http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220070033102%22.
PGNR.&OS=DN/20070033102&RS=DN/20070033102
[*QUOTE*]
--------------------------------------------------------------------------
( 1 of 1 )
United States Patent Application
20070033102
Kind Code
A1
Frank; Alexander ; et al.
February 8, 2007
Securely providing advertising subsidized computer usage
Abstract
A method and apparatus for assuring delivery of paid advertising to a user may involve asking a question about an
advertisement or requiring data about the advertisement to be entered. In one embodiment, a human presence indicator, such
as stylized letters, may be displayed during or after the presentation of an advertisement to be copied by a user to indicate
presence during the advertisement. When the challenge relating to ad viewing is correctly answered, a value associated with
viewing the ad may be credited to a user account, either locally or at a clearinghouse or other repository.
Inventors:
Frank; Alexander; (Bellevue, WA) ; Ahdout; Isaac P.; (Bellevue, WA) ; Duffus; James S.;
(Seattle, WA) ; Phillips; Thomas G.; (Bellevue, WA)
Correspondence Name
and Address:
MARSHALL, GERSTEIN & BORUN LLP (MICROSOFT)
233 SOUTH WACKER DRIVE
6300 SEARS TOWER
CHICAGO
IL
60606
US
Assignee Name and
Adress:
MICROSOFT CORPORATION
Redmond
WA
Serial No.:
321668
Series Code:
11
Filed:
December 29, 2005
U.S. Current Class:
705/14
U.S. Class at Publication:
705/014
Intern'l Class:
G06Q 3/00 20060101 G06Q030/00
Claims
1. A method of attestation for paid consumption of advertising on a computer comprising: receiving an advertisement and a
challenge corresponding to the advertisement; displaying the advertisement and the challenge; receiving input from a user
comprising a response to the challenge; analyzing the response against a criteria; and crediting the user with a value
associated with the consumption of the advertisement when the response meets the criteria.
2. The method of claim 1, wherein the displaying the advertisement comprises presenting the advertisement unobstructed by
other display elements over the full screen of the computer.
3. The method of claim 1, wherein the challenge is human discernable and not machine-readable.
4. The method of claim 1, wherein the challenge is a question corresponding to subject matter of the advertisement.
5. The method of claim 1, wherein the challenge is one of an audible segment, a watermark and a graphic including a
stylized combination of characters.
6. The method of claim 1, further comprising processing the response to the challenge at the computer, wherein crediting the
user with the value comprises processing the credit at a secure module in the computer.
7. The method of claim 1, further comprising processing the response to the challenge at the computer, wherein crediting the
user with the value comprises sending a signal to a remote computer to initiate a value credit process.
8. The method of claim 1, further comprising processing the response to the challenge at a remote computer, wherein
crediting the user with the value comprises sending a message comprising value credits from the remote computer to the
computer.
9. The method of claim 1, wherein receiving input from the user comprises receiving input at a secure module for
cryptographically verifying the response to the challenge against a cryptographically protected value corresponding to the
advertisement.
10. The method of claim 9, wherein the cryptographically protected value is at least one of a hash of the correct response, an
encrypted value associated with the correct response, and an encrypted screen coordinate corresponding to a screen location
of the correct response.
11. The method of claim 9, wherein crediting the user with the value associated with the consumption of the advertisement
comprises matching a face recognition value with a user associated with criteria for selection of the advertisement before
crediting the user with the value.
12. The method of claim 9, wherein crediting the user with the value associated with the consumption of the advertisement
comprises crediting the user with value when the cryptographically verifying the response to the challenge is successful.
13. The method of claim 1, further comprising sending the response to the challenge to a server for verification over a secure
channel between the computer and the server, and receiving a provisioning packet from the server for crediting the user with
value when the response to the challenge is verified.
14. The method of claim 1, further comprising linking computer-specific indicia in the advertisement to the computer.
15. The method of claim 1, further comprising determining an action according to a security policy when the response does
not meet the criteria.
16. A computer arranged for use in viewing compensated advertisements comprising: a memory storing an identifier unique
within a scheme; a port for receiving at least one advertisement; a processor coupled to the memory and the port for
executing instructions stored in a computer-readable medium; and a computer-readable medium storing processor executable
instructions for: receiving a message including an advertisement; presenting the advertisement; receiving an input from a
user, the input corresponding to human-discernable information presented corresponding to the advertisement; analyzing the
input against a predetermined criterion; and adding value to a user account when the input matches the predetermined
criterion.
17. The computer of claim 16, wherein the computer-readable medium further stores processor executable instructions for
determining that an indicia in the advertisement matches the identifier.
18. The computer of claim 16, wherein the computer-readable medium further stores processor executable instructions for
limiting the adding value to a user account according to a policy governing an maximum added value in a time period.
19. A computer-readable medium having computer executable instructions for implementing a method of determining
consumption of a targeted advertisement by a human comprising: collecting data corresponding to user preferences;
receiving the targeted advertisement including an indicia and a criterion for proving consumption of the targeted
advertisement; displaying the targeted advertisement including the indicia; receiving an input from a user based on the
indicia; determining when the input matches the criterion; and adding value to a user account when the input matches the
criterion.
20. The computer-readable medium having computer executable instructions of claim 19, further comprising: transferring a
cryptographic secret to the computer for use in determining when the input matches the criterion, performing a cryptographic
operation using the secret on at least one of the input and the criterion when determining when the input matches the
criterion.
Description
[0001] This application is a continuation-in-part of U.S. patent application Ser. No. 11/092,041, filed Mar. 29, 2005, which
is incorporated by reference for all purposes.
BACKGROUND
[0002] A service provider such as a telephone company, an Internet service provider, or a leasing company may provide
computer systems or components to users at a reduced charge or for free in exchange for viewing advertising, especially
targeted advertising, as is discussed in the above-cited priority document. Resources on the computer system itself, such as
the operating system, may identify user characteristics and interests based on information stored on the computer. A user
profile may be developed using information such as music preference, language, and game usage. User profile data may be
shared with an advertising provider, either directly, or through the service provider, to allow development of targeted
advertising for presentation on the computer system when the computer system is both online and off-line.
[0003] The value to an advertiser is not, however, in delivering the advertisement to the computer. The value is realized
when a human viewer consumes the advertisement and the particular message of the advertisement is conveyed to a user.
The consumption of an advertisement by a human user is even more important when one option for paying for the subsidized
computer is through the delivery of paid advertising. Attestation of delivery may be challenging. Simply presenting the
advertisement offers little or no assurance that the ad was consumed by a human. Even verifying the presence of a user, e.g.
by use of a camera, may provide assurance that someone is there, but not necessarily that he or she is paying attention to the
advertisement.
SUMMARY
[0004] In order to attest consumption of advertising by a human, preferably a member of the target population, several
mechanisms may be employed. After gathering data about a user, the targeted advertising containing both a challenge and a
correct response may be presented to the user. During or after the presentation of the ad, the challenge, may be presented.
The challenge may be a question about the content of the ad (who was driving the car?) or presentation of unrelated data (the
response number is 213). The user may enter a response to the challenge. The response may be processed locally, for
example, in a cryptographic unit. When the correct response is not included in the advertisement, the user's response may be
signed, encrypted, or both, and sent to a server for verification. When the response is verified, value may be added to a user
account. The value may be used for extending a usage period for the computer, or may be stored as points and used for
subsequent purchases. When processed locally, the advertisement itself may contain a provisioning packet for use in
updating the user's value account. In other embodiments, successful verification of the response, either locally or at a server,
may cause a provisioning packet to be generated and sent to the user's computer or other electronic device.
BRIEF DESCRIPTION OF THE DRAWINGS
[0005] FIG. 1 is a simplified and representative block diagram of a computer network;
[0006] FIG. 2 is a block diagram of a computer that may be connected to the network of FIG. 1;
[0007] FIG. 3 is a representation of targeted advertising data;
[0008] FIG. 4 is a flow chart of a method of attestation for paid consumption of advertising on a computer; and
[0009] FIG. 5 is an example of a "human is present" graphic.
DETAILED DESCRIPTION
[0010] Although the following text sets forth a detailed description of numerous different embodiments, it should be
understood that the legal scope of the description is defined by the words of the claims set forth at the end of this disclosure.
The detailed description is to be construed as exemplary only and does not describe every possible embodiment since
describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be
implemented, using either current technology or technology developed after the filing date of this patent, which would still
fall within the scope of the claims.
[0011] It should also be understood that, unless a term is expressly defined in this patent using the sentence "As used herein,
the term `______` is hereby defined to mean . . . " or a similar sentence, there is no intent to limit the meaning of that term,
either expressly or by implication, beyond its plain or ordinary meaning, and such term should not be interpreted to be
limited in scope based on any statement made in any section of this patent (other than the language of the claims). To the
extent that any term recited in the claims at the end of this patent is referred to in this patent in a manner consistent with a
single meaning, that is done for sake of clarity only so as to not confuse the reader, and it is not intended that such claim term
by limited, by implication or otherwise, to that single meaning. Finally, unless a claim element is defined by reciting the
word "means" and a function without the recital of any structure, it is not intended that the scope of any claim element be
interpreted based on the application of 35 U.S.C. .sctn. 112, sixth paragraph.
[0012] Much of the inventive functionality and many of the inventive principles are best implemented with or in software
programs or instructions and integrated circuits (ICs) such as application specific ICs. It is expected that one of ordinary
skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current
technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily
capable of generating such software instructions and programs and ICs with minimal experimentation. Therefore, in the
interest of brevity and minimization of any risk of obscuring the principles and concepts in accordance to the present
invention, further discussion of such software and ICs, if any, will be limited to the essentials with respect to the principles
and concepts of the preferred embodiments.
[0013] FIGS. 1 and 2 provide a structural basis for the network and computational platforms related to the instant
disclosure.
[0014] FIG. 1 illustrates a network 10 that may be used to support an advertising compensation system. The network 10 may
be the Internet, a virtual private network (VPN), or any other network that allows one or more computers, communication
devices, databases, etc., to be communicatively connected to each other. The network 10 may be connected to a personal
computer 12 and a computer terminal 14 via an Ethernet 16 and a router 18, and a landline 20. On the other hand, the
network 10 may be wirelessly connected to a laptop computer 22 and a personal data assistant 24 via a wireless
communication station 26 and a wireless link 28. Similarly, a server 30 may be connected to the network 10 using a
communication link 32 and a mainframe 34 may be connected to the network 10 using another communication link 36.
[0015] FIG. 2 illustrates a computing device in the form of a computer 110. Components of the computer 110 may include,
but are not limited to a processing unit 120, a system memory 130, and a system bus 121 that couples various system
components including the system memory to the processing unit 120. The system bus 121 may be any of several types of bus
structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus
architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus,
Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local
bus, and Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus.
[0016] The computer 110 may also include a cryptographic unit 125. Briefly, the cryptographic unit 125 has a calculation
function that may be used to verify digital signatures, calculate hashes, digitally sign hash values, and encrypt or decrypt
data. The cryptographic unit 125 may also have a protected, or secure memory 126 for storing keys and other secret data. In
addition, the cryptographic unit 125 may include an RNG (random number generator) which is used to provide random
numbers. In other embodiments, the functions of the cryptographic unit may be instantiated in software or firmware and may
run via the operating system or on a device.
[0017] Computer 110 typically includes a variety of computer readable media. Computer readable media can be any
available media that can be accessed by computer 110 and includes both volatile and nonvolatile media, removable and
non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage
media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable
media implemented in any method or technology for storage of information such as computer readable instructions, data
structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM,
FLASH memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage,
magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can
be used to store the desired information and which can accessed by computer 110. Communication media typically
embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as
a carrier wave or other transport mechanism and includes any information delivery media. The term "modulated data signal"
means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the
signal. By way of example, and not limitation, communication media includes wired media such as a wired network or
direct-wired connection, and wireless media such as acoustic, radio frequency, infrared and other wireless media.
Combinations of any of the above should also be included within the scope of computer readable media.