This disclosure relates generally to media presentation measurement, and, more particularly, to methods, apparatus, and articles of manufacture to identify media presentation devices.
In recent years, more consumer devices have been provided with Internet connectivity and the ability to retrieve media content from the Internet. As such, media exposure has somewhat shifted away from conventional sources such as broadcast television toward more on-demand types of sources.
As used herein, the term “media” can include any type of content, such as television, radio, advertisements, movies, web sites, etc. Example methods, apparatus, and articles of manufacture disclosed herein identify media presentation devices and/or types of media presentation devices for media measurement. For example, identifications of media presentation devices used in consumer locations (e.g., homes, offices, etc.) can be aggregated to determine ownership and/or usage statistics of available media presentation devices, relative rankings of usage and/or ownership of media presentation devices, types of uses of media presentation devices, and/or other types of media presentation device information.
In some disclosed examples, a media presentation device identifier includes a local network interface to receive a network-bound data packet originating from a media presentation device that is coupled to a local network. In such examples, the network-bound data packet includes at least a source identification, and a source identifier to identify a device type of the media presentation device based on the source identification. In some examples, the network-bound data packet is a HyperText Transfer Protocol (HTTP) request or a Session Initiation Protocol (SIP) message. In some such examples, the source identification is a User-Agent string.
In some examples, the media presentation device identifier includes a wide-area network interface to forward the network-bound data packet to a wide-area network. In some examples, the wide-area network interface also receives an inbound data packet that includes media content requested by the media presentation device. In some examples, the local network interface forwards the inbound data packet to the media presentation device.
In some examples, a media presentation device identifier identifies a media presentation device by monitoring for an outbound data packet originating in a local network and including a source identification, identifying a source type of a media presentation device based on the source identification, and storing the source type and an indication of media exposure. Some example methods further include monitoring for an inbound data packet destined for the media presentation device, identifying media content based on auxiliary data included in the inbound data packet, and storing the media content identification in association with the source type. In some examples, the method further includes storing a media request based on the network-bound data packet, determining whether the inbound data packet corresponds to the media request, and storing information representative of the inbound data packet when the inbound data packet corresponds to the media request. In some examples, media presentation devices include at least-top boxes, Internet-enabled handsets, video game consoles, Internet-enabled televisions, personal computers, tablet computers, and/or digital media players.
Example methods, apparatus, and articles of manufacture disclosed herein are located in a local area network (LAN) at a media exposure measurement location having multiple media presentation devices. These example methods, apparatus, and articles of manufacture are interposed between the media presentation devices and a wide area network (WAN), such as the Internet, that includes one or more content servers that provide media content in response to request(s) from the media presentation devices. Example methods, apparatus, and articles of manufacture disclosed herein intercept outgoing messages (e.g., media requests from media presentation devices on the same LAN as the intercepting method, apparatus, or article of manufacture) to the WAN and generate media exposure statistics based on the outgoing messages. Some such example methods, apparatus, and articles of manufacture additionally or alternatively generate the media exposure statistics based on messages from the WAN to the media presentation devices on the LAN. Some example methods, apparatus, and articles of manufacture disclosed herein determine the type(s) of media presentation device based on the outgoing messages but, unlike media content providers that track usage statistics, do not return any content to the media presentation device(s) originating the outgoing messages.
A known system to monitor display of content is disclosed in Blumenau, U.S. Pat. No. 6,108,637, issued Aug. 22, 2000. Generally, Blumenau disclosed using a content provider site to provide measurement instructions to a content display site, which executes the instructions to result in measurement information.
Example methods, apparatus, and articles of manufacture disclosed herein can collect media presentation device information corresponding to multiple media presentation devices and/or multiple content servers without cooperation from any content provider sites.
In some examples, the media presentation device identifier 102, the media presentation devices 104-116, and the router/gateway 118 are located in a household associated with one or more panelists. In some such examples, panelists are selected to participate in an audience measurement study (e.g., conducted by an audience measurement entity such as The Nielsen Company) to be generally reflective of one or more population(s) whose media usage habits are of interest. Panelists may be selected and/or recruited in any desired manner. The panelists are typically required to provide demographic information data (e.g., gender, race, religion, income, education level, etc.) to facilitate correlating detected behaviors to demographic populations.
