is such that an
  • connection speed may be thirty. Such a connection speed may be provided, for example, by a 28.8K baud
  • the ad pool will be initially stocked so that, after a sufficient total
  • the oldest thirty-second ad in the ad pool should have been played thirty times.
  • connection is faster than 28.8K, or if the bandwidth otherwise improves, ads of greater
  • Video advertising files are downloaded when the system detects that the user is
  • the viewer program is continuously running, and periodically opens a viewer
  • FIG. 3 is a flow diagram that illustrates the processing steps executed by the
  • a browser program is
  • the operating system of the user's computer will launch the
  • the system performs ad file download tasks and ad pool management, as
  • Figure 4 is a representation of the display window 402 viewed by a user at the
  • window contains display artifacts that should be familiar to those skilled in the art
  • the display 402 shows a configuration typical for an
  • FIG. 5 is a flow diagram that illustrates the processing steps performed by the
  • step 502 provides this assurance.
  • the fraud control step 502 involves sending a "Pulse" message to the
  • the fraud Pulse message is sent at regular intervals and contains a user
  • Ad server does not have a unique identifier (user ID) and a date and time indication. If the Ad server does not have a unique identifier (user ID) and a date and time indication. If the Ad server does not have a unique identifier (user ID) and a date and time indication. If the Ad server does not have a unique identifier (user ID) and a date and time indication. If the Ad server does not have a unique identifier (user ID) and a date and time indication. If the Ad server does not have a date and time indication.
  • Ad Server sending a termination message to the viewer program to terminate, or to
  • the fraud interval may be set as desired.
  • Fraud control can be implemented using an encryption method for network
  • Such a fraud control system might be implemented with a custom authentication
  • control program runs on the user machine as a requirement of permitting Internet access
  • the dial-up connection program results in a viewer icon located in the display tray
  • the pop-up menu permits the user to view parameters and actions. For example, the
  • pop-up menu may show items including “Disconnect”, “Settings”, and “Help”. The user
  • Networking icon may be automatically placed in the display tray by the computer
  • the action For example, the resulting actions if "Help" is selected include display of the
  • help menu.
  • the user may want to change the display time
  • the user may select between seeing ads for 30 seconds every three
  • box numbered 514 update the ad pool and database. Such update actions involve the
  • server such as the new ad name, ad ID, product, sponsor company, ad file name, path,
  • the local database is kept secure from access by
  • the system next checks for file tampering at the
  • the system checks for a match between ad file information in
  • the secure local database and actual ad file information is maintained
  • information includes, for example, file name, path, file size, creation date, and the like.
  • each ad in the ad pool will have a file size specified by received ad file
  • the operating system of the user computer can
  • the Ad server records the
  • the viewer program then displays a fraud message on the viewer's computer.
  • the fraud message indicates that fraud has been detected and that such fraud
  • the message can request that the user
  • the dial- up connection program is then terminated and user access is halted.
  • the authorization server This ensures that the user has not tampered with the files.
  • next processing step is to perform ad viewer
  • the ad viewer actions comprise the automatic processing by the viewer program
  • the viewer program causes the viewer control bar to be
  • control bar function processing is described further below in conjunction with
  • One or more ad viewings comprise an ad showing interval, depending on the
  • the viewer program first shows ads from the ad pool stored in the user's computer.
  • the viewer program keeps track of the order in which the ads should be shown, such as
  • the ads are
  • the viewer program deletes the oldest ad from the ad pool. Also as noted
  • play completion message includes the user ID, ad name or ID, and the date and time of
  • the program checks to determine if the ad showing interval has completed.
  • the viewer program opens or launches the viewer window at regular
  • the viewer program shows 2.5 minutes of ads in the viewer window, cycling
  • the viewer program implements a 12.5 minute quiet interval during
  • each ad showing may comprise an ad
  • box 604 the viewer program detects and responds to any user display actions and
  • the viewer window is hidden or made inactive for the duration of the quiet interval.
  • FIG. 6 box numbered 606 the viewer program responds to such viewer display actions.
  • Ad server If the Ad server is not
  • Figure 7 illustrates details of the viewer window 406 ( Figure 4) and control bar.
  • the window control bar 702 is a vertical bar that includes a sizing icon 704 that permits a
  • the control bar 702 also includes a "Recent Ads" button 706 that opens a pop-up
  • the viewer window of Figure 7 also includes a volume control
  • the viewer window has a mute button 710
  • a blank area 712 of the control bar provides a Move Bar
  • Figure 8 shows an exemplary Recent Ads pop-up menu 802 that results from user
  • the menu 802 shows the
  • pop-up menu corresponds to an ad in the ad pool. If the user clicks on any of the listed
  • the viewer program directs the user's browser to the corresponding web
  • the dialogue box lists the ad names, ad sponsor, and ad sponsor web site
  • the link comprises a Universal Resource Locator (URL) address that directs the
  • Figure 9 dialogue box inserts the web site of the ISP or some other
  • FIG. 10 is a flow diagram that illustrates the processing steps performed to
  • the viewer program detects when the user clicks on the Recent Ads
  • control bar button 706 (see Figure 7). If a button click is detected, an affirmative outcome
  • the viewer program determines if the user clicks on the control bar
  • the viewer program permits the user to move the viewer window within the desktop
  • program continues normal operation, including the display and download of ads.
  • FIG. 11 is a flow diagram that illustrates
  • information comprises status information, including the current ad file that is
  • the state information is maintained by the
  • Ad server when a new ad is requested.
  • the viewer program then keeps track of where the
  • the viewer program determines the ad block size to request from the Ad
  • the viewer program makes
  • system resources such as processor speed, available memory, download
  • connection will only be indicated as currently in-use if, for example,
  • the user is in the middle of downloading a web page or receiving a file from the Internet
  • the viewer program sends a request to the Ad server for
  • the viewer program updates the secure local database, provides the completed ad information to the Ad server,
  • the viewer program preferably includes an Application Program Interface (API)
  • API Application Program Interface
  • the client viewer program of the preferred embodiment As described above, the client viewer program of the preferred embodiment
  • a targeted client of the preferred embodiment provides greater
  • client permits selection of ad files to be provided to individual subscribers of the access
  • both the viewer client and the targeted client send ad files to specific
  • a single targeted client installed at a user computer is
  • user of an installed targeted client can also be associated with multiple member accounts.
  • the initial user who establishes a subscriber account at a computer For example, the initial user who establishes a subscriber account at a computer or
  • machine becomes the "master" account, and additional member accounts may be associated with that master user account. After the user account is established and user
  • demographic information is collected for the master account, the additional member
  • accounts may be established from the same computer, and corresponding demographic
  • references to "user” in this discussion will mean either a master user account or an
  • Ad files will be targeted to each
  • the preferred embodiment permits multiple users to share ad
  • bandwidth may be detected by identifying the occurrence of Internet browser events, such
  • the viewer window control functions can be varied

Abstract

A system provides a user with free Internet network access, in which an access control system sends video advertising files to a user who gains access to the Internet through a network connection that includes a viewer program that operates independently of the user's browser and e-mail programs. The viewer receives ads from the access control system and manages an ad pool that collects multiple video advertising files. Video advertising files are downloaded when the user is not actively using the bandwidth of the Internet connection to download Internet content of the user's choosing. The viewer program periodically opens a viewer window, which opens on top of any other open windows, and in which a video ad from the ad pool is displayed. When one or more video ads are finished, the viewer window is hidden or made an inactive window for a quiet interval.

