This invention relates generally to network computing of the type which occurs over the Internet, for example, and, more particularly, to a method of protecting the providers of pay-per click services from multiple illegitimate usages.
Over the last few years in particular, the capabilities of the Internet have grown dramatically, with the introduction of new protocols (i.e., XML), advanced browsers, electronic commerce capabilities, and other features.
Numerous commercial enterprises are now attempting to somehow profit through this new infrastructure, in many cases by providing services that attach a smaller incremental monetary value to a particular transaction.
One such type of capability is the pay-per-click search engine popularized by Google and other companies. In accordance with such a capability, a user goes to a website, and inputs the name of goods or services that they would like the pay-per-click company to find. Various providers of goods and services register their websites with the company, and these are provided to the user in a list which is prioritized by the level of compensation which the merchant will give the pay-per-click company if the user is routed to their site. For example, using such a system, if a user types in “binoculars,” the pay-per-click system might return five potential links, with the most prominent one being associated with that supplier of binoculars which will compensate for a penny or a few cents more than the links presented below.
One problem with existing systems, is that a user may cause an undesirable level of expenditure on the part of the merchant by overclicking on a particular link. In some cases, it has been known that some users have done this simply for the purpose of undermining a particular provider or competitor. Since the existing systems have no way of knowing whether a link through is legitimate or bogus, the provider of the goods/services winds up having to pay the pay-per-click provider excess sums, with the fraudulent perpetrator remaining unreprimanded.
This invention improves upon existing pay-per-click arrangements periodically generating a code associated with the search-engine users. This code, preferably in the form of a serial number, is compared to the user of the website, such that by observing a metric like the number of clicks for a given period of time, be it a short time or a longer period, such as a day or a week, the system can automatically determine if certain clicks are illegitimate. This allows the pay-per-click company to more fairly invoice the merchants, thereby preventing fraudulent over use.
Reference is made to
The search engine 102 provides a result along path 104 which is indicative of a link associated with different users. Engine 102 may be any existing or yet-to-be-developed system, including findwhat.com, Google Adwords, overture, looksmart.com, kanoodle.com, and so forth.
In addition to the result generated along path 104, according to this invention, the search engine generates a code, preferably in the form of a serial number utilizing a cookie via active X, Java, Javascript, or any other type of technology based upon the end-user's Global Unique Identifier (GUID). In addition, or as an alternative, network cartography may be generated periodically for each user based upon their use of the search engine 102.
Although the encoded serial number is shown being written to a floppy disk 106, again, it will be appreciated by those of skill in the art that any type of storage capability, such as a flash memory, and so forth may alternatively be utilized. The code (e.g., a serial number) generated by the search engine along path 105 is concatenated with the result along path 104 through XML link 110. Given the serial number provided through the cookie, this allows the concatenation to occur through firewalls and other devices which may otherwise block the transmission as unauthorized.
As the pay-per-click company 120, information is received regarding a click to website 122, but at the same time, the serial number is transmitted to the company 120 along path 130. This allows the pay-per-click company 120 to invoice the website 122 only when the serial numbers received. According to the invention, a legitimate serial number may be generated in different ways, including the first use of a different user having a unique IP address, or, if multiple requests are made by the same user, they may be considered legitimate if they are sufficiently spaced apart in time to be indicative of a legitimate as opposed to fraudulent access to the website 122.
This application is a continuation application of U.S. patent application Ser. No. 11/781,716, filed Jul. 23, 2007, now U.S. Pat. No. 7,953,667, which is a continuation-in-part application of U.S. patent application Ser. No. 10/360,688, filed Feb. 7, 2003, now U.S. Pat. No. 7,249,104. All of the above mentioned applications are incorporated by reference herein in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
5848396 | Gerace | Dec 1998 | A |
5991740 | Messer | Nov 1999 | A |
6125352 | Franklin et al. | Sep 2000 | A |
6285987 | Roth et al. | Sep 2001 | B1 |
6775831 | Carrasco et al. | Aug 2004 | B1 |
7020622 | Messer | Mar 2006 | B1 |
7043471 | Cheung et al. | May 2006 | B2 |
7136860 | Doliov | Nov 2006 | B2 |
20010007097 | Kim | Jul 2001 | A1 |
20010037314 | Ishikawa | Nov 2001 | A1 |
20030216930 | Dunham et al. | Nov 2003 | A1 |
20060041505 | Enyart | Feb 2006 | A1 |
Number | Date | Country | |
---|---|---|---|
20110231249 A1 | Sep 2011 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11781716 | Jul 2007 | US |
Child | 13117929 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10360688 | Feb 2003 | US |
Child | 11781716 | US |