Patent Issued for Method For Transmitting Information From A First Information Provider To A Second Information Provider Via An Information Intermediary (USPTO 10,341,308)

Information Technology Business Daily |

2019 JUL 12 (NewsRx) -- By a News Reporter-Staff News Editor at Information Technology Business Daily -- A patent by the inventors Pieper, Philipp (Palo Alto, CA); Mayers, Rodney (San Mateo, CA), filed on , was published online on , according to news reporting originating from Alexandria, Virginia, by NewsRx correspondents.

Patent number 10,341,308 is assigned to Proximic LLC (Reston, Virginia, United States).

The following quote was obtained by the news editors from the background information supplied by the inventors: “Even though the invention is partly described in relation with banner advertisement, the invention is not limited to this field. Rather, the invention can help to improve and control information transmittal between different parties in various fields. E.g., members who contribute to providing their personal information on social networks also want to have control over the dissemination of that information which is required from third parties and need to be transmitted to those third parties.

“Conventional banner advertisement in the Internet uses so-called inline frames (iframes) as placeholders. The publisher (also referred to as first information provider below) who publishes content (also referred to as first information below) on a web page which is visited by Internet users defines advertising space on his web page using a (first) iframe. This (first) iframe is linked to an advertiser (also referred to as second information provider below), either directly or indirectly, e.g. by a so-called ad-server (also referred to as chooser below) or other advertising agents. If it is linked directly, the iframe source is the banner ad from the advertiser. If it is linked indirectly, the first iframe source is a second iframe hosted by the ad-server leading to so-called nested iframes. The ad-server is associated with a number of advertisers and other advertisement agents and usually loads the second iframe source with content containing a banner ad of one of these advertisers in real-time. There are various methods already known in the art of online ad serving as to how the ad-server chooses one of the associated advertisers.

“Thus, in both cases, the first information and the second information will, in the end, appear together for a visitor of the first information provider’s web page.

“The technical reason for using placeholders is to insure that the loading speed of the first information provider’s web page is not negatively affected by the loading speed of the second information. The content served within the placeholder is loaded at the time that the placeholder is rendered. It also allows that placeholder to be controlled, monitored and authenticated by the content provider who is controlling the placeholder. However, the usage of placeholders leads to the second information provider not knowing anything about the first information and/or the first information provider making it impossible to adapt the second information to the first information. As a result, often the second information is not compatible with or able to be affected by the first information. This is not desirable by either information provider.

“Thus, it is desirable to provide a method that allows for the second information provider to provide second information that is compatible with the first information.”

In addition to the background information obtained for this patent, NewsRx journalists also obtained the inventors’ summary information for this patent: “This object is achieved by methods according to the independent claims. Advantageous embodiments are subject-matter of the dependent claims.

“According to a first aspect of the invention, information is bypassed from the first information provider to the second information provider via an information intermediary.

“Advantages of the Invention

“The invention makes it possible that the second information provider receives data regarding the first information. Thus, the second information provider has the possibility to choose the second information that is compatible with and/or affected by the first information.

“The data regarding the first information can be the complete first information, one or more keywords, one or more categories, an extract of the first information, a summary of the first information, other meta data from the first information etc. As mentioned, the choice of which second information (e.g., an advertisement) is to be placed on the first information provider’s web page has to be made by the second information provider in real time. Once a visitor who is interested in the first information visits the first information provider’s web page, the second information is loaded from the second information provider. Thus, at this point in time the second information provider has to choose the relevant compatible second information. However, due to limited bandwidth it is usually not possible to transmit the complete first information both to the interested visitors and to the second information provider(s) (especially if numerous second information providers are associated with a chooser). The invention results in that only few additional data, i.e. a unique identifier uniquely associated with the first information and/or a program code for appending the unique identifier to an URL, has to be transmitted by the first information provider essentially not increasing the bandwidth need and transmitting time. Thus, the first information provider can use the available bandwidth essentially to provide the first information to the interested visitors. If the first information is a web page, the unique identifier preferably comprises the URL of the web page.

“Further advantages are achieved by the information intermediary transmitting the data to the second information. E.g., the second information provider needs not to rely on data that is transmitted by the first information provider itself. The information intermediary can generate the data regarding the first information by independently analyzing the first information, e.g. the publisher’s web page. Thus, a neutral instance representing the analysis derivation is added, which acts as an information intermediary between the first and second information providers increasing e.g. the data reliability, relevancy, comprehensiveness or consistency.

“The unique identifier can be generated by the information intermediary or by the first information provider. In the first case, the unique identifier is transmitted to the first information provider and therefrom to the second information provider. In the latter case, the unique identifier is transmitted from the first information provider to the second information provider. In the end, the unique identifier is transmitted from the second information provider to the information intermediary so that the information intermediary can identify the first information and transmit data regarding the first information to the second information provider.

“It is preferred, that the unique identifier consists of text or is textual encoded, especially base64 encoded or uuencoded, to be easily transmittable over the Internet. Textual encoding schemes are commonly used when there is a need to encode (e.g. binary) data that need to be stored and transferred over media that are designed to deal with textual data, like http requests. Textual encoding of the unique identifier also allows for easily transmitting encrypted identifiers, e.g. by an AES encryption. An encryption increases the data security to mask the actual content source (eg., page location) of the first information.

“If the unique identifier is encrypted with a key that is not known to the second information provider and/or that is only known to the information intermediary, this assures that the data regarding the first information received by the second information provider originate from the (e.g. trusted) information intermediary, increasing the data security and integrity.

“If the unique identifier is generated by the information intermediary, a symmetric encryption method can preferably be used so that the unique identifier is before transmittal encrypted by the information intermediary with a key only known to the information intermediary.

“If the unique identifier is generated by the first information provider, a combination of a symmetric and an asymmetric encryption method can preferably be used so that the unique identifier is before transmittal encrypted by the first information provider with a first key not known to the second information provider and the first key is encrypted by the first information provider with a public key where the associated private key is only known to the information intermediary. Further, the encrypted unique identifier and the encrypted first key are preferably transmitted via the second information provider to the information intermediary.

“The transmittal of the unique identifier from the first information provider to the second information provider is preferably performed by the first information provider inserting program code into his web page, which program code is loaded and run by a visitor’s browser. The program code, when being run, fetches and appends the unique identifier in textual form to a target URL of a placeholder for the second information in the browser memory.

“Advantageously, the invention also solves the problems mentioned above in connection with social networks. Here, the member is referred to as first information provider with the first information being personal data like name, age, nationality, sex, home, job, hobbies, interest categories, pages the user has visited, etc. The second information provider can be e.g. an advertiser which wants to provide compatible ads (so-called targeted ads) or an associate of the social network operator, which wants to provide information or adapt the behavior of the associate system such that is relevant to the first information provider, e.g. information about his home, country, age group, job, hobbies etc. In this case, a neutral instance can act as an information intermediary between the first and second information providers transmitting only the data regarding the first information that is important to choose the second information. Thus, the size of data to be transmitted can be limited and the data privacy of the first information provider can be increased.

“This invention also solves problems with social networks as mentioned above in the additional situation where the associate of the social network operator, which wants to provide information or adapt the behavior of the associate system, may be one or more levels separated from the social network. In this case, relevant information, associated with the first information provider, is protected and maintained with privacy, such that it can be only interpreted by the second information provider for whom the first information is required.

“The invention also can be advantageously be used in connection with mobile application providers (such as gaming applications). In this situation, the handset owner is referred to as first information provider with the first information being personal data like name, age, nationality, sex, home location, current location, hobbies, prior game purchases, play time, interest categories, immediate circle of friends in the game, etc. The second information provider can be e.g. an advertiser which wants to provide compatible ads (so-called targeted ads), or an associate of the mobile game software provider which wants to provide this information that is relevant to the first information provider, or an associate of the mobile network operator which wants to provide this information that is relevant to the first information provider, e.g. information about his home, his location, age group, gaming preferences, hobbies, work, etc. In this case as stated above, a neutral instance can act as an information intermediary between the first and second information providers, irrespective of whether the relationship is a direct or indirect one, transmitting only the data regarding the first information that is important to choose the second information or relevant action. Thus, the size of data to be transmitted is greatly limited and the data privacy surrounding the trusted first information provider can be increased.

“An inventive computer program comprising program code means is configured to perform all steps of one of the inventive methods, when the computer program is run on a computer or a corresponding processing unit, in particular on an inventive apparatus. Suitable non-transitory machine readable media for providing the computer program are particularly floppy disks, hard disks, flash memory, EEPROMs, CD-ROMs, and DVDs etc. A download of a program on computer networks (Internet, Intranet, etc.) is possible.

“Further advantages and embodiments of the invention will become apparent from the description and the appended figures.

“It should be noted that the previously mentioned features and the features to be further described in the following are usable not only in the respectively indicated combination, but also in further combinations or taken alone, without departing from the scope of the present invention.”

The claims supplied by the inventors are:

“What is claimed is:

“1. A method for transmitting information from a first information provider to a second information provider via an information intermediary, the method comprising: receiving, at a first point in time and at the information intermediary, first information from the first information provider; generating a plurality of different types of data regarding the first information, wherein the plurality of different types of data regarding the first information are two or more of an extract of the first information, a summary of the first information, one or more keywords, one or more categories, other meta data about or from the first information, and a compression of the first information; associating and storing the plurality of different types of data regarding the first information with a unique identifier of the first information; receiving, at a second point in time that is after the first point in time and at the information intermediary, a token comprising the unique identifier of the first information and an identifier of the type of data regarding the first information; retrieving, based on the unique identifier of the first information and the identifier of the type of data regarding the first information, the data regarding the first information of the type indicated in the token; and transmitting, from the information intermediary, at least part of the data regarding the first information of the type indicated in the token to the second information provider.

“2. The method of claim 1, wherein the token further comprises a timestamp representing a time that the token was created, and the method further comprises checking that the token has not expired by verifying that the timestamp is before a predetermined time.

“3. The method of claim 1, wherein the token is encrypted, and the method further comprises decrypting the encrypted token to determine the unique identifier of the first information.

“4. The method of claim 3, wherein the token is encrypted using a key not known to the second information provider.

“5. The method of claim 1, wherein the unique identifier of the first information consists of text or is textually encoded.

“6. The method of claim 5, wherein the unique identifier of the first information is base64 encoded.

“7. The method of claim 5, wherein the unique identifier of the first information is unencoded.

“8. The method of claim 1, wherein the token further comprises a signature based on other data included in the token.

“9. The method of claim 1, wherein the token further comprises a version indicator of the token.

“10. A method for transmitting information from a first information provider to a second information provider via an information intermediary, the method comprising: transmitting, from the first information provider, first information to the information intermediary; generating a token comprising an identifier of a type of data and a unique identifier of the first information to identify one or more of a plurality of different types of data regarding the first information generated by the information intermediary, wherein the plurality of different types of data regarding the first information are two or more of an extract of the first information, a summary of the first information, one or more keywords, one or more categories, other meta data about or from the first information, and a compression of the first information; and transmitting, from the first information provider, the token to the second information provider, the token then being transmitted from the second information provider to the information intermediary to identify the data regarding the first information of the type indicated in the token.

“11. The method of claim 10, further comprising encrypting the token comprising the identifier of the type of data and the unique identifier of the first information using a first key received from the information intermediary.

“12. The method of claim 10, wherein transmitting the token to the second information provider comprises including a corresponding program code into a web page, the program code modifying a placeholder for a second information.

“13. The method of claim 10, wherein transmitting the token to the second information provider comprises transmitting the token to the second information provider when a visitor views the first information.

“14. The method of claim 10, wherein transmitting the token to the second information provider comprises appending the token in textual form to a target URL of a placeholder for a second information.

“15. The method of claim 10, wherein transmitting the token to the second information provider comprises forwarding, from the first information provider, the token to an ad server that forwards the token to the second information provider.

“16. The method of claim 10, wherein the token further comprises a signature based on other data included in the token.

“17. The method of claim 10, wherein the token further comprises a version indicator of the token.

“18. A method for transmitting information from a first information provider to a second information provider via an information intermediary, the method comprising: receiving, at the second information provider, a token via the first information provider, the token comprising an identifier of a type of data and a unique identifier of first information to identify one or more of a plurality of different types of data regarding the first information that is generated by the information intermediary, wherein the plurality of different types of data regarding the first information are two or more of an extract of the first information, a summary of the first information, one or more keywords, one or more categories, other meta data about or from the first information, and a compression of the first information; transmitting the token to the information intermediary; and receiving, at the second information provider, at least part of the data regarding the first information of the type indicated in the token from the information intermediary.

“19. The method of claim 18, wherein the token further comprises a signature based on other data included in the token or a version indicator of the token.

“20. The method of claim 18, wherein the token is encrypted using a key not known to the second information provider.”

URL and more information on this patent, see: Pieper, Philipp; Mayers, Rodney. Method For Transmitting Information From A First Information Provider To A Second Information Provider Via An Information Intermediary. U.S. Patent Number 10,341,308, filed , and published online on . Patent URL: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=10,341,308.PN.&OS=PN/10,341,308RS=PN/10,341,308

(Our reports deliver fact-based news of research and discoveries from around the world.)

DISCLOSURE: The views and opinions expressed in this article are those of the authors, and do not represent the views of equities.com. Readers should not consider statements made by the author as formal recommendations and should consult their financial advisor before making any investment decisions. To read our full disclosure, please go to: http://www.equities.com/disclaimer

Comments

Watchlist

Symbol Last Price Change % Change
AAPL

     
AMZN

     
HD

     
JPM

     
IBM

     

INTERVIEW: CEO Dr. Martin Eaton - Heads Up Checkup

Equities.com Host & Contributor Silvia Davi interviewing CEO of Heads Up Checkup, Dr. Martin Eaton.