[go: up one dir, main page]

US20130191219A1 - System and Method for User Generated Content in Media Advertisements - Google Patents

System and Method for User Generated Content in Media Advertisements Download PDF

Info

Publication number
US20130191219A1
US20130191219A1 US13/353,676 US201213353676A US2013191219A1 US 20130191219 A1 US20130191219 A1 US 20130191219A1 US 201213353676 A US201213353676 A US 201213353676A US 2013191219 A1 US2013191219 A1 US 2013191219A1
Authority
US
United States
Prior art keywords
party
user
app
request
media
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/353,676
Inventor
John SanGiovanni
Benjamin B. Bederson
Sean House
Andrew Donovan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zumobi LLC
Original Assignee
Zumobi LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zumobi LLC filed Critical Zumobi LLC
Priority to US13/353,676 priority Critical patent/US20130191219A1/en
Assigned to ZUMOBI, INC. reassignment ZUMOBI, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DONOVAN, ANDREW, HOUSE, SEAN, BEDERSON, BENJAMIN B., SANGIOVANNI, JOHN
Priority to US13/462,680 priority patent/US9484002B2/en
Publication of US20130191219A1 publication Critical patent/US20130191219A1/en
Assigned to SILICON VALLEY BANK reassignment SILICON VALLEY BANK SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ZUMOBI, INC.
Assigned to ZUMOBI, INC. reassignment ZUMOBI, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: SILICON VALLEY BANK
Assigned to SILICON VALLEY BANK reassignment SILICON VALLEY BANK SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ZUMOBI, INC.
Priority to US15/332,953 priority patent/US9997138B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09GARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
    • G09G5/00Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators
    • G09G5/14Display of multiple viewports
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0267Wireless devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T3/00Geometric image transformations in the plane of the image
    • G06T3/40Scaling of whole images or parts thereof, e.g. expanding or contracting
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09GARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
    • G09G2340/00Aspects of display data processing
    • G09G2340/04Changes in size, position or resolution of an image
    • G09G2340/0442Handling or displaying different aspect ratios, or changing the aspect ratio
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09GARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
    • G09G2370/00Aspects of data communication
    • G09G2370/02Networking aspects
    • G09G2370/027Arrangements and methods specific for the display of internet documents

Definitions

  • This disclosure relates to uploading user generated content and more specifically to systems and methods for allowing a device user to use the device's resources to upload information to a third party.
  • One method for accomplishing uploads from a specific device's hidden resources is by first downloading an application (app) to the device (such as a banking app where checks can be deposited by taking a photograph of the check) and then allowing the user to snap the desired photograph of a check to be deposited.
  • apps an application
  • Such an arrangement requires the app to be downloaded in advance of the photograph being taken and also requires that a relationship preexist between the device user and the app supplier before the app supplier can gain access to the hidden resources.
  • the present application provides systems, devices and methods which allow an app which has access to hidden resources on a device to present third party media to the device user via that app, where requests included in the third party media may gain access to hidden resources without requiring further permission by the user.
  • a third party advertisement is presented to a user via an app that has been enabled by the user.
  • the enabled app is pre-approved by the user and/or by any authorization organization, to access hidden resources, such as a camera, camcorder, an audio recorder, personal data, and the like. In this manner, third party requests that require access to such hidden data can control such access without requiring further action by the user.
  • a request is made by an advertisement executing within an app for the device user to take photographs of him/herself and upload them to the third party.
  • a request may be to upload personal information pertaining to the user, for example, information allowing the user to follow an advertiser or other third party on a social network.
  • FIG. 1 shows one embodiment of the invention rendered on a mobile device
  • FIG. 2 shows an example of media uploaded from a user's device being used in a commercial airing on general TV
  • FIG. 3 shows one embodiment of a system for supporting the concepts of the invention
  • FIG. 4 shows one embodiment of a method of supporting the system shown in FIG. 3 ;
  • FIG. 5 shows one embodiment of a system for supporting another embodiment of the concepts of the invention.
  • FIG. 6 shows one embodiment of a method of supporting the system shown in FIG. 5 .
  • FIG. 1 shows one embodiment of the invention rendered on device 10 which has display space 12 and positioned thereon are several apps 13 - 1 to 13 -N (shown on the (A) depiction of the device).
  • Device 10 can be any device that allow users to select applications for use by the user from time to time.
  • device 10 may be a mobile phone, tablet device, MP3 player, and the like.
  • device 10 may be implemented as a desktop computer, notebook computer, and the like.
  • device 10 is a mobile device, such as a smartphone.
  • Such devices have operating systems (OS) stored in memory, such as memory 10 - 1 and the operating system is run on a processor, such as processor 10 - 2 .
  • Operating systems may include systems which utilize tile-based applications such as IOS, Android, and the like. Code within the OS, as well as code within each app, controls the operation of the device as well as the operation of each respective app.
  • OS operating systems
  • the user enters an app, such as app 13 - 2 thereby opening the app, as shown in the (B) depiction of device 10 .
  • the app may be any type of app.
  • app 13 - 2 is an app specializing in vehicle trends and some third party not necessarily related to the app supplier is presenting advertisement 111 showing vehicle 111 - 1 .
  • the third party is running a contest in which user 120 can take a photograph or video of him/herself and upload the photograph to the third party.
  • the third party will run a new advertisement showing user 120 , along with vehicle 121 , based on the uploaded image received from device 10 via camera 11 .
  • Such an advertisement is shown in FIG.
  • the third party in this embodiment, gains control of the hidden resources, such as the camera, via app 13 - 2 for the purposes of allowing the user to upload the desired media.
  • the third party can exercise control over the uploaded media, either by human monitoring or by automatic filtering, such as is found using standard computer vision “classifiers.”
  • classifiers would use, for example, the basic components of creating a training set of images including images in and not in the set of images desired; identifying visual “features” of those images (such as color and edges); applying any of a range of standard “machine learning” algorithms to “classify” the images into the “keep” or “filter out” set.
  • Some such machine learning classification techniques are: “Supervised Machine Learning: A Review of Classification Techniques” by S. B. Kotsiantis in Emerging Artificial Intelligence Applications in Computer Engineering , IOS Press, 2007, which is hereby incorporated by reference herein.
  • the image processing system will remove unwanted items from a photograph, or block a photograph, under certain situations.
  • the advertisement asks for anybody owning a Jaguar to take a picture of the proud owner standing beside his automobile. Someone then takes a photograph of himself beside a truck and the system, if desired, will automatically reject the picture.
  • the technology that allows the advertisement to control the hidden assets is two-fold.
  • HTML which is not typically used in advertisements
  • an app app 13 - 2 in our example
  • Javascript Javascript combined with the HTML code
  • FIG. 3 shows one embodiment 30 of a system for supporting the concepts of the invention.
  • app server 33 controls app 13 - 2 (and any number of other apps), downloads via network 32 an app to a specific mobile device, such as to device 10 .
  • the app must be pre-certified by a certification entity, and as part of that certification, the app is allowed to have access to (and control over) at least some of the hidden resources on the device such as a camera, stored information, and the like.
  • the user must specifically allow the app to have access to (and control over) one or more of the hidden resources.
  • one or more third parties via third party server 31 , has a relationship with app server 33 such that content from third party server 31 will flow over connection 330 and via network 32 and over connection 331 to app server 33 and then via app server 33 via network 32 and connection 332 to app 13 - 2 on device 10 .
  • information may flow between third party server 31 , app server 33 and device 10 in any manner, order or direction, which will be generally dictated by the app.
  • third party server may send data directly to device 10 under control of the app executing on the device.
  • network 32 represents one or more networks that would be used in this embodiment, including without limitation, cellular, wireline, WiFi, 3G, etc.
  • third party server 31 is an advertisement server and operates to send an appropriate advertisement for display on device 10 when the user at device 10 accesses app 13 - 2 .
  • the user at device 10 does not seek the advertisement from the third party but it is presented as part of the operation of app 13 - 2 even though the app is not specifically designed to deliver just this one advertisement or any advertisement.
  • the HTML code used to control the hidden resources of device 10 is code resident in app 13 - 2 and does not necessarily need to be inserted into the advertisement from server 31 . In this manner, permission to use the hidden resource need be given only once (to app 13 - 2 ) and not every time a third party advertisement is downloaded to device 10 . Also, in some situations, such as when utilizing Apple® devices, where apps must be certified or approved, the approval of app 13 - 2 serves to allow third parties (server 31 in this example) to use the already approved code of another party's (server 33 in this example) app to control device 10 .
  • a native mobile application on device 10 provides hardware access capabilities to the resources, including the hidden resources. This includes the ability to control the taking of photographs.
  • the native application also has the ability to display an embedded web page and has the ability to enable that embedded web page to access the native photograph taking capability that it provides. So when an advertisement comes from server 31 (or from any other server authorized by server 33 ) the HTML page which can be downloaded and provided externally can thus take advantage of the native hardware on the phone, for example taking a picture which otherwise would not be available to standard HTML.
  • the advertisement from server 31 need not, in some embodiments, pass through server 33 , but can be delivered directly to device 10 provided that the advertisement is delivered to app 13 - 2 such that the code (HTML code in this embodiment) can be used with the native mobile application to control the hidden resources on device 10 .
  • This then allows the web browser code of app 13 - 2 to act as the control of the mobile device as opposed to allowing the code in the web browser of the advertisement from server 31 to control the mobile device application which it could not generally accomplish.
  • FIG. 4 shows one embodiment 40 of a method of supporting the system shown in FIG. 3 .
  • the processes of the embodiments shown in this disclosure are controlled by code running in, for example, one or more processors 31 - 2 , processors 33 - 2 and 10 - 2 .
  • Process 401 determines if app 13 - 2 is currently in use on device 10 . If not, normal device 10 operations continue as controlled by process 402 . If so, then process 403 determines if camera usage has been enabled (desired) by app 13 - 2 which app already has the necessary approvals of device 10 's user and, if necessary, an approval agency (Apple®, etc).
  • the desire to enable the camera (a hidden resource) comes from, in this example, a communication from advertisement 111 ( FIG. 1 ) under control of third party server 31 .
  • Process 403 upon receipt of a valid request for enabling a hidden resource, causes process 44 to enable the device via the above-described mobile device application.
  • Process 405 then controls the use of the hidden resource and when the resource has been used causes process 406 to send the results of the resource use (photograph, video, audio, etc.) to a third party, e.g. to third party server 31 .
  • the photograph is sent with no action required by the user other than to snap the photograph using the built-in camera on the device. This communication can be made directly to server 31 or via one or more intermediary servers.
  • FIG. 5 shows one embodiment 50 of a system for supporting another embodiment utilizing the concepts of the invention.
  • social network server 51 is added to the system shown in FIG. 3 .
  • Server 51 can be used with or without server 31 and operates as does server 31 as a third party server in conjunction with one or more apps, such as app 13 - 2 , via app server 33 .
  • banner 501 is caused to be displayed, either under control of code from app 13 - 2 or under control of code from a third party advertisement.
  • Banner 501 in this embodiment, represents a specific social network (such as Facebook®, Twitter®, etc.). If the user enables (usually by touching) banner 501 , code controlled by app 13 - 2 accesses a database maintained by app 13 - 2 to retrieve the specific user login information (typically user name and password) and forwards that information to the appropriate social network under control of app 13 - 2 .
  • banner 501 represents a selection to follow material related to the contents of the app via a social network site.
  • the specific user login information can be located, for example, in memory 10 - 1 on device 10 and accessed (as a hidden resource) by app 13 - 2 and not by the third party directly, or the login information could be located in memory 33 - 1 in association with app 13 - 2 on server 33 .
  • access of social network server 51 may be done by validating login information with social network server 51 via a social networking application programming interface (API), such as a web service.
  • API application programming interface
  • Login information may be accessed from storage and provided to the social networking API.
  • the first request to the social network server will require the user to log in. Thereafter, subsequent requests may send and receive information to social network server 51 utilizing the previously provided login without navigating away from app 13 - 2 .
  • FIG. 6 shows one embodiment 60 of a method of supporting the system shown in FIG. 5 .
  • Processes 401 - 406 are described with respect to FIG. 4 and will not be repeated.
  • Process 601 determines if a valid third party request, such as for FOLLOWING on a social network has been received and displayed on device 10 .
  • a valid third party request such as for FOLLOWING on a social network
  • this request is for following or joining a social network.
  • the enablement of the request involves sending the third party hidden data
  • the concepts discussed herein could also extend to other hidden data and functions , such as credit card, passwords, medical information, or other personal information.
  • Using credit card data would allow a user to shop in a one-click mode on sites that the user has not pre-registered with. These sites can be websites or even perhaps restaurants when the bill is presented.
  • the operation is through a pre-accepted app, such as app 13 - 2 and the data to be released to a third party via that app
  • process 602 determines if the user has enabled the request, for example, by tapping display button 501 ( FIG. 5 ). Once the user enables the request, process 603 obtains the hidden data necessary to satisfy the request. This hidden data can be user name and password, credit card data, or the like. As discussed above, this data can be stored on device 10 or at a remote location accessible under control of server 33 on behalf of app 13 - 2 . Process 604 determines if the proper response data has been gathered and, if so, process 605 delivers the response data to the proper third party location.
  • the third party request could at times be a multiple request, such as for different social networks, or for a combination of different operations.
  • the user may wish to buy a product from company X that has advertised to the user via app 13 - 2 .
  • the user then could click on a BUY button (not shown) and could also click on a FOLLOW button, such that his/her purchase can be both facilitated and posted on the social network concurrently.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Allowing an app having access to hidden resources on a device to present third party media to the device user via that app such that requests included in the third party media which require access to hidden resources can be fulfilled without requiring further permission by the user. In one embodiment, a third party advertisement is presented to a user via an app that has been enabled by the user. The enabled app is pre-approved by the user, and by any authorizing organization, to access hidden resources, such as camera, recorder, and personal data. In this manner, third party requests that require access to such hidden data can control such access without requiring further action by the user.

Description

    TECHNICAL FIELD
  • This disclosure relates to uploading user generated content and more specifically to systems and methods for allowing a device user to use the device's resources to upload information to a third party.
  • BACKGROUND OF THE INVENTION
  • It is now common for devices, particularly mobile devices, to have device resources, such as cameras, recording equipment, and the like, built into the device. These resources are controlled by the device's operating system which is designed such that some of the resources (herein called the hidden resources) are always under the control of the device user. For example, it would not be practical if a remote party could, from time to time, turn the device's camera (a hidden resource) on remotely even when the device user and the remote party are in communication with each other. Thus, in situations where the device user is viewing a website of some third party it is not possible for such third party to gain access to the hidden resources of the device and thus it is not currently possible to easily upload information from the hidden resources to the third party.
  • One method for accomplishing uploads from a specific device's hidden resources is by first downloading an application (app) to the device (such as a banking app where checks can be deposited by taking a photograph of the check) and then allowing the user to snap the desired photograph of a check to be deposited. Such an arrangement requires the app to be downloaded in advance of the photograph being taken and also requires that a relationship preexist between the device user and the app supplier before the app supplier can gain access to the hidden resources.
  • BRIEF SUMMARY OF THE INVENTION
  • The present application provides systems, devices and methods which allow an app which has access to hidden resources on a device to present third party media to the device user via that app, where requests included in the third party media may gain access to hidden resources without requiring further permission by the user. In one embodiment, a third party advertisement is presented to a user via an app that has been enabled by the user. The enabled app is pre-approved by the user and/or by any authorization organization, to access hidden resources, such as a camera, camcorder, an audio recorder, personal data, and the like. In this manner, third party requests that require access to such hidden data can control such access without requiring further action by the user.
  • In one embodiment, a request is made by an advertisement executing within an app for the device user to take photographs of him/herself and upload them to the third party. In another embodiment, a request may be to upload personal information pertaining to the user, for example, information allowing the user to follow an advertiser or other third party on a social network.
  • The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For a more complete understanding of the present invention, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
  • FIG. 1 shows one embodiment of the invention rendered on a mobile device;
  • FIG. 2 shows an example of media uploaded from a user's device being used in a commercial airing on general TV;
  • FIG. 3 shows one embodiment of a system for supporting the concepts of the invention;
  • FIG. 4 shows one embodiment of a method of supporting the system shown in FIG. 3;
  • FIG. 5 shows one embodiment of a system for supporting another embodiment of the concepts of the invention; and
  • FIG. 6 shows one embodiment of a method of supporting the system shown in FIG. 5.
  • DETAILED DESCRIPTION OF THE INVENTION
  • FIG. 1 shows one embodiment of the invention rendered on device 10 which has display space 12 and positioned thereon are several apps 13-1 to 13-N (shown on the (A) depiction of the device). Device 10 can be any device that allow users to select applications for use by the user from time to time. For example, device 10 may be a mobile phone, tablet device, MP3 player, and the like. Further, device 10 may be implemented as a desktop computer, notebook computer, and the like. As illustrated in FIG. 1, device 10 is a mobile device, such as a smartphone. Such devices have operating systems (OS) stored in memory, such as memory 10-1 and the operating system is run on a processor, such as processor 10-2. Operating systems may include systems which utilize tile-based applications such as IOS, Android, and the like. Code within the OS, as well as code within each app, controls the operation of the device as well as the operation of each respective app.
  • Conceptually, the user enters an app, such as app 13-2 thereby opening the app, as shown in the (B) depiction of device 10. The app may be any type of app. In this embodiment, app 13-2 is an app specializing in vehicle trends and some third party not necessarily related to the app supplier is presenting advertisement 111 showing vehicle 111-1. For an example illustration of the functionality of an embodiment, assume that the third party is running a contest in which user 120 can take a photograph or video of him/herself and upload the photograph to the third party. Possibly, the third party will run a new advertisement showing user 120, along with vehicle 121, based on the uploaded image received from device 10 via camera 11. Such an advertisement is shown in FIG. 2 airing on TV 21 and featuring user 120 and his car 121, all as uploaded via camera 11 of device 10 under control of a third party. The third party, in this embodiment, gains control of the hidden resources, such as the camera, via app 13-2 for the purposes of allowing the user to upload the desired media. As will be discussed, the third party can exercise control over the uploaded media, either by human monitoring or by automatic filtering, such as is found using standard computer vision “classifiers.” These classifiers would use, for example, the basic components of creating a training set of images including images in and not in the set of images desired; identifying visual “features” of those images (such as color and edges); applying any of a range of standard “machine learning” algorithms to “classify” the images into the “keep” or “filter out” set. Some such machine learning classification techniques are: “Supervised Machine Learning: A Review of Classification Techniques” by S. B. Kotsiantis in Emerging Artificial Intelligence Applications in Computer Engineering, IOS Press, 2007, which is hereby incorporated by reference herein.
  • In one embodiment, the image processing system will remove unwanted items from a photograph, or block a photograph, under certain situations. Thus, assume the advertisement asks for anybody owning a Jaguar to take a picture of the proud owner standing beside his automobile. Someone then takes a photograph of himself beside a truck and the system, if desired, will automatically reject the picture.
  • In one embodiment, the technology that allows the advertisement to control the hidden assets is two-fold. First it is the use of, for example, HTML (which is not typically used in advertisements) in combination with allowing the HTML to flow though an app (app 13-2 in our example) which app already is in privy with the device user such that the app has already received user permission to enable or otherwise use the desired hidden resource. It is noted that while the above embodiment utilizes HTML, embodiments may also use other languages such as Javascript, or Javascript combined with the HTML code, to implement inventive concepts outlined herein.
  • FIG. 3 shows one embodiment 30 of a system for supporting the concepts of the invention. As shown, app server 33 controls app 13-2 (and any number of other apps), downloads via network 32 an app to a specific mobile device, such as to device 10. In some situations, the app must be pre-certified by a certification entity, and as part of that certification, the app is allowed to have access to (and control over) at least some of the hidden resources on the device such as a camera, stored information, and the like. In other cases, the user must specifically allow the app to have access to (and control over) one or more of the hidden resources.
  • In one embodiment, one or more third parties, via third party server 31, has a relationship with app server 33 such that content from third party server 31 will flow over connection 330 and via network 32 and over connection 331 to app server 33 and then via app server 33 via network 32 and connection 332 to app 13-2 on device 10. It is noted that information may flow between third party server 31, app server 33 and device 10 in any manner, order or direction, which will be generally dictated by the app. For example, third party server may send data directly to device 10 under control of the app executing on the device. It is further noted that network 32 represents one or more networks that would be used in this embodiment, including without limitation, cellular, wireline, WiFi, 3G, etc. In the operational example discussed above, third party server 31 is an advertisement server and operates to send an appropriate advertisement for display on device 10 when the user at device 10 accesses app 13-2. In this embodiment, the user at device 10 does not seek the advertisement from the third party but it is presented as part of the operation of app 13-2 even though the app is not specifically designed to deliver just this one advertisement or any advertisement.
  • Note that the HTML code used to control the hidden resources of device 10 is code resident in app 13-2 and does not necessarily need to be inserted into the advertisement from server 31. In this manner, permission to use the hidden resource need be given only once (to app 13-2) and not every time a third party advertisement is downloaded to device 10. Also, in some situations, such as when utilizing Apple® devices, where apps must be certified or approved, the approval of app 13-2 serves to allow third parties (server 31 in this example) to use the already approved code of another party's (server 33 in this example) app to control device 10.
  • In one embodiment, a native mobile application on device 10 provides hardware access capabilities to the resources, including the hidden resources. This includes the ability to control the taking of photographs. The native application also has the ability to display an embedded web page and has the ability to enable that embedded web page to access the native photograph taking capability that it provides. So when an advertisement comes from server 31 (or from any other server authorized by server 33) the HTML page which can be downloaded and provided externally can thus take advantage of the native hardware on the phone, for example taking a picture which otherwise would not be available to standard HTML. Note that the advertisement from server 31 need not, in some embodiments, pass through server 33, but can be delivered directly to device 10 provided that the advertisement is delivered to app 13-2 such that the code (HTML code in this embodiment) can be used with the native mobile application to control the hidden resources on device 10. This then allows the web browser code of app 13-2 to act as the control of the mobile device as opposed to allowing the code in the web browser of the advertisement from server 31 to control the mobile device application which it could not generally accomplish.
  • FIG. 4 shows one embodiment 40 of a method of supporting the system shown in FIG. 3. The processes of the embodiments shown in this disclosure are controlled by code running in, for example, one or more processors 31-2, processors 33-2 and 10-2. Process 401 determines if app 13-2 is currently in use on device 10. If not, normal device 10 operations continue as controlled by process 402. If so, then process 403 determines if camera usage has been enabled (desired) by app 13-2 which app already has the necessary approvals of device 10's user and, if necessary, an approval agency (Apple®, etc). The desire to enable the camera (a hidden resource) comes from, in this example, a communication from advertisement 111 (FIG. 1) under control of third party server 31. Process 403, upon receipt of a valid request for enabling a hidden resource, causes process 44 to enable the device via the above-described mobile device application.
  • Process 405 then controls the use of the hidden resource and when the resource has been used causes process 406 to send the results of the resource use (photograph, video, audio, etc.) to a third party, e.g. to third party server 31. In one embodiment, the photograph is sent with no action required by the user other than to snap the photograph using the built-in camera on the device. This communication can be made directly to server 31 or via one or more intermediary servers.
  • FIG. 5 shows one embodiment 50 of a system for supporting another embodiment utilizing the concepts of the invention. In this embodiment, social network server 51 is added to the system shown in FIG. 3. Server 51 can be used with or without server 31 and operates as does server 31 as a third party server in conjunction with one or more apps, such as app 13-2, via app server 33.
  • In operation, when app 13-2 is active (or when a specific third party advertisement is presented to the user via app 13-2) banner 501 is caused to be displayed, either under control of code from app 13-2 or under control of code from a third party advertisement. Banner 501 in this embodiment, represents a specific social network (such as Facebook®, Twitter®, etc.). If the user enables (usually by touching) banner 501, code controlled by app 13-2 accesses a database maintained by app 13-2 to retrieve the specific user login information (typically user name and password) and forwards that information to the appropriate social network under control of app 13-2. In the illustrated embodiment banner 501 represents a selection to follow material related to the contents of the app via a social network site. Note that the “following” and “shown by display 501” is not a following of app 13-2 in this embodiment, but rather of the third party that is currently being displayed via app 13-2. However, in other embodiments content of banner 501, e.g. the social network follow request, may be directly related to the content of app 13-2 and embodiments will process the social network access in a similar manner.
  • Use of this arrangement then is in substitution for requiring the user at device 10 to manually enable his/her login information for each specific social network which would normally cause the user to navigate away from the app 13-2 either to a web browser or a different app related to the relevant social network. The specific user login information can be located, for example, in memory 10-1 on device 10 and accessed (as a hidden resource) by app 13-2 and not by the third party directly, or the login information could be located in memory 33-1 in association with app 13-2 on server 33.
  • In some embodiments, access of social network server 51, such as after making a follow request, may be done by validating login information with social network server 51 via a social networking application programming interface (API), such as a web service. Login information may be accessed from storage and provided to the social networking API. Additionally, in some embodiments, the first request to the social network server will require the user to log in. Thereafter, subsequent requests may send and receive information to social network server 51 utilizing the previously provided login without navigating away from app 13-2.
  • FIG. 6 shows one embodiment 60 of a method of supporting the system shown in FIG. 5. Processes 401-406 are described with respect to FIG. 4 and will not be repeated. Process 601 determines if a valid third party request, such as for FOLLOWING on a social network has been received and displayed on device 10. Note that in the embodiment being discussed this request is for following or joining a social network. But, as will be discussed, since the enablement of the request involves sending the third party hidden data, the concepts discussed herein could also extend to other hidden data and functions , such as credit card, passwords, medical information, or other personal information. Using credit card data would allow a user to shop in a one-click mode on sites that the user has not pre-registered with. These sites can be websites or even perhaps restaurants when the bill is presented. As will be discussed, the operation is through a pre-accepted app, such as app 13-2 and the data to be released to a third party via that app has been pre-approved by the user.
  • If process 601 determines that a valid third party request has been received, then process 602 determines if the user has enabled the request, for example, by tapping display button 501 (FIG. 5). Once the user enables the request, process 603 obtains the hidden data necessary to satisfy the request. This hidden data can be user name and password, credit card data, or the like. As discussed above, this data can be stored on device 10 or at a remote location accessible under control of server 33 on behalf of app 13-2. Process 604 determines if the proper response data has been gathered and, if so, process 605 delivers the response data to the proper third party location.
  • Note that the third party request could at times be a multiple request, such as for different social networks, or for a combination of different operations. For example, the user may wish to buy a product from company X that has advertised to the user via app 13-2. The user then could click on a BUY button (not shown) and could also click on a FOLLOW button, such that his/her purchase can be both facilitated and posted on the social network concurrently.
  • Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.

Claims (24)

What is claimed is:
1. A method of gaining access to a hidden resource on a device by a party not privy to such hidden resource, said method comprising:
presenting a request to a user of said device, said request stemming from a third party and requiring use of said hidden resource, said request presented to said user though an application enabled by said user; and
allowing access to said third party to said hidden resource, said allowing controlled, at least in part, by said enabled application upon affirmatively enabling said request by said user.
2. The method of claim 1 wherein said hidden resource comprises at least one of the following: camera, camcorder, audio recorder, credit card data, social network accessing data, passwords, personal data.
3. The method of claim 1 wherein said request is imbedded in an advertisement displayed on said device while said user of said device is currently using said application.
4. The method of claim 3 wherein said request within said advertisement is for said user to take a photograph using a camera of said device, and said photograph is transmitted under control of the third party.
5. The method of claim 4 wherein the photograph is sent to said third party.
6. The method of claim 1 wherein said request is embedded in a merchandise order displayed on said device while said user of said device is currently using said application, and wherein said hidden resource is credit card information to facilitate payment for ordered merchandise.
7. The method of claim 1 wherein said request is in relation to a third party and is a request for said user to follow said third party on a social network, and wherein said hidden resource is said user's login information to said social network.
8. The method of claim 1 wherein the device is a hand-held mobile computing device including at least one of a mobile phone, tablet and MP3 player.
9. The method of claim 1 wherein the device is one of a desktop and notebook computer.
10. The method of claim 1 wherein said third party provides content within said application which includes HTML coding.
11. The method of claim 1 wherein said HTML coding provides instructions to said application regarding the use of said hidden resource.
12. A method of allowing a party not in privy with a mobile device to access hidden resources on said device, said method comprising:
opening an app on said mobile device, said app having pre-authorized access to at least certain of said hidden resources;
displaying within said open app media originating from a third party, said media containing at least one request to be accepted or rejected by a user of said app; and
upon accepting a request from a third party, enabling one of said certain hidden resources to be under control of said third party using said app's pre-authorized access to said certain hidden resources.
13. The method of claim 12 wherein enabling one of said certain hidden resources provides the third party control of a camera on said mobile device.
14. The method of claim 12 wherein enabling one of said certain hidden resources provides the third party with the ability to retrieve a voice recording from said mobile device.
15. The method of claim 12 wherein enabling one of said certain hidden resources provides the third party with the ability to retrieve a video recording from said mobile device.
16. The method of claim 12 wherein enabling one of said certain hidden resources provides the third party with the ability to retrieve a stored information from said mobile device.
17. The method of claim 16 wherein said stored information includes at least one of photographs, video recordings and audio recordings.
18. The method of claim 12 wherein said third party request requires use of said device's camera, wherein when a photograph is taken with said camera said photograph is communicated to said third party without further action by said user.
19. The method of claim 12 wherein said third party request requires personal data of said user and wherein when said user accepts said request said personal data is communicated to said third party without further action by said user.
20. The method of claim 12 wherein the mobile device is one of a tablet device, smartphone, and MP3 player.
21. A method of uploading photographs from a mobile device; said method comprising:
delivering media to said mobile device, said media containing an advertisement from a party not in privy with said device, said media delivered to said device via an enabled application contained on said device, said application not exclusively associated with said party delivering said media, said application having a pre-established permission relationship with said mobile device to enable certain media creation resources;
displaying on said device said delivered media,
communicating to a user of said device via said displayed media a request for said user to create local media at said device using said device's media creation resources, said media creation resources not being controllable by said third party, and
enabling said media creation resources under at least partial control of said particular application.
22. The method of claim 21 further comprising:
uploading locally created media upon creation without further action required by said user.
23. The method of claim 21 wherein said media includes HTML coding.
24. The method of claim 23 wherein said HTML coding provides instructions to said particular application regarding the use of said media creation resources.
US13/353,676 2012-01-19 2012-01-19 System and Method for User Generated Content in Media Advertisements Abandoned US20130191219A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US13/353,676 US20130191219A1 (en) 2012-01-19 2012-01-19 System and Method for User Generated Content in Media Advertisements
US13/462,680 US9484002B2 (en) 2012-01-19 2012-05-02 System and method for adaptive and persistent media presentations
US15/332,953 US9997138B2 (en) 2012-01-19 2016-10-24 System and method for adaptive and persistent media presentations

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/353,676 US20130191219A1 (en) 2012-01-19 2012-01-19 System and Method for User Generated Content in Media Advertisements

Publications (1)

Publication Number Publication Date
US20130191219A1 true US20130191219A1 (en) 2013-07-25

Family

ID=48798008

Family Applications (3)

Application Number Title Priority Date Filing Date
US13/353,676 Abandoned US20130191219A1 (en) 2012-01-19 2012-01-19 System and Method for User Generated Content in Media Advertisements
US13/462,680 Active 2034-11-07 US9484002B2 (en) 2012-01-19 2012-05-02 System and method for adaptive and persistent media presentations
US15/332,953 Active US9997138B2 (en) 2012-01-19 2016-10-24 System and method for adaptive and persistent media presentations

Family Applications After (2)

Application Number Title Priority Date Filing Date
US13/462,680 Active 2034-11-07 US9484002B2 (en) 2012-01-19 2012-05-02 System and method for adaptive and persistent media presentations
US15/332,953 Active US9997138B2 (en) 2012-01-19 2016-10-24 System and method for adaptive and persistent media presentations

Country Status (1)

Country Link
US (3) US20130191219A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150235048A1 (en) * 2014-02-17 2015-08-20 Sangeetha Balusu Systems and methods for enhanced mobile photography
US12086840B2 (en) * 2018-10-09 2024-09-10 Ebay Inc. Generating personalized banner images using machine learning

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11250217B1 (en) * 2015-07-14 2022-02-15 Soundhound, Inc. Conditional responses to application commands in a client-server system
EP3701473B1 (en) * 2017-10-24 2024-08-28 A.C.N. 629 573 093 Pty. Ltd. A system for improved digital advertising display device proof-of-play data logging

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030047602A1 (en) * 1997-10-16 2003-03-13 Takahito Iida System for granting permission of user's personal information to third party
US7151772B1 (en) * 1996-11-08 2006-12-19 At&T Corp. Method for performing lawfully-authorized electronic surveillance
US20080270038A1 (en) * 2007-04-24 2008-10-30 Hadi Partovi System, apparatus and method for determining compatibility between members of a social network
US20090044235A1 (en) * 2007-08-07 2009-02-12 Davidson Daniel L Method and system for on-line content acquisition and distribution
US20090165123A1 (en) * 2007-12-19 2009-06-25 Giobbi John J Security system and method for controlling access to computing resources
US7634571B2 (en) * 2000-05-26 2009-12-15 Pearl Software, Inc. Method of remotely monitoring an internet session
US7831469B2 (en) * 2003-04-03 2010-11-09 International Business Machines Corporation Verifying audio output at a client device
US20110295667A1 (en) * 2010-06-01 2011-12-01 David Butler Interactive advertising System
US20120023556A1 (en) * 2010-07-23 2012-01-26 Verizon Patent And Licensing Inc. Identity management and single sign-on in a heterogeneous composite service scenario
US20120317565A1 (en) * 2011-06-07 2012-12-13 Research In Motion Limited Methods and devices for controlling access to computing resources
US20130019296A1 (en) * 2011-07-15 2013-01-17 Brandenburg John C Methods and systems for processing ad server transactions for internet advertising
US8527340B2 (en) * 2011-03-07 2013-09-03 Kba2, Inc. Systems and methods for analytic data gathering from image providers at an event or geographic location
US8615443B2 (en) * 2005-04-15 2013-12-24 Clifford R. David Interactive image activation and distribution system and associated methods
US20140095638A1 (en) * 2012-07-09 2014-04-03 Tencent Technology (Shenzhen) Company Limited Method of supporting third-party applications in an instant messaging system and a system using the same
US8812607B2 (en) * 2010-08-23 2014-08-19 Maxxess Systems, Inc. Private mobile messaging and data communications apparatus and method of managing organizational messaging

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9105032B2 (en) * 2007-05-03 2015-08-11 Yellowpages.Com Llc Systems and methods to provide advertisements for real time communications
US20070255616A1 (en) * 2006-04-27 2007-11-01 Microsoft Corporation Techniques for authoring ads for dynamic layout environments
US20080306824A1 (en) * 2007-06-08 2008-12-11 Parkinson David C Empty Space Advertising Engine
US8255491B1 (en) * 2008-01-28 2012-08-28 Comscore, Inc. Determining a particular type of wireless device to be emulated
US8645858B2 (en) * 2008-09-12 2014-02-04 Koninklijke Philips N.V. Navigating in graphical user interface on handheld devices
US20110134143A1 (en) * 2009-12-04 2011-06-09 Samsung Electronics Co., Ltd. Method and apparatus for display screen reorientation
US9911141B2 (en) * 2010-08-01 2018-03-06 Hewlett-Packard Development Company, L.P. Contextual advertisements within mixed-content page layout model
US20130019150A1 (en) * 2011-07-13 2013-01-17 Rony Zarom System and method for automatic and dynamic layout design for media broadcast
US9032292B2 (en) * 2012-01-19 2015-05-12 Blackberry Limited Simultaneous display of multiple maximized applications on touch screen electronic devices

