US20130191219A1 - System and Method for User Generated Content in Media Advertisements - Google Patents
System and Method for User Generated Content in Media Advertisements Download PDFInfo
- Publication number
- US20130191219A1 US20130191219A1 US13/353,676 US201213353676A US2013191219A1 US 20130191219 A1 US20130191219 A1 US 20130191219A1 US 201213353676 A US201213353676 A US 201213353676A US 2013191219 A1 US2013191219 A1 US 2013191219A1
- Authority
- US
- United States
- Prior art keywords
- party
- user
- app
- request
- media
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09G—ARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
- G09G5/00—Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators
- G09G5/14—Display of multiple viewports
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
- G06Q30/0267—Wireless devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0277—Online advertisement
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T3/00—Geometric image transformations in the plane of the image
- G06T3/40—Scaling of whole images or parts thereof, e.g. expanding or contracting
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09G—ARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
- G09G2340/00—Aspects of display data processing
- G09G2340/04—Changes in size, position or resolution of an image
- G09G2340/0442—Handling or displaying different aspect ratios, or changing the aspect ratio
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09G—ARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
- G09G2370/00—Aspects of data communication
- G09G2370/02—Networking aspects
- G09G2370/027—Arrangements and methods specific for the display of internet documents
Definitions
- This disclosure relates to uploading user generated content and more specifically to systems and methods for allowing a device user to use the device's resources to upload information to a third party.
- One method for accomplishing uploads from a specific device's hidden resources is by first downloading an application (app) to the device (such as a banking app where checks can be deposited by taking a photograph of the check) and then allowing the user to snap the desired photograph of a check to be deposited.
- apps an application
- Such an arrangement requires the app to be downloaded in advance of the photograph being taken and also requires that a relationship preexist between the device user and the app supplier before the app supplier can gain access to the hidden resources.
- the present application provides systems, devices and methods which allow an app which has access to hidden resources on a device to present third party media to the device user via that app, where requests included in the third party media may gain access to hidden resources without requiring further permission by the user.
- a third party advertisement is presented to a user via an app that has been enabled by the user.
- the enabled app is pre-approved by the user and/or by any authorization organization, to access hidden resources, such as a camera, camcorder, an audio recorder, personal data, and the like. In this manner, third party requests that require access to such hidden data can control such access without requiring further action by the user.
- a request is made by an advertisement executing within an app for the device user to take photographs of him/herself and upload them to the third party.
- a request may be to upload personal information pertaining to the user, for example, information allowing the user to follow an advertiser or other third party on a social network.
- FIG. 1 shows one embodiment of the invention rendered on a mobile device
- FIG. 2 shows an example of media uploaded from a user's device being used in a commercial airing on general TV
- FIG. 3 shows one embodiment of a system for supporting the concepts of the invention
- FIG. 4 shows one embodiment of a method of supporting the system shown in FIG. 3 ;
- FIG. 5 shows one embodiment of a system for supporting another embodiment of the concepts of the invention.
- FIG. 6 shows one embodiment of a method of supporting the system shown in FIG. 5 .
- FIG. 1 shows one embodiment of the invention rendered on device 10 which has display space 12 and positioned thereon are several apps 13 - 1 to 13 -N (shown on the (A) depiction of the device).
- Device 10 can be any device that allow users to select applications for use by the user from time to time.
- device 10 may be a mobile phone, tablet device, MP3 player, and the like.
- device 10 may be implemented as a desktop computer, notebook computer, and the like.
- device 10 is a mobile device, such as a smartphone.
- Such devices have operating systems (OS) stored in memory, such as memory 10 - 1 and the operating system is run on a processor, such as processor 10 - 2 .
- Operating systems may include systems which utilize tile-based applications such as IOS, Android, and the like. Code within the OS, as well as code within each app, controls the operation of the device as well as the operation of each respective app.
- OS operating systems
- the user enters an app, such as app 13 - 2 thereby opening the app, as shown in the (B) depiction of device 10 .
- the app may be any type of app.
- app 13 - 2 is an app specializing in vehicle trends and some third party not necessarily related to the app supplier is presenting advertisement 111 showing vehicle 111 - 1 .
- the third party is running a contest in which user 120 can take a photograph or video of him/herself and upload the photograph to the third party.
- the third party will run a new advertisement showing user 120 , along with vehicle 121 , based on the uploaded image received from device 10 via camera 11 .
- Such an advertisement is shown in FIG.
- the third party in this embodiment, gains control of the hidden resources, such as the camera, via app 13 - 2 for the purposes of allowing the user to upload the desired media.
- the third party can exercise control over the uploaded media, either by human monitoring or by automatic filtering, such as is found using standard computer vision “classifiers.”
