Claims
- 1. A method comprising:
routing a first portion of information to a first device and at least one other portion of information to at least one other device in response to a user's query, said method including:
receiving said query and identifying said user's meeting a first identification criterion; forming an identification when said first identification criterion is met; employing said identification in forming said first portion of information and said at least one other portion of information; and forwarding said first portion of information to said first device and said at least one other portion of information to said at least one other device.
- 2. A method as recited in claim 1, wherein said step of identifying is performed by an identifier, and step of employing is performed by a respondent server.
- 3. A method as recited in claim 1, wherein said first device is a user device employed in making said query, and said step of identifying includes identifying said user device employing identification criteria.
- 4. A method as recited in claim 3, wherein one of said identification criteria is a criterion selected from a group of criteria including: identifying a device identification; identifying a device group identification; identifying a user identification; identifying a user group identification; authenticating user of said device by user identification and password; employing a verification signature included in said query; employing an RF id tag; employing a 3rd party mechanism; and
any combination of said criteria.
- 5. A method as recited in claim 3, wherein said step of identifying further includes verifying said user meeting a verification criteria.
- 6. A method as recited in claim 5, wherein said verification criterion is a criterion selected from a group of criteria including: verifying a device identity; verifying a device group identity; verifying a user identity; verifying a user group identity; authenticating user of said device by user identification and password; employing a verification signature included in said query; employing an RF id tag; employing a 3rd party device; and
combination of said criteria.
- 7. A method as recited in claim 1, further comprising a first entity supplying said first device to a user.
- 8. A method as recited in claim 7, wherein said first entity is a business and said user is a customer.
- 9. A method as recited in claim 5, further comprising:
said user employing said first device in a session; and associating said user for said session employing said verification.
- 10. A method as recited in claim 2, wherein said respondent server is also said identifier.
- 11. A method as recited in claim 1, wherein said step of receiving said query [and identifying] said user's meeting a first identification criterion, includes at least one step from a group of steps including:
user pre-registering query; utilizing user criteria; selecting a hyper-link; sending mail.
- 12. A method as recited in claim 1, wherein said first portion of information includes private user information and said at least one other portion of information includes public information.
- 13. A method as recited in claim 1, wherein content included in said first portion of information and/or included in said at least one other portion of information is based on a preference criterion.
- 14. A method as recited in claim 13, wherein said preference criterion is a criterion selected from a group of criteria including: security level; user profile; user data; user history; preferred customer status; user affiliation; user service level association; time of day; day of year; religion; ethnic background; national background; gender; sexual orientation; demographic information; context; inventory; classification level; and
any combination of the above.
- 15. A method as recited in claim 14, further comprising changing preference criteria dynamically.
- 16. A method as recited in claim 15, wherein said step of changing preference criteria is performed dynamically during a session.
- 17. A method as recited in claim 16, wherein preference criteria change dynamically during a session by a user.
- 18. A method as recited in claim 1, further comprising forming a user profile database for a plurality of users.
- 19. A method as recited in claim 13, further comprising forming a user profile database for a plurality of users based on said preference criteria.
- 20. A method as recited in claim 16, wherein said step of forming is repeated in accordance with a database update criterion.
- 21. A method as recited in claim 20, wherein said database update criterion is a criterion selected from a group of criteria including:
change of preference criteria by user; change of identification criteria; information access; change of context; and any combination of the above criteria.
- 22. A method as recited in claim 18, wherein said step of forming an identification when said first identification criterion is met, includes:
identifying user; and associating said user with said user profile.
- 23. A method as recited in claim 1, wherein said step of forming an identification when said first identification criterion is met, includes:
identifying user; associating said user with said identification criterion;
- 24. A method as recited in claim 18, wherein said step of forming an identification when said first identification criterion is met includes:
associating said identification criterion with user profile.
- 25. A method as recited in claim 19, wherein said step of employing said identification in forming said first portion of information and said at least one other portion of information, includes:
creating rules for forming said first portion and said at least one other portion based on said preference criteria; employing said rules to form said first portion and said at least one other portion;
- 26. A method as recited in claim 1, wherein said step of forwarding includes encrypting said first portion with a first encryption key and/or encrypting at least one of said at least one other portion with at least one other encryption key.
- 27. A method as recited in claim 26, further comprising at least one encrypting marker indicating that one of said portions is encrypted.
- 28. A method as recited in claim 27, wherein at least one of said at least one encrypting markers is encrypted.
- 29. A method as recited in claim 27, wherein each marker in a plurality of said at least one of said at least one encrypting markers is a unique marker indicating requirement of a unique decrypting key.
- 30. An apparatus comprising:
means for routing a first portion of information to a first device and at least one other portion of information to at least one other device in response to a user's query, said means for routing including:
means for receiving said query and identifying said user's meeting a first identification criterion; means for forming an identification when said first identification criterion is met; means for employing said identification in forming said first portion of information and said at least one other portion of information; and means for forwarding said first portion of information to said first device and said at least one other portion of information to said at least one other device.
- 31. A method comprising employing a communications network to which terminal devices are attached for executing browser applications capable of rendering digital information organized into documents, said communication network having at least one database attached for storing digital information organized into documents and being capable of supplying said documents for rendering to said browser applications in said terminal devices, wherein users of said terminal devices are each able to engage in at least one interactive browsing application for viewing a sequence of a plurality of said documents, wherein at least one document from said sequence comprises at least one identifiable portion is associated with particular users belonging to at least one identifiable group of users of said terminal devices, said method including the steps:
a plurality of said users identifying themselves as belonging to one of said at least one identifiable group of users, and wherein at least one particular user identifies oneself as belonging to a first group of users, said users interacting with at least one of the terminal devices in browsing a sequence of at least one document supplied from one database of said at least one document database, and rendering a first portion of a particular document associated with said first group of users during the duration of one interactive application, wherein the document databases supply a sequence of information documents to the terminal devices, at least one of the terminal devices being used by the users in the first group of users.
- 32. A method as related in claim 31, wherein said first portion of a document which is associated with the users in the first group of users, includes less than the entire document at least once in said sequence of documents rendered on the terminals used by users belonging to the first group, and further comprising at least one step taken from a group of steps including:
rendering a second portion of the document not identified as belonging to the first portion of the document to at least one other terminal device while not rendering said first portion of the document; assigning a different portion of the document not identified as belonging to the first portion of the document to belong to a third portion of the document which is associated with users of terminals belonging to a second group of users; associating at least one portion of each said document with user terminals belonging to an identifiable group of users; and rendering each of said portions of said document only on the terminals used by a particular group of users associated with said particular portion of the document.
- 33. A method as recited in claim 31, further comprising at least one step taken from a group of steps including:
identifying said user via digital information provided via at least one terminal device used by said user; wherein a device identifier is a unique identifier assigned to a network interface card attached to said terminal device to the computer communications network, and identifying the user via user information provided through the terminal devices used by said user; identifying said user via user information provided during a log-in action to said interactive browsing application for viewing a sequence of documents from one document database; using said digital information for user identification for associating the user with a particular group of users; disassociating the user with the particular group of users after a defined period of inactivity on a communications link; requiring new user identification upon start of a continuation of activity; using said digital information for user identification for associating the user with a particular group of users; disassociating the user with the particular group of users upon user log-off; and requiring new user identification upon a next log-in.
- 34. The method as recited in claim 31, further comprising at least one step taken from a group of steps including:
said user receiving at least one other portion of a document based on at least one criterion; employing said criteria in associating various portions of said document according to one or more levels of preference; relating said levels of preference to a degree of privacy for each portion of each document; forming said criteria as being users belonging to at least one group of users during at least one session; storing said criteria together with a document; storing said criteria for each user group in a user group profile in a database; updating said user group profile in the database with new criteria during at least one session; and updating said user group profile in the database with new criteria based on a history of document accesses.
- 35. In a computer communications network with at least one terminal computer and at least one server computer, a method comprising using a unique identifier of a terminal computer as a unique identifier of its user, said method including the steps of:
a user using the terminal computer to authenticate said user with at least one server; said server receiving a unique device identifier from said terminal computer; said server using said user authentication and/or unique device identifier in creating an association between said user and said terminal computer, and maintaining said association in effect in accordance with a maintenance policy.
- 36. A method comprising:
distributing data containing private information to multiple recipients; breaking said data into at least one fragment; and encrypting each fragment using one encryption key.
- 37. The method as recited in claim 36, wherein each of said recipients is a member of at least one group sharing an encryption key, and/or further comprising at least one step taken from a group of steps including:
each of said recipients decoding fragments of the data using said encryption key and deciding whether a result is valid based on information in the data; adding meta information to at least one encrypted fragment; adding each encoded fragment with at least one wrapper around it to the final document; adding meta information to at least one fragment before encryption; wrapping each fragment with at least one wrapper; the decoder deciding whether the decoded fragment is valid based on meta information; and the decoder matching the meta information of the encrypted fragment with the meta information of the decoded fragment.
- 38. A method comprising:
employing a computer display terminal used for executing at least one interactive application by at least two groups of users, said method including the steps:
identifying each of said users of the display terminal as belonging to a particular one of said groups of users; engaging a user interactive application through the display terminal; associating each at least one interactive application with said particular one of said groups; each user using the interactive applications from said particular one of said groups of users and sharing computer display computing resources; and managing partitions in displaying differing information to each group.
- 39. The method as recited in claim 38, further comprising at least one step taken from a group of steps including:
using said display sequentially for each of said group; switching between pluralities of interactive applications suitable to each group of users after a defined period of time.
- 40. The method as recited in claim 39, wherein:
the computer resources that manage what is displayed on the display terminal share the display among the groups of users that use it in space simultaneously, and/or space occupied by each of the interactive applications on the display changes with time; and/or the computer resources that manage what is displayed on the display terminal share the display in time and/or space among the group of users using the display terminal.
- 41. The method as recited in claim 40, wherein the computer resource that manages what is displayed on the display terminal shares the display in time and/or space among the group of users using the display terminal, and further comprising restricting the maximum number of users that can view a particular interactive application on the display terminal to a preset maximum number of users, and/or groups of users engaged in interactive applications through the display terminal time sharing the display terminal when the preset maximum number of users is exceeded.
- 42. An article of manufacture comprising a computer usable medium having computer readable program code means embodied therein for causing information routing, the computer readable program code means in said article of manufacture comprising computer readable program code means for causing a computer to effect the steps of claim 1.
- 43. An article of manufacture comprising a computer usable medium having computer readable program code means embodied therein for causing information routing, the computer readable program code means in said article of manufacture comprising computer readable program code means for causing a computer to effect the steps of claim 31.
- 44. An article of manufacture comprising a computer usable medium having computer readable program code means embodied therein for causing identifier usage, the computer readable program code means in said article of manufacture comprising computer readable program code means for causing a computer to effect the steps of claim 35.
- 46. An article of manufacture comprising a computer usable medium having computer readable program code means embodied therein for causing executing at least one interactive application by at least two groups of users, the computer readable program code means in said article of manufacture comprising computer readable program code means for causing a computer to effect the steps of claim 38.
- 47. A program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform method steps for information routing, said method steps comprising the steps of claim 1.
- 48. A computer program product comprising a computer usable medium having computer readable program code means embodied therein for causing routing, the computer readable program code means in said computer program product comprising computer readable program code means for causing a computer to effect the functions of claim 30.
PRIORITY
[0001] This application claims priority to Provisional application entitled, “Information Content Distribution Based on Privacy and/or Personal Information”, attorney [agent]docket number, YOR920010762US1, filed Nov. 30, 2001, assigned serial No. 60/334,367.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60334367 |
Nov 2001 |
US |