WO2001097439A1 - Procede et systeme d'identification de telespectateur et de verification d'ensemble de donnees - Google Patents
Procede et systeme d'identification de telespectateur et de verification d'ensemble de donnees Download PDFInfo
- Publication number
- WO2001097439A1 WO2001097439A1 PCT/US2000/033864 US0033864W WO0197439A1 WO 2001097439 A1 WO2001097439 A1 WO 2001097439A1 US 0033864 W US0033864 W US 0033864W WO 0197439 A1 WO0197439 A1 WO 0197439A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- viewer
- unique identifier
- encrypted
- mobile agent
- unique
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 94
- 238000012795 verification Methods 0.000 title claims abstract description 35
- 238000013480 data collection Methods 0.000 title claims abstract description 15
- 239000003795 chemical substances by application Substances 0.000 claims description 220
- 239000003550 marker Substances 0.000 claims description 30
- 238000004891 communication Methods 0.000 claims description 19
- 230000002207 retinal effect Effects 0.000 claims description 13
- 210000001525 retina Anatomy 0.000 claims description 9
- 230000005236 sound signal Effects 0.000 claims description 6
- 230000008878 coupling Effects 0.000 claims 1
- 238000010168 coupling process Methods 0.000 claims 1
- 238000005859 coupling reaction Methods 0.000 claims 1
- 230000000994 depressogenic effect Effects 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 239000000835 fiber Substances 0.000 description 4
- 230000004044 response Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000002860 competitive effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 238000004080 punching Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/09—Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
- H04H60/14—Arrangements for conditional access to broadcast information or to broadcast-related services
- H04H60/23—Arrangements for conditional access to broadcast information or to broadcast-related services using cryptography, e.g. encryption, authentication, key distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/35—Arrangements for identifying or recognising characteristics with a direct linkage to broadcast information or to broadcast space-time, e.g. for identifying broadcast stations or for identifying users
- H04H60/45—Arrangements for identifying or recognising characteristics with a direct linkage to broadcast information or to broadcast space-time, e.g. for identifying broadcast stations or for identifying users for identifying users
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/29—Arrangements for monitoring broadcast services or broadcast-related services
- H04H60/31—Arrangements for monitoring the use made of the broadcast services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/601—Broadcast encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates to the field of verification and authentication of marketing surveys, more specifically, the present invention relates to the use of personal identification numbers and cryptography to identify viewers and verify data regarding selection of broadcasted signals by a viewer.
- the viewer box includes a means for individual viewers to indicate that they are viewing a broadcast selection by pressing one of a plurality of buttons on the viewer box.
- the button is specifically assigned to that viewer. Since anyone can press the button, however, erroneous identification of which viewer is watching a given selection is possible.
- the data collected from a viewer box could be associated with a viewer, which is different from the actual viewer. The result is an inaccurate collection of data.
- a third method, which actively detects the number of viewers, has also been utilized by survey companies.
- the active method uses ultrasonic wave maps to map a viewing area when it is empty and when it is occupied with viewers.
- the first collected map, which is ofthe empty viewing area is subtracted from the second collected map, which is ofthe occupied viewing area.
- the resulting map is processed to determine the number of viewers in an audience.
- This method is flawed because it cannot discriminate between viewers.
- a total number of viewers in a viewing area may be approximated by this method, but the viewer's identity cannot be discerned. An unidentified viewer may be present or viewers having known identities may be confused. Therefore, inaccurate data collection may still result.
- a fourth method requires that each viewer wear a transmitter, which transmits an identification signal identifying that individual viewer. At predetermined periods, the transmitter transmits the identification signal to a receiver box. The receiver box records the identified viewer as viewing a particular broadcast.
- the same problems are associated with this method as with the other methods.
- the transmitter may be left in the viewing area when the viewer leaves or the transmitter may be worn by another individual. This results in the inaccurate collection of data. Further, wearing a transmitter is inconvenient and there is a high likelihood that the viewer will take it off, further reducing the accuracy ofthe results.
- the present invention solves the problems associated with the prior art discussed above.
- An advantage ofthe present invention is that it provides a method and system to identify a viewer of a selected broadcast signal.
- a further advantage ofthe present invention is that it provides a method and system which uses a unique identifier to identify a viewer of a selected broadcast signal.
- a further advantage ofthe present invention is that it provides a system which uses a bio- signature to identify a viewer of a selected broadcast signal.
- a further advantage ofthe present invention is that it provides a method and system to verify the data collected regarding broadcast signal selections made by a viewer.
- An even further advantage ofthe present invention is that it provides a method and system which uses a personal identification number and cryptography to verify the identity of a viewer and data collected regarding broadcast signal selections made by the viewer.
- the present invention is directed to a method and system for viewer identification and data collection verification that confirms the identity ofthe viewer before submission of collected data regarding a broadcast.
- the viewer is assigned a first unique identifier which can be a personal identification number or digitized biological indicia.
- the first unique identifier is used to positively identify a viewer and to encode any data transmitted between a viewer and a survey company, thereby confirming positive identification ofthe data also.
- Encoding the data also provides a secure means to transmit the data to prevent unauthorized use of that data.
- the data is also encoded using a cryptographic key. Accordingly, the cryptographic key is part of a public key/private key pair. The two layers of encoding provide additional security.
