CA2610438A1 - Fraud prevention and detection for online advertising - Google Patents
Fraud prevention and detection for online advertising Download PDFInfo
- Publication number
- CA2610438A1 CA2610438A1 CA 2610438 CA2610438A CA2610438A1 CA 2610438 A1 CA2610438 A1 CA 2610438A1 CA 2610438 CA2610438 CA 2610438 CA 2610438 A CA2610438 A CA 2610438A CA 2610438 A1 CA2610438 A1 CA 2610438A1
- Authority
- CA
- Canada
- Prior art keywords
- identifier
- unique
- request
- publisher
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0248—Avoiding fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
Abstract
A system and a method are disclosed for detecting and preventing fraud in online advertising environments. In one embodiment, the system and process include a publisher with a web page with which an advertisement set and a unique request identifier are sent to a user browser when the user requests the web page. The unique request identifier is unique, publisher specific, advertisement specific, for a single instance. A database keeps track of the unique request identifier so that when a user "clicks" on a link to access an advertiser's web site, the unique request identifier associated with the advertisement can be checked against the unique request identifier in the database to determine whether the "click"
was one that may be non-fraudulent or valid.
was one that may be non-fraudulent or valid.
Description
FRAUD PREVENTION AND DETECTION FOR ONLINE ADVERTISING
INVENTORS:
RICHARD BRINDLEY
TOBY DOIG
BACKGROUND OF THE INVENTION
1. FIELD OF THE INVENTION
[0001] The present invention generally relates to the field of online advertising, and more specifically, to fraud avoidance and/or detection for online advertisement.
l0 2. DESCRIPTION OF THE RELATED ART
INVENTORS:
RICHARD BRINDLEY
TOBY DOIG
BACKGROUND OF THE INVENTION
1. FIELD OF THE INVENTION
[0001] The present invention generally relates to the field of online advertising, and more specifically, to fraud avoidance and/or detection for online advertisement.
l0 2. DESCRIPTION OF THE RELATED ART
[0002] Conventional online advertising in the context of pay per click is known. A
conventional set up includes a publisher that supplies web content on web pages and an advertiser that advertises on the web page. In this arrangement, an advertiser typically has a uniform resource locator (URL) link on the web page. An end user clicks on when that end user browses the publisher's web page if that end user is interested in the advertiser's link.
For each click through, the advertiser pays the publisher some predetermined amount that may be purchased real time, on credit, or some other financial arrangement that pays on a per click or group of click basis.
conventional set up includes a publisher that supplies web content on web pages and an advertiser that advertises on the web page. In this arrangement, an advertiser typically has a uniform resource locator (URL) link on the web page. An end user clicks on when that end user browses the publisher's web page if that end user is interested in the advertiser's link.
For each click through, the advertiser pays the publisher some predetermined amount that may be purchased real time, on credit, or some other financial arrangement that pays on a per click or group of click basis.
[0003] A problem with such conventional online advertising is that it is susceptible to fraud. One example of fraud is referred to as competitive fraud. In competitive fraud a competitor (or other organization whose interests are not aligned with the advertiser) may harvest from a webpage click URL addresses of advertisers. Specifically, the competitor may employ individuals to click on the links of other advertisers on a web page so that those advertisers ends up with a large financial bill to each advertiser with no associated sales for any of them, which results in financial loss.
[0004] Another problem with conventional online advertising is click fraud. In some advertising arrangements, a publisher may be paid on a per click basis for an advertisement so that each click on an advertiser's URL on a web page results in revenue for the publisher.
With click fraud, to maximize revenue a publisher may employ individuals or technology such as bots to trigger click throughs on a web page. Again, this results in a large financial bill to the advertiser from the publisher and no associated sales for the advertiser, which results in financial loss.
With click fraud, to maximize revenue a publisher may employ individuals or technology such as bots to trigger click throughs on a web page. Again, this results in a large financial bill to the advertiser from the publisher and no associated sales for the advertiser, which results in financial loss.
[0005] Hence, there is a need for a system and a method for detecting and preventing fraud in online advertising environments to allow advertisers and publishers to track fraudulent conditions and take appropriate corrective action.
SUMMARY OF THE INVENTION
[00061 The present invention includes a system (and a method) for detecting and 1o preventing fraud for online advertising. In one embodiment the system tracks activity associated with a web site. The system receives, from a requester, a request for information to supplement content on the web site. The request includes a unique request identifier and a publisher identifier. The system retrieves a unique information identifier.
The unique information identifier includes information unique to the request for one instance. The system generates a unique request identifier. The unique request identifier includes the unique information identifier. The system transmits the unique request identifier to the requester and logs the unique request identifier and the publisher identifier in a database for later comparison.
[0007] Subsequently, the system receives the unique resource identifier and the unique information identifier when information that was transmitted to the requester was selected by the requestor when the requestor is on the web site. Upon receipt of this information from the requestor, the system validates the unique information identifier and either logs it as valid or invalid. In particular, the system compares the received the unique resource identifier and the unique information identifier with the logged unique resource identifier and the unique information identifier to determine if they were previously paired. If they were previously paired, the request is invalid and if not previously paired, the request is valid. If the unique information identifier is logged as invalid, the response is sent back to the requester indicating as such. If it is logged as valid, the system redirects the requester to a second URL in response to logging a valid unique information identifier.
[0008] An advantage of the present invention includes providing additional information, e.g., an advertisement, in a manner that includes an identifier of that information and the URL of the web site with which it is associated so that when that infonmation is selected it can be paired (or matched) with stored identifier data to detenmine whether the selection is "valid." Thus, the information is verifiable, or auditable, for applications that would benefit from such data, for example, advertisement providers or purchasers associated with content on a web site. Such data would then be used to identify whether clicks on a web site are fraudulent due to activity from, for example, a click harvesting mechanism.
[0009] The features and advantages described in the specification are not all inclusive and, in particular, many additional features and advantages will be apparent to one of ordinary skill in the art in view of the drawings, specification, and claims. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter.
BRIEF DESCRIPTION OF THE DRAWINGS
[0010] The invention has other advantages and features which will be more readily apparent from the following detailed description of the invention and the appended claims, when taken in conjunction with the accompanying drawings, in which:
100111 Figure (FIG.) 1 a illustrates one embodiment of a generational operational architecture for a fraud prevention and detection system.
[0012] Figure lb illustrates one embodiment of an advertisement (advert) generation and reconciliation system.
[0013] Figure 2 illustrates one embodiment of a client-server interaction for advertisement (advert) generation.
[00141 Figure 3 illustrates one embodiment for advertisement presentation in a configuration as disclosed.
[0015] Figure 4 illustrates one embodiment of click reconciliation in a configuration as disclosed.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0016] The Figures (FIGS.) and the following description relates to preferred embodiments by way of illustration only. It should be noted that from the following discussion, alternative embodiments of the structures and methods disclosed herein will be readily recognized as viable alternatives that may be employed without departing from the principles of the claimed invention.
[0017] Reference will now be made in detail to several embodiments, examples of which are illustrated in the accompanying figures. It is noted that wherever practicable similar or like reference numbers may be used in the figures and may indicate similar or like functionality. The figures depict embodiments for purposes of illustration only. One skilled in the art will readily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the described herein.
[0018] For ease of discussion, embodiments of the system (or method) are described in the context of advertisement generation, for placement on a web page, and subsequent selection and reconciliation of that generated advertisement to determine whether such selection was a valid or invalid selection. It is noted that the principles disclosed herein are also applicable to other configurations that generate a specific instance of information, forward that information, allow selection of that information, and validate that information through a reconciliation process.
[0019] Referring now to Figure Ia, it illustrates one embodiment of a general operational architecture for a fraud prevention and detection system. The architecture includes an advertiser 110, a publisher 120, and a fraud monitor 130. The advertiser 110 is configured to purchase click advertisements on a web page (or web site). The publisher 120 provides content on the web page and sells the click advertisements, e.g., to the advertiser 110. Typically, the publisher 120 sells the click advertisement to the advertiser 110 on a "per click" or per set of clicks basis. The publisher I 10 logs each click (or selection) or each set of clicks (selections) on the web page to charge it back to the advertiser 110.
[0020] In one embodiment, the publisher 120 is a host or web server on the Internet. In such embodiments, the publisher 120 allows for the content to be accessed by a client computing system (client system, computer and/or site) through a browser (e.g., Microsoft Intemet Explorer or Mozilla Firefox) on the client system. Subsequently, a user at the client system may select one or more of the advertisements of the advertiser 110 on the publisher's web page by "clicking" on that advertisement. However, the advertisements of the advertiser 110 on the publisher's web page may be continuously selected over and over either accidentally or maliciously. Moreover, a computing mechanism such as a "bot"
may be configured to continuously select the advertisement. In such instances, the advertiser 110 is charged a fee for each time the advertisement is selected. Thus, to combat such activity the fraud monitor 120 is configured within an embodiment of a system and a process to detect, report, and for/or prevent it.
[0021] The fraud monitor 130 is configured to monitor and report on click activity.
Further, the fraud monitor 130 can be configured to generate advertisement sets that allow for subsequent reconciliation for monitoring (or auditing) when any of the advertisements in the set are selected. In one embodiment, selection of an advertisement can be reconciled as described herein, the selection is considered to be valid; else it is considered to be invalid.
Thus, in one embodiment, the fraud monitor 130 may be configured as an advertisement generation and reconciliation system.
[0022] Figure lb illustrates one embodiment of an advertisement (advert) generation and reconciliation system in accordance with the present invention. The advertisement generation and reconciliation system may be configured as a web server on a host (or server) side of a client-server processing configuration. The web server may be a configuration of one or more physical and/or logical computing machines configured to provide processing power, including processor(s), memory, storage, operating system, software for execution and the like.
[0023] The advertisement generation and reconciliation system includes an advertisement identifier engine 140, an advertisement database 145, a request identifier engine 150, a code (generation) engine 155, a log engine 160, a generated log database 165, a validation engine 170, a validation log database 175, and a command engine 180. These components are communicatively coupled together through a data bus 190. It is noted that the data bus 190 may be wired or wireless and that the communications coupling may be direct (e.g., physical) or indirect (e.g., logical). Operation of the components is further described with reference to Figures 2 through 4.
[0024] Turning to Figure 2, it illustrates one embodiment of a client-server interaction for advertisement generation in accordance with the present invention. The process configuration includes client-side processing 205 and server side processing 225 'that are communicatively coupled through a communications medium, for example, the Internet 210 or an Intranet. In one embodiment, the client side processing 205 includes a client system that executes a web browser and the server side processing 225 includes one or more web servers configured to execute processes as further described below.
[0025] The illustrated process starts with a user viewing 220 a web page on a client system (e.g., a browser on a client computer). In the web page is an embedded advertising jo link (or links). The process continues with receipt of a request from the client system (e.g., user clicks on a link as the web page displayed in the browser) to serve the embedded advertising link as well as the uniform resource locator (URL) of the web page (referrer URL). Specifically, in one embodiment the client system forwards an identification of the publisher 120, or publisher identifier, to the web server identify the publisher 120 web page (or site) into which the advertising link(s) are to be served.
[0026] When the web server receives the request, it determines through the advertisements identifier engine 140 which set of advertisements from the advertisement database 145 to return for dispiay. The set of advertisements may be one advertisement or two or more advertisements. Each advertisement has a unique advertisement identifier that is also retrieved 225 from the advertisement database 145.
[00271 The process continues with calculating 230 a"URL hash" of the referrer URL.
As an example, the referrer URL is a URL an end user types into a browser in an attempt to access a web page at that URL address. The calculated 230 URL hash is a one-way hash of the referrer URL of the web page into which the advertising link(s) are to be served. In addition, for each advertisement, the process generates 235 a unique advertisement view identifier. In one embodiment, the unique advertisement view identifier is a globally unique identifier (GUID), which can be a pseudo-random number generated to be unique for each unique web page and each unique advertisement identifier. The paired unique advertisement identifier and the unique advertisement view identifier provide a fingerprint for a single instance of the serving of a specific advertisement, which is later reconciled 420.
SUMMARY OF THE INVENTION
[00061 The present invention includes a system (and a method) for detecting and 1o preventing fraud for online advertising. In one embodiment the system tracks activity associated with a web site. The system receives, from a requester, a request for information to supplement content on the web site. The request includes a unique request identifier and a publisher identifier. The system retrieves a unique information identifier.
The unique information identifier includes information unique to the request for one instance. The system generates a unique request identifier. The unique request identifier includes the unique information identifier. The system transmits the unique request identifier to the requester and logs the unique request identifier and the publisher identifier in a database for later comparison.
[0007] Subsequently, the system receives the unique resource identifier and the unique information identifier when information that was transmitted to the requester was selected by the requestor when the requestor is on the web site. Upon receipt of this information from the requestor, the system validates the unique information identifier and either logs it as valid or invalid. In particular, the system compares the received the unique resource identifier and the unique information identifier with the logged unique resource identifier and the unique information identifier to determine if they were previously paired. If they were previously paired, the request is invalid and if not previously paired, the request is valid. If the unique information identifier is logged as invalid, the response is sent back to the requester indicating as such. If it is logged as valid, the system redirects the requester to a second URL in response to logging a valid unique information identifier.
[0008] An advantage of the present invention includes providing additional information, e.g., an advertisement, in a manner that includes an identifier of that information and the URL of the web site with which it is associated so that when that infonmation is selected it can be paired (or matched) with stored identifier data to detenmine whether the selection is "valid." Thus, the information is verifiable, or auditable, for applications that would benefit from such data, for example, advertisement providers or purchasers associated with content on a web site. Such data would then be used to identify whether clicks on a web site are fraudulent due to activity from, for example, a click harvesting mechanism.
[0009] The features and advantages described in the specification are not all inclusive and, in particular, many additional features and advantages will be apparent to one of ordinary skill in the art in view of the drawings, specification, and claims. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter.
BRIEF DESCRIPTION OF THE DRAWINGS
[0010] The invention has other advantages and features which will be more readily apparent from the following detailed description of the invention and the appended claims, when taken in conjunction with the accompanying drawings, in which:
100111 Figure (FIG.) 1 a illustrates one embodiment of a generational operational architecture for a fraud prevention and detection system.
[0012] Figure lb illustrates one embodiment of an advertisement (advert) generation and reconciliation system.
[0013] Figure 2 illustrates one embodiment of a client-server interaction for advertisement (advert) generation.
[00141 Figure 3 illustrates one embodiment for advertisement presentation in a configuration as disclosed.
[0015] Figure 4 illustrates one embodiment of click reconciliation in a configuration as disclosed.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0016] The Figures (FIGS.) and the following description relates to preferred embodiments by way of illustration only. It should be noted that from the following discussion, alternative embodiments of the structures and methods disclosed herein will be readily recognized as viable alternatives that may be employed without departing from the principles of the claimed invention.
[0017] Reference will now be made in detail to several embodiments, examples of which are illustrated in the accompanying figures. It is noted that wherever practicable similar or like reference numbers may be used in the figures and may indicate similar or like functionality. The figures depict embodiments for purposes of illustration only. One skilled in the art will readily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the described herein.
[0018] For ease of discussion, embodiments of the system (or method) are described in the context of advertisement generation, for placement on a web page, and subsequent selection and reconciliation of that generated advertisement to determine whether such selection was a valid or invalid selection. It is noted that the principles disclosed herein are also applicable to other configurations that generate a specific instance of information, forward that information, allow selection of that information, and validate that information through a reconciliation process.
[0019] Referring now to Figure Ia, it illustrates one embodiment of a general operational architecture for a fraud prevention and detection system. The architecture includes an advertiser 110, a publisher 120, and a fraud monitor 130. The advertiser 110 is configured to purchase click advertisements on a web page (or web site). The publisher 120 provides content on the web page and sells the click advertisements, e.g., to the advertiser 110. Typically, the publisher 120 sells the click advertisement to the advertiser 110 on a "per click" or per set of clicks basis. The publisher I 10 logs each click (or selection) or each set of clicks (selections) on the web page to charge it back to the advertiser 110.
[0020] In one embodiment, the publisher 120 is a host or web server on the Internet. In such embodiments, the publisher 120 allows for the content to be accessed by a client computing system (client system, computer and/or site) through a browser (e.g., Microsoft Intemet Explorer or Mozilla Firefox) on the client system. Subsequently, a user at the client system may select one or more of the advertisements of the advertiser 110 on the publisher's web page by "clicking" on that advertisement. However, the advertisements of the advertiser 110 on the publisher's web page may be continuously selected over and over either accidentally or maliciously. Moreover, a computing mechanism such as a "bot"
may be configured to continuously select the advertisement. In such instances, the advertiser 110 is charged a fee for each time the advertisement is selected. Thus, to combat such activity the fraud monitor 120 is configured within an embodiment of a system and a process to detect, report, and for/or prevent it.
[0021] The fraud monitor 130 is configured to monitor and report on click activity.
Further, the fraud monitor 130 can be configured to generate advertisement sets that allow for subsequent reconciliation for monitoring (or auditing) when any of the advertisements in the set are selected. In one embodiment, selection of an advertisement can be reconciled as described herein, the selection is considered to be valid; else it is considered to be invalid.
Thus, in one embodiment, the fraud monitor 130 may be configured as an advertisement generation and reconciliation system.
[0022] Figure lb illustrates one embodiment of an advertisement (advert) generation and reconciliation system in accordance with the present invention. The advertisement generation and reconciliation system may be configured as a web server on a host (or server) side of a client-server processing configuration. The web server may be a configuration of one or more physical and/or logical computing machines configured to provide processing power, including processor(s), memory, storage, operating system, software for execution and the like.
[0023] The advertisement generation and reconciliation system includes an advertisement identifier engine 140, an advertisement database 145, a request identifier engine 150, a code (generation) engine 155, a log engine 160, a generated log database 165, a validation engine 170, a validation log database 175, and a command engine 180. These components are communicatively coupled together through a data bus 190. It is noted that the data bus 190 may be wired or wireless and that the communications coupling may be direct (e.g., physical) or indirect (e.g., logical). Operation of the components is further described with reference to Figures 2 through 4.
[0024] Turning to Figure 2, it illustrates one embodiment of a client-server interaction for advertisement generation in accordance with the present invention. The process configuration includes client-side processing 205 and server side processing 225 'that are communicatively coupled through a communications medium, for example, the Internet 210 or an Intranet. In one embodiment, the client side processing 205 includes a client system that executes a web browser and the server side processing 225 includes one or more web servers configured to execute processes as further described below.
[0025] The illustrated process starts with a user viewing 220 a web page on a client system (e.g., a browser on a client computer). In the web page is an embedded advertising jo link (or links). The process continues with receipt of a request from the client system (e.g., user clicks on a link as the web page displayed in the browser) to serve the embedded advertising link as well as the uniform resource locator (URL) of the web page (referrer URL). Specifically, in one embodiment the client system forwards an identification of the publisher 120, or publisher identifier, to the web server identify the publisher 120 web page (or site) into which the advertising link(s) are to be served.
[0026] When the web server receives the request, it determines through the advertisements identifier engine 140 which set of advertisements from the advertisement database 145 to return for dispiay. The set of advertisements may be one advertisement or two or more advertisements. Each advertisement has a unique advertisement identifier that is also retrieved 225 from the advertisement database 145.
[00271 The process continues with calculating 230 a"URL hash" of the referrer URL.
As an example, the referrer URL is a URL an end user types into a browser in an attempt to access a web page at that URL address. The calculated 230 URL hash is a one-way hash of the referrer URL of the web page into which the advertising link(s) are to be served. In addition, for each advertisement, the process generates 235 a unique advertisement view identifier. In one embodiment, the unique advertisement view identifier is a globally unique identifier (GUID), which can be a pseudo-random number generated to be unique for each unique web page and each unique advertisement identifier. The paired unique advertisement identifier and the unique advertisement view identifier provide a fingerprint for a single instance of the serving of a specific advertisement, which is later reconciled 420.
[0028] The process continues with the code engine 155 assembling 240 a response payload for the client system. The response payload comprises executable code, e.g., Javascript, that includes the publisher identifier, the URL hash, the unique advertisement identifier, and a hash of the corresponding unique advertisement view identifier. The hash of the unique advertisement view identifier also may be referred to as a GUIDhash. Once assembled, the response payload is sent 245 by the web server to the client system.
[0029] The client system receives the executable code, which contains the publisher identifier, URL hash, and the set of unique advertisement identifiers and corresponding unique advertisement view identifier pairs, along with the contents and format of the link (or 1o links) to be displayed and a URL pointing to a click handling page, and displays 250 the appropriate advertisements therein on the web page in the browser. When a link is selected by a user (as further described herein) the browser on the client system can execute the executable code, redirect the browser to the URL pointing to the click handling page.
[0030] Note in one embodiment the process writes the publisher identifier, the URL hash, the unique advertisement identifier, and a hash of the corresponding unique advertisement view identifier to database, e.g., a valid link table. The log engine 160 logs 255 this data for storage 260 in the generated log database 165 for later access.
In addition, it is noted that the valid link table is periodically replicated to a back-end statistics server.
[0031] Turning to Figure 3, it illustrates one embodiment of advertisement interaction in accordance with the present invention. Referring first to the client side processing 205, a process is executed in conjunction with the executable code received from the server side processing 225. Specifically, the process displays the link (or links) and asserts a mouse over 310 (e.g., OnMouseOver) and click (e.g., OnClick) event trap on each link. The mouse over 310 includes moving a pointing device (e.g., mouse, trackball, computing pen, etc.) cursor over a link (e.g., advertisement link) in the browser.
[0032] If the pointer over event fires (or triggers) the process enables 320 a click on advertisement corresponding to the unique advertisement identifier by setting the link to active and clickable by a status flag. When the user "clicks" (selects or triggers) 315, the advertisement link in the browser, the process determines 325 if the click has been enabled (i.e., a selection has been made). Specifically, if a click event fires (or triggers) the process checks to determine if the pointer over event has fired. If no click was enabled, the process ignores 330 the click and does nothing.
[0029] The client system receives the executable code, which contains the publisher identifier, URL hash, and the set of unique advertisement identifiers and corresponding unique advertisement view identifier pairs, along with the contents and format of the link (or 1o links) to be displayed and a URL pointing to a click handling page, and displays 250 the appropriate advertisements therein on the web page in the browser. When a link is selected by a user (as further described herein) the browser on the client system can execute the executable code, redirect the browser to the URL pointing to the click handling page.
[0030] Note in one embodiment the process writes the publisher identifier, the URL hash, the unique advertisement identifier, and a hash of the corresponding unique advertisement view identifier to database, e.g., a valid link table. The log engine 160 logs 255 this data for storage 260 in the generated log database 165 for later access.
In addition, it is noted that the valid link table is periodically replicated to a back-end statistics server.
[0031] Turning to Figure 3, it illustrates one embodiment of advertisement interaction in accordance with the present invention. Referring first to the client side processing 205, a process is executed in conjunction with the executable code received from the server side processing 225. Specifically, the process displays the link (or links) and asserts a mouse over 310 (e.g., OnMouseOver) and click (e.g., OnClick) event trap on each link. The mouse over 310 includes moving a pointing device (e.g., mouse, trackball, computing pen, etc.) cursor over a link (e.g., advertisement link) in the browser.
[0032] If the pointer over event fires (or triggers) the process enables 320 a click on advertisement corresponding to the unique advertisement identifier by setting the link to active and clickable by a status flag. When the user "clicks" (selects or triggers) 315, the advertisement link in the browser, the process determines 325 if the click has been enabled (i.e., a selection has been made). Specifically, if a click event fires (or triggers) the process checks to determine if the pointer over event has fired. If no click was enabled, the process ignores 330 the click and does nothing.
[0033] If the click event fires and the pointer over event has been fired, the process generates a destination URL containing the destination URL of the click handling page on the web server and a query string containing the unique advertisement identifier, the unique advertisement view identifier, the publisher identifier, the URL hash. In one embodiment, the process opens 335 a new instance of the browser (a window or a tab) that targets the destination URL. In one embodiment, a user can observe this new instance of the browser beginning with a blank screen. The unique advertisement identifier, the unique advertisement view identifier, the publisher identifier, the URL hash are sent from the browser to the web server on the server side processing 225.
[0034] On the server side processing 225, the web server receives the page call with information from the client side processing 205. The validation engine 170 in the web server looks up the unique advertisement identifier in its valid advertisement list to determine 340 if the advertisement is valid and to retrieve the valid advertisement destination URL. The process determines that the advertisement is valid by determining whether the unique advertiser identifier is valid. In one embodiment they are one-to-one linked.
If the unique advertiser identifier is not valid, the process logs 345 the invalid unique advertisement identifier, the publisher identifier, and the URL hash for storage in the validation log database 175. The command engine 180 then sends 350 a window (or tab) close command to the browser on the client system. This closes 360 the browser window on the client system.
[0035] If the advertisement is valid, the validation engine 170 logs 365 the valid unique advertisement identifier, the hash of the unique advertisement view identifier (GUIDhash), the publisher identifier, and the hash of the referrer URL (URL hash) in the validation log database 175. It is noted that the validation log database 175 can be configured to function as a back end statistics database. The command engine 180 then sends 370 a command to the browser on the client system to redirect 375 the browser to the target URL, which is a valid advertisement destination URL.
[0036] In one embodiment, the process logs 365 the valid unique advertisement identifier as a "click token" that corresponds to the publisher identifier, the unique advertisement identifier, a hash of the unique advertisement view identifier (GUII~ hash) and the hash of the referrer URL (URI, hash). Periodically, the table of "click tokens" is replicated to the validation log database 175 (e.g., a back-end statistics database).
[0034] On the server side processing 225, the web server receives the page call with information from the client side processing 205. The validation engine 170 in the web server looks up the unique advertisement identifier in its valid advertisement list to determine 340 if the advertisement is valid and to retrieve the valid advertisement destination URL. The process determines that the advertisement is valid by determining whether the unique advertiser identifier is valid. In one embodiment they are one-to-one linked.
If the unique advertiser identifier is not valid, the process logs 345 the invalid unique advertisement identifier, the publisher identifier, and the URL hash for storage in the validation log database 175. The command engine 180 then sends 350 a window (or tab) close command to the browser on the client system. This closes 360 the browser window on the client system.
[0035] If the advertisement is valid, the validation engine 170 logs 365 the valid unique advertisement identifier, the hash of the unique advertisement view identifier (GUIDhash), the publisher identifier, and the hash of the referrer URL (URL hash) in the validation log database 175. It is noted that the validation log database 175 can be configured to function as a back end statistics database. The command engine 180 then sends 370 a command to the browser on the client system to redirect 375 the browser to the target URL, which is a valid advertisement destination URL.
[0036] In one embodiment, the process logs 365 the valid unique advertisement identifier as a "click token" that corresponds to the publisher identifier, the unique advertisement identifier, a hash of the unique advertisement view identifier (GUII~ hash) and the hash of the referrer URL (URI, hash). Periodically, the table of "click tokens" is replicated to the validation log database 175 (e.g., a back-end statistics database).
[0037] The process of validating a unique advertisement identifier includes a reconciliation process that compares the data received from the browser on the client system with the previously stored data in the generated logged database 165 on the server side system. Figure 4 illustrates one embodiment of a click reconciliation process in accordance with the present invention.
[0038] Initially, a set of unique advertisement identifiers, the publisher identifier, GUIDhashes, and URL hash are processed 410 for each "click" (or selection or trigger) 415 from a collated click log file (or files). In one embodiment, processing includes the steps in 415 through 445 in a "for each" loop. The information is logged in the log database shown in, for example, Figure 2. In addition, the process obtains access 425 to the validation log database 175 of valid unique advertisement identifiers, publisher identifiers, GUIDhashes, and URL hash. In particular, the validation log database 175 provides a back-end statistics database that maintains a list of all valid unique advertisement identifier and GUIDhash pairs issued within a predefined rolling time period which is derived from the valid link tables of the generated log database 165 from the web servers.
[0039] By referring to the entries in the validation log database 175, the process determines 420 whether the unique advertisement identifier and the GUIDhash matches 420 an entry in the validation log database 175 (e.g., a "fingerprint"). In one embodiment, a "click token" from the validation log database is checked to determine if it corresponds to a valid unique advertisement identifier and GUID hash entry in the generated log database.
[0040] If there is no match between the pairs of entries, the process logs 430 the invalid unique advertisement identifier, publisher identifier, and URL hash click information into a database. The data can be structured for dissemination through a report function. If there is a match, i.e., the two entries are appropriately paired, the process determines 435 if the pair has already been counted. For example, the process determines if a link relating to advertising associated with the pair has already been served.
[0041] If the unique advertisement identifier and GUIDhash pair is valid (i.e., they match) and the link has not previously been served, the process (e.g., through a statistics server) logs (or counts) 445 the activation as a valid click for a revenue reporting perspective against the publisher identifier. If the unique advertisement identifier and GUID hash pair is invalid, or this link has previously been served, the process logs 440 into a database, e.g., an invalid click table, information that includes the publisher identifier, click details, and time and date stamp of the invalid click.
[0042] The process monitors the invalid click database (or table) on a predetermined time (or periodic) basis to respond to occurrences of invalid clicks based on predefined thresholds. Based on the rules (e.g., user defined system pre-defined) governing the predefined threshold, the process executes pre-defined actions associated with the rules. For example, the rules can be structured so that when the predefined thresholds are exceeded a warning communication is transmitted to a machine that monitors transactions.
[0043] An advantage of the present invention includes providing additional information, e.g., an advertisement, in a manner that includes an identifier of that information and the URL of the web site with which it is associated so that when that information is selected it can be pair (or matched) with stored identifier data to determine whether the selection is "valid." Thus, the information is verifiable, or auditable, for applications that would benefit from such data, for example, advertisement providers or purchasers associated with content on a web site. Such data would then be used to identify whether clicks on a web site are fraudulent due to activity from, for example, a click harvesting mechanism.
[0044] Upon reading this disclosure, those of skill in the art will appreciate still additional alternative structural and functional designs for a system and a process for a system and a method for detecting and preventing fraud for online advertising through the disclosed principles of the present invention. Thus, while particular embodiments and applications of the present invention have been illustrated and described, it is to be understood that the invention is not limited to the precise construction and components disclosed herein and that various modifications, changes and variations which will be apparent to those skilled in the art may be made in the arrangement, operation and details of the method and apparatus of the present invention disclosed herein without departing from the spirit and scope of the invention as defined in the appended claims.
[0038] Initially, a set of unique advertisement identifiers, the publisher identifier, GUIDhashes, and URL hash are processed 410 for each "click" (or selection or trigger) 415 from a collated click log file (or files). In one embodiment, processing includes the steps in 415 through 445 in a "for each" loop. The information is logged in the log database shown in, for example, Figure 2. In addition, the process obtains access 425 to the validation log database 175 of valid unique advertisement identifiers, publisher identifiers, GUIDhashes, and URL hash. In particular, the validation log database 175 provides a back-end statistics database that maintains a list of all valid unique advertisement identifier and GUIDhash pairs issued within a predefined rolling time period which is derived from the valid link tables of the generated log database 165 from the web servers.
[0039] By referring to the entries in the validation log database 175, the process determines 420 whether the unique advertisement identifier and the GUIDhash matches 420 an entry in the validation log database 175 (e.g., a "fingerprint"). In one embodiment, a "click token" from the validation log database is checked to determine if it corresponds to a valid unique advertisement identifier and GUID hash entry in the generated log database.
[0040] If there is no match between the pairs of entries, the process logs 430 the invalid unique advertisement identifier, publisher identifier, and URL hash click information into a database. The data can be structured for dissemination through a report function. If there is a match, i.e., the two entries are appropriately paired, the process determines 435 if the pair has already been counted. For example, the process determines if a link relating to advertising associated with the pair has already been served.
[0041] If the unique advertisement identifier and GUIDhash pair is valid (i.e., they match) and the link has not previously been served, the process (e.g., through a statistics server) logs (or counts) 445 the activation as a valid click for a revenue reporting perspective against the publisher identifier. If the unique advertisement identifier and GUID hash pair is invalid, or this link has previously been served, the process logs 440 into a database, e.g., an invalid click table, information that includes the publisher identifier, click details, and time and date stamp of the invalid click.
[0042] The process monitors the invalid click database (or table) on a predetermined time (or periodic) basis to respond to occurrences of invalid clicks based on predefined thresholds. Based on the rules (e.g., user defined system pre-defined) governing the predefined threshold, the process executes pre-defined actions associated with the rules. For example, the rules can be structured so that when the predefined thresholds are exceeded a warning communication is transmitted to a machine that monitors transactions.
[0043] An advantage of the present invention includes providing additional information, e.g., an advertisement, in a manner that includes an identifier of that information and the URL of the web site with which it is associated so that when that information is selected it can be pair (or matched) with stored identifier data to determine whether the selection is "valid." Thus, the information is verifiable, or auditable, for applications that would benefit from such data, for example, advertisement providers or purchasers associated with content on a web site. Such data would then be used to identify whether clicks on a web site are fraudulent due to activity from, for example, a click harvesting mechanism.
[0044] Upon reading this disclosure, those of skill in the art will appreciate still additional alternative structural and functional designs for a system and a process for a system and a method for detecting and preventing fraud for online advertising through the disclosed principles of the present invention. Thus, while particular embodiments and applications of the present invention have been illustrated and described, it is to be understood that the invention is not limited to the precise construction and components disclosed herein and that various modifications, changes and variations which will be apparent to those skilled in the art may be made in the arrangement, operation and details of the method and apparatus of the present invention disclosed herein without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (20)
1. A method of tracking activity associated with a web site, the method comprising:
receiving from a requester a request for information to supplement content on the web site, the request including a unique request identifier and a publisher identifier;
retrieving a unique information identifier, the unique information identifier including information unique to the request for one instance;
generating a unique request identifier, the unique request identifier including the unique information identifier;
transmitting the unique request identifier to the requester; and logging the unique request identifier and the publisher identifier in a database.
receiving from a requester a request for information to supplement content on the web site, the request including a unique request identifier and a publisher identifier;
retrieving a unique information identifier, the unique information identifier including information unique to the request for one instance;
generating a unique request identifier, the unique request identifier including the unique information identifier;
transmitting the unique request identifier to the requester; and logging the unique request identifier and the publisher identifier in a database.
2. The method of claim 1, further comprising transmitting to a publisher a tag for association with content for publication on the web site of the publisher identifiable by a referrer uniform resource locator (URL), the tag comprising executable code and the publisher identifier.
3. The method of claim 1, further comprising generating reply code executable by the requester, the reply code including the unique request identifier.
4. The method of claim 1, wherein the unique information identifier comprises an advertisement.
5. The method of claim 1, further comprising receiving, in response to selection of the information on the web site, the unique resource identifier and the unique information identifier.
6. The method of claim 5, further comprising validating the unique information identifier.
7. The method of claim 6, further comprising one of:
logging an invalid unique information identifier and publisher identifier in response to an invalid unique information identifier; and logging a valid unique information identifier and publisher identifier in response to a valid unique identifier.
logging an invalid unique information identifier and publisher identifier in response to an invalid unique information identifier; and logging a valid unique information identifier and publisher identifier in response to a valid unique identifier.
8. The method of claim 7, further comprising redirecting the requester to a second URL
in response to logging a valid unique information identifier.
in response to logging a valid unique information identifier.
9. The method of claim 6, wherein the step of validating comprises comparing the received the unique resource identifier and the unique information identifier with the logged unique resource identifier and the unique information identifier.
10. The method of claim 9, wherein the step of validating further comprises determining whether the comparison of the received unique resource identifier and the unique information identifier and the logged the unique resource identifier and the unique information identifier has been paired.
11. The method of claim 3, further comprising receiving from the web browser the unique request identifier and the unique advertisement identifier in response to a user "click"
of the advertisement.
of the advertisement.
12. The method of claim 4, wherein the unique request identifier and the unique advertisement identifier are compared with unique request identifiers and unique advertisement identifiers in a database to determine a match.
13. A system for tracking activity associated with a web site, the system comprising:
a receiver module configured to receive from a requester a request for information to supplement content on the web site, the request including a unique request identifier and a publisher identifier;
a retrieval module configured to retrieve a unique information identifier, the unique information identifier including information unique to the request for one instance;
a generator module configured to generate a unique request identifier, the unique request identifier including the unique information identifier;
a transmission module configured to transmit the unique request identifier to the requester; and a log module configured to log the unique request identifier and the publisher identifier in a database.
a receiver module configured to receive from a requester a request for information to supplement content on the web site, the request including a unique request identifier and a publisher identifier;
a retrieval module configured to retrieve a unique information identifier, the unique information identifier including information unique to the request for one instance;
a generator module configured to generate a unique request identifier, the unique request identifier including the unique information identifier;
a transmission module configured to transmit the unique request identifier to the requester; and a log module configured to log the unique request identifier and the publisher identifier in a database.
14. The system of claim 13, wherein the transmission module is further configured to transmit to a publisher a tag for association with content for publication on the web site of the publisher identifiable by a referrer uniform resource locator (URL), the tag comprising executable code and the publisher identifier.
15. The system of claim 13, wherein the generator module is further configured to generate reply code executable by the requester, the reply code including the unique request identifier.
16. The system of claim 13, wherein the unique information identifier comprises an advertisement.
17. The system of claim 13, wherein the receiver module is further configured to receive the unique resource identifier and the unique information identifier in response to selection of the information on the web site.
18. A computer readable storage medium storing instructions, the instructions when executed by a processor perform a method of:
receiving from a requester a request for information to supplement content on the web site, the request including a unique request identifier and a publisher identifier;
retrieving a unique information identifier, the unique information identifier including information unique to the request for one instance;
generating a unique request identifier, the unique request identifier including the unique information identifier;
transmitting the unique request identifier to the requester; and logging the unique request identifier and the publisher identifier in a database.
receiving from a requester a request for information to supplement content on the web site, the request including a unique request identifier and a publisher identifier;
retrieving a unique information identifier, the unique information identifier including information unique to the request for one instance;
generating a unique request identifier, the unique request identifier including the unique information identifier;
transmitting the unique request identifier to the requester; and logging the unique request identifier and the publisher identifier in a database.
19. The computer readable storage medium of claim 18, wherein the stored instructions further comprise instructions when executed by the processor to perform further a method of transmitting to a publisher a tag for association with content for publication on the web site of the publisher identifiable by a referrer uniform resource locator (URL), the tag comprising executable code and the publisher identifier.
20. The computer readable storage medium of claim 18, wherein the stored instructions further comprise instructions when executed by the processor to perform further a method of generating reply code executable by the requester, the reply code including the unique request identifier.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US68343705P | 2005-05-20 | 2005-05-20 | |
US60/683,437 | 2005-05-20 | ||
US11/295,754 US8719396B2 (en) | 2005-05-20 | 2005-12-06 | Fraud prevention and detection for online advertising |
US11/295,754 | 2005-12-06 | ||
PCT/IB2006/004285 WO2008004027A2 (en) | 2005-05-20 | 2006-05-19 | Fraud prevention and detection for online advertising |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2610438A1 true CA2610438A1 (en) | 2006-11-20 |
Family
ID=37449602
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA 2610438 Abandoned CA2610438A1 (en) | 2005-05-20 | 2006-05-19 | Fraud prevention and detection for online advertising |
Country Status (7)
Country | Link |
---|---|
US (2) | US8719396B2 (en) |
EP (2) | EP1894158A2 (en) |
JP (1) | JP2008541318A (en) |
AU (1) | AU2006341536A1 (en) |
BR (1) | BRPI0610014A2 (en) |
CA (1) | CA2610438A1 (en) |
WO (1) | WO2008004027A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010017620A1 (en) * | 2008-08-13 | 2010-02-18 | Research In Motion Limited | Systems and methods for evaluating advertising metrics |
Families Citing this family (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8347078B2 (en) | 2004-10-18 | 2013-01-01 | Microsoft Corporation | Device certificate individualization |
US8336085B2 (en) | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
US8099324B2 (en) * | 2005-03-29 | 2012-01-17 | Microsoft Corporation | Securely providing advertising subsidized computer usage |
US20080032741A1 (en) * | 2006-03-30 | 2008-02-07 | Obopay | Programmable Functionalities for Mobile Consumer Communications Devices with Identification-Modules |
US8249965B2 (en) * | 2006-03-30 | 2012-08-21 | Obopay, Inc. | Member-supported mobile payment system |
US20070244811A1 (en) * | 2006-03-30 | 2007-10-18 | Obopay Inc. | Mobile Client Application for Mobile Payments |
US20070255662A1 (en) * | 2006-03-30 | 2007-11-01 | Obopay Inc. | Authenticating Wireless Person-to-Person Money Transfers |
US7873573B2 (en) * | 2006-03-30 | 2011-01-18 | Obopay, Inc. | Virtual pooled account for mobile banking |
US8532021B2 (en) * | 2006-03-30 | 2013-09-10 | Obopay, Inc. | Data communications over voice channel with mobile consumer communications devices |
US20070255620A1 (en) * | 2006-03-30 | 2007-11-01 | Obopay Inc. | Transacting Mobile Person-to-Person Payments |
US7657626B1 (en) * | 2006-09-19 | 2010-02-02 | Enquisite, Inc. | Click fraud detection |
US10152736B2 (en) * | 2006-07-06 | 2018-12-11 | Fair Isaac Corporation | Auto adaptive anomaly detection system for streams |
US10235677B1 (en) | 2006-12-15 | 2019-03-19 | Comscore, Inc. | Determination and application of click quality |
US8990379B2 (en) | 2006-12-15 | 2015-03-24 | Comscore, Inc. | Network interaction monitoring appliance |
US20090037208A1 (en) * | 2007-08-03 | 2009-02-05 | Fraudwall Technologies, Inc. | Using a reason code to indicate a reason for a rating of a network interaction |
US10402832B2 (en) * | 2006-12-15 | 2019-09-03 | Comscore, Inc. | Network interaction correlation |
KR20080085100A (en) * | 2007-01-16 | 2008-09-23 | 엔에이치엔(주) | Method and apparatus for monitoring improper clicks |
US20090319425A1 (en) * | 2007-03-30 | 2009-12-24 | Obopay, Inc. | Mobile Person-to-Person Payment System |
US20100063935A1 (en) * | 2007-03-30 | 2010-03-11 | Obopay, Inc. | Multi-Factor Authorization System and Method |
US20080270412A1 (en) * | 2007-04-27 | 2008-10-30 | Venkateswaran Udayasankar | Tracking user clicks using ajax based beacons |
US8145762B2 (en) * | 2007-05-22 | 2012-03-27 | Kount Inc. | Collecting information regarding consumer click-through traffic |
US9349134B1 (en) * | 2007-05-31 | 2016-05-24 | Google Inc. | Detecting illegitimate network traffic |
US20080319841A1 (en) * | 2007-06-21 | 2008-12-25 | Robert Ian Oliver | Per-Machine Based Shared Revenue Ad Delivery Fraud Detection and Mitigation |
US8935176B2 (en) * | 2007-07-16 | 2015-01-13 | International Business Machines Corporation | Cursor path vector analysis for detecting click fraud |
US8935175B2 (en) * | 2007-07-16 | 2015-01-13 | International Business Machines Corporation | Cursor path vector analysis for detecting click fraud |
US8938395B2 (en) * | 2007-07-16 | 2015-01-20 | International Business Machines Corporation | Cursor path vector analysis for detecting click fraud |
US7447302B1 (en) * | 2007-08-17 | 2008-11-04 | Michael Moneymaker | System for validating phone numbers to prevent affiliate fraud |
US7447303B1 (en) * | 2007-08-17 | 2008-11-04 | Michael Moneymaker | System for validating phone numbers to prevent affiliate fraud |
US8019700B2 (en) * | 2007-10-05 | 2011-09-13 | Google Inc. | Detecting an intrusive landing page |
WO2009052531A1 (en) * | 2007-10-18 | 2009-04-23 | Linkshare Corporation | Methods and systems for tracking electronic commerce transactions |
US7779121B2 (en) * | 2007-10-19 | 2010-08-17 | Nokia Corporation | Method and apparatus for detecting click fraud |
US20090164477A1 (en) * | 2007-12-20 | 2009-06-25 | Anik Ganguly | Method of electronic sales lead verification |
EP2266083A4 (en) * | 2008-03-14 | 2012-01-25 | Obopay Inc | Network-based viral payment system |
US8639570B2 (en) * | 2008-06-02 | 2014-01-28 | Microsoft Corporation | User advertisement click behavior modeling |
US8364529B1 (en) | 2008-09-05 | 2013-01-29 | Gere Dev. Applications, LLC | Search engine optimization performance valuation |
US10567823B2 (en) | 2008-11-26 | 2020-02-18 | Free Stream Media Corp. | Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device |
US9026668B2 (en) | 2012-05-26 | 2015-05-05 | Free Stream Media Corp. | Real-time and retargeted advertising on multiple screens of a user watching television |
US10334324B2 (en) | 2008-11-26 | 2019-06-25 | Free Stream Media Corp. | Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device |
US10977693B2 (en) | 2008-11-26 | 2021-04-13 | Free Stream Media Corp. | Association of content identifier of audio-visual data with additional data through capture infrastructure |
US9386356B2 (en) | 2008-11-26 | 2016-07-05 | Free Stream Media Corp. | Targeting with television audience data across multiple screens |
US10631068B2 (en) | 2008-11-26 | 2020-04-21 | Free Stream Media Corp. | Content exposure attribution based on renderings of related content across multiple devices |
US10419541B2 (en) | 2008-11-26 | 2019-09-17 | Free Stream Media Corp. | Remotely control devices over a network without authentication or registration |
US9519772B2 (en) | 2008-11-26 | 2016-12-13 | Free Stream Media Corp. | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US8180891B1 (en) | 2008-11-26 | 2012-05-15 | Free Stream Media Corp. | Discovery, access control, and communication with networked services from within a security sandbox |
US10880340B2 (en) | 2008-11-26 | 2020-12-29 | Free Stream Media Corp. | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US9961388B2 (en) | 2008-11-26 | 2018-05-01 | David Harrison | Exposure of public internet protocol addresses in an advertising exchange server to improve relevancy of advertisements |
US9986279B2 (en) | 2008-11-26 | 2018-05-29 | Free Stream Media Corp. | Discovery, access control, and communication with networked services |
US9154942B2 (en) | 2008-11-26 | 2015-10-06 | Free Stream Media Corp. | Zero configuration communication between a browser and a networked media device |
US8036990B1 (en) | 2009-04-28 | 2011-10-11 | GumGum, Inc. | Systems and methods for electronically managing content licenses |
US20100319049A1 (en) * | 2009-06-10 | 2010-12-16 | Microsoft Corporation | Trusted agent for advertisement protection |
AU2010258278A1 (en) * | 2009-06-10 | 2012-01-12 | Site Black Box Ltd | Identifying bots |
WO2011133212A1 (en) | 2010-04-20 | 2011-10-27 | New York University | Methods, compounds and pharmaceutical compositions for treating anxiety and mood disorders |
US9911135B2 (en) * | 2010-11-15 | 2018-03-06 | Excalibur Ip, Llc | Online advertising with enhanced publisher involvement |
US8639544B1 (en) | 2010-12-22 | 2014-01-28 | Alberobello Capital Corporation | Identifying potentially unfair practices in content and serving relevant advertisements |
US9633364B2 (en) * | 2010-12-30 | 2017-04-25 | Nokia Technologies Oy | Method and apparatus for detecting fraudulent advertising traffic initiated through an application |
US8977560B2 (en) * | 2012-08-08 | 2015-03-10 | Ebay Inc. | Cross-browser, cross-machine recoverable user identifiers |
US9246929B2 (en) * | 2012-09-07 | 2016-01-26 | Polytechnic Institute Of New York University | Providing a fast, remote security service using hashlists of approved web objects |
US20140257919A1 (en) * | 2013-03-09 | 2014-09-11 | Hewlett- Packard Development Company, L.P. | Reward population grouping |
US9378590B2 (en) | 2013-04-23 | 2016-06-28 | Microsoft Technology Licensing, Llc | Augmented reality auction platform |
WO2015048853A1 (en) * | 2013-10-02 | 2015-04-09 | National Ict Australia Limited | Selecting advertisements |
US11023923B2 (en) * | 2014-05-22 | 2021-06-01 | Facebook, Inc. | Detecting fraud in connection with adverstisements |
US10380627B2 (en) * | 2015-02-12 | 2019-08-13 | Kenshoo Ltd. | Identification of software robot activity |
GB201505553D0 (en) * | 2015-03-31 | 2015-05-13 | Irdeto Bv | Online advertisements |
US11140168B2 (en) * | 2015-07-22 | 2021-10-05 | AVAST Software s.r.o. | Content access validation system and method |
US10091076B2 (en) * | 2015-08-25 | 2018-10-02 | Google Llc | Systems and methods for configuring a resource for network traffic analysis |
WO2017082861A1 (en) * | 2015-11-09 | 2017-05-18 | Observepoint, Inc. | Using a proxy server to intercept and analyze content |
JP6163222B1 (en) * | 2016-03-18 | 2017-07-12 | ヤフー株式会社 | Transfer device, transfer method, transfer program, content request processing device, content request processing method, content request processing program, and access processing system |
CN105975526A (en) * | 2016-04-29 | 2016-09-28 | 国家计算机网络与信息安全管理中心 | URL link validity verification method |
US10943269B1 (en) * | 2017-11-29 | 2021-03-09 | Amazon Technologies, Inc. | Privacy-based content tracker |
KR102001479B1 (en) * | 2018-01-17 | 2019-07-18 | 주식회사 안랩 | Program, server and method performed by said server for detecting advertising application |
KR20200034020A (en) | 2018-09-12 | 2020-03-31 | 삼성전자주식회사 | Electronic apparatus and control method thereof |
US10834764B2 (en) * | 2018-12-10 | 2020-11-10 | At&T Intellectual Property I, L.P. | System and method to deliver companion experiences to handheld devices |
CA3132056A1 (en) * | 2019-01-30 | 2021-08-05 | Lolli, Inc. | Automating digital asset transfers based on historical transactions |
US11720665B2 (en) * | 2019-08-13 | 2023-08-08 | Google Llc | Improving data integrity with trusted code attestation tokens |
Family Cites Families (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5251294A (en) | 1990-02-07 | 1993-10-05 | Abelow Daniel H | Accessing, assembling, and using bodies of information |
US5204947A (en) | 1990-10-31 | 1993-04-20 | International Business Machines Corporation | Application independent (open) hypermedia enablement services |
US5822720A (en) * | 1994-02-16 | 1998-10-13 | Sentius Corporation | System amd method for linking streams of multimedia data for reference material for display |
US5694594A (en) | 1994-11-14 | 1997-12-02 | Chang; Daniel | System for linking hypermedia data objects in accordance with associations of source and destination data objects and similarity threshold without using keywords or link-difining terms |
US5617565A (en) | 1994-11-29 | 1997-04-01 | Hitachi America, Ltd. | Broadcast interactive multimedia system |
GB9426165D0 (en) | 1994-12-23 | 1995-02-22 | Anthony Andre C | Method of retrieving and displaying data |
US5963205A (en) | 1995-05-26 | 1999-10-05 | Iconovex Corporation | Automatic index creation for a word processor |
US5708825A (en) | 1995-05-26 | 1998-01-13 | Iconovex Corporation | Automatic summary page creation and hyperlink generation |
US5794257A (en) | 1995-07-14 | 1998-08-11 | Siemens Corporate Research, Inc. | Automatic hyperlinking on multimedia by compiling link specifications |
US5822539A (en) | 1995-12-08 | 1998-10-13 | Sun Microsystems, Inc. | System for adding requested document cross references to a document by annotation proxy configured to merge and a directory generator and annotation server |
US5794210A (en) | 1995-12-11 | 1998-08-11 | Cybergold, Inc. | Attention brokerage |
US5751956A (en) * | 1996-02-21 | 1998-05-12 | Infoseek Corporation | Method and apparatus for redirection of server external hyper-link references |
US5848397A (en) | 1996-04-19 | 1998-12-08 | Juno Online Services, L.P. | Method and apparatus for scheduling the presentation of messages to computer users |
US5848396A (en) * | 1996-04-26 | 1998-12-08 | Freedom Of Information, Inc. | Method and apparatus for determining behavioral profile of a computer user |
US5999912A (en) * | 1996-05-01 | 1999-12-07 | Wodarz; Dennis | Dynamic advertising scheduling, display, and tracking |
US6098081A (en) | 1996-05-06 | 2000-08-01 | Microsoft Corporation | Hypermedia navigation using soft hyperlinks |
US5935207A (en) * | 1996-06-03 | 1999-08-10 | Webtv Networks, Inc. | Method and apparatus for providing remote site administrators with user hits on mirrored web sites |
US5920859A (en) | 1997-02-05 | 1999-07-06 | Idd Enterprises, L.P. | Hypertext document retrieval system and method |
AU714336B2 (en) | 1996-07-25 | 1999-12-23 | Clearway Acquisition, Inc. | Web serving system with primary and secondary servers |
US5903889A (en) | 1997-06-09 | 1999-05-11 | Telaric, Inc. | System and method for translating, collecting and archiving patient records |
US6434567B1 (en) | 1996-07-30 | 2002-08-13 | Carlos De La Huerga | Method for specifying enterprise-wide database address formats |
US6516321B1 (en) | 1996-07-30 | 2003-02-04 | Carlos De La Huerga | Method for database address specification |
US5948061A (en) | 1996-10-29 | 1999-09-07 | Double Click, Inc. | Method of delivery, targeting, and measuring advertising over networks |
US6052730A (en) | 1997-01-10 | 2000-04-18 | The Board Of Trustees Of The Leland Stanford Junior University | Method for monitoring and/or modifying web browsing sessions |
US6285987B1 (en) | 1997-01-22 | 2001-09-04 | Engage, Inc. | Internet advertising system |
US7020622B1 (en) | 1997-06-10 | 2006-03-28 | Linkshare Corporation | Transaction tracking, managing, assessment, and auditing data processing system and network |
IL121457A (en) | 1997-08-03 | 2004-06-01 | Guru Internat Inc | Computerized dictionary and thesaurus applications |
US6253189B1 (en) | 1997-09-15 | 2001-06-26 | At&T Corp. | System and method for completing advertising time slot transactions |
US6256631B1 (en) | 1997-09-30 | 2001-07-03 | International Business Machines Corporation | Automatic creation of hyperlinks |
US6119098A (en) | 1997-10-14 | 2000-09-12 | Patrice D. Guyot | System and method for targeting and distributing advertisements over a distributed network |
US6728712B1 (en) | 1997-11-25 | 2004-04-27 | International Business Machines Corporation | System for updating internet address changes |
US6574644B2 (en) | 1997-11-26 | 2003-06-03 | Siemens Corporate Research, Inc | Automatic capturing of hyperlink specifications for multimedia documents |
US6804659B1 (en) | 2000-01-14 | 2004-10-12 | Ricoh Company Ltd. | Content based web advertising |
IL125432A (en) | 1998-01-30 | 2010-11-30 | Easynet Access Inc | Personalized internet interaction |
US6748385B1 (en) | 1998-02-10 | 2004-06-08 | National Broadcasting Company, Inc. | Dynamic insertion and updating of hypertext links for internet servers |
US7437725B1 (en) | 1999-01-04 | 2008-10-14 | General Electric Company | Processing techniques for servers handling client/server traffic and communications |
US6185598B1 (en) | 1998-02-10 | 2001-02-06 | Digital Island, Inc. | Optimized network resource location |
US6092074A (en) | 1998-02-10 | 2000-07-18 | Connect Innovations, Inc. | Dynamic insertion and updating of hypertext links for internet servers |
US7240022B1 (en) | 1998-05-19 | 2007-07-03 | Mypoints.Com Inc. | Demographic information gathering and incentive award system and method |
US6108703A (en) | 1998-07-14 | 2000-08-22 | Massachusetts Institute Of Technology | Global hosting system |
US6324519B1 (en) | 1999-03-12 | 2001-11-27 | Expanse Networks, Inc. | Advertisement auction system |
AU2358000A (en) | 1998-12-18 | 2000-07-12 | Flycast Communications Corp. | Optimized internet advertising using history to select sites |
US6128651A (en) * | 1999-04-14 | 2000-10-03 | Americom Usa | Internet advertising with controlled and timed display of ad content from centralized system controller |
US6269361B1 (en) | 1999-05-28 | 2001-07-31 | Goto.Com | System and method for influencing a position on a search result list generated by a computer network search engine |
US7089194B1 (en) | 1999-06-17 | 2006-08-08 | International Business Machines Corporation | Method and apparatus for providing reduced cost online service and adaptive targeting of advertisements |
US6339438B1 (en) * | 1999-07-27 | 2002-01-15 | International Business Machines Corporation | Scroll bar with integrated advertisement |
US6449657B2 (en) | 1999-08-06 | 2002-09-10 | Namezero.Com, Inc. | Internet hosting system |
US6341306B1 (en) | 1999-08-13 | 2002-01-22 | Atomica Corporation | Web-based information retrieval responsive to displayed word identified by a text-grabbing algorithm |
WO2001037119A2 (en) | 1999-11-15 | 2001-05-25 | Advertising.Com | Apparatus and method for providing advertising on internet-enabled channels |
GB9928689D0 (en) | 1999-12-03 | 2000-02-02 | Connextra Limited | Information communication system |
US20020010757A1 (en) | 1999-12-03 | 2002-01-24 | Joel Granik | Method and apparatus for replacement of on-line advertisements |
WO2001044992A1 (en) | 1999-12-15 | 2001-06-21 | Yellowbrix, Inc. | Context matching system and method |
US6912571B1 (en) | 2000-02-22 | 2005-06-28 | Frank David Serena | Method of replacing content |
US20020026472A1 (en) | 2000-03-22 | 2002-02-28 | Gadi Wolfman | Service request method and system using input sensitive specifications on wired and wireless networks |
US7076743B2 (en) * | 2000-05-04 | 2006-07-11 | I-Lor, Llc | Method for adding a plurality of user selectable functions to a hyperlink |
AU2001261232A1 (en) | 2000-05-08 | 2001-11-20 | Walker Digital, Llc | Method and system for providing a link in an electronic file being presented to a user |
US6507837B1 (en) | 2000-06-08 | 2003-01-14 | Hyperphrase Technologies, Llc | Tiered and content based database searching |
ATE422130T1 (en) * | 2000-06-14 | 2009-02-15 | Sap Ag | COMMUNICATION BETWEEN CLIENTS AND SERVER COMPUTERS VIA HTTP, METHOD, COMPUTER PROGRAM PRODUCT AND SYSTEM |
US7478089B2 (en) | 2003-10-29 | 2009-01-13 | Kontera Technologies, Inc. | System and method for real-time web page context analysis for the real-time insertion of textual markup objects and dynamic content |
US7284008B2 (en) | 2000-08-30 | 2007-10-16 | Kontera Technologies, Inc. | Dynamic document context mark-up technique implemented over a computer network |
US7617121B1 (en) | 2000-11-10 | 2009-11-10 | Platform-A Inc. | Apparatus and method for hyperlinking specific words in content to turn the words into advertisements |
US7130861B2 (en) * | 2001-08-16 | 2006-10-31 | Sentius International Corporation | Automated creation and delivery of database content |
EP1463235B1 (en) * | 2003-03-24 | 2005-03-16 | Alcatel | OSPF monitor and monitoring process |
US7617136B1 (en) * | 2003-07-15 | 2009-11-10 | Teradata Us, Inc. | System and method for capturing, storing and analyzing revenue management information for the travel and transportation industries |
US20050080685A1 (en) * | 2003-10-09 | 2005-04-14 | Scott Blum | Internet commerce access security system and method |
US20050144067A1 (en) * | 2003-12-19 | 2005-06-30 | Palo Alto Research Center Incorporated | Identifying and reporting unexpected behavior in targeted advertising environment |
US7584287B2 (en) * | 2004-03-16 | 2009-09-01 | Emergency,24, Inc. | Method for detecting fraudulent internet traffic |
US7702618B1 (en) * | 2004-07-26 | 2010-04-20 | Google Inc. | Information retrieval system for archiving multiple document versions |
JP4357391B2 (en) * | 2004-09-02 | 2009-11-04 | 富士通株式会社 | Queue management device |
US7287279B2 (en) * | 2004-10-01 | 2007-10-23 | Webroot Software, Inc. | System and method for locating malware |
US7669056B2 (en) * | 2005-03-29 | 2010-02-23 | Microsoft Corporation | Method and apparatus for measuring presentation data exposure |
US8281014B2 (en) * | 2004-12-28 | 2012-10-02 | Sap Ag | Session lifecycle management within a multi-tiered enterprise network |
US20070033102A1 (en) * | 2005-03-29 | 2007-02-08 | Microsoft Corporation | Securely providing advertising subsidized computer usage |
EP1877926A4 (en) * | 2005-04-12 | 2010-07-07 | Accoona Corp | Apparatuses, methods and systems to identify, generate, and aggregate qualified sales and marketing leads for distribution via an online competitive bidding system |
US20090171750A1 (en) | 2007-12-27 | 2009-07-02 | Hanning Zhou | Incorporating advertising in on-demand generated content |
US8838489B2 (en) | 2007-12-27 | 2014-09-16 | Amazon Technologies, Inc. | On-demand generating E-book content with advertising |
US8726146B2 (en) * | 2008-04-11 | 2014-05-13 | Advertising.Com Llc | Systems and methods for video content association |
US8036990B1 (en) * | 2009-04-28 | 2011-10-11 | GumGum, Inc. | Systems and methods for electronically managing content licenses |
-
2005
- 2005-12-06 US US11/295,754 patent/US8719396B2/en active Active
-
2006
- 2006-05-19 BR BRPI0610014-7A patent/BRPI0610014A2/en not_active Application Discontinuation
- 2006-05-19 AU AU2006341536A patent/AU2006341536A1/en not_active Abandoned
- 2006-05-19 CA CA 2610438 patent/CA2610438A1/en not_active Abandoned
- 2006-05-19 JP JP2008523492A patent/JP2008541318A/en active Pending
- 2006-05-19 EP EP20060851098 patent/EP1894158A2/en not_active Withdrawn
- 2006-05-19 WO PCT/IB2006/004285 patent/WO2008004027A2/en active Application Filing
- 2006-05-19 EP EP20100164402 patent/EP2219149A1/en not_active Ceased
-
2014
- 2014-05-05 US US14/269,821 patent/US20140244382A1/en not_active Abandoned
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010017620A1 (en) * | 2008-08-13 | 2010-02-18 | Research In Motion Limited | Systems and methods for evaluating advertising metrics |
Also Published As
Publication number | Publication date |
---|---|
US20140244382A1 (en) | 2014-08-28 |
AU2006341536A1 (en) | 2008-01-10 |
WO2008004027A2 (en) | 2008-01-10 |
WO2008004027A3 (en) | 2008-05-08 |
EP1894158A2 (en) | 2008-03-05 |
JP2008541318A (en) | 2008-11-20 |
US20060265493A1 (en) | 2006-11-23 |
EP2219149A1 (en) | 2010-08-18 |
BRPI0610014A2 (en) | 2011-10-11 |
US8719396B2 (en) | 2014-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8719396B2 (en) | Fraud prevention and detection for online advertising | |
US10963891B2 (en) | Secure conversion tracking | |
US9734508B2 (en) | Click fraud monitoring based on advertising traffic | |
US9141971B2 (en) | Method for performing real-time click fraud detection, prevention and reporting for online advertising | |
US8131594B1 (en) | System and method for facilitating targeted advertising | |
US9858341B2 (en) | Method and apparatus for remotely monitoring a social website | |
US7933801B2 (en) | Ad server system with click fraud protection | |
US8799069B2 (en) | Mobile click fraud prevention | |
US20110314557A1 (en) | Click Fraud Control Method and System | |
US8015615B1 (en) | Determining advertising activity | |
US20100281008A1 (en) | Universal Tracking Agent System and Method | |
US20140052518A1 (en) | Affiliate Marketing Method That Provides Inbound Affiliate Link Credit Without Coded URLs | |
US20070255821A1 (en) | Real-time click fraud detecting and blocking system | |
US20110314114A1 (en) | Persistent Cross Channel Cookie Method and System | |
JP2010541047A (en) | Method and apparatus for monitoring the effectiveness of online advertising | |
AU2007362608B2 (en) | Online advertisement exposure tracking system | |
WO2007150055A2 (en) | Secure and extensible pay per action online advertising | |
CA2578410A1 (en) | Systems and methods for determining user actions | |
JP2007510973A (en) | Optimization of advertising activities on computer networks | |
JP2008506193A (en) | Database search system and method for determining keyword values in a search | |
US20080243612A1 (en) | System and method for using a browser extension to detect events related to digital advertisements | |
US20060212349A1 (en) | Method and system for delivering targeted banner electronic communications | |
US20080288344A1 (en) | System for tiered bidding in an online information system based on the integrity of network interactions | |
US20060259356A1 (en) | Adpost: a centralized advertisement platform | |
US20190370856A1 (en) | Detection and estimation of fraudulent content attribution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
FZDE | Discontinued |