Method and device for publishing cross-network user behavioral data

Information

  • Patent Grant
  • 9495446
  • Patent Number
    9,495,446
  • Date Filed
    Monday, March 1, 2010
    14 years ago
  • Date Issued
    Tuesday, November 15, 2016
    7 years ago
Abstract
The present invention relates to summarizing cross-network user behavioral data. The summarizing cross-network user behavioral data may particularly include publishing the data to one or more data structures that become accessible to a server hosting an authorized domain when a user accesses the authorized domain.
Description
BACKGROUND

The present invention relates to summarizing cross-network user behavioral data and further relates to restoring damaged data structures, either data structures summarizing cross-network user behavioral data or data structures remotely identifying to logic running on a user computer. The summarizing cross-network user behavioral data may particularly include publishing the data to one or more data structures that become accessible to a server hosting an authorized domain when a user accesses the authorized domain. The restoring of damaged data structures may particularly include automatically detecting deletion of or damaged to data structures and restoring the damaged data structures.


Advertising is most successful when it matches the viewer's desires. When the viewer uses a client computer to surf the web and visit websites hosted by servers, advertising can be targeted. One way to target users is to provide sponsored links in response to a search, using a search engine such as the engines provided by Google and Yahoo. Another way is to trigger advertising when a user visits a website, for instance using a so-called web beacon. Cookies can be used to identify a user that is searching or visiting a website and match the user to a server-side database that selects advertising to deliver. Server-side databases currently reflect information collected by servers connected to websites that users visit. Websites that are aggregated into a particular server-side database can be described as belonging to a user behavior collection network.


An opportunity arises to better target users, taking advantage of client software running on the client computer. Client-side software can monitor a user's web browsing activity, regardless of whether websites visited belong to a first or second user behavior collection network or no network at all. New technology can publish user behavior data during browsing and reduce or eliminate reliance on matching the user to the server-side database.


SUMMARY OF THE INVENTION

The present invention relates to summarizing cross-network user behavioral data. The summarizing cross-network user behavioral data may particularly include publishing the data to one or more data structures that become accessible to a server hosting an authorized domain when a user accesses the authorized domain. Particular aspects of the present invention are described in the claims, specification and drawings.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a schematic illustration of a client computer interacting with a server and a behavior responsive server.



FIG. 2 illustrates a schematic diagram of a computer network.



FIG. 3 illustrates browsing to a search engine “FindersKeepers”.



FIG. 4 shows a browser displaying search results.



FIG. 5 depicts a page in a familiar browser for a “Search+” web site.



FIG. 6 is an example of a cookie that stores the most recent commercial keyword of interest.



FIG. 7 is an example of summary data maintained by the behavior watcher that may be written to persistent memory.



FIG. 8 illustrates a bit string further summarized by category.



FIG. 9 illustrates buckets that may be applied to recency of using search words, clicking through, entering URL destinations or other indications of user interest.



FIG. 10 illustrates buckets that can be applied to user category involvement.



FIG. 11 illustrates how a category ID can be associated with both the category name and a revenue priority.



FIG. 12 illustrates interaction among the client computer, a server and a reported-behavior responsive server.



FIG. 13 depicts one embodiment of information flow among the behavior watcher, the browser, one or more servers, one or more reported-behavior responsive servers, persistent memory, and cookie memory.



FIG. 14 depicts republication and restoration of cookies.





DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

The following detailed description is made with reference to the figures. Preferred embodiments are described to illustrate the present invention, not to limit its scope, which is defined by the claims. Those of ordinary skill in the art will recognize a variety of equivalent variations on the description that follows.


To illustrate an environment in which the present invention may be useful, we point to and incorporate by reference U.S. application Ser. No. 10/289,123, now U.S. Pat. No. 7,512,603, entitled “Responding to End-User Request for Information in a Computer Network” by inventors Eugene A. Veteska, David L. Goulden, and Anthony G. Martin, filed on Nov. 5, 2002, and issued on Mar. 11, 2009. Some of the discussion that immediately follows is borrowed from the prior application, which is commonly owned, but much is recast to a new paradigm of assembling user profile information client-side and publishing it using cookies.


Although embodiments of the present invention are described herein in the context of the Internet, the present invention is not so limited and may be used in other data processing applications.



FIG. 1 is a schematic illustration of a client computer 100 interacting with a server 130 and a behavior responsive server 132. In FIG. 1, an end-user on a client computer indicates their interest in a subject by submitting a search request to a search engine, typing a URL or clicking on a link or banner ad. Their interest becomes a request across on a network such as the Internet. A search engine may perform an Internet-wide search, or a search limited to a particular web site or domain name, or a search limited in some other way. The search request may be a query comprising one or more keywords, for example. The original search engine server 130 responds to the search request by sending a search result to the client computer 100. The search result may include a list of documents (e.g., web pages), links to documents, or other information relating to the keywords. A specific example of the just described scenario is an end-user typing the keyword “car” in a search engine and receiving back links to web sites that talk about car clubs, exotic cars, car racing, and like information.


A user submits a search request because of the user's interest in a topic. To make good use of the information about a user's interest, a behavior watching and/or behavior summarizing program 120 resident in the client computer listens for requests, for instance made using a browser 110 or other hyperlink enabled programs such as word processors or presentation programs. It listens for requests for information such as a search request, a click-through on a banner ad, or entry into the browser or click through of a destination URL. When the behavior watching program 120 detects that an end-user is performing a search or otherwise indicating their interest in a web site or subject, the behavior watching program records the interest. The interest may be recorded to program memory or to a persistent memory 122. When a user clicks on an advertisement related to the end-user's search request, the probability that the end-user will be interested in one or more related advertisements increases. In the car example, just above, the behavior watching program may note that the search was followed by certain click-throughs.


The behavior watcher 120 is resident in the client computer 100 so that it can respond to an end-user's search request even when the end-user uses different search engines. That is, unlike other targeting techniques that only work when an end-user is on a particular web site, the behavior watching program observes user interest across different search engines, web sites and even browsers. An end-user may obtain the behavior watching program by itself or along with free or reduced-cost computer programs, services, and other products.


The behavior responsive server 132 presents a new approach to providing content responsive to recent user behavior. User behavior has in the past been observed using a cookie with a unique user ID that allows server-side tracking. Server aggregated user behavior data is compiled among an organization of cooperating server owners. Cooperation may relate to ad serving (e.g., Double-Click), portals (e.g., Yahoo), search engines (e.g., Google) or other organizational basis. Cooperation in this sense is contractual more than technical. Server aggregated user behavior data is used, for instance, by an ad server when a web beacon (a small, null image with a URL pointing to an ad server) contacts the ad server and causes a unique user ID cookie to be transmitted. The ad server accesses a database, to update user behavior data with the new contact. The ad server could also access data from the server aggregated database, based on the unique user ID. A serious limitation of server aggregated user behavior data is that it is limited to contacts detected by cooperating servers when the user accesses cooperating web sites and the user's unique user ID cookie is transmitted. Mismatches of unique user IDs or multiple unique user IDs for the same user diminish the effectiveness of server-side aggregation. The combination of client-side user behavior tracking 120 and a reported-behavior responsive server 132 presents a new approach.


A reported-behavior responsive server 132 accepts one or more messages (e.g., cookies) that report recent user behavior as a basis for deciding among potential messages (e.g., banner ads) which message to give the user. The reported-behavior responsive server 132 need not access a server-side user behavior database to decide which message to send. Those of skill in the art will recognize that the new paradigm of reported behavior could be combined with server-side aggregation and that that combination also would be novel.



FIG. 2 is shown a schematic diagram of a computer network. Network 200 may include one or more client computers 100, one or more web server computers 130, one or more behavior responsive server computers 132, and other computers not shown. Intermediate nodes such as gateways, routers, bridges, Internet service provider networks, public-switched telephone networks, proxy servers, firewalls, and other network components are not shown for clarity. In the example of FIG. 2, network 200 includes the Internet; however, other types of computer networks may also be used. Computers may be coupled to network 200 using any type of connection 115 without detracting from the merits of the present invention.


A client computer 100 is typically, but not necessarily, a personal computer such as those running the Microsoft Windows™, Apple Macintosh™, Linux, or UNIX operating systems. An end-user may employ a suitably equipped client computer 100 to get on network 200 and access computers coupled thereto. For example, a client computer 100 may be used to access web pages from a web server computer 130. It is to be noted that as used in the present disclosure, the term “computer” includes any type of data processing device including personal digital assistants, digital telephones, wireless terminals, and the like.


A web server computer 130 may host a web site containing information designed to attract end-users surfing on the Internet. A web server computer 130 may host or cooperate with another server that hosts advertisements, downloadable computer programs, a search engine and products available for online purchase. A web server computer 130 may also host or cooperate with an ad server for that delivers advertisements to a client computer 100.


A reported-behavior responsive server computer 132 serves message units for delivery to a client computer 100. The message units may contain advertisements, for example. Message units are further described below. A reported-behavior responsive server computer 132 may also host downloadable computer, programs and files for supporting, updating, or maintaining components on a client computer 100.


Web server computers 130 and reported-behavior responsive server computer 132 are typically, but not necessarily, server computers such as those available from Sun Microsystems, Hewlett-Packard, Dell or International Business Machines. A client computer 100 may communicate with a web server computer 130 or a reported-behavior responsive server computer 132 using client-server protocol. It is to be noted that client-server computing will not be further described here.


The components of a client computer 100 are not illustrated in a separate figure, but are well-understood. In one embodiment, the components of client computer 100 shown in FIG. 1 are implemented in software. It should be understood, however, that components in, the present disclosure may be implemented in hardware, software, or a combination of hardware and software (e.g., firmware). Software components may be in the form of computer-readable program code stored in a computer-readable storage medium such as memory, mass storage device, or removable storage device. For example, a computer-readable storage medium may comprise computer-readable code for performing the function of a particular component. Likewise, computer memory may be configured to include one or more components, which may then be run by a microprocessor. Components may be implemented separately in multiple modules or together in a single module.


As shown in FIG. 1, client computer 100 may include a web browser 110 and a behavior watching program 120. Web browser 110 may be a commercially available web browser or web client running on a client computer 100. In one embodiment, web browser 201 is the Microsoft Internet Explorer™ web browser. In another, it is a Mozilla, Netscape or Apple web browser. Alternatively, a web enabled word processor or presentation program may be monitored by the behavior watcher 120.


The behavior watching program 120 may be downloadable from a message server computer 103. Behavior watching program 120 may be downloaded in conjunction with the downloading of another computer program. For example, behavior watching program 120 may be downloaded to a client computer 100 along with a utility program that is provided free of charge or at a reduced cost. The utility program may be provided to an end-user in exchange for the right to deliver messages to the end-user via behavior watching program 120. In essence, revenue (e.g., advertising fees) from messages delivered to the end-user helps defray the cost of creating and maintaining the utility program. Other components such as operating system components, utility programs, application programs, and the like are not shown for clarity of illustration.


The behavior watcher 120 includes computer-readable program code that compiles a user profile from behavior watching. It monitors web browser 110 for search requests, uniform resource locators (URLs) of web sites visited by an end-user surfing on the Internet and ad click-throughs. FIG. 3 illustrates browsing to a search engine “FindersKeepers”. A user invokes a browser 310 and enters the address of the search engine in an address window 315. Of course, links, buttons, a search bar component or a dedicated searching program (for instance, from the systray) can connect a user with a search engine, through a browser or other program. The address remains visible when the page for the web site is displayed. The user enters search terms “hotrod car” in a window 320. A request is sent or “posted” to the search engine.



FIG. 4 shows a browser 310 displaying search results. Part of the behavior watcher 120 may parse a search request, as part of the process of compiling a user profile. In one embodiment the behavior watcher 120 parses a search request URL displayed in the address window of a web browser in response to a search request, to extract one or more keywords. Popular search engines respond to a search request by pointing the web browser employed by the end-user to a web page containing the search result. The URL of that web page may be parsed to extract the keywords chosen by the end-user for his search. For example, performing a search for “hotrod” and “car” in a fictitious search engine referred to herein as “finderskeepers.com” will result in a web browser being pointed to a web page with the URL (440) http://search.finderskeepers.com/bin/search?p=hotrod+car.


The web page with the URL search.finderskeepers.com/bin/search?p=hotrod+car” contains the search result for the keywords “hotrod” and “car”. Knowing the URL format employed by finderskeepers.com allows extraction of the words following “ . . . /search?p=” and separated by “+”. String manipulation functions may be used to extract keywords from the URL. It is to be noted that different search engines may employ different URL formats. Accordingly, a keyword extractor component of the behavior watcher may first parse the URL to determine the name of the search engine, and then employ parsing rules for that search engine. In the present example, keyword extractor may first parse the URL “http://search.finderskeepers.com/bin/search?p=hotrod+car” to get the name of the search engine, which is “ . . . finderskeepers.com/ . . . ”, and then apply parsing rules for finderskeepers.com. Keyword extractor may take advantage of delimiters and end of string indicators employed by a particular search engine to parse a URL. In one embodiment, keyword extractor includes parsing rules for popular search engines. The keyword extractor also may act on entry or click-throughs of URLs and click-throughs of banner ads, to cross-reference those interest indications to key words. A keyword extractor is further described in the application incorporated by reference.



FIG. 5 depicts a page in a familiar browser 310 for a “Search+” web site. The familiar address window appears just below the button bar and above a tool bar. A search window 520 accepts keyword searches. Search results 521A, 521B are displayed in the body of the browser. Banner ads, which a user is welcome to click through, are positioned at the top 531A and right side 531B of the display.


Referring back to FIG. 4, a keyword extractor also may include a keyword file. In one embodiment, keyword file is a text file containing a list of relevant keywords referred to as “an include list” and a list of non-relevant keywords referred to as an “exclude list”. Note that keyword file may have also have an include list but not an exclude list or vice versa. Keyword file may be downloadable from a server computer 130 to ensure that client computer 100 always has the most current keyword file. Keywords in the include list can be assigned to categories of interest, whereas keywords in the exclude list have no corresponding categories of interest. Keywords in the include list are processed by a keyword processor, whereas keywords in the exclude list are not processed. In one embodiment, keyword processor processes a keyword by sending the keyword to message server computer 130 to obtain further information about the keyword. By first examining the exclude list before sending keywords to server computer 132, keywords that have no corresponding message units are identified at client computer 100, thereby minimizing traffic to server computer 132. Likewise, traffic to server computer 132 may be minimized by first determining if a keyword is in the include list before sending the keyword to message server computer 103.












TABLE 1







Include List
Exclude List









hotrod
paper



car
the



books
for



computer
Britney



cellular
. . .



sports
. . .



wine
. . .



. . .
. . .










In the example of Table 1, the exclude list includes non-relevant words such as commonly used words that are too general to be useful. The exclude list may also include words that have no commercial value. For example, “Britney” may have no commercial value to most advertisers except those affiliated with or licensed by Britney the pop-star.


In the example of Table 1, the include list includes relevant words. In one embodiment, a word is considered relevant if there is a corresponding message unit for that word. For example, the word “computer” may be relevant if there is a message unit containing an advertisement for a personal computer. Similarly, the word “book” may be relevant if there is a message unit relating to books.


