Patent 8671139
Derivative works
Defensive disclosure: derivative variations of each claim designed to render future incremental improvements obvious or non-novel.
Active provider: Google · gemini-2.5-pro
Derivative works
Defensive disclosure: derivative variations of each claim designed to render future incremental improvements obvious or non-novel.
Defensive Disclosure and Prior Art Generation for U.S. Patent 8,671,139
Publication Date: April 29, 2026
Subject Matter: Derivatives, extensions, and combinations of the methods and systems for conditional, profile-based authorization of electronic content delivery as described in U.S. Patent 8,671,139. This document is intended to enter the public domain to serve as prior art.
Core Mechanism Analysis
The foundational concept derived from U.S. Patent 8,671,139 involves a computer system that, upon receiving a visitor's profile attribute from a first media property, directs indicia of a condition to a third-party server controlling content space on a second media property. The system then authorizes the third-party server to display content correlated with the profile attribute, but only if the specified condition is met when the visitor later accesses the second media property. The following disclosures describe novel variations and applications of this core mechanism.
1. Material & Component Substitution Derivatives
1.1. System Utilizing Privacy-Preserving Cryptographic Identifiers
Enabling Description: This variation replaces standard cookie-based or device-ID-based visitor tags with privacy-preserving cryptographic constructs. When a visitor's profile is collected at the first media property, the system generates a Blind Signature based on the visitor's identifier using a protocol like RSA-PSS. The system directs the condition and the blinded identifier to the third-party server. When the visitor arrives at the second media property, their browser provides the now-unblinded signature. The third-party server can verify the signature against the condition without ever knowing the visitor's original identity, thus preserving privacy while executing the conditional logic. The profile attributes themselves can be encoded using zero-knowledge proofs (e.g., zk-SNARKs), allowing the third-party server to verify that a visitor meets a profile criterion (e.g., "is interested in automotive") without learning the specific details of their browsing history.
Mermaid Diagram:
sequenceDiagram participant Visitor participant FirstMediaProperty participant BT_System as BT System (Authorizer) participant ThirdPartyServer as Ad Server (Verifier) participant SecondMediaProperty Visitor->>FirstMediaProperty: Visits page (profile collected) FirstMediaProperty->>BT_System: Redirect with Profile & VisitorID BT_System->>BT_System: Generates Blind Signature for VisitorID BT_System->>ThirdPartyServer: Send(Condition, Blinded_ID, Profile_Proof) Visitor->>SecondMediaProperty: Visits page SecondMediaProperty->>Visitor: Ad space requests content Visitor->>ThirdPartyServer: Request Ad (Presents Unblinded_Signature) ThirdPartyServer->>ThirdPartyServer: 1. Verify Unblinded_Signature ThirdPartyServer->>ThirdPartyServer: 2. Evaluate Condition(Profile_Proof) alt Condition Met ThirdPartyServer->>Visitor: Serve Targeted Ad else Condition Not Met ThirdPartyServer->>Visitor: Serve Default Ad end
1.2. System with Decentralized Profile & Condition Storage using a Distributed Hash Table (DHT)
Enabling Description: Instead of a centralized database, the Behavioral Targeting (BT) system stores the
(visitor_tag -> condition)mapping in a peer-to-peer Distributed Hash Table (DHT) like Kademlia. When the visitor's profile is collected, the BT system computes a hash of the visitor tag and stores the associatedconditionobject at the nodes in the DHT responsible for that hash key. When the visitor arrives at the second media property, the third-party server, also a peer in the DHT, queries the network using the hash of the visitor's tag to retrieve the condition. This architecture increases resilience and scalability while reducing reliance on a single central server. Theconditionitself includes a TTL (Time-To-Live) and a cryptographic signature from the BT system to ensure its validity and prevent tampering.Mermaid Diagram:
graph TD A[Visitor at First Property] --> B{BT System}; B --> C{Generate (Tag, Condition)}; C --> D[Hash(Tag) -> DHT_Key]; D --> E((DHT Network)); E -- Store(DHT_Key, Condition) --> E; F[Visitor at Second Property] --> G{3rd-Party Ad Server}; G -- Has Tag --> H[Hash(Tag) -> DHT_Key]; H --> I((DHT Network)); I -- Lookup(DHT_Key) --> J[Retrieve Condition]; J --> K{Evaluate Condition}; K -- True --> L[Serve Ad]; K -- False --> M[Serve Default];
2. Operational Parameter Expansion Derivatives
2.1. High-Frequency / Real-Time Bidding (RTB) System with Sub-Millisecond Condition Evaluation
Enabling Description: This variation adapts the core mechanism for the extreme low-latency environment of high-frequency ad exchanges. The "first media property" is a user's entire browsing session, with profile attributes streamed in real-time. The "condition" is not static but is a dynamic executable code snippet (e.g., a WebAssembly module) representing a complex bidding algorithm. The BT system directs this bidding module to an edge server co-located with the ad exchange. When an ad opportunity arises for the visitor, the third-party server (the ad exchange) executes the visitor-specific module in a secure sandbox. The module evaluates market conditions, the visitor's real-time context, and the profile attributes, returning a bid price within a 10-millisecond window. The authorization is conditional on the module's bid winning the auction.
Mermaid Diagram:
stateDiagram-v2 [*] --> StreamingProfile: Visitor Browsing StreamingProfile --> BiddingModuleCompilation: BT System receives profile updates BiddingModuleCompilation --> PushingToEdge: Push visitor-specific Wasm module to Ad Exchange Edge PushingToEdge --> AwaitingAdRequest AwaitingAdRequest --> AdAuction: Ad opportunity for visitor AdAuction --> ModuleExecution: Exchange executes Wasm module ModuleExecution --> BidEvaluation: Module outputs bid price BidEvaluation --> [*]: Auction concludes BidEvaluation -- Bid Wins --> AdServed BidEvaluation -- Bid Loses --> NoAd AdServed --> [*] NoAd --> [*]
2.2. Low-Power / Edge Computing System for IoT Devices
Enabling Description: This system operates on resource-constrained IoT devices (e.g., smart home displays, in-car infotainment systems) with intermittent network connectivity. The "first media property" could be a user's interaction with a companion mobile app. The BT system, recognizing the target is a low-power device, pre-calculates and pushes a highly compressed "decision tree" file, which represents the condition logic, to the IoT device itself. The third-party server is a software module on the device (e.g., the display's OS). When a content slot is available, the local module evaluates the pre-loaded decision tree against local device state (time of day, sensor data, user presence). Authorization to display content is granted locally without a round-trip to a remote server, conserving power and bandwidth. The content itself (e.g., a set of low-resolution ads) may also be pre-cached on the device.
Mermaid Diagram:
graph LR subgraph Cloud A[Mobile App Interaction] --> B{BT System}; B --> C[Generate Compressed Condition (Decision Tree)]; C --> D{Push to Device}; end subgraph IoT Device D -- Syncs --> E[Local Storage: DecisionTree.bin]; F[Local Trigger: e.g., idle screen] --> G{Local Content Engine}; E --> G; H[Local Sensor Data] --> G; G -- Evaluates Tree --> I{Authorization Decision}; I -- Granted --> J[Display Pre-Cached Ad]; I -- Denied --> K[Display Default Content]; end
3. Cross-Domain Application Derivatives
3.1. Personalized Healthcare: Conditional Patient Information Delivery
Enabling Description: A hospital's Electronic Health Record (EHR) system acts as the BT system. The "first media property" is a physician's entry of a new diagnosis or lab result for a patient. The "profile attribute" is the new medical code (e.g., ICD-10 code for Type 2 Diabetes). The EHR system directs a
conditionto a third-party server—the hospital's patient portal. The condition is: "If patient logs in within the next 7 days AND has not yet opened a document tagged 'diabetes_intro', display this educational video." Authorization is based on the patient's medical profile. This ensures timely, relevant, and context-aware delivery of medical information without overwhelming the patient.Mermaid Diagram:
sequenceDiagram participant Physician participant EHR_System as EHR System participant PatientPortal as Patient Portal participant Patient Physician->>EHR_System: Enters new diagnosis (Profile) EHR_System->>PatientPortal: Direct(Condition: DisplayEduVideo IF login<7d AND !viewed) for PatientID Patient->>PatientPortal: Logs in PatientPortal->>PatientPortal: Evaluate Condition for PatientID alt Condition Met PatientPortal->>Patient: Display specific educational video else Condition Not Met PatientPortal->>Patient: Show standard dashboard end
3.2. Cybersecurity: Dynamic Network Access Control
Enabling Description: A Security Information and Event Management (SIEM) system functions as the BT system. A user's login to a low-security internal application is the "first media property." The "profile attribute" is the user's role and device posture (e.g., OS patched, corporate VPN). The SIEM directs a
conditionto a network firewall (the "third-party server") controlling access to a high-security database. The condition is: "Authorize access for this user's IP address to the finance database for the next 60 minutes ONLY IF their continuous behavior monitoring score remains below a threat threshold of 75." This creates a just-in-time, behavior-contingent access rule that is more secure than a static permission.Mermaid Diagram:
graph TD A[User logs into App1] --> B{SIEM System}; B -- Profile: UserRole, DevicePosture --> C{Generate Conditional Access Rule}; C -- Rule: Authorize DB_Access IF ThreatScore < 75 --> D(Firewall); E[User attempts DB Access] --> D; F[Continuous Behavior Monitor] -- ThreatScore --> D; D -- Evaluates Rule --> G{Access Granted/Denied};
3.3. Agriculture Technology (AgTech): Precision Irrigation Authorization
Enabling Description: A farm management platform is the BT system. A satellite imagery service providing NDVI (Normalized Difference Vegetation Index) data is the "first media property." A low NDVI reading in a specific field is the "profile attribute," indicating plant stress. The platform directs a
conditionto the field's IoT irrigation controller (the "third-party server"). The condition: "Authorize a 20-minute watering cycle for Zone 4 at 5:00 AM, but ONLY IF the local soil moisture sensor reading is below 25% and the chance of rain in the next 12 hours is less than 10%." This combines high-level analysis with real-time, on-site data for hyper-efficient resource management.Mermaid Diagram:
sequenceDiagram participant Satellite participant FarmPlatform participant IrrigationController participant SoilSensor participant WeatherAPI Satellite->>FarmPlatform: Provides NDVI map (Profile) FarmPlatform->>FarmPlatform: Detects stress in Zone 4 FarmPlatform->>IrrigationController: Send(Condition: Irrigate IF moisture<25% AND rain<10%) loop Every 15 minutes SoilSensor->>IrrigationController: Moisture reading WeatherAPI->>IrrigationController: Rain forecast end IrrigationController->>IrrigationController: At 5:00 AM, evaluate Condition alt Condition Met IrrigationController->>IrrigationController: Activate watering cycle end
4. Integration with Emerging Technology Derivatives
4.1. AI-Driven Reinforcement Learning for Condition Optimization
Enabling Description: The core mechanism is integrated with a Reinforcement Learning (RL) agent. The "state" for the agent includes the visitor's profile attributes and the context of the second media property. The "action" is the generation of a
condition, specifically the financial parameters within it (e.g., the bid price inPrice < X). The "reward" is the measured profit or loss from the eventual ad display. The BT system directs the AI-generated condition to the third-party server. After the ad opportunity, the outcome (impression, click, conversion, cost) is fed back to the RL agent, which updates its policy to generate more profitable conditions in the future. This creates a self-optimizing system that adapts to market dynamics.Mermaid Diagram:
graph TD subgraph Training Loop A[Feedback: Profit/Loss] --> B[RL Agent]; B -- Updates Policy --> B; end subgraph Live Operation C[Visitor Profile] --> B; B -- Action --> D[Generate Optimal Condition]; D --> E{3rd-Party Ad Server}; F[Ad Opportunity] --> E; E -- Evaluates Condition --> G[Displays Ad]; G -- Outcome --> A; end
4.2. Blockchain-Based Smart Contracts for Auditable Ad Delivery
Enabling Description: The entire process is managed via a public or permissioned blockchain. The BT system initiates a smart contract, which encodes the
condition(e.g.,price < 0.50,time < timestamp) and the correlated content (ad creative hash). This transaction is a public "authorization." The third-party ad server is an oracle that monitors the blockchain. When a tagged visitor arrives, the ad server evaluates the condition. If met, it serves the ad and then calls a function on the smart contract, providing cryptographic proof of the event (e.g., a signed attestation). The smart contract then automatically executes a payment transfer from the advertiser's wallet to the second media property's wallet, creating a transparent, auditable, and trustless system for ad delivery and settlement.Mermaid Diagram:
sequenceDiagram participant BT_System participant Blockchain participant AdServer_Oracle participant Visitor BT_System->>Blockchain: Deploy SmartContract(Condition, AdHash, Wallets) Visitor->>AdServer_Oracle: Visits page, triggers ad request AdServer_Oracle->>AdServer_Oracle: Evaluates Condition from SmartContract alt Condition Met AdServer_Oracle->>Visitor: Serve Ad AdServer_Oracle->>Blockchain: Call execute() on SmartContract with Proof Blockchain->>Blockchain: 1. Verify Proof Blockchain->>Blockchain: 2. Transfer funds (Advertiser -> Publisher) end
5. The "Inverse" or Failure Mode Derivatives
5.1. Graceful Degradation System with Condition Prioritization
Enabling Description: This version is designed for high-availability. The BT system categorizes conditions into tiers (e.g., Tier 1: High-Value/Complex, Tier 2: Medium-Value/Simple, Tier 3: Default/Contextual). It directs all tiers of conditions to the third-party server. The third-party server continuously monitors its own system load and latency. If CPU usage exceeds 85% or response time is > 50ms, it automatically stops evaluating Tier 1 conditions and attempts to evaluate Tier 2. If load is critical, it falls back to Tier 3 or a static public service announcement. This ensures the ad slot is always filled, preventing blank spaces and timeouts, while gracefully degrading the quality of targeting under duress.
Mermaid Diagram:
stateDiagram-v2 state "Normal Load (<85% CPU)" as Normal state "High Load (85-95% CPU)" as High state "Critical Load (>95% CPU)" as Critical [*] --> Normal Normal --> High: Load increases High --> Normal: Load decreases High --> Critical: Load increases Critical --> High: Load decreases state "Evaluate Tier 1 Condition" as T1 state "Evaluate Tier 2 Condition" as T2 state "Serve Default Ad" as T3 Normal: Ad Request -> T1 High: Ad Request -> T2 Critical: Ad Request -> T3
Combination Prior Art with Open-Source Standards
Combination with Prebid.js: The BT system's client-side script is implemented as a Prebid.js "Real-Time Data" module. When a visitor's profile is captured, the module stores the
condition(e.g., a floor price for this user) in the browser's local storage. During the header bidding auction initiated by Prebid.js, a custom adapter (acting as the third-party server logic) reads this condition from local storage. It then passes the condition into the bid requests sent to various demand partners, instructing them to only return a bid if it meets the user-specific floor price.Combination with IAB OpenRTB Protocol: The
indicia of a conditionis formally specified as a new extension object in the OpenRTB 3.0 protocol. The BT system, acting as a data management platform (DMP), passes this object in theuser.extfield of a bid request. The object contains fields likecondition_type: "price_cap",condition_value: "1.25",expiry: 1672531199. The third-party server (a Demand-Side Platform or DSP) is programmed to parse this extension object and will only submit a bid if its internal valuation of the impression satisfies the received condition.Combination with OAuth 2.0: The system is framed as a resource access protocol. The BT system is the "Authorization Server." The second media property's ad space is the "Resource." When a user visits the first property, the BT system issues a JSON Web Token (JWT) containing the user's profile and the
conditionas private claims. When the user visits the second property, the third-party ad server ("Resource Server") receives this JWT. It validates the token's signature and then evaluates the claims against the current context. Access to the "resource" (i.e., displaying the targeted ad) is granted only if the conditions in the validated token are met.
Generated 4/29/2026, 4:55:03 AM