- an apparatus transmits identical mobile agents including the first unique identifier and public key/private key pair simultaneously to a broadcast audience that may include millions of viewers.
- the mobile agent will only be activated at a viewer's location if the viewer enters a second unique identifier which matches the first unique identifier.
- the remaining mobile agents transmitted to locations other than the viewer's location ofthe viewer assigned the first unique identifier i.e., the mobile agents in which a second unique identifier does match the first unique identifier
- the mobile agent begins collecting data, such as the television channel being watched and the time spent watching that channel.
- the collected data is sent to the survey company along with the first unique identifier.
- the first unique identifier is included with the collected data so that the viewer is correctly identified.
- a first unique identifier is assigned to a viewer and stored in a memory in a server.
- the first unique identifier can be assigned by selecting a unique alphanumeric sequence of a predetermined length from a list of unused alphanumeric sequences and assigning the unique alphanumeric sequence to the viewer. The assignment is then recorded in the server memory and the unique alphanumeric sequence is removed from the list of unused alphanumeric sequences.
- the first unique identifier can be assigned by creating a digital representation of a body characteristic of a viewer and associating that digital representation to the viewer. The assignment is then stored in the server memory.
- a public/private key pair is then generated and the first unique identifier is encrypted using the public key, which forms an encrypted unique identifier.
- the public key is then stored in the server memory.
- the public/private key pair is appended to a mobile agent, which forms a keyed mobile agent.
- the mobile agent is computer code, which includes a set of commands, which can be executed by a viewer box and can also include biographic and demographic data regarding a specific viewer.
- the set of commands includes instructions to the viewer box on what data to collect and for what period of time to collect the data.
- the keyed mobile agent is encrypted using the first unique identifier, which forms an encrypted keyed mobile agent.
- the encrypted unique identifier is appended to the encrypted keyed mobile agent, which forms a unique encrypted keyed mobile agent.
- the unique encrypted keyed mobile agent is then transferred from the server to the viewer box and the viewer enters a second unique identifier in the viewer box.
- the encrypted keyed mobile agent is separated from the unique encrypted keyed mobile agent and is decrypted using the second unique identifier, thereby forming a decrypted keyed mobile agent.
- the private key is then separated from the mobile agent in the decrypted keyed mobile agent and the encrypted unique identifier is decrypted using the private key, which forms a data string.
- the data string and the second unique identifier are compared. If they are identical, the mobile agent is stored in memory at the viewer box.
- the data string is identical to the second unique identifier if the second unique identifier is identical to the first unique identifier. If the second unique identifier is different from the first unique identifier, the data string will not match the second unique identifier.
- the mobile agent is activated and a plurality of broadcast signals are received by the viewer box. Under the instructions from the mobile agent, the viewer box then records in a memory which broadcast signal is selected and for how long each broadcast selection is viewed.
- a data agent is then formed by appending the collected data to the mobile agent forming a data agent and the data agent is encrypted using the private key to form an encrypted data agent.
- the second unique identifier is then appended to the encrypted data agent to form a unique encrypted data agent.
- the unique encrypted data agent is transferred to the server where it is registered by comparing the unique identifiers in the server memory with the appended second unique identifier. Once a matching unique identifier is found, the corresponding private key is retrieved from the server memory and the encrypted data agent is decrypted using the private key, which forms a decrypted data agent.
- the collected data and mobile agent are stored in the server memory.
- the private key may be appended to the mobile agent by creating a digital word with the mobile agent and placing the private key in front ofthe digital word in a data stream. A marker is then placed in front ofthe private key in the data stream. The marker indicates the starting positions ofthe private key and mobile agent in the data stream.
- the step of requesting a second unique identifier from the viewer is accomplished, according to one embodiment ofthe invention, by first determining that the unique encrypted keyed mobile agent has been received at the second location and then outputting a message to the viewer to enter the second unique identifier.
- the message to the viewer requesting entry ofthe second unique identifier can be made by displaying a message on a display means, illuminating an indicator light, or generating an audio signal.
- the viewer can enter the second unique identifier by entering a personal identification number on a keypad or other user interface (e.g., scanning a bar code in a reader) which is in communication with a viewer box or by inputting the digitized unique biological identifier.
- the viewer box instead of signaling the user to enter the second unique identifier, the viewer box does not activate until a unique identifier is entered. This would prevent viewing ofthe broadcast signal until the viewer has identified himself to the viewer box.
- the viewer can input a digitized unique biological identifier by inserting an appendage, for example, the tip of a finger, into a print reader which scans the appendage and creates a digital representation ofthe appendage's print which is then input into the viewer box.
- an appendage for example, the tip of a finger
- the viewer can input a digitized unique biological identifier by placing his eye near a retinal scanner which scans the viewer's retina and creates a digital representation ofthe viewer's retina. The digital representation ofthe retinal scan is then input to the viewer box.
- Separating the encrypted keyed mobile agent from the unique encrypted keyed mobile agent is accomplished, according to one embodiment ofthe invention, by locating a marker in a data stream which contains the unique encrypted keyed mobile agent and reading the marker to determine the starting position of each piece of data in the encrypted keyed mobile agent. Once the starting positions are known, the first unique identifier, private key, public key, and mobile agent are separated into individual digital words.
- the individual digital words are sixteen bits long and are arranged in data fields in serial order as follows: (1) first unique identifier; (2) private key; (3) public key; and (4) mobile agent.
- each data field is a plurality of sixteen-bit words.
- Data collection at the second location is accomplished by determining the broadcast channel selected by the viewer and recording the selected broadcast channel and the elapsed time viewing the selected broadcast channel in a memory at the second location.
- a viewer changes a selected broadcast channel by first entering a unique identifier (e.g., PIN, thumbprint, retinal scan) and then changing the channel. The viewer box will then be able to track exactly what broadcast channel was selected and for how long a particular viewer watched the selected broadcast channel.
- a remote control includes a keypad wherein selected keys of the keypad scan the print of a finger as the key is pressed. The print reading keys allow a viewer to select broadcast channels in one step (i.e., without separately entering the unique identifier).
- Another aspect ofthe present invention allows a public key /private key pair to be securely transferred to a viewer box.
- a first unique identifier is assigned to a viewer and stored in a memory by a server using the methods described above.
- a public/private key pair is then generated by the server and the first unique identifier is encrypted using the private key to form an encrypted unique identifier.
- the public key and private key are then stored in the memory.
- the public key and private key are then encrypted using the first unique identifier to form encrypted keys.
- the encrypted unique identifier is appended to the encrypted keys forming unique encrypted keys.
- the unique encrypted keys are then transferred from the server to the viewer box.
- a second unique identifier is then requested from the viewer by the viewer box.
- the viewer enters the second unique identifier that was previously assigned.
- the first and second unique identifiers are identical.
- the encrypted keys are then separated from the unique encrypted keys and the encrypted keys are decrypted using the second unique identifier to form a decrypted private key and decrypted public key.
- the encrypted unique identifier is then decrypted using the private key form a data string.
- the data string and the second unique identifier are then compared. If the data string and the second unique identifier are identical, the decrypted keys are stored in memory in the viewer box. If they are not identical, an error message is returned to the server.
- a first unique identifier is assigned to a viewer and the first unique identifier is stored in a memory in the server.
- the first unique identifier is then appended to a mobile agent to form a unique mobile agent.
- the mobile agent includes a set of commands.
- the unique mobile agent is then transmitted to a viewer box.
- the viewer box is attached to media equipment.
- the unique mobile agent is then registered by the viewer box by comparing the first unique identifier transmitted from the server with a second unique identifier entered into the viewer box by the viewer. After registering the unique mobile agent, a viewer chooses from a plurality of broadcast signals, which are received by the viewer box.
- the selection of a broadcast signal is recorded in memory in the viewer box as collected data.
- the unique identifier is then appended to the collected data to form unique collected data and the unique collected data is transmitted back to the server.
- the unique collected data is then registered by the server and the collected data is stored in a memory in the server.
- the viewer box for one embodiment of a system for viewer identification and verification of collected data connected to a media device includes a control circuit, a memory circuit electrically connected to the control circuit, an input means electrically connected to the control circuit, and an output means electrically connected to the control circuit.
- the control circuit has a means to determine which broadcast signal is selected by a viewer.
- the memory circuit stores any data collected by the control circuit and any instruction set carried out by the control circuit.
- the input means allows the viewer to enter data ⁇ into the control circuit and the output means allows the control circuit to prompt a viewer to enter information into the input means.
- the control circuit includes one of a variety of communications configurations.
- the first configuration includes a two-way communication port connected between the control circuit and a transmitter/receiver and a oneway or two-way communication port connected between the control circuit and media equipment.
- the second configuration includes a one-way or two-way communication port connected between the control circuit and a transmitter/receiver, a one-way or two-way communication port connected between the control circuit and media equipment, and a two-way communication port connected between the control circuit and a server circuit.
- the third configuration includes a low power atmospheric transmitter/receiver, a low power atmospheric transmitter/receiver controller, a two-way low power atmospheric transmitter/receiver port, and a one-way or two-way communication port connected between the control circuit and media equipment.
- a system for viewer identification and verification of collected data includes a transmitter, a viewer box, a server circuit, a receiver connected between the viewer box and a server circuit, and media equipment.
- the transmitter transmits a combined signal including a broadcast signal and a mobile agent signal to the viewer box.
- the viewer box receives the combined signal and is capable of transmitting a data signal.
- the server circuit includes a server control circuit and a server memory.
- the receiver receives the data signal which is transmitted from the viewer box and couples the signal to the server circuit.
- the media equipment is responsive to the transmitter and displays the broadcast signal transmitted by the transmitter.
- Figure 1 is a functional diagram of a system for viewer identification and data collection verification formed in accordance with a first embodiment ofthe present invention
- Figure 2 is a functional diagram of a system for viewer identification and data collection verification formed in accordance with a second embodiment ofthe present invention
- Figure 3 is a diagram of a flowchart illustrating the steps of a method for viewer identification and data collection formed in accordance with the first embodiment ofthe present invention
- Figure 4 is a diagram of a flowchart illustrating the steps of a method for viewer identification and data collection verification formed in accordance with the second embodiment ofthe present invention.
- Figure 5 is a diagram of a flowchart illustrating the steps of a method for securely transferring a public key/private key pair to a remote location for use in a viewer identification and data collection verification system formed in accordance with a further embodiment ofthe present invention.
- FIG. 1 is a functional diagram of a system for viewer identification and data collection verification according to a first embodiment ofthe invention.
