PAYWINDOWS
20170286934 · 2017-10-05
Inventors
Cpc classification
G06F2221/2141
PHYSICS
G06Q20/40
PHYSICS
International classification
G06Q20/40
PHYSICS
Abstract
A method of controlling access to a plurality of digital content items by a plurality of consumers on devices connected to a network, the method including: in a network browsing program on a processor connected to the network: enabling access for a first of the plurality of consumers to one or more of the plurality of digital content items via online computer software attached to the one or more of the plurality of digital content items; displaying an identifier of the one or more of the plurality of digital content items together with an image of a plurality of selectable alternatives for making payments to enable access to the one or more of the plurality of digital content items, wherein the alternatives are selected from paying at least one of money and attention; and in response to the first consumer selecting one of the alternatives, the online computer software verifying proof of work of the payment money and attention.
Claims
1. A method of controlling access to a plurality of digital content items by a plurality of consumers on devices connected to a network, the method comprising acts of: in a network browsing program on a processor connected to the network: enabling access for a first of the plurality of consumers to one or more of the plurality of digital content items via online computer software attached to the one or more of the plurality of digital content items; displaying an identifier of the one or more of the plurality of digital content items together with an image of a plurality of selectable alternatives for making payments to enable access to the one or more of the plurality of digital content items, wherein the alternatives are selected from paying at least one of money and attention; and in response to the first consumer selecting one of the alternatives the online computer software verifying proof of work of the payment money and attention.
2. The method of claim 1, further comprising an act of disabling access to one or more of the plurality of digital content items.
3. The method of claim 2, wherein the access is disabled by attaching the online computer software to the one or more of the plurality of digital content items.
4. The method of claim 1, wherein the access is enabled in response to the proof of work verification.
5. The method of claim 1, wherein the payment of attention is determined for any of watching advertisements, responding to questioners, and filling out surveys.
6. The method of claim 5, wherein selected one or more answers in the questioners and surveys is used as proof of work.
7. The method of claim 5, wherein providing information displayed in the advertisement after viewing the advertisement is used as proof of work.
8. The method of claim 5, wherein a confirmation of transfer of money is used as proof of work.
9. The method of claim 1, wherein the plurality of selectable alternatives includes any of an amount of payment, one or more advertisements, one or more surveys, one or more questioners.
10. The method of claim 1, wherein a monetary value of the plurality of selectable alternatives is the same.
11. The method of claim 1, wherein the network comprises the Internet, each of the plurality of content items comprises metadata and data including at least one of text, audio, video, and still images.
12. The method of claim 9, wherein the plurality of selectable alternatives further includes requests for automatic purchase of one of the plurality of content items selected from any of requesting a purchase when a monetary value reaches above, falls below or is equal to a predefined amount, when interest in the content item reaches a predefined level, when the content item is purchased by a known customer.
13. A computer program product for controlling access to a plurality of digital content items by a plurality of consumers on devices connected to a network, the computer program product tangibly embodied on a non-transitory computer readable medium and including instructions for causing a processor connected to the network to perform acts comprising: enabling access for a first of the plurality of consumers to one or more of the plurality of digital content items via online computer software attached to the one or more of the plurality of digital content items; displaying an identifier of the one or more of the plurality of digital content items together with an image of a plurality of selectable alternatives for making payments to enable access to the one or more of the plurality of digital content items, wherein the alternatives are selected from paying at least one of money and attention; and in response to the first consumer selecting one of the alternatives, the online computer software verifying proof of work of the payment money and attention.
Description
BRIEF DESCRIPTION OF DRAWINGS
[0019] The invention is explained in further detail, and by way of example, with reference to the accompanying drawings wherein:
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
DETAILED DESCRIPTION OF INVENTION
[0028] The following is a description of illustrative embodiments that when taken in conjunction with the following drawings will demonstrate the above noted features and advantages, as well as further ones. In the description, for purposes of explanation rather than limitation, illustrative details are set forth such as architecture, interfaces, techniques, element attributes, etc. However, it will be apparent to those of ordinary skill in the art that other embodiments that depart from these details would still be understood to be within the scope of the appended claims. Moreover, for the purpose of clarity, detailed descriptions of well-known devices, tools, techniques and methods are omitted so as not to obscure the description of the present system. It should be expressly understood that the drawings are included for illustrative purposes and do not represent the scope of the present system. In the accompanying drawings, like reference numbers in different drawings may designate similar elements.
[0029]
[0030] The Secured Access layer of server system 100 includes application program interface (API) for External Applications called Public API 132, which enables secure reception of digital content and other information via network 150. The Secured Access layer further includes software development kit (SDK) API 130 for securely supporting and delivering, e.g., below described online computer software, to External Applications 140.
[0031] As illustrated in
[0034] Another code snippet of the online computer software PW or Paywindows 232, is used for enabling consumers making a purchase of content, a choice between making a payment with their previously purchased credit and making the payment by watching one or more advertisements. The online computer software is loaded onto the distributor's website 220 for subsequent distribution to consumers' browsers 210 within webpages 240. [0035] c. Promoter application 254, for enabling sponsors to select subject matter of or specific content items, which they are willing to sponsor and to specify price ranges at which they are willing to sponsor the selected subject matter. The sponsors are then enabled to provide links to the advertisements that they want to be seen by the consumers of the content. In addition, the sponsors can select authors, companies, and other parameters for positive and/or negative treatment, i.e., inclusion or exclusion from sponsorship. [0036] d. Publisher application 256, for enabling registered consumers/publishers connected to system 100 via network 150 from computing devices 200 to author new articles and/or authorize conveyance of numerous content items to system 100, where these content items will be analyzed, dynamically priced and offered for sale on distributor's websites 220. The registered consumers/publishers such as seasoned journalists, groups of journalists, journalists' or writers' representatives or employers, e.g., newspapers, magazines, or online distributors may have existing digital content items, which can be directed to system 100, e.g., via (Representational State Transfer) ReST API of Public API 132. [0037] e. Analyzer application 258 enables consumers/publishers to analyze behavior of, and other information about the published stories, e.g., how often each story is purchased, at what price, in what geographic location, by whom, etc., this analysis will be further described below.
[0038] Additional External Applications 140 are provided, e.g., to enable individual consumers to contribute or write original content items, such as opinion articles and offer them for sale, using software plugins, e.g., open-source content management system like WordPress, that enables composition of a text story and inclusion of media files. In this case, the consumers/writers will be asked to provide a synopsis; profiles of websites on which the article should or should not be published; and a proposed lifetime for the article and optionally at least a minimum price below which the article should not be sold. Moreover, the text of the original content items may be analyzed, in a manner described below, to identify keywords on which basis attributes are established. The attributes express the content items' class/domain and other characteristics.
[0039] Returning now to
[0040] The databases in the Data Manipulation layer include at least Stories database 110, real time analysis (RTA) database 112, and Customer Transactions database 114. Stories database 110 comprises text based as well as non-text content items, e.g., audio, video, images, software, mixed media, etc., and respective metadata received, as discussed above from External Applications 140 and content distributors. RTA database 112 stores information regarding the published stories and purchases made by the consumers, i.e., what stories were purchased, when, and for how much. This information is also called clicks because purchases over the Internet are made on computers using mouse devices to make clicks indicating purchases. Customer Transactions database 114 records activities performed by the registered consumers engaging with External Applications 140, e.g., activities relating to registration, purchase of credit, authoring of stories to be added to Stories database 110, purchase of access to stories and other. Additional databases are discussed below.
[0041] It is understood by these skilled in the art that while in this description the textual and non-textual content is described as being managed in a single database, for speed and/or ease of access separate databases may be used specifically for separating text based and media content.
[0042] The Internal Applications layer includes Integrations block 122, which manages integration of the content items received, as discussed above, from Publishers' 240 (
[0043] Moreover, at predetermined intervals and/or upon request, Valuation Analyzer 120 streams the dynamic prices in real-time via streaming API of Public API 132 to network 150. In addition, as stated above, Valuation Analyzer 120 processes content entered by the registered consumer in Publish Application 256.
[0044] As discussed, upon receipt at the Distributors' websites 220 (
[0045] The Internal Applications layer further includes RTA block 124 that monitors relevant event transactions on message bus 104 and when such event transactions are detected, they are recorded in RTA database 112. As mentioned, RTA block 124 also processes events communicated by Analyze Application 258 (
[0046] It will be clear to these skilled in the art that Stories and RTA databases 110 and 112 are document-oriented databases, so database packages such as MongoDB, Cassandra, and HBase, for example, can be used for their implementation. For consumers' transactions database 114 a Structured Query Language (SQL) database may be used.
Text Analyzer and Valuation
[0047] As discussed above with reference to External Applications 140, the digital content items comprise characteristics of varying importance or significance with respect to the objective market value of the content item. This importance or significance is derived from the content by Text Analyzer 126. Then Pricing module 120 attaches or assigns corresponding valuation (pricing) functions to each of the content items. A determination of correspondence between the valuation functions and the content items is made on the basis of the derived importance or significance of the content items' characteristics.
[0048] The valuation functions may be pre-defined by experts most familiar with consumer behavior related to consumption of stories in the various specific classes/domains and the lifetime or sustainability of the consumption. For example, experts in on-line sales of various types of literature, who are familiar with price premiums placed on various authors and literary genres, may be considered fit to formulate the default valuation functions for poems. Alternatively or in combination with the experts, expert knowledge may be harnessed from on-line databases and websites like Wikipedia.org and used to formulate or pre-define valuation functions, e.g., corresponding to specific known classes/domains.
[0049] In addition, after some initial period system 100 (
Paywindows
[0050] As discussed above, the Paywalls prohibit access to all protected content items. This means that access to individual protected content items is prohibited, thereby greatly limiting the publishers' revenue from sales of the individual protected content items to numerous non-subscribing consumers. Additionally, any advertising revenue due to sponsorship of sale of the individual protected content items is also lost. Non-subscribing consumers are very interested in consumption of a limited number of content items from each of multiplicity of varied publishers, without having to subscribe to each and every publication. That is because the cost of such subscriptions quickly becomes too burdensome or disproportionate to the value of a few articles that the consumers may want to read.
[0051] The present inventive system corrects the above-described shortcomings of the Paywalls. Instead of controlling access to all protected content, access to each, individual content item or story is controlled by the online computer software Paywindows 232. As illustrated in
[0052] DW 230 displays a lists of story labels 304, e.g., an initial line of text or a first sentence; a hidden from view unique identifier for each of the listed stories; and respective prices 300 corresponding to the stories. The unique identifiers relate to the content items or stories that were processed and assigned valuation functions as discussed above. Prices 300 indicate a cost of access to the respective stories as dynamically determined for each of the stories at any point in time by the assigned valuation functions. Prices 300 are continuously updated in the displayed lists created by DW 230 throughout the stories' commercially viable lifetime.
[0053] When one of labels 304 is selected, e.g., by the consumers clicking on or selecting labels 304, the unique identifier is used to locate the selected content item identified by labels 304 in database 110 (
[0057] Thus, Paywindows 232 is a code snippet which is automatically added to content items before they are displayed, and facilitates locking of access to content items or stories 302 and 306 individually before they are displayed. The unlocking of the content items is achieved, for example, by the consumers paying money and/or paying attention to advertisements and may, for example, give the consumer an ability to read/copy/add comments to the individual content item, e.g., story 308.
[0058] The payment is perfected by manipulating, e.g., clicking on or touching panes 310 and 312 of lock 332, which will alert system 100 (
[0059] Additional payment methods may include, e.g., paying attention to an advertisement; and paying attention and responding to questioners and surveys as will be described below with reference to
[0060] The specific advertisement, including at least one of a video, and image, a banner, a survey, and questionnaire is served or delivered to webpages 222 and presented to the consumer. As part of the presentation, e.g., after three quarters of the advertisement is played, the consumer may be shown a random combination of numbers and/or letters generated by Paywindows 232. Correct identification of the combination by the consumer can then be used as the proof of work. Thus, an example of proof of work of paying attention to the served advertisement, the consumer may be asked to re-enter the random combination shown as part of the advertisement. As with regard to questioners and surveys a predetermined number of answered questions can serve as the proof of work. As stated above, provision of the proof of work to Paywindows 232 triggers unlocking of access to the content item, e.g., story 308, for the consumer.
[0061] It will be well understood by these skilled in the art that other appropriate proofs of work including unique identifiers, tokens, and any other may be used. It will be further understood by these skilled in the art that panes 310 and 312 are used as an example of acceptable manners or methods of payment and that any number of panes and respective methods can be used. An example of this is shown in
[0062] Additionally, Paywindows 232 solves network traffic issues that, as illustrated in
[0063] Paywindows 232 (
[0064]
[0065] At step S606 Paywindows 232 (
[0067] S608, a request is made to system 100 (
[0069] At step S612, after verifying proof of payment, i.e., of money and/or attention, Paywindows 232 enables the consumer, making the request, to access the selected content item. These skilled in the art will readily understand how to use combinations of payment options indicated in
[0070] It is further noted that panes of the lock 332 (
Processor
[0071]
[0072] The system 700 includes a processor 710 operationally coupled to a memory 712, an optional rendering device 714, such as one or more of a display terminals, one or more user input devices 716, a network interface 718 connectable via wired or wireless means to a network 722, e.g., the Internet, and optionally a local storage 720. The user input 716 may include a keyboard, mouse or other devices including touch sensitive displays communicating with the processor 710 via any type of link, such as a wired or wireless link. The user input device 716 is operable for interacting with the processor 710 including interaction within a paradigm of a UI such as a GUI and/or other elements of the present system, such as to enable web browsing, content selection, such as provided by left and right clicking on a device, a mouse-over, pop-up menu, radio button, etc., such as provided by user interaction with a computer mouse, etc., as may be readily appreciated by a person of ordinary skill in the art. Thus it is clear that the processor 710, memory 712, optional rendering device 714, user input device 716, and network adapter 718 may be portions of a computer system or other device.
[0073] The storage 720 may be any fixed or removable computer-readable medium, e.g., ROM and RAM, CD-ROM, hard drives, or memory cards. Any medium known or developed that may store and/or transmit information suitable for use with the computer system may be used as the computer-readable medium. Such computer-readable medium may be used to store all the discussed programs for execution by processor 710. The network adapter 718 should be understood to include further network connections to other user devices, systems, e.g., routers, modems, etc. While not shown for purposes of simplifying the description, it is readily appreciated that the network adapter 718 may include an operable interconnection between networked processors, which may host websites.
Provisions
[0074] While the present system has been described with reference to exemplary embodiments, it should also be appreciated that numerous modifications and alternative embodiments may be devised by those having ordinary skill in the art without departing from the broader and intended spirit and scope of the present system as set forth in the claims that follow.
[0075] The section headings included herein are intended to facilitate a review but are not intended to limit the scope of the present system. Accordingly, the specification and drawings are to be regarded in an illustrative manner and are not intended to limit the scope of the appended claims. In interpreting the appended claims, it should be understood that: [0076] a. the word “comprising” does not exclude the presence of other elements or acts than those listed in a given claim; [0077] b. the word “a” or “an” preceding an element does not exclude the presence of a plurality of such elements; [0078] c. any reference signs in the claims do not limit their scope; [0079] d. several “means” may be represented by the same item or hardware or software implemented structure or function; [0080] e. any of the disclosed elements may be comprised of hardware portions (e.g., including discrete and integrated electronic circuitry), software portions (e.g., computer programming), and any combination thereof; [0081] f. hardware portions may be comprised of one or both of analog and digital to portions; [0082] g. any of the disclosed devices, portions thereof, acts, etc., may be combined together or separated into further portions, acts, etc., unless specifically stated otherwise; [0083] h. no specific sequence of acts or steps is intended to be required including an is order of acts or steps indicated within a flow diagram; and [0084] i. the term “plurality of” an element includes two or more of the claimed element, and does not imply any particular range of number of elements; that is, a plurality of elements may be as few as two elements, and may include an immeasurable number of elements.