Data collected by the behavior watcher 120 are illustrated by FIGS. 6-11. Data are collected to generate a client-side profile. These profiles allow ad servers, which receive reported user behavior data, to improve ad performance. Advertisers will pay more for ads that are directed to interested customers than for ads that are distributed randomly. Moreover, ad impressions that generate click-throughs generate more revenue than ads that are displayed but evoke no response. Ad performance can be improved either by better targeting or greater success in generating click-throughs.


A client-side profile includes things like category visits, searches, user identification, language and time zone. Indications of user interest are assigned to categories. In one embodiment, 200-300 categories are recognized. Of course, fewer or more categories might be recognized. The more categories recognized, the more data bits required to store category IDs. Potentially, categories could be organized hierarchically. Recency may be recorded by time bins, such as within the last hour, 1-2 hours, 2-4 hours, 4-24 hours, 1-7 days, 7-30 days, 31-60 days. Alternatively, bins or categories for 7-14 days, 0-5 minutes, 5-15 minutes, 15-30 minutes and 30-60 minutes may be of interest. Searches for key words of commercial interest may be more important than some other indications of user interest. The behavior watcher 120 may keep track of the last commercial keyword entered in a search and a time bucket for the last commercial keyword entered. Over a certain outer history limit, the time bucket may be empty. Machine-related information may include a unique machine ID, language settings, time zone of the user, and installation date of the relevant software. Data stored either to persistent memory 122 or cookie memory 124 may be compressed and encrypted to save space and prevent hacking. Compression, beyond the categorization described, and encryption schemes are well known and not described here. Cookies, at least, should include version number so that the server receiving the cookie will understand how to interpret the cookie. Other header information may be supplied as desired. Cookies tracking user behavior are written by the behavior watcher 120, as opposed to the server 130.


Machine information is one type of data that may be stored in persistent memory 122 and cookies 124. The information associated with the machine may include version of the cookie, the time written, a unique ID, a locale (such as a ZIP code, area code or something similar), user's time zone, and an application name, version and installation time. Machine information may be rewritten to memory every 24 hours, every new day, or on some other periodic basis. It may be stored as columns separated by delimiters, then encrypted and compressed.


The behavior watcher may track and summarize visits. It may record, such as to persistent memory 122, each indication of user interest, including use of key words in searches, entry of URLs and click-throughs of URLs and banner ads. Banner ads may be segregated into regular banner ads, site exit banner ads that are triggered when leaving a particular URL, brander banner ads that are triggered when visiting a first URL, then displayed in visiting a second URL, and run of network banner ads that are triggered based on a count of navigations from one URL to the next.



FIG. 6 is an example of a cookie that stores the most recent commercial keyword of interest. This may be the most recent commercial keyword of interest from a search or a keyword associated with a URL or click-through. More than one recent commercial keyword of interest may be stored in one or more cookies, following the example of FIG. 6. One attribute or field of this cookie is the version of the crumb 602. Another is the time written 604, which may be expressed in seconds from 1970 to the time the cookie is written. A commercial flag 606 may be used to categorize the keyword type, for instance between key words that are of current commercial interest and key words that are for sale. The keyword may be included 608, either in text or as a shorthand code. A character set 610 such as UFT-8 may be included to assist with decoding of the keyword 608. This may be important in international applications.



FIG. 7 is an example of summary data maintained by the behavior watcher 120 that may be written to persistent memory 122. In this example, a category ID 802 is a shorthand for a particular category. Bins are allocated for a current period 702, such as a day. The periods may be of equal length for different lengths. In one embodiment, a bit string implements the bins. A history of 60 days may be implemented by 60 bits plus storage for a category ID. Each bin corresponds to a particular time segment. A bit flag indicates whether there was activity related to the category during the particular time segment. At a regular time corresponding to the shortest period represented by any bin, the bit string is updated. Data are shifted into older bins, making room in the most recent bin. Data regarding recent activity are summarized into the most recent bin, labeled zero in the figure. If bins represent unequal amounts of time, special provisions are made at the boundaries between shorter and longer time bins, either algorithmically or by allocating additional storage. For instance, activity during any one-hour segment during a preceding day may result in setting the bit flag in a day-long time segment. The day-long time segment is flag “0” only if the hour segment flag at midnight is “0” when the midnight update takes place. This is an example of an algorithmic provision at the boundary between a one-hour segment and a day-long segment. Alternatively, storage may be allocated for bins to record the number of visits in a particular time segment. This may significantly increase the amount of storage required, without necessarily changing how a reported-behavior aware server 132 responds. Compact storage is preferred when there are hundreds of categories and the practical limit for the size of a cookie is 2K to 4K bytes. Cookies can be sent to a server that archives user activity data. The user activity data can be used for analysis or targeting of ads. With the right user ID information, the user activity data could be matched to data from other sources, such as shopper loyalty programs or market research programs. A bit string can be further summarized by category, shown in FIGS. 8-10.



FIG. 9 illustrates buckets that may be applied to recency of using search words, clicking through, entering URL destinations or other indications of user interest. The most recent visit is recorded by membership in a particular bucket. Fifteen or 16 buckets can be indicated with four bits. In the figure, the buckets are of unequal length. A single, most recent visit record such as illustrated by FIG. 6 or an entry kept in memory can be used to assign a category to a particular bucket.



FIG. 10 illustrates buckets that can be applied to frequency of visits. When the bit string of FIG. 7 is organized by days, activity in a category can be assigned to buckets of different visit frequencies, such as 0, 1, 2, 3, 4 or 5, 6 to 10, 11 to 30, or 31 to 60 days out of the last 60 days in which the user indicated interest. The number of bits set in the bit string is counted and summarized using this categorization, as a measure of user category involvement.


With the categorical coding of recency and user category involvement in mind, we turn to FIG. 8. A single cookie may record data for many category IDs 802. For each category ID, three or more metrics of user interest may be recorded. One or more recency 804 categories can be recorded. The recording of recency can be applied to key words or other kinds of user interest indications, described above. One or more frequency 806 categories can be recorded, applied to key words or other kinds of user interest indications. Banner clicks 808 can be separately categorized by recency, frequency or both. The comments in column 810 are editorial comments to explain the data in the table. Category ID 98409 experienced heavy and recent user interest. Category ID 65625 experienced heavy user interest last month. Category ID 68530 experienced light, recent user interest. Category 147374 experienced light activity last month, which probably also should be reflected by a nonzero value under frequency 806.


The behavior watcher 120 preferably sorts the category history information in FIG. 8 so that the most important categories are listed first. Alternatively, the system could leave the category sorting to the reported-behavior responsive server 132. As illustrated in FIG. 11, a category ID 1102 can be associated with both the category name 1104 and a revenue priority 1106. It may be useful to sort category history information by revenue priority 1106, especially if only a portion of the client-sided user behavior data is transmitted to a reported-behavior responsive server 132.



FIG. 12 illustrates interaction among the client computer 100, a server 130 and a reported-behavior responsive server 132. A browser 110 or similar software on the client computer 100 accesses a server 130. Server 130 sends back a web page 1240, which includes embedded references to addresses 1230 and 1232. When the browser 110 accesses web page components identified by the addresses, it may send cookies identified with those addresses 1250, 1252 to a server 130 and a reported-behavior responsive server 132. The server 130 may be different server than one that initially sent the web page 1240. During the exchange of data responsive to the request from the browser 110, the cookie 1252 that is transmitted to the behavior-responsive server 132 conveys data such as depicted in FIG. 8. It also may convey other data, such as the time of the last user interest indications in the category, similar to the information depicted in FIG. 6.



FIG. 13 depicts one embodiment of information flow among the behavior watcher 120, the browser 110, one or more servers 130, one or more reported-behavior responsive servers 132, persistent memory 122 and cookie memory 124. In this figure, the user indicates their interest in a subject to a browser 110 or similar software. This indication of interest typically results in the browser 110 transmitting a search request, URL or similar message 1302 to a server 130. The behavior watcher 120 receives the indication of interest 1304 from its monitoring of the browser 110. Optionally, it records the indication of interest 1306 to persistent memory 122. Recording to persistent memory may take place immediately, periodically or both. For instance, the most recent keyword, search term, banner click or other indication of interest may be recorded to memory with a date and time stamp. As described above, a periodic history of interests may be updated periodically. The behavior watcher 120 publishes information about user behavior to cookies 124 or similar memory structures that are readily accessible to reported-behavior responsive servers 132 when a browser 110 accesses a server 130 that triggers a message to a reported-behavior responsive server 132 or contacts the server 132 directly. This publishing of behavior may include both publishing information about the most recent indication of user interest and publishing categorical information summarizing recent user interest.


Use of information published by the behavior watcher 120 to accessible memory structures is also illustrated in FIG. 13. Typically, a server 130 returns a web page 1310 to the browser 110. Depending on the addresses embedded in the web page 1310, various cookies 1312 are automatically retrieved by the browser 110. When the web page 1310 includes an address of a reported-behavior responsive server 132, one or more cookies that summarize user behavior and interests observed by the client-side behavior watcher are transmitted 1314 to the server 132. In addition, one or more cookies 1316 may be transmitted to server 130. The reported-behavior responsive server 132 decodes the cookie 1314, determines what message or ad to return to the browser 110 and sends a customized message 1320 that is responsive to the reported behavior 1314 of the user.


One issue with publishing behavioral data to cookies is deletion of cookies. Cookies are automatically deleted by a browser 110 when they reach an expiration date or when there are too many cookies. Users manually delete cookies using browser controls. Many software applications have been developed to analyze and delete certain cookies. Therefore, publication of behavioral data to cookies is sometimes not enough to assure that the resulting memory structures will be accessible to reported-behavior responsive servers 132. It is useful to have a mechanism to republish or restore cookies that have been deleted.



FIG. 14 depicts republication and restoration of cookies. Republication of cookies that summarize observed user behavior is the simpler case. As described above, the behavior watcher 120 may record observed behavior and interests 1306 to persistent memory 122 and publish similar information 1308 to cookies 124. For republication, the behavior watcher 120 periodically inspects cookie memory 124 to determine whether the cookies have been deleted or damage 1438. Alternatively, the behavior watcher 120 might detect cookie deletion events or possible cookie deletion events and schedule republication following cookie deletion. When it detects that the cookies have been deleted or damaged 1438, it republishes the cookies 1440 to the cookie memory 124. The cookies are again in place as memory structures readily accessible to reported-behavior responsive servers 132.


Backup and restoration of cookies is also illustrated by FIG. 14. A control server 1434 instructs the behavior watcher 120 or a backup and restore component of the behavior watcher regarding cookies to be backed up and restored 1435. The behavior watcher 120 retrieves from cookie memory 124 cookies for which a backup and restore service is to be provided 1436. The behavior watcher 120 records or backs up 1437 the cookie information to persistent memory 122. The behavior watcher 120 need not be aware of the content of the cookies in order to provide this backup service. The cookies need not include observed behavior data and may be directed to ordinary servers 130. The behavior watcher 120 periodically inspects cookie memory to determine whether the cookies have been deleted or damage 1438. Alternatively, the behavior watcher can detect cookie deletion events and schedule restoration of cookies following cookie deletion. When it detects that the cookies have been deleted or damaged 1438, it restores the cookies 1440 to the cookie memory 124. The cookies are again in place as memory structures readily accessible to servers 130.


SOME PARTICULAR EMBODIMENTS

The present invention may be practiced as a method or device adapted to practice the method. The same method can be viewed from the perspective of a behavior summarizing module optionally including a behavior observing module and a summary publishing module. The invention may be an article of manufacture such as media impressed with logic to carry out computer-assisted behavior summarizing optionally including behavior observing module and a summary publishing module.


One embodiment is a method of publishing behavioral data from a client computer via network to an authorized domain. This method includes summarizing observed cross-network user behavior data using a behavior summarizing module operating on a user's computer, wherein the observed cross-network user behavior includes accessing web sites that are not all associated with a particular user behavior data collection network. Alternatively, cross-network may refer to web sites or other content delivery vehicles that are not all associated with a particular portal or a particular virtual storefront or a particular content provider. The behavior further includes at least one of a mouse click-through, enter keystroke or other selection action by the user and at least one keyword derived from context of the selection action. The summarizing includes deriving a categorical metric of the user's degree of interest in subject categories, from the observed cross-network user behavior data, for a multiplicity of subject categories. The method includes publishing the summarized cross-network user behavior data from the behavior summarizing module to a memory structure, wherein the memory structure becomes accessible via a network to a server at an authorized domain when the user uses the network to access the authorized domain. This method may be extended in several ways.


A further aspect of this method includes prioritizing a multiplicity of subject categories, selecting a plurality of the multiplicity of subject categories, and publishing the summarized cross-network behavior data for the plurality of subject categories to a single memory structure. This memory structure, optionally, may be a so-called cookie. Another aspect of this method may include observing the cross-network user behavior data using a behavior watching module operating on the user's computer. The behavior watching module may be integrated with the behavior summarizing module. Alternatively, the two behavior-related modules may be separate modules, even using separate hardware.


The cross-network behavioral data may include user selection of one or more of the following: submission of a search term to a search engine, either using a browser interface or a search engine-specific interface, visiting a portal, visiting a virtual storefront, visiting a content provider, entering a URL in a browser address window, selecting a URL hyperlink, or clicking on a banner ad associated with a link. More generally, the user selection may be any navigation among documents that are linked semantically or by addresses. The meaning given to “cross-network” above also applies here.


Publishing to the memory structure may take place on a periodic basis and/or on an update basis. By an update basis, it is meant that the memory structure update follows detection of the user selection.


Yet another aspect of this method may include receiving at the user's computer advertising targeted using the summarized cross-network user behavior data published to the memory structure that became accessible when the user used the network to access the authorized domain.


The categorizing may include rolling up indicators of visits into non-overlapping categorical time segments of differing lengths. This may be accomplished by representing a plurality of granular time segments with flags to indicate user category involvement and summarizing a portion of the granular time segments by aggregation to the categorical time segments.


Another embodiment is a method of publishing behavioral data collected by a behavior watching module operating on the user's computer, including summarizing cross-network user behavior data recorded to memory. The summarizing includes, for a multiplicity of subject categories, deriving one, two, three or four of the following items: (1) categorizing recency of visiting a web site in the subject category by evaluating a most recent visit time-date indicator; (2) categorizing frequency of user visits to web sites in the subject category by rolling up indicators of visits during seven, ten or more time segments or any number of categorical time segments, which time segments were recorded on a rolling basis; (3) categorizing recency of selection of a banner ad to obtain additional information in the subject category by evaluating a most recent visit time-date indicator; or (4) categorizing frequency of user selections of the banner ad to obtain additional information in the subject category by rolling up indicators of visits during seven, ten or more time segments or any number of categorical time segments, which time segments are tracked on a rolling basis. The method further includes publishing the summarized cross-network behavior data from a behavior summarizing module to memory structure that becomes accessible via a network to a server at an authorized domain when the user uses the network to access the authorized domain.


Any and all aspects of the first embodiment may be applied to the second embodiment.


A related embodiment is a method of republishing a memory structure on a user's computer, wherein the memory structure summarizes cross-network user behavior data and becomes accessible via a network to a server at an authorized domain when the user uses the network to access the authorized domain. This method includes providing a logic to be installed on a user's computer, the logic having access to a storage area for the memory structure, having access to persistent memory distinct from the memory structure storage area, and the logic operating on the user's computer without requiring the user to specifically invoke the logic. This method further includes the logic automatically detecting when the memory structure that summarizes cross-network user behavior data has been deleted or damaged and responding by restoring at least part of the data structure to the data structure storage area from the distinct persistent memory.


One aspect of this embodiment is that the data structure may be a so-called cookie used for HTTP state management. The names of cookies may be used to associate the cookies with authorized domains. The distinct persistent memory may be a registry including name-value pairs or a separate storage area.


A variation on the immediately preceding embodiment is a method of backing up and restoring a memory structure on a user's computer. This method includes providing a logic to be installed on a user's computer, the logic having access to a storage area for the memory structure, having access to persistent memory distinct from the memory structure storage area, and the logic operating on the user's computer without requiring the user to specifically invoke the logic. This method further includes remotely identifying the logic one or more favored memory structures to be backed up and automatically backing up the favored memory structures to the distinct persistent memory. The method further includes automatically detecting that at least one particular favored memory structure has been deleted or damaged and automatically restoring at least part of that particular memory structure to the memory structure storage area using data from the distinct persistent memory. The aspects of the immediately preceding embodiment apply to this embodiment as well.


Device embodiments of these methods may include a memory structure area of memory, a persistent memory distinct from the memory structure storage area and logic operating as part of the user's computer, without requiring the user to specifically invoke the logic, the logic having access to the memory structure storage area and the distinct persistent memory. The device further includes the communications channel connected to the network. The logic is adapted to carry out any of the method embodiments described above using the communications channel.












Claims of Provisional Application No. 60/637,684
















1
[observing keyword for selection, summarizing and publishing to



memory structure]



A method of publishing behavioral data from a client computer via a



network to an authorized domain using a cookie, including:



observing cross-network user behavior data using a behavior watching



module operating on a user's computer, wherein the cross-network user



behavior



includes accessing web sites that are not all associated with a particular



user behavior data collection network, and



further includes at least one of a mouse click-through, enter keystroke



or other selection action and at least one keyword derived from context



of the selection action;



summarizing by subject category for a multiplicity of subject categories



the observed cross-network user behavior data using a behavior



summarizing module, including deriving a categorical metric of the



user's degree of interest in the subject category from the observed cross-



network user behavior data; and



publishing the summarized cross-network behavior data from the



behavior summarizing module to a memory structure,



wherein the memory structure is accessible via a network to a server at



an authorized domain when the user uses the network to access the



authorized domain.


2
[keyword for selection previously observed, summarizing and



publishing to memory structure]



A method of publishing behavioral data from a client computer via a



network to an authorized domain, including:



summarizing observed cross-network user behavior data using a



behavior summarizing module operating on a user's computer, wherein



the observed cross-network user behavior includes accessing web sites



that are not all associated with a particular user behavior data collection



network, and



further includes at least one of a mouse click-through, enter keystroke



or other selection action by the user and at least one keyword derived



from context of the selection action;



wherein the summarizing includes deriving a categorical metric of the



user's degree of interest in subject categories, from the observed cross-



network user behavior data, for a multiplicity of subject categories; and



publishing the summarized cross-network user behavior data from the



behavior summarizing module to a memory structure,



wherein the memory structure becomes accessible via a network to a



server at an authorized domain when the user uses the network to access



the authorized domain.


3
The method of claim 2, further including prioritizing a multiplicity of



subject categories, selecting a plurality of the multiplicity of subject



categories, and publishing the summarized cross-network behavior data



for the plurality of subject categories to a single memory structure.


4
The method of claim 2, further including observing the cross-network



user behavior data using a behavior watching module operating on the



user's computer.


5
The method of claim 2, wherein the cross-network behavioral data



include visits to a plurality of web sites or selections of banner ads that



are not all associated with a particular behavioral data collection



network. [portal, virtual storefront, content provider].


6
The method of claim 3, wherein the cross-network behavioral data



include behavioral data corresponding to a plurality of visits to web



sites or selections of banner ads that are not all associated with a



particular behavioral data collection network.


7
The method of claim 2, wherein the cross-network behavioral data



include behavioral data corresponding to a plurality of visits to web



sites or selections of banner ads that are accessed using a plurality of



browsers.


8
The method of claim 2, wherein publishing takes place on a periodic



basis.


9
The method of claim 2, wherein publishing takes place on an update



basis, after one or more web sites have been visited or one or more



banner ads have been selected.


10
The method of claim 2, further including receiving at the user's



computer advertising targeted using the summarized cross-network user



behavior data published to the memory structure that became accessible



when the user used the network to access the authorized domain.


11
[summarizing and publishing any of four categories of data]



A method of publishing behavioral data collected by a behavior



watching module operating on a user's computer, including:



summarizing cross-network user behavior data recorded to [persistent]



memory, the summarizing including, for a multiplicity of subject



categories, deriving any one or more of



categorizing recency of visiting a web site in the subject category by



evaluating a most recent visit time-date indicator,



categorizing frequency of user visits to web sites in the subject category



by rolling up indicators of visits during ten or more discrete time



segments [non-overlapping; daily], which discrete time segments were



recorded on a rolling basis [bit string; rolled daily],



categorizing recency of selections of a banner ad to obtain additional



information in the subject category by evaluating a most recent visit



time-date indicator,



categorizing frequency of user selections of a banner ad to obtain



additional information in the subject category by rolling up indicators of



visits during ten or more discrete time segments, which discrete time



segments are tracked on a rolling basis;



publishing the summarized cross-network behavior data from a



behavior summarizing module to a memory structure that becomes



accessible via a network to a server at an authorized domain when the



user uses the network to access the authorized domain.


12
The method of claim 11, further including prioritizing a multiplicity of



subject categories, selecting a plurality of the multiplicity of subject



categories, and publishing the summarized cross-network behavior data



for the plurality of subject categories to a single memory structure.


13
The method of claim 11, further including observing the cross-network



user behavior data using a behavior watching module operating on a



user's computer.


14
The method of claim 11, wherein the cross-network behavioral data



include visits to a plurality of web sites or selections of banner ads that



are not all associated with a particular behavioral data collection



network. [portal, virtual storefront, content provider].


15
The method of claim 12, wherein the cross-network behavioral data



include behavioral data corresponding to a plurality of visits to web



sites or selections of banner ads that are not all associated with a



particular behavioral data collection network.


16
The method of claim 11, wherein the cross-network behavioral data



include behavioral data corresponding to a plurality of visits to web



sites or selections of banner ads that are accessed using a plurality of



browsers.


17
The method of claim 11, wherein publishing takes place on a periodic



basis.


18
The method of claim 11, wherein publishing takes place on an update



basis, after one or more web sites have been visited or one or more



banner ads have been selected.


19
The method of claim 11, further including receiving at the user's



computer advertising targeted using the summarized cross-network user



behavior data published to the memory structure that became accessible



when the user used the network to access the authorized domain.


20
A method of backing up and recreating cookies on a user's computer,



including:



providing logic to be installed on the user's computer, the logic



having access to a storage area for cookies,



having access to persistent memory distinct from the cookies storage



area, and operating without requiring the user to specifically invoke the



logic;



remotely identifying to the logic one or more favored cookies to be



backed up;



the logic automatically backing up the favored cookies to the distinct



persistent memory;



the logic automatically detecting that at least one particular favored



cookie has been deleted or damaged; and



the logic automatically restoring at least part of the particular favored



cookie to the cookies storage area using data from the distinct persistent



memory.


21
The method of claim 20, wherein the cookies are used for HTTP state



management.


22
The method of claim 20, wherein names of the cookies associate the



cookies with web sites.


23
The method of claim 20, wherein the distinct persistent memory is a



registry including name-value pairs.


24
The method of claim 20, wherein the cookies are encoded and the



backing up preserves the encoding without understanding how to



decode the cookies.


25
The method of claim 20, further including identifying to the logic one



or more identifiers for the persistent memory to be used for backing up



the cookies.


26
The method of claim 20, further including a web server receiving data



from the restored particular favored cookie.


27
The method of claim 20, wherein the logic is invoked when a browser is



started.


28
A device operating as part of a user's computer, the device including:



a cookies storage area of memory;



a persistent memory distinct from the cookies storage area;



logic operating as part of the user's computer, without requiring the user



to specifically invoke the logic, the logic having access to the cookies



storage area and to the distinct persistent memory;



a communications channel connected to a network; the logic adapted to



receive through the communications channel identifications of favored



cookies that should be backed up,



automatically back up the favored cookies from the cookies storage



area to the distinct persistent memory;



automatically detect that at least one particular favored cookie has been



deleted or damaged; and



automatically restore at least part of the particular favored cookie to the



cookies storage area using the data from the distinct persistent memory.









While the present invention is disclosed by reference to the preferred embodiments and examples detailed above, it is understood that these examples are intended in an illustrative rather than in a limiting sense. Computer-assisted processing is implicated in the described embodiments. It is contemplated that modifications and combinations will readily occur to those skilled in the art, which modifications and combinations will be within the spirit of the invention and the scope of the following claims.

Claims
  • 1. A computer-implemented method, implemented, at least in part, by hardware in combination with software, the method comprising: collecting, using hardware in combination with software on a client computer, cross-network user behavior data related to a user's interactions on the client computer with a plurality of web sites, wherein not all of the plurality of web sites are associated with a content provider, and not all of the plurality of web sites are associated with a portal;summarizing the cross-network user behavior data on the client computer, the summarizing including, for a plurality of subject categories, one or more of: categorizing recency of the user visiting a web site on the client computer in at least some of the plurality of subject categories,categorizing user category involvement from the user visiting the website on the client computer in at least some of the subject categories by rolling up indicators of visits into categorical time segments,categorizing recency of selections of at least one banner advertisement on the client computer, andcategorizing user category involvement from user selections of the at least one banner advertisement on the client computer; andpublishing the summarized cross-network user behavior data on the client computer to one or more memory structures on the client computer; andin response to the user accessing an authorized domain via the client computer via a network, providing at least some of the summarized cross-network user behavior data in the one or more memory structures on the client computer to a server at the authorized domain.
  • 2. The method of claim 1, wherein the categorizing the user category involvement includes rolling up the indicators of visits into non-overlapping categorical time segments of differing lengths.
  • 3. The method of claim 1, wherein the categorizing user category involvement includes representing granular time segments with flags to indicate user category involvement during the granular time segment and summarizing a portion of the granular time segments by aggregation into categorical time segments.
  • 4. The method of claim 1, further comprising: prioritizing a plurality of subject categories,selecting at least one subject category of the plurality of subject categories, andpublishing the summarized cross-network behavior data for the plurality of subject categories to a single memory structure.
  • 5. The method of claim 1, wherein the cross-network behavioral data include data relating to visits to the plurality of web sites or selections of banner advertisements that are not all associated with a behavioral data collection network.
  • 6. The method of claim 1, wherein the cross-network behavioral data is further related to selections of banner advertisements that are not all associated with the portal.
  • 7. The method of claim 1, wherein the cross-network behavioral data include data relating to visits to the plurality of web sites or selections of banner advertisements that are not all associated with a virtual storefront.
  • 8. The method of claim 1, wherein the cross-network behavioral data is further related to selections of banner advertisements that are not all associated with the content provider.
  • 9. The method of claim 1, wherein the cross-network behavioral data include data relating to behavioral data corresponding to a plurality of visits to the plurality of web sites or selections of banner advertisements that are not all associated with a behavioral data collection network.
  • 10. The method of claim 1, wherein the publishing takes place on a periodic basis.
  • 11. The method of claim 1, wherein the publishing takes place in response to one or more web site visit or one or more banner advertisements selection.
  • 12. The method of claim 1, further including receiving at the client computer advertising targeted using the summarized cross-network user behavior data published to the one or more memory structures on the client computer.
  • 13. The method of claim 1 wherein the summarizing the cross-network user behavior data on the client computer comprises two or more of: the categorizing recency of the user visiting the web site on the client computer in the at least some of the plurality of subject categories,the categorizing user category involvement from the user visiting the website on the client computer in the at least some of the subject categories by the rolling up the indicators of the visits into the categorical time segments,the categorizing recency of the selections of the at least one banner advertisement on the client computer, andthe categorizing user category involvement from the user selections of the at least one banner advertisement on the client computer.
  • 14. A computer-implemented method, implemented, at least in part, by hardware in combination with software, the method comprising: observing, by hardware in combination with software on a client computer, cross-network user behavior of a user of the client computer, wherein the cross-network user behavior relates, at least in part, to the client computer accessing a plurality of web sites that are not all associated with a user behavior data collection network, are not all associated with a content provider, and are not all associated with a portal, andat least one keyword derived from context of a selection action by the user on the client computer;selecting a subject category from a plurality of subject categories and deriving a summary metric of the user's degree of involvement in the selected subject category for a particular cross-network user behavior of the user of the client computer;publishing the summary metric to one or more memory structures on the client computer; andin response to the user accessing an authorized domain via the client computer via a network, providing at least some of the information in the summary metric in the one or more memory structures from the client computer to a server at the authorized domain.
  • 15. The method of claim 14, wherein data in the memory structure are periodically reported via a network to a server.
  • 16. A computer-implemented method, implemented, at least in part, by hardware in combination with software, the method comprising: summarizing observed cross-network user behavior data using a behavior summarizing module operating on a client computer, wherein the observed cross-network user behavior includes: access to web sites that are not all associated with a content provider, a user behavior collection network, and a portal; andat least one keyword derived from context of the access to the web sites; andwherein the summarizing for the observed cross-network user behavior includes deriving a summary metric of the user's degree of interest in subject categories from a plurality of subject categories; andpublishing the summary metric from the behavior summarizing module to one or more memory structures; andproviding information in the summary metric in the one or more memory structures from the client computer to a server at an authorized domain in response to the user accessing the authorized domain via the client computer via a network.
  • 17. The method of claim 16, further including: prioritizing the plurality of subject categories;selecting at least one subject category of the plurality of subject categories; andpublishing the summarized cross-network behavior data for the plurality of subject categories to a single memory structure.
  • 18. The method of claim 16, wherein the one or more memory structures are accessible via the network to the server at the authorized domain in response to the user accessing the authorized domain.
  • 19. The method of claim 16, wherein the cross-network behavioral data include data relating to behavioral data corresponding to a plurality of visits to the web sites or selections of banner advertisements that are accessed using more than one browser on the client computer.
  • 20. The method of claim 16, further including receiving at the client computer advertising targeted using the summarized cross-network user behavior data published to the one or more memory structures that became accessible in response to the user accessing the authorized domain.
CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and seeks priority to U.S. nonprovisional application Ser. No. 11/226,066, entitled “Method and Device for Publishing Cross-Network User Behavioral Data,” filed Sep. 14, 2005, published Jun. 22, 2006 as U.S. Publication No. 2006-0136528 A1, issued Apr. 6, 2010 as U.S. Pat. No. 7,693,863, which claims benefit of U.S. provisional patent application No. 60/637,684, filed Dec. 20, 2004, both of which are hereby incorporated by reference herein. This application is related to commonly owned U.S. application Ser. No. 10/289,123, now U.S. Pat. No. 7,512,603, entitled “Responding to End-User Request for Information in a Computer Network” by inventors Eugene A. Veteska, David L. Goulden, and Anthony G. Martin, filed on Nov. 5, 2002, and issued on Mar. 31, 2009. The related application is also incorporated by reference.

US Referenced Citations (800)
Number Name Date Kind
4455083 Elmes Jun 1984 A
4575579 Simon et al. Mar 1986 A
4719567 Whittington et al. Jan 1988 A
4775935 Yourick Oct 1988 A
4782449 Brinker et al. Nov 1988 A
4799146 Chauvel Jan 1989 A
4850007 Marino et al. Jul 1989 A
4977594 Shear Dec 1990 A
5027400 Baji et al. Jun 1991 A
5029104 Dodson et al. Jul 1991 A
5093718 Hoarty et al. Mar 1992 A
5099420 Barlow et al. Mar 1992 A
5105184 Pirani et al. Apr 1992 A
5159669 Trigg et al. Oct 1992 A
5165012 Crandall et al. Nov 1992 A
5196838 Meier et al. Mar 1993 A
5202961 Mills et al. Apr 1993 A
5220420 Hoarty et al. Jun 1993 A
5220516 Dodson et al. Jun 1993 A
5220564 Tuch et al. Jun 1993 A
5231499 Trytko Jul 1993 A
5247517 Ross et al. Sep 1993 A
5253341 Rozmanith et al. Oct 1993 A
5268963 Monroe et al. Dec 1993 A
5283639 Esch et al. Feb 1994 A
5283731 Lalonde et al. Feb 1994 A
5285442 Iwamura et al. Feb 1994 A
5297249 Bernstein et al. Mar 1994 A
5305195 Murphy Apr 1994 A
5307456 MacKay Apr 1994 A
5313455 van der Wal et al. May 1994 A
5315580 Phaal May 1994 A
5319455 Hoarty et al. Jun 1994 A
5321740 Gregorek et al. Jun 1994 A
5325423 Lewis Jun 1994 A
5325483 Ise et al. Jun 1994 A
5327554 Palazzi et al. Jul 1994 A
5333237 Stefanopoulos et al. Jul 1994 A
5347632 Filepp et al. Sep 1994 A
5355472 Lewis Oct 1994 A
5355501 Gross et al. Oct 1994 A
5361091 Hoarty et al. Nov 1994 A
5361199 Shoquist et al. Nov 1994 A
5361393 Rossillo Nov 1994 A
5367621 Cohen et al. Nov 1994 A
5373375 Weldy Dec 1994 A
5392447 Schlack et al. Feb 1995 A
5412720 Hoarty May 1995 A
5418549 Anderson et al. May 1995 A
5438518 Bianco et al. Aug 1995 A
5442771 Filepp et al. Aug 1995 A
5446919 Wilkins Aug 1995 A
5469553 Patrick Nov 1995 A
5481741 McKaskle et al. Jan 1996 A
5483466 Kawahara et al. Jan 1996 A
5491785 Robson et al. Feb 1996 A
5499340 Barritz Mar 1996 A
5500890 Rogge et al. Mar 1996 A
5515098 Carles May 1996 A
5515270 Weinblatt May 1996 A
5515490 Buchanan et al. May 1996 A
5517612 Dwin et al. May 1996 A
5524195 Clanton, III et al. Jun 1996 A
5524197 Uya et al. Jun 1996 A
5530472 Bregman et al. Jun 1996 A
5530759 Braudaway et al. Jun 1996 A
5530852 Meske et al. Jun 1996 A
5532735 Blahut et al. Jul 1996 A
5541986 Hou Jul 1996 A
5544302 Nguyen Aug 1996 A
5544320 Konrad Aug 1996 A
5548745 Egan et al. Aug 1996 A
5563804 Mortensen et al. Oct 1996 A
5564043 Siefert Oct 1996 A
5572643 Judson Nov 1996 A
5579381 Courville et al. Nov 1996 A
5583560 Florin et al. Dec 1996 A
5583763 Atcheson et al. Dec 1996 A
5584025 Keithley et al. Dec 1996 A
5590046 Anderson et al. Dec 1996 A
5594509 Florin et al. Jan 1997 A
5594779 Goodman Jan 1997 A
5596718 Boebert et al. Jan 1997 A
5602905 Mettke Feb 1997 A
5604542 Dedrick Feb 1997 A
5606359 Youden et al. Feb 1997 A
5608850 Robertson Mar 1997 A
5615131 Mortensen et al. Mar 1997 A
5615325 Peden Mar 1997 A
5617526 Oran et al. Apr 1997 A
5621456 Florin et al. Apr 1997 A
5627886 Bowman May 1997 A
5629978 Blumhardt et al. May 1997 A
5630081 Rybicki et al. May 1997 A
5635979 Kostreski et al. Jun 1997 A
5638443 Stefik et al. Jun 1997 A
5642484 Harrison, III et al. Jun 1997 A
5649186 Ferguson Jul 1997 A
5657450 Rao et al. Aug 1997 A
5664948 Dimitriadis et al. Sep 1997 A
5673322 Pepe et al. Sep 1997 A
5675510 Coffey et al. Oct 1997 A
5680562 Conrad et al. Oct 1997 A
5682525 Bouve et al. Oct 1997 A
5684715 Palmer Nov 1997 A
5684969 Ishida Nov 1997 A
5701451 Rogers et al. Dec 1997 A
5704017 Heckerman et al. Dec 1997 A
5706434 Kremen et al. Jan 1998 A
5706502 Foley et al. Jan 1998 A
5708709 Rose Jan 1998 A
5708780 Levergood et al. Jan 1998 A
5710884 Dedrick Jan 1998 A
5710918 Lagarde et al. Jan 1998 A
5712979 Graber et al. Jan 1998 A
5715453 Stewart Feb 1998 A
5717860 Graber et al. Feb 1998 A
5717923 Dedrick Feb 1998 A
5721827 Logan et al. Feb 1998 A
5721908 Lagarde et al. Feb 1998 A
5724521 Dedrick Mar 1998 A
5724556 Souder et al. Mar 1998 A
5724567 Rose et al. Mar 1998 A
5727129 Barrett et al. Mar 1998 A
5727159 Kikinis Mar 1998 A
5734863 Kodosky et al. Mar 1998 A
5737619 Judson Apr 1998 A
5737739 Shirley et al. Apr 1998 A
5740252 Minor et al. Apr 1998 A
5740549 Reilly et al. Apr 1998 A
5742768 Gennaro et al. Apr 1998 A
5742905 Pepe et al. Apr 1998 A
5745681 Levine et al. Apr 1998 A
5751956 Kirsch May 1998 A
5754830 Butts et al. May 1998 A
5754938 Herz et al. May 1998 A
5754939 Herz et al. May 1998 A
5758111 Shiratori et al. May 1998 A
5758257 Herz et al. May 1998 A
5760767 Shore et al. Jun 1998 A
5761601 Nemirofsky et al. Jun 1998 A
5761662 Dasan Jun 1998 A
5768508 Eikeland Jun 1998 A
5768510 Gish Jun 1998 A
5774670 Montulli Jun 1998 A
5781894 Petrecca et al. Jul 1998 A
5787253 McCreery et al. Jul 1998 A
5787254 Maddalozzo, Jr. et al. Jul 1998 A
5793972 Shane Aug 1998 A
5794210 Goldhaber et al. Aug 1998 A
5794259 Kikinis Aug 1998 A
5796952 Davis et al. Aug 1998 A
5801685 Miller et al. Sep 1998 A
5802320 Baehr et al. Sep 1998 A
5805735 Chen et al. Sep 1998 A
5805815 Hill Sep 1998 A
5809242 Shaw et al. Sep 1998 A
5809481 Baron et al. Sep 1998 A
5809512 Kato Sep 1998 A
5812642 Leroy Sep 1998 A
5812769 Graber et al. Sep 1998 A
5819047 Bauer et al. Oct 1998 A
5819092 Ferguson et al. Oct 1998 A
5822526 Waskiewicz Oct 1998 A
5832502 Durham et al. Nov 1998 A
5835087 Herz et al. Nov 1998 A
5835092 Boudreau et al. Nov 1998 A
5835722 Bradshaw et al. Nov 1998 A
5838458 Tsai Nov 1998 A
5848246 Gish Dec 1998 A
5848396 Gerace Dec 1998 A
5848397 Marsh et al. Dec 1998 A
5850352 Moezzi et al. Dec 1998 A
5850433 Rondeua Dec 1998 A
5854897 Radziewicz et al. Dec 1998 A
5855008 Goldhaber et al. Dec 1998 A
5861880 Shimizu et al. Jan 1999 A
5861883 Cuomo et al. Jan 1999 A
5862260 Rhoads Jan 1999 A
5862325 Reed et al. Jan 1999 A
5864823 Levitan Jan 1999 A
5870769 Freund Feb 1999 A
5872850 Klein et al. Feb 1999 A
5875296 Shi et al. Feb 1999 A
5877766 Bates et al. Mar 1999 A
5878231 Baehr et al. Mar 1999 A
5883955 Ronning Mar 1999 A
5884025 Baehr et al. Mar 1999 A
5886683 Tognazzini et al. Mar 1999 A
5887133 Brown et al. Mar 1999 A
5890152 Rapaport et al. Mar 1999 A
5892917 Myerson Apr 1999 A
5893053 Trueblood Apr 1999 A
5893118 Sonderegger Apr 1999 A
5894554 Lowery et al. Apr 1999 A
5897622 Blinn et al. Apr 1999 A
5898434 Small et al. Apr 1999 A
5901287 Bull et al. May 1999 A
5903892 Hoffert et al. May 1999 A
5905492 Straub et al. May 1999 A
5905800 Moskowitz et al. May 1999 A
5907838 Miyasaka et al. May 1999 A
5913040 Rakavy et al. Jun 1999 A
5918012 Astiz et al. Jun 1999 A
5918013 Mighdoll et al. Jun 1999 A
5918014 Robinson Jun 1999 A
5918214 Perkowski Jun 1999 A
5920697 Masters et al. Jul 1999 A
5923845 Kamiya et al. Jul 1999 A
5923853 Danneels Jul 1999 A
5929850 Broadwin et al. Jul 1999 A
5930446 Kanda Jul 1999 A
5930700 Pepper et al. Jul 1999 A
5930801 Falkenhainer et al. Jul 1999 A
5931901 Wolfe et al. Aug 1999 A
5931907 Davies et al. Aug 1999 A
5933811 Angles et al. Aug 1999 A
5933832 Suzuoka et al. Aug 1999 A
5936679 Kasahara et al. Aug 1999 A
5937037 Kamel et al. Aug 1999 A
5937390 Hyodo Aug 1999 A
5937392 Alberts Aug 1999 A
5937411 Becker Aug 1999 A
5943478 Aggarwal et al. Aug 1999 A
5944791 Scherpbier Aug 1999 A
5946646 Schena et al. Aug 1999 A
5946664 Ebisawa Aug 1999 A
5946697 Shen Aug 1999 A
5948061 Merriman et al. Sep 1999 A
5951300 Brown Sep 1999 A
5956693 Geerlings Sep 1999 A
5956716 Kenner et al. Sep 1999 A
5958008 Pogrebisky et al. Sep 1999 A
5958015 Dascalu Sep 1999 A
5959621 Nawaz et al. Sep 1999 A
5959623 Van Hoff et al. Sep 1999 A
5960409 Wexler Sep 1999 A
5961593 Gabber et al. Oct 1999 A
5961602 Thompson et al. Oct 1999 A
5961603 Kunkel et al. Oct 1999 A
5963909 Warren et al. Oct 1999 A
5963915 Kirsch Oct 1999 A
5966121 Hubbell et al. Oct 1999 A
5970473 Gerszber et al. Oct 1999 A
5974219 Fujita et al. Oct 1999 A
5974451 Simmons Oct 1999 A
5978807 Mano et al. Nov 1999 A
5978833 Pashley et al. Nov 1999 A
5978836 Ouchi Nov 1999 A
5978841 Berger Nov 1999 A
5978842 Noble et al. Nov 1999 A
5983227 Nazem et al. Nov 1999 A
5983244 Nation Nov 1999 A
5983268 Freivald et al. Nov 1999 A
5987466 Greer et al. Nov 1999 A
5987606 Cirasole et al. Nov 1999 A
5991735 Gerace Nov 1999 A
5991799 Yen et al. Nov 1999 A
5995597 Woltz et al. Nov 1999 A
5995943 Bull et al. Nov 1999 A
5996007 Klug et al. Nov 1999 A
5996011 Humes Nov 1999 A
5999526 Garland et al. Dec 1999 A
5999731 Yellin et al. Dec 1999 A
5999740 Rowley Dec 1999 A
5999912 Wodarz et al. Dec 1999 A
6002401 Baker Dec 1999 A
6006241 Purnaveja et al. Dec 1999 A
6006252 Wolfe Dec 1999 A
6006265 Rangan et al. Dec 1999 A
6009236 Mishima et al. Dec 1999 A
6009409 Adler et al. Dec 1999 A
6009410 LeMole et al. Dec 1999 A
6011537 Slotznick Jan 2000 A
6012083 Savitzky et al. Jan 2000 A
6014502 Moraes Jan 2000 A
6014638 Burge et al. Jan 2000 A
6014698 Griffiths Jan 2000 A
6014711 Brown Jan 2000 A
6016509 Dedrick Jan 2000 A
6020884 MacNaughton et al. Feb 2000 A
6023726 Saksena Feb 2000 A
6025837 Matthew, III et al. Feb 2000 A
6025886 Koda Feb 2000 A
6026368 Brown et al. Feb 2000 A
6026413 Challenger et al. Feb 2000 A
6026433 D'arlach et al. Feb 2000 A
6026933 King et al. Feb 2000 A
6029045 Picco et al. Feb 2000 A
6029141 Bezos et al. Feb 2000 A
6029145 Barritz Feb 2000 A
6029182 Nehab et al. Feb 2000 A
6029195 Herz Feb 2000 A
6035332 Ingrassia, Jr. et al. Mar 2000 A
6047318 Becker et al. Apr 2000 A
6047327 Tso et al. Apr 2000 A
6049821 Theriault et al. Apr 2000 A
6052709 Paul Apr 2000 A
6052717 Reynolds et al. Apr 2000 A
6052730 Felciano et al. Apr 2000 A
6055572 Saksena Apr 2000 A
6058141 Barger et al. May 2000 A
6061054 Jolly May 2000 A
6061659 Murray May 2000 A
6061716 Moncreiff May 2000 A
6065024 Renshaw May 2000 A
6065056 Bradshaw et al. May 2000 A
6067559 Allard et al. May 2000 A
6067561 Dillon May 2000 A
6067565 Horvitz May 2000 A
6070140 Tran May 2000 A
6073105 Sutcliffe et al. Jun 2000 A
6073167 Poulton et al. Jun 2000 A
6073241 Rosenberg et al. Jun 2000 A
6076166 Moshfeghi et al. Jun 2000 A
6078916 Culliss Jun 2000 A
6081840 Zhao Jun 2000 A
6084581 Hunt Jul 2000 A
6085193 Malkin et al. Jul 2000 A
6085226 Horvitz Jul 2000 A
6085242 Chandra Jul 2000 A
6088731 Kiraly et al. Jul 2000 A
6091411 Straub et al. Jul 2000 A
6092196 Reiche Jul 2000 A
6094655 Rogers et al. Jul 2000 A
6094677 Capek et al. Jul 2000 A
6098064 Pirolli et al. Aug 2000 A
6098065 Skillen et al. Aug 2000 A
6101510 Stone et al. Aug 2000 A
6108637 Blumenau Aug 2000 A
6108691 Lee et al. Aug 2000 A
6108799 Boulay et al. Aug 2000 A
6112215 Kaply Aug 2000 A
6112246 Horbal et al. Aug 2000 A
6115680 Coffee et al. Sep 2000 A
6119098 Guyot et al. Sep 2000 A
6119165 Li et al. Sep 2000 A
6122632 Botts et al. Sep 2000 A
6125388 Reisman Sep 2000 A
6128655 Fields et al. Oct 2000 A
6128663 Thomas Oct 2000 A
6133912 Montero Oct 2000 A
6133918 Conrad et al. Oct 2000 A
6134380 Kushizaki Oct 2000 A
6134532 Lazarus et al. Oct 2000 A
6138146 Moon et al. Oct 2000 A
6138155 Davis et al. Oct 2000 A
6141010 Hoyle Oct 2000 A
6144944 Kurtzman, II et al. Nov 2000 A
6151596 Hosomi Nov 2000 A
6154738 Call Nov 2000 A
6154771 Rangan et al. Nov 2000 A
6157924 Austin Dec 2000 A
6157946 Itakura et al. Dec 2000 A
6161112 Cragun et al. Dec 2000 A
6163778 Fogg et al. Dec 2000 A
6167438 Yates et al. Dec 2000 A
6167453 Becker et al. Dec 2000 A
6178443 Lin Jan 2001 B1
6178461 Chan et al. Jan 2001 B1
6182066 Marques Jan 2001 B1
6182097 Hansen et al. Jan 2001 B1
6182122 Berstis Jan 2001 B1
6182133 Horvitz Jan 2001 B1
6183366 Goldberg et al. Feb 2001 B1
6185558 Bowman Feb 2001 B1
6185586 Judson Feb 2001 B1
6185614 Cuomo et al. Feb 2001 B1
6191782 Mori et al. Feb 2001 B1
6192380 Light et al. Feb 2001 B1
6195622 Altschuler et al. Feb 2001 B1
6198906 Boetje et al. Mar 2001 B1
6199079 Gupta et al. Mar 2001 B1
6202093 Bolam et al. Mar 2001 B1
6204840 Petelycky et al. Mar 2001 B1
6208339 Atlas et al. Mar 2001 B1
6216141 Straub et al. Apr 2001 B1
6216212 Challenger et al. Apr 2001 B1
6219676 Reiner Apr 2001 B1
6222520 Gerszberg et al. Apr 2001 B1
6223215 Hunt et al. Apr 2001 B1
6233564 Schulze, Jr. May 2001 B1
6237022 Bruck et al. May 2001 B1
6249284 Bogdan Jun 2001 B1
6253188 Witek et al. Jun 2001 B1
6253208 Wittgreffe et al. Jun 2001 B1
6266058 Meyer Jul 2001 B1
6269361 Davis et al. Jul 2001 B1
6275854 Himmel et al. Aug 2001 B1
6279112 O'Toole et al. Aug 2001 B1
6280043 Ohkawa Aug 2001 B1
6285987 Roth et al. Sep 2001 B1
6286043 Cuomo et al. Sep 2001 B1
6286045 Griffiths et al. Sep 2001 B1
6295061 Park et al. Sep 2001 B1
6297819 Furst Oct 2001 B1
6304844 Pan et al. Oct 2001 B1
6308202 Cohn et al. Oct 2001 B1
6311194 Sheth et al. Oct 2001 B1
6314451 Landsman et al. Nov 2001 B1
6314457 Schema et al. Nov 2001 B1
6317761 Landsman et al. Nov 2001 B1
6321209 Pasquali Nov 2001 B1
6321256 Himmel et al. Nov 2001 B1
6324553 Cragun et al. Nov 2001 B1
6324569 Ogilvie et al. Nov 2001 B1
6324583 Stevens Nov 2001 B1
6327574 Kramer et al. Dec 2001 B1
6327617 Fawcett Dec 2001 B1
6332127 Bandera Dec 2001 B1
6334111 Carrott Dec 2001 B1
6335963 Bosco Jan 2002 B1
6336131 Wolfe Jan 2002 B1
6338059 Fields et al. Jan 2002 B1
6338066 Martin et al. Jan 2002 B1
6341305 Wolfe Jan 2002 B2
6347398 Parthasarathy et al. Feb 2002 B1
6351279 Sawyer Feb 2002 B1
6351745 Itakura et al. Feb 2002 B1
6353834 Wong et al. Mar 2002 B1
6356898 Cohen et al. Mar 2002 B2
6356908 Brown et al. Mar 2002 B1
6360221 Gough et al. Mar 2002 B1
6366298 Haitsuka Apr 2002 B1
6370527 Singhal Apr 2002 B1
6377983 Cohen et al. Apr 2002 B1
6378075 Goldstein et al. Apr 2002 B1
6381735 Hunt Apr 2002 B1
6381742 Forbes et al. Apr 2002 B2
6385592 Angles et al. May 2002 B1
6392668 Murray May 2002 B1
6393407 Middleton et al. May 2002 B1
6393415 Getchius et al. May 2002 B1
6397228 Lamburt et al. May 2002 B1
6401075 Mason et al. Jun 2002 B1
6415322 Jaye Jul 2002 B1
6418440 Kuo et al. Jul 2002 B1
6418471 Shelton et al. Jul 2002 B1
6421675 Ryan et al. Jul 2002 B1
6421724 Nickerson et al. Jul 2002 B1
6421729 Paltenghe et al. Jul 2002 B1
6434745 Conley, Jr. et al. Aug 2002 B1
6437802 Kenny Aug 2002 B1
6438215 Skladman et al. Aug 2002 B1
6438578 Schmid et al. Aug 2002 B1
6438579 Hosken Aug 2002 B1
6441832 Tao et al. Aug 2002 B1
6442529 Krishan et al. Aug 2002 B1
6446128 Woods et al. Sep 2002 B1
6449657 Stanbach, Jr. et al. Sep 2002 B2
6452612 Holtz et al. Sep 2002 B1
6457009 Bollay Sep 2002 B1
6459440 Monnes et al. Oct 2002 B1
6460036 Herz Oct 2002 B1
6460042 Hitchcock et al. Oct 2002 B1
6460060 Maddalozzo et al. Oct 2002 B1
6466918 Spiegel et al. Oct 2002 B1
6466970 Lee et al. Oct 2002 B1
6477550 Balasubramaniam et al. Nov 2002 B1
6477575 Koeppel et al. Nov 2002 B1
6480837 Dutta Nov 2002 B1
6484148 Boyd Nov 2002 B1
6487538 Gupta et al. Nov 2002 B1
6489968 Ortega et al. Dec 2002 B1
6490722 Barton et al. Dec 2002 B1
6493702 Adar et al. Dec 2002 B1
6496931 Rajchel et al. Dec 2002 B1
6499052 Hoang et al. Dec 2002 B1
6502076 Smith Dec 2002 B1
6505201 Haitsuka Jan 2003 B1
6513052 Binder Jan 2003 B1
6513060 Nixon et al. Jan 2003 B1
6516312 Kraft et al. Feb 2003 B1
6523021 Monberg et al. Feb 2003 B1
6526411 Ward Feb 2003 B1
6529903 Smith et al. Mar 2003 B2
6539375 Kawasaki Mar 2003 B2
6539424 Dutta Mar 2003 B1
6564202 Schuetze et al. May 2003 B1
6567850 Rajan et al. May 2003 B1
6567854 Olshansky et al. May 2003 B1
6570595 Porter May 2003 B2
6572662 Manohar et al. Jun 2003 B2
6581072 Mathur et al. Jun 2003 B1
6584479 Chang et al. Jun 2003 B2
6584492 Cezar et al. Jun 2003 B1
6584505 Howard et al. Jun 2003 B1
6594654 Salam et al. Jul 2003 B1
6601041 Brown et al. Jul 2003 B1
6601057 Underwood et al. Jul 2003 B1
6601100 Lee et al. Jul 2003 B2
6604103 Wolfe Aug 2003 B1
6606652 Cohn et al. Aug 2003 B1
6615247 Murphy Sep 2003 B1
6622168 Datta Sep 2003 B1
6631360 Cook Oct 2003 B1
6642944 Conrad et al. Nov 2003 B2
6643696 Davis et al. Nov 2003 B2
6665656 Carter Dec 2003 B1
6665838 Brown et al. Dec 2003 B1
6678731 Howard et al. Jan 2004 B1
6678866 Sugimoto et al. Jan 2004 B1
6681223 Sundaresan Jan 2004 B1
6681247 Payton Jan 2004 B1
6686931 Bodnar Feb 2004 B1
6687737 Landsman et al. Feb 2004 B2
6691106 Sathyanarayan Feb 2004 B1
6697825 Underwood et al. Feb 2004 B1
6701362 Subramonian et al. Mar 2004 B1
6701363 Chiu et al. Mar 2004 B1
6714975 Aggarwal et al. Mar 2004 B1
6718365 Dutta Apr 2004 B1
6721741 Eyal et al. Apr 2004 B1
6721795 Eldreth Apr 2004 B1
6725269 Megiddo Apr 2004 B1
6725303 Hoguta et al. Apr 2004 B1
6741967 Wu et al. May 2004 B1
6757661 Blaser et al. Jun 2004 B1
6760746 Schneider Jul 2004 B1
6760916 Holtz et al. Jul 2004 B2
6763379 Shuster Jul 2004 B1
6763386 Davis et al. Jul 2004 B2
6771290 Hoyle Aug 2004 B1
6772200 Bakshi et al. Aug 2004 B1
6785659 Landsman et al. Aug 2004 B1
6785723 Genty et al. Aug 2004 B1
6801906 Bates et al. Oct 2004 B1
6801909 Delgado et al. Oct 2004 B2
6826534 Gupta et al. Nov 2004 B1
6826546 Shuster Nov 2004 B1
6827669 Cohen et al. Dec 2004 B2
6847969 Mathai et al. Jan 2005 B1
6848004 Chang et al. Jan 2005 B1
6850967 Spencer et al. Feb 2005 B1
6853982 Smith et al. Feb 2005 B2
6857024 Chen et al. Feb 2005 B1
6871196 Chan et al. Mar 2005 B1
6874018 Wu Mar 2005 B2
6877027 Spencer et al. Apr 2005 B1
6880123 Landsman Apr 2005 B1
6882981 Philippe et al. Apr 2005 B2
6892181 Megiddo et al. May 2005 B1
6892223 Kawabata et al. May 2005 B1
6892226 Tso et al. May 2005 B1
6892354 Servan-Schreiber et al. May 2005 B1
6904408 McCarthy et al. Jun 2005 B1
6910179 Pennell et al. Jun 2005 B1
6934736 Sears et al. Aug 2005 B2
6938027 Barritz Aug 2005 B1
6957390 Tamir et al. Oct 2005 B2
6958759 Safadi et al. Oct 2005 B2
6968507 Pennell et al. Nov 2005 B2
6973478 Ketonen et al. Dec 2005 B1
6976053 Tripp et al. Dec 2005 B1
6976090 Ben-Shaul et al. Dec 2005 B2
6990633 Miyasaka Jan 2006 B1
6993532 Platt et al. Jan 2006 B1
7003734 Gardner et al. Feb 2006 B1
7016887 Stockfisch Mar 2006 B2
7039599 Merriman et al. May 2006 B2
7043526 Wolfe May 2006 B1
7051084 Hayton et al. May 2006 B1
7054900 Goldston May 2006 B1
7065550 Raghunandan Jun 2006 B2
7069515 Eagle et al. Jun 2006 B1
7076546 Bates et al. Jul 2006 B1
7085682 Heller et al. Aug 2006 B1
7100111 McElfresh et al. Aug 2006 B2
7133924 Rosenberg et al. Nov 2006 B1
7136875 Anderson et al. Nov 2006 B2
7149791 Sears et al. Dec 2006 B2
7155729 Andrew et al. Dec 2006 B1
7162739 Cowden et al. Jan 2007 B2
7181415 Blaser et al. Feb 2007 B2
7181488 Martin et al. Feb 2007 B2
7194425 Nyhan Mar 2007 B2
7254547 Beck et al. Aug 2007 B1
7283992 Liu et al. Oct 2007 B2
7346606 Bharat Mar 2008 B2
7349827 Heller et al. Mar 2008 B1
7363291 Page Apr 2008 B1
7421432 Hoelzle et al. Sep 2008 B1
7424708 Andersson et al. Sep 2008 B2
7451065 Pednault et al. Nov 2008 B2
7454364 Shkedi Nov 2008 B2
7464155 Mousavi et al. Dec 2008 B2
7480862 Cowden et al. Jan 2009 B2
7512603 Veteska et al. Mar 2009 B1
7630986 Herz Dec 2009 B1
7743340 Horvitz et al. Jun 2010 B2
7844488 Merriman et al. Nov 2010 B2
20010011226 Greer et al. Aug 2001 A1
20010029527 Goshen Oct 2001 A1
20010030970 Wiryaman et al. Oct 2001 A1
20010032115 Goldstein Oct 2001 A1
20010037240 Marks et al. Nov 2001 A1
20010037325 Biderman et al. Nov 2001 A1
20010037488 Lee Nov 2001 A1
20010044795 Cohen et al. Nov 2001 A1
20010047354 Davis et al. Nov 2001 A1
20010049320 Cohen et al. Dec 2001 A1
20010049321 Cohen et al. Dec 2001 A1
20010049620 Blasko Dec 2001 A1
20010049716 Wolfe Dec 2001 A1
20010051559 Cohen et al. Dec 2001 A1
20010053735 Cohen et al. Dec 2001 A1
20010054020 Barth et al. Dec 2001 A1
20020002483 Siegel et al. Jan 2002 A1
20020002538 Ling Jan 2002 A1
20020004754 Gardenswartz Jan 2002 A1
20020007307 Miller Jan 2002 A1
20020007309 Reynar Jan 2002 A1
20020007317 Callaghan et al. Jan 2002 A1
20020008703 Merrill et al. Jan 2002 A1
20020010626 Agmoni Jan 2002 A1
20020010757 Granik et al. Jan 2002 A1
20020010776 Lerner Jan 2002 A1
20020016736 Cannon et al. Feb 2002 A1
20020019763 Linden et al. Feb 2002 A1
20020019834 Vilcauskas, Jr. et al. Feb 2002 A1
20020023159 Vange et al. Feb 2002 A1
20020026390 Ulenas et al. Feb 2002 A1
20020032592 Krasnick et al. Mar 2002 A1
20020035568 Benthin Mar 2002 A1
20020038363 MacLean Mar 2002 A1
20020040374 Kent Apr 2002 A1
20020042750 Morrison Apr 2002 A1
20020046099 Frengut et al. Apr 2002 A1
20020049633 Pasquali Apr 2002 A1
20020052785 Tenenbaum May 2002 A1
20020052925 Kim et al. May 2002 A1
20020053078 Holtz et al. May 2002 A1
20020054089 Nicholas May 2002 A1
20020055912 Buck May 2002 A1
20020057285 Nicholas, III May 2002 A1
20020059094 Hosea et al. May 2002 A1
20020059099 Coletta May 2002 A1
20020065802 Uchiyama May 2002 A1
20020068500 Gabai et al. Jun 2002 A1
20020069105 do Rosario Botelho et al. Jun 2002 A1
20020073079 Terheggen Jun 2002 A1
20020077219 Cohen et al. Jun 2002 A1
20020078076 Evans Jun 2002 A1
20020078192 Kopsell et al. Jun 2002 A1
20020087499 Stockfisch Jul 2002 A1
20020087621 Hendriks Jul 2002 A1
20020091700 Steele et al. Jul 2002 A1
20020091875 Fujiwara et al. Jul 2002 A1
20020094868 Tuck et al. Jul 2002 A1
20020099605 Weitzman et al. Jul 2002 A1
20020099767 Cohen et al. Jul 2002 A1
20020099812 Davis et al. Jul 2002 A1
20020099824 Bender et al. Jul 2002 A1
20020103811 Fankhauser et al. Aug 2002 A1
20020107847 Johnson Aug 2002 A1
20020107858 Lundahl et al. Aug 2002 A1
20020111910 Walsh Aug 2002 A1
20020111994 Raghunandan Aug 2002 A1
20020112035 Carey et al. Aug 2002 A1
20020112048 Gruyer et al. Aug 2002 A1
20020116494 Kocol Aug 2002 A1
20020120648 Ball et al. Aug 2002 A1
20020122065 Segal et al. Sep 2002 A1
20020123912 Subramanian et al. Sep 2002 A1
20020128904 Carruthers et al. Sep 2002 A1
20020128908 Levin et al. Sep 2002 A1
20020128925 Angeles Sep 2002 A1
20020152121 Hiroshi Oct 2002 A1
20020152126 Lieu et al. Oct 2002 A1
20020152222 Holbrook Oct 2002 A1
20020154163 Melchner Oct 2002 A1
20020156781 Cordray et al. Oct 2002 A1
20020156812 Krasnoiarov et al. Oct 2002 A1
20020156881 Klopp et al. Oct 2002 A1
20020161673 Lee et al. Oct 2002 A1
20020169670 Barsade et al. Nov 2002 A1
20020169762 Cardona Nov 2002 A1
20020170068 Rafey et al. Nov 2002 A1
20020171682 Frank et al. Nov 2002 A1
20020175947 Conrad et al. Nov 2002 A1
20020194151 Fenton et al. Dec 2002 A1
20020198778 Landsman et al. Dec 2002 A1
20020198939 Lee et al. Dec 2002 A1
20030004804 Landsman et al. Jan 2003 A1
20030005000 Landsman et al. Jan 2003 A1
20030005067 Martin et al. Jan 2003 A1
20030005134 Martin et al. Jan 2003 A1
20030009497 Yu Jan 2003 A1
20030011639 Webb Jan 2003 A1
20030014304 Calvert et al. Jan 2003 A1
20030014399 Hansen et al. Jan 2003 A1
20030018778 Martin et al. Jan 2003 A1
20030018885 Landsman et al. Jan 2003 A1
20030023481 Calvert et al. Jan 2003 A1
20030023488 Landsman et al. Jan 2003 A1
20030023698 Dieberger et al. Jan 2003 A1
20030023712 Zhao et al. Jan 2003 A1
20030028529 Cheung et al. Feb 2003 A1
20030028565 Landsman et al. Feb 2003 A1
20030028870 Weisman et al. Feb 2003 A1
20030032409 Hutcheson et al. Feb 2003 A1
20030033155 Peerson et al. Feb 2003 A1
20030040958 Fernandes Feb 2003 A1
20030041050 Smith et al. Feb 2003 A1
20030046150 Ader et al. Mar 2003 A1
20030050863 Radwin Mar 2003 A1
20030052913 Barile Mar 2003 A1
20030074448 Kinebuchi Apr 2003 A1
20030088554 Ryan et al. May 2003 A1
20030101242 Cowden et al. May 2003 A1
20030105589 Liu et al. Jun 2003 A1
20030110080 Tsutani et al. Jun 2003 A1
20030115157 Circenis Jun 2003 A1
20030120593 Bansal et al. Jun 2003 A1
20030120654 Edlund et al. Jun 2003 A1
20030130910 Pickover et al. Jul 2003 A1
20030131100 Godon et al. Jul 2003 A1
20030135490 Barrett et al. Jul 2003 A1
20030135853 Goldman et al. Jul 2003 A1
20030154168 Lautenbacher Aug 2003 A1
20030171990 Rao et al. Sep 2003 A1
20030172075 Reisman Sep 2003 A1
20030176931 Pednault et al. Sep 2003 A1
20030182184 Strasnick et al. Sep 2003 A1
20030195837 Kostic et al. Oct 2003 A1
20030195877 Ford et al. Oct 2003 A1
20030206720 Abecassis Nov 2003 A1
20030208472 Pham Nov 2003 A1
20030220091 Farrand et al. Nov 2003 A1
20030221167 Goldstein et al. Nov 2003 A1
20030229542 Morrisroe Dec 2003 A1
20040002896 Alanen et al. Jan 2004 A1
20040024756 Rickard Feb 2004 A1
20040030798 Andersson et al. Feb 2004 A1
20040044677 Huper-Graff et al. Mar 2004 A1
20040068486 Chidlovskii Apr 2004 A1
20040073485 Liu et al. Apr 2004 A1
20040078294 Rollins et al. Apr 2004 A1
20040095376 Graham et al. May 2004 A1
20040098229 Error et al. May 2004 A1
20040098449 Bar-Lavi et al. May 2004 A1
20040117353 Ishag Jun 2004 A1
20040122943 Error et al. Jun 2004 A1
20040133845 Forstall et al. Jul 2004 A1
20040162738 Sanders et al. Aug 2004 A1
20040162759 Willis Aug 2004 A1
20040163101 Swix et al. Aug 2004 A1
20040167926 Waxman et al. Aug 2004 A1
20040167928 Anderson et al. Aug 2004 A1
20040181525 Itzhak et al. Sep 2004 A1
20040181604 Immonen Sep 2004 A1
20040193488 Khoo et al. Sep 2004 A1
20040210533 Picker et al. Oct 2004 A1
20040225716 Shamir et al. Nov 2004 A1
20040247748 Bronkema Dec 2004 A1
20040249709 Donovan et al. Dec 2004 A1
20040249938 Bunch Dec 2004 A1
20040254810 Yamaga et al. Dec 2004 A1
20040254844 Torres Dec 2004 A1
20040267723 Bharat Dec 2004 A1
20050015366 Carrasco et al. Jan 2005 A1
20050021397 Cui et al. Jan 2005 A1
20050027821 Alexander et al. Feb 2005 A1
20050027822 Plaza Feb 2005 A1
20050033657 Herrington et al. Feb 2005 A1
20050038819 Hicken et al. Feb 2005 A1
20050080772 Bem Apr 2005 A1
20050086109 McFadden et al. Apr 2005 A1
20050091106 Reller et al. Apr 2005 A1
20050091111 Green et al. Apr 2005 A1
20050097088 Bennett et al. May 2005 A1
20050102202 Linden et al. May 2005 A1
20050102282 Linden May 2005 A1
20050125382 Karnawat et al. Jun 2005 A1
20050131762 Bharat et al. Jun 2005 A1
20050132267 Aviv Jun 2005 A1
20050149404 Barnett et al. Jul 2005 A1
20050155031 Wang et al. Jul 2005 A1
20050182773 Feinsmith Aug 2005 A1
20050187823 Howes Aug 2005 A1
20050188423 Motsinger et al. Aug 2005 A1
20050203796 Anand et al. Sep 2005 A1
20050204148 Mayo Sep 2005 A1
20050216572 Tso et al. Sep 2005 A1
20050222901 Agarwal et al. Oct 2005 A1
20050222982 Paczkowski et al. Oct 2005 A1
20050240599 Sears Oct 2005 A1
20050273463 Zohar et al. Dec 2005 A1
20050289120 Soulanille et al. Dec 2005 A9
20060015390 Rijsinghani et al. Jan 2006 A1
20060026233 Tenembaum et al. Feb 2006 A1
20060031253 Newbold et al. Feb 2006 A1
20060053230 Montero Mar 2006 A1
20060136524 Wohlers et al. Jun 2006 A1
20060136528 Martin et al. Jun 2006 A1
20060136728 Gentry et al. Jun 2006 A1
20060235965 Bennett et al. Oct 2006 A1
20060253432 Eagle et al. Nov 2006 A1
20070016469 Bae et al. Jan 2007 A1
20070038956 Morris Feb 2007 A1
Foreign Referenced Citations (39)
Number Date Country
0631231 Dec 1994 EP
0822535 Feb 1998 EP
1045547 Oct 2000 EP
1154611 Nov 2001 EP
1207468 May 2002 EP
343825 Feb 1991 JP
11066099 Mar 1999 JP
2001084256 Mar 2001 JP
2001147894 May 2001 JP
20010222535 Aug 2001 JP
2001312482 Nov 2001 JP
2002024221 Jan 2002 JP
2002032401 Jan 2002 JP
2002073545 Mar 2002 JP
2002259371 Sep 2002 JP
2002334104 Nov 2002 JP
2003058572 Feb 2003 JP
2003141155 May 2003 JP
2003178092 Jun 2003 JP
20030271647 Sep 2003 JP
2004-355376 Dec 2004 JP
WO 9847090 Oct 1998 WO
WO 9938321 Jul 1999 WO
WO 9944159 Sep 1999 WO
WO 9946701 Sep 1999 WO
WO 9955066 Oct 1999 WO
WO 9959097 Nov 1999 WO
WO 0004434 Jan 2000 WO
WO 0054201 Sep 2000 WO
WO 0103028 Jan 2001 WO
WO 0115052 Mar 2001 WO
WO 0139024 May 2001 WO
WO 0144992 Jun 2001 WO
WO 0163472 Aug 2001 WO
WO 0169929 Sep 2001 WO
WO 0190917 Nov 2001 WO
WO 0244869 Jun 2002 WO
WO 03010685 Feb 2003 WO
WO 03010685 Feb 2003 WO
Non-Patent Literature Citations (215)
Entry
Claypool, Mark, et al., “Inferring User Interest”, IEEE Internet Computing, vol. 5, Issue 6, Nov./Dec. 2001, pp. 32-39.
Montgomery, Alan, et al., “Learning About Customers Without Asking”, Carnegie Mellon University, Tepper School of Business, Pittsburgh, PA, 35 pages.
“Shopping cart software”, Wikipedia, Downloaded from: en.wikipedia.org/wiki/Shopping—cart—software on Mar. 14, 2012, pp. 1-3.
“HTTP cookie”, Wikipedia, Downloaded from: en.wikipedia.org/wiki/Browser—cookie on Mar. 14, 2012, pp. 1-18.
Bucklin, Randolph E., et al., “Choice and the Internet: From Clickstream to Research Stream”, Marketing Letters, vol. 13, No. 3, Kluwer Academic Publishers, The Netherlands, © 2002, pp. 245-258.
Fenstermacher, Kurt D., et al., “Mining Client-Side Activity for Personalization”, WECWIS 2002, Newport Beach, CA, Jun. 26-28, 2002, pp. 205-212.
Cooley, R., et al., “Web Mining: Information and Pattern Discovery on the World Wide Web”, TAI 1997, Newport Beach, CA, Nov. 3-8, 1997, pp. 558-567.
Fenstermacher, Kurt D., et al., “Client-Side Monitoring for Web Mining”, Journal of the American Society for Information Science and Technology, vol. 54, No. 7, Wiley Periodicals, Inc., © 2003, pp. 625-637.
Nelte, Michael, et al., “Cookies: Weaving the Web into a State”, Crossroads —The ACM Student Magazine, vol. 7, Issue 1, Sep. 2000, pp. 1-8.
Montgomery, Alan, et al., “Learning About Customers Without Asking”, Carnegie Mellon University, Tepper School of Business, Pittsburgh, PA, 2002, pp. 1-33.
ACM Portal USPTO Search, “Communications of the ACM: vol. 52, Issue 1”, Association for Computing Machinery, dated Jan. 2009, 1 page.
Aggarwal, Charu C. et al. 2001. Intelligent Crawling on the World Wide Web with Arbitrary Predicates. ACM, pp. 96-105.
BackWeb Technologies Ltd., BackWEB User's Guide, 1997, [48 pgs.].
Bae, Sung Min, et al., “Fizzy Web Ad Selector”, IEEE Intelligent Systems, vol. 18 Issue 6, Nov./Dec. 2003, pp. 62-69.
Broder, Alan J., “Data Mining the Internet and Privacy”, WEBKDD '99, LNAI 1836, Springer-Verlag, Berlin, Germany, (c) 2000, pp. 56-73.
Bucklin, Randolph E., et al., “Choice and the Internet: From Clickstream to Research Stream”, Marketing Letters, vol. 13, No. 3, Aug. 2002, pp. 245-258.
Claypool, et al., Inferring User Interest, Worcester Polytechnic Inst., IEEE Internet Computing, Nov.-Dec. 2001, pp. 32-39 [8 pgs.].
comScore Marketing Solutions and Media Metrix (9 sheets), webpage) [online), 2003 comScore Networks, Inc. (retrieved on Oct. 8, 2003), retrieved from the intemet: <URL:http://vAvw.comscore.com>.
Copernic, Copernic: Software to Search, Find, and Manage Information, Copernic Technologies, Inc. 2004, 2 pgs. (retrieved on Apr. 6, 2004). Retrieved from the Internet:<URL:http://www.copernic.com/en/index.html>.
Diligenti , Michelangelo et al. 2004. A Unified Probalistic Framework for Web Page Scoring Systems. IEEE, vol. 16, No. 1. Jan. 2004, pp. 4-16.
Dogpile, Dogpile Web Search Home Page, InfoSpace, Inc. 2004, p. 1 of 1, (retrieved on Apr. 1, 2004). Retrieved from the Internet: <URL:http://www.dogpile.com.html>.
Eick, Stephen G., “Visual Analysis of Website Browsing Patterns”, Visual Interfaces to Digital Libraries, Springer-Verlag, Berlin, Germany, (c) 2002, pp. 65-77.
Eirinaki, Magdalini, et al., “Web Mining for Web Personalization”, ACM Transactions on Internet Technology (TOIT), vol. 3, Issue 1, Feb. 2003, pp. 1-27.
EPO Communication in European Appln. No. 02778589, completed Dec. 21, 2005 (2 Sheets).
EPO Communication in European Appln. No. 04795209, mailed Feb. 17, 2011 [160 pages].
EPO Communication in European Appln. No. 04795209, mailed. Feb. 17, 2011 [4 pages].
EPO File History of EP 2004795209, downloaded from European Patent Office on Apr. 13, 2011 [164 pgs.].
EPO, Communication for EP 03 75 5344, Feb. 14, 2011 [4 pgs.].
EPO, File history of EP—03755344.3, Method and Apparatus for Displaying Messages in Computer Systems, as of Feb. 21, 2011 [121 pgs.].
EPO, File history of EP 2004794999, downloaded from EPO Apr. 13, 2011 [204 pgs.].
EPO, File history of EP1714221 (downloaded from EPO on Apr. 13, 2011) [139 pages].
EPO, Supplementary European Search Report for EP 03 75 5344, Jun. 30, 2009, mailed Jul. 10, 2009 [2 pgs.].
Favela, Jesus et al. 1997. Image-Retrieval Agent: Integrating Image Content and Text. IEE, vol. 1.14, pp. 36-39.
Fenstermacher, Kurt D., et al., “Client-Side Monitoring for Web Mining”, Journal of the American Society for Information Science and Technology, vol. 54, Issue 7, May 2003, pp. 625-637.
Fenstermacher, Kurt D., et al., “Mining Client-Side Activity for Personalization”, WECWIS 2002, (c) 2002, pp. 205-212.
Friedman, Batya, et al., “Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design”, HICSS-35 '02, Jan. 2002, pp. 10-19.
Fu, Xiaobin, et al., “Mining Navigation History for Recommendation”, IUI 2000, New Orleans, LA, (c) 2000, pp. 106-112.
Google Search, “Result Search Query Build Search Engine Index Using Gather Consumer Navigate Search”, http://scholar.google.com/scholar, dated Apr. 7, 2010, 3 pages.
Gralla, Preston, How the Internet Works, Special Edition, Ziff-Davis Press, Emeryville, CA, .(c) 1997, pp. 254 and 266-271.
Greening, Dan R., “Tracking Users: What Marketers Really Want to Know”, Web Techniques, Jul. 1999, downloaded from: www.webtechniques.com/archives/1999/07/, pp. 1-9.
Hancock, Wayland, “A new way to get information from the Internet,” American Agent & Broker, Nov. 1997, 69, 11, pp. 65-66 [2 pgs.].
Heinle et al. 1997. Designing with JavaScript: Creating Dynamic Web Pages.Sep. 1997, pp. 1-33, 46, 83 [Cited by EPO as “A” reference for EP 02 77 8589 in Supplementary European Search Report dated Dec. 21, 2005].
Hun, Ke et al. 2003. A Probabilistic Model for Intelligent Web Crawlers. IEEE, pp. 278-282.
Japanese Patent Office, Official Action issued Dec. 17, 2010, mailed Dec. 27, 2010 in Japanese Patent Application No. 2007-528053 (non-official translation), 7 pgs.
Keys. 1998. Every Possible Internet Advertisement Drastic Increase of Click Through Rate by Interactivity and Multimedia. Nikkei Internet Technology. Dec. 22, 1998. Jan. Issue (1999), vol. 18, pp. 118-127.
Kiyomitsu, Hidenari, et al., “Web Reconfiguration by Spatio-Temporal Page Personalization Rules Based on Access Histories”, Applications and the Internet, San Diego, CA, Jan. 8-12, 2001, pp. 75-82.
Klemm, Reinhard P., “WebCompanion: A Friendly Client-Side Web Prefetching Agent”, IEEE Transactions on Knowledge and Data Engineering, vol. 11, No. 4, Jul./Aug. 1999, pp. 577-594.
Kurohashi, Sadao, et al. 1997. The Method for Detecting Important Descriptions of a Word Based on its Density Distribution in Text. Information Processing Society of Japan. vol. 38, Issue No. 4 (Apr. 15, 1997), pp. 845-854.
Lee, Ching-Cheng, et al., “Category-Based Web Personalization System”, COMPSAC 2001, Oct. 8-12, 2001, pp. 621-625.
Leuski, Anton et al. 2000. Lighthouse: Showing the Way to Relevant Information. IEEE, Oct. 2000, pp. 125-129.
Liu, Jian-Guo, et al., “Web Mining for Electronic Business Application”, PDCAT 2003, Aug. 27-29, 2003, pp. 872-876.
Liu, Jian-Guo, et al., “Web Usage Mining for Electronic Business Applications”, Machine Learning and Cybernetics, Shanghai, China, Aug. 2004, pp. 1314-1318.
Lu, Hongjun, et al., “Extending a Web Browser with Client-Side Mining”, APWeb 2003, LNCS 2642, Springer-Verlag, Berlin, Germany, (c) 2003, pp. 166-177.
Luxenburger, Julia, et al., “Query-Log Based Authority Analysis for Web Information Search”, Wise 2004, LNCS 3306, Springer-Verlag, Berlin, Germany, Nov. 1, 2004, pp. 90-101.
Metacrawler, Web Search Home Page—MetaCrawler, InfoSpace, Inc. 2004, p. 1 of 1 (retrieved on Apr. 6, 2004), Retrieved from the internet: <URL:http://www.metacrawler.com.html>.
Mitchell, T., “Decision Tree Learning Based on Machine Learning” (Apr. 5, 2003), lecture slides for textbook Machine Learning, McGraw Hill, 1997, pp. 46-74 [29 pgs.].
Mobasher, Bamshad, et al., “Automatic Personalization Based on Web Usage Mining”, Communications of the ACM, vol. 43, Issue 8, Aug. 2000, pp. 142-151.
Montgomery, Alan et al., Learning About Customers Without Asking, Carnegie Mellon University, Tepper School of Business, Jan. 2002 [35 pgs.].
NETSCAPE Communications Corp., Netcaster Developer's Guide, Netscape Communicator, Sep. 25, 1997 [112 pgs.].
NielsenllNetRatings (24 sheets), webpage [online), 2003 NetRatings, Inc. (retrieved on Oct. 8, 2003), retrieved from the intemet: <URL:http://www.nielsen-netratings.com>.
Nilsson, B. A., and Robb, J., “Invasion of the Webcasters,” PC World, vol. 15, No. 9 (Sep. 1997) p. 204-216 [9 pgs.].
Otsuka, Shingo, et al. 2004. The Analysis of Users Behavior Using Global Web Access Logs. IPSJ SIG Technical Report, vol. 2004 No. 71 (Jul. 13, 2004), pp. 17-24.
Paepcke, Andreas, et al., “Beyond Document Similarity: Understanding Value-Based Search and Browsing Technologies”, ACM SIGMOD Record, vol. 29, Issue 1, Mar. 2000, pp. 80-92.
Paganelli, Laila, et al., “Intelligent Analysis of User Interactions with Web Applications”, IUI '02, San Francisco, CA, Jan. 13-16, 2002, pp. 111-118.
Park, Joon S., et al., “Secure Cookies on the Web”, IEEE Internet Computing, vol. 4, Issue 4, Jul./Aug. 2000, pp. 36-44.
Payton, D., et al. 1999. Dynamic collaborator discovery in information intensive environments. ACM Comput. Surv. 31, 2es, Article 8 (Jun. 1999), pp. 1-8.
PCT International Search Report for PCT/US03/13985 mailed Aug. 8, 2003; total of 1 sheet.
Pierrakos, Dimitrios, et al., “Web Usage Mining as a Tool for Personalization: A Survey”, User Modeling and User-Adapted Interaction, vol. 13, No. 4, (c) 2003, pp. 311-372.
Schonberg, Edith, et al., “Measuring Success”, Communications of the ACM, vol. 43, Issue 8, Aug. 2000, pp. 53-57.
Shahabi, Cyrus, et al., “Efficient and Anonymous Web-Usage Mining for Web Personalization”, INFORMS Journal on Computing, vol. 15, No. 2, Spring 2003, pp. 123-148.
Soumen Chakrabarti et al., “Focused Crawling: A New Approach to Top-Specific Web Resource Discovery” Computer Networks 31 (1999), pp. 1623-1640.
Srivastava, Jaideep, et al., “Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data”, SIGKDD Explorations, vol. 1. Issue 2, Jan. 2000, pp. 12-23.
Takahashi. 2001. JavaScript Lab: Safe Control of Pop-up Windows. Web Designing. Mainichi Communications, Inc. Jun. 10, 2001. No. 9, vol. 12, pp. 86-89 (separate volume of Mac Fan of Jun. 10 issue).
U.K. Intellectual Property Office, Examination Report in Great Britain application, GB0724938.6, dated Jan. 11, 2010, 2 pages.
U.K. Intellectual Property Office, Official Action mailed Jul. 16, 2010 for British Application No. GB0724938.6, filed Jun. 28, 2008 [1 pg.].
Uehara, Satoru, et al., “An Implementation of Electronic Shopping Cart on the Web System Using component-Object Technology”, Proc. of the 6th International Conf./ on Object-Oriented Real-Time Dependable Systems, Jan. 8-10, 2001, pp. 77-84.
Wenyin, Liu, et al., “Ubiquitous Media Agents: A Framework for Managing Personally Accumulated Multimedia Files”, Multimedia Systems, vol. 9, No. 2, Aug. 2003, pp. 144-156.
WIPO, International Preliminary Report on Patentability (Chap. I of PCT) for PCT/US04/33777, Jan. 23, 2006 [4 pgs].
WIPO, International Preliminary Report on Patentability (Chap. I of PCT) for PCT/US05/01022, Aug. 14, 2006 [6 pgs].
WIPO, International Search Report for PCT/US04/33777, Jan. 19, 2006 [3 pgs.].
WIPO, International Search Report for PCT/US05/01022, Apr. 24, 2006 [3 pgs.].
WIPO, Written Opinion of the International Searching Authority for PCT/US04/33777, Jan. 23, 2006 [3 pgs].
WIPO, Written Opinion of the International Searching Authority for PCT/US05/01022, Apr. 26, 2006 [5 pgs].
Xu, Cheng-Zhong, et al., “A Keyword-Based Semantic Prefetching Approach in Internet News Services”, IEEE Transactions on Knowledge and Data Engineering, vol. 16, Issue 5, May 2004, pp. 601-611.
Yuichi Yagawa et al. TV Program Planning Agent using Analysis Method of User's Taste; IEICE Technical Report vol. 98, No. 437: The Institute of Electronics, Information and Communication Engineers; Dec. 1, 1998, vol. 98, No. 437, pp. 9-16.
Zaiane, Osmar R., et al., “Discovering Web Access Patterns and Trends by Applying OLAP and Data Mining Technology on Web Logs”, IEEE International Forum on Research and Technology Advances in Digital Libraries, Santa Barbara; CA, Apr. 22-24, 1998, pp. 19-29.
Advisory Action dated Nov. 19, 2008 issued in U.S. Appl. No. 11/015,583, 3 pages.
Final Office Action dated Mar. 26, 2010 issued in U.S. Appl. No. 11/207,590, 8 pages.
Final Rejection dated May 21, 2008 issued in U.S. Appl. No. 11/015,583, 8 pages.
International Preliminary Report on Patentability in PCT Appln. No. PCT/US2004/07714, dated Oct. 1, 2005 [4 pages].
International Search Report in PCT Appln. No. PCT/US2004/07714, mailed Mar. 31, 2005 [1 page].
Langheinrich, M., et al. “Unintrusive Customization Techniques for Web Advertising,” NEC Corporation, C&C Media Research Laboratories, Kanagawa, Japan, Computer Networks, vol. 31, No. 11, pp. 1259-1272, May, 1999 (in Conf. Proc. 8th Int'l WWW Conf., Toronta, Canada, May 11-14, 1999).
Non-Final Rejection dated Dec. 20, 2009 issued in U.S. Appl. No. 11/015,583, 8 pages.
Non-Final Rejection dated Jul. 20, 2009 issued in U.S. Appl. No. 11/015,583, 7 pages.
Pierre Maret, et al.; Multimedia Information Interchange: Web Forms Meet Data Servers; Proceedings of the IEEE International Conference on Multimedia Computing and Systems; vol. 2, Jun. 7-11, 1999, pp. 499-505; XP000964627; Florence, Italy.
Ready, Kevin et al., “Plug-n-Play Java Script” (Indianapolis, IN: New Riders Publishing, 1996): 19-22, 39, 40 and 43-45.
Restriction Requirement dated Oct. 31, 2007 issued in U.S. Appl. No. 11/015,583, 6 pages.
Written Opinion in PCT Appln. No. PCT/US2004/07714, mailed Mar. 31, 2005 [3 pages].
European Search Report for Application No. EP 06 01 3103, 2 pages, Feb. 2, 2010.
CodeBrain.com Java at its Best: Javascript index Windows and Frames, http://www.codelifter.com/main/javascript/index—windowframes.html, 2 pages, accessed on Dec. 19, 2005.
Hongyu Liu et al., “Focused Crawling by Leaning HMM fom User's Topic-Specfc Bowsing” Poceedings of the IEEE/WIC/ACM International Conference on Web intelligence (WI '04), 4 pages, Sep. 20, 2004.
Internatonal Peliminar Report on Paentability and Witen Opinion in PCT Application No. PCT/US2005/035352, May 2, 2008.
Japanese Patent Office, Office Action mailed Jul. 26, 2010 from Japanese Serial No, JP2008-519504, filed Jun. 5, 2008.
International Search Report in EP Application No. 05802579.2-1527, dated May 2, 2008, 4 pages.
International Preliminary Report on Patentability and Written Opinion in PCT Application No. PCT/US2005/001022, dated Apr. 26, 2006, 6 pages.
“Ad Cose”Webpage[onlin] C/net Downloads.com [retrieved on Oct. 4, 2001] <URL http:/download.cnet.com/downloads/0-10059-100-915154.thml> 2 pages.
“Ad Muncher”, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet<URL: http//downloads/0-33567-18-100-2750044.html>, 2 pages.
“AdDelete”, Webpage [oniine]. C/net Download.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL: http//download.cnet.com/downloads/0-10059100-7003126.html>, 2 pages.
“Adextinguisher—Introduction and News Section”, Webpage [online][retrieved on Oct. 4, 2001]. Retrieved from the Internet URL:http//adext.magenet.net.html., 2 pages.
“AdPurger”, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL: http//download.cnet.com/downloads/0-10068-100-5067717.html>, 2 pages.
“AdsOff”, Webpage [online]. C/net Downloads.com [retrieved on Oct. 3, 2001]. Retrieved from the Internet<URL:http// download.cnet.com/downloads/0-10059-100-9 12651 html>,, 2 pages.
“AdSubstract SE”, webpage [online], C/net Downloads.com [retrieved on Oct. 4, 2001], Retrieved from the internet<URL:http//download.cnet.com/downloads/0-3356727-100-5963713.html.>, 2 pages.
“Advertising Killer”, webpage online, C/net Downloads.com, retrieved on Oct. 3, 2001, retrieved from the Internet<URL:http//download.cnet.com/downloads/0-10059-100-1539520.html>, 2 pages.
“AllGone”, webpage online, C/net Downloads.corn, retrieved on Oct. 4, 2001, Retrieved from the Internet<URL:http//download.cnet.com/downloads/0-10068-100-2915974.html>, 2 pages.
“AnalogX Pow”, webpage online., C/net Downloads.com, retrieved on Oct. 4, 2001, Retrieved from the Internet<URL:http//download.cnet com/downloads-0-3356748-10-915372.html., 2 pages.
“Banner Zapper”, webpage onlilne, C/net Downloads.com, retrieved on Oct. 4, 2001, Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-3356727-100-6384611.html>., 2 pages.
“BarrPopup”, webpage online, C/net Downloads.com, retrieved on Oct. 4, 2001, retrieved from the Internet<URL:http//downloads.cnet.com/downloads/0-10059-100-6901908.html>, 2 pages.
“Black List”, webpage online, C/net Downloads.com, retrieved on Oct. 4, 2001, retrieved from the Internet<URL:http//downloads.cnet.com/downloads/0-10059-100-902347html>, 2 pages.
“Close Pop 4.0”, webpage online, Take Hike Software, retrieved on Oct. 4, 2001, URL:http//www.ryanware.com/close—popup.html>, 1 page.
“Claria-Company Information—Corporate Overview”, retrieved on Mar. 3, 2005 retrieved from the Internet<URL:http//claria.com/companyinfo.html>.
“Close Popup”, webpage online, C/net Downloads.corn, retrieved on Oct. 4, 2001, retrieved from the internet<URL: http//downloads.cnet.com/downloads/0-10059-100-905799.html>., 2 pages.
“CobraSoft PopStop”, webpage online, C/net Downloads.com, retrieved on Oct. 4, 2001, retrieved from the internet<URL:http//downloads.cnet.com/downloads/0-10058-100-6926765.html>, 2 pages.
“Compare Prices and Read Reviews on AdsOff!”, Epenions.com, webpage online, retrieved on Jan. 21, 2001, 3 pages.
“CrushPop 2000”, webpage online, www.32bit.com, retrieved on Oct. 4, 2001, URL.http//32bit.com/software.com/ software/listings/Internet/Speciall180P/13794.htrnl., 2 pages.
Definition of “Close button”, Microsoft Press Computer Dictionary, 3rd ed., Redmond WA: Microsoft Press, 1997, 2 pages.
“Directive 202/58/EC of the European Parliament and of the Council of Jul. 12, 2002 Concerning the Processing of Persorinal Data arid the Protection of Privacy in the Electronic Communications Sector (Directive on Privacy and Electronic Communications)”, Official Journal L 201, Jul. 31, 2002, pp. 0037-0047.
“DoubleClick”, webpage online, retrieved on Jun. 11, 2003, retrieved from the internet<URL:http//www.doubleclick.com>, 17 pages.
“Close button” Definition from online google search dated Mar. 2, 2007, 1 page.
“Target Gets Mod in Manhattan”, by Laura Heiler, Aug. 20, 2001, pp. 2 & 37.
“InterMute” webpage online, retrieved on Oct. 3, 2001, retrieved from the Internet<URL:http://downloads.cnet.com/downloads/0-10059-100-906599,html>, 2 pages.
“Gator offers one-click shopping at over 5,000 e-commerce sites today”; Jun, 14; 1999; XP002145278; Date retrieved; Jun. 28, 2001., URL:http//www.gator.com/company/press/pr061499b.html., 1 page.
“Opening a Window”, Kourbatov, A., Jul. 8, 2000., published by www.javascript.net, 2 pages.
Marcebra Net, webpage online, C/net Downloads.com, retrieved on Oct. 4, 2001, <URL:http//download.cent.com/downloads/0-3364666-100-5210875,html., 2 pages.
“Mr. KillAd”, webpage online, C/net.Downloads,com, retrieved on Oct. 4, 2001, URL:http//download.cent.com/downloads/0-10059-100-895339.html>, 2 pages.
“Nagger”, webpage online, C/net Downloads.com, retrieved on Oct. 4, 2001, URL:http//download.cnet.com/downloads/0-33567-46-100-2497932 html>, 2 pages.
“NoAds 2000.6.30,1”, webpage oniine, South Bay oftware, retrieved Oct. 4, 2001, URL:http//www.southbaypc.com/NoAds.html, 2 pages.
“NoPops 1.1”, webpage online, WebAttack.com, retrieved on Oct. 4, 2001, URL:http/www.webattach.com/get/noppers.html>, 1 page.
“Paraben's AdStopper”, webpage online, C/net Downloads.com, retrieved on Oct, 4, 2001, URL:http//downloads.cnet.com/downloads/)-10059-100-2643648.html>, 2 pages.
International Search Report and Written Opinion from International Application No. PCT/US05/29615 mailed Mar. 9, 2006, 11 pages.
“Popki Popup Closer 1.4”, webpage online, WebAttach.com, retrieved on Oct. 4, 2001, URL:http//www.webattack.com/get/popki.shtml.>, 1 page.
“PopKill”, webpage online, C/net Downloads.com, retrieved on Oct. 4, 2001, URL:http//clownload.cent.com/downloads/0-10059-100-6967054.html>, 2 pages.
“PopNot” webpage online, C/net Downloads, retrieved on Oct. 4, 2001, URL:http//downloads/0-100-5112702.html>, 2 pages.
“Popup Hunter”, webpage online, C/net Downloads.com, retrieved on Oct. 4, 2001, URL:http//download.cnet.com/downloads/o-10059-100-1451171.html>, 2 pages.
“PopUp Killer” webpage online, C/net Downloads.corn, retrieved on Oct. 3, 2001, URL:http//download.cnet.com/0-10059-100-7253644.html>, 2 pages.
“PopUp Smasher”webpage online, C/net Downloads.com, retrieved on Oct, 4, 2001, URL:http//download.cnet.com/0-3364664-100-7209048.html>, 2 pages.
“Pop-up Stopper”, webpage online, C/net Downloads.com, retrieved on Oct, 3, 2001, URL:http//download.cnet.com/downloads/0/1059-100-6803957.sub--html&-gt, 2 pages.
“PopupDummy!”, webpage online, C/net Downloads.com, retrieved on Oct. 4, 2001, URL:http//download.cnet.com/downloads/0-10059-100-6943327.html>, 2 pages.
The Privacy and Electronic Communications (EC Directive) Regulations 2003 (ECR), No. 2426, Electronic Communication, Sep. 2003, 22 pages.
U.S. Appl. No. 10/061,107 Office Action, mailed Nov. 2, 2005, 10 pages.
Ishitani, Lucila et al., “Masks: Bringing Anonymity and Personalization Together” IEEE Security & Privacy, vol. 1, issue 3, May/Jun. 2003, pp. 18-23.
IRTORG Internet Related Technologies Home Articles FAQs Games BBS Resources Software News Books Downloads About Beta Find, irt.org—JavaScript Windows FAQ Knowiedge Base, Jun. 3, 2006, 24 pages.
Katski, D,, “Web Magician” RocketDownLoad,corn, Http://www.rocketdownload.com/Details/Inte/Webmag.html, Oct. 4, 2004, 2 pages.
Zero Popup, http://download.cnet.com/downloads/0-3356748-100-7163307.html, Sep. 14, 2001 2 pages.
U.S. Appl. No. 11/427,226 Office Action, mailed Aug. 3, 2009, 10 pages.
U.S. Appl. No. 11/427,243 Office Action, mailed Feb. 4, 2010, 11 pages.
U.S. Appl. No. 11/427,226 Office Action, mailed Jun. 7, 2010, 25 pages.
U.S. Appl. No. 11/427,282 Office Action, mailed Aug. 10, 2009, 9 pages.
U.S. Appl. No. 11/207,590 Office Action, mailed Oct. 10, 2007, 13 pages.
U.S. Appl. No. 11/427,243 Office Action, mailed May 10, 2011, 24 pages.
U.S. Appl. No. 11/207,590 Office Action, mailed Mar. 26, 2010, 8 pages.
U.S. Appl. No. 11/207,590 Office Action, mailed Jun. 22, 2009, 8 pages.
U.S. Appl. No. 11/207,592 Office Action, mailed Jun. 24, 2008, 15 pages.
U.S. Appl. No. 10/700,820 Office Action, mailed May 24, 2007, 15 pages.
U.S. Appl. No. 10/700,820 Office Action, mailed Apr. 25, 2016, 7 pages.
U.S. Appl. No. 10/700,820 Office Action, mailed Dec. 26, 2006, 19 pages.
U.S. Appl. No. 11/207,592 Office Action, mailed Feb. 25, 2009, 7 pages.
U.S. Appl. No. 11/427,243 Office Action, mailed Jun. 25, 2009, 8 pages.
U.S. Appl. No. 10/061,107 Office Action, mailed Aug. 13, 2003, 5 pages.
U.S. Appl. No. 10/700,820 Office Action, mailed Sep. 13, 2006, 11 pages.
U.S. Appl. No. 10/061,107 Office Action, mailed Jan. 14, 2004, 10 pages.
U.S. Appl. No. 10/056,932 Office Action, mailed Sep. 16, 2004, 9 pages.
U.S. Appl. No. 10/056,932 Office Action, mailed Mar. 18, 2005, 8 pages.
U.S. Appl. No. 11/417,282 Office Action, mailed Apr. 27, 2010, 19 pages.
U.S. Appl. No. 10/056,932 Office Action, mailed Jul. 27, 2005, 7 pages.
U.S. Appl. No. 11/207,590 Office Action, mailed Oct. 27, 2010, 10 pages.
U.S. Appl. No. 11/207,592 Office Action, mailed Sep. 24, 2007, 13 pages.
U.S. Appl. No. 10/061,107 Office Action, mailed Sep. 28, 2010, 13 pages.
U.S. Appl. No. 10/056,932 Office Action, mailed Sep. 5, 2003, 6 pages.
U.S. Appl. No. 10/056,932 Office Action, mailed May 7, 2004.
U.S. Appl. No. 11/207,589 Office Action, mailed Oct. 19, 2007, 10 pages.
U.S. Appl. No. 10/061,107 Office Action, mailed May 5, 2006, 12 pages.
“Pug-n-Play Java Script”, Kevin Ready, et al., New Riders Publishing, Indianapolis, IN, Oct. 1996, 11 pages.
“Surf in Peace 2.01”webpage online, WebAttack.com, retrieved on Oct. 4, 2001, URL:http//download.cnet.com/URL:http//www.webattach.com/get/sip.shtml>, 2 pages.
Non-Final Office Action mailed Oct. 16, 2007 from U.S. Appl. No. 11/210,209, 5 pages.
Non-Final Office Action mailed Jun. 23, 2006 from U.S. Appl. No. 11/211,197, 4 pages.
Final Office Action mailed May 10, 2011 from U.S. Appl. No. 11/427,243, 24 pages.
“Ultraseek Server Detailed Feature List”, http://software.infoseek.com/products/ultraseek/ultrafeatures.htm., Accessed from Apr. 1998, archive from http:web.archive.org/web/19980419092128/https:;;software.infoseek.com/products/ 8 pages.
KIPO Office Action Dated Nov, 23, 2010, 8 pages.
International Search Report and Written Opinion from International Application No. PCT/US05/45722 mailed Jan. 19, 2007, 12 pages.
International Search Report and Written Opinion mailed from International Application No. PCT/US2006/025103 mailed Jan. 29, 2008, 6 pages.
International Search Report and Written Opinion from International Application No. PCT/US04/03377 mailed Jan. 19, 2006, 6 pages.
International Search Report and Written Opinion from International Application No. PCT/US05/01022 mailed Apr. 24, 2006, 8 pages.
International Search Report and Written Opinion from International Application PCT/US2005/029615 mailed Mar. 9, 2006.
International Search Report and Written Opinion from International Application PCT/US2005/35352 mailed Sep. 11, 2007, 8 pages.
Final Office Action mailed Mar. 25, 2011 from U.S. Appl. No. 11/420,191, 45 pages.
Final Office Action mailed Feb. 16, 2011 from U.S. Appl. No. 11/688,160, 15 pages.
International Preliminary Report on Patentability and Written Opinion from International Application No. PCT/US05/035352 mailed Sep. 11, 2007.
International Preliminary Report on Patentability from International Application No. PCT/US2005/029615 mailed Mar. 9, 2006, 7 pages.
International Preliminary Report on Patentability from International Application No. PCT/US2005/035352 mailed Sep. 11, 2007.
International Preliminary Report on Patentability from International Application No. PCT/US06/09954 mailed Aug. 30, 2006, 6 pages.
International Preliminary Report on Patentability from International Application No. PCT/US023386 mailed Jul 12, 2007, 7 pages.
International Preliminary Report on Patentability from International Application No. PCT/US06/025102 mailed Jul. 26, 2007, 4 pages.
International Preliminary Report on Patentability from International Application No. PCT/US06/025104 mailed Jan. 23. 2007, 5 pgs.
International Preliminary Report on Patentability from International Application No. PCT/US07/061944 mailed Feb, 14, 2008, 4 pgs.
International Preliminary Report on Patentability from International Application No. PCT/US06/008049 mailed Oct. 19, 4 pages.
International Preliminary Report on Patentability from International Application No. PCT/US06/008050 mailed Oct. 19, 2007, 4 pages.
International Preliminary Report on Patentability from International Application No. PCT/US06/025103 mailed Jan. 29, 2008, 4 pages.
International Preliminary Report on Patentability from International Application No. PCT/US06/009954 mailed Aug, 30, 2006, 6 pages.
Supplemental Notice of Allowability mailed Aug. 7, 2008 from U.S. Appl. No. 11/207,589, 4 pages.
Office Action from UK Application No. GB0724938.6 dated Feb, 16, 2011.
“Shopping with WhenUShop”, webpage online, WhenU.com, retrieved Mar. 19, 2002, URL:http//www.whenu.com.
“SideStep, The Traveler's Search Engine”; webpage online, retrieved on Oct. 7, 2004, URL:http://www.sidestep.com/main.html.
Lindsay Smith, “A Tutorial on Principal Components Analysis”, Feb, 26, 2002.
Visual Search ToolBar-Graphically Enhance Search Results, 2004, Viewpoint Corporation; webpage online, retrieved Oct, 7, 2004., URL:http://www.viewpoint.com/pub/toolbar/download.html.
PopUp Eraser, Webpage online, C/net Downloads.com, retrieved Oct 4, 2001, retrieved from the Internet at URL:http/ download.cnet.com/downloads/0-10059-100-5322841.html.
Related Publications (1)
Number Date Country
20100306053 A1 Dec 2010 US
Provisional Applications (1)
Number Date Country
60637684 Dec 2004 US
Continuations (1)
Number Date Country
Parent 11226066 Sep 2005 US
Child 12715311 US