Recherche Images Maps Play YouTube Actualités Gmail Drive Plus »
Connexion
Les utilisateurs de lecteurs d'écran peuvent cliquer sur ce lien pour activer le mode d'accessibilité. Celui-ci propose les mêmes fonctionnalités principales, mais il est optimisé pour votre lecteur d'écran.

Brevets

  1. Recherche avancée dans les brevets
Numéro de publicationUS20070174295 A1
Type de publicationDemande
Numéro de demandeUS 11/619,795
Date de publication26 juil. 2007
Date de dépôt4 janv. 2007
Date de priorité22 mars 2000
Autre référence de publicationCA2403879A1, EP1277146A1, EP1277146A4, US7181412, WO2001071620A1
Numéro de publication11619795, 619795, US 2007/0174295 A1, US 2007/174295 A1, US 20070174295 A1, US 20070174295A1, US 2007174295 A1, US 2007174295A1, US-A1-20070174295, US-A1-2007174295, US2007/0174295A1, US2007/174295A1, US20070174295 A1, US20070174295A1, US2007174295 A1, US2007174295A1
InventeursMagid Abraham, Gian Fulgoni, Bryan Miller, Michael Brown, Adam Davis
Cessionnaire d'origineComscore Networks, Inc.
Exporter la citationBiBTeX, EndNote, RefMan
Liens externes: USPTO, Cession USPTO, Espacenet
Systems and methods for collecting consumer data
US 20070174295 A1
Résumé
All of an internet user's internet data is routed to a known domain on the internet, from which it is routed on to the intended recipient. The domain includes proxy servers which proxy the user's WWW data requests to the domain, and database servers which filter and build a database of the user's internet usage. Particular data concerning certain behaviors of interest, such as purchasing data, is filtered into the database, and can form the basis for numerous market measures.
Images(4)
Previous page
Next page
Revendications(17)
1. A method of collecting data relating to a user's transactions over an unsecure network, the user utilizing a computing device to send and receive data sets over the network, the computing device having an address on the network, the data sets including data representative of the address of the computing device on the network, comprising the steps of:
directing all data sets from the computing device to a known domain;
assigning a unique identifier to the computing device;
readdressing data sets sent from the computing device to indicate that the data sets originated in the known domain;
recording at least part of the data sets; and
sending the readdressed data onto the network.
2. A method according to claim 1, wherein the step of directing all data sets comprises configuring software running on the computing device to address all data sets to a known proxy server in the known domain.
3. A method according to claim 1, wherein the step of recording at least part of the data sets comprises building a database including at least part of the data sets.
4. A method according to claim 3, wherein the step of building a database includes building a database having at least one field selected from the group consisting of user age, user income level, user education level, household size, time of transmission of the data set, location of computing device, date of transmission of the data set, currency paid, type of product purchased, type of service purchased, network address of the intended recipient of a data set, click-through address, banner advertisement impression, and permission e-mail received, and combinations thereof.
5. A method according to claim 1, further comprising the steps of:
negotiating a first encryption key with the computing device;
negotiating a second encryption key with an intended recipient of a data set sent by the computing device.
6. A method in accordance with claim 5, further comprising the steps of:
decoding an encrypted data set from the computing device with the first encryption key;
encrypting the decoded data set with the second encryption key; and
transmitting the data set encrypted with the second encryption key to the intended recipient via the network.
7. A method in accordance with claim 1, further comprising the step of:
calculating a metric from the data recorded in the recording step indicative of how much money is spent per a set number of times a particular addressable data set on the network is requested by any user on the network.
8. A method in accordance with claim 1, further comprising the step of:
generating a set of records from the data recorded in the recording step, each record including data, the data being representative of a user's request for data from a single set of addresses on the network, and the data being representative of at least one characteristic of the user.
9. A method in accordance with claim 1, further comprising the step of:
generating a set of records from the data recorded in the recording step, each record in the set including the price paid for a product or service in a known class of products or services, and the date the price was paid; and
generating time-price functions to provide an indication of the market price for products or services in the known class of products or services.
10. A method in accordance with claim 1, further comprising the step of:
generating a set of records from the data recorded in the recording step, the set of records including fields for data indicative of the amount of revenue a known network address generates over a set time period or over a set number of requests for data from the known network address.
11. A method in accordance with claim 10, further comprising the step of:
generating a revenue projection over a given period of time for the known network address.
12. A method in accordance with claim 10, further comprising the step of:
generating a sales forecasts for the known network address.
13. A method in accordance with claim 1, further comprising the step of:
generating a set of records from the data recorded in the recording step, the set of records including a field indicative of the number of times data at a known network address is requested by a user on the network.
14. A method in accordance with claim 1, further comprising the step of:
generating a set of records from the data recorded in the recording step, the set of records including fields indicative of a characteristic of users of the network, and at least one field indicative of network usage; and
comparing the set of records to a second database based on a large population to predict an overall probability of network usage by network users having the characteristic for the entire population represented by the second database.
15. A method in accordance with claim 1, further comprising the step of:
compressing the readdressed data.
16. A system for collecting data relating to a user's transactions over an unsecure network, the user using a computing device configured to send and receive data sets over the network, the computing device having an address on the network, the data sets including data representative of the address of the computing device on the network, the system comprising:
logic configured to assign a unique identifier to the computing device;
logic configured to readdress data sets sent from the computing device to indicate that the data sets originated in the known domain;
logic configured to record at least part of the data sets; and
logic configured to send the readdressed data onto the network.
17. A system for collecting data relating to a consumer's transactions over an unsecure network, the consumer using a computing device configured to send and receive data sets over the network, the data sets including data representative of the address of the computing device on the network, the network including a content server, the system comprising:
logic configured to send data to and receive data from the consumer over the network;
logic configured to negotiate a first encryption key with the consumer's computing device; and
logic configured to negotiate a second encryption key with the content server.
Description
    BACKGROUND OF THE INVENTION
  • [0001]
    1. Field of the Invention
  • [0002]
    The present invention relates to systems and methods useful for collecting consumer data, and more particularly to systems and methods for collecting data representative of consumer buying habits over networks.
  • [0003]
    2. Brief Description of the Related Art
  • [0004]
    Consumer decision making has been a focus for many years. Companies that are attempting to meet a particular need in the marketplace, or that are attempting to find out how their products or services are being received by the consumer, will often conduct market research to attempt to quantify attributes or characteristics of a particular consumer segment. If performed well, the data extracted from this research can inform companies about how their products or services are perceived and bought by purchasers or potential purchasers in the marketplace, and how the companies' products or services can be changed to achieve the companies' business goals.
  • [0005]
    Traditionally, there have been numerous other general protocols for performing consumer-oriented market research. A pool of consumers is first selected, and then each individual person in the pool is asked to provide information about themselves, their purchasing and perceptions of products or services, and/or their buying decisions, among other things. Many different ways have been proposed in the past for eliciting and recording this information from the individual consumer. For example, for television viewing habits, an electronic device has been attached to the television consumer's television set which is capable of recording which specific channels were tuned in, at what time, and for how long.
  • [0006]
    Perhaps the most simple prior protocol for collecting such data has been to simply ask the consumers to write down data about their buying habits, or to survey a random selection of people either personally, over the telephone, or by using a mailed survey.
  • [0007]
    Other prior data collection protocols concerned collecting data about consumers' buying habits. For example, one prior protocol involved the consumer being given an electronic device which includes a Universal Product Code (UPC) (bar code) scanner. The consumer was requested to scan in every item that the consumer bought over a period of time, and to enter other information regarding the purchase (e.g., at what retailer the purchase was made). The consumer then connected the device to an intelligent modem. The device would dial up and connect to a host computer, and upload the scanned information to the host computer to be collected and processed.