Description

TARGETED NETWORK VIDEO DOWNLOAD INTERFACE
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates generally to network access schemes and, more particularly,
to an interface for targeted network video download.
2. Description of the Related Art
The early beginnings of the network commonly referred to as "the Internet"
involved scientists, researchers, and technology experts exchanging information over a
secure computer network. Now, the Internet is fast becoming popular with the general
populace not just for information exchange, but also for entertainment and recreation.
Users can access thousands of files stored in computers that comprise Internet sites that
contain text, graphics, video, and audio content by using graphical user interface (GUI)
computer browser programs that navigate the collection of such sites commonly called the
"world wide web".
For the typical home user, access to the Internet is gained by connecting their
computer to an Internet service provider (ISP) through a telephone line, although other
connection services are gaining popularity. In most cases where a home user has an ISP,
the user pays a fee to the ISP in exchange for access to the Internet through the ISP. The
connection from the user computer to the ISP can be virtually any type of network access,
such as typical analog telephone line access through a local exchange carrier or telephone
company. Other connection services include cable modem services and Digital
Subscriber Line (DSL) services. For typical telephone connections, a modem is connected between the user
computer and the telephone line, to provide an interface between the digital data used by
the computer and the analog signal transmitted over the telephone line. The user uses a
dial-up connection utility program to connect the user computer to the ISP system via the
modem. At the ISP, a modem converts the transmitted analog signal back to computer
data. An ISP will usually have several telephone numbers available in a user's local
calling area for a dial-up connection. Such a connection system can provide data
exchange rates of 36K bytes per second upload (computer user to ISP) and up to 56K
bytes per second download (ISP to computer user). The connection from the ISP to the
Internet "back bone" is typically over relatively expensive, high-speed digital lines such
as fiber optic cable over Tl or T3 connections that can provide data exchange rates of 1 M
bytes per second or greater.
Recently, Internet service companies have begun to provide Internet content to
users based on the broadcast television model of content delivery. That is, Internet
content is delivered to users for no charge, in exchange for the content being delivered
with banner display advertising materials, which are observed by the users. The
companies who provide the advertising materials pay fees to the Internet content
providers, the ISPs, for the advertising exposure in the hope that it will keep their
products and services uppermost in user's minds and will influence purchasing decisions.
The fees paid by advertisers are typically a function of click-through rate, which is the
rate of ad viewers (users) who visit the advertiser's web site from the banner ad.
The Internet advertising typically consists of images that take up a portion of a
user's browser window on the computer display screen, so-called "banner" advertising.
The banner advertising leaves most of the browser window free for viewing, and typically places the banner across a top area of the window. A typical Internet access-for-
advertising arrangement uses a dial-up connection that continuously downloads a banner
ad from the ISP while the user is connected. That is, as soon as the user's browser or
viewer program is ready for a new banner ad, a new banner ad is downloaded from an ad
server. The download may or may not interfere with the user's Internet activity.
Because the banner advertising occupies a relatively small area of the user's
display window, the advertising does not preempt viewing of Internet content. Thus,
banner advertising does not intrude on the user's Internet experience, but because it is
static, it unfortunately can rather easily be ignored by the user. This is unlike the model
of broadcast television, which generally ensures that no other display interruption will
occur during the viewing of advertising content. Moreover, banner advertising does
nothing to catch the attention of the user, and this reduces the likelihood that a user will
take the time to view the banner advertising, and reduces its effectiveness.
Video images, comprising data files that provide full-motion video displays, can
be viewed over the Internet. Video files are desirable for providing a moving image
display with audio, which will more likely attract and hold a viewer's interest. Video
files, however, are relatively large and can take an inordinate amount of time to
download. Banner ads may require 5K to 25K bytes of data, but a video file of 30
seconds duration may require 1.3 M bytes of data, even with data compression
techniques. As noted above, banner ads are sufficiently small that they may be
downloaded without notice by a user while the user is viewing Internet content. In
contrast, video files are so large that a user's Internet viewing almost certainly would be
interrupted while the large file was being downloaded. Hence, video files are not conducive to the access-for-advertising, broadcast television model of providing Internet
access.
Compounding the greater amount of time necessary to download video files is the
problem of variety and staleness. Viewers can quickly become familiar with Internet
video advertising images, just as with television commercials in the broadcast context.
Experience is showing that the Internet user has a short attention span. Therefore, it is
important to provide the Internet user with a variety of advertising that is constantly
refreshed. If video advertising is to be useful for the Internet, then it is important to
provide a variety of video files, notwithstanding the fact that such files take longer to
download. With these conflicting ideals, it can be seen that video advertising is not
currently practical in the access-for-advertising model of Internet access, because they
take a greater amount of time to download than banner advertising, and they must be
refreshed frequently to avoid becoming stale.
In addition, most Internet advertising is indiscriminately directed. That is, banner
ads are sent to users without regard to the demographic profile of individual users.
Typically, access providers can charge higher rates if they can ensure a target viewing
audience with a particular demographic profile.
Alternatively, advertising may be directed to a user based on that user's network
browsing habits. For example, some advertisers may monitor the banner ads to which a
user responds with a "click-through". These user click-throughs may be collected into a
database that can be used to direct future banner ads. Unfortunately, directing advertising
in this manner takes time to accumulate, is not very precise, and only reflects past user
browser history. Thus, a user's present demographic profile is not necessarily reflected in
the database and ineffective or inappropriate advertising may still be directed to the user. From the discussion above, it should be apparent that there is a need for an
Internet access-for-advertising technique that provides Internet content to targeted users
along with video advertising that will more likely hold the interest and attention of
Internet users and also ensures a fresh supply of video files, without interrupting the
Internet experience of the user. The present invention fulfills this need.
SUMMARY OF THE INVENTION
The present invention provides a technique for providing free computer user
access to a network, in which an access control system sends video advertising files to a
user who gains network access through a network connection process that includes a file
viewer program operating independently of the user's network application programs. In
the case of Internet access, the network applications may include browser and e-mail
programs. The user receives advertising files from the access control system and the
viewer program collects them into an ad pool stored in the user's computer. Video
advertising files are downloaded when the user is not actively using the bandwidth of the
network connection to download content through the network application programs. The
viewer program periodically opens a viewer window, which opens on top of any other
open user application windows, and in which an ad from the ad pool is displayed. When
one or more video ads are finished, the viewer window is hidden or made an inactive
window for a quiet interval. At the conclusion of the quiet interval, the viewer window is
activated and the next ad in the ad pool is displayed. The viewer program manages the ad
pool such that ad files are not viewed after they have reached a predetermined play limit,
thereby determining that new ad files are needed. New ad files are then received over the
network connection during access, preferably such that each ad is displayed or viewed for
not less than the time it takes the ad to be downloaded. This ensures that the ad pool is
managed so as to maximize the amount of advertising to which the user will be exposed
while minimizing the impact of downloading on the user's network access experience. In
this way, the invention keeps the ad pool fresh within a predetermined ad pool size, and
provides network access to users for no charge or fee, and also ensures a fresh supply of video advertising files that will more likely hold the interest and attention of the computer
user.
In one aspect of the invention, user demographic information is collected from
each user and is utilized to direct video ad files to targeted users according to their
demographic information. In another aspect of the invention, the viewer program
provides fraud detection features to ensure that users do not disable the viewer program.
In this way, advertisers can be confident that their video ads will be viewed by the
intended audience. In another aspect of the invention for Internet access, users are
provided with a link window that permits users to select a web site that corresponds to
one of the video ads in the ad pool. Selecting the web site of a video ad sponsor results in
the user's browser receiving content from the sponsor's web site.
Other features and advantages of the present invention should be apparent from
the following description of the preferred embodiment, which illustrates, by way of
example, the principles of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a representation of a system that provides Internet access in accordance
with the present invention.
Figure 2 is a representation of a computer of the Figure 1 system.
Figure 3 is a flow diagram that illustrates the processing steps executed by the
computer processing system of Figure 1 to implement the Internet access technique in
accordance with the present invention.
Figure 4 is a representation of the display viewed by a user at the computer
illustrated in Figure 2.
Figure 5 is a flow diagram that illustrates the processing steps performed by the
system illustrated in Figure 1 in providing Internet access.
Figure 6 is a flow diagram that illustrates the processing steps performed by the
system illustrated in Figure 1 in managing the playback of video ads.
Figure 7 is a representation of the viewer window display that is shown during ad
playback.
Figure 8 is a representation of the Recent Ads pop-up menu selected from the
viewer window of Figure 7.
Figure 9 is a representation of the Open Link dialogue box display that is shown
during ad playback, selected from the Recent Ads display of Figure 8.
Figure 10 is a flow diagram that illustrates the processing steps performed by the
system to implement playback management control bar functions.
Figure 11 is a flow diagram that illustrates the processing steps performed by the
system in managing the ad download function. DESCRIPTION OF THE PREFERRED EMBODIMENTS
Figure 1 is a representation of a system 100 that provides Internet access in
accordance with the present invention. A user computer 102 gains access to Internet
content from servers 104 through an access control system 106 that provides video
advertising files. Requests from users 102 for service, receipt of Internet content, and
communication with the access control system 106 all take place over a network 108 that
includes conventional telephone lines and high-speed digital access lines, collectively
referred to as the Internet. The Internet content that can be received includes e-mail, ftp
files, "World Wide Web" content, chat services, and all other content available through
the Internet. Thus, the user 102 is connected via a network connection line 110 that
typically is a conventional analog telephone line. Similarly, the access control system
106 is connected to the Internet via a connection 112 and the Internet content servers 104
are connected via a connection 1 14. The access control and content connections 112, 114
are typically high-speed digital lines.
In the preferred embodiment, the access control system 106 includes a Network
Access Server (NAS) 116, an Access, Authorization, and Accounting (AAA) server 118,
and an Advertising file (Ad) server 120. The NAS identifies dial-up network connections
initiated by users and assigns Internet protocol (IP) addresses to the user connections,
taking the IP addresses from a pool of available IP addresses established by the service
provider. The AAA server 1 18 communicates with a standard protocol, such as
commonly referred to as Remote Authentication Dial-In Service (RADIUS) or Terminal
Access Controller Access Control System (TACACS), or the "TACACS+" system from
Cisco Systems, Inc. of San Jose, California^ USA. Other means of access authorization
can be readily implemented by those skilled in the art. In the preferred embodiment, the AAA server 118 authorizes each user to have
access to the network 108 and performs various accounting functions to maintain a record
of users who have logged onto the network and at what time, as well as other functions
such as loading specific network profile information. One such network profile
information, for example, is referred to as Virtual Private Dial Network (VPDN)
information. The accounting function includes keeping track of each user's logon time
and logoff time, for every online communications session. The Ad server 120 provides ad
files and communicates with the AAA server 118 to deny a user access if fraud is detected
in connection with that user. Fraud detection is described in greater detail below. In the
preferred embodiment, each of the Network Access Server 116, AAA server 118, and Ad
server 120 comprise a separate, independent server computer. This provides the greatest
reliability, responsiveness, and user accommodation. It should be understood, however,
that the functionality of all three may be provided in a single machine. The functionality
of all three servers 116, 118, 120 will be referred to collectively as the "communications
server".
In a system where a user 102 will connect to the Internet through a dial-up
connection over an analog telephone line, the user will launch a dial-up connection
program that causes the user computer to contact the AAA server 118. The AAA server
receives identification information from the user and authenticates that user for
permission to receive Internet access. If desired, the AAA server may access accounting
and compliance records to check for detected usage fraud and the like. If permission is
indicated, then the AAA server provides an approval signal to the NAS server 116, which
permits the user to have access to the Internet. Thus, the Access Control System 106
functions as an Internet Service Provider (ISP). The ISP may revoke a user's access by removing the user's account information from the AAA server because of previously
detected fraud.
In accordance with the invention, a user 102 receives ads from the
communications server 106. A viewer program installed at the user maintains a user ad
pool in which video advertising files are collected. Each video advertising file contains
sufficient data to provide a video "program" that typically has a run time of between thirty
seconds and 2.5 minutes. It should be understood that faster connections and download
technologies could be used to increase the program length without affecting the user's
access.
Those skilled in the art will appreciate that the Internet content servers 104
comprise multiple file servers at which web site files are stored. Those skilled in the art
also will appreciate that the user computer 102, access control system 106 computers, and
Internet content servers 104 can all have a similar computer construction. Figure 2 is a
block diagram of an exemplary computer 200 such as might comprise any of the
computers 102, 104, 106. Each computer 200 operates under control of a central
processor unit (CPU) 202, such as a "Pentium" microprocessor and associated integrated
circuit chips, available from Intel Corporation. A user can input commands and data from
a keyboard 204 and can view inputs and computer output at a display 206. The display is
typically a video monitor or flat panel display. The CPU 202 operates under control of
programming steps that are stored, temporarily, in memory 208 of the computer. Each
computer communicates with the Internet 108 through a network interface 210 that
enables communication over a connection 212 between the network 108 and the computer
200. The computer also can receive computer instructions, or data, from a storage media
reader 214. The storage media reader 214 receives storage media 216 from which it can read stored information. That is, the storage media can contain program steps that are
executed by the CPU to perform a method for providing Internet access as described
above. The storage media thereby comprises a program product that embodies a storage
media that is received by the storage media reader.
To provide user access in accordance with the invention, a viewer program is
installed at the user computer 102 to make it act as a client with respect to the
communications server 106. The viewer client program manages the ad files and may
comprise a viewer client with the required functionality, or may comprise a targeted
viewer client that is capable of greater functionality.
In one aspect of the invention, a viewer client program at the user 102 manages
the ad pool such that the oldest ad is discarded when a new ad is received, and such that
the expected or average time to download an ad file is approximately equal to the total
time an ad is displayed from the ad pool. For example, if each ad in the ad pool has a 30-
second playing time, and if the average download time for an ad file is expected to be
fifteen minutes, then each 30-second ad should be played thirty times before the ad is
cycled out of the ad pool. In this way, any single ad should have fifteen minutes of total
display time before deletion. Thus, the ads are shown from the ad pool so that download
time is averaged to be approximately equal to the total display time.
As described further below, a "quiet interval" during which no ads are shown can
be used to automatically reduce the number of times an ad would otherwise be shown.
More particularly, given the 15-minute download time and the corresponding 15-minute
display time described above, it may be desirable to provide a portion of the display time
as a "quiet interval" during which the user will see no ads, but during which ads will
continue to be downloaded. A ratio of 1 :5 may be used, so that 2.5 minutes of ad display will be followed by 12.5 minutes of no display. When a new ad is downloaded, the oldest
ad will still be deleted. Thus, in the example above, an ad in a system with a 12.5 minute
quite interval will be shown five times (during the 2.5 minute display interval) rather than
thirty times.
In the viewer client of the preferred embodiment, an initial ad pool of ad files is
downloaded or otherwise installed with the viewer program at the user computer before
the user can utilize the Internet access system and viewer program. Thereafter, an
expected Internet connection speed is assumed such that ad files can be continuously
downloaded during the user's Internet access, and an ad file should complete downloading
approximately when the oldest ad file in the ad file pool will have been played the
appropriate number of times. For example, using a 28.8K band modem, a 30-second
video clip using conventional technology can generally be downloaded in no more than
fifteen minutes of a user's Internet access time.
More particularly, the expected average ad file download time sets the number of
plays for each ad before it should be cycled out of the ad pool. For example, if the
Internet connection speed (baud rate) of the user's network connection 110 is such that an
ad of typical size requires fifteen minutes to download, then the number of plays for each
thirty-second ad before cycling out (in accordance with the example given above) should
be thirty. Such a connection speed may be provided, for example, by a 28.8K baud
modem. Accordingly, the ad pool will be initially stocked so that, after a sufficient total
time of Internet access by the user to provide for fifteen minutes download of a new ad
file, the oldest thirty-second ad in the ad pool should have been played thirty times.
Setting the system design of the client viewer program in this way minimizes the amount
of operational sophistication needed by the viewer program for proper management of the ad pool, so that no tracking of individual ad files is necessary. If the speed of the Internet
connection is faster than 28.8K, or if the bandwidth otherwise improves, ads of greater
size may be downloaded to preserve the fifteen minute average download time.
Video advertising files are downloaded when the system detects that the user is
not actively using the bandwidth of the user's Internet connection 110 to download
Internet content. During the time a user is connected to the Internet via the access control
system 106, the viewer program is continuously running, and periodically opens a viewer
window that is placed on top of any other active window and in which an ad from the ad
pool is displayed. When the video ad is finished displaying, the viewer window is closed
for a quiet interval. At the conclusion of the quiet interval, the viewer window is opened
and the next ad in the ad pool is displayed. The viewer program cycles through existing
ads in the ad pool until a new ad is received from the communications server.
Figure 3 is a flow diagram that illustrates the processing steps executed by the
computer processing system 100 of Figure 1 to implement the Internet access technique in
accordance with the present invention. In the first step, represented by the Figure 3 flow
diagram box numbered 302, the user launches an Internet access program constructed in
accordance with the invention that causes launch of the dial-up connection program,
which will dial a prescribed telephone access number for the ISP. In the next step, after
establishing communication, the system starts the viewer program. A browser program is
preferably started as well, to display a predetermined web page such as the home page of
the Internet access provider. The operating system of the user's computer will launch the
appropriate Internet browser application, and the dial-up connection program for the no-
charge ISP will start the viewer application program. This processing is represented by
the flow diagram box numbered 304. Next, after the browser and viewer have been launched, the system performs ad file download tasks and ad pool management, as
described further below. This processing is represented by the Figure 3 flow diagram box
numbered 306.
Figure 4 is a representation of the display window 402 viewed by a user at the
computer illustrated in Figure 2, showing a browser application window 404 with a
viewer window 406 in the lower right corner of the display window. The browser
window contains display artifacts that should be familiar to those skilled in the art,
including a menu bar 408 with title, window sizing icons 412, and a tray 414 of the
display window that includes an icon 416 for the viewer program. The "START" icon
418 provides access to a variety of operating system commands and will be familiar to
those skilled in the art. Although the display 402 shows a configuration typical for an
operating system such as "Windows 98" by Microsoft Corporation, it should be
understood that the viewer program also can be interfaced with other computer operating
systems, such as the "Macintosh" operating system by Apple Computer Corporation and
the various UNIX variants that are available.
Figure 5 is a flow diagram that illustrates the processing steps performed by the
system 100 illustrated in Figure 1 in providing Internet access to a user without charge,
after the user first launches the dial-up connection program and establishes
communication with the access control system and, in particular, the Ad server, as
indicated in box 302 of Figure 3. Those skilled in the art will understand that a user may,
at any time, halt operation of the free access program by losing a line connection or
terminating the connection with the user's operating system. The first step indicated in
Figure 5 following establishment of communications is to perform fraud control. This is
of critical importance because advertising sponsors, who are being asked to pay the operating costs of the access server, will only be willing to pay costs if they have
reasonable assurances that users are, in fact, viewing the video ads. The fraud control
step 502 provides this assurance.
In particular, the fraud control step 502 involves sending a "Pulse" message to the
Ad server. The fraud Pulse message is sent at regular intervals and contains a user
identification number (user ID) and a date and time indication. If the Ad server does not
receive a Pulse message from a user when such a message is expected, then the Ad server
will terminate the communications session with the user. This can be done, for example,
by the Ad Server sending a termination message to the viewer program to terminate, or to
the NAS to deactivate the user's IP address. Other means of terminating access upon
command by the Ad server are also suitable. A predetermined interval of, for example,
five minutes should be sufficient to ensure that users are not attempting to bypass ad
viewing. Thus, if the Ad server does not receive a Pulse message once every five
minutes, communication will be terminated. The fraud interval may be set as desired.
Fraud control can be implemented using an encryption method for network
authentication rather than the Pulse message and disconnection technique described
above. Such a fraud control system might be implemented with a custom authentication
server and custom authentication protocols. In addition, a number of standard,
commercially available authentication servers can be used with an encryption technique
that keeps an access name and password hidden from the user. In this way, a user would
not be permitted to complete the log-on process without using the supplied fraud control
program to make the network connection. This would ensure that the supplied fraud
control program runs on the user machine as a requirement of permitting Internet access,
and is preferred where maximum fraud security is desired. In the next step of operation, represented by the Figure 5 decision box numbered
504, the dial-up connection program results in a viewer icon located in the display tray
(see Figure 4), and the viewer program thereafter checks to determine if the user has
clicked on the display tray icon. If the user has clicked on the icon, an affirmative
outcome at the decision box 504, then a pop-up menu is displayed, as indicated at box
506. The pop-up menu permits the user to view parameters and actions. For example, the
pop-up menu may show items including "Disconnect", "Settings", and "Help". The user
may select any one of these three alternatives. It should be noted that a "Dial-Up
Networking" icon may be automatically placed in the display tray by the computer
operating system. Those skilled in the art will understand that the Internet connection
also can be terminated by the user through the Dial-Up Networking icon.
User selection of "Disconnect" is indicated as an affirmative outcome at the Figure
5 decision box numbered 508. If the user selects "Disconnect" from the pop-up menu,
then at box 510 the dial-up program is halted and the user is disconnected from the
Internet, ending the session. If "Disconnect" is not selected, a negative outcome at the
decision box 508, then at box 512 the system performs the display action associated with
the action. For example, the resulting actions if "Help" is selected include display of the
"help" menu. Those skilled in the art will be able to determine the set of topics that
would be helpful to users and should therefore be included in the help menu. If the user
selects "Settings" from the pop-up menu, then a dialog box will be shown that will
contain program operating parameters. The user may want to change the display time
options. For example, the user may select between seeing ads for 30 seconds every three
minutes, and seeing 2.5 minutes straight viewing time of ads every 15 minutes. If the user clicks on a display icon (box 506) and then performs a display action
(box 512), or if the user does not click on the display tray icon (a negative outcome at the
decision box numbered 504), then the next operation step is the same, as indicated at the
box numbered 514: update the ad pool and database. Such update actions involve the
viewer program removing the oldest ad in the ad pool if a new ad has been successfully
downloaded. Any local databases are updated with ad file information from the Ad
server, such as the new ad name, ad ID, product, sponsor company, ad file name, path,
and size. In the preferred embodiment, the local database is kept secure from access by
the user. After the ad pool update action, the system next checks for file tampering at the
flow diagram box numbered 516.
To detect tampering, the system checks for a match between ad file information in
the secure local database and actual ad file information. The local database is maintained
by receiving ad file information along with a new ad file. The received ad file
information includes, for example, file name, path, file size, creation date, and the like.
For example, each ad in the ad pool will have a file size specified by received ad file
information in the secure database. The operating system of the user computer can
determine the actual block size of the file. Other file parameters may be checked for
changes. If there is a discrepancy, a mismatch-indicating message is sent to the Ad server
with the user ID and the date and time of detected discrepancy. The Ad server records the
fact that the viewer sent a mismatch message, an indication that possible fraud has
occurred. The viewer program then displays a fraud message on the viewer's computer.
Preferably, the fraud message indicates that fraud has been detected and that such fraud
comprises a violation of the usage agreement. The message can request that the user
contact the ISP, or some other corrective or remedial action may be suggested. The dial- up connection program is then terminated and user access is halted. Thus, the fraud
detection ensures that the file entries in the local database match the entries expected by
the authorization server. This ensures that the user has not tampered with the files.
If no fraud is detected, the user continues to be provided with Internet access. The
next processing step, at the flow diagram box numbered 518, is to perform ad viewer
actions. The ad viewer actions comprise the automatic processing by the viewer program
to periodically display video ads from the ad pool. The ad viewer actions are described
further below in conjunction with Figure 6. Next, during ad showing, the viewer program
detects when the display cursor is placed over the viewer window. When the cursor is
over the viewer window, the viewer program causes the viewer control bar to be
displayed and any user control bar actions to be performed, as indicated by the flow
diagram box numbered 520. The viewer program performs the control bar functions and
thereby provides a means for the user to manage the window in which the ads are viewed.
The control bar function processing is described further below in conjunction with
Figures 7, 8, and 9.
At the completion of each video ad, a "play completion" message is sent to the Ad
server. This ensures that the server has the most current information available on ad
viewing. One or more ad viewings comprise an ad showing interval, depending on the
implementation. When the ad showing interval is completed, the viewer program hides
the viewer window and enforces a quiet interval during which no ads are shown. This
processing is represented by the flow diagram box numbered 522. The viewer program
then enforces the quiet interval, and processing control returns to the fraud control
operation represented by the Figure 5 flow diagram box numbered 502. Further details of the viewer program operation during ad showing are illustrated
in the Figure 6 flow diagram. As indicated by the Figure 6 flow diagram box numbered
602, the viewer program first shows ads from the ad pool stored in the user's computer.
The viewer program keeps track of the order in which the ads should be shown, such as
by keeping an ad information table of the local database in the computer memory, to cycle
through the ads in the ad pool in proper viewing sequence. As noted above, the ads are
shown in order of download, from oldest to newest, and each time a new ad is
downloaded, the viewer program deletes the oldest ad from the ad pool. Also as noted
above, a "play completion" message is sent after completion of each ad showing. The
play completion message includes the user ID, ad name or ID, and the date and time of
completion. If the Ad server is not available to receive and acknowledge the play
completion message, then the play completion message is temporarily stored in the
viewer program message queue. This is part of the processing in box 602.
In the next viewer program operating step, represented by the decision box
numbered 604, the program checks to determine if the ad showing interval has completed.
As noted above, the viewer program opens or launches the viewer window at regular
intervals, showing ads for a predetermined time interval and then hiding the viewer
window or making it inactive. The viewer window runs on top of any other open window
and provides a picture-in-picture viewing format. For example, in the preferred
embodiment, the viewer program shows 2.5 minutes of ads in the viewer window, cycling
through ad pool files that each provide a 30-second video presentation. Thus, five
consecutive ads will be shown during an ad showing interval. After the 2.5 minute ad
showing interval, the viewer program implements a 12.5 minute quiet interval during
which the viewer window is hidden or made inactive. Other intervals may be selected, depending on programming needs. Alternatively, each ad showing may comprise an ad
showing interval, so that a 15-minute period still will include a total of 2.5 minutes of ad
viewing. That is, a 30-second viewing interval will be followed by a 2.5 minute quiet
interval.
If the ad showing interval is not completed, a negative outcome at the decision
box 604, then the viewer program detects and responds to any user display actions and
cursor movement, as represented by the flow diagram box numbered 606. If the ad
showing interval is complete, a positive outcome at the decision box numbered 604, then
the viewer window is hidden or made inactive for the duration of the quiet interval.
System processing then continues.
As noted above for the Figure 5 box numbered 520, the viewer program detects
when a user moves the cursor over the viewer window, and as described above for the
Figure 6 box numbered 606, the viewer program responds to such viewer display actions.
Those skilled in the art will be familiar with how the viewer program can be programmed
to obtain such information from the computer operating system. Moving the cursor over
the viewing window display area and clicking on the ad being shown causes the viewer
program to direct the user's browser to the web site associated with the ad (according to a
URL stored in the local database) and sends an "ad click" message to the Ad server with
user information such as user ID, ad ID, and date and time of click. If the Ad server is not
available to receive and acknowledge the ad click message, then the ad click message is
temporarily stored in a message queue of the viewer program for later sending. Other
messages may also be stored in the message queue, except that only one "Pulse" message
described above, which confirms a user connection, should be permitted in the queue, to
prevent the Ad server from being flooded if it becomes offline for an extended time. Moving the cursor over any portion of the viewer window causes the viewer program to
display the viewer control bar, which then permits the user to modify the ad window
viewing experience.
Figure 7 illustrates details of the viewer window 406 (Figure 4) and control bar.
The window control bar 702 is a vertical bar that includes a sizing icon 704 that permits a
user to modify, within predetermined limits, the size of the window 406. The viewer
program does not permit moving the viewer window completely off the user's desktop
display area, and does not permit reducing the size of the window display beyond a
minimum size. This ensures advertising sponsors of a minimum display area for their
ads. The control bar 702 also includes a "Recent Ads" button 706 that opens a pop-up
menu that lists the ten most recent ad sponsor names, as described further below, for
accessing ad web sites. The viewer window of Figure 7 also includes a volume control
708 that adjusts playback sound level. Finally, the viewer window has a mute button 710,
for viewing ads without sound. A blank area 712 of the control bar provides a Move Bar
that permits the user to move the viewer window 406 within the desktop area in usual
windowing fashion by clicking and dragging.
Figure 8 shows an exemplary Recent Ads pop-up menu 802 that results from user
selection of the Recent Ads button 706 (Figure 7) and contains information about recently
viewed ads from the ad pool stored on the computer. Preferably, the menu 802 shows the
title or description of the ten most recently viewed ads of ad sponsors. Each entry in the
pop-up menu corresponds to an ad in the ad pool. If the user clicks on any of the listed
web sites, then the viewer program directs the user's browser to the corresponding web
site. Other suitable formats of the "Recent Ads" menu will occur to those skilled in the
art. The "Recent Ads" pop-up menu of Figure 8 includes a "More" entry that when
selected, causes an "Open Link" dialogue box to be opened. This dialogue box is shown
in Figure 9. The dialogue box lists the ad names, ad sponsor, and ad sponsor web site
link. The link comprises a Universal Resource Locator (URL) address that directs the
user browser to the corresponding web site. If an advertiser does not have a URL for a
web site, then the Figure 9 dialogue box inserts the web site of the ISP or some other
designated web site. Thus, with the control bar and Open Link dialogue box, the user has
management control of the Internet viewer window.
Figure 10 is a flow diagram that illustrates the processing steps performed to
permit the playback management control bar functions available to the user during ad
showing. In the first processing step, represented by the Figure 10 decision box
numbered 1002, the viewer program detects when the user clicks on the Recent Ads
control bar button 706 (see Figure 7). If a button click is detected, an affirmative outcome
at box 1002, then the viewer program responds appropriately by showing the Recent Ads
menu described above. This processing is represented by the flow diagram box numbered
1004. In accordance with the invention, the user does not lose control of the browser
when an ad is being shown. Therefore, if the user clicks on the Recent Ads button and the
browser is directed to a sponsor's web site, the viewer window continues to show ads and
continues to be active. Therefore, after the user clicks on the Recent Ads button and the
viewer program performs its response at box 1004, or if there was no user click (a
negative outcome at the decision box 1002), the viewer program operation continues.
Next, as indicated by the decision box numbered 1006, the viewer program
determines if the user clicks on the resize button 704 (Figure 7). If the user does, an
affirmative outcome at the decision box 1006, then the viewer program permits resizing, within predetermined limits. The resizing operation is indicated by the flow diagram box
numbered 1008. After window resizing, or in the event of no user display click (a
negative outcome at the decision box 1006), the viewer program operation continues.
Finally, the viewer program determines if the user clicks on the control bar
"Move" area 712 (Figure 7). If yes, an affirmative outcome at the decision box 1010, then
the viewer program permits the user to move the viewer window within the desktop
display area, but will not permit the viewer to hide the viewer window. This operation is
represented by the flow diagram box numbered 1012. After moving is complete at box
1012, or if there was no click (a negative outcome at the decision box 1010), the viewer
program continues normal operation, including the display and download of ads.
As noted above in conjunction with the description of Figure 3, the system
performs ad file download tasks (box 306). Figure 11 is a flow diagram that illustrates
the processing steps performed by the system in managing the ad download function.
In the first download processing step, represented by the Figure 1 1 flow diagram
box numbered 1102, the current user state is stored in the local database. This
information comprises status information, including the current ad file that is
downloading in a background operation, where ad playback is on the play list, and the
current ad file block that is being received. The state information is maintained by the
viewer program so it can continue a download operation in progress even after the
program has been shut down and restarted. The initial information is received from the
Ad server when a new ad is requested. The viewer program then keeps track of where the
download operation is, using the database to store the information. Thus, the Ad server
need not store information relating to, or otherwise control operations for, the download
process. Next, the viewer program determines the ad block size to request from the Ad
server, as indicated by the flow diagram box numbered 1104. The viewer program makes
this determination based on the data rate available from the dial-up connection and,
optionally, system resources such as processor speed, available memory, download
latency, and modem speed. At the decision box numbered 1106, the viewer program next
determines if the user is actively using the Internet connection (modem line) for external
communication. The connection will only be indicated as currently in-use if, for example,
the user is in the middle of downloading a web page or receiving a file from the Internet,
or sending or receiving electronic mail. If the connection is being used, an affirmative
outcome at the decision box numbered 1106, then the viewer program waits for a
predetermined check interval (box 1108) and then checks again (box 1106).
When the Internet connection is not being used by the user, a negative outcome at
the decision box numbered 1106, the viewer program sends a request to the Ad server for
the file name from which download will commence (or continue), the offset from the file
start where the block should be downloaded, and the determined ad block size. The user's
viewer program then receives the requested data and stores the block to a local file. These
file request and saving steps will be familiar to those skilled in the art, without further
explanation.
After each ad block has been downloaded, the viewer program checks to
determine if the entire ad has been received. This step is indicated by the Figure 11
decision box numbered 1112. If the download is not complete, a negative outcome at the
box 1112, then processing goes back to the flow diagram box numbered 1106, where
availability of the connection is determined. If all blocks in the next ad have been
received, an affirmative outcome at the decision box 1112, then the viewer program updates the secure local database, provides the completed ad information to the Ad server,
and obtains information for download of the next ad, as indicated by the flow diagram
box numbered 1114. The viewer program next updates the current state information in
the secure local database, as indicated by the flow diagram box numbered 1116. The
viewer program continues with other normal processing.
The viewer program preferably includes an Application Program Interface (API)
that permits its functionality to be available to other programs, as known to those skilled
in the art. In addition, means other than the viewer program may be used in download
control. For example, the well-known "BackWeb" client/server products from BackWeb
Technologies, Inc. of San Jose, California may be used for download control.
As described above, the client viewer program of the preferred embodiment
manages an ad pool stored in the user computer so that the oldest ad is discarded when a
new ad is received. A targeted client of the preferred embodiment provides greater
flexibility in managing the ad pool and targeting ad files to individual users. The targeted
client permits selection of ad files to be provided to individual subscribers of the access
service by collecting demographic information upon initiation of the access service to a
subscriber. That is, both the viewer client and the targeted client send ad files to specific
users, but an ad server that works with the targeted client will send ad files to specific
users based on demographic information received from each particular user.
In the preferred embodiment, a single targeted client installed at a user computer is
associated with a single user who subscribes to the Internet access service, although the
user of an installed targeted client can also be associated with multiple member accounts.
For example, the initial user who establishes a subscriber account at a computer or
machine becomes the "master" account, and additional member accounts may be associated with that master user account. After the user account is established and user
demographic information is collected for the master account, the additional member
accounts may be established from the same computer, and corresponding demographic
information will be collected from each new member. It should be understood that
references to "user" in this discussion will mean either a master user account or an
associated member account, unless otherwise specified. Ad files will be targeted to each
different user. Moreover, the preferred embodiment permits multiple users to share ad
files on the same computer, to conserve network bandwidth and avoid waste of resources
that would be associated with downloading the same ad file multiple times.
The present invention has been described above in terms of a presently preferred
embodiment so that an understanding of the present invention can be conveyed. There
are, however, many configurations for Internet access systems not specifically described
herein but with which the present invention is applicable. For example, use of Internet
bandwidth may be detected by identifying the occurrence of Internet browser events, such
as new links or page download completion. Similarly, ftp-programs and e-mail use can
be watched for and avoided. Also, the viewer window control functions can be varied
from that shown above. A fully configurable window or a window that pops out on the
desktop could be provided, if desired. The present invention should therefore not be seen
as limited to the particular embodiments described herein, but rather, it should be
understood that the present invention has wide applicability with respect to providing
Internet access generally. All modifications, variations, or equivalent arrangements and
implementations that are within the scope of the attached claims should therefore be
considered within the scope of the invention.

Claims

CLAIMSWE CLAIM:
1. A method of providing a user computer with access to files of a network,
the method comprising:
establishing a communication link from the user computer to an access control
system;
launching a browser program for viewing data content of the network files and
launching a viewer program that controls the status of the communication link;
detecting times when the user is not actively sending or receiving data from the
network, and using such times to download ad files from the network to the user
computer, such that the viewer program maintains a pool of ad files at the user computer
for display in the order received, from newest to oldest, and performs ad pool
management tasks;
periodically opening a viewer program window in which a next ad file from the ad
file pool is displayed; and
hiding the viewer program window after a predetermined number of ad files from
the ad file pool have been played and keeping the viewer program window hidden for a
predetermined quiet interval;
wherein the viewer program downloads files such that the time to download an ad
file from the access control system is averaged to be approximately equal to the time to
display the ad file.
2. A method as defined in claim 1, further comprising the steps of:
receiving a new ad file from the access control system;
storing the new ad file in the user computer; and
deleting the oldest ad file from the ad pool in the user computer.
3. A method as defined in claim 1, wherein the viewer program maintains an
ad information table of a local database in the user computer.
4. A method as defined in claim 1, further including the step of periodically
performing fraud control, wherein the viewer program sends a pulse message to the
access control system at predetermined intervals, and the access control system causes the
communication link to the network to be severed if it fails to receive an expected pulse
message.
5. A method as defined in claim 4, wherein the viewer program maintains an
ad information table that includes ad file information initially received from the access
control system, such that the viewer program compares actual ad file information
determined by the user computer and with corresponding ad file information in the table,
and such that the access server causes the communication link to the network to be
severed if there is a discrepancy.
6. A method as defined in claim 5, wherein the fraud control comprises
comparing ad information in the local database with actual ad file information for the
corresponding ad file, and indicating fraud if there is a discrepancy.
7. A method as defined in claim 5, wherein the viewer program terminates
the network connection if fraud is indicated.
8. A method as defined in claim 1, wherein the access control system
includes an Ad server that provides the ad files to a user, a Network Access Server that
assigns a network address for an authorized user, and an Access, Authorization, and
Accounting server that determines if authorization should be granted to a user.
9. A method as defined in claim 8, further including fraud control,
comprising:
sending a pulse message from the viewer program to the Ad server at
predetermined intervals;
sending a termination message from the Ad server to the viewer program if the Ad
server does not receive a pulse message at an expected time.
10. A method as defined in claim 1, further including the step of performing
fraud control, comprising:
maintaining an ad information table in the user computer that contains information
on respective ads in the ad pool received from the access control system;
comparing actual ad file information determined by the user computer for ads in
the ad pool with the ad file information for corresponding ads stored in the ad information
table; and indicating fraud if the comparison shows a discrepancy.
11. An access control system that provides a user computer with access to files
of a network to which the user computer is connected, the access control server
comprising:
a central processing unit that can establish communication with the user computer;
program memory that stores programming instructions that are executed such that
the access control system receives requests from the user computer for ad files, wherein
the user requests are generated by a viewer program of the user computer after detecting
times when the user is not actively sending or receiving data from the network, such that
the viewer program maintains a pool of ad files at the user computer for display in the
order received, from newest to oldest, and performs ad pool management tasks, and
wherein the viewer program periodically produces a pulse message at predetermined
intervals to perform fraud control, wherein the access control system causes the
communication link to the network to be severed if it fails to detect an expected pulse
message.
12. An access control system as defined in claim 11, wherein the access
control system includes an Ad server that provides the ad files to a user, a Network
Access Server that assigns a network address for an authorized user, and an Access,
Authorization, and Accounting server that determines if authorization should be granted
to a user.
13. An access control system as defined in claim 12, wherein the Ad server
receives a pulse message from the viewer program at predetermined intervals and sends a
termination message to the viewer program if the Ad server does not receive a pulse
message at an expected time.
14. An access control system as defined in claim 12, wherein the Ad server
sends ad file information to the viewer program along with ad files, for storage in an ad
file database in the user computer.
15. A user computer that receives files from an access control system
connected to a network, the user computer comprising:
a central processing unit that can establish communication with the access control
server;
program memory that stores programming instructions that are executed such that
the user computer establishes a communication link from the user computer to the access
control system and then launches a browser program for viewing data content of the
network files and launches a viewer program that controls the status of the
communication link, detects times when the user is not actively sending or receiving data
from the network, and uses such times to download ad files from the network to the user
computer, such that the viewer program maintains a pool of ad files at the user computer
for display in the order received, from newest to oldest, and performs ad pool
management tasks, and then periodically opens a viewer program window in which a next
ad file from the ad file pool is displayed and hides the viewer program window after a
predetermined number of ad files have been played, keeping the viewer program window closed for a predetermined quiet interval, wherein the viewer program downloads files
such that the time to download an ad file from the access control system is averaged to be
approximately equal to the time to display an ad file from the ad file pool.
16. A user computer as defined in claim 15, wherein the user computer stores a
new ad file received from the access control system, and deletes the oldest ad file from the
ad pool in the user computer.
17. A user computer as defined in claim 15, wherein the viewer program
maintains an ad information table of a local database in the user computer.
18. A user computer as defined in claim 15, wherein the user computer
periodically performs fraud control, wherein the viewer program produces a pulse
message at predetermined intervals, and the access control system causes the
communication link to the network to be severed if it fails to detect an expected pulse
message.
19. A user computer as defined in claim 15, wherein the access control system
includes an Ad server that provides the ad files to a user, a Network Access Server that
assigns a network address for an authorized user, and an Access, Authorization, and
Accounting server that determines if authorization should be granted to a user.
20. A user computer as defined in claim 19, wherein the Ad server receives a
pulse message from the viewer program at predetermined intervals and sends a
termination message to the viewer program if the Ad server does not receive a pulse
message at an expected time.
21. A user computer as defined in claim 19, wherein the Ad server sends ad
file information to the viewer program along with ad files, for storage in an ad file
database in the user computer.
22. A user computer as defined in claim 15, wherein the fraud control
comprises comparing ad information in the local database with actual ad file information
for the corresponding ad file, and indicating fraud if there is a discrepancy.
23. A user computer as defined in claim 15, wherein the viewer program
terminates the network connection if fraud is indicated.
24. A user computer as defined in claim 15, wherein the access control system
includes an Ad server that provides the ad files to a user, a Network Access Server that
assigns a network address for an authorized user, and an Access, Authorization, and
Accounting server that determines if authorization should be granted to a user.
25. A user computer as defined in claim 24, further including fraud control in
which the user computer sends a pulse message from to the Ad server at predetermined
intervals, receives a termination message from the Ad server if the Ad server does not receive a pulse message at an expected time and, in response, terminates the network
communication.
26. A user computer as defined in claim 15, wherein the viewer program
performs fraud control by maintaining an ad information table in the user computer that
contains information on respective ads in the ad pool received from the access control
system, comparing actual ad file information determined by the user computer for ads in
the ad pool with the ad file information for corresponding ads stored in the ad information
table, and indicating fraud if the comparison shows a discrepancy.
27. A program product for use in a computer system that executes program
steps recorded in a computer-readable media to perform a method for providing a user
computer with access to files of a network, the program product comprising:
a recordable media; and
a program of computer-readable instructions executable by the computer system to
perform method steps comprising:
establishing a communication link from the user computer to an access
control system;
launching a browser program for viewing data content of the network files
and launching a viewer program that controls the status of the communication
link;
detecting times when the user is not actively sending or receiving data
from the network, and using such times to download ad files from the network to
the user computer, such that the viewer program maintains a pool of ad files at the user computer for display in the order received, from newest to oldest, and
performs ad pool management tasks;
periodically opening a viewer program window in which a next ad file
from the ad file pool is displayed; and
hiding the viewer program window after a predetermined number of blocks
from the ad files have been played and keeping the viewer program window
hidden for a predetermined quiet interval;
wherein the viewer program downloads files such that the time to download an ad file
from the access control system is averaged to be approximately equal to the time to
display the ad file.
28. A program product as defined in claim 27, further comprising the steps of:
receiving a new ad file from the access control system;
storing the new ad file in the user computer; and
deleting the oldest ad file from the ad pool in the user computer.
29. A program product as defined in claim 27, wherein the viewer program
maintains an ad information table of a local database in the user computer.
30. A program product as defined in claim 27, further including the step of
periodically performing fraud control, wherein the viewer program sends a pulse message
to the access control system at predetermined intervals, and the access control system
causes the communication link to the network to be severed if it fails to receive an
expected pulse message.
31. A program product as defined in claim 30, wherein the viewer program
maintains an ad information table that includes ad file information initially received from
the access control system, such that the viewer program compares actual ad file
information determined by the user computer and with corresponding ad file information
in the table, and such that the access server causes the communication link to the network
to be severed if there is a discrepancy.
32. A program product as defined in claim 31, wherein the fraud control
comprises comparing ad information in the local database with actual ad file information
for the corresponding ad file, and indicating fraud if there is a discrepancy.
33. A program product as defined in claim 31, wherein the viewer program
terminates the network connection if fraud is indicated.
34. A program product as defined in claim 27, wherein the access control
system includes an Ad server that provides the ad files to a user, a Network Access Server
that assigns a network address for an authorized user, and an Access, Authorization, and
Accounting server that determines if authorization should be granted to a user.
35. A program product as defined in claim 34, further including fraud control,
comprising:
sending a pulse message from the viewer program to the Ad server at
predetermined intervals; sending a termination message from the Ad server to the viewer program if the Ad
server does not receive a pulse message at an expected time.
36. A program product as defined in claim 27, further including the step of
performing fraud control, comprising:
maintaining an ad information table in the user computer that contains information
on respective ads in the ad pool received from the access control system;
comparing actual ad file information determined by the user computer for ads in
the ad pool with the ad file information for corresponding ads stored in the ad information
table; and
indicating fraud if the comparison shows a discrepancy.
PCT/US2000/014853 1999-06-01 2000-05-30 Targeted network video download interface WO2000073961A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU50485/00A AU5048500A (en) 1999-06-01 2000-05-30 Targeted network video download interface

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/323,706 1999-06-01
US09/323,706 US6463468B1 (en) 1999-06-01 1999-06-01 Targeted network video download interface

Publications (2)

Publication Number Publication Date
WO2000073961A2 true WO2000073961A2 (en) 2000-12-07
WO2000073961A8 WO2000073961A8 (en) 2002-06-06

Family

ID=23260374

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/014853 WO2000073961A2 (en) 1999-06-01 2000-05-30 Targeted network video download interface

Country Status (3)

Country Link
US (1) US6463468B1 (en)
AU (1) AU5048500A (en)
WO (1) WO2000073961A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1217560A1 (en) * 2000-12-22 2002-06-26 William Bottigelli Method of incentive delivery of interactive advertisement contents inside an internet domain characterized by user profiling
WO2002075198A1 (en) * 2001-03-15 2002-09-26 David George Stark Swivel device for hoses
WO2002089006A3 (en) * 2001-04-27 2003-06-05 Koninkl Philips Electronics Nv Electronic document with an automatically updated portion

Families Citing this family (141)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7721307B2 (en) * 1992-12-09 2010-05-18 Comcast Ip Holdings I, Llc Method and apparatus for targeting of interactive virtual objects
US7168084B1 (en) 1992-12-09 2007-01-23 Sedna Patent Services, Llc Method and apparatus for targeting virtual objects
US9286294B2 (en) 1992-12-09 2016-03-15 Comcast Ip Holdings I, Llc Video and digital multimedia aggregator content suggestion engine
US7362775B1 (en) 1996-07-02 2008-04-22 Wistaria Trading, Inc. Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US6205249B1 (en) 1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking
US7664263B2 (en) 1998-03-24 2010-02-16 Moskowitz Scott A Method for combining transfer functions with predetermined key creation
US20020049745A1 (en) * 1996-05-10 2002-04-25 Global Media Online, Inc. Maintaining most current client version
US7177429B2 (en) 2000-12-07 2007-02-13 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects
US7095874B2 (en) 1996-07-02 2006-08-22 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US5889868A (en) 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7346472B1 (en) 2000-09-07 2008-03-18 Blue Spike, Inc. Method and device for monitoring and analyzing signals
US7457962B2 (en) * 1996-07-02 2008-11-25 Wistaria Trading, Inc Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7159116B2 (en) 1999-12-07 2007-01-02 Blue Spike, Inc. Systems, methods and devices for trusted transactions
US7730317B2 (en) 1996-12-20 2010-06-01 Wistaria Trading, Inc. Linear predictive coding implementation of digital watermarks
US8640160B2 (en) 1997-01-06 2014-01-28 At&T Intellectual Property I, L.P. Method and system for providing targeted advertisements
US7587323B2 (en) 2001-12-14 2009-09-08 At&T Intellectual Property I, L.P. System and method for developing tailored content
US6983478B1 (en) 2000-02-01 2006-01-03 Bellsouth Intellectual Property Corporation Method and system for tracking network use
US7020652B2 (en) * 2001-12-21 2006-03-28 Bellsouth Intellectual Property Corp. System and method for customizing content-access lists
US7802276B2 (en) 1997-01-06 2010-09-21 At&T Intellectual Property I, L.P. Systems, methods and products for assessing subscriber content access
US20060075456A1 (en) * 1997-01-06 2006-04-06 Gray James Harold Methods and systems for collaborative capture of television viewer generated clickstreams
US20100257037A1 (en) * 2001-12-14 2010-10-07 Matz William R Method and system for targeted incentives
US7617508B2 (en) 2003-12-12 2009-11-10 At&T Intellectual Property I, L.P. Methods and systems for collaborative capture of television viewer generated clickstreams
US20060253884A1 (en) * 1997-01-06 2006-11-09 Gray James H Methods and systems for network based capture of television viewer generated clickstreams
WO1998031114A1 (en) 1997-01-06 1998-07-16 Bellsouth Corporation Method and system for tracking network use
US8677384B2 (en) 2003-12-12 2014-03-18 At&T Intellectual Property I, L.P. Methods and systems for network based capture of television viewer generated clickstreams
US7305562B1 (en) * 1999-03-09 2007-12-04 Citibank, N.A. System, method and computer program product for an authentication management infrastructure
US7664264B2 (en) 1999-03-24 2010-02-16 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems
US7552458B1 (en) * 1999-03-29 2009-06-23 The Directv Group, Inc. Method and apparatus for transmission receipt and display of advertisements
US7877290B1 (en) 1999-03-29 2011-01-25 The Directv Group, Inc. System and method for transmitting, receiving and displaying advertisements
US6529949B1 (en) 2000-02-07 2003-03-04 Interactual Technologies, Inc. System, method and article of manufacture for remote unlocking of local content located on a client device
US7458091B1 (en) * 2000-01-20 2008-11-25 Sonic Solutions, A California Corporation System, method and article of manufacture for a business layer component in a multimedia synchronization framework
US7475246B1 (en) 1999-08-04 2009-01-06 Blue Spike, Inc. Secure personal content server
US6728776B1 (en) * 1999-08-27 2004-04-27 Gateway, Inc. System and method for communication of streaming data
US8554628B1 (en) 1999-10-26 2013-10-08 Aol Inc. Advertisement delivery
US6675193B1 (en) * 1999-10-29 2004-01-06 Invensys Software Systems Method and system for remote control of a local system
US7925713B1 (en) * 1999-11-22 2011-04-12 Akamai Technologies, Inc. Method for operating an integrated point of presence server network
US6760601B1 (en) * 1999-11-29 2004-07-06 Nokia Corporation Apparatus for providing information services to a telecommunication device user
US6442573B1 (en) * 1999-12-10 2002-08-27 Ceiva Logic, Inc. Method and apparatus for distributing picture mail to a frame device community
US20020073423A1 (en) * 1999-12-14 2002-06-13 Haig Krakirian System, method and program product for displaying simultaneously video content and supplemental information without obstructing video content
US7058903B1 (en) 2000-02-11 2006-06-06 Sony Corporation Image database jog/shuttle search
US7262778B1 (en) 2000-02-11 2007-08-28 Sony Corporation Automatic color adjustment of a template design
US7810037B1 (en) 2000-02-11 2010-10-05 Sony Corporation Online story collaboration
US8407595B1 (en) 2000-02-11 2013-03-26 Sony Corporation Imaging service for automating the display of images
US6920110B2 (en) * 2001-02-14 2005-07-19 Microsoft Corporation System and method for transferring data over a network
US7437428B1 (en) * 2000-02-16 2008-10-14 Microsoft Corporation System and method for transferring data over a network
US6714992B1 (en) * 2000-02-25 2004-03-30 Navic Systems, Inc. Method and system for embedded network device installation
US7392281B1 (en) * 2000-02-25 2008-06-24 Navic Systems, Inc. System and method for providing guaranteed delivery of messages to embedded devices over a data network
US7330824B1 (en) 2000-02-25 2008-02-12 Navic Systems, Inc. Method and system for content profiling and activation
US20020056083A1 (en) * 2000-03-29 2002-05-09 Istvan Anthony F. System and method for picture-in-browser scaling
US7353267B1 (en) * 2000-04-07 2008-04-01 Netzero, Inc. Targeted network video download interface
US7962604B1 (en) * 2000-10-17 2011-06-14 Aol Inc Displaying advertisements in a computer network environment
US6757661B1 (en) * 2000-04-07 2004-06-29 Netzero High volume targeting of advertisements to user of online service
US6769028B1 (en) 2000-05-26 2004-07-27 Sonicbox, Inc. Method and apparatus for sharing streaming media links
US6684249B1 (en) * 2000-05-26 2004-01-27 Sonicbox, Inc. Method and system for adding advertisements over streaming audio based upon a user profile over a world wide area network of computers
US7743330B1 (en) 2000-06-19 2010-06-22 Comcast Ip Holdings I, Llc Method and apparatus for placing virtual objects
US7281046B1 (en) * 2000-06-30 2007-10-09 Covad Communications Company Application program interface for automating high speed network access ordering and provisioning processes
US7346676B1 (en) * 2000-07-19 2008-03-18 Akamai Technologies, Inc. Load balancing service
SG94860A1 (en) * 2000-09-07 2003-03-18 Edsamail Holdings Pte Ltd Filling station system for free access to the internet
US7689510B2 (en) 2000-09-07 2010-03-30 Sonic Solutions Methods and system for use in network management of content
US7127615B2 (en) 2000-09-20 2006-10-24 Blue Spike, Inc. Security based on subliminal and supraliminal channels for data objects
US7047273B2 (en) 2000-11-28 2006-05-16 Navic Systems, Inc. Load balancing in set top cable box environment
US20020077900A1 (en) * 2000-12-14 2002-06-20 Thompson Tiffany A. Internet protocol-based interstitial advertising
US7676822B2 (en) * 2001-01-11 2010-03-09 Thomson Licensing Automatic on-screen display of auxiliary information
US8144837B2 (en) * 2001-01-22 2012-03-27 Dialogic Corporation Method and system for enhanced user experience of audio
US20020103879A1 (en) * 2001-01-26 2002-08-01 Mondragon Oscar A. Method of advertising via the internet
GB2377518B (en) * 2001-02-12 2003-10-22 Altio Ltd Client software enabling a client to run a network based application
GB0108911D0 (en) * 2001-04-10 2001-05-30 Pace Micro Tech Plc Broadcast data systems
US7089195B2 (en) * 2001-04-30 2006-08-08 Ari Rosenberg System and method for the presentation of advertisements
US7908628B2 (en) 2001-08-03 2011-03-15 Comcast Ip Holdings I, Llc Video and digital multimedia aggregator content coding and formatting
US7793326B2 (en) 2001-08-03 2010-09-07 Comcast Ip Holdings I, Llc Video and digital multimedia aggregator
US7499878B2 (en) * 2001-08-31 2009-03-03 International Business Machines Corporation Dynamic content configuration for microbrowsers by state, resource allocation and user preferences, to preserve battery power
US7251752B2 (en) 2001-10-01 2007-07-31 Adams Phillip M Computerized product improvement apparatus and method
US9967633B1 (en) 2001-12-14 2018-05-08 At&T Intellectual Property I, L.P. System and method for utilizing television viewing patterns
US7212979B1 (en) 2001-12-14 2007-05-01 Bellsouth Intellectuall Property Corporation System and method for identifying desirable subscribers
US20110178877A1 (en) 2001-12-14 2011-07-21 Swix Scott R Advertising and content management systems and methods
US7444658B1 (en) 2001-12-14 2008-10-28 At&T Intellectual Property I, L.P. Method and system to perform content targeting
US7086075B2 (en) 2001-12-21 2006-08-01 Bellsouth Intellectual Property Corporation Method and system for managing timed responses to A/V events in television programming
US8086491B1 (en) 2001-12-31 2011-12-27 At&T Intellectual Property I, L. P. Method and system for targeted content distribution using tagged data streams
US20030122864A1 (en) * 2001-12-31 2003-07-03 Jenne John Erven Method and apparatus for displaying commercial messages during a user waiting time
JP2003233739A (en) * 2002-02-06 2003-08-22 Yoshiaki Masuno Ordering system utilizing portable terminal providing positional information
US7103659B2 (en) * 2002-04-09 2006-09-05 Cisco Technology, Inc. System and method for monitoring information in a network environment
US7287275B2 (en) 2002-04-17 2007-10-23 Moskowitz Scott A Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
JP2004133576A (en) * 2002-10-09 2004-04-30 Sony Corp Information processor, content distribution server, license server and method, and computer program
US20040103444A1 (en) * 2002-11-26 2004-05-27 Neal Weinberg Point to multi-point broadcast-quality Internet video broadcasting system with synchronized, simultaneous audience viewing and zero-latency
US20040186778A1 (en) * 2003-01-29 2004-09-23 Margiloff William A. Systems and methods for selecting advertisements to be provided to users via a communication network
US20040186775A1 (en) * 2003-01-29 2004-09-23 Margiloff William A. Systems and methods for providing an improved toolbar
US7593868B2 (en) * 2003-01-29 2009-09-22 Innovation Interactive Llc Systems and methods for providing contextual advertising information via a communication network
US20040193605A1 (en) * 2003-03-25 2004-09-30 Weisman Mitchell T. Control of access to computers in a computer network
US7380218B2 (en) * 2003-03-27 2008-05-27 International Business Machines Corporation Method and apparatus for managing windows
US10063523B2 (en) * 2005-09-14 2018-08-28 Oracle International Corporation Crafted identities
US9781154B1 (en) 2003-04-01 2017-10-03 Oracle International Corporation Systems and methods for supporting information security and sub-system operational protocol conformance
US10275723B2 (en) 2005-09-14 2019-04-30 Oracle International Corporation Policy enforcement via attestations
US8818913B1 (en) * 2004-01-14 2014-08-26 Junkin Holdings Llc Wireless access using preexisting data connection
US8280774B2 (en) 2004-04-15 2012-10-02 At&T Intellectual Property I, Lp Systems, methods and computer program products for providing sponsored proactive searches for sponsored quality of service network connections
US20050289588A1 (en) * 2004-06-25 2005-12-29 Kinnear D S System and method for targeting video advertisements
US20060004633A1 (en) * 2004-07-02 2006-01-05 Douglas Ashbaugh Multinode traffic architecture and network for the exchange of internet advertising traffic
US8285855B2 (en) * 2004-08-02 2012-10-09 Microsoft Corporation System, method and user interface for network status reporting
US8135390B2 (en) * 2005-07-21 2012-03-13 Xcellasave, Inc. Method for advertising on digital cellular telephones and reducing costs to the end user
US7665141B2 (en) 2004-11-24 2010-02-16 Ghada Young Origin and custody of copies from a stored electronic record verified page by page
WO2006066052A2 (en) 2004-12-16 2006-06-22 Sonic Solutions Methods and systems for use in network management of content
US20060277567A1 (en) * 2005-06-07 2006-12-07 Kinnear D S System and method for targeting audio advertisements
US7681238B2 (en) * 2005-08-11 2010-03-16 Microsoft Corporation Remotely accessing protected files via streaming
US7631270B2 (en) * 2005-09-16 2009-12-08 Microsoft Corporation Network connectivity and wireless status in a notification area
US8683082B2 (en) * 2005-11-14 2014-03-25 Sandisk Technologies Inc. Removable memory devices for displaying advertisement content on host systems using applications launched from removable memory devices
US8683081B2 (en) * 2005-11-14 2014-03-25 Sandisk Technologies Inc. Methods for displaying advertisement content on host system using application launched from removable memory device
US8266696B2 (en) * 2005-11-14 2012-09-11 Cisco Technology, Inc. Techniques for network protection based on subscriber-aware application proxies
US7730164B1 (en) * 2005-11-23 2010-06-01 Adobe Systems Incorporated Bootstrap approaches to downloading data in response to a download indication
US20070130602A1 (en) * 2005-12-07 2007-06-07 Ask Jeeves, Inc. Method and system to present a preview of video content
US20070130203A1 (en) * 2005-12-07 2007-06-07 Ask Jeeves, Inc. Method and system to provide targeted advertising with search results
US7730405B2 (en) * 2005-12-07 2010-06-01 Iac Search & Media, Inc. Method and system to present video content
US8230516B2 (en) * 2006-01-19 2012-07-24 International Business Machines Corporation Apparatus, system, and method for network authentication and content distribution
US9324081B2 (en) * 2006-04-21 2016-04-26 Fortinet, Inc. Network advertising system
US8286218B2 (en) * 2006-06-08 2012-10-09 Ajp Enterprises, Llc Systems and methods of customized television programming over the internet
US20080010117A1 (en) * 2006-06-14 2008-01-10 Microsoft Corporation Dynamic advertisement insertion in a download service
US20080010118A1 (en) * 2006-06-14 2008-01-10 Microsoft Corporation Managing content downloads to retain user attention
US20070294292A1 (en) * 2006-06-14 2007-12-20 Microsoft Corporation Advertising transfer and playback on portable devices
US7836511B2 (en) * 2006-06-14 2010-11-16 Microsoft Corporation Enforcing advertisement playback for downloaded media content
US20080010119A1 (en) * 2006-06-14 2008-01-10 Microsoft Corporation Locating downloaded and viewed content and advertisements
US7975310B2 (en) * 2006-06-14 2011-07-05 Microsoft Corporation Offline playback of advertising supported media
US7792756B2 (en) * 2006-06-27 2010-09-07 Microsoft Corporation Subscription management in a media sharing service
US7962937B2 (en) 2006-08-01 2011-06-14 Microsoft Corporation Media content catalog service
US8046803B1 (en) 2006-12-28 2011-10-25 Sprint Communications Company L.P. Contextual multimedia metatagging
US8060407B1 (en) 2007-09-04 2011-11-15 Sprint Communications Company L.P. Method for providing personalized, targeted advertisements during playback of media
US8001002B2 (en) * 2007-09-07 2011-08-16 Microsoft Corporation Interactively presenting advertising content offline
US20090157504A1 (en) * 2007-12-13 2009-06-18 Christian Nielsen Braemer System and method for advertising to a target demographic of internet users
US20090254931A1 (en) * 2008-04-07 2009-10-08 Pizzurro Alfred J Systems and methods of interactive production marketing
US8806530B1 (en) 2008-04-22 2014-08-12 Sprint Communications Company L.P. Dual channel presence detection and content delivery system and method
US20090281889A1 (en) * 2008-05-07 2009-11-12 Derosa-Grund H Anthony Displaying targeted ads in unused areas of browser windows and using user premisssioned personal private information in connection with weighted display of ads, online search results and search ads
AU2009253857A1 (en) * 2008-06-05 2009-12-10 Frankie James Lagudi Electronic advertising
DE102009045462B4 (en) * 2009-10-07 2023-07-27 Airbus Operations Gmbh Cabin management system and aircraft or spacecraft having a cabin management system
US8990104B1 (en) 2009-10-27 2015-03-24 Sprint Communications Company L.P. Multimedia product placement marketplace
US8707182B2 (en) * 2010-01-20 2014-04-22 Verizon Patent And Licensing Inc. Methods and systems for dynamically inserting an advertisement into a playback of a recorded media content instance
US9237294B2 (en) 2010-03-05 2016-01-12 Sony Corporation Apparatus and method for replacing a broadcasted advertisement based on both heuristic information and attempts in altering the playback of the advertisement
US9832528B2 (en) 2010-10-21 2017-11-28 Sony Corporation System and method for merging network-based content with broadcasted programming content
EP2451151B1 (en) 2010-11-08 2014-08-13 Deluxe Media Inc. Method and apparatus for use in controlling the playback of contents related with a recorded content.
US8893048B2 (en) * 2011-05-13 2014-11-18 Kalyan M. Gupta System and method for virtual object placement
US9300814B2 (en) * 2011-09-12 2016-03-29 Microsoft Technology Licensing Llc Network adaptive content download
US8687947B2 (en) 2012-02-20 2014-04-01 Rr Donnelley & Sons Company Systems and methods for variable video production, distribution and presentation
US9265458B2 (en) 2012-12-04 2016-02-23 Sync-Think, Inc. Application of smooth pursuit cognitive testing paradigms to clinical drug development
US9380976B2 (en) 2013-03-11 2016-07-05 Sync-Think, Inc. Optical neuroinformatics

Family Cites Families (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2203573A (en) 1987-04-02 1988-10-19 Ibm Data processing network with upgrading of files
US5105184B1 (en) 1989-11-09 1997-06-17 Noorali Pirani Methods for displaying and integrating commercial advertisements with computer software
US5446919A (en) 1990-02-20 1995-08-29 Wilkins; Jeff K. Communication system and method with demographically or psychographically defined audiences
US5319455A (en) 1990-09-28 1994-06-07 Ictv Inc. System for distributing customized commercials to television viewers
US5305195A (en) 1992-03-25 1994-04-19 Gerald Singer Interactive advertising system for on-line terminals
WO1995012176A2 (en) 1993-10-29 1995-05-04 Keithley Ronald D Interactive multimedia communications system which accesses industry-specific information
AU2273895A (en) 1994-03-23 1996-10-16 Futurevision Of America Corp. Interactive advertising system and device
US5608446A (en) * 1994-03-31 1997-03-04 Lucent Technologies Inc. Apparatus and method for combining high bandwidth and low bandwidth data transfer
US5636346A (en) 1994-05-09 1997-06-03 The Electronic Address, Inc. Method and system for selectively targeting advertisements and programming
US5724521A (en) 1994-11-03 1998-03-03 Intel Corporation Method and apparatus for providing electronic advertisements to end users in a consumer best-fit pricing manner
US5717923A (en) 1994-11-03 1998-02-10 Intel Corporation Method and apparatus for dynamically customizing electronic information to individual end users
US5696965A (en) 1994-11-03 1997-12-09 Intel Corporation Electronic information appraisal agent
DE69531599T2 (en) 1994-12-20 2004-06-24 Sun Microsystems, Inc., Mountain View Method and device for finding and obtaining personalized information
US5504675A (en) 1994-12-22 1996-04-02 International Business Machines Corporation Method and apparatus for automatic selection and presentation of sales promotion programs
US5717604A (en) * 1995-05-25 1998-02-10 Wiggins; Christopher Network monitoring system for tracking, billing and recovering licenses
US5643088A (en) 1995-05-31 1997-07-01 Interactive Network, Inc. Game of skill or chance playable by remote participants in conjunction with a common game event including inserted interactive advertising
US5740549A (en) * 1995-06-12 1998-04-14 Pointcast, Inc. Information and advertising distribution system and method
JP4040117B2 (en) 1995-06-30 2008-01-30 ソニー株式会社 Game machine and game machine control method
US6026368A (en) 1995-07-17 2000-02-15 24/7 Media, Inc. On-line interactive system and method for providing content and advertising information to a targeted set of viewers
US5781894A (en) 1995-08-11 1998-07-14 Petrecca; Anthony Method and system for advertising on personal computers
US5913040A (en) 1995-08-22 1999-06-15 Backweb Ltd. Method and apparatus for transmitting and displaying information between a remote network and a local computer
US5809144A (en) * 1995-08-24 1998-09-15 Carnegie Mellon University Method and apparatus for purchasing and delivering digital goods over a network
US5737619A (en) 1995-10-19 1998-04-07 Judson; David Hugh World wide web browsing with content delivery over an idle connection and interstitial content display
US5572643A (en) 1995-10-19 1996-11-05 Judson; David H. Web browser with dynamic display of information objects during linking
US5959623A (en) 1995-12-08 1999-09-28 Sun Microsystems, Inc. System and method for displaying user selected set of advertisements
CA2240009A1 (en) 1995-12-08 1997-06-12 Bell Communications Research, Inc. Method and system for placing advertisements in a computer network
US5794210A (en) * 1995-12-11 1998-08-11 Cybergold, Inc. Attention brokerage
AU1566597A (en) 1995-12-27 1997-08-11 Gary B. Robinson Automated collaborative filtering in world wide web advertising
US5823879A (en) 1996-01-19 1998-10-20 Sheldon F. Goldberg Network gaming system
EP0877314A4 (en) 1996-01-23 2005-10-19 Global Media Online Inc Information display system
EP0955589A4 (en) 1996-02-28 2006-03-22 Global Media Online Inc Communication system for distributing such message as advertisement to user of terminal equipment
AU2230597A (en) 1996-02-28 1997-09-16 Aim Corporation Communication system for distributing such message as advertisement to user of terminal equipment
CA2247325A1 (en) 1996-02-28 1997-09-04 Aim Corporation Information providing system for providing images suitable for particular users, and terminal of information providing system
US5838790A (en) 1996-04-19 1998-11-17 Juno Online Services, L.P. Advertisement authentication system in which advertisements are downloaded for off-line display
US5848397A (en) 1996-04-19 1998-12-08 Juno Online Services, L.P. Method and apparatus for scheduling the presentation of messages to computer users
US5809242A (en) * 1996-04-19 1998-09-15 Juno Online Services, L.P. Electronic mail system for displaying advertisement at local computer received from remote system while the local computer is off-line the remote system
WO1997043724A1 (en) 1996-05-10 1997-11-20 Aim Corporation Message searching system and terminal
AU2978497A (en) 1996-06-05 1998-01-05 Aim Corporation Terminal, information providing device, system, and recording medium
US6151643A (en) 1996-06-07 2000-11-21 Networks Associates, Inc. Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer
US7225142B1 (en) 1996-08-01 2007-05-29 At&T Corp. Interactive multimedia advertising and electronic commerce on a hypertext network
US5933811A (en) * 1996-08-20 1999-08-03 Paul D. Angles System and method for delivering customized advertisements within interactive communication systems
US5721827A (en) * 1996-10-02 1998-02-24 James Logan System for electrically distributing personalized information
US5832529A (en) * 1996-10-11 1998-11-03 Sun Microsystems, Inc. Methods, apparatus, and product for distributed garbage collection
US6298218B1 (en) * 1996-12-18 2001-10-02 Clubcom, Inc. Combined advertising and entertainment system network
US5854897A (en) * 1996-12-27 1998-12-29 Quantum Systems, Inc. Network communications marketing system
US6310873B1 (en) * 1997-01-09 2001-10-30 International Business Machines Corporation Internet telephony directory server
AU5828198A (en) 1997-01-23 1998-08-26 Tggh, Inc. Method for managing a network connection
US6178453B1 (en) * 1997-02-18 2001-01-23 Netspeak Corporation Virtual circuit switching architecture
US5796952A (en) * 1997-03-21 1998-08-18 Dot Com Development, Inc. Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource database
US6009409A (en) 1997-04-02 1999-12-28 Lucent Technologies, Inc. System and method for scheduling and controlling delivery of advertising in a communications network
US5987430A (en) * 1997-08-28 1999-11-16 Atcom, Inc. Communications network connection system and method
US6085229A (en) 1998-05-14 2000-07-04 Belarc, Inc. System and method for providing client side personalization of content of web pages and the like
US6631402B1 (en) * 1997-09-26 2003-10-07 Worldcom, Inc. Integrated proxy interface for web based report requester tool set
US6119098A (en) * 1997-10-14 2000-09-12 Patrice D. Guyot System and method for targeting and distributing advertisements over a distributed network
US6009410A (en) 1997-10-16 1999-12-28 At&T Corporation Method and system for presenting customized advertising to a user on the world wide web
US6067570A (en) 1997-10-20 2000-05-23 The Delfin Project, Inc. Method and system for displaying and interacting with an informational message based on an information processing system event
US6151620A (en) * 1997-10-22 2000-11-21 Novell, Inc. Conference messaging system
US6173316B1 (en) * 1998-04-08 2001-01-09 Geoworks Corporation Wireless communication device with markup language based man-machine interface
US6279036B1 (en) * 1998-05-15 2001-08-21 International Business Machines Corporation Method and apparatus for detecting actual viewing or electronic advertisements
US6216112B1 (en) * 1998-05-27 2001-04-10 William H. Fuller Method for software distribution and compensation with replenishable advertisements
US6169542B1 (en) * 1998-12-14 2001-01-02 Gte Main Street Incorporated Method of delivering advertising through an interactive video distribution system
US6036601A (en) 1999-02-24 2000-03-14 Adaboy, Inc. Method for advertising over a computer network utilizing virtual environments of games

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
No Search *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1217560A1 (en) * 2000-12-22 2002-06-26 William Bottigelli Method of incentive delivery of interactive advertisement contents inside an internet domain characterized by user profiling
WO2002075198A1 (en) * 2001-03-15 2002-09-26 David George Stark Swivel device for hoses
WO2002089006A3 (en) * 2001-04-27 2003-06-05 Koninkl Philips Electronics Nv Electronic document with an automatically updated portion
CN100380366C (en) * 2001-04-27 2008-04-09 皇家菲利浦电子有限公司 Electronic document with automatically updated portion

Also Published As

Publication number Publication date
AU5048500A (en) 2000-12-18
US6463468B1 (en) 2002-10-08
WO2000073961A8 (en) 2002-06-06

Similar Documents

Publication Publication Date Title
US6463468B1 (en) Targeted network video download interface
US7516213B2 (en) Automatic video display on a computer
WO2000079448A2 (en) Targeted network video download interface
US6442529B1 (en) Methods and apparatus for delivering targeted information and advertising over the internet
US5845074A (en) Smart internet information delivery system having a server automatically detects and schedules data transmission based on status of clients CPU
US5854897A (en) Network communications marketing system
KR100565031B1 (en) Selection of content in response to communication environment
US9559994B2 (en) Systems and methods for previewing communications sessions
CA2306396C (en) Displaying and interacting with an informational message based on an information processing system event
KR100520251B1 (en) Method and system for enabling optional customer election of auxiliary content provided on detachable local storage media
US6766369B1 (en) Internet service error tracking
USRE42548E1 (en) Contents distributing method and contents distributing program
US7401151B2 (en) Methods and systems for providing auxiliary content during user interactivity with digital data over a network
EP0886825A2 (en) Method and apparatus for transmitting and displaying information between a remote network and a local computer
AU2008242564A1 (en) Ad serving system, apparatus and methologies used therein
WO1999009486A1 (en) Network communications managing and messaging system
US20020007419A1 (en) Internet service provider server system, method of providing data, method of advertising using moving pictures, and recording media therefor
JP2005513583A (en) E-mail software and method and system for distributing advertisements to client devices installed with such e-mail software
KR100211959B1 (en) Method of providing a demand type video service
WO2000075822A2 (en) A method and system for sponsored access to the internet by client machines
WO2000043921A9 (en) Providing displayed information during computer network connect and download times
GB2364411A (en) Content targeting and use response recording in a communications network

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

AK Designated states

Kind code of ref document: C1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: C1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

D17 Declaration under article 17(2)a
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP