[go: up one dir, main page]

WO2018136619A1 - Dérivation d'expériences personnalisées d'environnements intelligents - Google Patents

Dérivation d'expériences personnalisées d'environnements intelligents Download PDF

Info

Publication number
WO2018136619A1
WO2018136619A1 PCT/US2018/014212 US2018014212W WO2018136619A1 WO 2018136619 A1 WO2018136619 A1 WO 2018136619A1 US 2018014212 W US2018014212 W US 2018014212W WO 2018136619 A1 WO2018136619 A1 WO 2018136619A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
eds
environment
information
communications device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2018/014212
Other languages
English (en)
Inventor
Shamim A. Naqvi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sensoriant Inc
Original Assignee
Sensoriant Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US15/475,748 external-priority patent/US10320781B2/en
Application filed by Sensoriant Inc filed Critical Sensoriant Inc
Publication of WO2018136619A1 publication Critical patent/WO2018136619A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0269Targeted advertisements based on user profile or attribute
    • G06Q30/0271Personalized advertisement
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0259Targeted advertisements based on store location
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0261Targeted advertisements based on user location
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0265Vehicular advertisement
    • G06Q30/0266Vehicular advertisement based on the position of the vehicle
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/33Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings

Definitions

  • Personalization is a major component in Internet applications and services. Web pages are often customized to user preferences. Content on web pages may be chosen to conform to preferences of users. Advertisements are targeted to particular users. Apps provide customized services based on user profiles and user provided data. Personalization has been a central component of Internet services for more than a decade.
  • a system and method for obtaining a representation of an environment.
  • device context information is requested from a user communications device associated with a user.
  • the request is sent to the user communication device from a virtual machine environment established by a database processor.
  • the virtual machine environment is established by the database processor in response to a request received from the user communications device over a communications network for a representation of an environment associated with a third party.
  • User preference information is requested and the device context information and the user preference information are received in the virtual machine environment.
  • at least one environmental data set (EDS) is identified that is associated with the environment and includes information reflective of the environment.
  • the EDS is received in the virtual machine environment and, while in the virtual machine environment, the EDS is modified based at least in part on the user preference information.
  • Executable computer code is constructed for generating a representation from the modified EDS.
  • the executable code is caused to be sent to the user communications device.
  • FIG. 1 shows an exemplary snippet database.
  • FIG. 2 defines exemplary attributes that may be included in a snippet database.
  • FIG. 3 shows one exemplary system architecture for implementing aspects of the methods and techniques described herein.
  • FIG. 4 illustrates one example of a method for generating a single
  • FIG. 5 shows another example of a method for generating a representation of an environment.
  • FIG. 6 shows an example architecture for a device such as the user
  • Personalization of services is a basic aspect of Internet and web services. Content and web pages are constructed dynamically to suit the preferences and tastes of consumers. Advertisements are tailored to specific users.
  • the systems and techniques described herein may be applied to personalize, e.g., geographical, environments such as smart homes, retail stores, shopping malls, smart cars, etc. In particular, two kinds of personalization are envisioned that may be described as follows.
  • environments are personalized by creating datasets called representations (also referred herein as experiences) of an
  • environments are personalized by creating representations of an environment, e.g., a geographical environment, that are tailored to groups of users. These representations may then be delivered to the respective communications devices of the group members or rendered on one or more common devices in the environment, e.g., within the confines of a retail store or smart car using Internet connected devices available to all customers of the store or all the occupants of the car.
  • a data object would thus be delivered to each occupant that when rendered on his communications device may display items of interest to him in the nearby store.
  • the display changes to the next nearby store along the route of the car.
  • the route of the car may be pre-determined by navigation software.
  • this example illustrates a different notion of "points of interest" (POI) that are commonly provided by many navigation software systems.
  • datasets representing the inventories of the environments e.g., business premises such as retail stores, smart homes, etc.
  • the notion of "nearby” implying a relationship between computer programs (e.g., the computer program that determines items of interest, or the program that searches the inventory dataset) and geography (e.g., the location of the store and/or the car).
  • An occupant of the car wishing to search nearby stores needs to acquire and then run the app of each nearby store. This would require a succession of apps to have been downloaded a priori, set up for later use and then launched manually by each occupant of the car. There may thus be a need for a sequence of manual operations expected of each occupant of the car.
  • the systems and techniques described herein introduce the notion of executable codes running in a remote computing environment that serve the needs of consumers in an environment such as a smart car., a smart home or other business premises such as a shopping mall, etc.
  • these preferences need to be communicated to the respective apps.
  • This introduces a possible additional manual step. It may, however, be obviated if the user preferences were to be available to the, e.g., operating system, of the user communication device that may then provide the user preferences to the apps on the user device that need the preferences (or to the executable codes in the remote computing environment).
  • the systems and techniques described herein avoid the need for this manual step and, moreover, may accomplish the communication of user preferences in a privacy preserving manner.
  • a database system along with a database processor, i.e., a special computer program, may be constructed so as to associate special-purpose executable codes with device context, geographic context and calendar (e.g., date and time) context in a manner that the executable codes are discoverable and operable when a request from a user communications device is received, provided the user communications device satisfies the device, geographical and calendar contexts.
  • a database processor i.e., a special computer program
  • a proposed route may be provided as a part of the incoming request to the database processor that may then identify "relevant" executable codes based on the geographical and calendar contexts that lie along the proposed route.
  • the database processor may construct a sequence of operations in which the executable codes may be executed in synchronization with the proposed route being traversed by the user communication device.
  • the database processor is not to be confused with a conventional geographical database system, i.e., a database system that stores information about geographical locations or objects described by their locations.
  • the database processor has access to a database system that stores executable codes.
  • the latter are associated with geographic locations in such a manner that they become discoverable and operable when incoming requests satisfy the contextual constraints imposed on the executable codes.
  • the database processor further provides an execution environment wherein discovered executable codes may be executed (with respect to user preferences) and the results of their executions provided to one or more user devices.
  • the result of the execution of the executable code in response to an incoming request is itself an executable code, e.g., an HTML (Hyper Text Markup Language) script that may be provided, e.g., to a website, that may then deliver the HTML script to one or more user communications devices.
  • an HTML Hyper Text Markup Language
  • the response does not comprise one or more stored objects. It comprises executable codes.
  • the database technology proposed herein is an improvement of both database systems and app stores since 1) it obviates the need for downloading apps before their use in user devices, 2) it allows a single input and output to address and/or serve the needs of multiple apps, and 3) provides a user privacy preserving model of managing the user preferences whilst providing personalized experiences (representations).
  • a conventional database system stores data objects and provides them upon requests made by client programs. Many query languages have been described in prior art that support data retrieval requests from a database system.
  • An app store may be viewed as a database system that stores computer programs (applications or "apps").
  • An app store may be searched for apps by name or other attributes describing the apps.
  • a searchable index is a data structure that lists data objects indexed by one or more keywords. Given one or more keywords, the searchable index may be searched to find the corresponding data objects. For example, a web search engine supports an index that when provided with keywords, returns corresponding web page addresses.
  • the snippets are obtained from web pages using web crawling mechanisms.
  • web pages are "pushed".
  • the pushed web pages may contain, e.g., special HTML tags, demarcating the snippets and the geographical and calendar contexts.
  • Snippets may in general contain many kinds of information. For instance, some snippets contain executable code (or contain a link to executable code). In such cases, the snippets may be viewed as a kind of "app" that is to be discovered and executed based on its geographical and calendar contexts.
  • a developer may provide one or more web pages, e.g., a web catalog, describing various executable codes that may be made available to consumers. Using a web crawling mechanism, the executable codes may be extracted as snippets and stored in a searchable index.
  • 14/466,676 refers to such snippets as being discoverable under a geographical and/or calendar context. That is, a user communications device searching the searchable index of snippets may discover snippets whose geographical and calendar contexts may match that of the device itself. Thus, for example, a user communications device located at Yankee Stadium on game day may discover snippets whose geographical and calendar contexts match that of the device.
  • FIG. 1 shows an exemplary index comprising snippets.
  • a data structure herein as a snippet database.
  • the data in the received snippets may be organized in a tabular structure whose rows identify snippets and columns identify various attributes of the snippets (as gleaned from the extraction process).
  • the various illustrative attributes shown in FIG. 1 carry the meanings shown in FIG. 2.
  • the attribute "Cal” refers to the calendar context and the attribute “Loc” refers to the geographical context.
  • code refers to the case when the snippet is associated with executable code. In such a case, the value in the column may be the executable code or a link from where the code may be obtained.
  • the attribute "Rel” in FIG. 2 is especially noteworthy. This attribute specifies a list of category names that may be used to search and match snippets. Thus, if a search request is received for snippets matching "Music” and a snippet has a “Rel” tag "Chopin", service logic of the snippet database may infer a match and find ("discover") the indicated snippet.
  • a developer of a snippet associated with executable codes may specify a geographical location that serves as a context associated with the snippet. For example, the developer may specify that the snippet applies to the geographical location (by specifying GPS coordinates, by way of example) of Yankee Stadium in New York.
  • the developer may also specify a date and time, i.e., a calendar context, when the snippet becomes applicable. For example, the snippet may only be applicable on game days and game times.
  • the idea underlying snippets and their geographical and calendar contexts is that the snippet is only discoverable and operable when the specified context is satisfied.
  • the user communications device requesting execution of a snippet needs to provide a calendar and a geographical context that satisfies the geographical and calendar contexts associated with the snippet in the snippet database. If the provided data does not satisfy the stored contexts, i.e., does not match, the snippet may not be discoverable and operable. In the latter case, the executable codes of the snippet are not executed and a general message may be communicated to the user communications device.
  • the user communications device should have a geographic, calendar and device context (as discerned, for instance, by one or more sensor devices associated with the user device or associated with an environment where the user device is located) that satisfies the contexts associated with a snippet in the snippet database.
  • a user communications device may specify a user request with hypothetical geographic, device and calendar contexts, e.g., by using an appropriately designed query language.
  • the snippet database may then be searched to discover snippets that satisfy the hypothetical contexts and their corresponding executable codes may be executed.
  • the geographical, device and calendar contexts associated with a snippet may be specified by a consumer rather than the developer of the snippet. That is, the snippet database may allow a consumer to author the geographical, device and calendar contexts of one or more snippets. For example, a consumer may specify that a snippet may be made operable for a location and time specified by the user. In such cases, multiple copies of the snippet may be created and stored in the snippet database so as to accommodate multiple consumers.
  • snippets with executable codes specify a geographical context.
  • a retail store that may provide snippets (with executable codes) that have a geographical context pertaining to the location of the store. That is, we may now say that the executable code of the snippet is to be executed (i.e., the snippet becomes operable) upon request by a user communications device when the device is in the geographical environment of the retail store.
  • a consumer may be visiting a retail store. While within the geographical environment of the store, the consumer may discover one or more snippets with executable codes. When the codes are executed, the consumer may be informed, say, of the items in the store that he may prefer or items that are on sale, etc. That is, snippets with executable codes are computer programs that operate in specific geographical environments and may provide services to consumers in those environments.
  • a consumer at Yankee Stadium on game day may be searching for food items using the search function (search engine or search app) on his user communications device.
  • his geographical context may be the location of "Yankee Stadium”
  • his calendar context may be given by the time and data sensor of the user
  • One or more snippets may be discoverable by such a consumer and the associated executable codes when executed may provide services to the consumer.
  • the executable code of a snippet may direct the consumer to a food stall.
  • the installed devices may also have connections (wired or wireless) to communications networks such as the Internet.
  • the installed devices may broadcast music, video or other multimedia data that may be received by user devices in the environment.
  • Radio-Frequency R/F
  • Wi-Fi and beacon technologies the range is of the order of hundreds of yards.
  • GPS provides a bigger coverage area; however, its accuracy suffers in indoor spaces.
  • the present invention is concerned with devices that broadcast data/signals using technologies such as satellite based systems, tower-based cell systems (macro cells and micro cells), and Bluetooth or Wi-Fi-based routers, etc.
  • broadcasting devices include cell towers, pico and femto cells, GPS, Wi-Fi routers, beacon devices such as Gimbal, devices using the iBeacon specification, etc.
  • BDs Broadcast Devices
  • an area of geography may be determined wherein a receiving device (a communications device) is able to receive signals from one or more BDs.
  • a coverage area may be referred to as an environment. That is, an environment is defined with respect to the receiving device and the particular BD from which it is receiving signals.
  • the data pertaining to an environment is known as an environment dataset.
  • a mobile device is simultaneously receiving signals from two different BDs, then the mobile device is simultaneously located in two different environments, each associated with one or more different BDs. It should also be noted that an environment might not have a regular shape, e.g., circular or oval, etc. Rather, the shape of an environment is determined by the signal reception capability of the user devices in that environment.
  • User communications devices may receive the signals broadcast by BDs in a geographical area that defines the environment.
  • user communications devices support applications ("apps"), and said apps may operate using data received from the signals transmitted by one or more BDs.
  • the app must first register to receive signals from the one or more BDs.
  • the user device's operating system receives such signals, it makes registered applications aware of the receipt of said signals.
  • applications when they are made aware of a received signal, they may relay the signal to one or more servers using a network connection to a wide area network, e.g., a cloud infrastructure, wherein the servers assemble the received data into one or more datasets.
  • EDS Environment Data Set
  • a planogram is a diagram or model for describing the layout of items in an environment, in current usage most often a retail store, though it is not limited to such.
  • a planogram is a type of EDS in the sense that it is data about the premises of an enterprise such as a physical retail store and the layout of its contents. It is usually available from external sources.
  • Signal data gathered from devices such as mobile devices in an environment are another example of an EDS; in this case the dataset comprises data received by devices from the BDs in the environment. In this example, the dataset may in fact be gathered in real-time.
  • EDS may be gathered in realtime or they may be available from third-party sources.
  • a consumer at Yankee Stadium may thus obtain services from the execution of operable snippets.
  • a retail store or other enterprise may define an environment corresponding to its location.
  • the retail store may define a geo-fence surrounding its store location suing GPS signals.
  • the retail store may define one or more snippets whose geographical context may correspond to the location of the store.
  • the retail store may associate one or more EDS with its location.
  • EDS may be a planogram of the retail store and the executable code of a snippet, when executed, may guide the consumer to locations within the store where certain items are displayed.
  • the geographical area of a store or other enterprise may represent a geographical environment.
  • a snippet whose geographic context is defined over the area of the store may thus be said to be operable in the environment.
  • a smart car traversing a route along a series of stores or other enterprises may thus traverse a sequence of environments in which different snippets may be operable.
  • mediation refers to changing one or more EDS with respect to user preferences.
  • U.S. Pat. Appl. Serial No. 14/701,858 the contents of which are incorporated by reference in its entirety, the notion of mediation has been described and the derivation of one or more representations has been explained. We illustrate the notion of mediation briefly in the following.
  • the signal data from "John's environment” is one example of an EDS.
  • a planogram describing the contents, i.e., inventory, and its layout is another EDS.
  • the EDS may be used to generate a representation of the EDS, with clothes being at the "top" of the representation because the system has inferred that John prefers clothes.
  • mediation for a different user "Alice” may yield a list in which edible items are prominent.
  • mediation using the same EDS may infer different intents for different users, yielding different results.
  • mediation of one or more EDSs may cause some of the details of an environment to be deleted or removed from the resulting representation, in general, one or more details may be added, removed, highlighted, modified, etc.
