|Publication number||US20050027882 A1|
|Application number||US 10/837,614|
|Publication date||Feb 3, 2005|
|Filing date||May 4, 2004|
|Priority date||May 5, 2003|
|Also published as||US7631101, US20070038729, US20100138559, US20110072124|
|Publication number||10837614, 837614, US 2005/0027882 A1, US 2005/027882 A1, US 20050027882 A1, US 20050027882A1, US 2005027882 A1, US 2005027882A1, US-A1-20050027882, US-A1-2005027882, US2005/0027882A1, US2005/027882A1, US20050027882 A1, US20050027882A1, US2005027882 A1, US2005027882A1|
|Inventors||Alan Sullivan, Mark Lewyn, Phillip Gross|
|Original Assignee||Sullivan Alan T., Mark Lewyn, Phillip Gross|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (26), Referenced by (35), Classifications (14), Legal Events (1)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application claims the benefit of U.S. Provisional Application No. 60/467,246 filed May 5, 2003, entitled “Traffic redirection system for phones, the web, SMS and instant messaging,” which is incorporated by reference herein in its entirety.
1. Field of the Invention
The present invention relates generally to traffic direction within a communications network. More specifically, the present invention relates to systems and methods for directing communication traffic to a specified location when an original location is not reachable.
2. Background of the Invention
Directing search traffic on the web is a common and lucrative process. For example, popular web browsers, such as Microsoft Internet Explorer, typically redirect misspelled and mistyped web pages on to the web browser's own personal incomplete search page, such as MSN Search. Such search pages provide the user with possible search options and advertising. The essence of the concept is that it captures the mistyped or misspelled traffic at either the browser level or application level. These methods lack the capability to function at the DNS level thus limiting their overall functionality and ability to be able to provide business services.
Various methods of routing or redirecting traffic are known in the art. For example, methods of routing traffic are taught within U.S. Pat. No. 6,631,402. Methods of redirecting or routing of data traffic are taught within U.S. Pat. No. 6,608,893, U.S. Pat. No. 5,933,490, U.S. Pat. No. 6,205,477, and patent application publication U.S. 2004/0042447 A1. Methods of routing error corrections are taught within U.S. Pat. No. 6,601,208. Routing methods for load balancing are taught within U.S. Pat. No. 6,182,139 and U.S. Pat. No. 5,774,660. Internet traffic routing is taught within U.S. Pat. No. 5,987,611. Methods for dealing with invalid requests are taught within patent application publication U.S. 2004/0030780 A1.
Likewise, methods of marketing and traffic selling are known. For example, such methods are taught within patent application publication U.S. 2004/0044566 A1. URL (uniform resource locator) redirect methods are taught within patent application publication U.S. 2004/004622 A1. DNS (domain name server/service) resource lookup methods are taught within patent application publication U.S. 2004/0044791 A1. Methods of implementing a web-based proxy are taught within U.S. Pat. No. 6,631,402.
Although there are numerous drawbacks to the systems and methods currently available, a drawback of conventional redirect methods is that they lack the ability to perform service task at the DNS level of operation, thus limiting the functionality and capability of such methods.
Furthermore conventional redirect methods are diminished in capacity due to the level at which these elements operate within the Internet infrastructure or Internet architecture, thus limiting the ability of conventional redirect methods in conducting reliable business services, such as payment processing, e-commerce, ENUM, IP telephony, VoIP, filtering, security, URL forwarding, and associated tracking methods, such as market channel tracking, webpage usages, DNS statistics, traffic redirection, and information storage or backup.
Thus there is a need in the art for a method of traffic direction or redirection that is not limited in the level at which it is able to function and allows for conducting reliable business services and associated tracking methods.
The present invention provides systems and methods for redirection of improper or incorrect requests. The system and methods redirect such requests to a proxy host, which analyzes the erroneous request and provides a context-relevant search result rather than an error message. The methods and systems reside at the service provider level (i.e., at the DNS or ISP level) rather than the user level.
The present invention accordingly provides systems and methods for conducting business using computers. The systems and methods include identifying queries containing errors and redirecting these erroneous queries to web pages that contain relevant information, which can be provided by advertisers who pay the ISP or DNS operator for inclusion of their content on the redirect web page.
The Internet provides a user a quick and efficient direction to a particular web site if the user knows the exact web site address. The majority of Internet users properly type in the exact address of the web site that they are seeking and thus are directed to such sites. However, a user will quite often type in an address that is not recognized, thereby leading the user to an error page or a specific search engine page. Such undesired direction of the user is considered as unwanted, unused or unresolved traffic. Another popular name for URL addresses that lead to no proper destination is “trash traffic.”
