WO2001033431A1 - Verbal classification system for the efficient sending and receiving of information - Google Patents

Verbal classification system for the efficient sending and receiving of information Download PDF

Info

Publication number
WO2001033431A1
WO2001033431A1 PCT/US2000/029958 US0029958W WO0133431A1 WO 2001033431 A1 WO2001033431 A1 WO 2001033431A1 US 0029958 W US0029958 W US 0029958W WO 0133431 A1 WO0133431 A1 WO 0133431A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
web
user
role
internet
Prior art date
Application number
PCT/US2000/029958
Other languages
French (fr)
Inventor
Lisa Marie Wrench
Harry Kirke Wrench
Original Assignee
E-Clarity, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to IL14941400A priority Critical patent/IL149414A0/en
Priority to CA002388057A priority patent/CA2388057A1/en
Priority to BR0015473-3A priority patent/BR0015473A/en
Priority to EP00978302A priority patent/EP1228455A1/en
Priority to US10/129,408 priority patent/US7478035B1/en
Priority to KR1020027005676A priority patent/KR20020062299A/en
Priority to NZ518635A priority patent/NZ518635A/en
Priority to JP2001535854A priority patent/JP2003514282A/en
Application filed by E-Clarity, Inc. filed Critical E-Clarity, Inc.
Priority to MXPA02004473A priority patent/MXPA02004473A/en
Priority to AU15777/01A priority patent/AU783072B2/en
Publication of WO2001033431A1 publication Critical patent/WO2001033431A1/en
Priority to IS6365A priority patent/IS6365A/en
Priority to NO20022080A priority patent/NO20022080L/en
Priority to AU2006202288A priority patent/AU2006202288A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9538Presentation of query results

