Generation of a targeted advertisement in an untrusted sandbox based on a psuedonym
First Claim
Patent Images
1. A method of a trusted sandbox, the method comprising:
- transmitting a discovery request that includes a first public internet protocol (IP) address for a trusted sandbox to a discovery service;
receiving, from the discovery service, information about a service offered by a first device including at least one of a globally unique identifier for the service offered by the first device, a name for the service, a private address of the service and a second public IP address for the first device in response to the discovery service determining the first public IP address and the second public IP address are identical;
transmitting the name of the service offered by the first device to an untrusted sandbox;
facilitating a communication of a service request from the untrusted sandbox to the first device using the private address for the first device; and
facilitating a generation of a targeted advertisement in the untrusted sandbox based on a pseudonym derived from a hardware address of a user of the untrusted sandbox and an associated behavior of the user in communicating with the first device.
2 Assignments
0 Petitions
Accused Products
Abstract
Particular embodiments permit a computer program running within a security sandbox to discover and communicate with networked services for example print servers, or remote control programming interfaces for TVs, stereos, and game boxes. The sandbox allows the computer program to originate unicast connections to a limited set of hosts but otherwise provides no access to the network. Particular embodiments may require no prior install, zero configuration, no account names or passwords, and yet resists spam. This is achieved by using centralized global infrastructure to coordinate the communications rather than local multicast, anycast, or datalink broadcast.
-
Citations
20 Claims
-
1. A method of a trusted sandbox, the method comprising:
-
transmitting a discovery request that includes a first public internet protocol (IP) address for a trusted sandbox to a discovery service; receiving, from the discovery service, information about a service offered by a first device including at least one of a globally unique identifier for the service offered by the first device, a name for the service, a private address of the service and a second public IP address for the first device in response to the discovery service determining the first public IP address and the second public IP address are identical; transmitting the name of the service offered by the first device to an untrusted sandbox; facilitating a communication of a service request from the untrusted sandbox to the first device using the private address for the first device; and facilitating a generation of a targeted advertisement in the untrusted sandbox based on a pseudonym derived from a hardware address of a user of the untrusted sandbox and an associated behavior of the user in communicating with the first device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for communicating arbitrary messages, the system comprising:
-
a processor; and a trusted sandbox stored on a memory and executed by the processor, the trusted sandbox for transmitting a discovery request that includes a first public internet protocol (IP) address for the trusted sandbox to a discovery service for receiving, from the discovery service, information about a service offered by a first device including at least one of a globally unique identifier for the service offered by the first device, a name for the service, a private address of the service and a second public IP address for the first device in response to the discovery service determining the first public IP address and the second public IP address are identical, for transmitting the name of the service offered by the first device to an untrusted sandbox, for facilitating a communication of a service request from the untrusted sandbox to the first device using the private address for the first device and for facilitating a generation of a targeted advertisement in the untrusted sandbox based on a pseudonym derived from a hardware address of a user of the untrusted sandbox and an associated behavior of the user in communicating with the first device. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A computer program product comprising a non-transitory computer useable medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to perform steps comprising:
-
transmitting a discovery request that includes a first public internet protocol (IP) address for a trusted sandbox to a discovery service; receiving, from the discovery service, information about a service offered by a first device including at least one of a globally unique identifier for the service offered by the first device, a name for the service, a private address of the service and a second public IP address for the first device in response to the discovery service determining the first public IP address and the second public IP address are identical; transmitting the name of the service offered by the first device to an untrusted sandbox; facilitating a communication of a service request from the untrusted sandbox to the first device using the private address for the first device; and facilitating a generation of a targeted advertisement in the untrusted sandbox based on a pseudonym derived from a hardware address of a user of the untrusted sandbox and an associated behavior of the user in communicating with the first device.
-
Specification