The present invention offers a recycling solution to trash traffic by directing such trash traffic to a particular predetermined location. Such predetermined location may be a search engine or an advertising page or some combination of both or other page that allows the controller to benefit from the redirection of the user traffic. Such a controller may be, for example, an ISP. The limitations and difficulties in the current state of the art in the area of redirecting network traffic are addressed by the present invention, which reside in the systems and methods for the direction of trash traffic and resulting production of capital for various applications.
The systems and methods according to the present invention are suitable for use in any computer-driven communications system, such as Internet systems and telephony. As such, the present methods and systems can be implemented at the DNS or ISP level.
The exemplary systems and methods according to the present invention will provide a more robust experience for the Internet user allowing the local computer to conduct other tasks. As providers of DNS service begin redirecting more traffic away from browser providers, they will look for the “IP address of the redirect host” that is being returned through the DNS, or domain name system. Once the DNS service providers know that information, they will replace that IP address with their own redirect host. This will enable them to recapture the traffic. The invention as described herein provides a way to eliminate the need to redirect lost or trash traffic at the application level but to do so at the DNS level. This will eliminate companies from being able to filter a single IP address because multiple IP addresses will be returned from a pool of IP addresses from network of machines.
An issue in Internet traffic redirection design is the communications between the customer and ISP. Conventional systems and methods are relatively inflexible with respect to the manner in which they generate the required code transfers for such rerouting or redirecting of Internet traffic at the DNS level of operation.
Exemplary systems and methods in accordance with the present invention are accomplished by incorporating the use of a unique means of traffic direction or redirection, being used synonymously herein and through this application, wherein the use of DNS level protocols is applied in a manner that creates advantages over conventional redirect systems. This is accomplished by integrating redirection instruction software, labeled as Lookup Proxy (“PLP”), within the ISP server machines wherein lost traffic is thus converted into profit for the ISPs through direction of traffic to a predetermined web site. Such profits may be distributed through participating partners and/or stored for later use in an online account when the customer can take action, thus increasing the overall efficiency of the monetary exchange system and adding stability and safety to the customers funds.
Moreover, it has been discovered that other features present have applications to reduce computer usage at the customer level by using the infrastructure in such a way that when a query occurs, there is minimal impact upon the end user and greatly minimized computer usage required by the end customer thus improving the efficient use of the Internet infrastructure. There is an added benefit in that when the query is initiated there is a seamless integration with the entire network.
Although the present disclosure is directed to Internet trash traffic as an example, the present invention is not limited to this exemplary embodiment. Other communication direction is also within the purview of the present invention. For example, in an exemplary embodiment of the present invention as applied to the field of telephony, unused traffic might be a misdialed phone number that may then be redirected to a telemarketer or other location or for other services, such as a directory function. In the area of Instant Messaging (“IM”), unused traffic may be generated, for example, by someone who typed in an incorrect “screen name.” That mistyped screen may then be redirected to an advertiser who might flash up a message and/or link or to another location or for other services, such as a directory function.
If processed correctly, unwanted, unused and/or unresolved traffic would be a very valuable business resource to those seeking such traffic. Indeed, many Internet registries and corporate web sites are unaware that they possess this valuable business asset. Today, they view this traffic as the World Wide Web equivalent of “trash.” But, as with many industries, “trash” can often be recycled and turned into new products. One way to do that is by means of directing such unwanted, unused and/or unresolved traffic.
The systems and methods for which traffic can be identified as “unwanted,” “unused” or “unresolved” within the World Wide Web may be accomplished by several means which will be described herein.
At the DNS level of the Internet infrastructure, a registry, such as, for example, VeriSign, would look at the internet traffic by considering what the customer has typed into the web browser and then see if there is a domain name associated with what the customer has typed in. If there is no such domain name, then the traffic would be classified as “unresolved” and made available to be redirected wherein such a system or method could be implemented at the ISP level and/or web browser level.
Corporate web sites could identify traffic as unwanted through a number of means. A corporate web site, for instance, may define traffic from overseas as “unwanted” if it were not profitable to ship overseas. Thus, one could identify if the traffic came from overseas by analyzing the IP address. Alternatively, a web site owner might only want traffic at certain times, and not at other times and/or geographic location. Thus, such traffic could be sorted by time and/or geographic location wherein such specified portions could be identified and made available as redirected traffic.
In the area of telephony, unwanted telephone traffic might take the form of a misdialed phone number or a misdirected Internet call. Or, perhaps, the person typed in the right telephone number, but there is no person associated with that number or they may no longer work there or have a different phone number. In either case, that piece of telephone traffic could be redirected, perhaps to a telemarketer or to someone within the company that the person is trying to contact, or an outside company to where the person may have transferred. Other options are also possible.
In the instant messaging (IM) world, an “unresolved” piece of traffic would be, for example, a piece of traffic for which there is no screen name associated such as when a customer types in a screen name that doesn't exist. If it cannot be resolved in the IM database, then the traffic is identified as unresolved and thus may be redirected, and a marketing message and/or website link can be delivered to the consumer.
As shown and described, many possible examples exist for the directing or redirecting of electronic communication signals that are not able to find their intended targets. Although many such forms exist, with non-limiting examples being described above in terms of internet traffic, telephone calls and the like, the examples described herein are provided with respect to lost Internet traffic for sake of simplicity. However, the concepts and architecture is the same with other forms of electronic communication and thus the present invention has a scope that encompasses all electronic communication, beyond that for lost Internet traffic as described in the following series of figures.
An exemplary embodiment of the present invention is shown in
However, as is often the case, an Internet user does not properly type in a desired Internet address.
Following the sequences shown in
Based on the type of inquiry that is being made,
In order to keep its records continuously updated,
As shown in the exemplary sequences of
DNS Proxy intercepts DNS requests at port 53 and passes on those requests to the DNS of the ISP. If an error is returned by the DNS, the DNS proxy will return an IP address of the PSP node.
The PSN protocol module is what communicates between the PLP and PSP. This allows real-time data updates between the PLP and PSP. The PLP can send information, such as, for example, DNS stats, status, information about the owner of IP addresses, status and information from additional service modules. The PSN can add new servers modules to the PLP, can update the PLP software, can return response to queries, can return the IP addresses to be returned in place of error messages from the DNS.
The DNS Stats module collects statistics about the DNS requests and status of the requests. It can collect those stats or send that information to the PSP via the PSN protocol module. Additional services modules can be added to the PLP. The PSP Request Handler handles the request from ISP customers when they are directed to an error landing page. The request handler employs the Port Filter to filter out any non-HTTP protocol or other port requests other than HTTP. The Profiler is used to define the look and feel and layout of a landing page. It can contain profile information about the ISP or the customer. The Page Builder module builds the PSP landing page in real-time in response to the profile of either the user, the ISP, or both that are stored in the Profiler.
For example, an integral component, which will run as a module in the general purpose software engine, is the collection and analysis of DNS and other traffic. This opens opportunities to partner with researchers and ISP's to study Internet performance. With the PLP/PSP/PSM technology widely distributed at participating ISP's, the general purpose software engine of the PLP architecture will make it possible to deliver additional services such as “DNS forwarding” for known changes to DNS names, “URL filtering” to control access to undesirable web sites, detection and diagnosis of DDOS attacks, and detection and diagnosis of Spam sources.
A failed-lookup service is useful to customers. Customers will be given appropriate controls (e.g., opt-out feature). The technical model shown and described assures other applications work as expected. The model creates opportunities for other useful services for customers. This model creates a network uniquely positioned to instrument and study Internet performance dynamics. It is not a rigidly enforced mechanism and offers complete choice to the user; ISP's can participate without redirection (e.g., for other services) or ISP customers have choice to opt-out. The options are in place for both the customer and the ISP.
In a preferred embodiment, for simple traffic redirection, the system can identify a piece of unwanted, unused or unresolved traffic and point it to a particular location, such as a search engine and/or any IP address and/or any IP address of a web server and/or any IP address of any server for any port or protocol. Other options are also possible and are left to the controller of the system and method as described herein.
In a preferred embodiment for use with traffic direction and processing, the traffic is processed before it is redirected. Such processing may, for example, include identifying or approximating the location and/or demographics of the entity that initiated the traffic. This may be accomplished, for example, using geo-location and/or demographic analysis. The IP address of the requestor may be discovered ahead of time by any ISP that delegates either a static IP address or uses a dynamic means such as DHCP to delegate an IP address to a particular user. When the secondary request is made, for example another web landing page, the identity of the user can then be determined by the IP address of the requester to bind a particular DNS request with a particular requester.
In another exemplary embodiment, traffic is offered on an exchange that would allow potential buyers to bid on the traffic before it is redirected. This embodiment can involve simple traffic redirection, in which case the traffic can be sold on an individual basis or in bulk, for example. Alternatively, this embodiment can involve a processing step allowing the traffic to be classified by one or more criteria such as geographic location and/or demographics for the purpose of selling the traffic to parties interested in receiving such traffic from a particular location and/or demographic.
A variety of different systems and methods may be employed within the scope of the present invention to both identify unwanted, unused or unresolved traffic and to redirect such traffic, once identified as such.
Exemplary systems and methods according to the present invention have a variety of industrial and corporate uses. In one non-limiting example in the corporate arena, World Wide Web merchants receive a significant amount of traffic that they do not want or need. For instance, any traffic a merchant received from overseas is worthless to him if it's unprofitable or illegal for that merchant to ship its product overseas. Another use area includes World Wide Web registries, which help direct traffic from a customer to its final destination on the World Wide Web, which frequently cannot figure out where to send a unit of traffic. This traffic may be classified as unresolved traffic. This happens billions of times a day on the World Wide Web.
In one non-limiting every day example, an average Internet user who is seeking out a dentist with a distinct web address may accidentally type in the wrong address. The exemplary systems and methods of the present invention may then determine that the wrong address is a result of the user's interest in seeking out a dentist. An advantage of the present invention is that the exemplary system then determines the general location of the computer of the user, for example through zip code. Then the exemplary system does a search of all dentists in its participating (advertising) partner database to determine which are available in the zip code of the particular user. The system then presents the user with a web page of information that relate to dentists in the same zip code. Although the user types in the wrong email address relating to a particular dentist, the ISP provider was able to provide the user with a list of dentists in the user's area. This service is beneficial for the user who is seeking a dentist (and may have been seeking one who is closer or more economical), the ISP provider (who gains from the advertising costs), and the dentist (who has paid for advertising to the ISP and is now having customers directed to him).
Other similar examples are limitless and within the scope of the present invention. For example, misdialed telephone calls may operate under the same structure, providing the caller with additional options other than the party that the caller had intended to call (but whose number the caller misdialed).
Yet another example involves broken links. There are literally billions of links on the web that are “broken,” meaning that when a consumer clicks on the link, he doesn't end up where he intended, but, rather, on an “error” page. These broken links can be collected and then the traffic they generate can be redirected to another place, perhaps a related page.
Yet another example includes parked domains. “Parked” domains are domains that have been registered by a consumer or business, but for which there is no web site attached by the registered owner of that domain. These parked domains are typically maintained by the “Registrars” that sold the domain. Even though there is no website attached to these domains, they still generate traffic. This traffic can be redirected to another place.
Many other uses are possible. These include:
Further advantages of the invention are to reduce overhead usage of the components involved in the end users computer system, add stability to the internet infrastructure structure, and increase reliability, while reducing the needed maintenance associated with current internet redirect systems. An advantage of the exemplary embodiments of the present invention is that they provide means for recovering unresolved traffic and converting such traffic into monies for the ISP's and/or participating business partners. Another result of exemplary embodiments of the invention is to provide a system or method for Internet traffic redirection, which permits a myriad of services to be implemented to the customer directly through the ISP and/or participating partner.
The foregoing disclosure of the preferred embodiments of the present invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many variations and modifications of the embodiments described herein will be apparent to one of ordinary skill in the art in light of the above disclosure. For example, the principles of the invention in their broader aspects may be applied to other network systems such as for telephony. The scope of the invention is to be defined only by the claims appended hereto, and by their equivalents.
Further, in describing representative embodiments of the present invention, the specification may have presented the method and/or process of the present invention as a particular sequence of steps. However, to the extent that the method or process does not rely on the particular order of steps set forth herein, the method or process should not be limited to the particular sequence of steps described. As one of ordinary skill in the art would appreciate, other sequences of steps may be possible. Therefore, the particular order of the steps set forth in the specification should not be construed as limitations on the claims. In addition, the claims directed to the method and/or process of the present invention should not be limited to the performance of their steps in the order written, and one skilled in the art can readily appreciate that the sequences may be varied and still remain within the spirit and scope of the present invention.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US6009459 *||Jan 10, 1997||Dec 28, 1999||Microsoft Corporation||Intelligent automatic searching for resources in a distributed environment|
|US6092100 *||Nov 21, 1997||Jul 18, 2000||International Business Machines Corporation||Method for intelligently resolving entry of an incorrect uniform resource locator (URL)|
|US6332158 *||Dec 9, 1998||Dec 18, 2001||Chris Risley||Domain name system lookup allowing intelligent correction of searches and presentation of auxiliary information|
|US6526450 *||Apr 17, 2001||Feb 25, 2003||Cisco Technology, Inc.||Method and apparatus for domain name service request resolution|
|US6594697 *||May 20, 1999||Jul 15, 2003||Microsoft Corporation||Client system having error page analysis and replacement capabilities|
|US6615237 *||Feb 4, 2000||Sep 2, 2003||Microsoft Corporation||Automatic searching for data in a network|
|US6760746 *||Aug 31, 2000||Jul 6, 2004||Eric Schneider||Method, product, and apparatus for processing a data request|
|US6799214 *||Apr 8, 2000||Sep 28, 2004||Nec Corporation||System and method for efficient content delivery using redirection pages received from the content provider original site and the mirror sites|
|US7010537 *||Apr 25, 2001||Mar 7, 2006||Friskit, Inc.||Method and system for visual network searching|
|US7035921 *||Nov 14, 2000||Apr 25, 2006||Hewlett-Packard Development Company, L.P.||Method of and apparatus for providing web service using a network of servers|
|US7110399 *||Mar 28, 2002||Sep 19, 2006||International Business Machines Corporation||System and method for redirecting network addresses for deferred rendering|
|US20020055848 *||Jan 23, 2001||May 9, 2002||Kyung-Sung Jae||Method and apparatus of business transaction using inherent identification numbers of hardwares|
|US20020065842 *||Jul 26, 2001||May 30, 2002||Ibm||System and media for simplifying web contents, and method thereof|
|US20030014539 *||Jun 12, 2002||Jan 16, 2003||Reznick Josh L.||System and method for traffic management|
|US20030018726 *||Apr 29, 2002||Jan 23, 2003||Low Sydney Gordon||Instant messaging|
|US20030110161 *||Apr 4, 2000||Jun 12, 2003||Eric Schneider||Method, product, and apparatus for providing search results|
|US20030135548 *||Dec 16, 2002||Jul 17, 2003||Bushkin Arthur A.||System and method for disseminating knowledge over a global computer network|
|US20030231754 *||Feb 11, 2003||Dec 18, 2003||David Stein||Telephone call redirection system|
|US20040030780 *||Aug 8, 2002||Feb 12, 2004||International Business Machines Corporation||Automatic search responsive to an invalid request|
|US20040044566 *||Aug 30, 2002||Mar 4, 2004||Bostelmann Janet K.||Landing page and channel identifier in multichannel marketing system|
|US20050015512 *||Dec 5, 2003||Jan 20, 2005||International Business Machines Corporation||Targeted web page redirection|
|US20050065806 *||Sep 29, 2003||Mar 24, 2005||Harik Georges R.||Generating information for online advertisements from Internet data and traditional media data|
|US20050135264 *||Dec 23, 2003||Jun 23, 2005||Jeff Popoff||Method for implementing an intelligent content rating middleware platform and gateway system|
|US20050198068 *||Mar 4, 2004||Sep 8, 2005||Shouvick Mukherjee||Keyword recommendation for internet search engines|
|US20050235044 *||Apr 19, 2005||Oct 20, 2005||Tazuma Stanley K||Apparatus and methods relating to web browser redirection|
|US20060218242 *||Jun 8, 2006||Sep 28, 2006||Theron Tock||Method and system for modifying requests for remote resources|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7711850 *||Sep 18, 2006||May 4, 2010||Sendori, Inc.||Electronic marketplace used to lease domain names and redirect web surfers from leased domain names|
|US7711851 *||Mar 14, 2008||May 4, 2010||Sendori, Inc.||Domain name marketplace|
|US7805379 *||Dec 21, 2007||Sep 28, 2010||Amazon Technologies, Inc.||Method and system for leasing or purchasing domain names|
|US7987181||Jun 16, 2004||Jul 26, 2011||Symantec Operating Corporation||System and method for directing query traffic|
|US8112804 *||Jan 8, 2008||Feb 7, 2012||Kt Corporation||Malignant BOT confrontation method and its system|
|US8159352||Sep 11, 2007||Apr 17, 2012||Colgate-Palmolive Company||Personal care implement having a display|
|US8171019||Oct 1, 2003||May 1, 2012||Verisign, Inc.||Method and system for processing query messages over a network|
|US8175098||Aug 27, 2009||May 8, 2012||Verisign, Inc.||Method for optimizing a route cache|
|US8200583||Aug 23, 2010||Jun 12, 2012||Amazon Technologies, Inc.||Method and system for leasing or purchasing domain names|
|US8271682||Aug 11, 2009||Sep 18, 2012||Sendori, Inc.||Enhancements for domain name leasing marketplace|
|US8327019||Aug 18, 2009||Dec 4, 2012||Verisign, Inc.||Method and system for intelligent routing of requests over EPP|
|US8510263||Jun 15, 2009||Aug 13, 2013||Verisign, Inc.||Method and system for auditing transaction data from database operations|
|US8527945||May 7, 2010||Sep 3, 2013||Verisign, Inc.||Method and system for integrating multiple scripts|
|US8630988||Dec 10, 2008||Jan 14, 2014||Verisign, Inc.||System and method for processing DNS queries|
|US8631156 *||Oct 12, 2010||Jan 14, 2014||Apple Inc.||Systems and methods for providing network resource address management|
|US8681008||Mar 29, 2012||Mar 25, 2014||Colgate-Palmolive Company||Personal care implement having a display|
|US8682856||Nov 9, 2011||Mar 25, 2014||Verisign, Inc.||Method and system for processing query messages over a network|
|US8856344||Mar 15, 2013||Oct 7, 2014||Verisign, Inc.||Method and system for intelligent many-to-many service routing over EPP|
|US8977705||Jul 27, 2009||Mar 10, 2015||Verisign, Inc.||Method and system for data logging and analysis|
|US8982882||Nov 9, 2009||Mar 17, 2015||Verisign, Inc.||Method and system for application level load balancing in a publish/subscribe message architecture|
|US9021127||Mar 14, 2013||Apr 28, 2015||Amazon Technologies, Inc.||Updating routing information based on client location|
|US9021128||May 17, 2013||Apr 28, 2015||Amazon Technologies, Inc.||Request routing using network computing components|
|US9021129||Jun 3, 2013||Apr 28, 2015||Amazon Technologies, Inc.||Request routing utilizing client location information|
|US9047589||Oct 30, 2009||Jun 2, 2015||Verisign, Inc.||Hierarchical publish and subscribe system|
|US9083743||Jun 20, 2012||Jul 14, 2015||Amazon Technologies, Inc.||Managing request routing information utilizing performance information|
|US9106701||Nov 4, 2013||Aug 11, 2015||Amazon Technologies, Inc.||Request routing management based on network components|
|US9124592||Mar 16, 2015||Sep 1, 2015||Verisign, Inc.||Method and system for application level load balancing in a publish/subscribe message architecture|
|US9130756||Mar 11, 2013||Sep 8, 2015||Amazon Technologies, Inc.||Managing secure content in a content delivery network|
|US9135048||Sep 20, 2012||Sep 15, 2015||Amazon Technologies, Inc.||Automated profiling of resource usage|
|US20040254926 *||Oct 1, 2003||Dec 16, 2004||Verisign, Inc.||Method and system for processing query messages over a network|
|US20060004710 *||Jun 16, 2004||Jan 5, 2006||Veritas Operating Corporation||System and method for directing query traffic|
|US20070067416 *||Sep 14, 2006||Mar 22, 2007||Advanced Digital Broadcast S. A.||Method for referencing remote element of content, method for providing content with remote elements and system for distributing content|
|US20120089712 *||Oct 12, 2010||Apr 12, 2012||Apple Inc.||Systems and methods for providing network resource address management|
|US20140289319 *||Jun 5, 2014||Sep 25, 2014||Amazon Technologies, Inc.||Request routing using popularity information|
|WO2007087390A2 *||Jan 23, 2007||Aug 2, 2007||Michael Dennis Futamase||System and method for redirecting internet traffic|
|U.S. Classification||709/244, 709/245|
|International Classification||H04L29/08, H04L29/12|
|Cooperative Classification||H04L67/02, H04L67/327, H04L69/329, H04L29/12066, H04L61/1511|
|European Classification||H04L61/15A1, H04L29/12A2A1, H04L29/08A7, H04L29/08N31Y, H04L29/08N1|
|Oct 20, 2004||AS||Assignment|
Owner name: PAXFIRE, INC., DISTRICT OF COLUMBIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SULLIVAN, ALAN;LEWYN, MARK;GROSS, PHILLIP;REEL/FRAME:015924/0375;SIGNING DATES FROM 20040930 TO 20041011