  • An incremental mediation process is also possible wherein the user interacts with the representation and (e.g., explicitly) adds, deletes, modifies the contents of a representation in an interactive manner.
  • a second form of mediation may be referred to as device mediation.
  • device mediation refers to taking a representation derived by mediation from one or more EDSs as input and manipulating it to produce a (second) representation that fits the needs or aesthetics of one or more user communications devices.
  • the mediated representation of the retail environment for John may be further mediated for John's smartphone device.
  • the mediated representation might be further mediated for John's smart glasses as a holographic image or a 3-D representation.
  • This second type of mediation is also sometimes referred to as rendering.
  • the term user communications device is a consumer device that serves as a communications device for voice and/or multimedia data and that provides computational capabilities. It provides connectivity to various networks including but not limited to private data networks, IP networks, Internet, wide area networks, the Cloud, Public Land Mobile Network, short range wireless networks such as Wi-Fi and Bluetooth, etc. Examples of such devices include, without limitation, smart phones, tablets, PDAs, smart glasses, smart watches, 3-D
  • holographic glasses virtual reality headgear, game controllers, etc.
  • a smart watch associated with a smartphone may receive broadcast signals in an environment and may make the smartphone or the applications on the smartphone aware of the received signals, or vice versa.
  • representations may be rendered on the smartphone or the smart glasses, etc. It might be that a representation is produced that is further mediated to be rendered on two devices that differ in aesthetics or capabilities. For example, one device may support 2-D representations whereas the second device may support 3-D or holographic representations.
  • a user communications device may receive data/signals from an environment by obtaining one or more apps that then "register" for specific signals, i.e., signals from certain kinds of BDs.
  • a retail store may define a geo-fence using GPS signals. It may also define an environment using beacon devices. (Beacon devices are small R/F transmitting devices that operate over a range of a dozen meters.)
  • the retail store may provide an app that, when downloaded, may register with the operating system of the user device for signals from the beacon devices.
  • each beacon device broadcasts signals that contain an identifying serial number that may be used to distinguish between different beacon devices.
  • the operating system of the user device receives such signals, it informs the registered app, which may then process the received signals.
  • a user device must first obtain one or more apps that register for such signals. A user device that does not have such apps, may not receive any signals from the environment.
  • apps on user devices are a pre-requisite to receiving signals from an environment.
  • a consumer in an environment may receive services from apps on his user device that are receptive to signals being broadcast in the environment.
  • this scheme suffers from the requirement that a user device must be provisioned with a suitable app before it can receive signals from an environment. If the consumer visits multiple environments (e.g., the consumer may visit a number of retail stores in a mall), his user device must be provisioned with suitable apps for each of the visited stores.
  • the idea of associating a snippet's geographic context with that of a geographical environment may allow a snippet's executable codes to be executed (e.g., in a cloud-server arrangement) when a user device is in that geographic context.
  • a snippet's executable codes may be executed (e.g., in a cloud-server arrangement) when a user device is in that geographic context.
  • executing code may deliver services to user devices without using apps.
  • user preferences, likes, etc. are derived from historical user data. For example, a website possessing the purchase history of a consumer may process that history to derive the user's likes and preferences. A user's search history and cookie information may also be used to derive user likes and preferences. In some cases, user preference data may also be obtained from third-party providers.
  • the consumer has no control over the processing or obtaining of his purchase history or his cookie information.
  • the service provider processes the information according to its own internal mechanisms.
  • a user communications device in a retail environment that is receiving signals from the environment, i.e., the user device may have a suitable app.
  • the app may transmit the received signals to a server where they may be processed and one or more snippets may be executed.
  • the execution of the snippets may provide services to the consumer via an app on the user device.
  • the executable codes of the snippets may need user preferences.
  • user preferences may be obtained from third-party providers or from the consumer's past purchase history.
  • user preferences may compromise privacy of users.
  • No.15/475,748 involves service providers who possess user data to process such data and derive user preferences from it. However, they are constrained as per the methods of U.S. Pat. Appl. Serial No. 15/475,748 in the manner in which the derived user preferences may be shared with other computing entities.
  • SP1 who has derived user preferences for a user from the user's purchase history.
  • SP2 wishes to acquire the derived user preferences.
  • SP1 may provide user preferences to SP2 if the user in question authorizes the sharing. That is, a user may allow his data, e.g., preferences, at a first service provider to be provided to a second service provider.
  • the algorithms used by a service provider to process user data and derive user preferences may be publically known.
  • a service provider receiving user data/preferences from another service provider may be assured that proper algorithms have been used for the derivations.
  • the receiving service provider may test the received user data and preferences to ensure that the indicated algorithms were used in the derivation process.
  • a service provider, upon receiving user data may be assured of its validity and provenance.
  • Such guarantees of validity and provenance may be provided to a receiving service provider by using algorithms that create cryptographic credentials that encapsulate user preferences.
  • an algorithm may create a credential encapsulating the user preference "user likes classical music”.
  • We may view such a credential as comprising cryptographic data and an accompanying statement (e.g., a meta statement), viz., "user likes classical music”.
  • the validity of the cryptographic data in a credential may be verified using techniques described in U.S. Pat. Appl. Serial No.15/475,748, which may also verify that it was generated by a known algorithm.
  • a service provider may thus verify received information as to validity and provenance. It may then use the user preference for its own purposes.
  • the service provider who receives a user preference encapsulated as a cryptographic credential does not know anything about the user, other than the encapsulated preference. Thus, for example, a service provider may know that a user likes classical music. He may not however know the user's name, address or any other personal information. In this manner, the sharing of user preferences preserves the privacy of the user.
  • cryptographic objects encapsulating user preferences may be viewed as credentials referring to the user's preferences.
  • Application 15/475,748 describes how such credentials (also called cards or preference cards) may be obtained from one or more service providers by a user communications device and presented to one or more computer programs. Alternatively, the credentials may be provided by an external service provider directly to one or more computer programs under authorizations provided by the user communications device.
  • FIG. 3 shows an arrangement in which a user communications device 100 is within an environment 400 with broadcasting devices BD1 and BD2.
  • the user device 100 may be provisioned with one or more preference cards by preference card issuer 300 via interface 211.
  • the preference card issuer 300 may provide the preference cards directly to a database complex 200 via interface 311 under authorization of the user device 100.
  • the database complex 200 receives one or more EDS related to the environment 400.
  • the database complex 200 also contains a snippet database from which operable snippets may be discovered by requests emanating from the user communications device 100. (The entities VM 204, Website 205 and Database Processor 206 are discussed below.)
  • FIG. 4 shows one example of a general method by which a user
  • step 100(a) one or more developers "push" one or more snippets to a database complex.
  • snippets may also be extracted (“pulled") from webpages and web catalogs by a process of, e.g., web crawling.
  • the received snippets may be accompanied by one or more attributes describing the snippets.
  • attributes describing the geographical, calendar and device contexts will accompany the received snippet.
  • one or more user devices may be permitted to specify the contextual attributes. Exemplary attributes have been shown in FIG. 2.
  • step 100(b) the database complex constructs the snippet database.
  • An exemplary snippet database has been shown in FIG. 1.
  • step 100(c) the database complex associates EDS with the stored snippets.
  • This association may be specified via attributes by the developers of the snippets. For example, a developer may provide the address by specifying a link (cf. Link attribute, FIG. 2) to where the EDS are stored. If the EDS are collected in real-time, a developer may specify the address of a computer program that, e.g., provides a stream of data using a pre-provisioned application programming interface (API).
  • API application programming interface
  • step 100(d) the user device downloads one or more apps and initializes them for later use. For example, a consumer may download an app provided by his favorite retail store so that he may receive personalized services when he visits the store. As mentioned above, devices without appropriate apps may not be able to receive data/signals from environments. As a part of the initialization phase, service logic of the app may register with the operating system of the user device to receive data/signals from one or more environments.
  • step 200(a) the user device launches a previously downloaded and initialized app and uses features of the app to request a representation of the environment in which the user device is currently located. Recall that discovery of snippets and the corresponding execution of their executable codes is controlled by a matching process that matches the geographic, device and calendar context of a user device with the same contexts associated with a snippet. If the contexts do not match, the executable codes of the snippet are not executed, i.e., the snippet is not operable.
  • the app launching may, in embodiments, be triggered by the reception of one or more data signals from one or more environments.
  • step 200(b) the app transmits its geographical, calendar and device context to the database complex.
  • this contextual data may be obtained by the app from one or more sensor devices associated with the user communications device, e.g., the location sensor of the user device. Alternatively, it may be obtained from broadcasting devices installed in the environment where the user device is located.
  • step 300(a) the database complex, having received contextual data from the user device, may now discover relevant snippets in the snippet database. Note that relevancy of snippets depends on the received contextual data matching the stored contextual data (the various attributes) of the snippets.
  • the database complex discovers one or more EDSs associated with the snippets.
  • the data comprising the EDSs may be collected from real-time sources, e.g., it may be broadcast from BDs installed in an environment.
  • EDS data also may be available statically, e.g., from a Planogram dataset.
  • step 300(c) the database complex requests and receives user preferences.
  • the user preferences may be provided by the user
  • step 300(d) the database complex changes or modifies the EDS with respect to the received user preferences and, in step 300(e), constructs executable code that is used to generate the one or more representations of the EDS accordingly.
  • step 300(e) constructs executable code that is used to generate the one or more representations of the EDS accordingly.
  • executable code Conventionally, several methods are known by which data in an EDS may be changed, supplemented, removed, filtered, merged with other EDSs, etc., with respect to user preferences.
  • executable codes are known in the literature, e.g., HTML scripts or Javascript.
  • step 300(f) the constructed executable codes are sent to the user device.
  • the database complex may include, additionally, the executable code associated with the snippet, in the constructed executable code.
  • the snippet code may provide services that are specific to the environment for which the snippet has been customized.
  • step 400(a) an app on the user device receives the executable codes. It may impose a second mediation process to render them suitable for display.
  • the representations may contain interactive components that support user interaction. For example, representations may contain clickable objects or have action buttons that launch user dialog boxes, etc.
  • the executable codes are rendered on the user device by the app.
  • step 500(a) the user may now interact with the executable codes using the one or more interactive components contained therein.
  • a user communications device that does not have an appropriate app may not be receptive to signals/data from environments and may not be able to utilize the capabilities described herein. That is, having the proper app is a prerequisite.
  • FIG. 5 shows an alternative method that modifies the method shown in FIG. 4 to circumvent the above problems.
  • FIG. 5 shows two major differences from that of FIG. 4.
  • the user communications device is not required to download appropriate apps in an initialization step. Rather, the user device may, in one embodiment, utilize a web browser to make a page request from a website. For example, a consumer in a retail store, say DSW, may point his browser at the store's website, say
  • www(dot)DSW(dot)com may display a link which when clicked redirects the user to the database processor (cf. 206, FIG. 3).
  • the process of re-directing requests to a different address is well-known in IP networking.
  • the database processor is a supervisory program that has access to both the EDS datasets and the snippet database.
  • the database processor launches a virtual machine (VM) in a computing environment.
  • the VM has access to the snippet database and the EDS datasets.
  • a virtual machine or “virtual machine environment” is to be given its conventional meaning as used by those of ordinary skill in the art.
  • a virtual machine is an emulation of a physical computer system using hardware, firmware, software or a combination thereof.
  • operating system level virtualization is one known technique for implementing virtual machines.
  • a physical computer is virtualized at the operating system level, enabling multiple "isolated” and “secure” “guest” (software) machines, i.e., virtual machines, to run on a single physical computer.
  • the term “secure” implies that only pre-determined operations can be executed in the guest machine.
  • isolated means that the operations may not access resources in other guest machines.
  • hypervisor may support three guest/virtual machines running macOS, Windows, Linux, respectively, on a single physical computer.
  • Major Unix vendors sell virtualized hardware, e.g., Sun Microsystems, LLP, etc.
  • a computing environment is a programmable arrangement of hardware, software and/or firmware.
  • the term “database processor” may denote, in one embodiment, an operating system (OS) of a computing
  • the OS being suitably configured to support features such as virtual machines, session management, etc.
  • the term "session” as used herein refers to a process of information exchange between two or more communicating devices or computer programs in which information used in the exchange may be stored in a specific memory or set of registers that are then cleared ("torn down” or “terminated") later.
  • Devices and/or computer programs may also be invited and removed from a session or may initiate or terminate one or more dialogs during a session where a dialog is a sequence of data items exchanged between devices and/or computer programs.
  • database processor is known in prior art, its use in the present invention requires several new innovations and features, e.g., the creation and management of virtual machines, etc.
  • the difference lies in the manner in which the user preferences and a snippet's executable codes are processed in the VM.
  • the user preferences may be obtained as cryptographic objects.
  • the VM receives user preferences as verified credentials that it may trust.
  • the VM may not store or send the received preferences to a third-party since the VM may be configured to disallow such operations.
  • the VM may be cleared and all data and records of the VM may be cleared.
  • steps 100(a-c) snippets are obtained from web resources such as web sites and the like and a snippet database is constructed.
  • the snippets are associated with EDS datasets, if available.
  • the association between EDS and snippets may be specified by developers who may use the "Link" attribute (FIG. 2) to specify addresses from where the EDS pertaining to a snippet may be obtained.
  • a consumer may be allowed to specify an environment, e.g., his smart home, where one or more broadcasting devices may have been installed, e.g., smart thermostats.
  • the data generated from such installed devices may generally be available from one or more service providers.
  • a consumer may then specify the address of such service providers using the Link attribute (as above) or the database complex may use programmatic means to infer such address and associate the EDS with snippets.
  • snippets may be associated by a consumer with the environment representing his home.
  • a consumer utilizes the browser on his user device to visit the website of a service provider, e.g., a retailer.
  • the visited website may contain a link that when clicked re-directs the user device to the database processor (cf. 206, FIG. 3).
  • the consumer may be motivated to visit the website, for example, upon viewing an advertisement in an environment that is currently visiting. Alternatively, the consumer may be aware of the website a priori as a result of out-of-band processes.
  • step 250 the database processor creates a computing environment with a virtual machine, VM (cf. 204, FIG. 3), that has access to both the EDS datasets and the snippet database.
  • VM virtual machine
  • steps 300(a-j) we proceed as follows.
  • the VM requests the user device for its geographic, device and calendar contexts and user preferences. The latter may also be provided under authorizations of the user device from a third-party provider using the previously discussed preference cards or credentials.
  • the VM matches the device geographical, calendar and device contexts (received from the user communications device) with the attributes of the snippets in the snippet database. In this manner, the VM discovers the relevant snippets that, in turn, identify corresponding EDS datasets.
  • the VM modifies the EDS datasets based on the received user preferences and constructs one or more executable codes.
  • the database processor may include, additionally, the executable code associated with the snippet, in the constructed executable code.
  • the snippet code may provide services that are specific to the environment for which the snippet may have been customized.
  • the VM sends the constructed executed code(s) to the website initially visited by the user communications device and re-directs the user communications device to the website.
  • step 400 the website incorporates the received executable codes into one or more web pages.
  • step 450(a-c) the user device receives one or more web pages from the website as a response to its initial request and renders the received web page(s).
  • step 500(a) the user may now interact with the interactive components in the rendered web pages.
  • step 500(b) the user may end his session at which point the database processor, upon being informed, e.g., by the website, clears the VM, thus clearing it of any user data.
  • the method described in FIG. 5 may be unsuitable when representations need to be rendered for a collection of users who are in a common environment.
  • the VM may receive user preferences from one or more user devices in an environment, e.g., occupants of a vehicle or a smart home, or customers in a retail store.
  • the received preferences may now be rank ordered. For example, if the user preferences relate to music, the music pieces may be rank ordered by user preference.
  • users would be served, e.g., news of the day, that is statistically likely to be their preference and, hence, may contain news that is not congruent to their preferences, i.e., some of the news served to them may lie outside their "filter bubbles".
  • a collection of representations may be needed, e.g., a smart car may be traversing a known route and thus may enter and exit different environments.
  • the en route environments may be determined by using navigation software and representations may be pre-computed and made available to the VM a priori.
  • the VM may pre-calculate executable codes using (aggregated) user preferences, if needed, and provide the representations to the website in synchronization with the traversal of the route by the smart car.
  • executable code may be developed and associated with one or more geographical environments using any number of methods.
  • a database system may be developed that maintains a table of executable codes associated with various geographical environments and their corresponding EDS. That is, the columns of such a table may comprise "Executable Codes", "Geographic Environment” (specified as e.g., GPS coordinates), and "EDS" (locations from which corresponding EDS may be obtained).
  • the concept of associating snippets with EDS may also be dispensed with.
  • an environment may not need to install broadcasting devices since, in our invention, the user foregoes the use of apps; rather, the user launches the browser on his user device to visit the website of the environment he is currently visiting. Because the user does not need to use one or more apps, the signals from the one or more BDs in an environment are of no use to the user device.
  • a user visits a geographical environment and uses the browser on his user device to visit the environment's website.
  • the website may, in one embodiment, re-direct the user device to the database processor.
  • the database processor may then create a VM in a computing environment.
  • the VM may ask and receive various contextual information from the user device to discover relevant executable codes in the tabular data structure discussed above.
  • the user device may provide its GPS location information and the VM may search and match the provided GPS location with the GPS location data specified in the table.
  • the VM may discover the EDS and the executable codes for the current environment of the user device.
  • the VM may be provided access to the tabular data structure to carry out the actions described herein.
  • the VM may then create executable codes and send them to the website which may convert them into one or more web pages for use on the browser of the user device. [0139] Since installing beacons and other broadcasting devices are costly and require continued maintenance, such an embodiment would offer a significant commercial advantage.
  • aspects of the subject matter described herein may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer.
  • program modules include routines, programs, objects, components, data structures, and so forth, which perform particular tasks or implement particular abstract data types.
  • aspects of the subject matter described herein may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote computer storage media including memory storage devices.
  • the claimed subject matter may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer to implement the disclosed subject matter.
  • the claimed subject matter may be implemented as a computer-readable storage medium embedded with a computer executable program, which encompasses a computer program accessible from any computer-readable storage device or storage media.
  • computer readable storage media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips . . .), optical disks (e.g., compact disk (CD), digital versatile disk (DVD) . . .), smart cards, and flash memory devices (e.g., card, stick, key drive . . .).
  • computer readable storage media do not include transitory forms of storage such as propagating signals, for example.
  • those skilled in the art will recognize many modifications may be made to this configuration without departing from the scope or spirit of the claimed subject matter.
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on a controller and the controller can be a component.
  • One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
  • FIG. 6 shows an example architecture 800 for a device such as the user communication devices or database complex shown in FIG. 3 which are capable of executing the various components described herein for implementing aspects of the techniques described herein.
  • the architecture 800 illustrated in FIG. 12 shows an architecture that may be adapted for a server computer, mobile phone, a PDA, a smartphone, a desktop computer, a netbook computer, a tablet computer, GPS device, gaming console, and/or a laptop computer.
  • the architecture 800 may be utilized to execute any aspect of the components presented herein.
  • the mass storage device 812 is connected to the CPU 802 through a mass storage controller (not shown) connected to the bus 810.
  • the mass storage device 812 and its associated computer-readable storage media provide non-volatile storage for the architecture 800.
  • computer-readable storage media can be any available storage media that can be accessed by the architecture 800.
  • computer-readable storage media can be any available storage media that can be accessed by the architecture 800.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention porte sur un procédé d'obtention d'une représentation d'un environnement consistant à demander des informations de contexte de dispositif à partir d'un dispositif utilisateur. La demande est envoyée au dispositif utilisateur à partir d'un environnement de machine virtuelle établi par un processeur de base de données. L'environnement de machine virtuelle est établi par le processeur de base de données en réponse à une demande de représentation d'un environnement reçue en provenance du dispositif utilisateur sur un réseau. Des informations de préférence d'utilisateur sont demandées et les informations de contexte de dispositif et les informations de préférence d'utilisateur sont reçues dans l'environnement de machine virtuelle. Sur la base des informations de contexte de dispositif, un ensemble de données environnementales (EDS) comprenant des informations reflétant l'environnement est identifié. L'EDS est reçu dans l'environnement de machine virtuelle et l'EDS est modifié sur la base, au moins en partie, des informations de préférence d'utilisateur. Un code informatique exécutable est construit pour générer une représentation à partir de l'EDS modifié et est envoyé au dispositif utilisateur.
PCT/US2018/014212 2017-01-18 2018-01-18 Dérivation d'expériences personnalisées d'environnements intelligents Ceased WO2018136619A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201762447802P 2017-01-18 2017-01-18
US62/447,802 2017-01-18
US15/475,748 2017-03-31
US15/475,748 US10320781B2 (en) 2016-12-08 2017-03-31 System and methods for sharing and trading user data and preferences between computer programs and other entities while preserving user privacy

Publications (1)

Publication Number Publication Date
WO2018136619A1 true WO2018136619A1 (fr) 2018-07-26

Family

ID=62908687

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2018/014212 Ceased WO2018136619A1 (fr) 2017-01-18 2018-01-18 Dérivation d'expériences personnalisées d'environnements intelligents

Country Status (1)

Country Link
WO (1) WO2018136619A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060178918A1 (en) * 1999-11-22 2006-08-10 Accenture Llp Technology sharing during demand and supply planning in a network-based supply chain environment
US20070171921A1 (en) * 2006-01-24 2007-07-26 Citrix Systems, Inc. Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session
US7315826B1 (en) * 1999-05-27 2008-01-01 Accenture, Llp Comparatively analyzing vendors of components required for a web-based architecture
US20080256054A1 (en) * 2007-04-10 2008-10-16 Decision Lens, Inc. Computer-implemented method and system for targeting contents according to user preferences
US20130024492A1 (en) * 2011-07-21 2013-01-24 Parlant Technology, Inc. Event Tracking and Messaging System and Method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7315826B1 (en) * 1999-05-27 2008-01-01 Accenture, Llp Comparatively analyzing vendors of components required for a web-based architecture
US20060178918A1 (en) * 1999-11-22 2006-08-10 Accenture Llp Technology sharing during demand and supply planning in a network-based supply chain environment
US20070171921A1 (en) * 2006-01-24 2007-07-26 Citrix Systems, Inc. Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session
US7870153B2 (en) * 2006-01-24 2011-01-11 Citrix Systems, Inc. Methods and systems for executing, by a virtual machine, an application program requested by a client machine
US20080256054A1 (en) * 2007-04-10 2008-10-16 Decision Lens, Inc. Computer-implemented method and system for targeting contents according to user preferences
US20130024492A1 (en) * 2011-07-21 2013-01-24 Parlant Technology, Inc. Event Tracking and Messaging System and Method

Similar Documents

Publication Publication Date Title
US20240062244A1 (en) System and Method for Inferring the Intent of a User While Receiving Signals On a Mobile Communication Device From a Broadcasting Device
US10869260B2 (en) Systems and methods for mediating representations allowing control of devices located in an environment having broadcasting devices
US20120124062A1 (en) Application Transfer Protocol
US20150242421A1 (en) Location-Based Searching
US9936044B2 (en) Inferring user identity across multiple applications and user devices
US8954836B1 (en) Systems and methods for directing access to products and services
KR20180043392A (ko) 어플리케이션들을 추천하는 방법
CN107924527A (zh) 在应用启动器中显示广告
CN111125497A (zh) 一种信息推荐方法、装置、处理器以及存储介质
WO2017117456A1 (fr) Systèmes et procédés de mise en mémoire cache préalable de barrières virtuelles de géo-repérage pour fournir des résultats variant en fonction de l'emplacement
US20160055133A1 (en) Systems and methods for directing access to products and services
WO2015200118A1 (fr) Génération de publicités pour des résultats de recherche qui se réfèrent à des applications logicielles
US20170046436A1 (en) Bifurcated Search
US20160373881A1 (en) Method and apparatus for invoking a service in a mobile terminal
US20220303736A1 (en) On-device functionality using remote system updates
WO2019157275A1 (fr) Techniques de sélection de liens supplémentaires
US20210141824A1 (en) Geolocation restricted content registration and publication
US9043333B1 (en) Systems and methods for directing access to products and services
US12436778B2 (en) Deriving personalized experiences of smart environments
US9538363B2 (en) User terminal apparatus, server, and method of providing a customized service
WO2018136619A1 (fr) Dérivation d'expériences personnalisées d'environnements intelligents
KR20160142209A (ko) 비콘 데이터를 활용하기 위한 시스템 및 처리 방법
US20120066579A1 (en) System and Method for Obtaining User Information
US20250139186A1 (en) Device and method for generating meta space-time access gate including location information value required by user, and meta space-time access gate connection device
KR20140004609A (ko) 웹 콘텐츠를 제공하는 방법 및 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18741250

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 11/10/2019)

122 Ep: pct application non-entry in european phase

Ref document number: 18741250

Country of ref document: EP

Kind code of ref document: A1