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7151772B1 (en) * 1996-11-08 2006-12-19 At&T Corp. Method for performing lawfully-authorized electronic surveillance
US20030047602A1 (en) * 1997-10-16 2003-03-13 Takahito Iida System for granting permission of user's personal information to third party
US7634571B2 (en) * 2000-05-26 2009-12-15 Pearl Software, Inc. Method of remotely monitoring an internet session
US7831469B2 (en) * 2003-04-03 2010-11-09 International Business Machines Corporation Verifying audio output at a client device
US8615443B2 (en) * 2005-04-15 2013-12-24 Clifford R. David Interactive image activation and distribution system and associated methods
US20080270038A1 (en) * 2007-04-24 2008-10-30 Hadi Partovi System, apparatus and method for determining compatibility between members of a social network
US20090044235A1 (en) * 2007-08-07 2009-02-12 Davidson Daniel L Method and system for on-line content acquisition and distribution
US20090165123A1 (en) * 2007-12-19 2009-06-25 Giobbi John J Security system and method for controlling access to computing resources
US20110295667A1 (en) * 2010-06-01 2011-12-01 David Butler Interactive advertising System
US20120023556A1 (en) * 2010-07-23 2012-01-26 Verizon Patent And Licensing Inc. Identity management and single sign-on in a heterogeneous composite service scenario
US8812607B2 (en) * 2010-08-23 2014-08-19 Maxxess Systems, Inc. Private mobile messaging and data communications apparatus and method of managing organizational messaging
US8527340B2 (en) * 2011-03-07 2013-09-03 Kba2, Inc. Systems and methods for analytic data gathering from image providers at an event or geographic location
US20120317565A1 (en) * 2011-06-07 2012-12-13 Research In Motion Limited Methods and devices for controlling access to computing resources
US20130019296A1 (en) * 2011-07-15 2013-01-17 Brandenburg John C Methods and systems for processing ad server transactions for internet advertising
US20140095638A1 (en) * 2012-07-09 2014-04-03 Tencent Technology (Shenzhen) Company Limited Method of supporting third-party applications in an instant messaging system and a system using the same

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150235048A1 (en) * 2014-02-17 2015-08-20 Sangeetha Balusu Systems and methods for enhanced mobile photography
US9171181B2 (en) * 2014-02-17 2015-10-27 Sangeetha Balusu Systems and methods for enhanced mobile photography
US12086840B2 (en) * 2018-10-09 2024-09-10 Ebay Inc. Generating personalized banner images using machine learning

Also Published As

Publication number Publication date
US20170040000A1 (en) 2017-02-09
US9997138B2 (en) 2018-06-12
US20130293587A1 (en) 2013-11-07
US9484002B2 (en) 2016-11-01

Similar Documents

Publication Publication Date Title
US10432693B2 (en) System, method and computer program for signing and dedicating information objects
US10848687B2 (en) Modifying presentation of video data by a receiving client device based on analysis of the video data by another client device capturing the video data
US20190266588A1 (en) Generation and exchange of custom self-recorded multimedia
US11558543B2 (en) Modifying capture of video data by an image capture device based on video data previously captured by the image capture device
US10757347B1 (en) Modifying display of an overlay on video data based on locations of regions of interest within the video data
US10805521B2 (en) Modifying capture of video data by an image capture device based on video data previously captured by the image capture device
US10372882B2 (en) Media distribution network, associated program products, and methods of using the same
JP7258857B2 (en) Modification of video data capture by the imaging device based on video data previously captured by the imaging device
US11985388B2 (en) Methods and systems for seamlessly transporting objects between connected devices for electronic transactions
WO2016116599A1 (en) User controlled profiles
US10915776B2 (en) Modifying capture of video data by an image capture device based on identifying an object of interest within capturted video data to the image capture device
US20130191219A1 (en) System and Method for User Generated Content in Media Advertisements
US11418827B2 (en) Generating a feed of content for presentation by a client device to users identified in video data captured by the client device
US10721394B1 (en) Gesture activation for an image capture device
US10666857B2 (en) Modifying capture of video data by an image capture device based on video data previously captured by the image capture device
US11444943B1 (en) Exchange content between client devices when a client device determines a user is within a field of view of an image capture device of the client device and authorized to exchange content
US10812616B2 (en) Transferring an exchange of content to a receiving client device from a client device authorized to transfer a content exchange to the receiving client device
US20230334864A1 (en) Presenting messages to a user when a client device determines the user is within a field of view of an image capture device of the client device

Legal Events

Date Code Title Description
AS Assignment

Owner name: ZUMOBI, INC., WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SANGIOVANNI, JOHN;BEDERSON, BENJAMIN B.;HOUSE, SEAN;AND OTHERS;SIGNING DATES FROM 20120112 TO 20120117;REEL/FRAME:027703/0521

AS Assignment

Owner name: SILICON VALLEY BANK, CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNOR:ZUMOBI, INC.;REEL/FRAME:032448/0531

Effective date: 20140228

AS Assignment

Owner name: ZUMOBI, INC., WASHINGTON

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:033814/0079

Effective date: 20140923

AS Assignment

Owner name: SILICON VALLEY BANK, CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNOR:ZUMOBI, INC.;REEL/FRAME:034213/0906

Effective date: 20140228

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION