Methods and systems for mapping advertising inventory

ABSTRACT

Provided are methods and systems for, in one aspect, managing content delivered to one or more devices. Methods may comprise receiving a first identifier associated with a user of content. The content may comprise one or more advertisement or placement opportunities. A second identifier may be determined based at least on the first identifier. The second identifier may be a perishable identifier configured to expire based on an event. The second identifier may be transmitted to an entity associated with an advertisement inventory, wherein the second identifier facilitates the targeted placement of one or more advertisements from the advertisement inventory without exposing the first identifier to the entity.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/622,918, filed Jun. 14, 2017, which is hereby incorporated byreference in its entirety.

BACKGROUND

A multiple system/service operator (MSO) may sell advertisement spacedirected to local or regional businesses, and can target or swap outnational advertisements for local or regional market ads. In addition,MSOs own or can locate individual subscriber set top boxes, and cantarget local advertisements for all subscribers in a region, town, ordown to a specific subscriber. Advertisements targeted to particularintended audiences are made possible when the MSO gains access topersonal identifiable information (PII) about their subscribers, madeavailable within set top boxes or via the Internet. PII may include thelocation of a set top box including its hardware MAC address, marketinginformation, such as which programs and commercials have been viewed,and direct subscriber personal information such as a subscriber's name,home address, subscription or order history, and credit score. However,MSO may not want to expose PII outside the system operated by the MSO.Therefore, improvements in managing advertising inventory are needed.

SUMMARY

Provided are methods and systems for controlling content delivered toone or more devices. Methods can comprise receiving or accessing a firstidentifier associated with a user consuming content. The content maycomprise one or more advertisement events. A second identifier may becreated or determined based at least on the first identifier. The secondidentifier may be a perishable identifier configured to expire based onan event such as a time period. The second identifier (e.g., perishableidentifier) may be transmitted to an entity associated with contentinventory such as an advertisement inventory. As such, the secondidentifier may facilitate targeted placement of one or more contentassets (e.g., advertisements) from the content inventory withoutexposing the first identifier to the entity.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this specification, illustrate embodiments and together with thedescription, serve to explain the principles of the methods and systems:

FIG. 1 is a representation of exemplary content timelines;

FIG. 2 is a block diagram of an exemplary system;

FIG. 3 is a block diagram of an exemplary system;

FIG. 4 is a block diagram of an exemplary system;

FIG. 5 is a block diagram of an exemplary system;

FIG. 6 is a representation of an exemplary network;

FIG. 7 is a representation of an exemplary network;

FIG. 8 is a flow chart of an exemplary method;

FIG. 9 is a flow chart of an exemplary method;

FIG. 10 is a block diagram of an exemplary computing system.

DETAILED DESCRIPTION

A network system such as a system operated by a multiple system/serviceoperator (MSO) may generate a placement opportunity such as anadvertisement (ad) inventory event, which may be or become availableduring consumption of an item of content. The ad inventory event mayindicate a position or break in the content item or asset whereadditional content such as an advertisement may be provided as part ofthe consumption of the content item. The advertisement inventory eventmay be filled with an advertisement or other content from one or moresources. The content item may be or comprise audio, video, text or otherinformation. The advertisement may be intended for general audiences,targeted audiences, or both. A targeted advertisement may be based onpersonal identifiable information (PII) about users/subscribers whichmay comprise location of a device including its hardware MAC address,marketing information, such as which programs and commercials have beenviewed, and direct user/subscriber personal information such as a name,home address, subscription or order history, and credit score.

However, the MSO, or another entity filling ad opportunities, may notwant to expose PII outside a closed or trusted system operated by theMSO due to at least user privacy or other concerns. For example, the PIImay facilitate unwanted tracking of viewing behavior of particularusers/clients by entities outside the system operated by the MSO. Forexample, if a national network obtains information about subscribers inthe New York metropolitan area, then the national network may beginselling ads for a premium to companies that are only in the New Yorkmetropolitan area, which a local advertiser may not be able to afford.However, an entity may satisfy different parties, both legally andcommercially, by purging certain PII that identifies an individualsubscriber or other local or regional market information, and may stillprovide certain statistical demographic information, e.g., the number ofpeople who are male or have a certain income level.

Additionally or alternatively, in managing the delivery of the contentitem, a network system may leverage a user identifier that maps to ahousehold, user, or segment of audience consuming the content item. Thesystem and methods of the present disclosure may generate and/ormaintain a mapping of a persistent user identifier and a perishablesecond identifier (e.g., session identifier). The second or secondaryidentifier may persist at the session level or some other configurableduration of time. As an example, when an advertisement rights managementplatform routes advertisement decision rights to an external entity(e.g., upstream entity) from the network system owner/operator, theadvertisement rights management platform may pass along the perishablesecondary identifier to that upstream entity while passing both theperishable secondary identifier and the primary persistent useridentifier to the instance of the rights management platform of thenetwork system owner.

The use of two identifiers in this manner enables the upstream entitythat has been granted the rights to see and use the perishable secondaryidentifier to target advertising to attributes associated with thepersistent user identifier without ever having possession of thatpersistent user identifier nor being able to reverse engineer or imputethose targeting attributes to a proxy persistent user identifier. Assuch, the persistent user identifier is maintained by the systemoperator and is not exposed to entities interacting with the contentitems or advertisement inventory events.

Traditionally, programming of broadcast and cable television and radio,including content (i.e., the video or audio program) and (the placementof) advertisements in a video or audio signal stream, has followed alinear model. Programming may be linear in the sense that a programbegins and is streamed and in progress when a user chooses to viewentertainment content. FIG. 1 illustrates a conventional linear orvideo-on-demand (VOD) model for advertisement placement. Content 100,when processed as a digital data stream over a cable network, may bedivided into a number of time intervals. The time intervals 102 includetime reserved for a viewed program (content), such as a televisionprogram. The intervals 102 may represent sections of time reserved foradvertisements or “avails.” These “avails” may be viewed asadvertisement placement opportunities. As used herein, a “placementopportunity” was traditional called an avail and is sometimes referredto as a slot (spots into slots). A placement opportunity (PO) is aconstruct that represents an opportunity to insert an advertisement orentertainment content, and defines the rules for that opportunity, suchas its duration, interactivity, ownership, and technical constraints.

In linear over-the-air or traditional cable TV broadcasting,advertisement time may occur before, during, or after the intervals 102.The list of intervals 102 (e.g., programs and breaks) may be received bya service provider in a schedule, and may provide additional informationas to which entity, e.g., a network, an operator, or other entity, ownseach of the avails. A traffic and billing system then reads the scheduleand identifies which network, operator, or other entity has the right toplace an advertisement during a particular avail of a given pod during agiven break. Existing cable systems provide static sales—e.g., a 30second spot in a particular geographic market which may be inserted intoone or more of the intervals 102.

In non-linear systems, such as Video-on-Demand (VOD), the intervals 102may take on new meanings. The interval 102 may be a pre-roll, i.e., thespace in a video that occurs immediately after a user clicks to start aVOD video. The interval 102 may be a post-roll, i.e., the space afterall of the VOD video segments have finished playing. The intervals 102may be mid-rolls, i.e., mini-breaks in the middle of a VOD video, or maybe interstitials, i.e., pod-like locations between consecutive VOD videosegments. VOD advertisement placement opportunities may appear based onspace, time, content, and user context and may be highly non-linear(i.e., the user chooses to initiate the playing of content and inresponse, the content starts). One or more of the intervals 102 in suchplay lists may be ripe for the insertion of advertisements, i.e.,advertisement placement opportunities.

As used herein, the term “binding” refers to an identification ofsignals and content within a placement opportunity (PO). PO's arefrequently created for broad amounts of content that are not yetpublished (i.e., any show on TNT network in the evening). When the showairs and a signal is detected, the signal is bound to the relevant PO'sfor that show.

As used herein, the term “impression” refers to a showing of an ad to asingle viewer. For example, if a 30 second spot is placed in 50,000video-on-demand (VOD) streams and it is known that 30,000 of the streamsactually played the ad, then 30,000 impressions of that ad have beengenerated.

As used herein, a “status notification” may be, but is not limited to,an HTTP call from a VOD server with a unique ID that was created when adecision was delivered.

As used herein, the term “break” refers to all of the space in a streambetween entertainment content. For example, a group of 4 consecutive 30second spots between 2 segments of a television show may be consideredas a single break.

In the traditional model for the placement of ads in televisionprogramming, avails are specified by a simple combination of channel andtime and decided weeks ahead of broadcast. However, new cable contentdelivery systems permit advertising spots of varying duration, permitdifferent levels of interactivity (e.g., polling or linking) through theuse of buttons on a remote control, may be defined by geography, etc. Ina world where TV viewing is becoming increasingly non-linear (e.g.,video-on-demand (VOD), networked-based personal video recorders (PVR),interactive programs), a key goal of advertisement opportunity placementsystems is to determine how to define placement opportunities that arenon-deterministic and manifest dynamically. Advanced advertising needsto accommodate advertisement placement opportunities that are invoked byuser events, which may include anything from playback of a VOD title topausing one's DVR. As the scope of potential placement opportunitiesexpands accordingly, it becomes necessary to precisely define thoseplacement opportunities with attributes representing relevant businessrules. These may be used to specify such things as inventory splits,quantity, duration, and position of ad breaks (pre-roll, mid-roll,post-roll); placement of pause ads and overlays; and levels and types ofinteractivity.

On the Internet, a content publisher and an advertiser may be isolatedfrom one another, with an advertising network acting as an intermediary.On TV, the advertising network was formerly the national network, thecable network, or the cable operator, that had fixed avails. However,emerging advanced advertising standards for dynamic television providean opportunity for content providers to derive value from a cableoperator's ad placement infrastructure by creating new and more flexibleadvertising inventory (i.e., Potential Viewership*PlacementOpportunities=Advertising Inventory). This new business model imposesunique technical challenges: unlike the Internet, where browsersaccess/display content and then are separately “referred” to a shared adnetwork, the cable television infrastructure selects and assembles boththe advertisement and the content together in the network and deliversthe combined result to customers' set top boxes. For this to work, cabletelevision advanced advertising networks may need to at least partiallyoperate within the infrastructure of an MSO. To achieve optimaladdressability and user experience and achieve bandwidth efficiencies,advertising service elements and digital delivery components need to belocated close to the edge of a network, i.e., at or near set top boxes.Decisions need to be made based upon relevant context (infrastructure,platform, content, geography, demographics, etc), which are applicableto non advertisements as well (e.g., suggested content). By makingplacement decisions and insertions at the time of a user request—or evenat the appropriate times during content playout—fully dynamic adplacement may be achieved.

Certain embodiments of the present invention are compatible with andmake use of elements defined according to the SCTE-130 standard. TheSCTE-130 standard provides a standardized and extensible message basedinterface defining a minimal set of cooperating logical servicesnecessary to communicate placement opportunities, placement decisions,and placement related event data necessary for accountabilitymeasurements. SCTE-130 defines an extensible framework of interfacesamong a set of advertising system logical services. The SCTE-130standard encompasses: a minimal set of cooperative logical servicesneeded to implement advanced addressable advertising systems; the coredata types and extensible message framework forming a vocabulary neededto communicate among the defined logical services; the interfaces amongthese logical services using the core data types and messages; and,mechanisms for extensibility that allow innovation while preservingbackward compatibility with already deployed systems—thereby reducingthe complexity for incorporating new features within the standard.

The normative parts of the SCTE-130 standard define mechanisms forintegrating systems implementing features such as VOD-based advertising,linear-based advertising, enhanced advertising capabilities such as adrotation groups (rotation groups refer to placement opportunities thatrun in rotation so that the same add is not viewed again immediately),subscriber-based addressing for advertising or content tailoring,extension points for more advanced advertising or addressing features,logical services that are implemented as one or more physical systemscreated by the same vendor, deployment of a logical service that maysimultaneously include systems from one or more vendors, and animplementation that may incorporate one or more of the defined logicalservices and interfaces.

The SCTE-130 standard defines a set of logical services comprising anadvanced advertising system. Each logical service may itself be acomplex system. In an embodiment, one or more of the following logicalservices may be used by or interact with certain embodiments of thepresent invention.

An Ad Management Service (ADM) may be configured to define messages insupport of ad insertion activities. The primary consumer of thesemessages is an Ad Decision Service (ADS). The message interfaces exposedby an ADM permit both pre-configured ad decisions as well as real-timefulfillment models. An ADM implementation may incorporate some simple adselection rules (e.g., ad rotations) but more complex ad decisions arethe responsibility of an ADS.

An Ad Decision Service (ADS) may be configured to determine howadvertising content is combined with non-advertising (i.e.,entertainment) content assets. The decisions made by an ADS may bestraightforward (i.e., specific ad content placed at a specific time ina specific asset) or arbitrarily complex (based on subscriber data,advertising zone, etc.).

A Content Information Service (CIS) may be configured to manage metadatadescribing assets (both advertising assets and non-advertising assets)available to the other SCTE-130 logical services. The CIS provides queryand notification interfaces to the other logical services. The queryservice is available on an ad-hoc basis and may be called by any otherlogical service at any time without any prior registration. Queriesspecify values or patterns to be sought in the query message metadataand the specified matching information (or an error indication) isreturned in a response message.

The Content Information Service (CIS) may be a storage and distributionengine. It stores metadata about entertainment and advertising assets;provides notifications to registered clients when metadata is modified;registers, receives and processes notifications from other CIS services;and supports real-time metadata queries. The CIS permits an AdvertisingManager (ADM) and/or Ad Decision Service (ADS) to retrieve and utilizecontent metadata in their advanced advertising decision processing.

A Placement Opportunity Information Service (POIS) may hold, maintain,and retain descriptions of placement opportunities. The POIS may alsocontain attributes and constraints for each placement opportunity,platform compliance, rights, and policies of the content in which theplacement opportunity exists. These placement opportunities are contentspecific, therefore attributes and constraints may vary by network,geographic region, or other content distribution dimension.

The POIS may be a Placement Opportunity (PO) storage and inventoryexecution engine. It stores PO metadata and statistics; providesnotifications to registered clients when PO metadata is modified;registers, receives and processes notifications from other POISservices; and supports real-time PO metadata queries. Through the POISappliance, an Advertising Manager (ADM) and/or Ad Decision Service (ADS)can retrieve and utilize placement opportunity metadata in theiradvanced advertising decision making.

The Subscriber Information Service (SIS) may be configured to manageper-subscriber information relevant to ad placement decisions. The SISprovides a mapping between subscriber or client identifiers, such as aMAC address, serial number, etc., and subscriber or audience attributes,e.g., age, sex, location of a subscriber.

The term “computer” or “computer platform” is intended to include anydata processing device, such as a desktop computer, a laptop computer, atablet computer, a mainframe computer, a server, a handheld device, adigital signal processor (DSP), an embedded processor (an example ofwhich is described in connection with FIG. 5 ), or any other device ableto process data. The computer/computer platform is configured to includeone or more microprocessors communicatively connected to one or morenon-transitory computer-readable media and one or more networks. Theterm “communicatively connected” is intended to include any type ofconnection, whether wired or wireless, in which data may becommunicated. The term “communicatively connected” is intended toinclude, but not limited to, a connection between devices and/orprograms within a single computer or between devices and/or separatecomputers over a network. The term “network” is intended to include, butnot limited to, OTA (over-the-air transmission, ATSC, DVB-T),packet-switched networks (TCP/IP, e.g., the Internet), satellite(microwave, MPEG transport stream or IP), direct broadcast satellite,analog cable transmission systems (RF), and digital video transmissionsystems (ATSC, HD-SDI, HDMI, DVI, VGA), etc.

FIG. 2 is a block diagram of an exemplary content control system 200.The system 200 can comprise one or more upstream devices 202 foraccessing and/or transmitting data, such as a data stream. In an aspect,the upstream devices 202 can comprise a content provider (e.g. audiocontent, video content, data, news feed, sports programming,advertisements, etc.) configured to transmit the data (e.g., as acontent assets, stream, fragments, files, etc.) to various end-users. Inan aspect, one or more upstream devices 202 can comprise or access anadvertisement database having a plurality of advertisements storedtherein. As an example, the advertisement database can comprise aplurality of video advertisements. As a further example, the pluralityof advertisements can each have a particular time duration associatedtherewith. In an aspect, the time duration associated with theadvertisements or alternate content can be varied in duration forapplication in various time dependent circumstances. As an example, aparticular advertisement can have multiple versions, wherein eachversion of the same advertisement can have a different time duration.Accordingly, an advertisement having a particular time duration can beretrieved to fill a time slot having a substantially equal timeduration. However, any advertisement or advertisements can be retrievedor transmitted to the end user.

The system 200 may be used to select and assemble both the advertisement212 and the content together and may deliver the combined result to userdevices 202 a-202 n (e.g., set-top box, Internet ready televisions,radios, smartphones, tablets, PCs, etc.). The user devices 202 a-202 n,may be configured to receive content from various sources including, butnot limited to, VOD and/or Internet streaming services, over WiFi orother wireless, or wired connection. Content may be transmitted (e.g.,streamed) to the user device 202 a-202 n via a network such as a contentdelivery network (CDN) 204.

In certain aspects, a content provider (e.g., MSO, streaming service,etc.) may wish to provide video streams to the user devices 202 a-202 n.However, certain video may need to be formatted for transmission and/orprocessing for rendering. Various content creators/players may haveincompatible formats. To overcome this problem, a signal received froman upstream devices 206 may be transmitted to a transcoder 208 to placethe signal in a desired format and to fragment the formatted signal intothe predetermined (e.g., 2 second, 10 second, etc.) chunks of data.These chunks may be stored for subsequent retrieval and transmission.

The system 200 may be or include a network system, such as a closed ormanaged system, whereby certain components, functions, and/orinformation are limited to one or more particular entities (e.g., MSO).As an example, the system 200 may be a network system of devices managedor operated by an entity, and the network system may communicate withone or more upstream devices 206 that are associated with entitiesoutside of the network system. For example, the upstream devices 206 maybe or comprise devices associated with content inventory, such arepositories of content, advertisers, and/or entities configured toprovide content to the managed system without having operative controlover the network system. As such, selective information may becommunicated to the upstream devices 206 to facilitate certain servicesor functions such as advertisement placement, as discussed in furtherdetail below.

A network system such as at least a portion of the system 200 maygenerate an advertisement (ad) inventory event via the consumption of anitem of content. The ad inventory event may indicate a position or breakin the content where an advertisement may be provided as part of theconsumption of the content item. The advertisement inventory event maybe filled with an advertisement from one or more sources. The contentitem may be or comprise audio, video, text or other information. As anexample, to identify a particular channel data stream, including timeswhen a program has ended and before the next program begins, or whenthere is a break in the program, e.g., a placement opportunity, a signalor marker, such as a q-tone, may be inserted in the digital stream apredetermined time before the next program begins, for example. Anobserver 210, which may be the transcoder 208, informs an ad service(ADS) 212 of the arrival of the signal or marker for subsequentplacement of one or more advertisements into the channel data stream.

In managing the delivery of content, the network system may leverage auser identifier 214 that maps to a household, user, or segment ofaudience consuming the content item. The system and methods of thepresent disclosure may generate and/or maintain a mapping of apersistent user identifier 214 and a perishable secondary identifier 216(e.g., session identifier). The persistent user identifier 214 may be along-lasting identifier associated with a user or user account overmultiple sessions or interactions. The secondary identifier 216 maypersist at the session level or some other configurable duration oftime, or may be associated with a fixed time-to-live (TTL). As anexample, when an advertisement rights management platform (e.g., ADS212) routes advertisement decision rights to an external entity (e.g.,upstream device 206) from the network system, the advertisement rightsmanagement platform may pass along the perishable secondary identifier216 to that upstream device 206 while passing both the perishablesecondary identifier 216 and the primary persistent user identifier 214to the instance of the rights management platform of the network systemowner.

The use of two identifiers in this manner enables the upstream device206 that has been granted the rights to see and use the perishablesecondary identifier 216 to target advertising to attributes associatedwith the persistent user identifier 214 without ever having possessionof that persistent user identifier 214 nor being able to reverseengineer or impute those targeting attributes to a proxy persistent useridentifier 214. As such, the persistent user identifier 214 ismaintained by the system and is not exposed to entities interacting withthe content items or advertisement inventory events.

FIG. 3 depicts a configuration of a system 300 for managing audiencedata for advertisement placements in network signal streams, accordingto an embodiment of the present invention. The system 300 may beexecuted on a server 302, interconnected by one or more networks (notshown) communicatively connected to ad services (ADSs) 304 a-304 n. TheADSs 304 a-304 n may be configured to place advertisements into breaksin a data at the request of a CDN 306.

The server 302 may be configured to communicate with a CIS 308 forreceiving one or more source signal streams (e.g., digital video, audio,etc.) from upstream devices 310 and corresponding q-tones (e.g.,instances of SCTE-35 packets) from one or more observers 312, which maybe incorporated within a transcoder 314. The transcoder 314 may also beconfigured to deliver IP video, audio, etc., in predetermined “chunks”to the CDN 306 as described above.

The CIS 308 may be configured to extract metadata from the one or moresource signal streams and from these pre-allocate a corresponding numberof unconfirmed placement opportunities without signals and to bind thesource signal stream to a plurality of premade, but unconfirmedplacement opportunities. Part of the extracted metadata includes achannel identifier associated with a corresponding source signal stream.

A POIS 316 may be configured to “confirm” unconfirmed placementopportunities by identifying temporal starting locations of theunconfirmed placement opportunities relative to both the content streamand a wall clock. The POIS 316 may be configured to return a globallyunique value, a UUID, referred to as a signal identifier or signal IDthat uniquely identifies a PO as a confirmed PO and its startinglocation within the end-to-end operational system 300. The POIS 316 theninserts the signal ID and the channel identifier into other extractedmetadata of the source signal stream using the appropriate in-bandcarriage format.

The server 302 may comprise an ADM 318. The ADM 318 may be configured toidentify an owner or operator of a signal stream (a network orlocal/regional channel) having the channel identifier and at least oneaudience attribute (PII or local/regional market information). Toidentify the owner of the signal stream and the at least one audienceattribute, the ADM 318 may place a call to an external session manager320.

A user identifier may be used by the ADM 318 to track and manageaudience data. As an example, the ADM 318 may transmit the channelidentifier to the session manager 320, which provides the ADM 318 with alist of one or more user identifiers indicative of a number ofrecipients currently viewing an identified channel owned either by anational network or a local or regional entity. The ADM 318 may transmitthe list of user identifiers and the channel identifier to the SIS 322,which provides the ADM 318 with a list of sets of audience qualifierscorrelated to the user identifiers and the channel identifier. This listof sets of audience qualifiers correlated to the user identifiers andthe channel identifier is representative of a list of recipient signalstreams having the same channel identifier that are currently being“watched” by subscribers, where each subscriber in the list has acertain set of audience attributes (e.g., PII such as a hardware MACaddress, a name, a post office address, a subscription or an orderhistory, and a credit score). The audience attributes may also beindicative of information concerning a market associated with a regionalor local service provider (e.g., all males 21 and over in a town orregion). The user identifiers may be persistent identifiers. The useridentifiers may also be mapped to second identifiers (e.g., temporaryidentifiers or perishable identifiers) that may be provided to certainentities.

The ADM 318 may be configured to obtain a plurality of targetedadvertisements corresponding to the list sets of audience qualifierscorrelated to the user identifiers and the channel identifier from theone or more ADSs 304 a-304 n. As an example, a perishable secondidentifier may be mapped (e.g., correlated) to the user identifier andmay be shared with entities for targeted advertising placement. Forexample, in managing the delivery of content, a network system mayleverage a user identifier that maps to a household, user, or segment ofaudience consuming the content item. The system and methods of thepresent disclosure may generate and/or maintain a mapping of thepersistent user identifier and a perishable secondary identifier (e.g.,session identifier). The secondary identifier may persist at the sessionlevel or some other configurable duration of time. As an example, whenan advertisement rights management platform (e.g., ADSs 304 a-304 n, ADM318, etc.) routes advertisement decision rights to an external entity(e.g., upstream device) from the network system, the advertisementrights management platform may pass along the perishable secondaryidentifier to that upstream device while passing both the perishablesecondary identifier and the primary persistent user identifier to theinstance of the rights management platform of the network systemowner/operator.

The ADM 318 may receive, from the ADSs 304 a-304 n for example, theplurality of advertisements targeted to the list representative of theplurality of recipient signal streams.

The ADM 318 may use the signal ID plus a set of locally configured orlearned targeting criteria to initiate a unique set of ad decisionrequests. The ad decision requests evolve into targeted ad decisionrequests to the appropriate decision owners and the results are a set ofad placement decisions correlating to the placement opportunitiesgenerated as a result of signal confirmation.

The ADM 318 may be configured to forward the obtained list of targetedadvertisements to the one or more ADSs 304 a-304 n with PII orlocal/regional marketing information at least partially removed by anintervening data boundary manager 326 according to a set of rulesprogrammed into the data boundary manager 326.

The CDN 306, in turn, may insert a predetermined list of one or more adsinto corresponding placement opportunities by placing ad calls to theone or more ADSs 304 a-304 n, the latter providing a list of addecisions purged of PII or local/regional marketing information forultimate delivery to the user devices (SD) 330 a-330 n.

FIG. 4 depicts a configuration of a system 400 for acceleratingadvertising placement decisions in signal streams. The system 400 may beexecuted on a server 412, interconnected by one or more networks (notshown) communicatively connected to client devices 414 a-414 n. Theclient devices 414 a-414 n are configured to store and retrieve apredetermined number of advertisements to/from corresponding caches 416a-416 n for delivery to corresponding ADSs 428 a-428 n under the controlof the server 412 and the CDN 426.

The server 412 may be configured to implement a CIS 418 for receivingone or more source signal streams (e.g., digital video, audio, etc.)from upstream devices 421 and corresponding q-tones (i.e., instances ofSCTE-35 packets) from one or more observers 434, which may beincorporated within a transcoder 424. The transcoder 424 is alsoconfigured to deliver IP video, audio, etc. in predetermined “chunks” toa CDN 426 as described above.

The CIS 418 may be configured configured to extract metadata from theone or more source signal streams and from these pre-allocate acorresponding number of unconfirmed placement opportunities withoutsignals and to bind the source signal stream to a plurality of premade,but unconfirmed placement opportunities. Part of the extracted metadataincludes a channel identifier associated with a corresponding sourcesignal stream.

A POIS 420 may be configured to “confirm” unconfirmed placementopportunities by identifying temporal starting locations of theunconfirmed placement opportunities relative to both the content streamand a wall clock. The POIS is configured to return a globally uniquevalue, a UUID, referred to as a signal identifier or signal ID thatuniquely identifies a PO as a confirmed PO and its starting locationwithin the end-to-end operational system. The POIS 420 then inserts thesignal ID and the channel identifier into other extracted metadata ofthe source signal stream using the appropriate in-band carriage format.

In parallel, the POIS 420 may be configured to initiate a workflow whereby the confirmed signal generates the set of confirmed placementopportunities and fires a lookahead decision trigger with the signal IDas the trigger data. The lookahead decision trigger recipient is aninstance of an SCTE 130 Ad Management Service 422, or ADM 422 associatedwith the server 412. The ADM 422 is configured to identify a listrepresentative of a number of recipient signal streams having thechannel identifier and at least one audience attribute prior toexpiration of the time period. To identify the list, the ADM 422 placesa call each to an external session manager 434 and an SIS 436. The ADM422 transmits the channel identifier to the session manager 434, whichprovides the ADM 422 with a list of user identifiers indicative of anumber of recipients currently viewing a channel corresponding to thechannel identifier. The ADM 422 transmits the list of user identifiersand the channel identifier to the SIS 436 which provides the ADM 422with a list of sets of audience qualifiers correlated to the useridentifiers and the channel identifier. This list of sets of audiencequalifiers correlated to the user identifiers and the channel identifieris representative of a list of recipient signal streams having the samechannel identifier that are currently being “watched” by subscribers,where each subscriber in the list has a certain set of audienceattributes (e.g., all males 21 and over). The user identifiers may bepersistent identifiers. The user identifiers may also be mapped tosecond identifiers (e.g., temporary identifiers or perishableidentifiers) that may be provided to certain entities.

The ADM 422 may be configured to obtain a plurality of targetedadvertisements corresponding to the list sets of audience qualifierscorrelated to the user identifiers and the channel identifier from theone or more ADSs 428 a-428 n. As an example, a perishable secondidentifier may be mapped (e.g., correlated) to the user identifier andmay be shared with entities for targeted advertising placement. Forexample, in managing the delivery of content, a network system (e.g.,closed or managed by an entity) may leverage a user identifier that mapsto a household, user, or segment of audience consuming the content item.The system and methods of the present disclosure may generate and/ormaintain a mapping of the persistent user identifier and a perishablesecondary identifier (e.g., session identifier). The secondaryidentifier may persist at the session level or some other configurableduration of time. As an example, when an advertisement rights managementplatform (e.g., ADSs 428 a-428 n, ADM 422, etc.) routes advertisementdecision rights to an external entity (e.g., upstream device) from thenetwork system, the advertisement rights management platform may passalong the perishable secondary identifier to that upstream device whilepassing both the perishable secondary identifier and the primarypersistent user identifier to the instance of the rights managementplatform of the network system owner/operator, for example.

The ADM 422 may use the signal ID plus a set of locally configured orlearned targeting criteria to initiate a unique set of ad decisionrequests. The ad decision requests evolve into targeted ad decisionrequests to the appropriate decision owners and the results are a set ofad placement decisions correlating to the placement opportunitiesgenerated as a result of signal confirmation.

The ADM 422 may be configured to store the obtained list of targetedadvertisements in one or more caches 428 a-428 n under the control ofcorresponding clients 414 a-414 n associated with corresponding in theone or more ADSs 428 a-428 n. The ADM 422 associates the unique signalID with each of the targeted advertisements and stores the targetedadvertisements in the one or more caches 428 a-428 n. Since there may bethousands to millions of ads to be stored in the one or more caches 428a-428 n, in an embodiment, the ADM 422 is configured to divide a timeinterval between reception of a q-tone and the arrival of acorresponding advertisement signal point into a predetermined number ofsub-time intervals and divide the signal stream into a predeterminednumber of sub-signal streams.

The clients 414 a-414 n may be configured to retrieve predeterminednumbers of ads over each of the predetermined number of sub-timeintervals for delivery by the ADS s 428 a-428 n to the predeterminednumber of sub-signal streams. The CDN 426, in turn, inserts thepredetermined number of ads into corresponding placement opportunitiesof sub-signal streams for ultimate delivery to user devices (SD) 430a-430 n over the predetermined number of sub-time intervals. In thisway, the tens of thousands to millions of requests for ads do not floodthe ADSs 428 a-428 n substantially simultaneously.

As discussed in at least FIGS. 2-4 , various user identifiers and secondidentifiers may be used by the system and methods described herein. Asan example, FIG. 5 illustrates a group of users 500, which may be orinclude a region, a market, a subset, a premises, and/or the like. Auser identifier 502 may be associated with each individual user or maybe associated with the group of users 500 or a subset of the group ofusers 500.

As a further example, FIG. 6 illustrates groups of users 600 a, 600 bwhich may be or include a region, a market, a subset, a premises, and/orthe like. User identifiers 602 a, 602 b may be associated with eachindividual user or may be associated with the group of users 600 a, 600b or a subset of the group of users 600 a, 600 b. The user identifiers602 a, 602 b may each be correlated with second identifiers 606, forexample via a data map or table of values, etc. The second identifiers606 may be perishable and may expire upon occurrence of event such as atime threshold or termination of a session. As such, the secondidentifiers 606 may be transmitted to one or more users or entities 608that may be outside of a close network system.

The use of two identifiers in this manner enables the entities 608 thathave been granted the rights to see and use the perishable secondaryidentifier 606 to target advertising to attributes associated with thepersistent user identifiers 602 a, 602 b without ever having possessionof that persistent user identifiers 602 a, 602 b nor being able toreverse engineer or impute those targeting attributes to a proxypersistent user identifiers 602 a, 602 b. As such, the persistent useridentifiers 602 a, 602 b is maintained by the system and is not exposedto entities interacting with the content items or advertisementinventory events.

FIG. 7 illustrates an exemplary method for content placement. In step702, a first identifier may be received or accessed. The firstidentifier may be or comprise a persistent identifier. The firstidentifier may be associated with one or more users consuming content.The content may comprise one or more advertisement events such as breaksor time intervals.

In step 704, a second identifier may be determined based at least on thefirst identifier. Determining the second identifier may comprisegenerating the second identifier. Determining the second identifier maycomprise retrieving the second identifier from storage using a mappingkey. The second identifier may comprise information relating to the userconsuming content that is a subset of the information represented by thefirst identifier. The second identifier may be or a perishableidentifier configured to expire based on an event. The event may be orcomprise a time period or termination of a session.

In step 706, the second identifier may be transmitted to an entityassociated with an advertisement inventory. The second identifier mayfacilitate the targeted placement of one or more advertisement from theadvertisement inventory without exposing the first identifier to theentity. The second identifier may be an encrypted one-way hash based onat least the first identifier. As an example, a plurality (e.g., series)of perishable second identifiers may be hashed from the persistent firstidentifier to control the information that is represented by (orindicated by) the second identifier.

As an illustrative example, the use of the second perishable identifiermay facilitate tracking of viewing behavior of particular users/clientsby entities outside the system of a service provider (e.g., contentprovider, MSO, etc.) without exposing the first identifier to theoutside entity. As such, the second identifier may be associated with ormay indicate a select amount of information that is being shared withthe outside entity. Accordingly, the outside entity may process thesecond identifier to target advertisements or to make other decisionsbased on the user information, but without having full access to all ofthe user information that is available to a provider of the secondidentifier. As a further example, the first identifier may be associatedwith a user profile comprising the location of a device including itshardware MAC address, marketing information, such as which programs andcommercials have been viewed, and direct subscriber personal informationsuch as a subscriber's name, home address, subscription or orderhistory, and credit score. However, the second identifier may beassociated with a subset of information for a finite window of time. Thesubset of information may comprise the location of a device, but may notexpose additional information. The type, amount, and timing ofavailability associated with the shared information may be selectivelycontrolled and may be dependent upon the intended recipient, the timing,the particular user, or other characteristics.

FIG. 8 illustrates an exemplary method for content placement. In step802, an indication of an advertisement event associated with content maybe accessed or received.

In step 804, a first identifier may be transmitted to a first entityconfigured to manage delivery of the content. The first identifier maybe or comprise a persistent identifier. The first identifier may beassociated with one or more users consuming content. The firstidentifier may identify a user receiving content. The first identifiermay be associated with one or more of content viewing behavior of one ormore users, a location of one or more users, and a demographicinformation of one or more users.

In step 806, a second identifier may be transmitted to the first entity.The second identifier may be a perishable identifier configured toexpire based on an event. The second identifier may comprise informationrelating to the user consuming content that is a subset of theinformation represented by the first identifier. The subset ofinformation may be associated with one or more of content viewingbehavior of one or more users, a location of one or more users, and ademographic information of one or more users. The second identifier maybe or a perishable identifier configured to expire based on an event.The event may be or comprise a time period or termination of a session.

In step 808, the second identifier may be transmitted to a second entityassociated with an advertisement inventory. The second identifier mayfacilitate the targeted placement of one or more advertisement from theadvertisement inventory based on the advertisement event withoutexposing the first identifier to the second entity. As an example, thesecond entity may be configured to associate the second identifier withthe one or more content assets such that the one or more content assetsmay be delivered to one or more users based on a mapping of the secondidentifier to the first identifier. The second identifier may be anencrypted one-way hash based on at least the first identifier. As anexample, a plurality (e.g., series) of perishable second identifiers maybe hashed from the persistent first identifier to control theinformation that is represented by (or indicated by) the secondidentifier.

As an illustrative example, the use of the second perishable identifiermay facilitate tracking of viewing behavior of particular users/clientsby entities outside the system of a service provider (e.g., contentprovider, MSO, etc.) without exposing the first identifier to theoutside entity. As such, the second identifier may be associated with ormay indicate a select amount of information that is being shared withthe outside entity. Such selection may be made based on rules or factorsrelating to the user, the recipient of the identifiers, the content, thecontent provider, and the like. Accordingly, the outside entity mayprocess the second identifier to target content delivery or to makeother decisions based on the user information, but without having fullaccess to all of the user information that is available to a provider ofthe second identifier. As a further example, the first identifier may beassociated with a user profile comprising the location of a deviceincluding its hardware MAC address, marketing information, such as whichprograms and commercials have been viewed, and direct subscriberpersonal information such as a subscriber's name, home address,subscription or order history, and credit score. However, the secondidentifier may be associated with a subset of information for a finitewindow of time. The subset of information may comprise the location of adevice and may be available for predetermined period of time (e.g., 1hour), but may not expose additional information. The type, amount, andtiming of availability associated with the shared information may beselectively controlled and may be dependent upon the intended recipient,the timing, the particular user, or other characteristics.

FIG. 9 illustrates an exemplary method for content placement. In step902, a perishable identifier may be received or accessed. The perishableidentifier may be associated with one or more users consuming content.The content may comprise one or more advertisement events such as abreaks or intervals. The perishable identifier may be configured toexpire based on one or more of a time period and termination of asession.

In step 904, an advertisement may be received or accessed based at leaston the one or more advertisement events. As an example, one or moreadvertisements may be received to be placed at the one or moreadvertisement events.

In step 906, a persistent identifier may be determined based at least onthe perishable identifier. The persistent identifier may be associatedwith the one or more users consuming content. Determining the persistentidentifier may comprise retrieving the persistent identifier fromstorage using a mapping key associated with the perishable identifier.

In step 908, one or more advertisements may be placed, for exmaple,using one or more of the perishable identifier and the persistentidentifier. Placing the advertisement may comprise causing theadvertisement to be rendered to the user consuming content. Theperishable identifier may facilitate the targeted placement of theadvertisement without exposing the persistent identifier to a source ofthe advertisement. Although advertisements are described, any placementof content may be effected based on one or more of the identifiers.Supplemental content may be placed in addition to a primary content thatis being consumed. Alternative content may be placed. The termadvertisement is used as an example only and is not intended to limitthe scope of the use of the first and/or second identifiers in managingcontent selection and delivery.

FIG. 10 is a block diagram illustrating an exemplary operatingenvironment for performing the disclosed methods. This exemplaryoperating environment is only an example of an operating environment andis not intended to suggest any limitation as to the scope of use orfunctionality of operating environment architecture. Neither should theoperating environment be interpreted as having any dependency orrequirement relating to any one or combination of components illustratedin the exemplary operating environment.

The present methods and systems can be operational with numerous othergeneral purpose or special purpose computing system environments orconfigurations. Examples of well known computing systems, environments,and/or configurations that can be suitable for use with the systems andmethods comprise, but are not limited to, personal computers, servercomputers, laptop devices, and multiprocessor systems. Additionalexamples comprise set top boxes, programmable consumer electronics,network PCs, minicomputers, mainframe computers, and/or distributedcomputing environments that comprise any of the above systems ordevices.

The processing of the disclosed methods and systems can be performed bysoftware components. The disclosed systems and methods can be describedin the general context of computer-executable instructions, such asprogram modules, being executed by one or more computers or otherdevices. Generally, program modules comprise computer code, routines,programs, objects, components, data structures, etc. that performparticular tasks or implement particular abstract data types. Thedisclosed methods can also be practiced in grid-based and distributedcomputing environments where tasks are performed by remote processingdevices that are linked through a communications network. In adistributed computing environment, program modules can be located inboth local and remote computer storage media including memory storagedevices.

Further, one skilled in the art will appreciate that the systems andmethods disclosed herein can be implemented via a general-purposecomputing device in the form of a computing system 1001. The componentsof the computing system 1001 can comprise, but are not limited to, oneor more processors or processing units 1003, a system memory 1012, and asystem bus 1013 that couples various system components including theprocessor 1003 to the system memory 1012. In the case of multipleprocessing units 1003, the system can utilize parallel computing.

The system bus 1013 represents one or more of several possible types ofbus structures, including a memory bus or memory controller, aperipheral bus, an accelerated graphics port, and a processor or localbus using any of a variety of bus architectures. By way of example, sucharchitectures can comprise an Industry Standard Architecture (ISA) bus,a Micro Channel Architecture (MCA) bus, an Enhanced ISA (EISA) bus, aVideo Electronics Standards Association (VESA) local bus, an AcceleratedGraphics Port (AGP) bus, and a Peripheral Component Interconnects (PCI),a PCI-Express bus, a Personal Computer Memory Card Industry Association(PCMCIA), Universal Serial Bus (USB) and the like. The bus 1013, and allbuses specified in this description can also be implemented over a wiredor wireless network connection and each of the subsystems, including theprocessor 1003, a mass storage device 1004, an operating system 1005,content control software 1006, content control data 10010, a networkadapter 1008, system memory 1012, an Input/Output Interface 1010, adisplay adapter 1009, a display device 1011, and a human machineinterface 1002, can be contained within one or more remote computingdevices 1014 a,b,c at physically separate locations, connected throughbuses of this form, in effect implementing a fully distributed system.

The computing system 1001 typically comprises a variety of computerreadable media. Exemplary readable media can be any available media thatis accessible by the computing system 1001 and comprises, for exampleand not meant to be limiting, both volatile and non-volatile media,removable and non-removable media. The system memory 1012 comprisescomputer readable media in the form of volatile memory, such as randomaccess memory (RAM), and/or non-volatile memory, such as read onlymemory (ROM). The system memory 1012 typically contains data such ascontent control data 1007 and/or program modules such as operatingsystem 1005 and content control software 1006 that are immediatelyaccessible to and/or are presently operated on by the processing unit1003.

In another aspect, the computing system 1001 can also comprise otherremovable/non-removable, volatile/non-volatile computer storage media.By way of example, FIG. 10 illustrates a mass storage device 1004 whichcan provide non-volatile storage of computer code, computer readableinstructions, data structures, program modules, and other data for thecomputing system 1001. For example and not meant to be limiting, a massstorage device 1004 can be a hard disk, a removable magnetic disk, aremovable optical disk, magnetic cassettes or other magnetic storagedevices, flash memory cards, CD-ROM, digital versatile disks (DVD) orother optical storage, random access memories (RAM), read only memories(ROM), electrically erasable programmable read-only memory (EEPROM), andthe like.

Optionally, any number of program modules can be stored on the massstorage device 1004, including by way of example, an operating system1005 and content control software 1006. Each of the operating system1005 and content control software 1006 (or some combination thereof) cancomprise elements of the programming and the content control software1006. Content control data 1007 can also be stored on the mass storagedevice 1004. Content control data 1007 can be stored in any of one ormore databases known in the art. Examples of such databases comprise,DB2®, Microsoft® Access, Microsoft® SQL Server, Oracle®, mySQL,PostgreSQL, and the like. The databases can be centralized ordistributed across multiple systems. In an aspect, content control data1007 can comprise information relating to events, event notifiers,placement spots, alternate programming, programming blackout,advertisements, and the like. As an example, the content control datacan comprise information relating to a particular programming beingtransmitted to a user location. As a further example, the contentcontrol data can comprise information and instructions related toprocessing placement signals and updating content being transmitted to auser location. However, other information can be associated with thecontent control data, such as information about the subscriber consumingthe content including location, device type, and subscriptioninformation, and information relating the content for blackoutsincluding blackout locations and alternative content associated with theblackout.

In another aspect, the user can enter commands and information into thecomputing system 1001 via an input device (not shown). Examples of suchinput devices comprise, but are not limited to, a keyboard, pointingdevice (e.g., a “mouse”), a microphone, a joystick, a scanner, tactileinput devices such as gloves, and other body coverings, and the likeThese and other input devices can be connected to the processing unit1003 via a human machine interface 1002 that is coupled to the systembus 1013, but can be connected by other interface and bus structures,such as a parallel port, game port, an IEEE 1394 Port (also known as aFirewire port), a serial port, or a universal serial bus (USB).

In yet another aspect, a display device 1011 can also be connected tothe system bus 1013 via an interface, such as a display adapter 1009. Itis contemplated that the computing system 1001 can have more than onedisplay adapter 1009 and the computing system 1001 can have more thanone display device 1011. For example, a display device can be a monitor,an LCD (Liquid Crystal Display), or a projector. In addition to thedisplay device 1011, other output peripheral devices can comprisecomponents such as speakers (not shown) and a printer (not shown) whichcan be connected to the computing system 1001 via Input/Output Interface1010. Any step and/or result of the methods can be output in any form toan output device. Such output can be any form of visual representation,including, but not limited to, textual, graphical, animation, audio,tactile, and the like. The display 1011 and computing system 1001 can bepart of one device, or separate devices.

The computing system 1001 can operate in a networked environment usinglogical connections to one or more remote computing devices 1014 a,b,c.By way of example, a remote computing device can be a personal computer,portable computer, smartphone, a server, a router, a network computer, apeer device or other common network node, and so on. Logical connectionsbetween the computing system 1001 and a remote computing device 1014a,b,c can be made via a network 1015, such as a local area network (LAN)and/or a general wide area network (WAN). Such network connections canbe through a network adapter 1008. A network adapter 1008 can beimplemented in both wired and wireless environments. Such networkingenvironments are conventional and commonplace in dwellings, offices,enterprise-wide computer networks, intranets, and the Internet.

For purposes of illustration, application programs and other executableprogram components such as the operating system 1005 are illustratedherein as discrete blocks, although it is recognized that such programsand components reside at various times in different storage componentsof the computing system 1001, and are executed by the data processor(s)of the computer. An implementation of content control software 1006 canbe stored on or transmitted across some form of computer readable media.Any of the disclosed methods can be performed by computer readableinstructions embodied on computer readable media. Computer readablemedia can be any available media that can be accessed by a computer. Byway of example and not meant to be limiting, computer readable media cancomprise “computer storage media” and communications media. “Computerstorage media” comprise volatile and non-volatile, removable andnon-removable media implemented in any methods or technology for storageof information such as computer readable instructions, data structures,program modules, or other data. Exemplary computer storage mediacomprises, but is not limited to, RAM, ROM, EEPROM, flash memory orother memory technology, CD-ROM, digital versatile disks (DVD) or otheroptical storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other medium which canbe used to store the desired information and which can be accessed by acomputer.

The methods and systems can employ artificial intelligence (AI)techniques such as machine learning and iterative learning. Examples ofsuch techniques include, but are not limited to, expert systems, casebased reasoning, Bayesian networks, behavior based AI, neural networks,fuzzy systems, evolutionary computation (e.g. genetic algorithms), swarmintelligence (e.g. ant algorithms), and hybrid intelligent systems (e.g.expert inference rules generated through a neural network or productionrules from statistical learning).

While the methods and systems have been described in connection withpreferred embodiments and specific examples, it is not intended that thescope be limited to the particular embodiments set forth, as theembodiments herein are intended in all respects to be illustrativerather than restrictive.

Unless otherwise expressly stated, it is in no way intended that anymethod set forth herein be construed as requiring that its steps beperformed in a specific order. Accordingly, where a method claim doesnot actually recite an order to be followed by its steps or it is nototherwise specifically stated in the claims or descriptions that thesteps are to be limited to a specific order, it is no way intended thatan order be inferred, in any respect. This holds for any possiblenon-express basis for interpretation, including: matters of logic withrespect to arrangement of steps or operational flow; plain meaningderived from grammatical organization or punctuation; the number or typeof embodiments described in the specification.

As used in the specification and the appended claims, the singular forms“a,” “an,” and “the” include plural referents unless the context clearlydictates otherwise. Ranges may be expressed herein as from “about” oneparticular value, and/or to “about” another particular value. When sucha range is expressed, another embodiment includes from the oneparticular value and/or to the other particular value. Similarly, whenvalues are expressed as approximations, by use of the antecedent“about,” it will be understood that the particular value forms anotherembodiment. It will be further understood that the endpoints of each ofthe ranges are significant both in relation to the other endpoint, andindependently of the other endpoint.

“Optional” or “optionally” means that the subsequently described eventor circumstance may or may not occur, and that the description includesinstances where said event or circumstance occurs and instances where itdoes not.

Throughout the description and claims of this specification, the word“comprise” and variations of the word, such as “comprising” and“comprises,” means “including but not limited to,” and is not intendedto exclude, for example, other components, integers or steps.“Exemplary” means “an example of” and is not intended to convey anindication of a preferred or ideal embodiment. “Such as” is not used ina restrictive sense, but for explanatory purposes.

Disclosed are components that can be used to perform the disclosedmethods and comprise the disclosed systems. These and other componentsare disclosed herein, and it is understood that when combinations,subsets, interactions, groups, etc. of these components are disclosedthat while specific reference of each various individual and collectivecombinations and permutation of these may not be explicitly disclosed,each is specifically contemplated and described herein, for all methodsand systems. This applies to all aspects of this application including,but not limited to, steps in disclosed methods. Thus, if there are avariety of additional steps that can be performed it is understood thateach of these additional steps can be performed with any specificembodiment or combination of embodiments of the disclosed methods.

The present methods and systems may be understood more readily byreference to the following detailed description of preferred embodimentsand the examples included therein and to the Figures and their previousand following description.

As will be appreciated by one skilled in the art, the methods andsystems may take the form of an entirely hardware embodiment, anentirely software embodiment, or an embodiment combining software andhardware aspects. Furthermore, the methods and systems may take the formof a computer program product on a computer-readable storage mediumhaving computer-readable program instructions (e.g., computer software)embodied in the storage medium. More particularly, the present methodsand systems may take the form of web-implemented computer software. Anysuitable computer-readable storage medium may be utilized including harddisks, CD-ROMs, optical storage devices, or magnetic storage devices.

Embodiments of the methods and systems are described below withreference to block diagrams and flowchart illustrations of methods,systems, apparatuses and computer program products. It will beunderstood that each block of the block diagrams and flowchartillustrations, and combinations of blocks in the block diagrams andflowchart illustrations, respectively, can be implemented by computerprogram instructions. These computer program instructions may be loadedonto a general purpose computer, special purpose computer, or otherprogrammable data processing apparatus to produce a machine, such thatthe instructions which execute on the computer or other programmabledata processing apparatus create a means for implementing the functionsspecified in the flowchart block or blocks.

These computer program instructions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including computer-readableinstructions for implementing the function specified in the flowchartblock or blocks. The computer program instructions may also be loadedonto a computer or other programmable data processing apparatus to causea series of operational steps to be performed on the computer or otherprogrammable apparatus to produce a computer-implemented process suchthat the instructions that execute on the computer or other programmableapparatus provide steps for implementing the functions specified in theflowchart block or blocks.

Accordingly, blocks of the block diagrams and flowchart illustrationssupport combinations of means for performing the specified functions,combinations of steps for performing the specified functions and programinstruction means for performing the specified functions. It will alsobe understood that each block of the block diagrams and flowchartillustrations, and combinations of blocks in the block diagrams andflowchart illustrations, can be implemented by special purposehardware-based computer systems that perform the specified functions orsteps, or combinations of special purpose hardware and computerinstructions.

It will be apparent to those skilled in the art that variousmodifications and variations can be made without departing from thescope or spirit. Other embodiments will be apparent to those skilled inthe art from consideration of the specification and practice disclosedherein. It is intended that the specification and examples be consideredas exemplary only, with a true scope and spirit being indicated by thefollowing claims.

1. A method comprising: receiving a first identifier associated with auser of content, wherein the content comprises one or more advertisementevents; determining a second identifier based at least on the firstidentifier, wherein the second identifier is a perishable identifierconfigured to expire based on an event; transmitting the secondidentifier to an external entity, wherein, if not expired, the secondidentifier facilitates the external entity to determine targetedplacement of an advertisement without exposing the first identifier tothe external entity, and wherein, if expired before determination of thetargeted placement of the advertisement, the second identifier does notfacilitate the external entity to determine targeted placement of theadvertisement; and placing the advertisement based on the firstidentifier.
 2. The method of claim 1, wherein the event comprises a timeperiod.
 3. The method of claim 1, wherein the event comprisestermination of a session
 4. The method of claim 1, wherein the secondidentifier is associated with a subset of information associated withthe first identifier, wherein the subset of the information associatedwith the first identifier comprises one or more of: content viewingbehavior of one or more users, a location of one or more users, and ademographic information of one or more users.
 5. The method of claim 1,wherein the first identifier is a persistent identifier.
 6. The methodof claim 1, wherein the first identifier is associated with a pluralityof users.
 7. The method of claim 1, wherein the determining the secondidentifier comprises generating the second identifier.
 8. The method ofclaim 1, wherein the determining the second identifier comprisesretrieving the second identifier from storage using a mapping key.
 9. Amethod comprising: receiving an indication of an advertisementopportunity associated with content; transmitting a first identifier toat least one of one or more first devices associated with a rightsmanagement entity; transmitting a second identifier to at least one ofthe one or more first devices, wherein the second identifier is aperishable identifier configured to expire based on an event, andwherein the second identifier is mapped to the first identifier; andtransmitting the second identifier to a second device associated with anexternal entity, wherein, if not expired, the second identifierfacilitates the external entity to determine targeted placement of oneor more content assets based on the advertisement opportunity withoutexposing the first identifier to the external entity, and wherein, ifexpired before determination of the targeted placement of the one ormore content assets, the second identifier does not facilitate theexternal entity to determine such targeted placement.
 10. The method ofclaim 9, wherein the event comprises a time period.
 11. The method ofclaim 10, wherein the event comprises termination of a session
 12. Themethod of claim 9, wherein the second identifier is associated with asubset of information associated with the first identifier, wherein thesubset of the information associated with the first identifier comprisesone or more of: content viewing behavior of one or more users, alocation of one or more users, and a demographic information of one ormore users.
 13. The method of claim 9, wherein the first identifier is apersistent identifier.
 14. The method of claim 9, further comprisingsending, if the second identifier is not expired at least at the time ofthe transmitting, the one or more advertisements to the user associatedwith the first identifier.
 15. A device comprising: one or moreprocessors; and memory storing instructions that, when executed by theone or more processors, cause the device to: receive a first identifierassociated with a user of content, wherein the content comprises one ormore advertisement events; determine a second identifier based at leaston the first identifier, wherein the second identifier is a perishableidentifier configured to expire based on an event; transmit the secondidentifier to an external entity, wherein, if not expired, the secondidentifier facilitates the external entity to determine targetedplacement of an advertisement without exposing the first identifier tothe external entity, and wherein, if expired before determination of thetargeted placement of the advertisement, the second identifier does notfacilitate the external entity to determine targeted placement of theadvertisement; and place the advertisement based on the firstidentifier.
 16. The device of claim 15, wherein the event comprises atime period.
 17. The device of claim 15, wherein the event comprisestermination of a session.
 18. The device of claim 15, wherein the secondidentifier is associated with a subset of information associated withthe first identifier, wherein the subset of the information associatedwith the first identifier comprises one or more of: content viewingbehavior of one or more users, a location of one or more users, and ademographic information of one or more users.
 19. The device of claim15, wherein the first identifier is a persistent identifier.
 20. Thedevice of claim 15, wherein the instructions, when executed by the oneor more processors, further cause the device to: send, if the secondidentifier is not expired at least at the time of the transmitting, theone or more advertisements to the user associated with the firstidentifier.