The example router/gateway 118 of
In the illustrated example of
While general classes of example media presentation devices are illustrated in
Depending on which of the example devices 104-116 makes the request, and depending on the characteristics of the requesting device, the request for the media content may be different even if the requested media content is the same. In particular, each of the example devices 104-116 includes a different source identification in the request. For example, the HTTP GET request specification permits a source identification referred to as the User-Agent field. The User-Agent field enables the device 104-116 generating the request to populate the User-Agent field with information identifying the type of the device. An example HTTP request including source identification information that a Microsoft® Xbox 360® (e.g., the video game console 108) may use to request a file (e.g., media.html) from a website (e.g., mediasourcewebsite.com) is:
Another example HTTP request including source identification information that a Sony® Google® Internet Television (e.g., the Internet-enabled television 110) may use to request the same file (media.html) from the same website (mediasourcewebsite.com) is:
As illustrated by the different User-Agent fields, the example media presentation device identifier 102 of
To this end, the example media presentation device identifier 102 snoops the example request to identify the type of the requesting device (e.g., that the requesting device is a personal computer, the type of requesting program, etc.). For example, the media presentation device identifier 102 may be coupled between the router/gateway 118 and the network 120 to snoop requests and/or responses outbound from the devices 104-116 on the LAN to the WAN 120 (e.g., to the content host 122), and/or inbound from the WAN 120 to the device(s) 104-116. The example media presentation device identifier 102 of the illustrated example is transparent to the router/gateway 118. When the example media presentation device identifier 102 identifies an HTTP GET request from one of the media presentation devices 104-116, the device identifier 102 identifies the type of the media presentation device 104-116 based on the contents of the source identification (e.g., the User-Agent field).
In some examples, the media presentation device identifier 102 stores the identified type of the device in association with information representative of the request, such as a timestamp, and an identifier of the requested media content. In this manner, the example media presentation device identifier 102 collects media exposure information to help identify, for example, which media presentation devices are the most-frequently owned, the most-frequently used, the least-frequently owned, the least-frequently used, the most/least-frequently used for particular type(s) of media usage, etc.
Upon receiving the request, the content host 122 processes the request. In some examples, the content host 122 determines the contents of the User-Agent field and identifies the type of the requesting device from the contents. Some content hosts 122 will format the response based on the User-Agent field (e.g., formatting or compressing video and/or audio content to better fit the device corresponding to the contents of the User-Agent field). For example, a specific type of Internet-enabled mobile handset 106 may be known to support lower video resolutions than most video game consoles 108. As a result, the content host 122 may format a requested video to a lower resolution for delivery to the particular Internet-enabled mobile handset 106 than to the particular video game console 108.
If appropriate, the content host 122 begins to transfer the requested content to the requesting device (e.g., the personal computer 112) via the network 120 and the router/gateway 118. In some examples, the content transferred from the content host 122 is also delivered using a protocol similar or identical to the protocol used by the personal computer 112 to make the request. The example media presentation device identifier 102 monitors the inbound data packets to determine one or more packets that correspond to a media request (e.g., media content for delivery to one of the media presentation devices 104-116). The media presentation device identifier 102 handles the inbound packets to, for example, determine an origin and/or a destination of the inbound packet. Such information can be used to determine which of the media presentation devices 104-116 are presenting media content and/or for how long such media presentation occurs.
In the illustrated example of
The data collection system 124 of the illustrated example collects and processes the media presentation device information to generate aggregate media presentation device information to identify, for example, which media presentation devices are the most owned, the most-frequently used, the least-frequently owned, the least-frequently used, the most/least-frequently used for particular type(s) and/or genre(s) of media, and/or other media statistics or aggregate information that may be determined from the data. The media presentation device information may also be correlated or processed with factors such as geodemographic data. Aggregate media presentation device information may be useful to manufacturers and advertisers to determine which features should be improved, determine which features are popular among users, identify geodemographic trends with respect to media presentation devices, identify market opportunities, and/or otherwise evaluate their own and/or their competitors' products.
The example local network interface 202 receives a network-bound (e.g., outbound) data packet originating from a media presentation device (e.g., one or more of the media presentation devices 104-116 of
The example source identifier 204 identifies, based on the source identification, a source type (e.g., a type of media presentation device 104-116 such as a video game console 108, a sub-type of media presentation device 104-116 such as an Xbox, etc.) of the media presentation device 104-116 from which the network-bound data packet originated. To this end, in some examples the source identifier 204 queries the source identification database 208 to determine a source type corresponding to the content of the source identification. In some examples, the media presentation device identifier 200 maintains its own source identification database that is periodically and/or aperiodically updated to add, remove, and/or modify source identification entries. Additionally or alternatively, the example source identifier 204 may query an external source identification database (e.g., via the network 120 of
As illustrated in
The example device identifier 212 of
The example WAN interface 206 receives network-bound data packets from the source identifier 204 and forwards the packets to a network (e.g., the network 120). Additionally, the WAN interface 206 receives inbound data packets from the network 120 destined for the media presentation devices 104-116. At least some of the inbound data packets in the illustrated example include digital media content corresponding to request(s) from the example media presentation devices 104-116. For example, the message parser 210 may determine that an inbound data packet is received from the content host 122 (e.g., by inspecting aspects of the inbound data packet) and that the data packet includes a payload of media content (e.g., the packet includes an HTTP response having an encapsulated Real Time Messaging Protocol Tunneled (RTMPT) payload). In some examples, the message parser 210 identifies media content in the inbound data packets based on auxiliary data (e.g., metadata) in the content of the inbound data packets. In some such examples, the identification and/or the auxiliary data are stored in the example source identification database 208 in association with a corresponding media request.
The example message parser 210 provides the inbound message to the message comparer 214. The example message comparer 214 compares the inbound data packet to, for example, stored network-bound data packets to associate the inbound data packet with one of the media presentation devices 104-116 that sent a request for the media content. In some examples in which the media presentation device identifier 200 is implemented in a router/gateway (e.g., the router/gateway 118 of
The example usage tracker 216 of
The example device type 310 of
The example data collector 402 of
The example device usage processor 404 of
The example report generator 406 of
To generate the report(s), the example report generator 406 retrieves usage information from the usage information database 408 and/or receives the usage information from the device usage processor 404. In some examples, the report generator 406 stores the report(s) in the usage information database 408 for later processing. The example usage information database 408 stores the usage information determined by the device usage processor 404 and/or reports generated by the report generator 406.
The example device type 514 is similar to the device type 308 of the table 300 of
The example usage per period 520 of
While example manners of implementing the media presentation device identifier 102 and the data processing system 124 of
Flowcharts representative of example machine readable instructions for implementing the media presentation device identifier 200 of
As mentioned above, the example processes of
The example instructions 600 of
The example source identifier 204 determines whether a network-bound message has been received (block 604). For example, the source identifier 204 may identify whether any messages have been forwarded to the source identifier 204 from the local network port 202. If a network-bound message has been received (block 604), the example source identifier 204 determines (e.g., via the message parser 210) whether the network-bound message includes source identification information (block 606). For example, the message parser 210 may determine whether the network-bound message includes source identification such as a User-Agent field.
If the example network-bound message includes source identification information (block 606), the example message parser 210 parses the network-bound message to identify a destination of the message, a requested resource, and the source identification (block 608). For example, the message parser 210 may determine an address of the content host 122 as the destination, a video file as the requested resource, and a User-Agent string as the source identification.
The example device identifier 212 uses the example source identification determined by the message parser 210 to identify a type of the media presentation device (block 610). For example, the device identifier 212 may query an internal User-Agent database and/or an external User-Agent database using the content of the source identification. If the example User-Agent corresponds to a device type in the queried database, the example device identifier 212 will receive a device type, such as a description of the device. In this manner, the example device identifier 212 identifies the media presentation device type using the source identification.
The example device identifier 212 further stores a media request entry including the identified media presentation device type, the destination of the network-bound message, and the requested resource (block 612). In some examples, however, the device type is stored, or the device type is stored with one of the destination of the network-bound message or the requested resource. In some other examples, the device type is stored in association with other information representative of the network-bound message determined by the example message parser 210 and/or the example device identifier 212.
After storing the media request entry (block 612), if a network-bound message has not been received (block 604), or if a received network-bound message does not include source identification information (block 606), the example source identifier 204 determines whether an inbound message has been received (block 614). If an inbound message has been received (block 614), the example source identifier 204 handles the inbound message (block 616). A flowchart representative of example machine readable instructions to handle an inbound message, which may be used to implement block 616, is shown in
After handling the inbound message (block 616), or if no inbound message has been received (block 614), the example source identifier 204 determines whether to continue monitoring for messages (block 618). If the source identifier 204 is to continue monitoring for messages (block 618), control returns to block 602 to monitor for messages. On the other hand, if the source identifier 204 is to discontinue monitoring for messages (block 618), the example instructions 600 end. In some examples, the instructions 600 are iterated or invoked again at a later time.
The example message parser 210 parses the inbound message to identify a message origin and a message destination (block 702). For example, the message parser 210 may determine that the inbound message includes information representative of the origin of the inbound message and/or to which device 104-116 the inbound message is destined. To determine the origin and the destination of the inbound message, the example message parser 210 evaluates the header of the Internet Protocol message encapsulating the HTTP or other message.
The example message comparer 214 determines whether the message origin and the message destination correspond to a stored media request (block 704). For example, the message comparer 214 accesses the media requests entries in the source identification database 208 and compares the message origin to the request destination 312 and/or compares the message destination to an IP address field (not shown in
If media presentation information does exist for the device (block 706), or after generating the media presentation information (block 708), the example message parser 210 determines whether the inbound message includes a media content payload (block 710). For example, the message parser 210 evaluates the header and/or the payload of the message (e.g., the size of the payload) to determine whether the inbound message includes audio, video, and/or other media content. If the inbound message includes a media content payload (block 710), the example message parser 210 timestamps the media presentation information for the device (block 712). The timestamp, in combination with additional timestamps corresponding to additional inbound messages received at the WAN interface 206, may be used to determine length(s) of substantially-contiguous media presentation session(s) using the media presentation device.
After timestamping the media presentation information (block 712), or if the inbound message does not include a media content payload (block 710), the example message comparer 214 or the message parser 210 stores the media presentation information corresponding to the outbound message (block 714). For example, the example message comparer 214 or the message parser 210 stores the message origin, the message destination, the timestamp(s), and/or any other information included in the media presentation information, in the source identification database 208 in association with a corresponding media request entry. After storing the media presentation information (block 714), or if the message origin and/or the message destination do not correspond to a stored media request (block 704), the example instructions 700 end and control returns to block 618 of the example instructions 600 of
The example instructions 800 of
The example device usage processor 404 processes the device types from the media request information to determine usage information (block 804). Example usage information may include an aggregation of media requests for particular type(s) of media presentation device(s), particular User-Agent(s), particular request destination(s), and/or for particular time period(s). Example usage information is illustrated in the table 500 of
The example instructions 900 of
The example device usage processor 404 determines whether the media requests include request destinations (block 904). For example, the media presentation device identifier 102 of
If the example media requests do not include request destinations (block 904), or after aggregating media requests by device type and request destination (block 906), the example device usage processor 404 ranks the device types by usage (e.g., by time period 520 of
The example device usage processor 404 also ranks the device types by ownership (block 910). For example, the device usage processor 404 determines the ownership of each of the device types 514 in the usage information 502-512 of
The device usage processor 404 determines whether a type or types of media exposure are specified (block 912). For example, type(s) of media exposure and/or usage may be specified by a user requesting a report of media presentation device usage. The type(s) of media exposure and/or usage may be general such as audio and/or video, and/or may be more specific such as media content requested from a specified content host. If type(s) of media exposure and/or usage have been specified (block 912), the example device usage processor 404 ranks device types for the specified type(s) of media exposure and/or usage (block 914). For example, the device usage processor 404 aggregates the usage information 502-512 of
After ranking the device types for the specified type(s) of media exposure and/or usage (block 914), or if no type(s) of media exposure and/or usage were specified (block 912), the example report generator 406 generates report(s) of usage information (block 916). The example usage information report(s) are based on the aggregated media requests by device type and request destination (block 906), the device type usage ranks (block 908), the device type ownership ranks (block 910), and/or the device type ranks for specified type(s) of media exposure and/or usage (block 914). The example report generator 406 generates a table similar to the table 500 of
The processor system 1000 of the instant example includes a processor 1012. For example, the processor 1012 can be implemented by one or more Intel® microprocessors. Of course, other processors from other entities are also appropriate. The example processor 1012 includes a local memory 1014.
The processor 1012 is in communication with a main memory including a volatile memory 1018 and a non-volatile memory 1020 via a bus 1022. The volatile memory 1018 may be implemented by Synchronous Dynamic Random Access Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM) and/or any other type of random access memory device. The non-volatile memory 1020 may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory is typically controlled by a memory controller (not shown).
The processor system 1000 also includes an interface circuit 1024. The interface circuit 1024 may be implemented by any type of interface standard, such as an Ethernet interface, a universal serial bus (USB), and/or a PCI express interface.
One or more input devices 1026 are connected to the interface circuit 1024. The input device(s) 1026 permit a user to enter data and commands into the processor 1012. The input device(s) can be implemented by, for example, a keyboard, a mouse, a touchscreen, a track-pad, a trackball, isopoint and/or a voice recognition system.
One or more output devices 1028 are also connected to the interface circuit 1024. The output devices 1028 can be implemented, for example, by display devices (e.g., a liquid crystal display, a cathode ray tube display (CRT), a printer and/or speakers). The interface circuit 1024, thus, typically includes a graphics driver card.
The interface circuit 1024 also includes a communication device (e.g., the local network interface 202, the WAN interface 206) such as a modem or network interface card to facilitate exchange of data with external processor systems via a network (e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, a Bluetooth connection, etc.).
The processor system 1000 also includes one or more mass storage devices 1030 for storing software and data. Examples of such mass storage devices 1030 include floppy disk drives, hard drive disks, compact disk drives, and digital versatile disk (DVD) drives. The mass storage device 1030 may implement the example source identification storage 208 of
The coded instructions 1032 of
From the foregoing, it will be appreciated that methods, apparatus and/or articles of manufacture disclosed herein may be used to measure usage information for media presentation devices at measured locations. This usage information enables more complete information to be collected for audience measurement (e.g., television usage, radio usage, on-demand programming usage, etc.), as the usage information identifies activities taking place when an audience member is not performing activities that are measurable using known systems. Further, example methods, apparatus, and/or articles of manufacture disclosed herein are easily updated to recognize new devices and/or different versions of devices shortly after (or, in some cases, even before) the devices are introduced into consumer usage.
Example methods, apparatus, and/or articles of manufacture disclosed herein are also used to aggregate media presentation device information, which can be useful to manufacturers and advertisers to determine which features should be improved, determine which features are popular among users, identify geodemographic trends with respect to media presentation devices, identify market opportunities, and/or otherwise evaluate their own and/or their competitors' products.
Although certain example methods, apparatus and articles of manufacture have been disclosed herein, the scope of coverage of this patent is not limited thereto. On the contrary, this patent covers all methods, apparatus and articles of manufacture fairly falling within the scope of the claims of this patent.
Number | Name | Date | Kind |
---|---|---|---|
5481294 | Thomas et al. | Jan 1996 | A |
5497185 | Dufresne et al. | Mar 1996 | A |
5526427 | Thomas et al. | Jun 1996 | A |
5550928 | Lu et al. | Aug 1996 | A |
5584050 | Lyons | Dec 1996 | A |
5594934 | Lu et al. | Jan 1997 | A |
5659469 | Deaton et al. | Aug 1997 | A |
5675510 | Coffey et al. | Oct 1997 | A |
5689799 | Dougherty et al. | Nov 1997 | A |
5732218 | Bland et al. | Mar 1998 | A |
5737025 | Dougherty et al. | Apr 1998 | A |
5737026 | Lu et al. | Apr 1998 | A |
5771307 | Lu et al. | Jun 1998 | A |
5787253 | McCreery et al. | Jul 1998 | A |
5802320 | Baehr et al. | Sep 1998 | A |
5848396 | Gerace | Dec 1998 | A |
5850249 | Massetti et al. | Dec 1998 | A |
5855020 | Kirsch | Dec 1998 | A |
5889548 | Chan | Mar 1999 | A |
5905713 | Anderson et al. | May 1999 | A |
5961593 | Gabber et al. | Oct 1999 | A |
5970469 | Scroggie et al. | Oct 1999 | A |
5991735 | Gerace | Nov 1999 | A |
6026368 | Brown et al. | Feb 2000 | A |
6052730 | Felciano et al. | Apr 2000 | A |
6055573 | Gardenswartz et al. | Apr 2000 | A |
6070145 | Pinsley et al. | May 2000 | A |
6070148 | Mori et al. | May 2000 | A |
6081900 | Subramaniam et al. | Jun 2000 | A |
6108637 | Blumenau | Aug 2000 | A |
6115680 | Coffee et al. | Sep 2000 | A |
6128624 | Papierniak et al. | Oct 2000 | A |
6138162 | Pistriotto et al. | Oct 2000 | A |
6138165 | Nakatsugawa | Oct 2000 | A |
6141686 | Jackowski et al. | Oct 2000 | A |
6286043 | Cuomo et al. | Sep 2001 | B1 |
6286046 | Bryant | Sep 2001 | B1 |
6321336 | Applegate et al. | Nov 2001 | B1 |
6351467 | Dillon | Feb 2002 | B1 |
6353929 | Houston | Mar 2002 | B1 |
6381632 | Lowell | Apr 2002 | B1 |
6421733 | Tso et al. | Jul 2002 | B1 |
6449251 | Awadallah et al. | Sep 2002 | B1 |
6487538 | Gupta et al. | Nov 2002 | B1 |
6507589 | Ramasubramani et al. | Jan 2003 | B1 |
6567857 | Gupta et al. | May 2003 | B1 |
6606581 | Nickerson et al. | Aug 2003 | B1 |
6658414 | Bryan et al. | Dec 2003 | B2 |
6704787 | Umbreit | Mar 2004 | B1 |
6732118 | Hermann et al. | May 2004 | B2 |
6834308 | Ikezoye et al. | Dec 2004 | B1 |
6839680 | Liu et al. | Jan 2005 | B1 |
6856963 | Hurwitz | Feb 2005 | B1 |
6993590 | Gauthier et al. | Jan 2006 | B1 |
7039599 | Merriman et al. | May 2006 | B2 |
7039858 | Humpleman et al. | May 2006 | B2 |
7080077 | Ramamurthy et al. | Jul 2006 | B2 |
7092926 | Cerrato | Aug 2006 | B2 |
7092942 | Frieden et al. | Aug 2006 | B2 |
7159023 | Tufts | Jan 2007 | B2 |
7181412 | Fulgoni et al. | Feb 2007 | B1 |
7200632 | Greschler et al. | Apr 2007 | B1 |
7216149 | Briscoe et al. | May 2007 | B1 |
7260837 | Abraham et al. | Aug 2007 | B2 |
7269591 | Wesinger, Jr. et al. | Sep 2007 | B2 |
7366724 | Frieden et al. | Apr 2008 | B2 |
7373415 | DeShan et al. | May 2008 | B1 |
7375641 | Kiel et al. | May 2008 | B2 |
7376722 | Sim et al. | May 2008 | B1 |
7420464 | Fitzgerald et al. | Sep 2008 | B2 |
7421723 | Harkness et al. | Sep 2008 | B2 |
7483975 | Kolessar et al. | Jan 2009 | B2 |
7515587 | Timperman et al. | Apr 2009 | B2 |
7613809 | Jackson et al. | Nov 2009 | B2 |
7688813 | Shin et al. | Mar 2010 | B2 |
7702317 | Montelius | Apr 2010 | B2 |
7814483 | Li et al. | Oct 2010 | B2 |
7849502 | Bloch et al. | Dec 2010 | B1 |
8185640 | Nag et al. | May 2012 | B2 |
8224982 | Langille | Jul 2012 | B2 |
8594617 | Papakostas et al. | Nov 2013 | B2 |
8886773 | Papakostas et al. | Nov 2014 | B2 |
8910259 | Papakostas et al. | Dec 2014 | B2 |
20010014915 | Blumenau | Aug 2001 | A1 |
20010020242 | Gupta et al. | Sep 2001 | A1 |
20010039578 | Tokumaru et al. | Nov 2001 | A1 |
20020032734 | Rhoads | Mar 2002 | A1 |
20020065802 | Uchiyama | May 2002 | A1 |
20020069368 | Hines | Jun 2002 | A1 |
20020078441 | Drake et al. | Jun 2002 | A1 |
20020116523 | Warrier et al. | Aug 2002 | A1 |
20020128803 | Skinner et al. | Sep 2002 | A1 |
20020169830 | Mild et al. | Nov 2002 | A1 |
20020169835 | Paul, Jr. et al. | Nov 2002 | A1 |
20020178257 | Cerrato | Nov 2002 | A1 |
20030009762 | Hooper et al. | Jan 2003 | A1 |
20030018778 | Martin et al. | Jan 2003 | A1 |
20030033432 | Simpson et al. | Feb 2003 | A1 |
20030035409 | Wang et al. | Feb 2003 | A1 |
20030051052 | Shteyn et al. | Mar 2003 | A1 |
20030065595 | Anglum | Apr 2003 | A1 |
20030091025 | Celi Jr. et al. | May 2003 | A1 |
20030115586 | Lejouan et al. | Jun 2003 | A1 |
20030154306 | Perry | Aug 2003 | A1 |
20030195884 | Boyd et al. | Oct 2003 | A1 |
20040044786 | Basso et al. | Mar 2004 | A1 |
20040133687 | Yamaguchi et al. | Jul 2004 | A1 |
20040205159 | Johnson et al. | Oct 2004 | A1 |
20040225728 | Huggins et al. | Nov 2004 | A1 |
20050021603 | Yokomitsu et al. | Jan 2005 | A1 |
20050108539 | Skog et al. | May 2005 | A1 |
20050122976 | Poli et al. | Jun 2005 | A1 |
20050138192 | Encarnacion et al. | Jun 2005 | A1 |
20050198261 | Durvasula et al. | Sep 2005 | A1 |
20050201357 | Poyhonen | Sep 2005 | A1 |
20060053110 | McDonald et al. | Mar 2006 | A1 |
20060264202 | Hagmeier et al. | Nov 2006 | A1 |
20060271677 | Mercier | Nov 2006 | A1 |
20070147261 | Schumacher et al. | Jun 2007 | A1 |
20070214501 | Muramoto et al. | Sep 2007 | A1 |
20070222598 | Kiel et al. | Sep 2007 | A1 |
20070273505 | Brosius | Nov 2007 | A1 |
20080015929 | Koeppel et al. | Jan 2008 | A1 |
20080056261 | Osborn et al. | Mar 2008 | A1 |
20080228906 | Yerubandi et al. | Sep 2008 | A1 |
20080244050 | Wong et al. | Oct 2008 | A1 |
20080281697 | Whitehead | Nov 2008 | A1 |
20080289010 | Frieden et al. | Nov 2008 | A1 |
20090034536 | Morand et al. | Feb 2009 | A1 |
20090100174 | Annareddy et al. | Apr 2009 | A1 |
20090119401 | Oikawa et al. | May 2009 | A1 |
20090144410 | Fink et al. | Jun 2009 | A1 |
20090192870 | White et al. | Jul 2009 | A1 |
20090198778 | Priebe | Aug 2009 | A1 |
20090233633 | Morrison | Sep 2009 | A1 |
20090282471 | Green et al. | Nov 2009 | A1 |
20100005183 | Ding et al. | Jan 2010 | A1 |
20100036969 | Perry et al. | Feb 2010 | A1 |
20100083338 | Chiang | Apr 2010 | A1 |
20100192187 | Toebes et al. | Jul 2010 | A1 |
20100205675 | Vogel et al. | Aug 2010 | A1 |
20100216434 | Marcellino et al. | Aug 2010 | A1 |
20100293610 | Beachem et al. | Nov 2010 | A1 |
20100325238 | Khedouri et al. | Dec 2010 | A1 |
20100325239 | Khedouri et al. | Dec 2010 | A1 |
20120042005 | Papakostas et al. | Feb 2012 | A1 |
20120042367 | Papakostas et al. | Feb 2012 | A1 |
20130005296 | Papakostas et al. | Jan 2013 | A1 |
Number | Date | Country |
---|---|---|
101605030 | Dec 2009 | CN |
102377616 | Mar 2012 | CN |
1980950 | Oct 2008 | EP |
2341437 | Jul 2011 | EP |
2003219467 | Jul 2003 | JP |
2004342080 | Dec 2004 | JP |
2005115473 | Apr 2005 | JP |
2007200209 | Aug 2007 | JP |
2008511229 | Apr 2008 | JP |
2009514050 | Apr 2009 | JP |
2010079831 | Apr 2010 | JP |
9641495 | Dec 1996 | WO |
9831155 | Jul 1998 | WO |
0055783 | Sep 2000 | WO |
0111506 | Feb 2001 | WO |
0144975 | Jun 2001 | WO |
0152462 | Jul 2001 | WO |
0250694 | Jun 2002 | WO |
03067376 | Aug 2003 | WO |
2006044820 | Apr 2006 | WO |
2007123760 | Nov 2007 | WO |
Entry |
---|
Erman et al., “HTTP in the Home: It is not just about PCs,” HomeNets 2010, Sep. 3, 2010, New Dehli, India, (6 pages). |
Dossick, S.E. et al., “WWW access to legacy client/server applications,” Fifth International World Wide Web Conference, May 6-10, 1996, Paris, FR, http://iw3c2.cs.ust.hk/WWW5/www5conf.inria.fr/fich—html/papers/P4/Overview.html, (12 pages). |
Zenel, B., et al., “A General Purpose Proxy Filtering Mechanism Applied to the Mobile Environment,” Wireless Networks, ACM, US, vol. 5, No. 5, Oct. 1999, XP000902494, (9 pages). |
Diffie W. et al., “Privacy and Authentication: an introduction to Cryptography,” Proceedings of the IEEE, IEEE. New York, US, vol. 67, No. 3, Mar. 1979, pp. 397-426, SP000575227, (32 pages). |
Srivastava, J., et al., “Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data,” ACM SIGKDD Explorations Newsletter, vol. 1, Issue 2, pp. 12-23, Jan. 2000, (12 pages). |
Boyan, J., “The Anonymizer—Protecting User Privacy on the Web,” Computer-Mediated Communication Magazine, 'Online! 1997, XP002231197, http://www.december.com/cmc/mag/1997/sep/toc.html, retrieved in 1997, (6 pages). |
Choo, C. et al., “A Behavioral Model of Information Seeking on the Web—Preliminary Results of a Study of How Managers and It Specialists Use the Web,” Oct. 25, 1998, (16 pages). |
Wavecrest Computing, “Cyfin Proxy User Manual for Version 8.2.x,” XP55009573, URL:http://downloads.wavecrest.net/release/cyfin/manuals/v820/cyfinProxyManual.pdf, Apr. 9, 2010, (147 pages). |
“User Identification and Authentication Vital Security 9.2,” XP55009307, http://www.m86security.com/software/secure—web—gateway/manuals.9.2.0/User—Identification—and Authentication.pdf, Apr. 25, 2010, (27 pages). |
“HTTP Proxy Authentication and iPhone Apps,” XP55009373, https://discussions.apple.com/message/8018666#8018666, Jan. 15, 2009, (4 pages). |
Number | Date | Country | |
---|---|---|---|
20130007236 A1 | Jan 2013 | US |