  • [0008]
    Another data collection protocol, commonly used by consumer package goods retailers, is to ask the consumer to show an ID card at checkout. The check-out clerk then inputs the ID number and scans the items bought for both pricing and gathering data about the consumer's grocery buying habits. The retailer then can use this data about the individual consumer to make consumer-specific promotional offers. Data from many consumers can be merged together and sold to another party for marketing intelligence, or the like.
  • [0009]
    The above prior data collection protocols suffer from numerous deficiencies, in the traditional and modem marketplace. In particular, it has proven difficult to adapt these protocols to internet-based electronic commerce. Compared to the relative ease by which consumers are able to receive information and make decisions based on information from the internet, prior data collection protocols are cumbersome, do not interface well (if at all) with computer-based consumer activity, and are therefore not well suited for collecting data about internet-based activity.
  • [0010]
    Some internet-activity monitoring has been proposed. For example, a server-side consumer data collection strategy has been proposed in which an individual internet content provider (“website”) monitors and collects data about each consumer who has requested data from (“visited”) the website, and then compiles this data about all the consumers who have visited that website. This data could include purchases; the specific type or subject of information requested from the site; and the like. Furthermore, the website also collects data about how frequently particular files or groups of files (“webpage”) have been visited (commonly referred to as “click through hits”), that is, a measure of the popularity of a particular website or webpage. This is one form of server-side data collection.
  • [0011]
    Another form of server-side consumer data collection requires a consumer to visit a particular website specifically for the purpose of providing information about that individual's buying habits, in return for which the website compensates the individual, with incentives such as money, gifts, credits, or the like.
  • [0012]
    Data collection directly from an internet consumer's computer has also been proposed, i.e., client-side data collection. Such systems commonly involve installing a large and cumbersome software application onto the consumer's computer, which operates at the same time as internet browser application software. The software then collects data about the consumer's internet usage, i.e., which websites the consumer has visited. The data is then uploaded to a data collecting computer on the internet.
  • [0013]
    These prior internet activity protocols and systems have numerous disadvantages and deficiencies. While both the above server-side and client-side data collection systems are capable of collecting data about a particular consumer, they both suffer from certain failings. For example, prior server-side systems only are capable of collecting data about a consumer's activities at a single website, as it is that website itself that is collecting the data. If the consumer clicks-through to another site, e.g., an advertiser's site, the consumer and their information is thereafter lost. Furthermore, it is difficult for server-side systems to collect data about the consumer, such as age, income level, marital status, and other demographic, economic, and personal information, which would allow the data to be compared with consumer databases from other source. Many consumers are simply unwilling to give this sensitive information to an otherwise unknown party without some incentive being provided. Thus, in order to get statistically significant market data, the website would have to be visited by an enormous number of internet consumers.
  • [0014]
    Prior client-side systems likewise suffer from different, but nevertheless severe, deficiencies. Because prior client-side systems require the use of an additional application to gather data, which application runs on the consumer's computer at the same time as the consumer's internet browser, the computer is slowed down by the added impact on its system's resources. Thus, the consumer notices a delay in the operation of her computer, which is not acceptable to many consumers. Uploading collected data also takes away from internet bandwidth, which also is unacceptable to many consumers. In order to interpret the raw data from the internet that this specialized software shares with the internet browser, it is necessary for the client-side software to include data or instructions which allows the software to interpret the data from specific websites. When these specific websites change the format of the data they send to internet consumers, the specialized software must be updated so that the new data format(s) can be properly interpreted. Thus, when a website changes the layout or content of a webpage that the client-side software is supposed to monitor, the client-side software on each participating internet consumer's computer must be updated. As will be immediately appreciated, this can be a large, cumbersome, and expensive undertaking. Because the software installed on the client-side computer is complicated, it is also not unusual for technical problems to occur. This necessitates the maintenance of a large customer service center to help answer consumer's questions and solve their problems. This can also be a very expensive undertaking.
  • [0015]
    Furthermore, such client-side systems require a very large sample size of internet users in order to have statistically significant data, because the number of internet users who visit a website is much greater than the number of internet consumers who perform some internet activity, such as making a purchase, listening to a sound or song, watching a video, or requesting a specific type of information. Because of the expensive features of prior client-side systems, the costs per panelist to maintain these measurement systems are extraordinarily high.
  • SUMMARY OF THE INVENTION
  • [0016]
    According to a first exemplary embodiment, a method of collecting data relating to a user's transactions over an unsecure network, the user utilizing a computing device to send and receive data sets over the network, the computing device having an address on the network, the data sets including data representative of the address of the computing device on the network, comprises the steps of directing all data sets from the computing device to a known domain, assigning a unique identifier to the computing device, readdressing data sets sent from the computing device to indicate that the data sets originated in the known domain, recording at least part of the data sets, and sending the readdressed data onto the network.
  • [0017]
    According to a second exemplary embodiment, a system for collecting data relating to a user's transactions over an unsecure network, the user using a computing device configured to send and receive data sets over the network, the computing device having an address on the network, the data sets including data representative of the address of the computing device on the network, comprises logic configured to assign a unique identifier to the computing device, logic configured to readdress data sets sent from the computing device to indicate that the data sets originated in the known domain, logic configured to record at least part of the data sets, and logic configured to send the readdressed data onto the network.
  • [0018]
    According to a third exemplary embodiment, a system for collecting data relating to a consumer's transactions over an unsecure network, the consumer using a computing device configured to send and receive data sets over the network, the data sets including data representative of the address of the computing device on the network, the network including a content server, comprises logic configured to send data to and receive data from the consumer over the network, logic configured to negotiate a first encryption key with the consumer's computing device, and logic configured to negotiate a second encryption key with the content server.
  • [0019]
    Still other objects, features, and attendant advantages of the present invention will become apparent to those skilled in the art from a reading of the following detailed description of embodiments constructed in accordance therewith, taken in conjunction with the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0020]
    The invention of the present application will now be described in more detail with reference to preferred embodiments of the apparatus and method, given only by way of example, and with reference to the accompanying drawings, in which:
  • [0021]
    FIG. 1 schematically illustrates a prior network configuration;
  • [0022]
    FIG. 2 schematically illustrates an exemplary embodiment of a system in accordance with the present invention;
  • [0023]
    FIG. 3 schematically illustrates a portion of the system illustrated in FIG. 2; and
  • [0024]
    FIGS. 4 and 5 diagrammatically illustrate flow charts of steps of methods in accordance with the present invention.
  • DETAILED DESCRIPTION
  • [0025]
    Referring to the drawing figures, like reference numerals designate identical or corresponding elements throughout the several figures.
  • [0026]
    The present invention relates to systems and methods useful for collecting data indicative or representative of a specific internet user's activity. A domain is established with proxy servers and data servers to which all of a single internet user's activity is routed, which enables all of the activity to be filtered and data to be collected about specific types of activity and stored on the data servers. The domain is established on the internet, and by simply instructing the user's internet browser to route all internet traffic from the user through the domain, the domain can perform whatever data collection is desired without the user suffering from delays in webpage retrieval and the like. Enrollment in the system of the present invention would be entirely voluntary on the part of the individual internet user, and the enrolled internet user would be provided some incentive in return for allowing the system to have all of that user's internet traffic routed through the system's domain. Furthermore, specific information about the internet user could be gathered as a prerequisite for enrollment, which enriches the data collected about that user's internet usage habits and permits inter-database comparisons.
  • [0027]
    Systems of the present invention allow server-side data collection, but do not suffer from the failings described above, because all of the internet traffic of a single internet user is monitored, and not only a single user's activity at a single site. Therefore, for a single user, data can be collected indicative of usage of all sites while maintaining excellent data integrity and completeness. Different from client-side systems, systems and methods in accordance with the present invention do not demand significant computing resources, nor require an expensive customer service center. Furthermore, when websites change the formats of their webpages, only the data resident on the proxy servers in the domain of the present invention need be updated, which can dramatically reduce costs. As a result of one or more of the advantageous features of the present invention, many or all of the problems with prior client-side systems are eliminated.
  • [0028]
    Throughout the present application, an understanding of the use and function of general purpose computing devices, including what have come to be referred to as “personal computers” (“PC”), is assumed, as those of ordinary skill in the art are very skilled in their use and function. Furthermore, an understanding of the use and function of commercially available operating systems which control some of the functions of general purpose computing devices, as well as with commercially available application software such as Netscape® Navigator® (Netscape Communications Corp., Mountain View, Calif.; http://www.netscape.com), Microsoft® Internet Explorer® (Microsoft Corp., Redmond, Wash.; http://www.microsoft.com), and proxy server application software, is assumed. Throughout the present application, a natural person who uses a computer is referred to as a “user” or a “consumer”.
  • [0029]
    FIG. 1 illustrates a prior network configuration 10 over which a consumer is able to retrieve data and information, and send data and information, for a number of purposes. Configuration 10 includes a PC 12 which is in communication, either wired or wireless, with data input elements such as a keyboard and pointing device 14. PC 12 includes appropriate communications hardware and volatile and non-volatile memory elements (not illustrated) in or on which are stored an operating system and application software which allow a user to send and receive data, and to present that data in a form which is understandable to the user. Such software includes application software commonly referred to as a “browser”, such as Netscape and Internet Explorer.
  • [0030]
    PC 12 is connected to a wired or wireless communications line 16 which is connected to a computer or computing device 18. Computer 18 is preferably a general purpose computer which includes application software which controls the computer to function as a data server, and which is usually remote from PC 12. Computer 18, or its owner, can be an “internet server provider” (“ISP”), for which line 16 includes telephone, coaxial cable, or similar links between PC 16 and computer 18, as will be readily appreciated by one of ordinary skill in the art. Computer 18 can also be located on a private network, e.g., a local area network or LAN, and includes application software controlling computer 18 to function at least as a firewall, proxy server, or both.
  • [0031]
    Computer 18 is connected to what is commonly referred to as the World Wide Web or the Internet (together “WWW”, not illustrated) through a communications line 20. As will be readily appreciated by one of ordinary skill in the art, FIG. 1 presents a very simple representation of the WWW, which is much more distributed than is illustrated in FIG. 1. Also in communication with the WWW are a plurality (only three are illustrated) of content data servers 22, 24, 26, (i.e., in the language of the WWW, websites), which have stored therein data or information 28, 30, 32, (e.g., webpages) respectively.
  • [0032]
    A brief discussion of some of the differences between an “intranet” and the “Internet” (which includes the World Wide Web) will be beneficial. The Internet, sometimes called simply “the Net,” is a worldwide system of computer networks—a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANet. The original aim was to create a network that would allow users of a research computer at one university to be able to “talk to” research computers at other universities. A side benefit of ARPANet's design was that, because messages could be routed or rerouted in more than one direction, the network could continue to function even if parts of it were destroyed in the event of a military attack or other disaster.
  • [0033]
    Today, the Internet is a public, cooperative, and self-sustaining facility accessible to hundreds of millions of people worldwide. Physically, the Internet uses a portion of the total resources of the currently existing public telecommunication networks. Technically, what distinguishes the Internet is its use of a set of protocols called TCP/IP (Transmission Control Protocol/Internet Protocol). Two recent adaptations of Internet technology, the intranet and the extranet, also make use of the TCP/IP protocol.
  • [0034]
    When a person or organization has a computer connected to the public portion of the Internet, the computer is assigned an internet protocol (IP) address which uniquely identifies that computer. Typically, however, the computer is assigned a set of addresses at a certain class level (A, B, C, etc.), and all of the addresses within that set are routed to that computer. If that computer is a proxy server (see discussion below) for a private network of computers, then each of the computers within the private network can be assigned a unique IP address in the set assigned to the proxy server. Thus, the computers assigned IP addresses within the set define an “intranet”, because the IP addresses are all within the address set assigned to the proxy server.
  • [0035]
    The most widely used part of the Internet is the World Wide Web (often called “the Web”). Its outstanding feature is hypertext, a method of instant cross-referencing. In most Web sites, certain words or phrases appear in text of a different color than the rest; often this text is also underlined. When you select one of these words or phrases, you will be transferred to the site or page that is relevant to this word or phrase. Sometimes there are buttons, images, or portions of images that are “clickable.” If you move the pointer over a spot on a Web site and the pointer changes into a hand, this indicates that you can click and be transferred to another site. Using the Web, you have access to millions of pages of information. Web “surfing” is done with a Web browser, the most popular of which are Netscape Navigator and Microsoft Internet Explorer.
  • [0036]
    In an enterprise that uses the Internet, a proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion. A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user.
  • [0037]
    To the user, the proxy server is invisible; all Internet requests and returned responses appear to be directly with the addressed Internet server. (The proxy is not quite invisible; its IP address has to be specified as a configuration option to the browser or other protocol program.) An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. In fact, there are special servers called cache servers. A proxy can also do logging. The functions of proxy, firewall, and caching can be in separate server programs or combined in a single package. Different server programs can be in different computers. For example, a proxy server may be in the same machine with a firewall server or it may be on a separate server and forward requests through the firewall.
  • [0038]
    Thus, requests for data from one computer to another computer within the same assigned set of IP addresses are considered secure, because the request and the data sent in reply do not get passed to any computer not assigned an IP address within the set. When a request for data is addressed to a computer not within the set of IP addresses, the request must pass to computers which are assigned IP addresses not within the set assigned to the same person or entity, and are therefore considered insecure. This latter insecure request for data passes over the Internet, because it is passed to computers with IP addresses not in the same assigned set as the originating computer.
  • [0039]
    While the function of the system illustrated in FIG. 1 is well known to those of ordinary skill in the art, a brief summary will assist in a better understanding of the present invention. When a consumer using PC 12 wants to retrieve data (e.g., a webpage) from a website on the WWW, the user utilizes the application software on PC 12 to be assigned an. internet protocol (IP) address (including a classless interdomain routing, CIDR, address), i.e., to open a connection to the WWW. The user then launches and uses the browser software to request data from a specified machine, such as server 22 on the WWw, by entering the uniform resource locator (URL) designation for the machine, and preferably the specific data file on that machine, such as data 28. The data representing this request for data is communicated to computer 18, which processes the request data to be sent out onto the WWW, typically in the form of multiple data packets, including the IP address for computer 12.
  • [0040]
    As will be readily appreciated by one of ordinary skill in the art, servers 22, 24, or 26 usually are not directly connected to computer 18, and each data packet can take a different route from computer 18 to server 22. Upon being communicated to server 22, each packet is reassembled with the other packets to reconstruct the original data request from the user. Server 22 then retrieves data 28, and processes the data for the return trip across the WWW to the user's computer 12, typically in the same manner as the user's data request. The browser software running on computer 12 then reassembles the data packets to reconstruct data 28, and presents it to the user in a particular, usually an understandable, form, and can be either static or dynamic, i.e., can itself include instructions for controlling computer 12. For example, data 28 can include software instructions, such as instructions scripted in Java™ (Sun Microsystems, Inc., Palo Alto, Calif.; http://www.javasoft.com) which are executed on the computer 12.
