Method for attributing and allocating revenue related to embedded software

Information

  • Patent Grant
  • 8645941
  • Patent Number
    8,645,941
  • Date Filed
    Monday, March 6, 2006
    18 years ago
  • Date Issued
    Tuesday, February 4, 2014
    10 years ago
Abstract
A method for attributing revenue for embedded software. The method includes the first step of determining the presence of more than one type of embedded software on a given client site. Then, the process assigns priority based on the length of time each type has resided on the client system and the source of each type, followed by classifying each software type, based on the history of present and predecessor copies of the software. A distribution factor is applied to each software type, based on priority and classification, partner revenue is distributed based on the distribution factor applied to each software type.
Description
BACKGROUND OF THE INVENTION

The present invention relates generally to the field of software marketing, and more particularly to the field of embedded software. Particular aspects of the present invention are described in the claims, specification and drawings.


Software lends itself to a number of distribution channels, apart from conventional sale or licensing of computer programs. One such channel is so-called shareware, in which a user is given a copy of the software, either in a demonstration, partially functional or fully functional version, and if the user wishes to continue using the product after a stated trial period, a license fee is paid to the producer. A variation on that theme is known as “freeware,” where no fee at all is charged. These systems are most often utility programs and the like, produced by enthusiasts.


A relatively recent form of software distribution may be termed “embedded software.” This term refers to situations in which a commercial entity seeks to gain some commercial advantage through a software installation on a user's computer, and it provides software desirable to the user to induce that use. The software desired by the user is bundled with software of interest to the distributor. A familiar example of this type is the Google toolbar, distributed by the Google search engine provider. Google distributes the toolbar, which offers several useful functionality features, including allowing a user to perform an internet search directly from the browser. Of course, the search is performed on Google, which benefits Google directly, but the user also gains in being able to perform rapid searching, as well as other features offered on the toolbar.


A number of US Patent Applications filed by the assignee of the present invention address a form of this software, in which a behavior monitoring module is resident on a client computer. That module records the user's internet activity and reports that information via cookies to a host system. In return, distributors of the module provide utility applications such as screen savers and the like to the user. Examples or such applications include U.S. patent application Ser. No. 11/226,066, entitled “Method and Device for Publishing Cross-Network User Behavioral Data” filed on Sep. 14, 2005, published as US 2006-0136528 A1 on Jun. 22, 2006, and issued as U.S. Pat. No. 7,693,863 on Apr. 6, 2010.


Such behavior monitoring applications can be used to provide targeted content, including advertising, to the user. Exposure of such advertising, as well as a user's response to the same, generates revenue from the host to the module's distributor. A problem can arise, however, when more than one such module is resident on a client computer. There, a revenue stream is generated, but attributing that revenue to a particular source is difficult. Most industry participants take the easy solution in this situation, eliminating any revenue participation by a second module.


That difficulty can have repercussions in the market. If, for example, a non-trivial number of client computers on which a given module is installed already have a module present, the resulting reduction of revenue may motivate a distributor against investing in such a marketing program.


A need exists, therefore, for a system for attributing revenue for such subscription-based software systems. The attribution must allow for multiple-module participation while remaining generally fair to the first-installed system. The method must also be easy to administer and capable of running from the module itself, which must recognize other modules within a client environment.


SUMMARY OF THE INVENTION

An aspect of the invention is a method for attributing revenue for embedded software. The method includes the first step of determining the presence of more than one type of embedded software on a given client site. Then, the process assigns priority based on the length of time each type has resided on the client system and the source of each type, followed by classifying each software type, based on the history of present and predecessor copies of the software. A distribution factor is applied to each software type, based on priority and classification, partner revenue is distributed based on the distribution factor applied to each software type.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates the relationship between the host organization, partner distributors, and the client location.



FIG. 2 depicts and embodiment of a process for allocating and attributing a revenue stream related to subscription-based software.



FIG. 3 depicts a schema for designating application states based on tenure and environment in a client location.





DETAILED DESCRIPTION

The following detailed description is made with reference to the figures. Preferred embodiments are described to illustrate the present invention, not to limit its scope, which is defined by the claims. Those of ordinary skill in the art will recognize a variety of equivalent variations on the description that follows.



FIG. 1 illustrates the interaction between various systems that characterizes the environment of the present invention. There, a host 10 is the producer of client modules, such as resident modules CM1 and CM2, identified as items 18 and 20, which are resident on a client system 12. Here, a client system can refer to any computer, but most specifically a computer on which an internet browser 14 operates. It should be clear that the definition of client systems and browsers is very broad, encompassing any computing device capable of accessing the internet, as well as the range of browsers from Firefox and Opera to Microsoft Internet Explorer. That breadth is intentional, as the field for the present invention is as wide as the internet.


Here, two client modules are resident on the client system, distributed by firms other than Host, here designated Partner 1 (item 22) and Partner 2 (item 24). Following the normal practice in the industry, the partners may distribute software directly to the user, or software may be provided to a website 23 operated by some third party, who then distributes the software to the user.


As noted above, the package distributed to the client computer includes a client application 16 that is of interest to the user. This may be a screen saver, system utility or game, or other. Of interest to the supplier is the module CM1 or CM2, which may offer functionality of direct benefit to the supplier, such as providing a toolbar that directs traffic to the partner's site. Of indirect benefit are modules that provide customer information. Typically such information is gathered and collated by the client module, and it may be periodically transmitted to the host in a cookie 26 or via direct data transmission. Typical of such applications is the system described in U.S. patent application Ser. No. 11/226,066, entitled “Method and Device for Publishing Cross-Network User Behavioral Data” filed on Sep. 14, 2005, published as US 2006-0136528 A1 on Jun. 22, 2006, and issued as U.S. Pat. No. 7,693,863 on Apr. 6, 2010.


Data provided to the Host system results in some revenue-generating action. A straightforward application might be the display of advertising material on the user's desktop, for example. The Host could be compensated based on the number of advertisements displayed, the number of click-throughs generated, or some other metrics. Those details are known in the art and form no part of the present invention. For purposes of explaining operation of the present invention, it suffices to note that revenue is generated.


As a result of the activity reported by the client modules to Host 10, the latter directs a revenue stream 27 to each partner. In this instance, however, it is difficult to determine which partner should receive what revenue, owing to the presence of two client modules on the client computer. It should be noted that the number of modules present may not be limited to two. If the user is active on the internet, it is possible that a number of modules will have been introduced to the same client computer, along with various utility applications. The process described below will deal with any number of modules present in a single client system.


A process for attributing the revenue associated with several client modules is shown in FIG. 2. As seen there, the first step 50 is to collect data, accomplished by receiving and processing cookies 26 or transmissions in a known manner. Each client computer is assigned a unique ID number, which identifies a computer without including any individual-specific data about the user. Similarly, cookies identify the client module providing the data, which in turn allows the Host company to identify the partner responsible for that module. Alternatively, the modules can communicate data directly to Host as desired, as is known in the art. Thus, in the course of processing the data it will become apparent that certain data are originating from the same computer but from different client modules.


The system then proceeds to determine the “anchor” applications on a particular client computer, in step 52. This determination involves a check of the tenure of each module on the particular system, and the underlying rationale is that splitting revenue among partners who contributed regarding a particular client system is important, but each partner should only be represented once, even when multiple applications are running. That data is available at the Host, which can quickly determine which applications from a particular partner have been on the client system the longest. Those applications are deemed “anchor” applications, and they are used for further calculation of attribution rates. Generally the process of assigning anchor applications reduces the number of revenue contestants to two, though there may be a higher number in particular circumstances.


Next, in step 54, each anchor application is assigned a state. State criteria are best seen in FIG. 3, which makes clear that the rationale for various states is to recognize and reward the various roles played by applications installed at various times. In this drawing, time is the horizontal dimension, with various module versions being resident on the specific client computer for the times indicated.


The most obvious state is state 70, labeled “virgin”. This state occurs when a module is the first application installed on a machine. This event is of course particularly valuable, and that status is rewarded accordingly.


Addition of a second module is an event that must be treated as significant, however, even though a first module is then operable, for the reasons discussed above. In the example shown, a second application 74 is installed at some time after the “virgin” application 70. The new application will not gather any more information regarding monetization than does the existing one, so it is classified as an “insurance” application. That is, the information it provides is recognized as duplicative as long as the “virgin” application continues to function, but the importance of having that application in place is recognized and compensated.



FIG. 3 also illustrates a common event in the history of client application modules, namely the likelihood that at some point all existing applications will be uninstalled. Whether the uninstall results from a system crash, or reconfiguration, or other action, the result is the same—at least some existing application modules disappear, and no further data is forthcoming from the client location, as shown at the gap labeled “uninstall” and indicated by arrow 78.


Here, if one of the existing “insurance” applications may survive the uninistall of other applications, so that location coverage actually continues uninterrupted, in spite of the loss of the “virgin” application and possible one or more “insurance” applications. Such an application is termed an “extension” application 76.


In the event that no “extension” application is present, another application may be installed at some time after the uninstall event. Such an application is labeled a “refresh” application 72, to distinguish it from a “virgin” application that is installed at a location never before covered by a Host application.


Next, as shown in step 56, the revenue associated with a particular location must be determined. The exact methods for performing that calculation will vary depending on the particular business involved, as will be understood by those in the art. In the example of a system that monitors user behavior and participates in an advertising system, revenue might be calculated on a sum of set rates per impression, per click-through, and per transaction that results in a purchase. Many other combinations of factors are known in the industry. The result of any such calculation is a total that represents the amount of revenue generated by a specific location for the time period involved, the latter most generally being a month.


With the total revenue figure in hand, the share of that revenue that is paid to the partner responsible for generating that revenue is determined, in step 58. Almost invariably, the details of any such division will be governed by the specific contract between the parties. Some generalization is possible, however, in setting out the present solution to the problem described above. Rather than a set rate, which has been a norm, parties following the present invention can set out a rate schedule based on the state of the client application. Based on the classifications set out in FIG. 3, a partner could be allocated a share of revenue based on Table 1.









TABLE 1







Revenue Share vs. Application State









Virgin
Extension/Refresh
Insurance





50%
30%
10%









As might be expected, a partner receives the highest revenue share for a “virgin” state, one which is opened for the first time. A reduced rate, but still substantial, is paid for an “extension” or “refresh” state, as those situations remains productive. Unlike any previous systems, however, the present invention allows for payment in the “insurance” state, in which the particular application is completely redundant. The utility of having a backup system, and for incenting partners to continue their placement programs, produces significant market advantages in terms of the actual number of systems in the field and operating at any given time.


Those in the art will appreciate that a number of variations are possible on the general principles set out here. While the present invention is disclosed by reference to the preferred embodiments and examples detailed above, it is understood that these examples are intended in an illustrative rather than in a limiting sense. It is contemplated that modifications and combinations will readily occur to those skilled in the art, which modifications and combinations will be within the spirit of the invention and the scope of the following claims.

Claims
  • 1. A method, comprising: determining a first revenue distribution factor for a client computer system based at least in part on a first tenure of a first embedded software on the client computer system, the first tenure including a first length of time from installation of the first embedded software until the determining the first revenue distribution factor;determining a second revenue distribution factor for the client computer system based at least in part on a second tenure of a second embedded software on the client computer system, the second tenure including a second length of time from installation of the second embedded software until the determining the second revenue distribution factor, wherein the second tenure is less than the first tenure, andwherein the first and second embedded software includes a first and second behavior monitoring application configured to provide targeted content to the client computer system, the targeted content based on at least a recorded behavior;determining a third revenue distribution factor for the client computer system based at least in part on an uninstallation of the first embedded software and in response to the uninstallation, configuring the second behavior monitoring application to provide the targeted content to the client computer system; anddistributing partner revenue based at least in part on the first, second, and third revenue distribution factors and a rate schedule, the rate schedule configured to distribute a largest share of the partner revenue to an entity associated with the first revenue distribution factor.
  • 2. The method of claim 1, further comprising determining a fourth revenue distribution factor based at least in part on a previous copy of the first embedded software that was resident in the client computer system.
  • 3. The method of claim 1, further comprising determining a fourth revenue distribution factor based at least in part on a prior embedded software that was installed on the client computer system prior to at least a partially duplicative embedded software installed on the client computer system.
  • 4. The method of claim 1, further comprising determining a fourth revenue distribution factor based at least in part on uninstalled embedded software which remained in response to an uninstallation of at least a partially duplicative embedded software on the client computer system.
  • 5. The method of claim 1, further comprising determining a fourth revenue distribution factor based at least in part on other embedded software installed after uninstallation of at least a partially duplicative embedded software on the client computer system.
  • 6. The method of claim 1, further comprising: determining a presence of the first embedded software in a computer-readable storage medium of the client computer system.
  • 7. The method of claim 6, further comprising: determining an other presence of an other embedded software in the computer readable storage medium of the client computer system; andidentifying the other embedded software as duplicative of the first embedded software.
  • 8. The method of claim 7, wherein the first embedded software is considered to be duplicative of the other embedded software in response to the first embedded software being duplicative of the other embedded software.
  • 9. The method of claim 7, wherein the first embedded software is an earlier version of the other embedded software.
  • 10. The method of claim 1, wherein another embedded software is associated with another entity and wherein the entity is distinct from the another entity.
  • 11. The method of claim 1, further comprising determining a fourth revenue distribution factor based at least in part on a previous copy of an other embedded software that has been resident in the client computer system.
  • 12. The method of claim 1, wherein the first, second, and third revenue distribution factors are determined at predetermined times.
  • 13. The method of claim 12, wherein the first, second, and third revenue distribution factors are determined on a monthly basis.
  • 14. The method of claim 1, wherein the rate schedule is further configured to distribute a smaller share of the partner revenue to a second entity associated with the third revenue distribution factor.
  • 15. The method of claim 14, wherein the rate schedule is further configured to distribute a smallest share of the partner revenue to a third entity associated with the second revenue distribution factor.
  • 16. A non-transitory computer-readable medium storing executable instructions that, when executed, cause a computer to perform operations comprising: determining a first revenue distribution factor for a client computer system based at least in part on a first tenure of a first embedded software on the client computer system, the first tenure including a first length of time from installation of the first embedded software until the determining the first revenue distribution factor;determining a second revenue distribution factor for the client computer system based at least in part on a second tenure of a second embedded software on the client computer system, the second tenure including a second length of time from installation of the second embedded software until the determining the second revenue distribution factor, wherein the second tenure is less than the first tenure, andwherein the first and second embedded software includes a first and second behavior monitoring application configured to provide targeted content to the client computer system, the targeted content based on at least a recorded behavior;determining a third revenue distribution factor for the client computer system based at least in part on an uninstallation of the first embedded software and in response to the uninstallation, configuring the second behavior monitoring application to provide the targeted content to the client computer system; anddistributing partner revenue based at least in part on the first, second, and third revenue distribution factors and a rate schedule, the rate schedule configured to distribute a largest share of the partner revenue to an entity associated with the first revenue distribution factor.
RELATED APPLICATION

This application claims the benefit of U.S. Provisional Patent Application No. 60/659,682, entitled “Athena-Related Analytical Methods and Devices” filed on Mar. 7, 2005 by Mitchell Weisman, Craig Zeldin, David Goulden, Eric McKinlay and Dominic Bennett. That application is incorporated by reference for all purposes.

US Referenced Citations (417)
Number Name Date Kind
4977594 Shear Dec 1990 A
5247517 Ross et al. Sep 1993 A
5315580 Phaal May 1994 A
5446919 Wilkins Aug 1995 A
5469553 Patrick Nov 1995 A
5481741 McKaskle et al. Jan 1996 A
5499340 Barritz Mar 1996 A
5608850 Robertson Mar 1997 A
5617526 Oran et al. Apr 1997 A
5627886 Bowman May 1997 A
5638443 Stefik et al. Jun 1997 A
5642484 Harrison, III et al. Jun 1997 A
5675510 Coffey et al. Oct 1997 A
5682525 Bouve et al. Oct 1997 A
5706502 Foley et al. Jan 1998 A
5708709 Rose Jan 1998 A
5708780 Levergood et al. Jan 1998 A
5710918 Lagarde et al. Jan 1998 A
5712979 Graber et al. Jan 1998 A
5715453 Stewart Feb 1998 A
5717860 Graber et al. Feb 1998 A
5717923 Dedrick Feb 1998 A
5724521 Dedrick Mar 1998 A
5724567 Rose et al. Mar 1998 A
5734863 Kodosky et al. Mar 1998 A
5745681 Levine et al. Apr 1998 A
5751956 Kirsch May 1998 A
5754938 Herz et al. May 1998 A
5758111 Shiratori et al. May 1998 A
5761662 Dasan Jun 1998 A
5787253 McCreery et al. Jul 1998 A
5794259 Kikinis Aug 1998 A
5796952 Davis et al. Aug 1998 A
5809242 Shaw et al. Sep 1998 A
5812642 Leroy Sep 1998 A
5812769 Graber et al. Sep 1998 A
5819047 Bauer et al. Oct 1998 A
5819092 Ferguson et al. Oct 1998 A
5822526 Waskiewicz Oct 1998 A
5832502 Durham et al. Nov 1998 A
5835087 Herz et al. Nov 1998 A
5835722 Bradshaw et al. Nov 1998 A
5848396 Gerace Dec 1998 A
5854897 Radziewicz et al. Dec 1998 A
5872850 Klein et al. Feb 1999 A
5875296 Shi et al. Feb 1999 A
5883955 Ronning Mar 1999 A
5887133 Brown et al. Mar 1999 A
5893118 Sonderegger Apr 1999 A
5898434 Small et al. Apr 1999 A
5901287 Bull et al. May 1999 A
5905492 Straub et al. May 1999 A
5918014 Robinson Jun 1999 A
5920697 Masters et al. Jul 1999 A
5923845 Kamiya et al. Jul 1999 A
5930700 Pepper et al. Jul 1999 A
5933811 Angles et al. Aug 1999 A
5937037 Kamel et al. Aug 1999 A
5943478 Aggarwal et al. Aug 1999 A
5948061 Merriman et al. Sep 1999 A
5958015 Dascalu Sep 1999 A
5959621 Nawaz et al. Sep 1999 A
5961593 Gabber et al. Oct 1999 A
5963915 Kirsch Oct 1999 A
5978836 Ouchi Nov 1999 A
5987606 Cirasole et al. Nov 1999 A
5991735 Gerace Nov 1999 A
5995597 Woltz et al. Nov 1999 A
5996011 Humes Nov 1999 A
5999740 Rowley Dec 1999 A
6006252 Wolfe Dec 1999 A
6009410 LeMole et al. Dec 1999 A
6011537 Slotznick Jan 2000 A
6014502 Moraes Jan 2000 A
6014638 Burge et al. Jan 2000 A
6014711 Brown Jan 2000 A
6026368 Brown et al. Feb 2000 A
6026933 King et al. Feb 2000 A
6029141 Bezos et al. Feb 2000 A
6029145 Barritz et al. Feb 2000 A
6029195 Herz Feb 2000 A
6047327 Tso et al. Apr 2000 A
6052709 Paul Apr 2000 A
6052730 Felciano et al. Apr 2000 A
6065056 Bradshaw et al. May 2000 A
6067561 Dillon May 2000 A
6070140 Tran May 2000 A
6073105 Sutcliffe et al. Jun 2000 A
6073241 Rosenberg et al. Jun 2000 A
6076166 Moshfeghi et al. Jun 2000 A
6078916 Culliss Jun 2000 A
6088731 Kiraly et al. Jul 2000 A
6101510 Stone et al. Aug 2000 A
6108637 Blumenau Aug 2000 A
6108691 Lee et al. Aug 2000 A
6108799 Boulay et al. Aug 2000 A
6112215 Kaply Aug 2000 A
6115680 Coffee et al. Sep 2000 A
6119098 Guyot et al. Sep 2000 A
6122632 Botts et al. Sep 2000 A
6128663 Thomas Oct 2000 A
6133912 Montero Oct 2000 A
6133918 Conrad et al. Oct 2000 A
6134532 Lazarus et al. Oct 2000 A
6138146 Moon et al. Oct 2000 A
6138155 Davis et al. Oct 2000 A
6141010 Hoyle Oct 2000 A
6144944 Kurtzman, II et al. Nov 2000 A
6151596 Hosomi Nov 2000 A
6154738 Call Nov 2000 A
6161112 Cragun et al. Dec 2000 A
6163778 Fogg et al. Dec 2000 A
6182097 Hansen et al. Jan 2001 B1
6183366 Goldberg et al. Feb 2001 B1
6185614 Cuomo et al. Feb 2001 B1
6192380 Light et al. Feb 2001 B1
6199079 Gupta et al. Mar 2001 B1
6208339 Atlas et al. Mar 2001 B1
6216141 Straub et al. Apr 2001 B1
6222520 Gerszberg et al. Apr 2001 B1
6233564 Schulze, Jr. May 2001 B1
6237022 Bruck et al. May 2001 B1
6249284 Bogdan Jun 2001 B1
6253188 Witek et al. Jun 2001 B1
6253208 Wittgreffe et al. Jun 2001 B1
6266058 Meyer Jul 2001 B1
6269361 Davis et al. Jul 2001 B1
6285987 Roth et al. Sep 2001 B1
6286043 Cuomo et al. Sep 2001 B1
6295061 Park et al. Sep 2001 B1
6297819 Furst Oct 2001 B1
6304844 Pan et al. Oct 2001 B1
6308202 Cohn et al. Oct 2001 B1
6311194 Sheth et al. Oct 2001 B1
6314451 Landsman et al. Nov 2001 B1
6314457 Schena et al. Nov 2001 B1
6317761 Landsman et al. Nov 2001 B1
6321209 Pasquali Nov 2001 B1
6321256 Himmel et al. Nov 2001 B1
6324553 Cragun et al. Nov 2001 B1
6324569 Ogilvie et al. Nov 2001 B1
6324583 Stevens Nov 2001 B1
6327574 Kramer et al. Dec 2001 B1
6327617 Fawcett Dec 2001 B1
6332127 Bandera Dec 2001 B1
6334111 Carrott Dec 2001 B1
6335963 Bosco Jan 2002 B1
6336131 Wolfe Jan 2002 B1
6338059 Fields et al. Jan 2002 B1
6338066 Martin et al. Jan 2002 B1
6341305 Wolfe Jan 2002 B2
6347398 Parthasarathy et al. Feb 2002 B1
6351279 Sawyer Feb 2002 B1
6351745 Itakura et al. Feb 2002 B1
6356898 Cohen et al. Mar 2002 B2
6356908 Brown et al. Mar 2002 B1
6360221 Gough et al. Mar 2002 B1
6366298 Haitsuka Apr 2002 B1
6370527 Singhal Apr 2002 B1
6377983 Cohen et al. Apr 2002 B1
6378075 Goldstein et al. Apr 2002 B1
6381735 Hunt Apr 2002 B1
6381742 Forbes et al. Apr 2002 B2
6385592 Angles et al. May 2002 B1
6392668 Murray May 2002 B1
6393407 Middleton et al. May 2002 B1
6393415 Getchius et al. May 2002 B1
6397228 Lamburt et al. May 2002 B1
6401075 Mason et al. Jun 2002 B1
6415322 Jaye Jul 2002 B1
6418440 Kuo et al. Jul 2002 B1
6418471 Shelton et al. Jul 2002 B1
6421675 Ryan et al. Jul 2002 B1
6421724 Nickerson et al. Jul 2002 B1
6434745 Conley, Jr. et al. Aug 2002 B1
6438215 Skladman et al. Aug 2002 B1
6438578 Schmid et al. Aug 2002 B1
6438579 Hosken Aug 2002 B1
6442529 Krishan et al. Aug 2002 B1
6446128 Woods et al. Sep 2002 B1
6449657 Stanbach, Jr. et al. Sep 2002 B2
6457009 Bollay Sep 2002 B1
6459440 Monnes et al. Oct 2002 B1
6460036 Herz Oct 2002 B1
6460042 Hitchcock et al. Oct 2002 B1
6460060 Maddalozzo et al. Oct 2002 B1
6466970 Lee et al. Oct 2002 B1
6477550 Balasubramaniam et al. Nov 2002 B1
6477575 Koeppel et al. Nov 2002 B1
6480837 Dutta Nov 2002 B1
6490722 Barton et al. Dec 2002 B1
6493702 Adar et al. Dec 2002 B1
6496931 Rajchel et al. Dec 2002 B1
6502076 Smith Dec 2002 B1
6513052 Binder Jan 2003 B1
6513060 Nixon et al. Jan 2003 B1
6516312 Kraft et al. Feb 2003 B1
6523021 Monberg et al. Feb 2003 B1
6529903 Smith et al. Mar 2003 B2
6539375 Kawasaki Mar 2003 B2
6539424 Dutta Mar 2003 B1
6564202 Schuetze et al. May 2003 B1
6567850 Freishtat et al. May 2003 B1
6567854 Olshansky et al. May 2003 B1
6570595 Porter May 2003 B2
6584492 Cezar et al. Jun 2003 B1
6594654 Salam et al. Jul 2003 B1
6601041 Brown et al. Jul 2003 B1
6601057 Underwood et al. Jul 2003 B1
6601100 Lee et al. Jul 2003 B2
6604103 Wolfe Aug 2003 B1
6615247 Murphy Sep 2003 B1
6631360 Cook Oct 2003 B1
6642944 Conrad et al. Nov 2003 B2
6643696 Davis et al. Nov 2003 B2
6665656 Carter Dec 2003 B1
6665838 Brown et al. Dec 2003 B1
6678866 Sugimoto et al. Jan 2004 B1
6681223 Sundaresan Jan 2004 B1
6681247 Payton Jan 2004 B1
6686931 Bodnar Feb 2004 B1
6687737 Landsman et al. Feb 2004 B2
6691106 Sathyanarayan Feb 2004 B1
6697825 Underwood et al. Feb 2004 B1
6701362 Subramonian Mar 2004 B1
6701363 Chiu et al. Mar 2004 B1
6714975 Aggarwal et al. Mar 2004 B1
6718365 Dutta Apr 2004 B1
6721795 Eldreth Apr 2004 B1
6725269 Megiddo Apr 2004 B1
6741967 Wu et al. May 2004 B1
6757661 Blaser et al. Jun 2004 B1
6760746 Schneider Jul 2004 B1
6763379 Shuster Jul 2004 B1
6763386 Davis et al. Jul 2004 B2
6771290 Hoyle Aug 2004 B1
6772200 Bakshi et al. Aug 2004 B1
6785659 Landsman et al. Aug 2004 B1
6785723 Genty et al. Aug 2004 B1
6801906 Bates et al. Oct 2004 B1
6826534 Gupta et al. Nov 2004 B1
6826546 Shuster Nov 2004 B1
6827669 Cohen et al. Dec 2004 B2
6847969 Mathai et al. Jan 2005 B1
6848004 Chang et al. Jan 2005 B1
6850967 Spencer et al. Feb 2005 B1
6853982 Smith et al. Feb 2005 B2
6857024 Chen et al. Feb 2005 B1
6874018 Wu Mar 2005 B2
6877027 Spencer et al. Apr 2005 B1
6882981 Philippe et al. Apr 2005 B2
6892181 Megiddo et al. May 2005 B1
6892223 Kawabata et al. May 2005 B1
6892354 Servan-Schreiber et al. May 2005 B1
6904408 McCarthy et al. Jun 2005 B1
6910179 Pennell et al. Jun 2005 B1
6938027 Barritz et al. Aug 2005 B1
6958759 Safadi et al. Oct 2005 B2
6968507 Pennell et al. Nov 2005 B2
6880123 Landsman Dec 2005 B1
6973478 Ketonen et al. Dec 2005 B1
6976053 Tripp et al. Dec 2005 B1
6976090 Ben-Shaul et al. Dec 2005 B2
7039599 Merriman et al. May 2006 B2
7043526 Wolfe May 2006 B1
7051315 Artzi et al. May 2006 B2
7054900 Goldston May 2006 B1
7076546 Bates et al. Jul 2006 B1
7085682 Heller et al. Aug 2006 B1
7100111 McElfresh et al. Aug 2006 B2
7103643 Jacobs et al. Sep 2006 B1
7136875 Anderson et al. Nov 2006 B2
7162739 Cowden et al. Jan 2007 B2
7181415 Blaser et al. Feb 2007 B2
7283992 Liu et al. Oct 2007 B2
7346606 Bharat Mar 2008 B2
7349827 Heller et al. Mar 2008 B1
7363291 Page Apr 2008 B1
7421432 Hoelzle et al. Sep 2008 B1
7512603 Veteska et al. Mar 2009 B1
7765592 Wang et al. Jul 2010 B2
7844488 Merriman et al. Nov 2010 B2
20010030970 Wiryaman et al. Oct 2001 A1
20010032115 Goldstein Oct 2001 A1
20010037240 Marks et al. Nov 2001 A1
20010037325 Biderman et al. Nov 2001 A1
20010037488 Lee Nov 2001 A1
20010044795 Cohen et al. Nov 2001 A1
20010049320 Cohen et al. Dec 2001 A1
20010049321 Cohen et al. Dec 2001 A1
20010049620 Blasko Dec 2001 A1
20010049716 Wolfe Dec 2001 A1
20010051559 Cohen et al. Dec 2001 A1
20010053735 Cohen et al. Dec 2001 A1
20010054020 Barth et al. Dec 2001 A1
20020002538 Ling Jan 2002 A1
20020004754 Gardenswartz Jan 2002 A1
20020007307 Miller Jan 2002 A1
20020007309 Reynar Jan 2002 A1
20020010626 Agmoni Jan 2002 A1
20020016736 Cannon et al. Feb 2002 A1
20020019834 Vilcauskas, Jr. et al. Feb 2002 A1
20020023159 Vange et al. Feb 2002 A1
20020026390 Ulenas et al. Feb 2002 A1
20020032592 Krasnick et al. Mar 2002 A1
20020038363 MacLean Mar 2002 A1
20020042750 Morrison Apr 2002 A1
20020046099 Frengut et al. Apr 2002 A1
20020049633 Pasquali Apr 2002 A1
20020052785 Tenenbaum May 2002 A1
20020052925 Kim et al. May 2002 A1
20020055912 Buck May 2002 A1
20020059094 Hosea et al. May 2002 A1
20020059099 Coletta May 2002 A1
20020065802 Uchiyama May 2002 A1
20020068500 Gabai et al. Jun 2002 A1
20020069105 do Rosario Botelho et al. Jun 2002 A1
20020077219 Cohen et al. Jun 2002 A1
20020078076 Evans Jun 2002 A1
20020078192 Kopsell et al. Jun 2002 A1
20020087717 Artzi et al. Jul 2002 A1
20020091700 Steele et al. Jul 2002 A1
20020091875 Fujiwara et al. Jul 2002 A1
20020094868 Tuck et al. Jul 2002 A1
20020099605 Weitzman et al. Jul 2002 A1
20020099824 Bender et al. Jul 2002 A1
20020107847 Johnson Aug 2002 A1
20020107858 Lundahl et al. Aug 2002 A1
20020111910 Walsh Aug 2002 A1
20020111994 Raghunandan Aug 2002 A1
20020112035 Carey et al. Aug 2002 A1
20020112048 Gruyer et al. Aug 2002 A1
20020116494 Kocol Aug 2002 A1
20020120648 Ball et al. Aug 2002 A1
20020122065 Segal et al. Sep 2002 A1
20020123912 Subramanian et al. Sep 2002 A1
20020128904 Carruthers et al. Sep 2002 A1
20020128925 Angeles Sep 2002 A1
20020152121 Hiroshi Oct 2002 A1
20020152222 Holbrook Oct 2002 A1
20020154163 Melchner Oct 2002 A1
20020156781 Cordray et al. Oct 2002 A1
20020156812 Krasnoiarov et al. Oct 2002 A1
20020169670 Barsade et al. Nov 2002 A1
20020169762 Cardona Nov 2002 A1
20020171682 Frank et al. Nov 2002 A1
20020175947 Conrad et al. Nov 2002 A1
20020194151 Fenton et al. Dec 2002 A1
20030005067 Martin et al. Jan 2003 A1
20030005134 Martin et al. Jan 2003 A1
20030014399 Hansen et al. Jan 2003 A1
20030018778 Martin et al. Jan 2003 A1
20030023481 Calvert et al. Jan 2003 A1
20030023698 Dieberger et al. Jan 2003 A1
20030028870 Weisman et al. Feb 2003 A1
20030032409 Hutcheson et al. Feb 2003 A1
20030033155 Peerson et al. Feb 2003 A1
20030041050 Smith et al. Feb 2003 A1
20030046150 Ader et al. Mar 2003 A1
20030050863 Radwin Mar 2003 A1
20030088554 Ryan et al. May 2003 A1
20030105589 Liu et al. Jun 2003 A1
20030110080 Tsutani et al. Jun 2003 A1
20030115157 Circenis Jun 2003 A1
20030120593 Bansal et al. Jun 2003 A1
20030120654 Edlund et al. Jun 2003 A1
20030131100 Godon et al. Jul 2003 A1
20030135490 Barrett et al. Jul 2003 A1
20030154168 Lautenbacher Aug 2003 A1
20030171990 Rao et al. Sep 2003 A1
20030172075 Reisman Sep 2003 A1
20030195877 Ford et al. Oct 2003 A1
20030208472 Pham Nov 2003 A1
20030221167 Goldstein et al. Nov 2003 A1
20040002896 Alanen et al. Jan 2004 A1
20040024756 Rickard Feb 2004 A1
20040068486 Chidlovskii Apr 2004 A1
20040073485 Liu et al. Apr 2004 A1
20040078294 Rollins et al. Apr 2004 A1
20040095376 Graham et al. May 2004 A1
20040098229 Error et al. May 2004 A1
20040098449 Bar-Lavi et al. May 2004 A1
20040133845 Forstall et al. Jul 2004 A1
20040163101 Swix et al. Aug 2004 A1
20040167926 Waxman et al. Aug 2004 A1
20040167928 Anderson et al. Aug 2004 A1
20040181525 Itzhak et al. Sep 2004 A1
20040193488 Khoo et al. Sep 2004 A1
20040225716 Shamir et al. Nov 2004 A1
20040247748 Bronkema Dec 2004 A1
20040249709 Donovan et al. Dec 2004 A1
20040249938 Bunch Dec 2004 A1
20040267723 Bharat Dec 2004 A1
20050015366 Carrasco et al. Jan 2005 A1
20050021397 Cui et al. Jan 2005 A1
20050027822 Plaza Feb 2005 A1
20050033657 Herrington et al. Feb 2005 A1
20050080772 Bem Apr 2005 A1
20050086109 McFadden et al. Apr 2005 A1
20050091106 Reller et al. Apr 2005 A1
20050091111 Green et al. Apr 2005 A1
20050097088 Bennett et al. May 2005 A1
20050102202 Linden et al. May 2005 A1
20050131762 Bharat et al. Jun 2005 A1
20050149404 Barnett et al. Jul 2005 A1
20050155031 Wang et al. Jul 2005 A1
20050182773 Feinsmith Aug 2005 A1
20050187823 Howes Aug 2005 A1
20050216572 Tso et al. Sep 2005 A1
20050222901 Agarwal et al. Oct 2005 A1
20050222982 Paczkowski et al. Oct 2005 A1
20050273463 Zohar et al. Dec 2005 A1
20060015390 Rijsinghani et al. Jan 2006 A1
20060031253 Newbold et al. Feb 2006 A1
20060136524 Wohlers et al. Jun 2006 A1
20060136528 Martin et al. Jun 2006 A1
20060235965 Bennett et al. Oct 2006 A1
Foreign Referenced Citations (18)
Number Date Country
0822535 Feb 1998 EP
1045547 Oct 2000 EP
1207468 May 2002 EP
2002073545 Mar 2002 JP
WO 9938321 Jul 1999 WO
WO 9944159 Sep 1999 WO
WO 9946701 Sep 1999 WO
WO 9955066 Oct 1999 WO
WO 0004434 Jan 2000 WO
WO 0054201 Sep 2000 WO
WO 0103028 Jan 2001 WO
WO 0115052 Mar 2001 WO
WO 0139024 May 2001 WO
WO 0144992 Jun 2001 WO
WO 0163472 Aug 2001 WO
WO 0169929 Sep 2001 WO
WO 0190917 Nov 2001 WO
WO 03010685 Feb 2003 WO
Non-Patent Literature Citations (132)
Entry
Tynan, Dan and Tom Spring. “The Hidden Money Trail: Those programs that pelt you with ads and bog down your PC are financed by some of America's largest companies.” Nov. 2005, PC World vol. 23 Issue 11. Retrieved from ProQuest Computing. pp. 71-80.
International Search Report and Written Opinion of PCT/US06/08050 mailed on Oct. 19, 2007.
International Search Report and Written Opinion of PCT/US06/08049 mailed on Oct. 19, 2007.
Smith, Lindsay I., “A Tutorial on Principal Components Analysis”; Feb. 26, 2002.
ACM Portal USPTO Search, “Communications of the ACM: vol. 52, Issue 1”, Association for Computing Machinery, dated Jan. 2009, 1 page.
Ad Close, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL http//download.cnet.com/downloads/0-10059-100-915154.html>.
Ad Muncher, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-33567-18-100-2750044.html>.
AdDelete, Webpage [online]. C/net Download.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10059-100-7003126.html>.
Adextinguisher-Introduction and News Sections. Webpage [online][retrieved on Oct. 4, 2001]. Retrieved from the Internet URL:http//adext.magenet.net.html.
AdPurger, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10068-100-5067717.html>.
AdsOff, Webpage [online]. C/net Downloads.com [retrieved on Oct. 3, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10059-100-9 12651.html>.
AdSubract SE, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-3356727-100-5963713.html>.
Advertising Killer, Webpage [online]. C/net Downloads.com [retrieved on Oct. 3, 2001]. Retrieved from the Internet <URL.http//download.cnet.com/downloads/0-10059-100-1539520.html>.
Advisory Action dated Nov. 19, 2008 issued in U.S. Appl. No. 11/015,583, 3 pages.
Aggarwal, Charu C. et al. 2001. Intelligent Crawling on the World Wide Web with Arbitrary Predicates. ACM, pp. 96-105.
AllGone, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10068-100-2915974.html>.
AnalogX Pow, Webpage [online]. C/net Downloads.com [retrieved on Oct. 3, 2001]. Retrieved from the Internet <URL:http//download.cnet com/downloads-0-3356748-100-915372.html>.
Bae, Sung Min, et al., “Fuzzy Web Ad Selector”, IEEE Intelligent Systems, vol. 18 Issue 6, Nov./Dec. 2003, pp. 62-69.
Banner Zapper, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-3356727-100-6384611.html>.
BanPopup, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10059-100-6901908.html>.
Black List. Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL.http/download cnet.com/downloads/0-10059-100-902347 html>.
Broder, Alan J., “Data Mining the Internet and Privacy”, WEBKDD '99, LNAI 1836, Springer-Verlag, Berlin, Germany, (c) 2000, pp. 56-73.
Bucklin, Randolph E., et al., “Choice and the Internet: From Clickstream to Research Stream”, Marketing Letters, vol. 13, No. 3, Aug. 2002, pp. 245-258.
Claria—Company Information—Corporate Review, webpage [online], retrieved on Mar. 3, 2005, retrieved from the internet: <URL:http://www.claria.com/companyinfo.html>.
Close Popup 4.0, Webpage [online]. Take a Hike Software [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//www.ryanware.com/close—popup.html>.
Close Popup, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10059-100-905799.html>.
CobraSoft PopStop, Webpage (online). C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download cnet.com/downloads/0-10058-100-6926765.html>.
Compare Prices and Read Reviews on AdsOff! Epenions.com. Webpage [online]; Jan. 21, 2001. Obtained from corresponding International Application PCT Search Report.
Copernic, Copernic: Software to Search, Find, and Manage Information, Copernic Technologies, Inc. 2004, 2 pgs. (retrieved on Apr. 6, 2004). Retrieved from the Internet: <URL:http://www.copernic.com/en/index.html>.
CrushPop 2000, Webpage [online]. www.32bit.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL.http//32bit.com/software/listings/Internet/Special/180P/13794.html>.
Definition of “close button”, Microsoft Press Computer Dictionary, 3rd ed. (Redmond WA: Microsoft Press, 1997).
Diligenti, Michelangelo et al. 2004. A Unified Probalistic Framework for Web Page Scoring Systems. IEEE, vol. 16, No. 1. Jan. 2004, pp. 4-16.
Directive 2002/58/EC of the European Parliament and of the Council of Jul. 12, 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications), Official Journal L 201 , Jul. 31, 2002 p. 0037-0047 (downloaded.
Dogpile, Dogpile Web Search Home Page, InfoSpace, Inc. 2004, p. 1 of 1, (retrieved on Apr. 1, 2004). Retrieved from the Internet: <URL:http://www.dogpile.com.html>.
DoubleClick products (17 total pgs); Webpage [online] [retrieved on Jun. 11, 2003]; Retrieved from the Internet: <URL: http://www.doubleclick.com>.
Eick, Stephen G., “Visual Analysis of Website Browsing Patterns”, Visual Interfaces to Digital Libraries, Springer-Verlag, Berlin, Germany, (c) 2002, pp. 65-77.
Eirinaki, Magdalini, et al., “Web Mining for Web Personalization”, ACM Transactions on Internet Technology (TOIT), vol. 3, Issue 1, Feb. 2003, pp. 1-27.
Favela, Jesus et al. 1997. Image-Retrieval Agent: Integrating Image Content and Text. IEE, vol. 1.14, pp. 36-39.
Fenstermacher, Kurt D., et al., “Client-Side Monitoring for Web Mining”, Journal of the American Society for Information Science and Technology, vol. 54, Issue 7, May 2003, pp. 625-637.
Fenstermacher, Kurt D., et al., “Mining Client-Side Activity for Personalization”, WECWIS 2002, (c) 2002, pp. 205-212.
Final Office Action dated Mar. 26, 2010 issued in U.S. Appl. No. 11/207,590, 8 pages.
Final Rejection dated May 21, 2008 issued in U.S. Appl. No. 11/015,583, 8 pages.
Friedman, Batya, et al., “Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design”, HICSS-35 '02, Jan. 2002, pp. 10-19.
Fu, Xiaobin, et al., “Mining Navigation History for Recommendation”, IUI 2000, New Orleans, LA, (c) 2000, pp. 106-112.
Google search for “define: close button”, Mar. 2, 2007.
Google Search, “Result Search Query Build Search Engine Index Using Gather Consumer Navigate Search”, http://scholar.google.com/scholar, dated Apr. 7, 2010, 3 pages.
Gralla, Preston, How the Internet Works, Special Edition, Ziff-Davis Press, Emeryville, CA, .(c) 1997, pp. 254 and 266-271.
Greening, Dan R., “Tracking Users: What Marketers Really Want to Know”, Web Techniques, Jul. 1999, downloaded from: www.webtechniques.com/archives/1999/07/, pp. 1-9.
Heller, Laura, “Target gets mod in Manhattan”, DSNRetailing Today, v40 n16, Aug. 20, 2001: 2, 37.
Hongyu Liu et al., “Focused Crawling by Learning HMM from User's Topic-Specific Browsing” Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence (WI '04) 0-7695-2100-2/04.
Hun, Ke et al. 2003. A Probabilistic Model for Intelligent Web Crawlers. IEEE, pp. 278-282.
InterMute, Webpage [online]. C/net Downloads.com [retrieved on Oct. 3, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10059-100-906599.html>.
International Search Report and Written Opinion of the International Search Authority for Intl. Appl. No. PCT/US05/45722 mailed Jan. 19, 2007.
International Search Report in PCT Appln. No. PCT/US2004/07714, mailed Mar. 31, 2005 [1 page].
Internet Citation: “Gator.com offers one-click shopping at over 5,000 e-commerce site today”; Jun. 14, 1999; XP002145278; Date retrieved: Jun. 28, 2001. URL:http://www.gator.com/company/press/pr061499b.html.
Ishitani, Lucila, et al., “Masks: Bringing Anonymity and Personalization Together”, IEEE Security & Privacy, vol. 1, Issue 3, May/Jun. 2003, pp. 18-23.
Kiyomitsu, Hidenari, et al., “Web Reconfiguration by Spatio-Temporal Page Personalization Rules Based on Access Histories”, Applications and the Internet, San Diego, CA, Jan. 8-12, 2001, pp. 75-82.
Klemm, Reinhard P., “WebCompanion: A Friendly Client-Side Web Prefetching Agent”, IEEE Transactions on Knowledge and Data Engineering, vol. 11, No. 4, Jul./Aug. 1999, pp. 577-594.
Kourbatov, Opening a Window, Jul. 8, 2000, plublished by www.javascripter.net, whole document.
Langheinrich, M., et al. “Unintrusive Customization Techniques for Web Advertising,” NEC Corporation, C&C Media Research Laboratories, Kanagawa, Japan, Computer Networks, vol. 31, No. 11, pp. 1259-1272, May 1999 (in Conf. Proc. 8th Int'l WWW Conf., Toronta, Canada, May 11-14, 1999).
Lee, Ching-Cheng, et al., “Category-Based Web Personalization System”, COMPSAC 2001, Oct. 8-12, 2001, pp. 621-625.
Leuski, Anton et al. 2000. Lighthouse: Showing the Way to Relevant Information. IEEE, Oct. 2000, pp. 125-129.
Liu, Jian-Guo, et al., “Web Mining for Electronic Business Application”, PDCAT 2003, Aug. 27-29, 2003, pp. 872-876.
Liu, Jian-Guo, et al., “Web Usage Mining for Electronic Business Applications”, Machine Learning and Cybernetics, Shanghai, China, Aug. 2004, pp. 1314-1318.
Lu, Hongjun, et al., “Extending a Web Browser with Client-Side Mining”, APWeb 2003, LNCS 2642, Springer-Verlag, Berlin, Germany, (c) 2003, pp. 166-177.
Luxenburger, Julia, et al., “Query-Log Based Authority Analysis for Web Information Search”, WISE 2004, LNCS 3306, Springer-Verlag, Berlin, Germany, Nov. 1, 2004, pp. 90-101.
Marcebra Net, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-3364666-100-5210875.html>.
Metacrawler, Web Search Home Page—MetaCrawler, InfoSpace, Inc. 2004, p. 1 of 1 (retrieved on Apr. 6, 2004), Retrieved from the internet: <URL:http://www.metacrawler.com.html>.
Mobasher, Bamshad, et al., “Automatic Personalization Based on Web Usage Mining”, Communications of the ACM, vol. 43, Issue 8, Aug. 2000, pp. 142-151.
Mr. KillAd. Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10059-100-895339 html>.
Nagger, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-3356748-100-2497932 html>.
NoAds 2000.6.30.1, Webpage [online] south bay software [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//www.southbaypc.com/NoAds.html>.
Non-Final Rejection dated Dec. 20, 2006 issued in U.S. Appl. No. 11/015,583, 8 pages.
Non-Final Rejection dated Jul. 20, 2009 issued in U.S. Appl. No. 11/015,583, 7 pages.
NoPops 1.1, Webpage [online]. WebAttack.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//www.webattack.com/get/nopops.shtml>.
Office Action mailed Oct. 10, 2007 from U.S. Appl. No. 11/207,590, filed Aug. 19, 2005.
Office Action mailed Sep. 13, 2006 from U.S. Appl. No. 10/700,820, filed Nov. 4, 2003.
Office Action mailed Oct. 16, 2008 from U.S. Appl. No. 11/207,590, filed Aug. 19, 2005.
Office Action mailed Sep. 16, 2004 from U.S. Appl. No. 10/056,932, filed Jan. 25, 2002.
Office Action mailed Mar. 18, 2005 from U.S. Appl. No. 10/056,932, filed Jan. 25, 2002.
Office Action mailed Jun. 22, 2009 from U.S. Appl. No. 11/207,590, filed Aug. 19, 2005.
Office Action mailed May 24, 2007 from U.S. Appl. No. 10/700,820, filed Nov. 4, 2003.
Office Action mailed Apr. 25, 2006 from U.S. Appl. No. 10/700,820, filed Nov. 4, 2003.
Office Action mailed Dec. 26, 2006 from U.S. Appl. No. 10/700,820, filed Nov. 4, 2003.
Office Action mailed Jul. 27, 2005 from U.S. Appl. No. 10/056,932, filed Jan. 25, 2002.
Office Action mailed Sep. 5, 2003 from U.S. Appl. No. 10/056,932, filed Jan. 25, 2002.
Office Action mailed May 7, 2004 from U.S. Appl. No. 10/056,932, filed Jan. 25, 2002.
Office Action mailed Oct. 19, 2007 from U.S. Appl. No. 11/207,589, filed Aug. 19, 2005.
Paepcke, Andreas, et al., “Beyond Document Similarity: Understanding Value-Based Search and Browsing Technologies”, ACM SIGMOD Record, vol. 29, Issue 1, Mar. 2000, pp. 80-92.
Paganelli, Laila, et al., “Intelligent Analysis of User Interactions with Web Applications”, IUI '02, San Francisco, CA, Jan. 13-16, 2002, pp. 111-118.
Paraben's AdStopper, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10059-100-2643648.html>.
Park, Joon S., et al., “Secure Cookies on the Web”, IEEE Internet Computing, vol. 4, Issue 4, Jul./Aug. 2000, pp. 36-44.
Payton, D., et al. 1999. Dynamic collaborator discovery in information intensive environments. ACM Comput. Surv. 31, 2es, Article 8 (Jun. 1999), pp. 1-8.
PCT International Search Report for application No. PCT/US02/35981, 3 sheets; mailed Apr. 4, 2003.
PCT International Search Report for Application No. PCT/US04/09918.
PCT International Search Report for PCT/US03/13985 mailed Aug. 8, 2003; total of 1 sheet.
PCT International Search Report re: International Application No. PCT/US05/29615 dated Feb. 20, 2006.
Pierrakos, Dimitrios, et al., “Web Usage Mining as a Tool for Personalization: A Survey”, User Modeling and User-Adapted Interaction, vol. 13, No. 4, (c) 2003, pp. 311-372.
Pierre Maret, et al.; Multimedia Information Interchange: Web Forms Meet Data Servers; Proceedings of the IEEE International Conference on Multimedia Computing and Systems; vol. 2, Jun. 7-11, 1999, pp. 499-505; XP000964627; Florence, Italy.
Popki Popup Closer 1.4, Webpage [online]. WebAttack.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//www.webattack.com/get/popki.shtml>.
PopKill, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10059-100-6967054.html>.
PopNot, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL http//download.cnet.com/downloads/0-10059-100-5112702.html>.
PopUp Eraser, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10059-100-6322841.html>.
Popup Hunter, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10059-100-1451171.html>.
PopUp Killer, Webpage [online]. C/net Downloads.com [retrieved on Oct. 3, 2001]. Retrieved from the Internet <URL.http//download.cnet.com/downloads/0-10059-100-7253644 html>.
Popup Smasher, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http/download.cnet.com/downloads/0-3364664-100-7209048.html>.
Pop-up stopper, Webpage [online]. C/net Downloads.com [retrieved on Oct. 3, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10059-100-6803957.sub.--html&- gt;.
PopupDummy, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-10059-100-6943327.html>.
Privacy and Electronic Communications (EC Directive) Regulations 2003 (PECR), No. 2426, Electronic Communication, Sep. 2003.
Ready, Kevin et al., “Plug-n-Play Java Script” (Indianapolis, IN: New Riders Publishing, 1996): 19-22, 39, 40 and 43-45.
Restriction Requirement dated Oct. 31, 2007 issued in U.S. Appl. No. 11/015,583, 6 pages.
Schonberg, Edith, et al., “Measuring Success”, Communications of the ACM, vol. 43, Issue 8, Aug. 2000, pp. 53-57.
Shahabi, Cyrus, et al., “Efficient and Anonymous Web-Usage Mining for Web Personalization”, INFORMS Journal on Computing, vol. 15, No. 2, Spring 2003, pp. 123-148.
Shopping with WhenUShop, Webpage [on-line]; WhenU.com [retrieved on Mar. 19, 2002]. Retrieved from the Internet: URL:http://www.whenu.com.
SideStep, The Traveler's Search Engine; Webpage (online) (retrieved on Oct. 7, 2004); retrieved from the Internet: <URL:http://www.sidestep.com/main.html.
Soumen Chakrabarti et al., “Focused Crawling: A New Approach to Top-Specific Web Resource Discovery” Computer Networks 31 (1999), pp. 1623-1640.
Srivastava, Jaideep, et al., “Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data”, SIGKDD Explorations, vol. 1. Issue 2, Jan. 2000, pp. 12-23.
Surf in Peace 2.01, Webpage [online]. WebAttack.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//www.webattack.com/get/sip.shtml>.
U.S. Appl. No. 09/993,887, filed Nov. 27, 2001, by Jax B. Cowden, et al.
U.S. Appl. No. 09/993,904, filed Nov. 27, 2001, by Jax B. Cowden, et al.
U.S. Appl. No. 09/993,906, filed Nov. 27, 2001, by Jax B. Cowden, et al.
U.S. Appl. No. 11/427,243—May 10, 2011 PTO Office Action.
Uehara, Satoru, et al., “An Implementation of Electronic Shopping Cart on the Web System Using component-Object Technology”, Proc. of the 6th International Conf./ on Object-Oriented Real-Time Dependable Systems, Jan. 8-10, 2001, pp. 77-84.
Ultraseek Server Detailed Feature List, http://software.infoseek.com/products/ultraseek/ultrafeatures.htm, Accessed from Apr. 1998 archive from http://web.archive.org/web/19980419092128/http://software.infoseek.com/products/.
U.S. Appl. No. 09/993,888, filed Nov. 27, 2001, by Mark E. Pennell, et al.
Visual Search ToolBar—Graphically Enhance Search Results, 2004 Viewpoint Corporation; Webpage [online] [retrieved on Oct. 7, 2004]; retrieved from the Internet: <URL:http://www.viewpoint.com/pub/toolbar/download.html.
Web Magician, Webpage [online]. RocketDownLoad.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http/www.rocketdownload.com/Details/Inte/webmag.html>.
Wenyin, Liu, et al., “Ubiquitous Media Agents: A Framework for Managing Personally Accumulated Multimedia Files”, Multimedia Systems, vol. 9, No. 2, Aug. 2003, pp. 144-156.
www.conversionruler.com/faq.php, Feb. 4, 2003.
Xu, Cheng-Zhong, et al., “A Keyword-Based Semantic Prefetching Approach in Internet News Services”, IEEE Transactions on Knowledge and Data Engineering, vol. 16, Issue 5, May 2004, pp. 601-611.
Zaiane, Osmar R., et al., “Discovering Web Access Patterns and Trends by Applying OLAP and Data Mining Technology on Web Logs”, IEEE International Forum on Research and Technology Advances in Digital Libraries, Santa Barbara, CA, Apr. 22-24, 1998, pp. 19-29.
Zero Popup, Webpage [online]. C/net Downloads.com [retrieved on Oct. 4, 2001]. Retrieved from the Internet <URL:http//download.cnet.com/downloads/0-3356748-100-7163307.html>.
Related Publications (1)
Number Date Country
20060235784 A1 Oct 2006 US
Provisional Applications (1)
Number Date Country
60659682 Mar 2005 US