Definitions

  • the present invention relates to a system and method for sending and/or receiving information. More specifically, the present invention relates to a verbal (i.e., through words or symbols either written or spoken) classification system and method for the efficient sending and/or receiving of desired information.
  • a verbal i.e., through words or symbols either written or spoken
  • the Internet and more particularly the World Wide Web, is like a landscape expanding at a rapid rate, without a map of its terrain or any organization of the web-sites within that landscape.
  • This lack of infrastructure mapping and organization is a critical problem for both Internet users, who may be unable to access desired information, and web-site proprietors, who may be unable to provide information to a desired audience.
  • indices of the World Wide Web While some web-sites offer indices of the World Wide Web to assist Internet users in accessing desired information, these indices do not permit true granular search capabilities. These indices also do not provide a method for web-site proprietors to offer their web-sites directly to a target audience. These indices are also limited because their ability to track new Internet web-sites is constrained by the resources of the single web-site proprietor that maintains each index.
  • search engines may use search engines to locate specific web-sites, but search engines typically rely on over-inclusive, word-based queries that generate undesired results. Thus, Internet users that use search engines may be unable to find the web-site that they are interested in, and web-site proprietors that rely on search engines to attract Internet users must compete with both related and unrelated sites that may be included in search query results. Search engines are also disadvantageous in that they require the Internet user to deduce what keyword or keywords will generate a list of desired web-sites.
  • search engines use algorithms that do not connect subject matter with actions, they cannot aid Internet users who wish to locate information based on actions (e.g., "buying" a product rather than “getting information” about it) or modifiers (e.g., information about a subject limited to a specific time period, or to a specific geographic area), or web-sites that wish to receive targeted traffic based on the same criteria.
  • actions e.g., "buying” a product rather than “getting information” about it
  • modifiers e.g., information about a subject limited to a specific time period, or to a specific geographic area
  • spamming In addition to a lack of organization, another problem facing the Internet is that the Internet's user community is faceless and difficult to know. Because Internet users are essentially "invisible,” Internet marketers unable to identify a target audience may resort to a practice known as "spamming" in which electronic messages containing marketing information are sent indiscriminately to a large group of Internet users. Not only is spamming inefficient from the Internet marketer's point of view, as there is no way to be sure that electronic messages are reaching an interested audience, it is also highly frowned upon by the Internet's user community, who are forced to contend with the receipt of undesired "spam" messages.
  • web-site servers cannot present an Internet user with a custom web page or banner advertisement targeted to that user's interests until after the Internet user has accessed a server's web-site.
  • an Internet advertising system can only determine an Internet user's interests by tracking the Internet user's activity after accessing a web-site. This kind of tracking has generated concerns about Internet user privacy.
  • the present invention involves a novel approach to capturing human intention, and converting human communication into a uniform protocol that can be sent, received, associated with data or physical objects, used to index, store and retrieve information, or accomplish transactions in a uniform fashion.
  • This language can be used to perform automated transactions, communicate routing, process stages, or other complex human intentions.
  • This uniform language structure can be used to communicate details about a human being, a transaction, a living or inanimate object, or any data object or type. It can communicate what instructions the creator of the data wishes to be attached to that information or object, and used to communicate what rules and/or intentions are intended or acceptable on the part of the receiver.
  • the invention also includes ways for individuals to describe themselves and their possessions in a unique way, and create descriptions of segment aspects of themselves and/or their interest areas or possessions, into discrete functional portions to further aid description and organization of their tasks and associated data.
  • the invention makes it possible to communicate data, related state of mind, emotions, timeframe, intentions related to the data, and make complex requests that can be understood and acted upon by others or computer systems.
  • the language framework is limited only to the vocabulary set possible in any language, and built into the computer interfacing to it, the ability to describe oneself, one's data, one's possessions, one's intentions, is limited only to what a person using the language framework composing sentences is capable of creating, and the receiving/decoding person or computer or other device is capable of responding to.
  • the invention enables individuals to describe themselves, data and actions as response scenarios to potential requests from other individuals in the same language format as is possible on the part of the individual issuing a request.
  • transactions or processes can be conducted based on the criteria or preferences set by each individual, instead of being driven by the intentions of one side or the other..
  • the invention makes possible a new form of electronic language protocol that can be uniformly applied across cultures, spoken language sets, data types, and computer or other systems.
  • This uniform language structure can be used in conjunction with other indexes, organizational structures, etc. to more fully inform and empower the processing of transactions between 2 parties.
  • the invention makes possible the creation of new and more efficient methods for data routing, storage, retrieval, caching, optimization of storage systems, filtering, agent and permission systems, based on understanding data flow in terms of the language framework associated to it, and more precise understanding of the intention of the individual making said requests.
  • the invention makes it possible to analyze behavior and processes as they are related both to the data associated with those behaviors, and the stated intentions and self-descriptions of the individuals initiating those processes.
  • data, behavior, measurable factors, such as time, region can be analyzed and compared against all the associated variables contained within the invention's language framework and the inventions framework for describing and characterizing people and their possessions and activities.
  • the invention makes it possible for an individual to make a set of descriptions, rules and instructions, which can be interpreted by a computer and acted upon on behalf of the user.
  • These instructions can be associated with data, goods or services, and can perform as independent agents for the author.
  • These instructions can be associated with any type of object or data, associated with any aspect of the person, or other self-defined criteria.
  • the present invention provides a verbal classification system and method for the efficient sending and/or receiving of desired information.
  • a system in accordance with the invention includes a host server, a web-site server, and one or more user personal computers.
  • the system also includes software and one or more databases which provide a predefined hierarchy of "nouns", “verbs”, and “modifiers” that are used to send and/or receive desired information, thus allowing users, web-site proprietors, and other on-line retailers to communicate in an efficient manner.
  • the invention is advantageous in that it allows a user (e.g., an Internet user) to directly access desired web-sites without having to sort through undesired web-sites or determine the best keyword or keywords that will generate a list of desired web-sites.
  • a user e.g., an Internet user
  • Another benefit of the invention is that it permits web-site proprietors and Internet marketers to reach their intended audience more directly and cost-effectively.
  • the invention is also advantageous in that it permits an Internet user to receive only those messages that correspond to the Internet user's stated areas of interest while avoiding "spam" messages and other communications outside those areas
  • Another benefit of the invention is that it permits market research and demographics analysis based on an Internet user's stated interests as opposed to passive tracking of an Internet user's activity that may invade an Internet user's privacy
  • Yet another benefit of the invention is that it allows market research and demographics analysis based on a mass-sampling of information about Internet users, web-sites, and a comparison of Internet users' interests to the web-sites they visit.
  • FIGS 1A-1F are a depiction of a graphical user interface in accordance with the present invention.
  • FIG 2 is a flowchart depicting a method in accordance with the invention
  • FIG 3 is a block diagram showing a verbal classification system in accordance with the invention DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • FIGS. 1-3 where like reference numbers indicate like elements. Also, in the figures, the left-most digit of each reference number corresponds to the figure in which the reference number is first used.
  • the invention provides a verbal classification system and method for the efficient sending and/or receiving of desired information.
  • the sending and/or receiving of information occurs over the Internet.
  • the system and method of the invention can be practiced in any communication system in which information is sent and/or received, including various types of wireless, optical, or hybrid communication systems.
  • the invention can be practiced on home networks, wireless networks, control networks, corporate intranets, broadcast media, library science systems, or thin-client information retrieval systems in which devices such as cellular phones, personal digital assistants, palm-top computers or automotive on-board computers are used to retrieve information.
  • the invention can also be practiced in traditional document filing systems such as filing systems that use paper media, microfilm or microfiche systems.
  • a web-site proprietor, an Internet marketer and an Internet user of this preferred embodiment each provide a statement or set of statements that describes the information they are interested in sending or receiving. These statements are used to facilitate effective and efficient communication within the system.
  • the web-site proprietor provides a statement or set of statements about the content of his web-site.
  • the Internet marketer also provides a statement or set of statements about the content of the messages he wishes to distribute.
  • the Internet user in turn, provides a statement or set of statements about the web-sites he wishes to access or the messages the user wishes to send or receive.
  • Each statement is generated by selecting from a predetermined or predefined verbal hierarchy of "nouns,” “verbs,” and “modifiers.”
  • “nouns” are descriptors that describe subject matter areas
  • "verbs” are descriptors that describe activities relating to those subject matter areas
  • “modifiers” are descriptors that in some way delimit the scope of subject matter areas and activities.
  • the predefined verbal hierarchy of subjects is organized in a tree-like structure, in which each level of the tree is characterized by an increasing level of specificity.
  • the nouns, verbs and modifiers are comprised of a word or words from the English language.
  • nouns, verbs and modifiers can be comprised of any verbal information, including a word or words in a language other than English, codes, or any symbolic or graphical representations of a word or words or a thing or things. (Languages other than English, with a grammar structure different from English, can be cross-referenced to each other, much like a translator would do)
  • the Internet user is provided with the address of a desired web-site or with desired messages from an Internet marketer or another Internet user by matching the Internet user's statements with those of a website proprietor, Internet marketer or other' Internet user.
  • the invention allows an Internet user to directly access desired web-sites without having to use a search engine, which requires the Internet user to deduce what keyword or keywords will generate a list of desired web-sites and can also require the Internet user to sort through undesired web-sites.
  • the invention thus also allows web-site proprietors and Internet marketers to directly reach a target audience, and allows Internet marketers to do so without resorting to "spamming" (i.e., sending messages indiscriminately to a large group of Internet users). The avoidance of unwanted "spam” messages is also a benefit to the Internet user.
  • the invention allows individual web-site proprietors to describe the contents of their web-sites, it provides a decentralized method for indexing web-sites that is not constrained by the resources of a single web-site proprietor and that remains current with the growth of the Internet.
  • other information can be sent or received according to the invention, including electronic coupons, streaming audio and video, public service announcements, match results from newsgroups or private bulletin boards, and scheduling information regarding on-line forums and chat sessions, broadcast media programming, or community events.
  • the invention can be used to send or receive various types of messages (e.g., electronic messages), including community-based messages, political campaign messages, recall notices, "virtual community” or interest group messages, professional organization announcements, and regulatory announcements.
  • the invention can also be used to interface with other systems for classifying information including systems in which well-known codes or indices are used for classifying information.
  • existing universal price code systems in which products are identified by a unique price code can be improved upon by describing the same products according to a statement or set of statements selected from a predefined verbal hierarchy of nouns, verbs and modifiers.
  • the invention can thus allow mapping between the verbal classification system and the universal price code system.
  • GUI 100 is used by an Internet user to generate a statement or set of statements describing the type of information that the Internet user wishes to access by selecting from a predefined verbal hierarchy.
  • the statement or set of statements describing the type of information the Internet user wishes to access is called a "role”.
  • the Internet user can use GUI 100 to create one or more roles, which are then stored on the Internet user's personal computer (PC).
  • GUI 100 is a "point-and-click" interface, in which an input device (e.g., mouse) is used to direct a cursor to select or activate items on the monitor screen of the Internet user's PC.
  • GUI 100 depicts an initial appearance of GUI 100 as displayed to the Internet user.
  • GUI 100 includes a user name field ("User Name") 102, a role name field (“Role Name”) 104, a proficiency modifier field ("As a:”) 106, verb checklist ("Find Information About,” “Correspond About,” “Buy,” “Sell”) 108, a temporal modifier field ("For a period of:”) 110, a geographic modifier field ("Within the Region:”) 112, and a display area 114.
  • the display area 114 of GUI 100 is initially blank.
  • the Internet user begins by entering his or her user name. If the Internet user wishes to create a new user name, the user must enter a user name in user name field 102 and activate a "new" button adjacent to that field. If the Internet user already has a user name (because the user has previously created a role), the Internet user can activate a downward arrow button next to user name field 102 and select the user name from a drop-down menu of pre-existing user names.
  • the Internet user selects a role name. If the Internet user wishes to create a new role, he must enter a role name in role name field 104 and activate a "new" button adjacent to that field. If the Internet user wants to access a role that the user has already generated (because the user has previously created a role), the Internet user can activate a downward arrow button next to role name field 104 and select the role name from a drop-down menu of pre-existing role names. The pre-existing role data corresponding to that role name is then loaded into GUI 100.
  • FIGS. 1B-1F illustrate a particular example of a user's interaction with this preferred embodiment.
  • the Internet user has selected the user name "Joe” and the role name "dog lover.”
  • GUI 100 displays a portion of the predefined verbal hierarchy in display area 114. If the Internet user has selected a new role name, the noun or nouns at the highest level of the predefined verbal hierarchy will be displayed in display area 114. If the Internet user has selected a pre-existing role name, then the noun or nouns at the highest level of the predefined verbal hierarchy at which that role differs in any way from any other role stored on the Internet user's PC will be displayed in display area 114.
  • Each level in the predefined verbal hierarchy is comprised of one or more nouns, each of which describes a general subject matter area.
  • GUI 100 displays the noun "Living Creatures", which describes the general subject matter area of all living creatures, in display area 114.
  • Each noun in the predefined verbal hierarchy can be associated, in turn, with one or more nouns describing more specific subject matter areas within that general subject matter area GUI 100 displays these nouns as depending from the broader subject matter areas to which they are related. For example, as shown in FIG.
  • GUI 100 displays the more specific subject matter areas described by the nouns "Humans,” “Other Mammals,” “Reptiles” and “Fish'.' as depending from the noun “Living Creatures.”
  • Each of these dependent nouns can, in turn, be associated with one or more nouns describing even more specific subject matter areas within the predefined verbal hierarchy.
  • GUI 100 displays the nouns corresponding to the more specific subject matter areas. For example, as seen in FIG. 1C, when the Internet user selects the noun "Other Mammals," GUI 100 displays the more specific subject matter areas described by the nouns "Dogs,” “Cats,” “Horses” and “Bears” in display area 114. As seen in FIG. 1C, when the Internet user selects the noun "Other Mammals," GUI 100 displays the more specific subject matter areas described by the nouns "Dogs,” “Cats,” “Horses” and “Bears" in display area 114. As seen in FIG.
  • GUI 100 displays the more specific subject matter areas described by the nouns “Terriers,” “Spaniels,” “Retrievers” and “Hounds” in display area 114.
  • GUI 100 displays the more specific subject matter areas described by the nouns “English Cocker,” “American Cocker” and “Springer” spaniels in display area 114.
  • GUI 100 will not display any more nouns. For example, in reference to FIG. IF, because the subject matter area described by the noun "Springer" spaniel is not associated with any more specific subject matter areas within the predefined verbal hierarchy, when the Internet user selects the noun "Springer,” spaniel no additional nouns are displayed by GUI 100 in display area 114.
  • GUI 100 displays nouns corresponding to a previously selected level of the predefined verbal hierarchy on a smaller scale than nouns corresponding to currently selected levels, or does not display them at all.
  • GUI 100 displays the nouns corresponding to the previously selected level of subject matter areas "Terriers,” “Retrievers” and “Hounds” on a smaller scale than the nouns corresponding to currently selected levels of subject matter areas.
  • GUI 100 permits the Internet user to choose a single subject matter area by choosing a single noun, multiple subject matter areas by choosing multiple nouns, or entire branches of subject matter areas by choosing a single noun and all the nouns that depend from it.
  • the Internet user can undo choices he has made by activating the "Deselect" button 120 within display area 114.
  • the Internet user can also use GUI 100 to choose one or more verbs that describe an activity or activities in which the Internet user is interested. For example, as shown in FIG. IF, the Internet user can choose one or more verbs by checking any of the boxes in verb checklist 108.
  • GUI 100 can be implemented to provide any collection of verbs and to present the choice of verbs in a drop-down menu format as opposed to a checklist, or display a choice of verbs in display area 114 depending from selected nouns
  • the Internet user can also choose "modifiers" (proficiency, temporal, geographic) to further delimit or focus the scope of information that the user is interested in accessing
  • “modifiers” proficiency, temporal, geographic
  • the Internet user can choose from one or more of a variety of proficiency modifiers by activating a downward arrow button next to proficiency modifier field 106
  • the Internet user will then be presented with a drop-down menu of proficiency modifiers, such as "Amateur” or "Expert,” from which the Internet user can choose one or more proficiency modifiers
  • the Internet user has chosen the proficiency modifier "Amateur "
  • the Internet user can choose from one or more temporal modifiers by activating the downward arrow button next to temporal modifier field 110
  • the Internet user will then be presented with a drop-down menu of temporal modifiers, such as "A month,” “Six Months” or "A year,” from which the Internet user can choose one or more temporal modifiers
  • the Internet user has chosen the temporal modifier "A month "
  • FIG. IF depicts a "Dog Lover” role for Internet user "Joe” in which he is seeking to find information as an amateur about springer spaniels within the last month, not limited to any geographic area.
  • "Set and Finish” button 116 By activating "Set and Finish” button 116, the Internet user saves the "Dog Lover” role for user name "Joe”.
  • a small role data file corresponding to each role is stored, preferably in encrypted form, on the Internet user's PC. Because the role data is encrypted, it can only be read by corresponding decryption software. Well known encryption and decryption software and techniques can be practiced with the invention. Additionally, the role data does not contain any personal identification information about the Internet user, such as the Internet user's name, address, and e-mail address. Rather, in this preferred embodiment the Internet user is assigned an anonymous user identification (ID) number that is stored as part of the Internet user's role data. For reasons described more fully herein, the encryption of the role data and the use of an anonymous ID serves to protect the Internet user's privacy while interacting over the Internet. However, other embodiments of the invention can be practiced in communication systems other than the Internet in which privacy is not a concern (e.g., a corporate intranet). In these other embodiments, role data need not be encrypted and can contain personal identification information about the user.
  • FIG. 2 depicts a flowchart of a method in accordance with the invention.
  • a web-site proprietor, Internet marketer or Internet user accesses a host server over the Internet.
  • the web-site proprietor interacts with the host server to generate or update a statement or set of statements about the content of his web-site.
  • the Internet marketer or Internet user also interacts with the host server to generate or update a statement or set of statements about the content of a message they wish to send.
  • the host server presents the web-site proprietor, Internet marketer or Internet user with a GUI of the type described in reference to FIGS 1A-1F, above, to allow the web-site proprietor, Internet marketer or Internet user to navigate through the predefined verbal hierarchy and generate statements consisting of nouns, verbs and modifiers
  • the web-site proprietor also submits his web-site's address and the Internet marketer or Internet user also submits his message to the host server
  • the host server stores the statements along with their associated web-site address or message
  • an Internet user generates or updates a statement or set of statements about the information he wishes to access
  • this statement or set of statements is called a "role" and is comprised of nouns, verbs and modifiers selected by the Internet user from a predefined verbal hierarchy, as well as an anonymous user ID
  • the Internet user uses the user's PC and associated GUI described in reference to FIGS 1A-1F, above, to navigate through the predefined verbal hierarchy and generate statements including nouns, verbs and modifiers
  • the Internet user then activates a role that has been stored as an encrypted file on his PC
  • the Internet user transmits that encrypted role data to the host server
  • the Internet user also transmits to the host server his user "profile," which is the set of all existing role data for the Internet user stored on the Internet user's PC, as well as an encrypted file containing information about the Internet user's activity since the last time the Internet user accessed the host server This activity information includes those previously-downloaded web
  • the host server reads the encrypted role data associated with the currently activated role and compares the statement or set of statements in that role data with the statement or set of statements associated with each stored web-site address and message
  • the host server contains decryption software that enables it to decode the encrypted role data
  • the results are transmitted to the Internet user's PC More specifically, if the statement or set of statements for the currently activated role matches the statement or set of statements associated with any of the stored web-site addresses, then those web-site addresses will be transmitted to the Internet user's PC Similarly, if the statement or set of statements for the currently activated role matches the statement or set of statements associated with any of the stored messages, then those messages will be transmitted to the Internet user's PC.
  • the user can designate the extent to which statements must be identical to be considered a match, and this matching criteria can be transmitted to the host server along with the user's role, profile and activity data in step 212.
  • the Internet user's PC When the Internet user's PC receives the matching web-site addresses and messages, the Internet user's PC stores the web-site addresses and messages.
  • the matching web-site addresses and messages are stored in files that correspond to the active role that they are associated with.
  • the Internet user can define alternative methods for filing the matching web-site addresses and messages on his PC.
  • the Internet user's PC presents the Internet user with an index of web-site addresses corresponding to the currently active role organized by noun, verb and modifier.
  • the Internet user can sort and prioritize the web-site addresses.
  • the Internet user can sort and prioritize the web-site addresses according to a variety of criteria, including the Internet user's preference, the exactness of the match between the Internet user's role and the statements associated with the web-site address, or the popularity of the web-site as rated by all users of the inventive system.
  • Information can also be sorted by noun, verb, or other modifier or any nested combination which the User desires.
  • the Internet user can also delete web-site addresses, hide web-site addresses (i.e., remove the web-site address from the index but not delete it), or annotate web-site addresses by typing comments next to the web-site address in the index.
  • the Internet user can also flag a web-site address to receive alerts when changes occur related to the web-site corresponding to that address, e.g., to receive an alert when the content of the web-site changes. These alerts can be downloaded from the host server along with the match results in step 218.
  • the Internet user can decide either to access a web-site corresponding to a downloaded web-site address or view downloaded messages corresponding to the currently active role. If the Internet user chooses to view downloaded messages, as shown in step 226, then the Internet user's PC will display the messages to the Internet user at step 228. The messages are displayed organized by noun, verb and modifier. The Internet user can select a specific message or group of messages for viewing and can reply to a message or group of messages. The Internet user can sort and prioritize messages according to a variety of criteria, including the Internet user's preference, the exactness of the match between the Internet user's role and the statements associated with the message, the date and time of the message, or whether the message is commercial or non-commercial.
  • the Internet user can also delete messages, hide messages (i.e., remove the message from view but not delete it); of mark messages or groups of messages as read, unread or in need of a reply. While viewing a downloaded message, the Internet user can elect to block any future messages from the source of that message. After viewing his messages, the Internet user can either log off as shown in step 230, return to step 208 create or update a new role, or activate a pre-existing role at step 210 and begin the process over again.
  • hide messages i.e., remove the message from view but not delete it
  • mark messages or groups of messages as read, unread or in need of a reply.
  • the Internet user can elect to block any future messages from the source of that message. After viewing his messages, the Internet user can either log off as shown in step 230, return to step 208 create or update a new role, or activate a pre-existing role at step 210 and begin the process over again.
  • the Internet user can also select a web-site address from the index of web-site addresses by clicking on an address at step 232.
  • the Internet user selects a website address, the Internet user is then permitted to activate any one of his pre-existing roles or any combination of his pre-existing roles, which will then in effect define the Internet user's persona when interacting on the Internet. If the Internet user does not choose a role or combination of roles, then his default role will be the role used to download the web-site address.
  • the Internet user's PC then launches the user's Internet browser to access the web-site addressed by the selected web-site address, as shown in step 236.
  • the Internet user's PC will also transmit the data file or files associated with the currently activated role or roles to the web-site's server as well as the role that was used to download the web-site address.
  • the web-site's server receives the encrypted role data, it reads the role data using decryption software and then matches web-site content to the statement or set of statements contained in that role data, as shown at step 240.
  • Custom content is then downloaded to the Internet user's PC at step 242.
  • the invention allows the web site's server to present custom content to the Internet user without having to track the Internet user's activity in a manner that can invade the Internet user's privacy.
  • the Internet user's privacy is also protected because the role data is encrypted and does not contain any personal identification information about the Internet user.
  • the Internet user can either log off as shown in step 244, choose another web-site address from the index of web-site addresses at step 232, return to step 208 and create or update a new role, or activate an existing role at step 210 and begin the process over again.
  • an e-coupon provider provides a host server with an electronic coupon and a statement or set of statements describing the electronic coupons he wishes to distribute according to a predefined verbal hierarchy of nouns verbs and modifiers.
  • the Internet user defines a role according to the same predefined hierarchy in which the Internet user specifies whether or not he wishes to receive e-coupons related to his role and provides that role to the host server.
  • the host server then provides the e-coupon to the Internet user if the Internet user has specified that he wishes to receives e-coupons related to his role and his role matches the statement or set of statements describing the electronic coupon.
  • the above-described method is used to send and receive schedule information for real-time scheduled broadcasts or events, such as television or radio broadcasts, web-casts, chat room events, sporting events, lectures, plays, concerts or classes.
  • the Internet user defines a role in which he specifies a broadcast or event he would like information about by specifying certain criteria, including the broadcast medium, the participants (e.g., actor, director, performer, team, etc.), the subject matter, location, time and date.
  • the host server then provides the scheduling information to the Internet user if the information about the broadcast or event matches the criteria in the Internet user's role.
  • the method described above is used to send and receive a list of currently active Internet chat rooms to an Internet user.
  • the host server maintains a list of links to currently active chat rooms covering certain subject matter areas.
  • the Internet user defines a role according to the predefined verbal hierarchy in which the Internet user specifies whether or not he would like to receive a list of currently active Internet chat rooms related to his role and provides that role to the host server.
  • the host server then provides the Internet user with a link to any currently active chat room that concerns subject matter related to the Internet user's role.
  • the Internet user may then participate in the currently active chat room by selecting a link.
  • the Internet user may also start his own chat room corresponding to his role and post a link to that chat room on the host server for distribution to other Internet users
  • the user's role information can be used to help community lists, newsgroups, user groups, forums, and other community building functions, both on-line and off-line, which match the statements within the User's role information.
  • FIG. 3 is a block diagram that depicts a system 300 according to a preferred embodiment of the invention.
  • System 300 includes a user personal computer (PC) 302, a web-site server 304, an Internet marketer PC 306, and a host server 308.
  • User PC 302 can communicate with web- site server 304 and can transmit and receive information to and from web-site server 304
  • User PC 302 can also engage in communication with host server 308 and can transmit and receive information to and from host server 308
  • Web-site server 304 can also communicate with host server 308 and can transmit and receive information to and from host server 308
  • Internet marketer PC 306 is for communicating with host server 308 and can transmit and receive information to and from host server 308
  • all communications are transmitted electronically over the Internet using hard-wired connections with well-known interfaces and protocols as will be appreciated by one of ordinary skill in the art
  • the invention can be practiced with a plurality of user PCs 302, web-site servers 304, Internet marketer PCs 306, and host servers 308
  • system 300 also includes several software components to facilitate the features of the invention
  • user Internet browser 310 and client software 312 reside on user PC 302
  • Client software 312 provides the role generation and update features discussed above
  • Web-site proprietor Internet browser 314 and web-site reader software 316 reside on web-site server 304
  • Internet marketer Internet browser 318 resides on Internet marketer PC 306
  • Host engine 320 and demographics analyzer 322 reside on database server 308
  • Each of these software components are comprised of commercially available computer programs which are compatible with commercially available hardware (e g , Intel-based computers and servers) and operating systems (e g , Windows, Unix, and MAC)
  • client software 312 is downloaded from host server 308 for installation on user PC 302
  • web-site reader software 316 is downloaded from host server 308 for installation on web-site server 304
  • host server 308 also stores web-site database 324 and message database 326
  • Databases 324 and 326 are object-oriented databases for storing information according to a predefined verbal hierarchy of nouns, verbs and modifiers
  • client software 312 also contains an object-oriented database for storing information according to the same predefined verbal hierarchy of nouns, verbs and modifiers
  • client software 312 resides on host server 308 and is accessible to an Internet user via the Internet
  • databases 324 and 326 and the database in client software 312 are object-o ⁇ ented databases, these databases can be implemented with various types of databases known in the art, including relational databases, flat-file databases, or inverted-list databases
  • a web-site proprietor uses web-site Internet browser 314 resident on web-site server 304 to interact with host server 308 to generate or update a statement or set of statements about the content of his web-site.
  • this statement or set of statements includes nouns, verbs and modifiers selected from the same predefined verbal hierarchy.
  • web-site Internet browser resides on a PC separate from web-site server 304 which can be used by the web-site proprietor to interact with host server and generate or update a statement or set of statements about the content of his web-site. The web-site proprietor then transmits this descriptive data along with the address of his web-site to host server 308 as registration data 330. In operation, when host server 308 receives registration data 330, host engine 320 stores registration data 330 in web-site database 324.
  • An Internet marketer uses Internet marketer Internet browser 318 resident on Internet marketer PC 306 to interact with host server 308 to generate or update a statement or set of statements about the content of a message he wishes to send. As discussed above, this statement or set of statements includes nouns, verbs and modifiers selected from the same predefined verbal hierarchy. The Internet marketer then transmits this statement or set of statements along with his message to host server 308 as marketing data 332. In operation, when host server 308 receives marketing data 332, host engine 320 stores marketing data 332 in message database 326.
  • An Internet user can use user Internet browser 310 resident on user PC 302 to interact with host server 308 to generate or update a statement or set of statements about the content of a message he wishes to send. As discussed above, this statement or set of statements includes nouns, verbs and modifiers selected from the same predefined verbal hierarchy. The Internet user then transmits this statement or set of statements along with his message to host server 308 as user message data 336. In operation, when host server 308 receives user message data 336, host engine 320 stores user message data 336 in message database 326.
  • information other than web-site addresses and messages can be sent to host server 308 by web-site proprietors, Internet marketers, Internet users and others.
  • This information includes but is not limited to electronic coupons, streaming audio and video, public service announcements, match results from newsgroups or private bulletin boards, and scheduling information regarding on-line forums and chat sessions, broadcast media programming, or community events.
  • An Internet user uses client software 312 resident on user PC 302 to generate or update a role as described in reference to FIGS. 1A-1E above.
  • the Internet user then uses client software 312 to transmit encrypted role/profile and activity data 334 to host server 308.
  • Role/profile and activity data 334 is comprised of the Internet user's currently activated role, the Internet user's profile, which is the set of all existing role data for an Internet user stored on user PC 302, and any previous activity information concerning web-site addresses or e-mail messages previously downloaded from the host server corresponding to the currently active role.
  • host engine 320 reads that data using decryption software and sends a copy of it to demographics analyzer 322.
  • host engine 320 When host server 308 receives role/profile and activity data 334, host engine 320 also matches the Internet user's currently active role data with registration data 330 stored in web-site database 324 by comparing the statement or set of statements in the Internet user's role data with the statement or set of statements in registration data 330. If the statements match, then host engine 320 transmits the web-site addresses in registration data 330 to user PC 302 as part of match results 338. Similarly, when host server 308 receives role/profile and activity data 334, host engine 320 matches the Internet user's currently active role data with marketing data 332 stored in message database 326 by comparing the statement or set of statements in the Internet user's role data with the statement or set of statements in marketing data 332.
  • host engine 320 transmits the messages in marketing data 332 to user PC 302 as part of match results 338.
  • host server 308 receives role/profile and activity data 334
  • host engine 320 matches the Internet user's currently active role data with user message data 336 stored in message database 326 by comparing the statement or set of statements in the Internet user's role data with the statement or set of statements in user message data 336. If the statements match, then host engine 320 transmits the messages in user message data 336 to user PC 302 as part of match results 338.
  • client software 312 stores the match results.
  • the match results are stored in a database in client software 312.
  • the match results are not stored on user PC 302 at all, but instead are stored on a database on host server 308 and accessed remotely by the Internet user.
  • the Internet user can use client software 312 to read the content of the messages in match results 338. Because the Internet user has been provided with only those messages that correspond to the Internet user's interests, as defined in the Internet user's role, the invention permits the Internet user to avoid "spam” messages and other communications outside those interests. The invention thus also permits the Internet marketer to efficiently reach an audience that is interested in its marketing information without resorting to "spam” messages .
  • the Internet user can also use client software 312 in conjunction with user Internet browser 310 to access web-sites corresponding to the web-site addresses in match results 338.
  • client software 312 uses client software 312 to launch user Internet browser 310 and access web-site server 304 addressed by a web-site address in web-site match results 338.
  • client software 312 accesses web-site server 304 via user Internet browser 310, it also transmits encrypted role data 340 to web-site server 304.
  • Role data 340 includes one or more roles chosen by the Internet user that will define the Internet user's persona when interacting with web-site server 304 and includes the role that was used by the Internet user to obtain the web-site address for web-site server 304 from host server 308.
  • Web-site server 304 contains web-site internals 328, which includes a web-site engine and web-site content.
  • web-site reader software 316 reads role data 340 using decryption routines and passes it to the web-site engine, which then matches custom web-site content to the statement or set of statements in role data 340.
  • custom web-site content is then transmitted to user PC 304 as custom content 342.
  • the invention thus permits web site server 304 to present custom content to the Internet user without having to track the Internet user's activity in a manner that may invade the Internet user's privacy.
  • the Internet user's privacy is also protected because role data 340 is encrypted and does not contain any personal identification information about the Internet user, but instead contains an anonymous user ID number associated with client software 312.
  • the Internet user can further interact with web-site server 304 via client software 312 and user Internet browser 310.
  • web-site server 304 When web-site server 304 receives role data 340 from user PC 302, reader software 31 stores that role data in a data log on web-site server 304. Accumulated role data 344 is then transmitted to demographics analyzer 322 on host server 308. Demographics analyzer 322 uses accumulated role data 344, registration data 330 stored in web-site database 324 and role/profile and activity data 334 to calculate demographics data 346. Demographics data 346 can include accumulated information about Internet users, web-sites, as well as a comparison of Internet users' interests to the web-sites they visit.
  • demographics analyzer 322 can make individual distinctions about Internet users. For example, demographics analyzer 322 can analyze the total set of nouns, verbs and modifiers in the statement or set of statements of an Internet user's profile to determine an Internet user's affinity towards a particular subject matter area further defined by what types of actions they wish to perform in relation to those subject matter areas and again limited by the modifiers they select. Because an Internet user's profile and role data can change each time the Internet user accesses host server 308, demographics analyzer 322 can also track an Internet user's changing interests over time.
  • demographics analyzer 322 can track how a group of Internet users' demands change over time in order to forecast supply issues. Demographics analyzer 322 can also determine how many separate roles correspond to a single Internet user and how often the Internet user accesses the Internet in any given role as opposed to the Internet user's other roles. Demographics analyzer 322 can also use the Internet user's activity data to determine where and when an Internet user has interacted using a particular role or roles. A benefit of the invention is that demographics analyzer 322 does not need to track an Internet user's activity on the Internet to perform this analysis
  • demographics analyzer 322 can derive useful information about web-site server 304. For example, demographics analyzer 322 can determine the active role or roles of every Internet user who accessed web-site server 304, and which nouns, verbs or modifiers led Internet users to access web-site server 304. Demographics analyzer 322 can calculate the distribution of Internet users visiting web-site server 304 according to the nouns, verbs and modifiers in each Internet user's role data. Thus, demographics analyzer 322 can determine what subject matter areas and activities Internet users who visit web-site server 304 are most interested in at the time they visit
  • Demographics analyzer 322 can also use registration data 330 stored in web-site database 324 to provide market research analysis by determining what types of products and services are available on the Internet. Demographics analyzer 322 can also use registration data 330 to perform trend analysis regarding the expansion or contraction of web-based business activity. Demographics analyzer 322 can also use information from many participating web-servers to aggregate information which relates to a particular subject or industry area in aggregate across the web. Also, demographics analyzer 322 can be used to analyze information from this system and correlate it to other systems, like the CPI (Consumer Price Index), inflation, certain stocks, or any other trackable variable). The demographics analyzer can analyze, in a multiplicity of ways, the user's self-reported information against the activity information against the behaviorally collected information, against the site/Internet information, and linked to any other outside information believed to correlate to any of these system-derived information sources.
  • CPI Consumer Price Index
  • the demographics analyzer can analyze, in a multiplicity of ways, the user's self-reported information
  • Demographics data 346 can be transmitted to web-site server 304 or communicated to demographics analysis customers 348.
  • a host administers the system described above with reference to FIG. 3.
  • the host provides and maintains host server 308, including host engine 320, demographics analyzer 322, web-site database 324 and message database 326.
  • the host also provides an on-line interface on host server 308 which a web-site proprietor can use to generate and provide registration data 330, an Internet marketer can use to generate and provide marketing data 332, and an Internet user can use to generate and provide user message data 336.
  • the online interface receives and processes a payment from an Internet marketer in exchange for posting the message in marketing data 332.
  • the on-line interface can receive and process a different fee for various types of messages, e.g., commercial, non-commercial, or non-profit.
  • the online interface receives and processes a payment for posting other types of information, such as e-coupons and schedule information for real-time scheduled broadcasts or events.
  • the host can allow advertisers to sponsor the download to the Internet user of web-site addresses and messages. More specifically, in exchange for a fee, the host can post an advertisement in a dialog box that appears on user PC 302 at the time the Internet user is downloading match results 338 from host server 308.
  • the host can present advertisements with subject matter that is related to the Internet user's active role so that the advertiser may more efficiently reach an audience interested in his product or services and so that the Internet user receives advertisements targeted at the Internet user's stated areas of interest.
  • the host can also allow advertisers to sponsor parts of the predefined verbal hierarchy. In exchange for a fee, the host can place an advertisement in the background of the GUI that web-site proprietors, Internet marketers and Internet users use to generate or update a statement or set of statements about their web-site or message and that the Internet user uses to generate a role.
  • the host can present advertisements with subject matter that is related to the portion of the predefined verbal hierarchy in which the web-site proprietor, Internet marketer or Internet user is currently navigating, so that the advertiser may more efficiently reach a target audience interested in his product or services and so that the Internet user receives advertisements targeted at the Internet users stated areas of interest.
  • the host checks whether or not the statement or set of statements in registration data 330 accurately reflects the web-site that it describes, and rejects registration data 330 if it does not.
  • the host also checks whether or not the statement or set of statements in marketing data 332 accurately reflects the message that it describes, and rejects marketing data 332 if it does not.
  • the host checks the statement or set of statements in user message data 336 to see if it accurately reflects the message that it describes, and rejects user message data 336 if it does not.
  • the host provides an on-line interface on host server 308 that a web-site proprietor can use to purchase and download web-site reader software 316.
  • the host also provides an on-line interface on host server 308 that Internet users use to download client software 312.
  • the host provides for the distribution of web-site reader software 316 and client software 312 through the mail or through retail stores.
  • the host provides an on-line interface on host server 308 that an Internet user, web-site proprietor or Internet marketer can use to identify new nouns, verbs or modifiers that they would like to see added to the predefined verbal hierarchy.
  • the host is capable of modifying the predefined verbal hierarchy to include these new nouns, verbs or modifiers.
  • the host provides an on-line interface on host server 308 that web-site proprietors and demographics analysis customers 348 can use to purchase demographics data produced by demographics analyzer 322.
  • the host can organize this data into standard reports, such as standard reports regarding user profiles and activity or web-site registration data, newsletters, or generate ad hoc reports tailored to the needs of a web-site proprietor or demographics analysis customer 348.
  • the on-line interface on host server 308 permits web-site proprietors and demographics analysis customers 348 to define the informational content of the reports they want to receive.
  • Reported demographics data may be based on Internet users' profile information or individual role information, on total activity across all web-sites or to a specific web-site.
  • demographics data 346 can be downloaded by web-site proprietors or demographics analysis customers 348 over the Internet.
  • teachings of the invention are applicable in many different applications.
  • the invention can be used with a stand-alone database wherein items of information are classified and stored according to a statement or set of statements selected from the same predefined verbal hierarchy of nouns, verbs and modifiers.
  • each item of information and associated statement or statements is stored and accessed as a unique object.
  • the invention provides a single ID# which is not tied to the name, address, SS# or any other personally identifying information in the "real world" about an individual, and can be used as the unifying "Record ID” to characterize that a set of information aggregated about an "electronic individual" actually belongs to a single anonymous entity.
  • Identities and Roles are related in that a "set” or “Identity” can consist of subsets or “roles”.
  • Businesses can create multiple roles within their corporate identity in same fashion when using the system, i.e., a. Purchasing department (Role of Smith Inc.) has 3 subroles for each of the purchasing agents.
  • a company can identify that its data belongs to a particular "aspect” or “functional role” (i.e., that a particular piece of content or ad is part of its customer service department's collateral) In this way, companies can be segmented in their ad campaigns, personalization information, and historical data analysis, in the same or similar fashion as an internet user can be. 7) Data analysis can be performed on data as segmented into roles, by subject criteria, or any other variable.
  • LBP Language Based Protocol
  • the LBP structure verbal classification system and personality/role/identity mapping system
  • this information can be hooked to inform selections like: Author, director, genre, performer, actor, year, award, etc. references, to create search, storage and retrieval indexes on entertainment choices.
  • the analysis of information against this subject matter can provide information regarding popularity, behavior and choices of intention in entertainment, or the relationship between stated intention, behavior and the LBP framework or other variables correlated to it.
  • the LBP can also specify "content type” (i.e., streaming audio, visual, etc.) and can filter based on: a Content type b. Date c. Units of measure d Price e. UPC code f. Who is the "owner” or "originator" of that information or transaction is, i.e., that only information originating from a specified source described in similar LBP statement fashion, or described by any outside variable (such as license, certification, permit to transact legally, etc.) should be interacted with. g. Any other variable, such as catalogue number, etc.
  • Statements can be leveled in priority, and/or make operational in a group: (i.e., an instruction set: for example: a. First, "buy wine in California” b. Second "show information about travel in California” OR
  • Statements can be associated with a variable like % or a range, or a time limit, e.g., "buy wine in California” with a range of price between 3 and 5 per unit.
  • a “role” can be a segmentator that could create different roles based on delivery devices, parts of a person's personality, their mood, or any other factor that can be segmented by using the language system.
  • a role could be the living room of one's home, a time of day, a mood, an activity or hobby, etc. or anything else that is simply the result of what the statements and related preferences identified and grouped into a set called a Role call out expressly.
  • type statements can be constructed using the language to create ' executable instructions for computers.
  • the Language Based Protocol described herein can be used as a uniform "scripting language" to enable a human being to perform any task on their behalf using a computer system which can translate the "scripting language” and act upon it. It will also be appreciated that these instructions can be housed anywhere within the computer system, and can operate independently as agents for the author of them. For instance, instructions could be set or stored inside the profile of one's bank account, one's home wiring system, one's car, one's office, computer, cellphone, etc.
  • Sara has a "gourmet food” role and uses a “country gingham style icon or picture to symbolize that on her PC.
  • the invention thus "knows” that her “taste” in the subjects contained within that role have a “country gingham” look and feel, because Sara could choose from different styles.
  • the invention in a B2C internet environment can track user behavior because it is capable of being implemented for proxying user traffic or uploading historical information about user behavior, but does not violate user privacy because it does not keep records of ISP logins, name, SS#, etc. at the administrative level and history records
  • the invention can then pass Consumer to a trusted Secure Source for Credit Card Authorization, and then return with Consumer's authorization, but without having gathered User's name
  • the invention can give Business an 1D# that says that "Anonymous person paying with Credit Card” purchased this item in your catalogue, on this date, and the Serial # is 1234, etc. This information is held in “escrow” for warranty, etc. purposes where identity is legally necessary.
  • Age verification or other Authentication tied to the anonymous Identity a.
  • the invention can determine to "Internet standards" whether a person is "authentic” to conduct a transaction (use a credit card, has sufficient funds, etc, watch adult content on the net, etc.). The invention can then take an authentication key from that third party source and verify that the setting up of an account for an anonymous individual should be done for them as: a. An adult b. A citizen c. Capable of doing a financial transaction d. Other qualifying factor, such as driver's license #, thumbprint, etc, licensed or legally able to conduct a particular transaction.
  • This information can then be used to: allow this person access to content and types of actions possible within the system.
  • Conduct testing by a third party source and store testing information associated with the profile information, or other system information, as part of the verification- based transaction system
  • a User and/or Business can request to "send” messaging to other members of the invention system's population. "Sending” really entails specifying in the LBP language that a particular group is intended to receive this type of content.
  • the invention can be configured to invite that User to immediately get in touch with that entity and let them know why. This is a powerful customer relationship management feedback loop for businesses.
  • the invention can thus provide "real time" feedback to businesses about:
  • a User can be entered into a subject category "sweepstakes" on the subject area of the system "Map” each time they visit a particular subject area, or meet some other defined criteria selected by the sponsoring business holding the sweepstakes.
  • An anonymous "ticket” is recorded to that "anonymous individual”. If that ticket is selected, a notification appears to that individual that they've won the sweepstakes, and that authenticated email has a verification code and authorization process to validate that the message is going to the right individual.
  • Sweepstakes "extra chances” can be tied to business agendas of :
  • Language Based Protocol is able to be displayed or presented to the User or Business in visual "type” or “sounds” or “pictures” or any other symbolic set, children, adults, etc. can determine which "symbol dictionary” they wish to use, and these can be cross- referenced to each other.
  • Automated systems of any kind can be made to interact with the classification including transaction processing, marketplaces, recall or alert systems, biomedical applications.
  • Transaction processing - an amount of $ can be identified as associated with a statement, and transactable when the appropriate conditions within the statement are met.
  • Marketplaces - physical goods and the rules for their exchange can be implemented with Statements.
  • manufacturing resource planning, commodities trading, etc. could be linked to the information gathered within the demographics system.
  • projected anticipated buying self-reports buy wine in California in 2 months
  • Trends analysis, etc. could be conducted based on this information and its correlation to things such as the CPI, GNP, etc.
  • Recall or alert systems - Profiles or ownership of consumer goods, Profession, prescription drug profile, physical fitness, personality, or other characteristics could be created, wherein a person could be notified through the inventive messaging system if they fit a particular profile pattern - i.e., taking a combination of medicines which were now known to be high risk in combination, a manufacturer or supplier could issue an alert to that population that their profile, if accurate, might put them in a risk population.
  • alert information based on profile allow for notification of individuals it could also be used in research as indicated within the characteristics of the Demographics Analysis system. For instance, information could be gathered that individuals who state themselves to be very physically active do not take combination XYZ of health remedies as often as members of a demographic group with a less physically active self-reported profile.
  • Another example would be the ability to state a professional profile, and the ability to be contacted with alerts regarding legislation, new products, employment offers, etc. relative to that profile. Analysis of this information as well would be useful.
  • Biomedical applications for instance, a person can wear a device which stores and records via speech recognition the statements which a person describes about their daily actions, moods, etc. and the times of day. This data can be compared with data collected via biomedical equipment - heartrate, blood chemistry, respiration, Galvanic Skin Response, etc. for later analysis. It can also be combined with or used in conjunction with devices which could be considered daig or treatment delivery devices - i.e., electronic stimulation devices, controlled delivery/release devices for drugs, etc. where these devices could use information from the person and outside conditions (day time etc.) to affect dosages, treatment, etc. decisions and conditions.
  • Clinical trial groups where a device which can record a person's mood, activities, etc. as self- described using the system's language, while being monitored for body chemistry, drug levels, etc.
  • a device which captures the Individual's self- reported statements (i.e., I feel 75% pain free) via the LBP verbal structure, which can be made about what the individual thinks, feels, or believes is happening objectively around them (i.e., it's a hot and humid day) or (I am now being exposed to an allergen) and may or may not be able to monitor outside circumstances (i.e., weather barometrics, temperature) and monitor internal information of that person (heart rate, pulse, Galvanic Skin response, blood chemistry, EEG of other physically measurable state), and use the combination of this information to make decisions (in real time or on a periodic basis) about dosage of mediation, level of stimulation needed etc.
  • a person's self-report would be "digitally collected" by the inventive system and used as a component in research and treatment.
  • Speech-Control and Computer Input Control of Automated or Robotic Systems Use of the LBP language structure and Role-based segmentation could be implemented to control external conditions in buildings, or to animate robotic systems. Two such instances would be the ability to program the condition and state of one's home or office or automobile via the language system ("Temperature Increase 4:00 PM until 6:00 PM to 72 degrees, Kitchen only") and the ability of systems to respond to the desires of people who were unable to use other controls (i.e., Milk Bring Bed Now) such as the infirm, elderly, paralyzed, etc.
  • Networking hardware could read statements and route data based on the data tags.
  • Computer and other resources could be automatically allocated to a person based on their Role, a statement, or their entire profile. Optimization , storage, presentation, schemes could be constructed which were informed by the information contained in the Role, statement or behavioral data, or outside factors (time of day, geographic region) or any combination of these.
  • Data access permissions and check-offs or authentication could be tied to identities, Roles, or subject area statements within a particular role (e.g., a particular subject area of data could be identified as accessible only to individuals with a particular role characteristic (VP of marketing) or permission level/ID, etc.).

Abstract

A verbal classification system and method for the efficient sending and receiving of desired information is described. Web-site proprietors (314) and Internet marketers provide a host server (320) with descriptive data about their web-sites and messages (336) according to a predefined verbal hierarchy of nouns, verbs and modifiers. An Internet user creates a role or roles (340) that describes desired information according to the same predefined verbal hierarchy of nouns, verbs, and modifiers and transmits that role (340) to the host server (320), provides the Internet user with desired web-site addresses (336) and message by matching the role (338) to web-site and message descriptive data (336). The Internet user may access a web-site using one or more roles (340) and the web-site may provide the user with custom content by matching content (338) to the Internet user's role and roles (340). The host server (320) collects role information (340) from Internet users and web-sites to generate marketing and demographics data (346) about Internet users and web-sites (328). Internet user privacy is protected because role data (340) is encrypted and contains no personal identification information (348).

Description

VERBAL CLASSIFICATION SYSTEM FOR THE EFFICIENT SENDING AND RECEIVING OF INFORMATION
BACKGROUND OF THE INVENTION
1. Cross-Related Applications
This application takes priority from Provision Application Serial No. 60/163,078 filed November 2, 1999.
2. Field of the Invention
The present invention relates to a system and method for sending and/or receiving information. More specifically, the present invention relates to a verbal (i.e., through words or symbols either written or spoken) classification system and method for the efficient sending and/or receiving of desired information.
3. Discussion of the Background
The Internet, and more particularly the World Wide Web, is like a landscape expanding at a rapid rate, without a map of its terrain or any organization of the web-sites within that landscape. This lack of infrastructure mapping and organization is a critical problem for both Internet users, who may be unable to access desired information, and web-site proprietors, who may be unable to provide information to a desired audience.
While some web-sites offer indices of the World Wide Web to assist Internet users in accessing desired information, these indices do not permit true granular search capabilities. These indices also do not provide a method for web-site proprietors to offer their web-sites directly to a target audience. These indices are also limited because their ability to track new Internet web-sites is constrained by the resources of the single web-site proprietor that maintains each index.
Internet users may use search engines to locate specific web-sites, but search engines typically rely on over-inclusive, word-based queries that generate undesired results. Thus, Internet users that use search engines may be unable to find the web-site that they are interested in, and web-site proprietors that rely on search engines to attract Internet users must compete with both related and unrelated sites that may be included in search query results. Search engines are also disadvantageous in that they require the Internet user to deduce what keyword or keywords will generate a list of desired web-sites. Finally, because search engines use algorithms that do not connect subject matter with actions, they cannot aid Internet users who wish to locate information based on actions (e.g., "buying" a product rather than "getting information" about it) or modifiers (e.g., information about a subject limited to a specific time period, or to a specific geographic area), or web-sites that wish to receive targeted traffic based on the same criteria.
In addition to a lack of organization, another problem facing the Internet is that the Internet's user community is faceless and difficult to know. Because Internet users are essentially "invisible," Internet marketers unable to identify a target audience may resort to a practice known as "spamming" in which electronic messages containing marketing information are sent indiscriminately to a large group of Internet users. Not only is spamming inefficient from the Internet marketer's point of view, as there is no way to be sure that electronic messages are reaching an interested audience, it is also highly frowned upon by the Internet's user community, who are forced to contend with the receipt of undesired "spam" messages.
Furthermore, because Internet users are "invisible," web-site servers cannot present an Internet user with a custom web page or banner advertisement targeted to that user's interests until after the Internet user has accessed a server's web-site. This is because an Internet advertising system can only determine an Internet user's interests by tracking the Internet user's activity after accessing a web-site. This kind of tracking has generated concerns about Internet user privacy.
Finally, because Internet users are "invisible," market research based on server statistics, cookie tracking and the like, is also limited to tracking usage passively, after a user has arrived at a web-site. Market research on Web behavior and demographics today is also limited in that it uses a segment of the Web via a relatively small sampling. No existing market research services can provide a mass sampling of information about Internet users, web-sites, or can compare or contrast information about Internet users' interests to information about the web-sites they visit.
SUMMARY OF THE INVENTION
As communication involves language, the present invention involves a novel approach to capturing human intention, and converting human communication into a uniform protocol that can be sent, received, associated with data or physical objects, used to index, store and retrieve information, or accomplish transactions in a uniform fashion. This language can be used to perform automated transactions, communicate routing, process stages, or other complex human intentions. This uniform language structure can be used to communicate details about a human being, a transaction, a living or inanimate object, or any data object or type. It can communicate what instructions the creator of the data wishes to be attached to that information or object, and used to communicate what rules and/or intentions are intended or acceptable on the part of the receiver.
The invention also includes ways for individuals to describe themselves and their possessions in a unique way, and create descriptions of segment aspects of themselves and/or their interest areas or possessions, into discrete functional portions to further aid description and organization of their tasks and associated data.
Due to the robust language framework incorporated herein, the invention makes it possible to communicate data, related state of mind, emotions, timeframe, intentions related to the data, and make complex requests that can be understood and acted upon by others or computer systems. As the language framework is limited only to the vocabulary set possible in any language, and built into the computer interfacing to it, the ability to describe oneself, one's data, one's possessions, one's intentions, is limited only to what a person using the language framework composing sentences is capable of creating, and the receiving/decoding person or computer or other device is capable of responding to.
The invention enables individuals to describe themselves, data and actions as response scenarios to potential requests from other individuals in the same language format as is possible on the part of the individual issuing a request. Thus, transactions or processes can be conducted based on the criteria or preferences set by each individual, instead of being driven by the intentions of one side or the other..
The invention makes possible a new form of electronic language protocol that can be uniformly applied across cultures, spoken language sets, data types, and computer or other systems. This uniform language structure can be used in conjunction with other indexes, organizational structures, etc. to more fully inform and empower the processing of transactions between 2 parties.
The invention makes possible the creation of new and more efficient methods for data routing, storage, retrieval, caching, optimization of storage systems, filtering, agent and permission systems, based on understanding data flow in terms of the language framework associated to it, and more precise understanding of the intention of the individual making said requests.
The invention makes it possible to analyze behavior and processes as they are related both to the data associated with those behaviors, and the stated intentions and self-descriptions of the individuals initiating those processes. In like fashion, data, behavior, measurable factors, such as time, region, can be analyzed and compared against all the associated variables contained within the invention's language framework and the inventions framework for describing and characterizing people and their possessions and activities.
The invention makes it possible for an individual to make a set of descriptions, rules and instructions, which can be interpreted by a computer and acted upon on behalf of the user. These instructions can be associated with data, goods or services, and can perform as independent agents for the author. These instructions can be associated with any type of object or data, associated with any aspect of the person, or other self-defined criteria.
The present invention provides a verbal classification system and method for the efficient sending and/or receiving of desired information. A system in accordance with the invention includes a host server, a web-site server, and one or more user personal computers. The system also includes software and one or more databases which provide a predefined hierarchy of "nouns", "verbs", and "modifiers" that are used to send and/or receive desired information, thus allowing users, web-site proprietors, and other on-line retailers to communicate in an efficient manner.
. The invention is advantageous in that it allows a user (e.g., an Internet user) to directly access desired web-sites without having to sort through undesired web-sites or determine the best keyword or keywords that will generate a list of desired web-sites.
Another benefit of the invention is that it permits web-site proprietors and Internet marketers to reach their intended audience more directly and cost-effectively.
Another advantage of the invention is that it provides a decentralized method for indexing web-sites that is not constrained by the resources of a single web-site proprietor and that remains current with the growth of the Internet. Yet another advantage of the invention is that it allows web-site servers to present custom content and advertisements to a specific Internet user without having to track an Internet user's activity
The invention is also advantageous in that it permits an Internet user to receive only those messages that correspond to the Internet user's stated areas of interest while avoiding "spam" messages and other communications outside those areas
Another benefit of the invention is that it permits market research and demographics analysis based on an Internet user's stated interests as opposed to passive tracking of an Internet user's activity that may invade an Internet user's privacy
Yet another benefit of the invention is that it allows market research and demographics analysis based on a mass-sampling of information about Internet users, web-sites, and a comparison of Internet users' interests to the web-sites they visit.
Additional features and advantages of the invention will be set forth in the description that follows, and in part will be apparent from the description, or may be learned by practice of the invention The objectives and other advantages of the invention will be realized and attained by the system and method particularly pointed out in the written description and claims hereof as well as the appended drawings
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of tins specification 1 he drawings illustrate the preferred embodiment of the invention and together with the description serve to explain the principles of the invention
FIGS 1A-1F are a depiction of a graphical user interface in accordance with the present invention
FIG 2 is a flowchart depicting a method in accordance with the invention
FIG 3 is a block diagram showing a verbal classification system in accordance with the invention DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
A system and method in accordance with the present invention will now be described with reference to FIGS. 1-3, where like reference numbers indicate like elements. Also, in the figures, the left-most digit of each reference number corresponds to the figure in which the reference number is first used. Although several preferred embodiments of the present invention are particularly shown and described below, one of ordinary skill in the art will appreciate that various changes in forms and details may be made without departing from the spirit and scope of the invention as defined in the appended claims.
The invention provides a verbal classification system and method for the efficient sending and/or receiving of desired information. In this preferred embodiment, the sending and/or receiving of information occurs over the Internet. It will be appreciated by one of ordinary skill in the art, however, that the system and method of the invention can be practiced in any communication system in which information is sent and/or received, including various types of wireless, optical, or hybrid communication systems. For example, the invention can be practiced on home networks, wireless networks, control networks, corporate intranets, broadcast media, library science systems, or thin-client information retrieval systems in which devices such as cellular phones, personal digital assistants, palm-top computers or automotive on-board computers are used to retrieve information. The invention can also be practiced in traditional document filing systems such as filing systems that use paper media, microfilm or microfiche systems.
As will be described in detail below, a web-site proprietor, an Internet marketer and an Internet user of this preferred embodiment each provide a statement or set of statements that describes the information they are interested in sending or receiving. These statements are used to facilitate effective and efficient communication within the system. The web-site proprietor provides a statement or set of statements about the content of his web-site. The Internet marketer also provides a statement or set of statements about the content of the messages he wishes to distribute. Similarly, the Internet user, in turn, provides a statement or set of statements about the web-sites he wishes to access or the messages the user wishes to send or receive. Each statement is generated by selecting from a predetermined or predefined verbal hierarchy of "nouns," "verbs," and "modifiers." As defined herein, "nouns" are descriptors that describe subject matter areas, "verbs" are descriptors that describe activities relating to those subject matter areas, and "modifiers" are descriptors that in some way delimit the scope of subject matter areas and activities. In this preferred embodiment, the predefined verbal hierarchy of subjects is organized in a tree-like structure, in which each level of the tree is characterized by an increasing level of specificity. The nouns, verbs and modifiers are comprised of a word or words from the English language. However, it will be appreciated by one of ordinary skill in the art that nouns, verbs and modifiers can be comprised of any verbal information, including a word or words in a language other than English, codes, or any symbolic or graphical representations of a word or words or a thing or things. (Languages other than English, with a grammar structure different from English, can be cross-referenced to each other, much like a translator would do)
In accordance with this preferred embodiment of the invention, the Internet user is provided with the address of a desired web-site or with desired messages from an Internet marketer or another Internet user by matching the Internet user's statements with those of a website proprietor, Internet marketer or other' Internet user. Thus, the invention allows an Internet user to directly access desired web-sites without having to use a search engine, which requires the Internet user to deduce what keyword or keywords will generate a list of desired web-sites and can also require the Internet user to sort through undesired web-sites. The invention thus also allows web-site proprietors and Internet marketers to directly reach a target audience, and allows Internet marketers to do so without resorting to "spamming" (i.e., sending messages indiscriminately to a large group of Internet users). The avoidance of unwanted "spam" messages is also a benefit to the Internet user.
Also, because the invention allows individual web-site proprietors to describe the contents of their web-sites, it provides a decentralized method for indexing web-sites that is not constrained by the resources of a single web-site proprietor and that remains current with the growth of the Internet.
In addition to web-site addresses and messages, other information can be sent or received according to the invention, including electronic coupons, streaming audio and video, public service announcements, match results from newsgroups or private bulletin boards, and scheduling information regarding on-line forums and chat sessions, broadcast media programming, or community events. Additionally, the invention can be used to send or receive various types of messages (e.g., electronic messages), including community-based messages, political campaign messages, recall notices, "virtual community" or interest group messages, professional organization announcements, and regulatory announcements.
The invention can also be used to interface with other systems for classifying information including systems in which well-known codes or indices are used for classifying information. For example, existing universal price code systems in which products are identified by a unique price code can be improved upon by describing the same products according to a statement or set of statements selected from a predefined verbal hierarchy of nouns, verbs and modifiers. The invention can thus allow mapping between the verbal classification system and the universal price code system.
The manner by which an Internet user provides descriptive data describing the information the user wishes to receive will be further described in reference to FIGS. 1A-1F, which depict a graphical user interface (GUI) 100 of a preferred embodiment. GUI 100 is used by an Internet user to generate a statement or set of statements describing the type of information that the Internet user wishes to access by selecting from a predefined verbal hierarchy. The statement or set of statements describing the type of information the Internet user wishes to access is called a "role". The Internet user can use GUI 100 to create one or more roles, which are then stored on the Internet user's personal computer (PC). In this preferred embodiment, GUI 100 is a "point-and-click" interface, in which an input device (e.g., mouse) is used to direct a cursor to select or activate items on the monitor screen of the Internet user's PC.
In this preferred embodiment, the Internet user accesses GUI 100 on the Internet user's PC. GUI 100 will then be displayed on the monitor of the Internet user's PC. FIG. 1A depicts an initial appearance of GUI 100 as displayed to the Internet user. GUI 100 includes a user name field ("User Name") 102, a role name field ("Role Name") 104, a proficiency modifier field ("As a:") 106, verb checklist ("Find Information About," "Correspond About," "Buy," "Sell") 108, a temporal modifier field ("For a period of:") 110, a geographic modifier field ("Within the Region:") 112, and a display area 114.
As shown in FIG. 1A, the display area 114 of GUI 100 is initially blank. The Internet user begins by entering his or her user name. If the Internet user wishes to create a new user name, the user must enter a user name in user name field 102 and activate a "new" button adjacent to that field. If the Internet user already has a user name (because the user has previously created a role), the Internet user can activate a downward arrow button next to user name field 102 and select the user name from a drop-down menu of pre-existing user names.
The Internet user then selects a role name. If the Internet user wishes to create a new role, he must enter a role name in role name field 104 and activate a "new" button adjacent to that field. If the Internet user wants to access a role that the user has already generated (because the user has previously created a role), the Internet user can activate a downward arrow button next to role name field 104 and select the role name from a drop-down menu of pre-existing role names. The pre-existing role data corresponding to that role name is then loaded into GUI 100.
FIGS. 1B-1F, illustrate a particular example of a user's interaction with this preferred embodiment. As shown in FIG IB, the Internet user has selected the user name "Joe" and the role name "dog lover." Once the Internet user has selected a user name and role name, GUI 100 displays a portion of the predefined verbal hierarchy in display area 114. If the Internet user has selected a new role name, the noun or nouns at the highest level of the predefined verbal hierarchy will be displayed in display area 114. If the Internet user has selected a pre-existing role name, then the noun or nouns at the highest level of the predefined verbal hierarchy at which that role differs in any way from any other role stored on the Internet user's PC will be displayed in display area 114.
Each level in the predefined verbal hierarchy is comprised of one or more nouns, each of which describes a general subject matter area. For example, in FIG. IB, GUI 100 displays the noun "Living Creatures", which describes the general subject matter area of all living creatures, in display area 114. Each noun in the predefined verbal hierarchy can be associated, in turn, with one or more nouns describing more specific subject matter areas within that general subject matter area GUI 100 displays these nouns as depending from the broader subject matter areas to which they are related. For example, as shown in FIG. IB, GUI 100 displays the more specific subject matter areas described by the nouns "Humans," "Other Mammals," "Reptiles" and "Fish'.' as depending from the noun "Living Creatures." Each of these dependent nouns can, in turn, be associated with one or more nouns describing even more specific subject matter areas within the predefined verbal hierarchy.
If the Internet user is interested in seeing whether any of the nouns displayed in display area 114 is associated with more specific subject matter areas, the Internet user uses GUI 100 to select a noun in display area 114. If the noun selected by the Internet user is associated with more specific subject matter areas within the predefined verbal hierarchy, then GUI 100 will display the nouns corresponding to the more specific subject matter areas. For example, as seen in FIG. 1C, when the Internet user selects the noun "Other Mammals," GUI 100 displays the more specific subject matter areas described by the nouns "Dogs," "Cats," "Horses" and "Bears" in display area 114. As seen in FIG. ID, when the Internet user selects the noun "Dogs," GUI 100 displays the more specific subject matter areas described by the nouns "Terriers," "Spaniels," "Retrievers" and "Hounds" in display area 114. As shown in FIG. IE, when the Internet user selects the noun "Spaniels," GUI 100 displays the more specific subject matter areas described by the nouns "English Cocker," "American Cocker" and "Springer" spaniels in display area 114.
If the noun selected by the Internet user is not associated with any more specific subject matter areas within the predefined verbal hierarchy, then GUI 100 will not display any more nouns. For example, in reference to FIG. IF, because the subject matter area described by the noun "Springer" spaniel is not associated with any more specific subject matter areas within the predefined verbal hierarchy, when the Internet user selects the noun "Springer," spaniel no additional nouns are displayed by GUI 100 in display area 114.
It will be appreciated that, by consecutively selecting dependent nouns displayed by GUI 100 in display area 114, the Internet user can navigate from general subject matter areas at the top of the predefined verbal hierarchy down to the most specific subject matter areas. When the Internet user is navigating through the predefined verbal hierarchy, GUI 100 displays nouns corresponding to a previously selected level of the predefined verbal hierarchy on a smaller scale than nouns corresponding to currently selected levels, or does not display them at all. For example, in FIG. IE, GUI 100 displays the nouns corresponding to the previously selected level of subject matter areas "Terriers," "Retrievers" and "Hounds" on a smaller scale than the nouns corresponding to currently selected levels of subject matter areas. The nouns corresponding to the previously selected level that includes the subject matter area "Other Mammals," from which the noun "Dog" depends, is not displayed at all within display area 114.
. When the Internet user has located the subject matter area or areas about which he wishes to receive information, the Internet user can use GUI 100 to choose that subject matter area or areas. GUI 100 permits the Internet user to choose a single subject matter area by choosing a single noun, multiple subject matter areas by choosing multiple nouns, or entire branches of subject matter areas by choosing a single noun and all the nouns that depend from it. At any time the Internet user can undo choices he has made by activating the "Deselect" button 120 within display area 114. The Internet user can also use GUI 100 to choose one or more verbs that describe an activity or activities in which the Internet user is interested. For example, as shown in FIG. IF, the Internet user can choose one or more verbs by checking any of the boxes in verb checklist 108. The Internet user can choose from the verbs "Find Information About," "Correspond About," "Buy," or "Sell " As depicted in FIG. IF, the Internet user, who has already chosen the subject matter area "Springer," then chooses the verb "Find Information About" by clicking on the box next to the verb "Find Information About" in verb checklist 108. As will be appreciated by one of ordinary skill in the art, GUI 100 can be implemented to provide any collection of verbs and to present the choice of verbs in a drop-down menu format as opposed to a checklist, or display a choice of verbs in display area 114 depending from selected nouns
The Internet user can also choose "modifiers" (proficiency, temporal, geographic) to further delimit or focus the scope of information that the user is interested in accessing For example, as shown in FIG IF, the Internet user can choose from one or more of a variety of proficiency modifiers by activating a downward arrow button next to proficiency modifier field 106 The Internet user will then be presented with a drop-down menu of proficiency modifiers, such as "Amateur" or "Expert," from which the Internet user can choose one or more proficiency modifiers In FIG 1 F, the Internet user has chosen the proficiency modifier "Amateur " Also as shown in FIG IF, the Internet user can choose from one or more temporal modifiers by activating the downward arrow button next to temporal modifier field 110 The Internet user will then be presented with a drop-down menu of temporal modifiers, such as "A month," "Six Months" or "A year," from which the Internet user can choose one or more temporal modifiers In FIG IF, the Internet user has chosen the temporal modifier "A month " Finally, as shown in FIG IF, the Internet user can choose one or more geographic modifiers by activating the downward arrow button next to geographic modifier field 112 The Internet user will then be presented with a drop-down menu of geographic modifiers, such as "In the United States" or "Within New York State," from which the Internet user can choose one or more geographic modifiers In FIG 1 F, the Internet user has decided not to choose a geographic modifier, thus, the geographic modifier field 112 states "None Specified " As will be appreciated by one of ordinary skill in the art, GUI 100 can also be implemented to provide any collection of modifiei s in addition to proficiency, temporal or geographic modifiers, including a numeric value or range of values, a price or range of prices, personality traits, type of data, or whether the Internet user wants to receive commercial or non-commercial messages, or identify a particular type of recipient/other party/other transaction type desired to be engaged GUI 100 can also be implemented to present a choice of modifiers in a checklist format as opposed to a drop-down menu format, or display a choice of modifiers in display area 114 depending from selected nouns.
Once the Internet user has finished creating a statement or set of statements describing the information he wishes to access by selecting a combination of nouns, verbs and modifiers, the Internet user can activate a button labeled "Set and Finish" 116 within display area 114 to save the newly created or modified role. For example, FIG. IF depicts a "Dog Lover" role for Internet user "Joe" in which he is seeking to find information as an amateur about springer spaniels within the last month, not limited to any geographic area. By activating "Set and Finish" button 116, the Internet user saves the "Dog Lover" role for user name "Joe". If, instead, the Internet user activates a "Set and Continue" button 118, he saves the "Dog Lover" role for user name "Joe," but can then continue to create another role or modify an existing role for user name "Joe." In accordance with the invention, multiple roles can be created.
In this preferred embodiment, a small role data file corresponding to each role is stored, preferably in encrypted form, on the Internet user's PC. Because the role data is encrypted, it can only be read by corresponding decryption software. Well known encryption and decryption software and techniques can be practiced with the invention. Additionally, the role data does not contain any personal identification information about the Internet user, such as the Internet user's name, address, and e-mail address. Rather, in this preferred embodiment the Internet user is assigned an anonymous user identification (ID) number that is stored as part of the Internet user's role data. For reasons described more fully herein, the encryption of the role data and the use of an anonymous ID serves to protect the Internet user's privacy while interacting over the Internet. However, other embodiments of the invention can be practiced in communication systems other than the Internet in which privacy is not a concern (e.g., a corporate intranet). In these other embodiments, role data need not be encrypted and can contain personal identification information about the user.
FIG. 2 depicts a flowchart of a method in accordance with the invention. At step 200, a web-site proprietor, Internet marketer or Internet user accesses a host server over the Internet. At step 202, the web-site proprietor interacts with the host server to generate or update a statement or set of statements about the content of his web-site. At step 202 the Internet marketer or Internet user also interacts with the host server to generate or update a statement or set of statements about the content of a message they wish to send. As discussed above, these statements include nouns, verbs and modifiers selected from the same predefined verbal hierarchy In this preferred embodiment, the host server presents the web-site proprietor, Internet marketer or Internet user with a GUI of the type described in reference to FIGS 1A-1F, above, to allow the web-site proprietor, Internet marketer or Internet user to navigate through the predefined verbal hierarchy and generate statements consisting of nouns, verbs and modifiers As shown in step 204, the web-site proprietor also submits his web-site's address and the Internet marketer or Internet user also submits his message to the host server At step 206, the host server stores the statements along with their associated web-site address or message
At step 208, an Internet user generates or updates a statement or set of statements about the information he wishes to access As discussed above, this statement or set of statements is called a "role" and is comprised of nouns, verbs and modifiers selected by the Internet user from a predefined verbal hierarchy, as well as an anonymous user ID As also discussed above, the Internet user uses the user's PC and associated GUI described in reference to FIGS 1A-1F, above, to navigate through the predefined verbal hierarchy and generate statements including nouns, verbs and modifiers At step 210, the Internet user then activates a role that has been stored as an encrypted file on his PC At step 212, the Internet user transmits that encrypted role data to the host server At step 212, the Internet user also transmits to the host server his user "profile," which is the set of all existing role data for the Internet user stored on the Internet user's PC, as well as an encrypted file containing information about the Internet user's activity since the last time the Internet user accessed the host server This activity information includes those previously-downloaded web-sites addresses the Internet user has chosen to access, the Internet user's ranking or deletion of previously downloaded web-site addresses, or whether the Internet user has opted to block further messages from the source of a previously-downloaded message This activity data can encompass any and all activities taken by users' computers on their behalf duπng an on-line session At step 214, the host server stores the Internet user's active role, profile and previous activity data
At step 216, the host server reads the encrypted role data associated with the currently activated role and compares the statement or set of statements in that role data with the statement or set of statements associated with each stored web-site address and message In this preferred embodiment, the host server contains decryption software that enables it to decode the encrypted role data At step 218, if any matches are found the results are transmitted to the Internet user's PC More specifically, if the statement or set of statements for the currently activated role matches the statement or set of statements associated with any of the stored web-site addresses, then those web-site addresses will be transmitted to the Internet user's PC Similarly, if the statement or set of statements for the currently activated role matches the statement or set of statements associated with any of the stored messages, then those messages will be transmitted to the Internet user's PC. In the preferred embodiment, the user can designate the extent to which statements must be identical to be considered a match, and this matching criteria can be transmitted to the host server along with the user's role, profile and activity data in step 212.
When the Internet user's PC receives the matching web-site addresses and messages, the Internet user's PC stores the web-site addresses and messages. The matching web-site addresses and messages are stored in files that correspond to the active role that they are associated with. However, the Internet user can define alternative methods for filing the matching web-site addresses and messages on his PC.
At step 220, the Internet user's PC presents the Internet user with an index of web-site addresses corresponding to the currently active role organized by noun, verb and modifier. At step 222, the Internet user can sort and prioritize the web-site addresses. The Internet user can sort and prioritize the web-site addresses according to a variety of criteria, including the Internet user's preference, the exactness of the match between the Internet user's role and the statements associated with the web-site address, or the popularity of the web-site as rated by all users of the inventive system. Information can also be sorted by noun, verb, or other modifier or any nested combination which the User desires. The Internet user can also delete web-site addresses, hide web-site addresses (i.e., remove the web-site address from the index but not delete it), or annotate web-site addresses by typing comments next to the web-site address in the index. In another preferred embodiment of the invention, the Internet user can also flag a web-site address to receive alerts when changes occur related to the web-site corresponding to that address, e.g., to receive an alert when the content of the web-site changes. These alerts can be downloaded from the host server along with the match results in step 218.
At step 224, the Internet user can decide either to access a web-site corresponding to a downloaded web-site address or view downloaded messages corresponding to the currently active role. If the Internet user chooses to view downloaded messages, as shown in step 226, then the Internet user's PC will display the messages to the Internet user at step 228. The messages are displayed organized by noun, verb and modifier. The Internet user can select a specific message or group of messages for viewing and can reply to a message or group of messages. The Internet user can sort and prioritize messages according to a variety of criteria, including the Internet user's preference, the exactness of the match between the Internet user's role and the statements associated with the message, the date and time of the message, or whether the message is commercial or non-commercial. The Internet user can also delete messages, hide messages (i.e., remove the message from view but not delete it); of mark messages or groups of messages as read, unread or in need of a reply. While viewing a downloaded message, the Internet user can elect to block any future messages from the source of that message. After viewing his messages, the Internet user can either log off as shown in step 230, return to step 208 create or update a new role, or activate a pre-existing role at step 210 and begin the process over again.
Instead of choosing to view downloaded messages corresponding to the currently active role, the Internet user can also select a web-site address from the index of web-site addresses by clicking on an address at step 232. As shown at step 234, when the Internet user selects a website address, the Internet user is then permitted to activate any one of his pre-existing roles or any combination of his pre-existing roles, which will then in effect define the Internet user's persona when interacting on the Internet. If the Internet user does not choose a role or combination of roles, then his default role will be the role used to download the web-site address. The Internet user's PC then launches the user's Internet browser to access the web-site addressed by the selected web-site address, as shown in step 236.
At approximately the same time, as shown at step 238, the Internet user's PC will also transmit the data file or files associated with the currently activated role or roles to the web-site's server as well as the role that was used to download the web-site address. When the web-site's server receives the encrypted role data, it reads the role data using decryption software and then matches web-site content to the statement or set of statements contained in that role data, as shown at step 240. Custom content is then downloaded to the Internet user's PC at step 242. In this way, the invention allows the web site's server to present custom content to the Internet user without having to track the Internet user's activity in a manner that can invade the Internet user's privacy. The Internet user's privacy is also protected because the role data is encrypted and does not contain any personal identification information about the Internet user.
At this point, the Internet user can either log off as shown in step 244, choose another web-site address from the index of web-site addresses at step 232, return to step 208 and create or update a new role, or activate an existing role at step 210 and begin the process over again.
As will be appreciated by one of ordinary skill in the art, the above-described method can be used to send and receive information other than web-site addresses and messages. For example, the above-described method can be used to send and receive electronic coupons (e- coupons). In one such embodiment, an e-coupon provider provides a host server with an electronic coupon and a statement or set of statements describing the electronic coupons he wishes to distribute according to a predefined verbal hierarchy of nouns verbs and modifiers. The Internet user defines a role according to the same predefined hierarchy in which the Internet user specifies whether or not he wishes to receive e-coupons related to his role and provides that role to the host server. The host server then provides the e-coupon to the Internet user if the Internet user has specified that he wishes to receives e-coupons related to his role and his role matches the statement or set of statements describing the electronic coupon.
In another preferred embodiment, the above-described method is used to send and receive schedule information for real-time scheduled broadcasts or events, such as television or radio broadcasts, web-casts, chat room events, sporting events, lectures, plays, concerts or classes. The Internet user defines a role in which he specifies a broadcast or event he would like information about by specifying certain criteria, including the broadcast medium, the participants (e.g., actor, director, performer, team, etc.), the subject matter, location, time and date. The host server then provides the scheduling information to the Internet user if the information about the broadcast or event matches the criteria in the Internet user's role.
In another preferred embodiment, the method described above is used to send and receive a list of currently active Internet chat rooms to an Internet user. In one such embodiment, the host server maintains a list of links to currently active chat rooms covering certain subject matter areas. The Internet user defines a role according to the predefined verbal hierarchy in which the Internet user specifies whether or not he would like to receive a list of currently active Internet chat rooms related to his role and provides that role to the host server. The host server then provides the Internet user with a link to any currently active chat room that concerns subject matter related to the Internet user's role. The Internet user may then participate in the currently active chat room by selecting a link. The Internet user may also start his own chat room corresponding to his role and post a link to that chat room on the host server for distribution to other Internet users
In another preferred embodiment, the user's role information can be used to help community lists, newsgroups, user groups, forums, and other community building functions, both on-line and off-line, which match the statements within the User's role information.
FIG. 3 is a block diagram that depicts a system 300 according to a preferred embodiment of the invention. System 300 includes a user personal computer (PC) 302, a web-site server 304, an Internet marketer PC 306, and a host server 308. User PC 302 can communicate with web- site server 304 and can transmit and receive information to and from web-site server 304 User PC 302 can also engage in communication with host server 308 and can transmit and receive information to and from host server 308 Web-site server 304 can also communicate with host server 308 and can transmit and receive information to and from host server 308 Internet marketer PC 306 is for communicating with host server 308 and can transmit and receive information to and from host server 308 In this preferred embodiment, all communications are transmitted electronically over the Internet using hard-wired connections with well-known interfaces and protocols as will be appreciated by one of ordinary skill in the art In addition, the invention can be practiced with a plurality of user PCs 302, web-site servers 304, Internet marketer PCs 306, and host servers 308
In this preferred embodiment, system 300 also includes several software components to facilitate the features of the invention With further regard to FIG 3, user Internet browser 310 and client software 312 reside on user PC 302 Client software 312, in part, provides the role generation and update features discussed above Web-site proprietor Internet browser 314 and web-site reader software 316 reside on web-site server 304 Internet marketer Internet browser 318 resides on Internet marketer PC 306 Host engine 320 and demographics analyzer 322 reside on database server 308 Each of these software components are comprised of commercially available computer programs which are compatible with commercially available hardware (e g , Intel-based computers and servers) and operating systems (e g , Windows, Unix, and MAC) In this preferred embodiment, client software 312 is downloaded from host server 308 for installation on user PC 302, and web-site reader software 316 is downloaded from host server 308 for installation on web-site server 304
As shown in FIG 3, host server 308 also stores web-site database 324 and message database 326 Databases 324 and 326 are object-oriented databases for storing information according to a predefined verbal hierarchy of nouns, verbs and modifiers In this preferred embodiment, client software 312 also contains an object-oriented database for storing information according to the same predefined verbal hierarchy of nouns, verbs and modifiers In another preferred embodiment, client software 312 resides on host server 308 and is accessible to an Internet user via the Internet Although in this preferred embodiment databases 324 and 326 and the database in client software 312 are object-oπented databases, these databases can be implemented with various types of databases known in the art, including relational databases, flat-file databases, or inverted-list databases A web-site proprietor uses web-site Internet browser 314 resident on web-site server 304 to interact with host server 308 to generate or update a statement or set of statements about the content of his web-site. As discussed above, this statement or set of statements includes nouns, verbs and modifiers selected from the same predefined verbal hierarchy. In another preferred embodiment, web-site Internet browser resides on a PC separate from web-site server 304 which can be used by the web-site proprietor to interact with host server and generate or update a statement or set of statements about the content of his web-site. The web-site proprietor then transmits this descriptive data along with the address of his web-site to host server 308 as registration data 330. In operation, when host server 308 receives registration data 330, host engine 320 stores registration data 330 in web-site database 324.
An Internet marketer uses Internet marketer Internet browser 318 resident on Internet marketer PC 306 to interact with host server 308 to generate or update a statement or set of statements about the content of a message he wishes to send. As discussed above, this statement or set of statements includes nouns, verbs and modifiers selected from the same predefined verbal hierarchy. The Internet marketer then transmits this statement or set of statements along with his message to host server 308 as marketing data 332. In operation, when host server 308 receives marketing data 332, host engine 320 stores marketing data 332 in message database 326.
An Internet user can use user Internet browser 310 resident on user PC 302 to interact with host server 308 to generate or update a statement or set of statements about the content of a message he wishes to send. As discussed above, this statement or set of statements includes nouns, verbs and modifiers selected from the same predefined verbal hierarchy. The Internet user then transmits this statement or set of statements along with his message to host server 308 as user message data 336. In operation, when host server 308 receives user message data 336, host engine 320 stores user message data 336 in message database 326.
• In other preferred embodiments of the present invention, information other than web-site addresses and messages can be sent to host server 308 by web-site proprietors, Internet marketers, Internet users and others. This information includes but is not limited to electronic coupons, streaming audio and video, public service announcements, match results from newsgroups or private bulletin boards, and scheduling information regarding on-line forums and chat sessions, broadcast media programming, or community events.
An Internet user uses client software 312 resident on user PC 302 to generate or update a role as described in reference to FIGS. 1A-1E above. The Internet user then uses client software 312 to transmit encrypted role/profile and activity data 334 to host server 308. Role/profile and activity data 334 is comprised of the Internet user's currently activated role, the Internet user's profile, which is the set of all existing role data for an Internet user stored on user PC 302, and any previous activity information concerning web-site addresses or e-mail messages previously downloaded from the host server corresponding to the currently active role. In operation, when host server 308 receives role/profile and activity data 334, host engine 320 reads that data using decryption software and sends a copy of it to demographics analyzer 322.
When host server 308 receives role/profile and activity data 334, host engine 320 also matches the Internet user's currently active role data with registration data 330 stored in web-site database 324 by comparing the statement or set of statements in the Internet user's role data with the statement or set of statements in registration data 330. If the statements match, then host engine 320 transmits the web-site addresses in registration data 330 to user PC 302 as part of match results 338. Similarly, when host server 308 receives role/profile and activity data 334, host engine 320 matches the Internet user's currently active role data with marketing data 332 stored in message database 326 by comparing the statement or set of statements in the Internet user's role data with the statement or set of statements in marketing data 332. If the statements match, then host engine 320 transmits the messages in marketing data 332 to user PC 302 as part of match results 338. Finally, when host server 308 receives role/profile and activity data 334, host engine 320 matches the Internet user's currently active role data with user message data 336 stored in message database 326 by comparing the statement or set of statements in the Internet user's role data with the statement or set of statements in user message data 336. If the statements match, then host engine 320 transmits the messages in user message data 336 to user PC 302 as part of match results 338.
After user PC 302 has received match results 338, client software 312 stores the match results. In this preferred embodiment, the match results are stored in a database in client software 312. In another preferred embodiment, the match results are not stored on user PC 302 at all, but instead are stored on a database on host server 308 and accessed remotely by the Internet user.
The Internet user can use client software 312 to read the content of the messages in match results 338. Because the Internet user has been provided with only those messages that correspond to the Internet user's interests, as defined in the Internet user's role, the invention permits the Internet user to avoid "spam" messages and other communications outside those interests. The invention thus also permits the Internet marketer to efficiently reach an audience that is interested in its marketing information without resorting to "spam" messages .
The Internet user can also use client software 312 in conjunction with user Internet browser 310 to access web-sites corresponding to the web-site addresses in match results 338. For example, as shown in FIG. 3, the Internet user uses client software 312 to launch user Internet browser 310 and access web-site server 304 addressed by a web-site address in web-site match results 338. When client software 312 accesses web-site server 304 via user Internet browser 310, it also transmits encrypted role data 340 to web-site server 304. Role data 340 includes one or more roles chosen by the Internet user that will define the Internet user's persona when interacting with web-site server 304 and includes the role that was used by the Internet user to obtain the web-site address for web-site server 304 from host server 308.
Web-site server 304 contains web-site internals 328, which includes a web-site engine and web-site content. In operation, when web-site server 304 receives role data 340 from user PC 302, web-site reader software 316 reads role data 340 using decryption routines and passes it to the web-site engine, which then matches custom web-site content to the statement or set of statements in role data 340. In this preferred embodiment, custom web-site content is then transmitted to user PC 304 as custom content 342. The invention thus permits web site server 304 to present custom content to the Internet user without having to track the Internet user's activity in a manner that may invade the Internet user's privacy. The Internet user's privacy is also protected because role data 340 is encrypted and does not contain any personal identification information about the Internet user, but instead contains an anonymous user ID number associated with client software 312.
After user PC receives custom content 342, the Internet user can further interact with web-site server 304 via client software 312 and user Internet browser 310.
When web-site server 304 receives role data 340 from user PC 302, reader software 31 stores that role data in a data log on web-site server 304. Accumulated role data 344 is then transmitted to demographics analyzer 322 on host server 308. Demographics analyzer 322 uses accumulated role data 344, registration data 330 stored in web-site database 324 and role/profile and activity data 334 to calculate demographics data 346. Demographics data 346 can include accumulated information about Internet users, web-sites, as well as a comparison of Internet users' interests to the web-sites they visit.
Because demographics analyzer 322 has collected role/profile & activity data 334 from a variety of Internet users over time, demographics analyzer 322 can make individual distinctions about Internet users. For example, demographics analyzer 322 can analyze the total set of nouns, verbs and modifiers in the statement or set of statements of an Internet user's profile to determine an Internet user's affinity towards a particular subject matter area further defined by what types of actions they wish to perform in relation to those subject matter areas and again limited by the modifiers they select. Because an Internet user's profile and role data can change each time the Internet user accesses host server 308, demographics analyzer 322 can also track an Internet user's changing interests over time. For example, demographics analyzer 322 can track how a group of Internet users' demands change over time in order to forecast supply issues. Demographics analyzer 322 can also determine how many separate roles correspond to a single Internet user and how often the Internet user accesses the Internet in any given role as opposed to the Internet user's other roles. Demographics analyzer 322 can also use the Internet user's activity data to determine where and when an Internet user has interacted using a particular role or roles. A benefit of the invention is that demographics analyzer 322 does not need to track an Internet user's activity on the Internet to perform this analysis
Because demographics analyzer 322 also collects accumulated role data 334 from website server 304, demographics analyzer 322 can derive useful information about web-site server 304. For example, demographics analyzer 322 can determine the active role or roles of every Internet user who accessed web-site server 304, and which nouns, verbs or modifiers led Internet users to access web-site server 304. Demographics analyzer 322 can calculate the distribution of Internet users visiting web-site server 304 according to the nouns, verbs and modifiers in each Internet user's role data. Thus, demographics analyzer 322 can determine what subject matter areas and activities Internet users who visit web-site server 304 are most interested in at the time they visit
Demographics analyzer 322 can also use registration data 330 stored in web-site database 324 to provide market research analysis by determining what types of products and services are available on the Internet. Demographics analyzer 322 can also use registration data 330 to perform trend analysis regarding the expansion or contraction of web-based business activity. Demographics analyzer 322 can also use information from many participating web-servers to aggregate information which relates to a particular subject or industry area in aggregate across the web. Also, demographics analyzer 322 can be used to analyze information from this system and correlate it to other systems, like the CPI (Consumer Price Index), inflation, certain stocks, or any other trackable variable). The demographics analyzer can analyze, in a multiplicity of ways, the user's self-reported information against the activity information against the behaviorally collected information, against the site/Internet information, and linked to any other outside information believed to correlate to any of these system-derived information sources.
Demographics data 346 can be transmitted to web-site server 304 or communicated to demographics analysis customers 348.
A host administers the system described above with reference to FIG. 3. The host provides and maintains host server 308, including host engine 320, demographics analyzer 322, web-site database 324 and message database 326. The host also provides an on-line interface on host server 308 which a web-site proprietor can use to generate and provide registration data 330, an Internet marketer can use to generate and provide marketing data 332, and an Internet user can use to generate and provide user message data 336. The online interface receives and processes a payment from an Internet marketer in exchange for posting the message in marketing data 332. The on-line interface can receive and process a different fee for various types of messages, e.g., commercial, non-commercial, or non-profit. In another embodiment of the present invention, the online interface receives and processes a payment for posting other types of information, such as e-coupons and schedule information for real-time scheduled broadcasts or events.
The host can allow advertisers to sponsor the download to the Internet user of web-site addresses and messages. More specifically, in exchange for a fee, the host can post an advertisement in a dialog box that appears on user PC 302 at the time the Internet user is downloading match results 338 from host server 308. The host can present advertisements with subject matter that is related to the Internet user's active role so that the advertiser may more efficiently reach an audience interested in his product or services and so that the Internet user receives advertisements targeted at the Internet user's stated areas of interest.
The host can also allow advertisers to sponsor parts of the predefined verbal hierarchy. In exchange for a fee, the host can place an advertisement in the background of the GUI that web-site proprietors, Internet marketers and Internet users use to generate or update a statement or set of statements about their web-site or message and that the Internet user uses to generate a role. The host can present advertisements with subject matter that is related to the portion of the predefined verbal hierarchy in which the web-site proprietor, Internet marketer or Internet user is currently navigating, so that the advertiser may more efficiently reach a target audience interested in his product or services and so that the Internet user receives advertisements targeted at the Internet users stated areas of interest. In this preferred embodiment, the host checks whether or not the statement or set of statements in registration data 330 accurately reflects the web-site that it describes, and rejects registration data 330 if it does not. The host also checks whether or not the statement or set of statements in marketing data 332 accurately reflects the message that it describes, and rejects marketing data 332 if it does not. Similarly, the host checks the statement or set of statements in user message data 336 to see if it accurately reflects the message that it describes, and rejects user message data 336 if it does not.
The host provides an on-line interface on host server 308 that a web-site proprietor can use to purchase and download web-site reader software 316. The host also provides an on-line interface on host server 308 that Internet users use to download client software 312. In other preferred embodiments, the host provides for the distribution of web-site reader software 316 and client software 312 through the mail or through retail stores.
In another preferred embodiment, the host provides an on-line interface on host server 308 that an Internet user, web-site proprietor or Internet marketer can use to identify new nouns, verbs or modifiers that they would like to see added to the predefined verbal hierarchy. The host is capable of modifying the predefined verbal hierarchy to include these new nouns, verbs or modifiers.
The host provides an on-line interface on host server 308 that web-site proprietors and demographics analysis customers 348 can use to purchase demographics data produced by demographics analyzer 322. The host can organize this data into standard reports, such as standard reports regarding user profiles and activity or web-site registration data, newsletters, or generate ad hoc reports tailored to the needs of a web-site proprietor or demographics analysis customer 348. To this end, the on-line interface on host server 308 permits web-site proprietors and demographics analysis customers 348 to define the informational content of the reports they want to receive. Reported demographics data may be based on Internet users' profile information or individual role information, on total activity across all web-sites or to a specific web-site. In this preferred embodiment, demographics data 346 can be downloaded by web-site proprietors or demographics analysis customers 348 over the Internet. As would be apparent to one skilled in the art, the teachings of the invention are applicable in many different applications. For example, the invention can be used with a stand-alone database wherein items of information are classified and stored according to a statement or set of statements selected from the same predefined verbal hierarchy of nouns, verbs and modifiers. In this embodiment, each item of information and associated statement or statements is stored and accessed as a unique object.
Practical Applications
The role of a pseudonym and password as the only identifying data in a privacy model "best case".
1) The invention provides a single ID# which is not tied to the name, address, SS# or any other personally identifying information in the "real world" about an individual, and can be used as the unifying "Record ID" to characterize that a set of information aggregated about an "electronic individual" actually belongs to a single anonymous entity.
2) Given the above information a Corporation can set up a single ID# which is then the "identity" for that corporation, and can have different "user id's" defined inside which relate to the users inside the "corporate entity".
3) Identities and Roles are related in that a "set" or "Identity" can consist of subsets or "roles".
The breaking of an "individual" into multiple "roles" on a consumer or user side reflects the building of different personality aspects or activity zone-related segments that can be activated and deactivated at will, so as to more closely represent the psychological aspect or functional needs of the User at that time.
4) Users can create multiple roles which are aggregated into one personality profile of themselves based on a single ID# or key.
5) Businesses can create multiple roles within their corporate identity in same fashion when using the system, i.e., a. Purchasing department (Role of Smith Inc.) has 3 subroles for each of the purchasing agents.
6) On the supply side of the equation (the Internet "advertiser" or site side) a company can identify that its data belongs to a particular "aspect" or "functional role" (i.e., that a particular piece of content or ad is part of its customer service department's collateral) In this way, companies can be segmented in their ad campaigns, personalization information, and historical data analysis, in the same or similar fashion as an internet user can be. 7) Data analysis can be performed on data as segmented into roles, by subject criteria, or any other variable.
the data for statements is gathered:
1) it can be gathered through a GUI as in the diagram, or dragged and dropped as words into a "diagram" of a sentence type fashion,
2) it can be gathered through a speech or A/I system in the following fashion a. "What's the subject, User?" A: "Wine" Q: What would you like to do with wine: Here are some options, buy, sell, drink, etc. Please choose one"
the Language Based Protocol (LBP) is useful:
1) The LBP combined with the segmentation of people (or a company on the supply side into departments, or subsections or lines of business) forms a data architecture which is highly detailed. Example: Data which matches the following verbage "buy wine in CA" AND matches my Wine Lover Profile ...is stored "here".
2) In industries such as entertainment, the LBP structure (verbal classification system and personality/role/identity mapping system) combined with the "other indexes" this information can be hooked to inform selections like: Author, director, genre, performer, actor, year, award, etc. references, to create search, storage and retrieval indexes on entertainment choices. The analysis of information against this subject matter can provide information regarding popularity, behavior and choices of intention in entertainment, or the relationship between stated intention, behavior and the LBP framework or other variables correlated to it.
3) The LBP can also specify "content type" (i.e., streaming audio, visual, etc.) and can filter based on: a Content type b. Date c. Units of measure d Price e. UPC code f. Who is the "owner" or "originator" of that information or transaction is, i.e., that only information originating from a specified source described in similar LBP statement fashion, or described by any outside variable (such as license, certification, permit to transact legally, etc.) should be interacted with. g. Any other variable, such as catalogue number, etc.
What can be done with the "statements" collected inside a Role, etc.
1 ) Statements of preferences can be made about which variables to sort orr in simple or complex sorting procedures (sort by Wine, then by "Verb" then by "where")
2) Statements can be leveled in priority, and/or make operational in a group: (i.e., an instruction set: for example: a. First, "buy wine in California" b. Second "show information about travel in California" OR
A: First, "buy wine in California" time limit: Today
B: Second, sell as reseller Napa Valley Chardonnay, Quantity Limit, 15 bottles, Time Limit, Today, Other Transacting Party Limit: Over Age 21, authorized by XYZ, Geographic Limit: California only.
3) Statements can be associated with a variable like % or a range, or a time limit, e.g., "buy wine in California" with a range of price between 3 and 5 per unit.
A "role" can be a segmentator that could create different roles based on delivery devices, parts of a person's personality, their mood, or any other factor that can be segmented by using the language system. A role could be the living room of one's home, a time of day, a mood, an activity or hobby, etc. or anything else that is simply the result of what the statements and related preferences identified and grouped into a set called a Role call out expressly.
NOTE: This is a significant feature because what the invention can do with this is not only "tell" the supply side WHAT to show to the "user" but:
1) in what order
2) which are top priorities
3) what content type
4) when 5) how to display it - content type, audio, visual, style, etc.
6) if then type statements can be constructed using the language to create' executable instructions for computers.
7) What necessary criteria must be tested against (other party requirements included) in order to complete a transaction.
With this capability, another benefit is that a User can "tell" a site, based on preferences stored under that "role" or the sentences inside the role, that in order to reach a "decision" in this "session", (or a buying decision for example), that the following criteria, in a particular order have to be met (like a case statement in basic), in order to proceed with a transaction: i.e., checking out a car on the net:
1) show me information about safety
2) I'd like to HEAR testimonials about customer satisfaction
3) I'd like to compare prices
4) Check delivery
5) Reliability is the next most important factor, or warranty, etc.
This, in effect, allows the user to "write" macros or subroutines for a generic "scripting language" that any software product capable of translating can decode and act upon. Therefore, custom presentations can be created for each individual person, getting the subject right, the "look and feel" right, the sequence of events/criteria right, and after the event, using the customer-supplied criteria and weighting to analyze the event, both individually and in aggregate.
It will be appreciated by those having skill in the art that the Language Based Protocol described herein can be used as a uniform "scripting language" to enable a human being to perform any task on their behalf using a computer system which can translate the "scripting language" and act upon it. It will also be appreciated that these instructions can be housed anywhere within the computer system, and can operate independently as agents for the author of them. For instance, instructions could be set or stored inside the profile of one's bank account, one's home wiring system, one's car, one's office, computer, cellphone, etc.
Also, because the "roles" can be characterized with icons, or placeholders which have a look or feel visually, auditorially, or in some other sensorial way, this information can feed back into the analysis of what the User preferences are in data analysis. or example:
Sara has a "gourmet food" role and uses a "country gingham style icon or picture to symbolize that on her PC. The invention thus "knows" that her "taste" in the subjects contained within that role have a "country gingham" look and feel, because Sara could choose from different styles.
What Types of Activities the Invention can Support:
Buying and Selling anonymously through the inventive system, if connected to a Secure Trusted Source (i.e., credit card verification), and connected with fulfillment chain.
1 ) The invention in a B2C internet environment can track user behavior because it is capable of being implemented for proxying user traffic or uploading historical information about user behavior, but does not violate user privacy because it does not keep records of ISP logins, name, SS#, etc. at the administrative level and history records When a Consumer goes to a shopping site and fills up a shopping cart, the invention can then pass Consumer to a trusted Secure Source for Credit Card Authorization, and then return with Consumer's authorization, but without having gathered User's name
2) In partnership with the "trusted electronic funds source" (i.e., a credit card) or other neutral third party, the invention can give Business an 1D# that says that "Anonymous person paying with Credit Card" purchased this item in your catalogue, on this date, and the Serial # is 1234, etc. This information is held in "escrow" for warranty, etc. purposes where identity is legally necessary.
a Should Users need to exchange or complete warranty transaction, they simply notify "Credit Card" that they hold an authenticated "certificate" entitling them to "open" the escrow for that purchased item, and then at that point, the Consumer is put in contact with the manufacturer or warranty provider b. Discounts for frequent purchases, etc. could be maintained in this third-party escrow account, and the User>Credit Authenticator>Merchant '-'file" could be anonymous yet contain all the necessary information to process customer requests by this "infomediary" system. c. Fulfillment can be tied to the back end of the process as a step in the process chain, where another "trusted source" receives information to ship product to a specified location.
3) Information contained within Roles or whole User Profile can be sent anonymously as a "wish list" of desired products to different people who might want to know what User would like as a gift.
4) Age verification or other Authentication tied to the anonymous Identity. a. Working with a third party certifier, or authenticator (like verisign, or a credit card company, etc.) the invention can determine to "Internet standards" whether a person is "authentic" to conduct a transaction (use a credit card, has sufficient funds, etc, watch adult content on the net, etc.). The invention can then take an authentication key from that third party source and verify that the setting up of an account for an anonymous individual should be done for them as: a. An adult b. A citizen c. Capable of doing a financial transaction d. Other qualifying factor, such as driver's license #, thumbprint, etc, licensed or legally able to conduct a particular transaction.
This information can then be used to: allow this person access to content and types of actions possible within the system.
Conduct testing by a third party source, and store testing information associated with the profile information, or other system information, as part of the verification- based transaction system
Chatting, Communities, and Sending and Receiving "Anonymous" emails, announcements, etc. A User and/or Business can request to "send" messaging to other members of the invention system's population. "Sending" really entails specifying in the LBP language that a particular group is intended to receive this type of content.
Users can "block" other anonymous people who have authored "sent" information by identifying a piece of content and saying "delete" or "block author" using GUI tools.
Users can also set "permit direct conversation" which means that on-line chat-type permission levels could be granted to another system anonymous individual, or "blocked" as the User wished.
Feedback loop on "filtered out" or "deleted" sites, "entities" or "content"
When a User determines that they wish to block a site from the "sites list" or a piece of content's author from future communications, the invention can be configured to invite that User to immediately get in touch with that entity and let them know why. This is a powerful customer relationship management feedback loop for businesses. The invention can thus provide "real time" feedback to businesses about:
1) What types of individuals (based on the demographic profile of that individual) are tuning them out;
2) Qualitative information about why - the invention can offer direct access to a company's 800 number, on-line "chat" or "email to that company" while the person is making the decision to "filter them out".
Sweepstakes Anonymously
A User can be entered into a subject category "sweepstakes" on the subject area of the system "Map" each time they visit a particular subject area, or meet some other defined criteria selected by the sponsoring business holding the sweepstakes. An anonymous "ticket" is recorded to that "anonymous individual". If that ticket is selected, a notification appears to that individual that they've won the sweepstakes, and that authenticated email has a verification code and authorization process to validate that the message is going to the right individual.
Sweepstakes "extra chances" can be tied to business agendas of :
1) performing a behavior that sponsoring business requests voluntarily - i.e., watching an infomercial through the messaging layer and answering a survey
2) participating in an "on-line focus group" Coupons, Promotions, that "remind you" that they need to be spent at a vendor's site.
How the Language Looks, Sounds, etc.
Because the Language Based Protocol is able to be displayed or presented to the User or Business in visual "type" or "sounds" or "pictures" or any other symbolic set, children, adults, etc. can determine which "symbol dictionary" they wish to use, and these can be cross- referenced to each other.
Example: A child can use pictures, navigate the subject map and drag and drop them together. The symbol that looks like a "house" would be cross referenced to:
1) house (English)
2) casa (Spanish)
Because the system stores "house" and "casa" and "symbol for house" as OBJECTS in it's object dictionary, it doesn't matter which "word" was selected by which language group to make the transaction happen.
Automated systems of any kind can be made to interact with the classification including transaction processing, marketplaces, recall or alert systems, biomedical applications.
Transaction processing - an amount of $ can be identified as associated with a statement, and transactable when the appropriate conditions within the statement are met.
Marketplaces - physical goods and the rules for their exchange can be implemented with Statements. In addition, manufacturing resource planning, commodities trading, etc. could be linked to the information gathered within the demographics system. As an example, projected anticipated buying self-reports (buy wine in California in 2 months), could inform planning, manufacturing and resource behaviors. Trends analysis, etc. could be conducted based on this information and its correlation to things such as the CPI, GNP, etc.
Recall or alert systems - Profiles or ownership of consumer goods, Profession, prescription drug profile, physical fitness, personality, or other characteristics could be created, wherein a person could be notified through the inventive messaging system if they fit a particular profile pattern - i.e., taking a combination of medicines which were now known to be high risk in combination, a manufacturer or supplier could issue an alert to that population that their profile, if accurate, might put them in a risk population. Not only would this recall alert information based on profile allow for notification of individuals, it could also be used in research as indicated within the characteristics of the Demographics Analysis system. For instance, information could be gathered that individuals who state themselves to be very physically active do not take combination XYZ of health remedies as often as members of a demographic group with a less physically active self-reported profile.
Another example would be the ability to state a professional profile, and the ability to be contacted with alerts regarding legislation, new products, employment offers, etc. relative to that profile. Analysis of this information as well would be useful.
Biomedical applications - for instance, a person can wear a device which stores and records via speech recognition the statements which a person describes about their daily actions, moods, etc. and the times of day. This data can be compared with data collected via biomedical equipment - heartrate, blood chemistry, respiration, Galvanic Skin Response, etc. for later analysis. It can also be combined with or used in conjunction with devices which could be considered daig or treatment delivery devices - i.e., electronic stimulation devices, controlled delivery/release devices for drugs, etc. where these devices could use information from the person and outside conditions (day time etc.) to affect dosages, treatment, etc. decisions and conditions.
Clinical trial groups where a device which can record a person's mood, activities, etc. as self- described using the system's language, while being monitored for body chemistry, drug levels, etc.
'Drug delivery, electronic stimulation devices, or other delivery treatment or monitoring systems that can be connected to or informed by a device which captures the Individual's self- reported statements (i.e., I feel 75% pain free) via the LBP verbal structure, which can be made about what the individual thinks, feels, or believes is happening objectively around them (i.e., it's a hot and humid day) or (I am now being exposed to an allergen) and may or may not be able to monitor outside circumstances (i.e., weather barometrics, temperature) and monitor internal information of that person (heart rate, pulse, Galvanic Skin response, blood chemistry, EEG of other physically measurable state), and use the combination of this information to make decisions (in real time or on a periodic basis) about dosage of mediation, level of stimulation needed etc. In this regard, a person's self-report would be "digitally collected" by the inventive system and used as a component in research and treatment.
Speech-Control and Computer Input Control of Automated or Robotic Systems Use of the LBP language structure and Role-based segmentation could be implemented to control external conditions in buildings, or to animate robotic systems. Two such instances would be the ability to program the condition and state of one's home or office or automobile via the language system ("Temperature Increase 4:00 PM until 6:00 PM to 72 degrees, Kitchen only") and the ability of systems to respond to the desires of people who were unable to use other controls (i.e., Milk Bring Bed Now) such as the infirm, elderly, paralyzed, etc.
Networking, Disk Storage Systems, Resource allocation, other applications
Networking hardware could read statements and route data based on the data tags. Disk storage cross referenced indexes for legacy data and data architectures for new data using the system's format. Computer and other resources could be automatically allocated to a person based on their Role, a statement, or their entire profile. Optimization , storage, presentation, schemes could be constructed which were informed by the information contained in the Role, statement or behavioral data, or outside factors (time of day, geographic region) or any combination of these. Data access permissions and check-offs or authentication could be tied to identities, Roles, or subject area statements within a particular role (e.g., a particular subject area of data could be identified as accessible only to individuals with a particular role characteristic (VP of marketing) or permission level/ID, etc.).
Although the invention has been particularly shown and described with reference to several preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims

What is claimed is:
1. A system for sending and receiving information, comprising: a user interface for providing a predefined structure of verbal information from which descriptive data is selected to define a role; and a server having a database of descriptive data associated with resource information, wherein upon a request said selected descriptive data of said role is matched with said descriptive data associated with said resource information, and said resource information is provided to said user interface.
2 The system of claim 1, wherein said predefined structure of verbal information is a verbal hierarchy of nouns, verbs and modifiers.
3 The system of claim 1, wherein said resource information comprises at least one web-site address
4 A method for sending and receiving information, the method comprising the steps of: providing a predefined structure of verbal information; defining a role by selecting descriptive data from said predefined structure of verbal information, storing descriptive data associated with resource information; matching said descriptive data associated with resource information with said selected descriptive data of said role; and providing resource information when said descriptive data associated with resource information matches said selected descriptive data of said role
5 The method of claim 4, wherein said predefined structure of verbal information is a verbal hierarchy of nouns, verbs and modifiers.
6 The method of claim 4, wherein said resource data comprises at least one web-site address
7 A method of communicating information by a user to an electronic system, the method comprising the steps of providing a predefined structure of information content from said user, establishing within said structure a verbal hierarchy based upon rules of grammei of a selected language, providing a transmission medium for conveying said information from said user to said system; and establishing within said electronic system at least one device for recognizing said information content and for responding to said content in accordance with said structure's hierarchy
8 The method recited in claim 7 wherein said electronic system comprises a computer and said transmission medium comprises a computer keyboard and a computer mouse
9 The method recited in claim 7 wherein said electronic system comprises a computer and said transmission medium comprises a microphone
10 The method recited in claim 7 wherein said selected language is taken from the group consisting of all known human written languages.
1 1 The method recited in claim 7 wherein said selected language is taken from the group consisting of all known human spoken languages
12 The method recited in claim 7 wherein said selected language is taken from the group consisting of commonly used symbol systems.
13 The method recited in claim 7 wherein said selected language is formed by constructing a set of terms that is unique to said electronic system
14 A language parsing-based human to digital interface communication system comprising a predefined structure of human derived information, a hierarchical set of rules relating to said language, a transmission medium for conveying said information to an electronic device, said electronic device having a language recognition apparatus for responding to said information in accordance with said hierarchical set of rules.
15 The system recited in claim 14 wherein said set of rules is based on established grammatical rules of said language.
16 The system recited in claim 14 wherein said electronic device comprises a digital computer
17 The system recited in claim 14 further comprising means in said electronic device for encrypting said information for further transmission over a non-secure medium
18 The system recited in claim 14 wherein said hierarchical set of rules comprises a ranking based upon relative importance of terms in a group of terms
1 . A method for sending and receiving information concerning a person, but without revealing the legal or physical identity of the person; the method comprising the steps of: providing a predefined structure of said information; selecting descriptive data about said person from said information; associating said descriptive data with a pseudonym and a verifying password; and employing said pseudonym and password as required keys to retrieve and send said information about said person.
PCT/US2000/029958 1999-11-02 2000-10-31 Verbal classification system for the efficient sending and receiving of information WO2001033431A1 (en)

Priority Applications (13)

Application Number Priority Date Filing Date Title
NZ518635A NZ518635A (en) 1999-11-02 2000-10-31 Verbal classification system for the efficient sending and receiving of information
BR0015473-3A BR0015473A (en) 1999-11-02 2000-10-31 Verbal classification system and method for sending and receiving information efficiently, method for communicating information from a user to an electronic system, communication system between a human being and a digital interface based on language analysis, method for sending and receipt of information regarding a person without revealing the person's physical or legal identity
EP00978302A EP1228455A1 (en) 1999-11-02 2000-10-31 Verbal classification system for the efficient sending and receiving of information
US10/129,408 US7478035B1 (en) 1999-11-02 2000-10-31 Verbal classification system for the efficient sending and receiving of information
KR1020027005676A KR20020062299A (en) 1999-11-02 2000-10-31 Verbal Classification System For The Efficient Sending And Receiving Of Information
IL14941400A IL149414A0 (en) 1999-11-02 2000-10-31 Verbal classification system for the efficient sending and receiving of information
JP2001535854A JP2003514282A (en) 1999-11-02 2000-10-31 A language classification system for efficient information transmission and reception
CA002388057A CA2388057A1 (en) 1999-11-02 2000-10-31 Verbal classification system for the efficient sending and receiving of information
MXPA02004473A MXPA02004473A (en) 1999-11-02 2000-10-31 Verbal classification system for the efficient sending and receiving of information.
AU15777/01A AU783072B2 (en) 1999-11-02 2000-10-31 Verbal classification system for the efficient sending and receiving of information
IS6365A IS6365A (en) 1999-11-02 2002-04-26 Word classification system for efficient transmission and reception of information
NO20022080A NO20022080L (en) 1999-11-02 2002-05-02 Verbal classification system for efficient transmission and reception of information
AU2006202288A AU2006202288A1 (en) 1999-11-02 2006-05-29 Verbal classification system for the efficient sending and receiving of information

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16307899P 1999-11-02 1999-11-02
US60/163,078 1999-11-02

Publications (1)

Publication Number Publication Date
WO2001033431A1 true WO2001033431A1 (en) 2001-05-10

Family

ID=22588393

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/029958 WO2001033431A1 (en) 1999-11-02 2000-10-31 Verbal classification system for the efficient sending and receiving of information

Country Status (15)

Country Link
US (1) US7478035B1 (en)
EP (1) EP1228455A1 (en)
JP (1) JP2003514282A (en)
KR (1) KR20020062299A (en)
CN (1) CN1387653A (en)
AU (1) AU783072B2 (en)
BR (1) BR0015473A (en)
CA (1) CA2388057A1 (en)
IL (1) IL149414A0 (en)
IS (1) IS6365A (en)
MX (1) MXPA02004473A (en)
NO (1) NO20022080L (en)
NZ (1) NZ518635A (en)
WO (1) WO2001033431A1 (en)
ZA (1) ZA200203195B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7222369B2 (en) * 2001-12-20 2007-05-22 Sap Ag Role-based portal to a workplace system
US7653688B2 (en) 2003-11-05 2010-01-26 Sap Ag Role-based portal to a workplace system
FR2938948A1 (en) * 2008-11-25 2010-05-28 Christian Lerch Address directory for use in server that is accessible via e.g. Internet, has space that is accessible by client to update, in real time, data contained in modifiable fields, where access is authorized by identification code of client

Families Citing this family (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10296919B2 (en) 2002-03-07 2019-05-21 Comscore, Inc. System and method of a click event data collection platform
US20080189408A1 (en) 2002-10-09 2008-08-07 David Cancel Presenting web site analytics
US8095589B2 (en) 2002-03-07 2012-01-10 Compete, Inc. Clickstream analysis methods and systems
US7890451B2 (en) * 2002-10-09 2011-02-15 Compete, Inc. Computer program product and method for refining an estimate of internet traffic
US20050228657A1 (en) * 2004-03-31 2005-10-13 Wu Chou Joint classification for natural language call routing in a communication system
US7869989B1 (en) * 2005-01-28 2011-01-11 Artificial Cognition Inc. Methods and apparatus for understanding machine vocabulary
US9454762B2 (en) * 2005-03-18 2016-09-27 Samuel Robert Gaidemak System and method for the delivery of content to a networked device
US9105028B2 (en) 2005-08-10 2015-08-11 Compete, Inc. Monitoring clickstream behavior of viewers of online advertisements and search results
US20070100862A1 (en) 2005-10-23 2007-05-03 Bindu Reddy Adding attributes and labels to structured data
US7933900B2 (en) 2005-10-23 2011-04-26 Google Inc. Search over structured data
US8073929B2 (en) * 2005-12-29 2011-12-06 Panasonic Electric Works Co., Ltd. Systems and methods for managing a provider's online status in a distributed network
US9990110B1 (en) 2006-08-14 2018-06-05 Akamai Technologies, Inc. Private device cloud for global testing of mobile applications
US9720569B2 (en) 2006-08-14 2017-08-01 Soasta, Inc. Cloud-based custom metric/timer definitions and real-time analytics of mobile applications
US9154611B1 (en) 2006-08-14 2015-10-06 Soasta, Inc. Functional test automation for gesture-based mobile applications
US7844036B2 (en) * 2006-08-14 2010-11-30 Soasta, Inc. Visual test automation tool for message-based applications, web applications and SOA systems
US20080133513A1 (en) * 2006-11-30 2008-06-05 Trinity Alliance Corporation Systems and Methods for Providing, Accessing and Returning Results on Advertising and Service Opportunities
US7987185B1 (en) 2006-12-29 2011-07-26 Google Inc. Ranking custom search results
US10007895B2 (en) * 2007-01-30 2018-06-26 Jonathan Brian Vanasco System and method for indexing, correlating, managing, referencing and syndicating identities and relationships across systems
US20080034408A1 (en) * 2007-04-23 2008-02-07 Sachin Duggal Network-Based Computing Service On A Streamed Virtual Computer
US8756293B2 (en) 2007-04-23 2014-06-17 Nholdings Sa Providing a user with virtual computing services
US20090132311A1 (en) * 2007-11-20 2009-05-21 Theresa Klinger Method and System for Monetizing User-Generated Content
US8275682B2 (en) * 2008-02-29 2012-09-25 The Nielsen Company (Us), Llc. Systems and methods for consumer price index determination using panel-based and point-of-sale market research data
US8244517B2 (en) 2008-11-07 2012-08-14 Yahoo! Inc. Enhanced matching through explore/exploit schemes
US8301624B2 (en) 2009-03-31 2012-10-30 Yahoo! Inc. Determining user preference of items based on user ratings and user features
WO2010135359A2 (en) * 2009-05-19 2010-11-25 Smx Inet Global Services Sa Providing a local device with computing services from a remote host
US8612435B2 (en) * 2009-07-16 2013-12-17 Yahoo! Inc. Activity based users' interests modeling for determining content relevance
US10229191B2 (en) * 2009-09-09 2019-03-12 Varonis Systems Ltd. Enterprise level data management
CN102656553B (en) 2009-09-09 2016-02-10 瓦欧尼斯系统有限公司 Enterprise Data manages
US20110161172A1 (en) * 2009-12-30 2011-06-30 Wei-Yeh Lee System and method for providing user control of the user's network usage data and personal profile information
US8600979B2 (en) 2010-06-28 2013-12-03 Yahoo! Inc. Infinite browse
US8817966B2 (en) 2010-07-08 2014-08-26 Lisa Marie Bennett Wrench Method of collecting and employing information about parties to a televideo conference
US9229842B2 (en) 2010-07-19 2016-01-05 Soasta, Inc. Active waterfall charts for continuous, real-time visualization of website performance data
US8341462B2 (en) 2010-07-19 2012-12-25 Soasta, Inc. System and method for provisioning and running a cross-cloud test grid
US9021362B2 (en) 2010-07-19 2015-04-28 Soasta, Inc. Real-time analytics of web performance using actual user measurements
US9495473B2 (en) 2010-07-19 2016-11-15 Soasta, Inc. Analytic dashboard with user interface for producing a single chart statistical correlation from source and target charts during a load test
US9251035B1 (en) 2010-07-19 2016-02-02 Soasta, Inc. Load test charts with standard deviation and percentile statistics
US9436579B2 (en) 2010-07-19 2016-09-06 Soasta, Inc. Real-time, multi-tier load test results aggregation
US20130061179A1 (en) * 2011-09-07 2013-03-07 Bank Of America Identification and escalation of risk-related data
US9785533B2 (en) 2011-10-18 2017-10-10 Soasta, Inc. Session template packages for automated load testing
US8954580B2 (en) 2012-01-27 2015-02-10 Compete, Inc. Hybrid internet traffic measurement using site-centric and panel data
US9900395B2 (en) 2012-01-27 2018-02-20 Comscore, Inc. Dynamic normalization of internet traffic
US9772923B2 (en) 2013-03-14 2017-09-26 Soasta, Inc. Fast OLAP for real user measurement of website performance
US10601674B2 (en) 2014-02-04 2020-03-24 Akamai Technologies, Inc. Virtual user ramp controller for load test analytic dashboard
US10346431B1 (en) 2015-04-16 2019-07-09 Akamai Technologies, Inc. System and method for automated run-tme scaling of cloud-based data store
US9571788B2 (en) 2015-06-10 2017-02-14 Sorenson Communications, Inc. Communication systems, communication devices, and related methods for routing calls between communication devices having users with different abilities
CA3076921C (en) 2017-10-11 2022-06-14 Pear Therapeutics, Inc. Systems and methods for ensuring data security in the treatment of diseases and disorders using digital therapeutics

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4914590A (en) * 1988-05-18 1990-04-03 Emhart Industries, Inc. Natural language understanding system
US5895459A (en) * 1996-03-05 1999-04-20 Fujitsu Limited Information processing device based on object network

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6014626A (en) * 1994-09-13 2000-01-11 Cohen; Kopel H. Patient monitoring system including speech recognition capability
US5758257A (en) * 1994-11-29 1998-05-26 Herz; Frederick System and method for scheduling broadcast of and access to video programs and other data using customer profiles
US6144934A (en) * 1996-09-18 2000-11-07 Secure Computing Corporation Binary filter using pattern recognition
US5897639A (en) * 1996-10-07 1999-04-27 Greef; Arthur Reginald Electronic catalog system and method with enhanced feature-based search
JP3121548B2 (en) * 1996-10-15 2001-01-09 インターナショナル・ビジネス・マシーンズ・コーポレ−ション Machine translation method and apparatus
AU6240398A (en) * 1997-01-14 1998-08-03 Benjamin Slotznick System for calculating occasion dates and converting between different calendar systems, and intelligent agent for using same
US6349275B1 (en) * 1997-11-24 2002-02-19 International Business Machines Corporation Multiple concurrent language support system for electronic catalogue using a concept based knowledge representation
US6772139B1 (en) * 1998-10-05 2004-08-03 Smith, Iii Julius O. Method and apparatus for facilitating use of hypertext links on the world wide web
US6484136B1 (en) * 1999-10-21 2002-11-19 International Business Machines Corporation Language model adaptation via network of similar users

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4914590A (en) * 1988-05-18 1990-04-03 Emhart Industries, Inc. Natural language understanding system
US5895459A (en) * 1996-03-05 1999-04-20 Fujitsu Limited Information processing device based on object network

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7222369B2 (en) * 2001-12-20 2007-05-22 Sap Ag Role-based portal to a workplace system
US7653688B2 (en) 2003-11-05 2010-01-26 Sap Ag Role-based portal to a workplace system
FR2938948A1 (en) * 2008-11-25 2010-05-28 Christian Lerch Address directory for use in server that is accessible via e.g. Internet, has space that is accessible by client to update, in real time, data contained in modifiable fields, where access is authorized by identification code of client

Also Published As

Publication number Publication date
IL149414A0 (en) 2002-11-10
AU783072B2 (en) 2005-09-22
IS6365A (en) 2002-04-26
CN1387653A (en) 2002-12-25
EP1228455A1 (en) 2002-08-07
CA2388057A1 (en) 2001-05-10
JP2003514282A (en) 2003-04-15
MXPA02004473A (en) 2004-09-10
NZ518635A (en) 2004-02-27
BR0015473A (en) 2002-07-09
KR20020062299A (en) 2002-07-25
ZA200203195B (en) 2002-10-04
NO20022080D0 (en) 2002-05-02
NO20022080L (en) 2002-06-28
US7478035B1 (en) 2009-01-13
AU1577701A (en) 2001-05-14

Similar Documents

Publication Publication Date Title
AU783072B2 (en) Verbal classification system for the efficient sending and receiving of information
US7630986B1 (en) Secure data interchange
US20190370824A1 (en) Contextual task or action menu or shortcuts
US8214386B2 (en) System and method for structured news release generation and distribution
US7966647B1 (en) Sending personal information to a personal information aggregator
US8930204B1 (en) Determining lifestyle recommendations using aggregated personal information
US6029195A (en) System for customized electronic identification of desirable objects
US6904408B1 (en) Bionet method, system and personalized web content manager responsive to browser viewers' psychological preferences, behavioral responses and physiological stress indicators
US6697824B1 (en) Relationship management in an E-commerce application framework
US20070067297A1 (en) System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users
US20050203800A1 (en) System and method for compounded marketing
US20050004837A1 (en) System and method for compounded marketing
JPH11514764A (en) System for customized electronic identification of desired objects
US8768773B2 (en) Interactive system for providing an individual with control of the collection/distribution and content management of transaction and activities data
CN101073094A (en) Universal network market system
TW491972B (en) System, method, and article of manufacture for electronic merchandising in an e-commerce application framework
Adams Agreeing to surveillance: Digital news privacy policies
Peters Computerized monitoring and online privacy
CN101506833A (en) Apparatuses, methods and systems to identify, generate, and aggregate qualified sales and marketing leads for distribution via an online competitive bidding system
Suresh Kumar et al. Dynamics of Swarm Intelligence Health Analysis for the Next Generation
AU2006202288A1 (en) Verbal classification system for the efficient sending and receiving of information
McCarthy et al. Building relationships that last: Integrating public relations into web design
Dostál et al. Algorithms: The new leaders of the advertising market
Bobev Track or Treat: Personal Data Protection and Behavioural Targeting in Web Advertising
TWI310524B (en) System and method for administering incentive offers

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AU AZ BA BB BG BR BY BZ CA CN CR CU CZ DM DZ EE GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LV MA MD MG MK MN MW MX MZ NO NZ PL RO RU SD SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2388057

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 2002/03195

Country of ref document: ZA

Ref document number: 200203195

Country of ref document: ZA

WWE Wipo information: entry into national phase

Ref document number: 518635

Country of ref document: NZ

WWE Wipo information: entry into national phase

Ref document number: 008152721

Country of ref document: CN

Ref document number: 149414

Country of ref document: IL

ENP Entry into the national phase

Ref document number: 2001 535854

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 10129408

Country of ref document: US

Ref document number: 1020027005676

Country of ref document: KR

Ref document number: PA/a/2002/004473

Country of ref document: MX

Ref document number: IN/PCT/2002/592/KOL

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2000978302

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 15777/01

Country of ref document: AU

WWP Wipo information: published in national office

Ref document number: 1020027005676

Country of ref document: KR

WWP Wipo information: published in national office

Ref document number: 2000978302

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 518635

Country of ref document: NZ

WWG Wipo information: grant in national office

Ref document number: 518635

Country of ref document: NZ

WWG Wipo information: grant in national office

Ref document number: 15777/01

Country of ref document: AU