- a viewer box 2a is placed in proximity to a viewer's media equipment 6 (e.g., television, radio, personal computer).
- the viewer box 2a includes a control circuit 20a, an input/output ("I/O") means 18, and memory 16.
- the control circuit 20a is connected to a first I/O port 22a and a second I/O port 22b to which electrical connections can be made.
- the I/O ports 22a, 22b are merely modular connectors which are well known in the art of electrical connections.
- the viewer box 2a may have its own power supply or, preferably, will draw power from the media equipment 6 or a local receiver 24 (shown in Figure 2) as is well known in the art.
- a transmitter/receiver 4 is electrically connected to a broadcast signal transmitter 1 and a server control circuit 12.
- the broadcast signal transmitter 1 e.g., television transmitter, radio transmitter
- the server control circuit 12 is connected to a server memory 14.
- the server memory 14 is a memory circuit that is accessed and controlled by the server control circuit 12 and is a type of memory circuitry known in the art.
- the server control circuit 12 transmits a mobile agent signal to the transmitter/receiver 4.
- the mobile agent signal includes a set of instructions to be carried out by a control circuit 20a.
- the mobile agent may also include biographic or demographic information regarding the specific viewer for which it is generated.
- the transmitter/receiver 4 combines the broadcast signal and mobile agent signal using means known in the art (e.g., frequency multiplexing). The combined signal is then transmitted via connection 8 to the first I/O port 22a.
- the server control circuit 12 transmits a mobile agent signal periodically. When server control circuit 12 is not transmitting a mobile agent signal, the transmitter/receiver 4 transmits the broadcast signal to the first I/O port 22a.
- the first I/O port 22a receives the combined signal or the broadcast signal when the server circuit is not transmitting a mobile agent signal.
- the connection 8 between the transmitter/receiver 4 and the I/O port 22a is a physical connection, such as coaxial cable, telephone line, or fiber optic cable.
- connection 8 is a two-way fiber optic cable that carries both the broadcast signal and mobile agent signal.
- connection 8 is a radio or microwave frequency signal and the viewer box includes means for receiving such signals.
- the control circuit 20a Internally in the viewer box 2a, the control circuit 20a is connected to the I/O means 18 and memory 16. The connections are two-way, allowing signals to be transmitted and received between the control circuit 20a and either memory 16 or the I/O means 18.
- the control circuit 20a controls the operation of memory 16 and the I/O means 18.
- the input/output means 18 may include any one of several input/output means.
- input/output means 18 may include a keypad, print reader (e.g., fingerprint, footprint), retinal scanner, infrared receiver, or other data input means adapted to receive identifying information from a viewer.
- the input means is a print reader.
- the output means includes a light emitting diode, infrared transmitter, speaker, or display of a kind known in the art.
- Memory 16 is memory circuitry known in the art including magnetic or optical disk drives, solid state memory devices, and the like.
- the control circuit 20a is connected to the second I/O port 22b.
- the second I/O port 22b is connected to the media equipment 6.
- the control circuit 20a is capable of determining which broadcast signal is selected by the viewer and includes an internal clock.
- the broadcast signal transmitter 1 continuously transmits a broadcast signal to the transmitter/receiver 4.
- the server control circuit 12 transmits signals including mobile agents intermittently when mobile agents need to be transmitted.
- the broadcast signal and mobile agent signal are combined by the transmitter/receiver 4 into one signal which is transmitted to the viewer box 2a.
- the combined signal is coupled to the control circuit 20a where the combined signal is separated into the broadcast signal and the mobile agent signal. This can be accomplished by frequency filtering the combined signal or by other means known in the art to separate multiple signals.
- the broadcast signal is coupled through the control circuit 20a to the second I/O port 22b and then to the media equipment 6, where it is presented to the viewer.
- the media equipment 6 includes televisions, radios, personal computers, and the like. The media equipment 6 is responsive to the signal emitted from second I/O port 22b ofthe viewer box 2a.
- the control circuit 20a Upon receipt of a mobile agent signal, the control circuit 20a registers the signal.
- the first step in registering the mobile agent is to request that the viewer enter a second unique identifier into the I/O means 18.
- the control circuit 20a instructs I/O means 18 to request entry ofthe second unique identifier by the viewer.
- the I/O means 18 makes the request by generating characters which are coupled through the control circuit 20a and displayed on the media equipment 6.
- the I/O means illuminates a light emitting diode.
- the I/O means generates an audio signal. The generated characters, light emitting diode, or audio signal alert the viewer that a second unique identifier must be entered.
- the I/O means 18 does not generate a signal, but instead prevents the viewer box 2a from operating until a second unique identifier is entered.
- a first unique identifier attached to the mobile agent is then compared by the control circuit 20a with the second unique identifier entered by the viewer into I/O means 18. If the unique identifiers are identical, the mobile agent is registered (i.e., stored in memory 16). Once registered, the instructions in the mobile agent are carried out by the control circuit 20a.
- the control circuit 20a has the ability to determine the channel of a specific selection made by the viewer and can keep track ofthe time spent viewing that particular channel. This information is stored in memory 16.
- the mobile agent will normally be operative for a specific time period.
- the control circuit 20a will determine when the time period has expired. Upon expiration, the control circuit will transmit the collected data back through the first I/O port 22a and connection 8 to transmitter/receiver 4.
- the signal carrying the collected data may be at a different frequency than the broadcast signal or mobile agent signal.
- Other methods for communicating two-way signals along a broadcast channel for example, time multiplexing or the like, however, may be used.
- the received collected data signal is then coupled to the server control circuit 12 and the collected data signal is registered.
- the server control circuit 12 compares the unique identifier appended to the collected data to a plurality of unique identifiers stored in the server memory 14. If the appended unique identifier matches one ofthe plurality of unique identifiers stored in the server memory 14, the collected data is registered (i.e., stored in the server memory 14).
- the plurality of unique identifiers stored in the server memory 14 is simply a list of unique identifiers which have been assigned to individual viewers.
- the means (connectors 8, 9) by which a broadcast signal and mobile agent signal are coupled to the viewer box 2 can be one-way or two-way.
- a one-way transmission allows data to be transmitted in only one direction (i.e., from a first location to a second location).
- a two-way transmission allows data to be transmitted back and forth between two locations.
- the first embodiment uses a two-way transmission. If the one-way transmission is selected, it is necessary to incorporate a separate path for the collected data signal to be transmitted from the viewer box 2 to the server control circuit 12.
- a third I/O port 22c is connected to the server control circuit 12 through a physical connection (e.g., coaxial cable, telephone line, or fiber optic cable). This allows the control circuit 20 to transmit the collected data signal to the server control circuit.
- a physical connection e.g., coaxial cable, telephone line, or fiber optic cable.
- the control circuit 20b has a first I/O port 22a, a second I/O port 22b, and a third I/O port 22c to which electrical connections are made.
- the local receiver 24 receives a broadcast signal from a broadcast signal transmitter 1.
- the local receiver 24 is simply the means by which a broadcast signal is received at a viewer's location.
- the local receiver 24 can be an antenna, satellite dish, cable connection, telephone connection, fiber optic connection, or the like.
- the selection ofthe local receiver 24 depends on the method of transmission from the broadcast signal transmitter 1.
- the connection 9 between the broadcast signal transmitter 1 and the local receiver 24 may be a physical connection or an atmospheric connection established between, for example, satellites or antennas.
- a viewer box 2b is placed in proximity to a viewer's media equipment 6.
- the viewer box 2b includes a control circuit 20b, an input/output ("I/O") means 18, and memory 16.
- the broadcast signal transmitter 1 (e.g., television transmitter, radio transmitter, and the like) transmits a broadcast signal through a transmission channel 9.
- the server control circuit 12 is connected to a server memory 14.
- the server memory 14 is a memory circuit, which is accessed and controlled by the server control circuit 12, and is a type of memory circuit known in the art.
- the server control circuit 12 periodically transmits a mobile agent signal to the third I/O port 22c which couples the mobile agent signal to the control circuit 20b.
- control circuit 20b Internally in the viewer box 2b, the control circuit 20b is connected to the I/O means 18 and the memory circuit 16 similar to the connections in control circuit 20a of Figure 1.
- the control circuit 20b is connected to the second I/O port 22b.
- the second I/O port 22b is connected to media equipment 6.
- the control circuit 20b is also connected to the third I/O port 22c, which third I/O port 22c is connected to the server control circuit 12.
- the broadcast signal transmitter 1 continuously transmits a broadcast signal to the local receiver 24.
- the local receiver 24 couples the broadcast signal to the first I/O port 22a.
- the broadcast signal is coupled by the first I/O port 22a to the control circuit 20b and is coupled from the control circuit 20b to the second I/O port 22b.
- the broadcast signal is then coupled by the second I/O port 22b to the media equipment 6, where it is presented to a viewer.
- the media equipment 6 includes televisions, radios, personal computers, and the like.
- the media equipment 6 is responsive to the signal coupled from the second I/O port 22b to the media equipment 6.
- the server control circuit 12 transmits signals intermittently when mobile agents need to be transmitted.
- the mobile agent includes a set of instructions to be carried out by the control circuit 20b.
- the server control circuit 12 transmits a mobile agent signal to the third I/O port 22c.
- the third I/O port 22c then couples the mobile agent signal to the control circuit 20b.
- the control circuit 20b Upon receipt of a mobile agent signal, the control circuit 20b will register the signal.
- the first step in registering the mobile agent is to request that the viewer enter a second unique identifier into the I/O means 18.
- the control circuit 20b instructs I/O means 18 to request entry ofthe second unique identifier by the viewer.
- the I/O means 18 generates characters, which are coupled through the control circuit 20b to the media equipment 6 and displayed.
- the I/O means 18 illuminates a light emitting diode.
- the I/O means 18 generates an audio signal.
- the generated characters, light emitting diode, or audio signal alert the viewer that the second unique identifier must be entered.
- the I/O means 18 prevents the viewer box 2b from operating until a second unique identifier is entered.
- the control circuit 20b has the ability to determine the channel of a specific selection made by the viewer and can keep track ofthe time spent viewing that particular selection. This information is stored in memory 16.
- the mobile agent will normally be operative for a specific time period.
- the control circuit will determine when the time period has expired. Upon expiration, the control circuit will transmit the collected data back through the third I/O port 22c to the server control circuit 12.
- the collected data signal is registered by the server control circuit 12. Once registered, the collected data is stored in the server memory 14.
- a physical connection between the I/O port 22c and the server control circuit 12 is not necessary.