- classifiers would use, for example, the basic components of creating a training set of images including images in and not in the set of images desired; identifying visual “features” of those images (such as color and edges); applying any of a range of standard “machine learning” algorithms to “classify” the images into the “keep” or “filter out” set.
- Some such machine learning classification techniques are: “Supervised Machine Learning: A Review of Classification Techniques” by S. B. Kotsiantis in Emerging Artificial Intelligence Applications in Computer Engineering , IOS Press, 2007, which is hereby incorporated by reference herein.
- the image processing system will remove unwanted items from a photograph, or block a photograph, under certain situations.
- the advertisement asks for anybody owning a Jaguar to take a picture of the proud owner standing beside his automobile. Someone then takes a photograph of himself beside a truck and the system, if desired, will automatically reject the picture.
- the technology that allows the advertisement to control the hidden assets is two-fold.
- HTML which is not typically used in advertisements
- an app app 13 - 2 in our example
- Javascript Javascript combined with the HTML code
- FIG. 3 shows one embodiment 30 of a system for supporting the concepts of the invention.
- app server 33 controls app 13 - 2 (and any number of other apps), downloads via network 32 an app to a specific mobile device, such as to device 10 .
- the app must be pre-certified by a certification entity, and as part of that certification, the app is allowed to have access to (and control over) at least some of the hidden resources on the device such as a camera, stored information, and the like.
- the user must specifically allow the app to have access to (and control over) one or more of the hidden resources.
- one or more third parties via third party server 31 , has a relationship with app server 33 such that content from third party server 31 will flow over connection 330 and via network 32 and over connection 331 to app server 33 and then via app server 33 via network 32 and connection 332 to app 13 - 2 on device 10 .
- information may flow between third party server 31 , app server 33 and device 10 in any manner, order or direction, which will be generally dictated by the app.
- third party server may send data directly to device 10 under control of the app executing on the device.
- network 32 represents one or more networks that would be used in this embodiment, including without limitation, cellular, wireline, WiFi, 3G, etc.
- third party server 31 is an advertisement server and operates to send an appropriate advertisement for display on device 10 when the user at device 10 accesses app 13 - 2 .
- the user at device 10 does not seek the advertisement from the third party but it is presented as part of the operation of app 13 - 2 even though the app is not specifically designed to deliver just this one advertisement or any advertisement.
- the HTML code used to control the hidden resources of device 10 is code resident in app 13 - 2 and does not necessarily need to be inserted into the advertisement from server 31 . In this manner, permission to use the hidden resource need be given only once (to app 13 - 2 ) and not every time a third party advertisement is downloaded to device 10 . Also, in some situations, such as when utilizing Apple® devices, where apps must be certified or approved, the approval of app 13 - 2 serves to allow third parties (server 31 in this example) to use the already approved code of another party's (server 33 in this example) app to control device 10 .
- a native mobile application on device 10 provides hardware access capabilities to the resources, including the hidden resources. This includes the ability to control the taking of photographs.
- the native application also has the ability to display an embedded web page and has the ability to enable that embedded web page to access the native photograph taking capability that it provides. So when an advertisement comes from server 31 (or from any other server authorized by server 33 ) the HTML page which can be downloaded and provided externally can thus take advantage of the native hardware on the phone, for example taking a picture which otherwise would not be available to standard HTML.
- the advertisement from server 31 need not, in some embodiments, pass through server 33 , but can be delivered directly to device 10 provided that the advertisement is delivered to app 13 - 2 such that the code (HTML code in this embodiment) can be used with the native mobile application to control the hidden resources on device 10 .
- This then allows the web browser code of app 13 - 2 to act as the control of the mobile device as opposed to allowing the code in the web browser of the advertisement from server 31 to control the mobile device application which it could not generally accomplish.
- FIG. 4 shows one embodiment 40 of a method of supporting the system shown in FIG. 3 .
- the processes of the embodiments shown in this disclosure are controlled by code running in, for example, one or more processors 31 - 2 , processors 33 - 2 and 10 - 2 .
- Process 401 determines if app 13 - 2 is currently in use on device 10 . If not, normal device 10 operations continue as controlled by process 402 . If so, then process 403 determines if camera usage has been enabled (desired) by app 13 - 2 which app already has the necessary approvals of device 10 's user and, if necessary, an approval agency (Apple®, etc).
- the desire to enable the camera (a hidden resource) comes from, in this example, a communication from advertisement 111 ( FIG. 1 ) under control of third party server 31 .
- Process 403 upon receipt of a valid request for enabling a hidden resource, causes process 44 to enable the device via the above-described mobile device application.
- Process 405 then controls the use of the hidden resource and when the resource has been used causes process 406 to send the results of the resource use (photograph, video, audio, etc.) to a third party, e.g. to third party server 31 .
- the photograph is sent with no action required by the user other than to snap the photograph using the built-in camera on the device. This communication can be made directly to server 31 or via one or more intermediary servers.
- FIG. 5 shows one embodiment 50 of a system for supporting another embodiment utilizing the concepts of the invention.
- social network server 51 is added to the system shown in FIG. 3 .
- Server 51 can be used with or without server 31 and operates as does server 31 as a third party server in conjunction with one or more apps, such as app 13 - 2 , via app server 33 .
- banner 501 is caused to be displayed, either under control of code from app 13 - 2 or under control of code from a third party advertisement.
- Banner 501 in this embodiment, represents a specific social network (such as Facebook®, Twitter®, etc.). If the user enables (usually by touching) banner 501 , code controlled by app 13 - 2 accesses a database maintained by app 13 - 2 to retrieve the specific user login information (typically user name and password) and forwards that information to the appropriate social network under control of app 13 - 2 .
- banner 501 represents a selection to follow material related to the contents of the app via a social network site.
- the specific user login information can be located, for example, in memory 10 - 1 on device 10 and accessed (as a hidden resource) by app 13 - 2 and not by the third party directly, or the login information could be located in memory 33 - 1 in association with app 13 - 2 on server 33 .
- access of social network server 51 may be done by validating login information with social network server 51 via a social networking application programming interface (API), such as a web service.
- API application programming interface
- Login information may be accessed from storage and provided to the social networking API.
- the first request to the social network server will require the user to log in. Thereafter, subsequent requests may send and receive information to social network server 51 utilizing the previously provided login without navigating away from app 13 - 2 .
- FIG. 6 shows one embodiment 60 of a method of supporting the system shown in FIG. 5 .
- Processes 401 - 406 are described with respect to FIG. 4 and will not be repeated.
- Process 601 determines if a valid third party request, such as for FOLLOWING on a social network has been received and displayed on device 10 .
- a valid third party request such as for FOLLOWING on a social network
- this request is for following or joining a social network.
- the enablement of the request involves sending the third party hidden data
- the concepts discussed herein could also extend to other hidden data and functions , such as credit card, passwords, medical information, or other personal information.
- Using credit card data would allow a user to shop in a one-click mode on sites that the user has not pre-registered with. These sites can be websites or even perhaps restaurants when the bill is presented.
- the operation is through a pre-accepted app, such as app 13 - 2 and the data to be released to a third party via that app
- process 602 determines if the user has enabled the request, for example, by tapping display button 501 ( FIG. 5 ). Once the user enables the request, process 603 obtains the hidden data necessary to satisfy the request. This hidden data can be user name and password, credit card data, or the like. As discussed above, this data can be stored on device 10 or at a remote location accessible under control of server 33 on behalf of app 13 - 2 . Process 604 determines if the proper response data has been gathered and, if so, process 605 delivers the response data to the proper third party location.
- the third party request could at times be a multiple request, such as for different social networks, or for a combination of different operations.
- the user may wish to buy a product from company X that has advertised to the user via app 13 - 2 .
- the user then could click on a BUY button (not shown) and could also click on a FOLLOW button, such that his/her purchase can be both facilitated and posted on the social network concurrently.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Game Theory and Decision Science (AREA)
- General Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
- This disclosure relates to uploading user generated content and more specifically to systems and methods for allowing a device user to use the device's resources to upload information to a third party.
- It is now common for devices, particularly mobile devices, to have device resources, such as cameras, recording equipment, and the like, built into the device. These resources are controlled by the device's operating system which is designed such that some of the resources (herein called the hidden resources) are always under the control of the device user. For example, it would not be practical if a remote party could, from time to time, turn the device's camera (a hidden resource) on remotely even when the device user and the remote party are in communication with each other. Thus, in situations where the device user is viewing a website of some third party it is not possible for such third party to gain access to the hidden resources of the device and thus it is not currently possible to easily upload information from the hidden resources to the third party.
- One method for accomplishing uploads from a specific device's hidden resources is by first downloading an application (app) to the device (such as a banking app where checks can be deposited by taking a photograph of the check) and then allowing the user to snap the desired photograph of a check to be deposited. Such an arrangement requires the app to be downloaded in advance of the photograph being taken and also requires that a relationship preexist between the device user and the app supplier before the app supplier can gain access to the hidden resources.
- The present application provides systems, devices and methods which allow an app which has access to hidden resources on a device to present third party media to the device user via that app, where requests included in the third party media may gain access to hidden resources without requiring further permission by the user. In one embodiment, a third party advertisement is presented to a user via an app that has been enabled by the user. The enabled app is pre-approved by the user and/or by any authorization organization, to access hidden resources, such as a camera, camcorder, an audio recorder, personal data, and the like. In this manner, third party requests that require access to such hidden data can control such access without requiring further action by the user.
- In one embodiment, a request is made by an advertisement executing within an app for the device user to take photographs of him/herself and upload them to the third party. In another embodiment, a request may be to upload personal information pertaining to the user, for example, information allowing the user to follow an advertiser or other third party on a social network.
- The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention.
- For a more complete understanding of the present invention, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
-
FIG. 1 shows one embodiment of the invention rendered on a mobile device; -
FIG. 2 shows an example of media uploaded from a user's device being used in a commercial airing on general TV; -
FIG. 3 shows one embodiment of a system for supporting the concepts of the invention; -
FIG. 4 shows one embodiment of a method of supporting the system shown inFIG. 3 ; -
FIG. 5 shows one embodiment of a system for supporting another embodiment of the concepts of the invention; and -
FIG. 6 shows one embodiment of a method of supporting the system shown inFIG. 5 . -
FIG. 1 shows one embodiment of the invention rendered ondevice 10 which has displayspace 12 and positioned thereon are several apps 13-1 to 13-N (shown on the (A) depiction of the device).Device 10 can be any device that allow users to select applications for use by the user from time to time. For example,device 10 may be a mobile phone, tablet device, MP3 player, and the like. Further,device 10 may be implemented as a desktop computer, notebook computer, and the like. As illustrated inFIG. 1 ,device 10 is a mobile device, such as a smartphone. Such devices have operating systems (OS) stored in memory, such as memory 10-1 and the operating system is run on a processor, such as processor 10-2. Operating systems may include systems which utilize tile-based applications such as IOS, Android, and the like. Code within the OS, as well as code within each app, controls the operation of the device as well as the operation of each respective app. - Conceptually, the user enters an app, such as app 13-2 thereby opening the app, as shown in the (B) depiction of
device 10. The app may be any type of app. In this embodiment, app 13-2 is an app specializing in vehicle trends and some third party not necessarily related to the app supplier is presentingadvertisement 111 showing vehicle 111-1. For an example illustration of the functionality of an embodiment, assume that the third party is running a contest in whichuser 120 can take a photograph or video of him/herself and upload the photograph to the third party. Possibly, the third party will run a newadvertisement showing user 120, along withvehicle 121, based on the uploaded image received fromdevice 10 viacamera 11. Such an advertisement is shown inFIG. 2 airing on TV 21 and featuringuser 120 and hiscar 121, all as uploaded viacamera 11 ofdevice 10 under control of a third party. The third party, in this embodiment, gains control of the hidden resources, such as the camera, via app 13-2 for the purposes of allowing the user to upload the desired media. As will be discussed, the third party can exercise control over the uploaded media, either by human monitoring or by automatic filtering, such as is found using standard computer vision “classifiers.” These classifiers would use, for example, the basic components of creating a training set of images including images in and not in the set of images desired; identifying visual “features” of those images (such as color and edges); applying any of a range of standard “machine learning” algorithms to “classify” the images into the “keep” or “filter out” set. Some such machine learning classification techniques are: “Supervised Machine Learning: A Review of Classification Techniques” by S. B. Kotsiantis in Emerging Artificial Intelligence Applications in Computer Engineering, IOS Press, 2007, which is hereby incorporated by reference herein. - In one embodiment, the image processing system will remove unwanted items from a photograph, or block a photograph, under certain situations. Thus, assume the advertisement asks for anybody owning a Jaguar to take a picture of the proud owner standing beside his automobile. Someone then takes a photograph of himself beside a truck and the system, if desired, will automatically reject the picture.
- In one embodiment, the technology that allows the advertisement to control the hidden assets is two-fold. First it is the use of, for example, HTML (which is not typically used in advertisements) in combination with allowing the HTML to flow though an app (app 13-2 in our example) which app already is in privy with the device user such that the app has already received user permission to enable or otherwise use the desired hidden resource. It is noted that while the above embodiment utilizes HTML, embodiments may also use other languages such as Javascript, or Javascript combined with the HTML code, to implement inventive concepts outlined herein.
-
FIG. 3 shows oneembodiment 30 of a system for supporting the concepts of the invention. As shown,app server 33 controls app 13-2 (and any number of other apps), downloads vianetwork 32 an app to a specific mobile device, such as todevice 10. In some situations, the app must be pre-certified by a certification entity, and as part of that certification, the app is allowed to have access to (and control over) at least some of the hidden resources on the device such as a camera, stored information, and the like. In other cases, the user must specifically allow the app to have access to (and control over) one or more of the hidden resources. - In one embodiment, one or more third parties, via
third party server 31, has a relationship withapp server 33 such that content fromthird party server 31 will flow overconnection 330 and vianetwork 32 and overconnection 331 toapp server 33 and then viaapp server 33 vianetwork 32 andconnection 332 to app 13-2 ondevice 10. It is noted that information may flow betweenthird party server 31,app server 33 anddevice 10 in any manner, order or direction, which will be generally dictated by the app. For example, third party server may send data directly todevice 10 under control of the app executing on the device. It is further noted thatnetwork 32 represents one or more networks that would be used in this embodiment, including without limitation, cellular, wireline, WiFi, 3G, etc. In the operational example discussed above,third party server 31 is an advertisement server and operates to send an appropriate advertisement for display ondevice 10 when the user atdevice 10 accesses app 13-2. In this embodiment, the user atdevice 10 does not seek the advertisement from the third party but it is presented as part of the operation of app 13-2 even though the app is not specifically designed to deliver just this one advertisement or any advertisement. - Note that the HTML code used to control the hidden resources of
device 10 is code resident in app 13-2 and does not necessarily need to be inserted into the advertisement fromserver 31. In this manner, permission to use the hidden resource need be given only once (to app 13-2) and not every time a third party advertisement is downloaded todevice 10. Also, in some situations, such as when utilizing Apple® devices, where apps must be certified or approved, the approval of app 13-2 serves to allow third parties (server 31 in this example) to use the already approved code of another party's (server 33 in this example) app to controldevice 10. - In one embodiment, a native mobile application on
device 10 provides hardware access capabilities to the resources, including the hidden resources. This includes the ability to control the taking of photographs. The native application also has the ability to display an embedded web page and has the ability to enable that embedded web page to access the native photograph taking capability that it provides. So when an advertisement comes from server 31 (or from any other server authorized by server 33) the HTML page which can be downloaded and provided externally can thus take advantage of the native hardware on the phone, for example taking a picture which otherwise would not be available to standard HTML. Note that the advertisement fromserver 31 need not, in some embodiments, pass throughserver 33, but can be delivered directly todevice 10 provided that the advertisement is delivered to app 13-2 such that the code (HTML code in this embodiment) can be used with the native mobile application to control the hidden resources ondevice 10. This then allows the web browser code of app 13-2 to act as the control of the mobile device as opposed to allowing the code in the web browser of the advertisement fromserver 31 to control the mobile device application which it could not generally accomplish. -
FIG. 4 shows oneembodiment 40 of a method of supporting the system shown inFIG. 3 . The processes of the embodiments shown in this disclosure are controlled by code running in, for example, one or more processors 31-2, processors 33-2 and 10-2.Process 401 determines if app 13-2 is currently in use ondevice 10. If not,normal device 10 operations continue as controlled byprocess 402. If so, then process 403 determines if camera usage has been enabled (desired) by app 13-2 which app already has the necessary approvals ofdevice 10's user and, if necessary, an approval agency (Apple®, etc). The desire to enable the camera (a hidden resource) comes from, in this example, a communication from advertisement 111 (FIG. 1 ) under control ofthird party server 31.Process 403, upon receipt of a valid request for enabling a hidden resource, causes process 44 to enable the device via the above-described mobile device application. -
Process 405 then controls the use of the hidden resource and when the resource has been usedcauses process 406 to send the results of the resource use (photograph, video, audio, etc.) to a third party, e.g. tothird party server 31. In one embodiment, the photograph is sent with no action required by the user other than to snap the photograph using the built-in camera on the device. This communication can be made directly toserver 31 or via one or more intermediary servers. -
FIG. 5 shows oneembodiment 50 of a system for supporting another embodiment utilizing the concepts of the invention. In this embodiment,social network server 51 is added to the system shown inFIG. 3 .Server 51 can be used with or withoutserver 31 and operates as doesserver 31 as a third party server in conjunction with one or more apps, such as app 13-2, viaapp server 33. - In operation, when app 13-2 is active (or when a specific third party advertisement is presented to the user via app 13-2)
banner 501 is caused to be displayed, either under control of code from app 13-2 or under control of code from a third party advertisement.Banner 501 in this embodiment, represents a specific social network (such as Facebook®, Twitter®, etc.). If the user enables (usually by touching)banner 501, code controlled by app 13-2 accesses a database maintained by app 13-2 to retrieve the specific user login information (typically user name and password) and forwards that information to the appropriate social network under control of app 13-2. In the illustratedembodiment banner 501 represents a selection to follow material related to the contents of the app via a social network site. Note that the “following” and “shown bydisplay 501” is not a following of app 13-2 in this embodiment, but rather of the third party that is currently being displayed via app 13-2. However, in other embodiments content ofbanner 501, e.g. the social network follow request, may be directly related to the content of app 13-2 and embodiments will process the social network access in a similar manner. - Use of this arrangement then is in substitution for requiring the user at
device 10 to manually enable his/her login information for each specific social network which would normally cause the user to navigate away from the app 13-2 either to a web browser or a different app related to the relevant social network. The specific user login information can be located, for example, in memory 10-1 ondevice 10 and accessed (as a hidden resource) by app 13-2 and not by the third party directly, or the login information could be located in memory 33-1 in association with app 13-2 onserver 33. - In some embodiments, access of
social network server 51, such as after making a follow request, may be done by validating login information withsocial network server 51 via a social networking application programming interface (API), such as a web service. Login information may be accessed from storage and provided to the social networking API. Additionally, in some embodiments, the first request to the social network server will require the user to log in. Thereafter, subsequent requests may send and receive information tosocial network server 51 utilizing the previously provided login without navigating away from app 13-2. -
FIG. 6 shows oneembodiment 60 of a method of supporting the system shown inFIG. 5 . Processes 401-406 are described with respect toFIG. 4 and will not be repeated.Process 601 determines if a valid third party request, such as for FOLLOWING on a social network has been received and displayed ondevice 10. Note that in the embodiment being discussed this request is for following or joining a social network. But, as will be discussed, since the enablement of the request involves sending the third party hidden data, the concepts discussed herein could also extend to other hidden data and functions , such as credit card, passwords, medical information, or other personal information. Using credit card data would allow a user to shop in a one-click mode on sites that the user has not pre-registered with. These sites can be websites or even perhaps restaurants when the bill is presented. As will be discussed, the operation is through a pre-accepted app, such as app 13-2 and the data to be released to a third party via that app has been pre-approved by the user. - If
process 601 determines that a valid third party request has been received, then process 602 determines if the user has enabled the request, for example, by tapping display button 501 (FIG. 5 ). Once the user enables the request,process 603 obtains the hidden data necessary to satisfy the request. This hidden data can be user name and password, credit card data, or the like. As discussed above, this data can be stored ondevice 10 or at a remote location accessible under control ofserver 33 on behalf of app 13-2.Process 604 determines if the proper response data has been gathered and, if so,process 605 delivers the response data to the proper third party location. - Note that the third party request could at times be a multiple request, such as for different social networks, or for a combination of different operations. For example, the user may wish to buy a product from company X that has advertised to the user via app 13-2. The user then could click on a BUY button (not shown) and could also click on a FOLLOW button, such that his/her purchase can be both facilitated and posted on the social network concurrently.
- Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
Claims (24)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/353,676 US20130191219A1 (en) | 2012-01-19 | 2012-01-19 | System and Method for User Generated Content in Media Advertisements |
US13/462,680 US9484002B2 (en) | 2012-01-19 | 2012-05-02 | System and method for adaptive and persistent media presentations |
US15/332,953 US9997138B2 (en) | 2012-01-19 | 2016-10-24 | System and method for adaptive and persistent media presentations |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/353,676 US20130191219A1 (en) | 2012-01-19 | 2012-01-19 | System and Method for User Generated Content in Media Advertisements |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130191219A1 true US20130191219A1 (en) | 2013-07-25 |
Family
ID=48798008
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/353,676 Abandoned US20130191219A1 (en) | 2012-01-19 | 2012-01-19 | System and Method for User Generated Content in Media Advertisements |
US13/462,680 Active 2034-11-07 US9484002B2 (en) | 2012-01-19 | 2012-05-02 | System and method for adaptive and persistent media presentations |
US15/332,953 Active US9997138B2 (en) | 2012-01-19 | 2016-10-24 | System and method for adaptive and persistent media presentations |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/462,680 Active 2034-11-07 US9484002B2 (en) | 2012-01-19 | 2012-05-02 | System and method for adaptive and persistent media presentations |
US15/332,953 Active US9997138B2 (en) | 2012-01-19 | 2016-10-24 | System and method for adaptive and persistent media presentations |
Country Status (1)
Country | Link |
---|---|
US (3) | US20130191219A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150235048A1 (en) * | 2014-02-17 | 2015-08-20 | Sangeetha Balusu | Systems and methods for enhanced mobile photography |
US12086840B2 (en) * | 2018-10-09 | 2024-09-10 | Ebay Inc. | Generating personalized banner images using machine learning |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11250217B1 (en) * | 2015-07-14 | 2022-02-15 | Soundhound, Inc. | Conditional responses to application commands in a client-server system |
EP3701473B1 (en) * | 2017-10-24 | 2024-08-28 | A.C.N. 629 573 093 Pty. Ltd. | A system for improved digital advertising display device proof-of-play data logging |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030047602A1 (en) * | 1997-10-16 | 2003-03-13 | Takahito Iida | System for granting permission of user's personal information to third party |
US7151772B1 (en) * | 1996-11-08 | 2006-12-19 | At&T Corp. | Method for performing lawfully-authorized electronic surveillance |
US20080270038A1 (en) * | 2007-04-24 | 2008-10-30 | Hadi Partovi | System, apparatus and method for determining compatibility between members of a social network |
US20090044235A1 (en) * | 2007-08-07 | 2009-02-12 | Davidson Daniel L | Method and system for on-line content acquisition and distribution |
US20090165123A1 (en) * | 2007-12-19 | 2009-06-25 | Giobbi John J | Security system and method for controlling access to computing resources |
US7634571B2 (en) * | 2000-05-26 | 2009-12-15 | Pearl Software, Inc. | Method of remotely monitoring an internet session |
US7831469B2 (en) * | 2003-04-03 | 2010-11-09 | International Business Machines Corporation | Verifying audio output at a client device |
US20110295667A1 (en) * | 2010-06-01 | 2011-12-01 | David Butler | Interactive advertising System |
US20120023556A1 (en) * | 2010-07-23 | 2012-01-26 | Verizon Patent And Licensing Inc. | Identity management and single sign-on in a heterogeneous composite service scenario |
US20120317565A1 (en) * | 2011-06-07 | 2012-12-13 | Research In Motion Limited | Methods and devices for controlling access to computing resources |
US20130019296A1 (en) * | 2011-07-15 | 2013-01-17 | Brandenburg John C | Methods and systems for processing ad server transactions for internet advertising |
US8527340B2 (en) * | 2011-03-07 | 2013-09-03 | Kba2, Inc. | Systems and methods for analytic data gathering from image providers at an event or geographic location |
US8615443B2 (en) * | 2005-04-15 | 2013-12-24 | Clifford R. David | Interactive image activation and distribution system and associated methods |
US20140095638A1 (en) * | 2012-07-09 | 2014-04-03 | Tencent Technology (Shenzhen) Company Limited | Method of supporting third-party applications in an instant messaging system and a system using the same |
US8812607B2 (en) * | 2010-08-23 | 2014-08-19 | Maxxess Systems, Inc. | Private mobile messaging and data communications apparatus and method of managing organizational messaging |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9105032B2 (en) * | 2007-05-03 | 2015-08-11 | Yellowpages.Com Llc | Systems and methods to provide advertisements for real time communications |
US20070255616A1 (en) * | 2006-04-27 | 2007-11-01 | Microsoft Corporation | Techniques for authoring ads for dynamic layout environments |
US20080306824A1 (en) * | 2007-06-08 | 2008-12-11 | Parkinson David C | Empty Space Advertising Engine |
US8255491B1 (en) * | 2008-01-28 | 2012-08-28 | Comscore, Inc. | Determining a particular type of wireless device to be emulated |
US8645858B2 (en) * | 2008-09-12 | 2014-02-04 | Koninklijke Philips N.V. | Navigating in graphical user interface on handheld devices |
US20110134143A1 (en) * | 2009-12-04 | 2011-06-09 | Samsung Electronics Co., Ltd. | Method and apparatus for display screen reorientation |
US9911141B2 (en) * | 2010-08-01 | 2018-03-06 | Hewlett-Packard Development Company, L.P. | Contextual advertisements within mixed-content page layout model |
US20130019150A1 (en) * | 2011-07-13 | 2013-01-17 | Rony Zarom | System and method for automatic and dynamic layout design for media broadcast |
US9032292B2 (en) * | 2012-01-19 | 2015-05-12 | Blackberry Limited | Simultaneous display of multiple maximized applications on touch screen electronic devices |
-
2012
- 2012-01-19 US US13/353,676 patent/US20130191219A1/en not_active Abandoned
- 2012-05-02 US US13/462,680 patent/US9484002B2/en active Active
-
2016
- 2016-10-24 US US15/332,953 patent/US9997138B2/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7151772B1 (en) * | 1996-11-08 | 2006-12-19 | At&T Corp. | Method for performing lawfully-authorized electronic surveillance |
US20030047602A1 (en) * | 1997-10-16 | 2003-03-13 | Takahito Iida | System for granting permission of user's personal information to third party |
US7634571B2 (en) * | 2000-05-26 | 2009-12-15 | Pearl Software, Inc. | Method of remotely monitoring an internet session |
US7831469B2 (en) * | 2003-04-03 | 2010-11-09 | International Business Machines Corporation | Verifying audio output at a client device |
US8615443B2 (en) * | 2005-04-15 | 2013-12-24 | Clifford R. David | Interactive image activation and distribution system and associated methods |
US20080270038A1 (en) * | 2007-04-24 | 2008-10-30 | Hadi Partovi | System, apparatus and method for determining compatibility between members of a social network |
US20090044235A1 (en) * | 2007-08-07 | 2009-02-12 | Davidson Daniel L | Method and system for on-line content acquisition and distribution |
US20090165123A1 (en) * | 2007-12-19 | 2009-06-25 | Giobbi John J | Security system and method for controlling access to computing resources |
US20110295667A1 (en) * | 2010-06-01 | 2011-12-01 | David Butler | Interactive advertising System |
US20120023556A1 (en) * | 2010-07-23 | 2012-01-26 | Verizon Patent And Licensing Inc. | Identity management and single sign-on in a heterogeneous composite service scenario |
US8812607B2 (en) * | 2010-08-23 | 2014-08-19 | Maxxess Systems, Inc. | Private mobile messaging and data communications apparatus and method of managing organizational messaging |
US8527340B2 (en) * | 2011-03-07 | 2013-09-03 | Kba2, Inc. | Systems and methods for analytic data gathering from image providers at an event or geographic location |
US20120317565A1 (en) * | 2011-06-07 | 2012-12-13 | Research In Motion Limited | Methods and devices for controlling access to computing resources |
US20130019296A1 (en) * | 2011-07-15 | 2013-01-17 | Brandenburg John C | Methods and systems for processing ad server transactions for internet advertising |
US20140095638A1 (en) * | 2012-07-09 | 2014-04-03 | Tencent Technology (Shenzhen) Company Limited | Method of supporting third-party applications in an instant messaging system and a system using the same |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150235048A1 (en) * | 2014-02-17 | 2015-08-20 | Sangeetha Balusu | Systems and methods for enhanced mobile photography |
US9171181B2 (en) * | 2014-02-17 | 2015-10-27 | Sangeetha Balusu | Systems and methods for enhanced mobile photography |
US12086840B2 (en) * | 2018-10-09 | 2024-09-10 | Ebay Inc. | Generating personalized banner images using machine learning |
Also Published As
Publication number | Publication date |
---|---|
US20170040000A1 (en) | 2017-02-09 |
US9997138B2 (en) | 2018-06-12 |
US20130293587A1 (en) | 2013-11-07 |
US9484002B2 (en) | 2016-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10432693B2 (en) | System, method and computer program for signing and dedicating information objects | |
US10848687B2 (en) | Modifying presentation of video data by a receiving client device based on analysis of the video data by another client device capturing the video data | |
US20190266588A1 (en) | Generation and exchange of custom self-recorded multimedia | |
US11558543B2 (en) | Modifying capture of video data by an image capture device based on video data previously captured by the image capture device | |
US10757347B1 (en) | Modifying display of an overlay on video data based on locations of regions of interest within the video data | |
US10805521B2 (en) | Modifying capture of video data by an image capture device based on video data previously captured by the image capture device | |
US10372882B2 (en) | Media distribution network, associated program products, and methods of using the same | |
JP7258857B2 (en) | Modification of video data capture by the imaging device based on video data previously captured by the imaging device | |
US11985388B2 (en) | Methods and systems for seamlessly transporting objects between connected devices for electronic transactions | |
WO2016116599A1 (en) | User controlled profiles | |
US10915776B2 (en) | Modifying capture of video data by an image capture device based on identifying an object of interest within capturted video data to the image capture device | |
US20130191219A1 (en) | System and Method for User Generated Content in Media Advertisements | |
US11418827B2 (en) | Generating a feed of content for presentation by a client device to users identified in video data captured by the client device | |
US10721394B1 (en) | Gesture activation for an image capture device | |
US10666857B2 (en) | Modifying capture of video data by an image capture device based on video data previously captured by the image capture device | |
US11444943B1 (en) | Exchange content between client devices when a client device determines a user is within a field of view of an image capture device of the client device and authorized to exchange content | |
US10812616B2 (en) | Transferring an exchange of content to a receiving client device from a client device authorized to transfer a content exchange to the receiving client device | |
US20230334864A1 (en) | Presenting messages to a user when a client device determines the user is within a field of view of an image capture device of the client device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ZUMOBI, INC., WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SANGIOVANNI, JOHN;BEDERSON, BENJAMIN B.;HOUSE, SEAN;AND OTHERS;SIGNING DATES FROM 20120112 TO 20120117;REEL/FRAME:027703/0521 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNOR:ZUMOBI, INC.;REEL/FRAME:032448/0531 Effective date: 20140228 |
|
AS | Assignment |
Owner name: ZUMOBI, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:033814/0079 Effective date: 20140923 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNOR:ZUMOBI, INC.;REEL/FRAME:034213/0906 Effective date: 20140228 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |