Content presentation based on user preferences
First Claim
1. A method comprising:
- under control of one or more processors configured with executable instructions;
receiving a request to access a website from a user;
requesting user profile information specific to spam filtering from the user in exchange for additional access or information of the website;
negotiating between the website and the user for allowing the website to access the user profile information specific to the spam filtering; and
receiving the user profile information specific to the spam filtering from the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Architecture is provided that facilitates user-controlled access to user profile information related to spam filtering. A user is allowed to selectively expose (or mask) portions of his/her profile related to spam filtering to third parties. Additionally, advertisers and/or content providers can offer incentives or enticement in response to the acceptance of which a user exposes larger portions of their profiles related to spam filtering. The architecture comprises a system that facilitates profile management utilizing a profile component that facilitates creation and storage of an electronic profile including spam filtering information of a user, and a control component under control of the user for controlling access to the profile.
68 Citations
18 Claims
-
1. A method comprising:
-
under control of one or more processors configured with executable instructions; receiving a request to access a website from a user; requesting user profile information specific to spam filtering from the user in exchange for additional access or information of the website; negotiating between the website and the user for allowing the website to access the user profile information specific to the spam filtering; and receiving the user profile information specific to the spam filtering from the user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more computer storage media storing computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform acts comprising:
-
receiving a request to access a website from a user; requesting user profile information specific to spam filtering from the user in exchange for additional access or information of the website; negotiating between the website and the user for allowing the website to access the user profile information specific to the spam filtering; and receiving the user profile information specific to the spam filtering from the user. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
under control of one or more processors configured with executable instructions; negotiating between an entity and a user for permission to send content from the entity to the user based on a user profile of the user; receiving, by the entity, access to user profile information of the user that is related to a spam rule in response to agreeing to a requirement indicated in the user profile; customizing, by the entity, the content that is able to bypass the spam rule; and sending the content from the entity to the user. - View Dependent Claims (16, 17, 18)
-
Specification