  • [0041]
    Thus, when a consumer using computer 12 wants to place an order for a product or service which is offered through a merchant using server 22 on the WWW, the user requests a particular data file 28 from the server 22. The data file 28 oftentimes includes data that results in a form being generated by computer 12 and displayed to the user. The user then enters information into the form using keyboard 14, and sends the filled-out form back to server 22, including data representing what the user would like to buy, and payment information, such as credit card information. Such systems and processes are well known; see, e.g., U.S. Pat. No. 5,715,399, issued to Bezos, “Secure Method and System for Communicating a List of Credit Card Numbers Over a Non-Secure Network”, assigned to Amazon.com, which is incorporated by reference herein in its entirety.
  • [0042]
    FIG. 2 schematically illustrates an exemplary system 100 in accordance with the present invention. For purposes of brevity, individual elements included in system 100 which have been described above with reference to FIG. 1 will not be described further. System 100 includes a domain 102, which includes one or more computers and associated hardware, firnware, and software which together function as a domain on the WWW. In general, domain 102 is operatively in the path between PC 12 (and computer 18) and all other machines on the WWW, so that all of the data that is sent to and from PC 12 is routed through domain 102. As schematically illustrated in FIG. 2, however, domain 102 is on the public (WWW) side of computer 18, and is therefore not necessarily in direct communication with either computer 18 or any of servers 22, 24, 26.
  • [0043]
    Domain 102 includes at least one, and preferably a plurality of machines 102 X, each with associated hardware, firmware, and software as discussed above. As will be readily appreciated by one of ordinary skill in the art, each machine 102 X(X ε[1,N], wherein N is any positive integer) has a unique IP address within domain 102, and therefore can be located together or distributed throughout the WWW.
  • [0044]
    FIG. 3 schematically illustrates an exemplary embodiment of a configuration of domain 102. Domain 102 includes at least one, and preferably numerous (only three are illustrated) proxy servers 104, 106, 108, and at least one, and preferably numerous (only three are illustrated) data servers 110, 112, 114, which are in communication with the proxy servers. For example, data servers 110, 112, 114 can be Structured Query Language (SQL) servers. Proxy servers 104, 106, 108 include proxy server application software which allow pc 12 to route requests for data through domain 102. PC 12 is therefore aliased within domain 102, which requires all of the data which is sent from PC 12 onto the WWW and all of the data from the WWW which is intended for PC 12 to be copied, processed as by a filter 116, and stored within domain 102 on data servers 110, 112, 114. Thus, a complete copy of all data addressed for PC 12 is copied within domain 102, and is filtered. Filter 116 can be constructed to retain all of the data, or to retain portions of the data in servers 110, 112, 114.
  • [0045]
    Thus, when machines such as servers 22, 24, and 26 on the WWW receive data from PC 12, because it has been routed through domain 102 and readdressed with an IP address within domain 102, data sent by server 22 (for example) which was requested by the user of PC 12 is addressed to the internet user “in care of” domain 102. Proxy server 104 (for example) receives data 28 from server 22, readdresses the data to the PC 12 based on an unique identifier (see below) at the IP address assigned (either statically or dynamically) to the PC 12, and transmits the readdressed data 28 back into the WWW. As will be readily appreciated by one of ordinary skill in the art, data 28 is then collected by server 18, and transmitted to PC 12, as discussed above. Importantly, domain 102 is not an ISP or proxy server gateway from a private network. Domain 102 is another domain on the WWW through which consumer/PC-specific data is routed, and includes a proxy server gateway onto the public WWW network. According to less preferred embodiments, domain 102 is an ISP to which computer 12 directly connects, i.e., includes computer 18.
  • [0046]
    Because each computer 12 can be dynamically assigned an IP address by computer 18, domain 102 must first be provided with unique identifying information about computer 12 to differentiate it from other computers which are similarly proxied through domain 102. This information may be identifying information provided by a component (either software or hardware) of computer 12, such as by a “cookie” returned to domain 102, a “digital certificate” returned to domain 102, CPU chip identifying information (as has recently been commercially available in Pentium® III class chips from Intel Corp., Santa Clara, Calif.; http://www.intel.com), or other unique identifying information as will be readily apparent to one of ordinary skill in the art.
  • [0047]
    In a preferred embodiment of the present invention, identifying information or data can be included in each data packet, preferably in the header portion of each packet, so that each packet uniquely identifies each PC 12 from which it originated. By way of example and not of limitation, one or more fields in the packet header, such as the “language” field, can include unique identifying information. Changing the value that is contained in any particular field of a packet header to include such identifying information will be readily appreciated by one of ordinary skill in the art. Again by way of example and not of limitation, the language field value, for example, can be changed so that it is, or includes in addition to a language code, a unique identifier. This change in the language field, for example, can be readily achieved by changing the browser's preferences to include the unique identifier, which can be performed manually through the application tools provided with the browser. Alternatively, this change can be achieved by executing a series of logical instructions, as embodied in software, on PC 12, as will be readily apparent to one of ordinary skill in the art. Any other field in a packet header can be used instead of or in addition to the language field within the spirit and scope of the present invention.
  • [0048]
    According to yet another aspect of the present invention, secure internet transfer protocols can be used between an internet consumer and an internet content provider while still monitoring and collecting data about the user's internet activities. As readily appreciated by one of ordinary skill in the art, when an internet consumer initially requests a secure webpage, the consumer is sent an encryption key to enable encryption and decryption of webpages sent respectively to and from that website. Thus, other machines on the internet are unable (in theory) to interpret the data passing between the internet consumer and the website when in a secure mode.
  • [0049]
    Systems in accordance with the present invention accommodate secure/encrypted communications while still monitoring internet usage and enabling data collection, as diagrammatically illustrated in FIG. 5. For example, a proxy server of domain 102 can include two servers: proxy server 106 for transferring encrypted data to and from computer 12, and proxy server 108 for transferring encrypted data to and from server 22 (for example). As will be readily apparent to one of ordinary skill in the art, servers 106 and 108 may be the same proxy server functioning as described above. Thus, when domain 102 receives a request for an encrypted webpage from computer 12 (step 250), server 106 can negotiate and pass its own encryption key to computer 12 (step 252), thus initiating a secure session with computer 12. The original request from computer 12 bearing the unique identifier for the consumer on domain 102 (step 254) is passed back into the internet by server 108 to be received by computer 22 (step 256). Computer 22 and server 108 negotiate an encryption key for the data 28, and the encryption key is passed back to server 108, bearing the consumer's unique identifier in domain 102 (step 258).
  • [0050]
    When encrypted data 28 is sent by computer 22 and received by server 108 (step 260), server 108 decodes the data using its encryption key (step 262). Server 108 passes the decoded data to server 106, which readdresses the data for delivery to computer 12 at its IP address from computer 18 and encrypts the data using the encryption key held by server 106 (step 264). Thus, proxy server 106 securely transfers data to and from computer 12, proxy server 108 securely transfers data to and from computer 22 for the consumer, and servers 106 and 108 exchange the decoded data. In a preferred embodiment of the present invention, servers 106 and 108 are the same server which performs the operations and functions described above. According to a less preferred embodiment, yet still within the spirit and scope of the present invention, servers 106 and 108 are different servers which separately perform the operations and functions described above.
  • [0051]
    The present invention also relates to methods of collecting data about computer user habits, preferences, uses, and the like, and methods of using this data. While system 100 is preferably used to perform the methods of the present invention, one of ordinary skill in the art will readily appreciate that other systems can by used without departing from the spirit and scope of the present invention. FIG. 4 diagrammatically illustrates a flowchart of steps of methods in accordance with the present invention.
  • [0052]
    As discussed above, data representative of internet consumers' behavior, including (but not exclusively) what choices the consumer makes, why particular characteristics of a product or service are important, what products or services a consumer has considered and decides not to purchase, and how much money a consumer is willing to pay and has paid for a product or service, can be a valuable product in itself. As will be readily appreciated by one of ordinary skill in the art, the quality of the data, e.g., statistical significance and error, greatly impacts how valuable the data is to a party wanting to know about a particular consumer's habits.
  • [0053]
    Methods in accordance with the present invention collect and generate data which is extremely complete for an individual user, and therefore can be very useful by itself or when correlated with other data about that user, or other consumers that share characteristics with the user. Furthermore, because the methods of the present invention do not rely on client-side data collection, but instead utilize server-side data collection, the impact on the performance of the individual consumer's computer 12 is minimal, and does not require repeated software updating as with prior systems which were resident on a computer 12.
  • [0054]
    Initially, an internet consumer must be registered so that the consumer's computer can be uniquely identified (step 200). To encourage consumers to participate in the monitoring activity, incentives may be offered to the consumer in exchange for routing all of that consumer's internet data so that it can be monitored. As will be readily appreciated by one of ordinary skill in the art, the exact nature of the compensation can vary, and can include money, gifts, and the like. Additionally or alternatively, the compensation can be in the form of faster internet access to the consumer. For example, when using system 100 described above, data can be delivered to computer 12 in compressed form from domain 102. Because of the decrease in required bandwidth required for transmitting compressed data, the consumer experiences an overall increase in data transfer rates between domain 102 and computer 12, even when factoring in decompression of the data by computer 12. Thus, the retransmission of compressed data can be an incentive for the internet consumer to agree to proxy all of their internet data through domain 102.
  • [0055]
    Commercially available browser software, such as Navigator® and Internet Explorer®, include decompression software which can be configured to automatically decompress compressed data upon receipt by PC 12. Thus, according to a preferred embodiment of the present invention, domain 102 compresses data to be sent to PC 12, resulting in faster net times between the PC requesting data and that data being delivered to the PC. By way of example and not of limitation, domain 102 can include a set of logical instructions, e.g, software, which compresses data according to a known compression routine, e.g., the Gzip compression routine. As the browser software running on PC 12 can both recognize and decompress Gzip compressed data, the internet consumer receives the benefit of faster net data transmission without the need to intervene in the process of decompressing the data with a separate decompression application or tool. The particular compression protocol used to compress and decompress the data can be any of the numerous known data compression protocols, such a “zip”, “uuencode”, “tar”, “lzh”, “MIME”, “ARC”, “Binhex”, “sit”, “hqx”, etc., within the spirit and scope of the present invention, the protocol being selected so that the browser application running on PC 12 includes logic to automatically decompress data which has been compressed according to that algorithm.
  • [0056]
    Also by way of example, domain 102 can perform proxy caching, including hierarchical caching, of webpages and entire websites of predetermined interest. Thus, when a consumer requests a webpage which has been cached in domain 102, the data is served to the consumer much faster than if an original copy of the requested webpage were requested and passed through to the consumer. As data compression and proxy caching are well appreciated by one of ordinary skill in the art, further discussion of these types of compensation will not be described herein.
  • [0057]
    Of course, the decision to participate, i.e., to contract with the service provider, is entirely voluntary, and some consumers may elect not to participate. Those who do choose to participate supply the service provider with information about themselves; the exact data can vary, and could include demographic, socio-economic, geographic, and any other information commonly collected in market research studies. Such information can include, but is not limited to user age, user income level, user education level, household size, time of transmission of the data set, location of computing device, date of transmission of the data set, currency paid, type of product purchased, type of service purchased, network address of the intended recipient of a data set, click-through address, banner advertisement impression, and permission e-mail received, and combinations thereof.
  • [0058]
    Furthermore, the consumer is provided with a small application software applet which adjusts the browser application running on the consumer's computer so that it proxies to the service provider's proxy server, i.e., so that it redirects all of the consumer's outbound data to the domain 102. If the service provider is utilizing system 100, described above, the applet will reset the browser to proxy to domain 102. Publicly available browsers are provided with the ability to do this “reset” operation. The applet can be directly downloaded, shipped via a diskette, CD-ROM, or the like, or manually installed or modified by a technician who visits the consumer (step 202).
  • [0059]
    A database record is built based on the data set supplied by the consumer (step 204). A unique identifier is assigned to the consumer (step 206). Thereafter, as described above, all of the consumer's internet data will be routed to the service provider. The service provider can then.copy or otherwise monitor the data (step 208), and pass on the data into the internet (step 210) without impacting the overall data transfer rate from the consumer to the data's intended destination. According to one aspect of the invention, the service provider has predetermined the formats of the webpages for a set of domains, websites, and/or webpages that are of interest to the service provider. Thus, internet traffic directed to or coming from these destinations/sources is monitored, and the data of interest filtered and collected. As other websites become of interest to the service provider, for example because consumers visit their sites, the service provider retrieves a copy of the particular webpages of interest, and determines the specific data format that the webpage includes. This determination of webpage formats can be performed manually or by an automated process, as will be readily apparent to one of ordinary skill in the art. As most webpages are formatted so as to conform with publicly known, standardized data transfer protocols (e.g., http, hypertext transfer protocol) or known scripting languages (cgi, Java™), determining the data format of most webpages will be well within the skill of one skilled in the art.
  • [0060]
    When the service provider is routed a copy of a webpage from either the consumer or a website, the service provider is able to copy the data contained in the webpage. By knowing the data format used by that website in creating the webpage, the service provider is then able to extract from the data the exact information detailing what sort of internet transaction the consumer has just engaged in. Notably, however, the service provider does not impede the transaction, but merely extracts the data about the transaction, and passes the data on to the intended recipient. The extracted data is then filtered for data elements of interest to the service provider, such as the date and time of the transaction, URL of a click-through (e.g., on a banner ad), amount of money spent, type and number of items bought, delivery method, and so on (step 212). The data record for that particular consumer is then updated with the information (step 214). As will be readily appreciated by one of ordinary skill in the art, when more than one consumer has her internet data routed through the service provider, the service provider can generate a database of consumer internet activity of great detail about any single consumer's habits, any class of consumers differentiated based on any common characteristic in the database, any single domain, website, or webpage, and/or any class of domains, websites, or webpages which share a common characteristic in the database.
  • [0061]
    The foregoing description also applies to “push” and “broadcast” internet technologies which operate on the same principle of the internet consumer requesting data and the content server delivering data to the internet consumer.
  • [0062]
    Several specific embodiments of methods in accordance with the present invention will now be described. While the following are specific embodiments of methods according to the present invention, the present invention is not limited to the specific methods described herein.
  • [0063]
    A measure or metric can be established and generated from the data collected by the service provider, such as a dollar per thousand hits on a particular webpage (“$/K metric”) (step 216). The $/K metric therefore can indicate how much money is generated or received per one thousand times the particular webpage is served to any person on the internet. The $/K metric provides a useful measure for an internet content provider and/or an internet advertiser of how to price advertising rates, or how much to pay for internet advertising, respectively, based on the cost per thousand hits (CPM) versus the revenue generated by the internet advertiser per thousand hits (RPM). Furthermore, while a single internet merchant can generate its own CPM and RPM values based on the $/K metric, that internet merchant does not have the data to compare to its competitor's CPM and RPM. Thus, the service provider practicing methods in accordance with the present invention will be able to market and sell $/K metric data to internet merchant competitors without relying on the merchants themselves for the data.
  • [0064]
    In another aspect of the invention, a log of internet activity (“weblog”) can be generated from the data collected by the service provider (step 218). The weblog can include a listing of the particular URLs visited by consumers, separate from the data indicating the consumers' transaction habits. Because the database generated can include data regarding consumer's demographics and the like, the database can be easily mined for data records having web hits on a particular website. This information is particularly valuable to that website's competitors, as it gives an indication of who is visiting the website, and what those individuals' characteristics are. Such “competitive intelligence” can be marketed and sold to a wide variety of parties, and in particular to the particular website's competitors.
  • [0065]
    In yet another aspect of the invention, an electronic commerce (“e-commerce”) or retail price index, herein termed “EPI”, can be generated from the service provider's database, based on any electronic retailer's (“e-tailer”) data, mined from the database (step 220). That is, the prices of particular products can be retrieved from the database, and the relationships between time and price can be generated to provide an indication of the true market price for an item or service, or of the condition of a market as a whole.
  • [0066]
    The service provider's database can be further analyzed or mined to extract data relating to the amount of revenue a particular website generates over a particular time period or a particular number of website hits (step 222). Based on the sample size for the particular website of interest, and therefore within a known confidence interval based on known rules of statistical analysis, the service provider will be able to provide revenue projections over a given period of time for the website well in advance of the end of any particular time period or number of internet visits. As will be readily appreciated by one of ordinary skill in the art, revenue predictions for a business are very useful tools for pricing securities for that merchant, and therefore the service provider can market and sell such revenue predictions to parties interested in knowing this information before release of the actual revenue reports by the website owner to the rest of the securities market. Furthermore, sales forecasts can be used by the internet merchant for inventory control and just-in-time warehousing and delivery.
  • [0067]
    The database can also be analyzed for data representative of the frequency a particular website is visited (step 224). For example, the data filtering performed on the raw internet data received by the service provider can include tabulating the number of times a domain, website, or webpage is served to a consumer. By comparing this number to the number of times a purchase was made, a measure of the particular consumer's purchasing propensity can be generated, as well as the average amount spent per visit and per transaction. These measures can be marketed to e-tailers, or provided back to the consumer. Similarly, by retrieving from the database transactions at a single website across the database, cross-selling success can be measured (step 226). For example, for an e-tailer that sells products A and B, the database can be mined for transactions between the particular e-tailer and consumers for product A, and the e-tailer's success in also selling product B to that same consumer set can be extracted. Thus, the success of the e-tailer to cross-sell products A and B can be readily extracted, and that information can be marketed and sold to competing e-tailers.
  • [0068]
    More traditional market research data can also be easily mined from the service provider's database of internet consumer activity. For example, a particular e-tailer's total market share in a particular class of goods or services can be determined by extracting data of all transactions in that class attributable to the particular e-tailer, as well as all transactions for goods or services in the class. Similarly, for a particular consumer, the loyalty or share of the consumer's spending (“wallet”) spent at a particular e-tailer or for a particular product type can be easily extracted. The percentage of the entire consumer sample pool who visited or bought goods or services a specified number of times from a particular site can be determined, which represent the trial and repeat rates for both visiting and purchasing.
  • [0069]
    Profiling or generating scoring models can also be facilitated by the service provider practicing methods in accordance with still another aspect of the present invention. For example, the database can be used to provide data records for a particular consumer characteristic, such as education level (step 228). This data set can be compared to broad demographic data sets including indicators of education level, to predict the overall probability of a certain internet activity, such as buying a product or viewing a video, by persons at that education level for the entire population represented by the broad demographic data set (step 230). Other comparisons of the service provider's database to other databases will be readily appreciated by one of ordinary skill in the art, to generate profiling data on a certain population's internet activities.
  • [0070]
    The present invention provides numerous advantages over prior server-side and client-side systems. Because of the particular systems and processes of the present invention, statistically significant consumer data can be gathered at extremely low costs per panelist when compared with prior systems.
  • [0071]
    While the invention has been described in detail with reference to preferred embodiments thereof, it will be apparent to one skilled in the art that various changes can be made, and equivalents employed, without departing from the scope of the invention.
Citations de brevets
Brevet cité Date de dépôt Date de publication Déposant Titre
US31951 *9 avr. 1861 burlingame
US4355372 *24 déc. 198019 oct. 1982Npd Research Inc.Market survey data collection method
US4603232 *24 sept. 198429 juil. 1986Npd Research, Inc.Rapid market survey collection and dissemination method
US4954699 *13 avr. 19884 sept. 1990Npd Research, Inc.Self-administered survey questionnaire and method
US4958284 *6 déc. 198818 sept. 1990Npd Group, Inc.Open ended question analysis system and method
US5023929 *15 sept. 198811 juin 1991Npd Research, Inc.Audio frequency based market survey method
US5060140 *16 janv. 198622 oct. 1991Jupiter Technology Inc.Universal programmable data communication connection system
US5481294 *27 oct. 19932 janv. 1996A. C. Nielsen CompanyAudience measurement system utilizing ancillary codes and passive signatures
US5488408 *22 mars 199430 janv. 1996A.C. Nielsen CompanySerial data channel metering attachment for metering channels to which a receiver is tuned
US5526427 *8 déc. 199411 juin 1996A.C. Nielsen CompanyUniversal broadcast code and multi-level encoded signal monitoring system
US5550928 *15 déc. 199227 août 1996A.C. Nielsen CompanyAudience measurement system and method
US5557686 *13 janv. 199317 sept. 1996University Of AlabamaMethod and apparatus for verification of a computer user's identification, based on keystroke characteristics
US5584050 *7 oct. 199410 déc. 1996A.C. Nielsen CompanyProgram monitoring system
US5594934 *21 sept. 199414 janv. 1997A.C. Nielsen CompanyReal time correlation meter
US5659469 *27 avr. 199519 août 1997Credit Verification CorporationCheck transaction processing, database building and marketing method and system utilizing automatic check reading
US5675510 *7 juin 19957 oct. 1997Pc Meter L.P.Computer use meter and analyzer
US5710887 *29 août 199520 janv. 1998BroadvisionComputer system and method for electronic commerce
US5715399 *30 mai 19953 févr. 1998Amazon.Com, Inc.Secure method and system for communicating a list of credit card numbers over a non-secure network
US5737025 *28 févr. 19957 avr. 1998Nielsen Media Research, Inc.Co-channel transmission of program signals and ancillary signals
US5737026 *7 juin 19957 avr. 1998Nielsen Media Research, Inc.Video and data co-channel communication system
US5751450 *22 mai 199612 mai 1998Medar, Inc.Method and system for measuring color difference
US5771307 *21 déc. 199523 juin 1998Nielsen Media Research, Inc.Audience measurement system and method
US5781913 *18 juin 199614 juil. 1998Felsenstein; LeeWearable hypermedium system
US5850249 *12 oct. 199515 déc. 1998Nielsen Media Research, Inc.Receiver monitoring system with local encoding
US5862325 *27 sept. 199619 janv. 1999Intermind CorporationComputer-based communication system and method using metadata defining a control structure
US5870546 *23 déc. 19979 févr. 1999Infoseek CorporationMethod and apparatus for redirection of server external hyper-link reference
US5872850 *31 mars 199716 févr. 1999Microsoft CorporationSystem for enabling information marketplace
US5887140 *26 mars 199623 mars 1999Kabushiki Kaisha ToshibaComputer network system and personal identification system adapted for use in the same
US5889548 *28 mai 199630 mars 1999Nielsen Media Research, Inc.Television receiver use metering with separate program and sync detectors
US5897616 *11 juin 199727 avr. 1999International Business Machines CorporationApparatus and methods for speaker verification/identification/classification employing non-acoustic and/or acoustic models and databases
US5918014 *26 déc. 199629 juin 1999Athenium, L.L.C.Automated collaborative filtering in world wide web advertising
US5961593 *22 janv. 19975 oct. 1999Lucent Technologies, Inc.System and method for providing anonymous personalized browsing by a proxy system in a network
US5970469 *26 mars 199619 oct. 1999Supermarkets Online, Inc.System and method for providing shopping aids and incentives to customers through a computer network
US5991735 *11 août 199823 nov. 1999Be Free, Inc.Computer program apparatus for determining behavioral profile of a computer user
US6006197 *20 avr. 199821 déc. 1999Straightup Software, Inc.System and method for assessing effectiveness of internet marketing campaign
US6018619 *24 mai 199625 janv. 2000Microsoft CorporationMethod, system and apparatus for client-side usage tracking of information server systems
US6026368 *17 juil. 199515 févr. 200024/7 Media, Inc.On-line interactive system and method for providing content and advertising information to a targeted set of viewers
US6049821 *24 janv. 199711 avr. 2000Motorola, Inc.Proxy host computer and method for accessing and retrieving information between a browser and a proxy
US6052730 *9 janv. 199818 avr. 2000The Board Of Trustees Of The Leland Stanford Junior UniversityMethod for monitoring and/or modifying web browsing sessions
US6058381 *30 oct. 19972 mai 2000Nelson; Theodor HolmMany-to-many payments system for network content materials
US6070145 *12 juil. 199630 mai 2000The Npd Group, Inc.Respondent selection method for network-based survey
US6081900 *16 mars 199927 juin 2000Novell, Inc.Secure intranet access
US6115680 *7 juin 19965 sept. 2000Media Metrix, Inc.Computer use meter and analyzer
US6128624 *12 nov. 19973 oct. 2000Ncr CorporationCollection and integration of internet and electronic commerce data in a database during web browsing
US6138162 *11 févr. 199724 oct. 2000Pointcast, Inc.Method and apparatus for configuring a client to redirect requests to a caching proxy server based on a category ID with the request
US6151593 *14 avr. 199821 nov. 2000Postech FoundationApparatus for authenticating an individual based on a typing pattern by using a neural network system
US6256664 *19 mars 19993 juil. 2001Bigfix, Inc.Method and apparatus for computed relevance messaging
US6263371 *10 juin 199917 juil. 2001Cacheflow, Inc.Method and apparatus for seaming of streaming content
US6286046 *22 déc. 19974 sept. 2001International Business Machines CorporationMethod of recording and measuring e-business sessions on the world wide web
US6381632 *10 sept. 199630 avr. 2002Youpowered, Inc.Method and apparatus for tracking network usage
US6389403 *17 sept. 199914 mai 2002International Business Machines CorporationMethod and apparatus for uniquely identifying a customer purchase in an electronic distribution system
US6421724 *30 août 199916 juil. 2002Opinionlab, Inc.Web site response measurement tool
US6421733 *8 sept. 199716 juil. 2002Intel CorporationSystem for dynamically transcoding data transmitted between computers
US6567854 *21 oct. 199920 mai 2003Genuity Inc.Internet service delivery via server pushed personalized advertising dashboard
US6567857 *29 juil. 199920 mai 2003Sun Microsystems, Inc.Method and apparatus for dynamic proxy insertion in network traffic flow
US6606581 *14 juin 200012 août 2003Opinionlab, Inc.System and method for measuring and reporting user reactions to particular web pages of a website
US6684194 *2 déc. 199927 janv. 2004Expanse Network, Inc.Subscriber identification system
US6694431 *12 oct. 199917 févr. 2004International Business Machines CorporationPiggy-backed key exchange protocol for providing secure, low-overhead browser connections when a server will not use a message encoding scheme proposed by a client
US6704787 *3 déc. 19999 mars 2004Intercard Payments, Inc.Date of birth authentication system and method using demographic and/or geographic data supplied by a subscriber that is verified by a third party
US6839680 *30 sept. 19994 janv. 2005Fujitsu LimitedInternet profiling
US6856963 *11 janv. 200015 févr. 2005Intel CorporationFacilitating electronic commerce through automated data-based reputation characterization
US6883032 *2 févr. 200019 avr. 2005Lucent Technologies Inc.Method and system for collecting data on the internet
US7039599 *15 juin 19982 mai 2006Doubleclick Inc.Method and apparatus for automatic placement of advertising
US7080077 *26 févr. 200118 juil. 2006Oracle International CorporationLocalized access
US7146505 *1 juin 19995 déc. 2006America Online, Inc.Secure data exchange between date processing systems
US7243129 *30 sept. 200010 juil. 2007Worldwide Creative Techniques, Inc.Method and apparatus for customization of information content provided to a requestor over a network using anonymous demographic data stored on a demographic server
US20010014868 *22 juil. 199816 août 2001Frederick HerzSystem for the automatic determination of customized prices and promotions
US20010014915 *22 févr. 200116 août 2001Nielsen Media Research, Inc.Metering of internet content using a control
US20010020242 *16 nov. 19986 sept. 2001Amit GuptaMethod and apparatus for processing client information
US20020069368 *6 déc. 20006 juin 2002Keith HinesData farming of network access
US20020077903 *2 juil. 200120 juin 2002Daniel FeldmanOn-line method and apparatus for collecting demographic information about a user of a world-wide-web site and dynamically selecting questions to present to the user
US20020099605 *1 oct. 200125 juil. 2002Searchcactus, LlcSearch engine with demographic-based advertising
US20020116266 *14 janv. 200222 août 2002Thaddeus MarshallMethod and system for tracking and providing incentives for time and attention of persons and for timing of performance of tasks
US20020124074 *13 janv. 19985 sept. 2002Jeffrey C. LevyMonitoring of remote data access on a public computer network
US20020128803 *10 mai 200212 sept. 2002Skinner Gary R.Time and activity tracker
US20020178257 *5 avr. 200228 nov. 2002Predictive Networks, Inc.Method and apparatus for identifying unique client users from user behavioral data
US20030009762 *12 févr. 20019 janv. 2003Hooper Mark EdmundMethod and apparatus for the display of selected images at selected times using an autonomous distribution system
US20030018778 *25 janv. 200223 janv. 2003Martin Anthony G.System, method and computer program product for collecting information about a network user
US20030033432 *8 août 200113 févr. 2003Simpson Shell S.Web based imaging service that converts web pages into content on behalf of another web site
US20030065595 *2 oct. 20013 avr. 2003Anglum Timothy J.Customer identification system & method
US20030076305 *22 oct. 200124 avr. 2003Allen Stephen D.Keystroke recording device with integral time and date function
US20030083938 *29 oct. 20011 mai 2003Ncr CorporationSystem and method for profiling different users having a common computer identifier
Référencé par
Brevet citant Date de dépôt Date de publication Déposant Titre
US76608621 août 20079 févr. 2010Cvon Innovations LimitedApparatus and method of tracking access status of store-and-forward messages
US770273814 mars 200820 avr. 2010Cvon Innovations LimitedApparatus and method of selecting a recipient of a message on the basis of data identifying access to previously transmitted messages
US795379110 avr. 200831 mai 2011The Nielsen Company (Us), Llc.Network resource monitoring and measurement system and method
US826603128 juil. 201011 sept. 2012Visa U.S.A.Systems and methods to provide benefits of account features to account holders
US83592742 juin 201122 janv. 2013Visa International Service AssociationSystems and methods to provide messages in real-time with transaction processing
US84067922 août 200726 mars 2013Apple Inc.Message modification system and method
US840714819 oct. 201126 mars 2013Visa U.S.A. Inc.Systems and methods to provide messages in real-time with transaction processing
US851065811 août 201013 août 2013Apple Inc.Population segmentation
US85950583 août 201026 nov. 2013Visa U.S.A.Systems and methods to match identifiers
US860663030 août 201110 déc. 2013Visa U.S.A. Inc.Systems and methods to deliver targeted advertisements to audience
US860729530 déc. 201110 déc. 2013Symphony Advanced MediaMedia content synchronized advertising platform methods
US862657930 août 20117 janv. 2014Visa U.S.A. Inc.Systems and methods for closing the loop between online activities and offline purchases
US86267058 juil. 20107 janv. 2014Visa International Service AssociationTransaction aggregator for closed processing
US863147330 déc. 201114 janv. 2014Symphony Advanced MediaSocial content monitoring platform apparatuses and systems
US863567430 déc. 201121 janv. 2014Symphony Advanced MediaSocial content monitoring platform methods
US863956717 mars 201128 janv. 2014Visa U.S.A. Inc.Systems and methods to identify differences in spending patterns
US865058730 déc. 201111 févr. 2014Symphony Advanced MediaMobile content tracking platform apparatuses and systems
US866752030 déc. 20114 mars 2014Symphony Advanced MediaMobile content tracking platform methods
US867663912 mai 201018 mars 2014Visa International Service AssociationSystem and method for promotion processing and authorization
US867668211 juin 200818 mars 2014Apple Inc.Method and a system for delivering messages
US873841817 mars 201127 mai 2014Visa U.S.A. Inc.Systems and methods to enhance search data with transaction based data
US874490630 août 20113 juin 2014Visa U.S.A. Inc.Systems and methods for targeted advertisement delivery
US878189628 juin 201115 juil. 2014Visa International Service AssociationSystems and methods to optimize media presentations
US878833710 juin 201322 juil. 2014Visa International Service AssociationSystems and methods to optimize media presentations
US879912328 avr. 20115 août 2014Apple Inc.Method and a system for delivering messages
US884339119 oct. 201123 sept. 2014Visa U.S.A. Inc.Systems and methods to match identifiers
US89357181 avr. 200813 janv. 2015Apple Inc.Advertising management method and system
US894934214 mars 20083 févr. 2015Apple Inc.Messaging system
US895500130 déc. 201110 févr. 2015Symphony Advanced MediaMobile remote media control platform apparatuses and methods
US897808630 déc. 201110 mars 2015Symphony Advanced MediaMedia content based advertising survey platform apparatuses and systems
US90318607 oct. 201012 mai 2015Visa U.S.A. Inc.Systems and methods to aggregate demand
US918543524 juin 201410 nov. 2015The Nielsen Company (Us), LlcMethods and apparatus to characterize households with media meter data
US923737730 déc. 201112 janv. 2016Symphony Advanced MediaMedia content synchronized advertising platform apparatuses and systems
US926476430 déc. 201116 févr. 2016Manish BhatiaMedia content based advertising survey platform methods
US927726510 févr. 20151 mars 2016The Nielsen Company (Us), LlcMethods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability
US932408825 févr. 201326 avr. 2016Visa International Service AssociationSystems and methods to provide messages in real-time with transaction processing
US93428353 août 201017 mai 2016Visa U.S.ASystems and methods to deliver targeted advertisements to audience
US943271312 févr. 201530 août 2016Symphony Advanced MediaMedia content synchronized advertising platform apparatuses and systems
US944325322 févr. 201313 sept. 2016Visa International Service AssociationSystems and methods to provide and adjust offers
US946607531 janv. 201311 oct. 2016Visa International Service AssociationSystems and methods to process referrals in offer campaigns
US947192625 avr. 201118 oct. 2016Visa U.S.A. Inc.Systems and methods to provide offers to travelers
US947796713 févr. 201325 oct. 2016Visa International Service AssociationSystems and methods to process an offer campaign based on ineligibility
US954463216 févr. 201610 janv. 2017The Nielsen Company (Us), LlcMethods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability
US95585023 nov. 201131 janv. 2017Visa International Service AssociationSystems and methods to reward user interactions
US957187411 déc. 201314 févr. 2017Symphony Advanced MediaSocial content monitoring platform apparatuses, methods and systems
US96792992 sept. 201113 juin 2017Visa International Service AssociationSystems and methods to provide real-time offers via a cooperative database
US969108520 avr. 201627 juin 2017Visa International Service AssociationSystems and methods of natural language processing and statistical analysis to identify matching categories
US969752021 mars 20114 juil. 2017Visa U.S.A. Inc.Merchant configured advertised incentives funded through statement credits
US97233462 déc. 20151 août 2017Symphony Advanced MediaMedia content synchronized advertising platform apparatuses and systems
US97609051 août 201112 sept. 2017Visa International Service AssociationSystems and methods to optimize media presentations using a camera
US977490022 nov. 201626 sept. 2017The Nielsen Company (Us), LlcMethods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability
US97990782 mai 201424 oct. 2017Visa U.S.A. Inc.Systems and methods to enhance search data with transaction based data
US980744228 juil. 201631 oct. 2017Symphony Advanced Media, Inc.Media content synchronized advertising platform apparatuses and systems
US20080082617 *1 août 20073 avr. 2008Cvon Innovations Ltd.Messaging system
US20080235341 *14 mars 200825 sept. 2008Cvon Innovations Ltd.Messaging system
US20080256235 *10 avr. 200816 oct. 2008Lim Or SimNetwork resource monitoring and measurement system and method
US20080312948 *11 juin 200818 déc. 2008Cvon Innovations LimitedMethod and a system for delivering messages
US20100251270 *24 mars 201030 sept. 2010Comscore, Inc.Selective Mobile Metering
US20110202408 *28 avr. 201118 août 2011Cvon Innovations Ltd.Method and a system for delivering messages
US20130006705 *22 sept. 20113 janv. 2013Bank Of AmericaSmall business intelligence tool
WO2011073568A114 déc. 201023 juin 2011France TelecomMeasure of activity between a client and a server site
Classifications
Classification aux États-Unis1/1, 707/999.01
Classification internationaleG06Q30/02, G06Q10/06, H04L29/08, G06F17/30
Classification coopérativeY10S707/99931, G06Q30/0236, G06Q30/0205, G06Q30/0204, G06Q30/0239, G06Q10/06375, G06Q30/02, G06Q30/0203, G06Q30/0277, H04L67/22, H04L69/329
Classification européenneG06Q30/02, G06Q30/0204, G06Q30/0277, G06Q30/0203, G06Q10/06375, G06Q30/0205, G06Q30/0239, G06Q30/0236, H04L29/08A7, H04L29/08N21
Événements juridiques
DateCodeÉvénementDescription
18 avr. 2007ASAssignment
Owner name: COMSCORE NETWORKS, INC., VIRGINIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ABRAHAM, MAGID;FULGONI, GIAN;MILLER, BRYAN;AND OTHERS;REEL/FRAME:019178/0040;SIGNING DATES FROM 20040401 TO 20040504