- the data can be transmitted via a cellular telephone system or other low power atmospheric transmission system known in the art.
- the low power atmospheric transmission system would include a low power atmospheric transmitter/receiver, a low power atmospheric transmitter/receiver controller, a two-way low power atmospheric transmitter/receiver port, and a one-way or two-way communication port connected between the control circuit and media equipment.
- the low power atmospheric transmitter/receiver is any transmitter or receiver known in the art, for example, transmitters and receivers currently used in cellular systems, personal communication services ("PCS"), and two-way radio systems.
- the low power atmospheric transmitter/receiver controller is a logic circuit known in the art to control a transmitter or receiver.
- a two-way transmission means is established without having to make a physical connection between the server control circuit 12 and the viewer box 2b.
- the first step is to assign a first unique identifier to a viewer 100. This may be done at secure sites (e.g., branch offices, secure internet access), which will verify a viewer's identity and assign a first unique identifier to that identity.
- the first unique identifier can be an alphanumeric sequence chosen from a list of alphanumeric sequences (hereinafter referred to as a personal identification number or "PIN").
- PIN personal identification number
- the first unique identifier is a digitized representation of a body characteristic (e.g., thumbprint).
- the step of assigning a first unique identifier includes submitting a unique biological identifier (e.g., fingerprint, retinal scan) which is converted into a digital code.
- a unique biological identifier e.g., fingerprint, retinal scan
- a digitized body characteristic may be formed from, for example, a digitized image ofthe viewer's fingerprint, iris, or retina. Other physical characteristics may be used, depending on the degree of security desired, for example, an image ofthe registrant's footprint, handprint, dental x-ray, or other distinguishing characteristic ofthe registrant's body.
- an encryption process an example of which is detailed in co-pending United States Patent Application Serial Number 09/123,793 titled "Non-reputable Digital Signature Based on Biological Indicia," and which is herein incorporated by reference, a digital certificate is formed and the first unique identifier includes the digital certificate.
- the first unique identifier and viewer's identity are then stored 102 in memory 14, which is accessible to the server control circuit 12.
- the server control circuit 12 then generates 104 a public/private key pair, which can be generated using a means known in the art, such as RSA, PGP, El Gamal public key encryption techniques, and the like.
- the public key is an encryption key and the private key is a decryption key. One key cannot be derived from the other.
- the first unique identifier is then encrypted 106 using the public key. The result is an encrypted unique identifier.
- the public key and private key are then stored 108 in memory 14 and cross- referenced to the first unique identifier and viewer identity data.
- a mobile agent is then generated 109 by the server circuit and the private key and public key are appended 110 to the mobile agent which results in a keyed mobile agent.
- the keyed mobile agent is then encrypted 112 using the first unique identifier.
- the result is an encrypted keyed mobile agent.
- the encrypted unique identifier is then appended to the encrypted keyed mobile agent 114 forming a unique encrypted keyed mobile agent.
- the unique encrypted keyed mobile agent is then transferred 116 to a second location.
- the second location is a viewer box 2a, 2b that is attached to media equipment 6.
- the viewer box 2a, 2b Upon receiving 118 the unique encrypted keyed mobile agent, the viewer box 2a, 2b will request 120 that the viewer enter a second unique identifier that had been assigned earlier.
- the unique identifier which is entered in response to the request from the viewer box, will be referred to as the second unique identifier and may be identical to the first unique identifier.
- the viewer enters 122 the second unique identifier through any input means known in the art. Entry can be accomplished by several methods including punching in an alphanumeric sequence on a keypad or by inserting an appendage in a print reader.
- a control circuit 20a, 20b in the viewer box 2a, 2b separates 126 the unique encrypted keyed mobile agent into an encrypted unique identifier and an encrypted keyed mobile agent.
- the second unique identifier is then used to decrypt 128 the encrypted keyed mobile agent to generate a data string. If the second unique identifier is identical to the first unique identifier, the data string will be the keyed mobile agent.
- the keyed mobile agent is then separated 130 into the private key, public key, and mobile agent. If the second unique identifier is not identical to the first unique identifier, the data string will not be the keyed mobile agent and may be unintelligible data.
- the encrypted unique identifier is decrypted 132. The second unique identifier is then compared 134 to the first unique identifier.
- the system includes a plurality of viewer boxes 2a, 2b, which are remotely located.
- Each mobile agent is created specifically for an individual viewer.
- the server circuit 12 transmits identical copies ofthe individualized mobile agent to each ofthe plurality of viewer boxes 2a, 2b. If the second unique identifier and first unique identifier are different, the mobile agent has been received by the wrong viewer box 2a, 2b and an error message is returned 136 to the server control circuit 12. If the identifiers are identical, then the mobile agent has been received by the correct viewer box 2a, 2b and the mobile agent is stored 138 in memory in the viewer box 2a, 2b. The mobile agent, private key, and public key are stored 138 in the viewer box memory 16.
- the only way that the first unique identifier and the second unique identifier can be identical is if the private key is decrypted with the exact same key with which it was encrypted (i.e., the first unique identifier) and the first unique identifier is decrypted with the private key which correctly corresponds to the public key which encrypted the first unique identifier. If both the encrypted private key and encrypted first unique identifier are not properly decrypted, the first unique identifier and second unique identifier will not be identical.
- the viewer box receives a plurality of broadcast signals 140. Once the mobile agent has been stored in memory 16, the instruction set is carried out.
- the mobile agent's instruction set instructs the viewer box 2a, 2b to begin collecting 142 and storing 144 data regarding the viewer's selection of broadcast signals.
- the mobile agent will include a time of expiration.
- the viewer box 2a, 2b keeps track ofthe time and checks to make sure the time has not expired 146. As long as time has not expired, the viewer box 2a, 2b collects 142 and stores 144 data. If time has expired, however, the mobile agent issues commands to the viewer box 2a, 2b to cease collecting data and to replicate the mobile agent.
- the collected data is then appended 148 to the replica ofthe mobile agent forming a data agent.
- the data agent is then encrypted 150 using the public key forming an encrypted data agent.
- the unique identifier is then appended 152 to the encrypted data agent forming a unique encrypted data agent. It is not necessary to specify that the first or second unique identifier is appended 152, because this step cannot be reached unless the first and second unique identifiers are identical.
- the unique encrypted data agent is then transferred 154 to a first location.
- the first location is the server control circuit 12.
- the unique encrypted data agent is separated 158 into the unique identifier and the encrypted data agent.
- the server control circuit 12 compares 160 the unique identifier to a list of unique identifiers contained in memory. If none ofthe unique identifiers in memory match the unique identifier, an error message is triggered 162. If there is a match, the server control circuit 12 cross-references 164 the matched unique identifier in memory and retrieves 166 the associated private key. The private key is then used to decrypt 168 the encrypted data agent.
- the server control circuit 12 then separates 170 the collected data and mobile agent and the collected data is stored 172 in the server control circuit memory 14.
- the method ensures that only the viewer having a specific unique identifier may add data to the stored collected data by positively identifying the viewer. Market analysts, therefore, may rely on the data in planning market strategies.
- a first unique identifier is assigned 174 to a recipient.
- the first unique identifier is stored 176 in memory 14 and cross- referenced to the identity ofthe recipient.
- a public/private key pair is then generated 178 and the first unique identifier is encrypted 180 using the public key.
- the public key and private key are then stored 182 in memory 14 with cross-references to the recipient's identity.
- the private key and public key are then encrypted 184 using the first unique identifier forming encrypted keys.
- the encrypted keys are appended 186 to the encrypted unique identifier forming unique encrypted keys.
- the unique encrypted keys are transmitted 188 to a second location.
- a request is made 192 for the recipient to enter the second unique identifier that had been assigned earlier.
- the recipient enters 194 the second unique identifier and the second unique identifier is received 196 by a control circuit 20a, 20b.
- the unique encrypted keys are then separated 198 into the encrypted unique identifier and the encrypted keys.
- the second unique identifier is then used to decrypt 200 the encrypted keys.
- the private key is then used to decrypt 202 the encrypted unique identifier.
- the second unique identifier is then compared 204 to the first unique identifier. If they are different, an error message is generated and transmitted 208 to the first location. If they are identical, the decrypted keys are stored 206 in memory at the second location.
- This alternative method provides only one-way transfer from a first location to a second location.
- the advantage of this method is that the public key and private key can be securely transferred to a remote location because the keys can only be properly decrypted and stored in memory if the viewer enters the correct unique identifier. The public key can then be used to encrypt data which is to be transmitted back to the first location.
- Figure 5 is a flowchart illustrating a method of viewer identification and data collection verification which does not use encryption technology.
- the viewer is assigned 210 a first unique identifier and the first unique identifier is stored 212 in memory 14 along with a cross-reference to the viewer's identity.
- a mobile agent is then generated 213 and the first unique identifier is appended 214 to the mobile agent forming a unique mobile agent.
- the unique mobile agent is then transferred 216 to a second location, for example a viewer box 2a, 2b, and is registered 218.
- the unique mobile agent is registered 218 by requesting the viewer enter a second unique identifier that was previously assigned and comparing the second unique identifier to the first unique identifier appended to the mobile agent. If they are different, an error message is generated. If they are identical, the mobile agent is stored in memory.
- a plurality of broadcast signals are received 220 at the second location and the viewer selects 222 one ofthe plurality to view. The selection 222 is recorded 224 until a timer expires. After the timer expires, the unique identifier is appended 226 to the collected data forming unique data.
- the unique data is then transferred 228 to the first location, for example, a server control circuit 12, and is registered 230.
- the unique data is registered 230 by comparing the unique identifier with unique identifiers stored in memory 14 at the first location. If they do not match, an error message is generated. If they do match, the collected data is stored 232 in memory at the first location.
- Broadcast Signal Transmitted information, such as televisions signals, radio signals, and the like.
- Collected Data The information which is collected by the viewer box and which includes the designation for the selected broadcast signal and the time elapsed while viewing the selected broadcast signal.
- Combined Signal A single signal that includes both the mobile agent and broadcast signal.
- Decrypted Data Agent The encrypted data agent after it has been decrypted using the private key.
- Decrypted Keyed Mobile Agent The encrypted keyed mobile agent after it is separated from the unique encrypted keyed mobile agent and decrypted using the second unique identifier.
- Encrypted Data Agent The encrypted mobile agent with the collected data appended to it.
- Encrypted Keyed Mobile Agent The keyed mobile agent which has been encrypted using the first unique identifier.
- Encrypted Unique Identifier The first unique identifier which has been encrypted using the public key.
- First Unique Identifier The digital code assigned to a viewer.
- Mobile Agent A digital code which can include a set of commands to be executed by a processor and can also include biographic or demographic information of a viewer.
- Second Unique Identifier The digital code entered into a viewer box by a viewer to verify the viewer's identity.
- a digital code assigned to a specific person which digital code can be a personal identification number or digitized biological indicia.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
La présente invention concerne un procédé et un système d'identification de téléspectateur et de vérification d'un ensemble de données qui permettent d'identifier de façon sûre le téléspectateur avant de lui soumettre des données (220) receuillies relatives à une diffusion. On donne au téléspectateur un identificateur (174) unique qui peut être un numéro d'identification personnel ou une empreinte biologique numérique. Cet identificateur unique est utilisé de façon à identifier positivement un téléspectateur et à coder (180) toutes les données transmises entre un téléspectateur et un organisme réalisant des études.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US59389300A | 2000-06-14 | 2000-06-14 | |
US09/593,893 | 2000-06-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001097439A1 true WO2001097439A1 (fr) | 2001-12-20 |
Family
ID=24376639
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/033864 WO2001097439A1 (fr) | 2000-06-14 | 2000-12-14 | Procede et systeme d'identification de telespectateur et de verification d'ensemble de donnees |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2001097439A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7171567B1 (en) * | 1999-08-02 | 2007-01-30 | Harris Interactive, Inc. | System for protecting information over the internet |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5734720A (en) * | 1994-11-29 | 1998-03-31 | Salganicoff; Marcos | System and method for providing digital communications between a head end and a set top terminal |
US6105134A (en) * | 1995-04-03 | 2000-08-15 | Scientific-Atlanta, Inc. | Verification of the source of program information in a conditional access system |
US6160989A (en) * | 1992-12-09 | 2000-12-12 | Discovery Communications, Inc. | Network controller for cable television delivery systems |
-
2000
- 2000-12-14 WO PCT/US2000/033864 patent/WO2001097439A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6160989A (en) * | 1992-12-09 | 2000-12-12 | Discovery Communications, Inc. | Network controller for cable television delivery systems |
US5734720A (en) * | 1994-11-29 | 1998-03-31 | Salganicoff; Marcos | System and method for providing digital communications between a head end and a set top terminal |
US5758257A (en) * | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US6105134A (en) * | 1995-04-03 | 2000-08-15 | Scientific-Atlanta, Inc. | Verification of the source of program information in a conditional access system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7171567B1 (en) * | 1999-08-02 | 2007-01-30 | Harris Interactive, Inc. | System for protecting information over the internet |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6021200A (en) | System for the anonymous counting of information items for statistical purposes, especially in respect of operations in electronic voting or in periodic surveys of consumption | |
US6595855B2 (en) | Electronic lottery system and its operating method and computer-readable recording medium in which the electronic lottery program code is stored | |
JP4216534B2 (ja) | 時刻検証システム | |
EP0843425B1 (fr) | Dispositif de communication électronique utilisant le corps humain comme médium de transmission | |
US6353929B1 (en) | Cooperative system for measuring electronic media | |
US5402490A (en) | Process for improving public key authentication | |
US7576651B2 (en) | Radio frequency identification (RFID) tag encryption method and system using broadcast encryption (BE) scheme | |
RU2329613C2 (ru) | Способ безопасной передачи данных по схеме "точка-точка" и электронный модуль, реализующий этот способ | |
CN102177498A (zh) | 数据匿名系统 | |
CN101355685A (zh) | 广播接收装置与付费节目提供系统 | |
KR20040091618A (ko) | 콘텐츠 재생장치, 콘텐츠 재생방법, 및 프로그램,키관리장치와 키관리 시스템 | |
JPH06506332A (ja) | 双方向ケーブル・テレビジョン・システムにおける自動周波数選択 | |
KR20210027951A (ko) | 블록체인을 이용한 의료기관 데이터 중계 장치와, 의료데이터 활용 장치 및, 의료데이터 관리 시스템 | |
KR101089037B1 (ko) | 텔레비전 수신기 및 디지털 방송 시스템 | |
CN110351261B (zh) | 基于双因素认证管理设备连接安全服务器的方法和系统 | |
CN101778195A (zh) | 电视广告媒体收视统计系统 | |
KR20010114217A (ko) | 송신신호에 대해 선택된 시청자에게로 실시간 정보의 송신 | |
JP2009272722A (ja) | 特典付与システム | |
CN100470573C (zh) | 非授权设备检测设备、非授权设备检测系统及其非授权设备检测方法 | |
US20130097671A1 (en) | Device and method for interfacing at least one data storage and transmission terminal with at least one data transmission medium | |
WO2001097439A1 (fr) | Procede et systeme d'identification de telespectateur et de verification d'ensemble de donnees | |
JP2000269957A (ja) | 電子投票方法及びそのプログラム記録媒体 | |
JP2004013606A (ja) | 電子投票方法及びシステム及び投票者装置及び管理者装置及び集計者装置及び電子投票プログラム及び電子投票プログラムを格納した記憶媒体 | |
US5835593A (en) | Information transmitting apparatus and information transmitting system | |
JP5314486B2 (ja) | 情報取得システムおよび情報取得方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CA IL JP |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |