Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS20070174295 A1
Publication typeApplication
Application numberUS 11/619,795
Publication dateJul 26, 2007
Filing dateJan 4, 2007
Priority dateMar 22, 2000
Also published asCA2403879A1, EP1277146A1, EP1277146A4, US7181412, WO2001071620A1
Publication number11619795, 619795, US 2007/0174295 A1, US 2007/174295 A1, US 20070174295 A1, US 20070174295A1, US 2007174295 A1, US 2007174295A1, US-A1-20070174295, US-A1-2007174295, US2007/0174295A1, US2007/174295A1, US20070174295 A1, US20070174295A1, US2007174295 A1, US2007174295A1
InventorsMagid Abraham, Gian Fulgoni, Bryan Miller, Michael Brown, Adam Davis
Original AssigneeComscore Networks, Inc.
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Systems and methods for collecting consumer data
US 20070174295 A1
Abstract
All of an internet user's internet data is routed to a known domain on the internet, from which it is routed on to the intended recipient. The domain includes proxy servers which proxy the user's WWW data requests to the domain, and database servers which filter and build a database of the user's internet usage. Particular data concerning certain behaviors of interest, such as purchasing data, is filtered into the database, and can form the basis for numerous market measures.
Images(4)
Previous page
Next page
Claims(17)
1. A method of collecting data relating to a user's transactions over an unsecure network, the user utilizing a computing device to send and receive data sets over the network, the computing device having an address on the network, the data sets including data representative of the address of the computing device on the network, comprising the steps of:
directing all data sets from the computing device to a known domain;
assigning a unique identifier to the computing device;
readdressing data sets sent from the computing device to indicate that the data sets originated in the known domain;
recording at least part of the data sets; and
sending the readdressed data onto the network.
2. A method according to claim 1, wherein the step of directing all data sets comprises configuring software running on the computing device to address all data sets to a known proxy server in the known domain.
3. A method according to claim 1, wherein the step of recording at least part of the data sets comprises building a database including at least part of the data sets.
4. A method according to claim 3, wherein the step of building a database includes building a database having at least one field selected from the group consisting of user age, user income level, user education level, household size, time of transmission of the data set, location of computing device, date of transmission of the data set, currency paid, type of product purchased, type of service purchased, network address of the intended recipient of a data set, click-through address, banner advertisement impression, and permission e-mail received, and combinations thereof.
5. A method according to claim 1, further comprising the steps of:
negotiating a first encryption key with the computing device;
negotiating a second encryption key with an intended recipient of a data set sent by the computing device.
6. A method in accordance with claim 5, further comprising the steps of:
decoding an encrypted data set from the computing device with the first encryption key;
encrypting the decoded data set with the second encryption key; and
transmitting the data set encrypted with the second encryption key to the intended recipient via the network.
7. A method in accordance with claim 1, further comprising the step of:
calculating a metric from the data recorded in the recording step indicative of how much money is spent per a set number of times a particular addressable data set on the network is requested by any user on the network.
8. A method in accordance with claim 1, further comprising the step of:
generating a set of records from the data recorded in the recording step, each record including data, the data being representative of a user's request for data from a single set of addresses on the network, and the data being representative of at least one characteristic of the user.
9. A method in accordance with claim 1, further comprising the step of:
generating a set of records from the data recorded in the recording step, each record in the set including the price paid for a product or service in a known class of products or services, and the date the price was paid; and
generating time-price functions to provide an indication of the market price for products or services in the known class of products or services.
10. A method in accordance with claim 1, further comprising the step of:
generating a set of records from the data recorded in the recording step, the set of records including fields for data indicative of the amount of revenue a known network address generates over a set time period or over a set number of requests for data from the known network address.
11. A method in accordance with claim 10, further comprising the step of:
generating a revenue projection over a given period of time for the known network address.
12. A method in accordance with claim 10, further comprising the step of:
generating a sales forecasts for the known network address.
13. A method in accordance with claim 1, further comprising the step of:
generating a set of records from the data recorded in the recording step, the set of records including a field indicative of the number of times data at a known network address is requested by a user on the network.
14. A method in accordance with claim 1, further comprising the step of:
generating a set of records from the data recorded in the recording step, the set of records including fields indicative of a characteristic of users of the network, and at least one field indicative of network usage; and
comparing the set of records to a second database based on a large population to predict an overall probability of network usage by network users having the characteristic for the entire population represented by the second database.
15. A method in accordance with claim 1, further comprising the step of:
compressing the readdressed data.
16. A system for collecting data relating to a user's transactions over an unsecure network, the user using a computing device configured to send and receive data sets over the network, the computing device having an address on the network, the data sets including data representative of the address of the computing device on the network, the system comprising:
logic configured to assign a unique identifier to the computing device;
logic configured to readdress data sets sent from the computing device to indicate that the data sets originated in the known domain;
logic configured to record at least part of the data sets; and
logic configured to send the readdressed data onto the network.
17. A system for collecting data relating to a consumer's transactions over an unsecure network, the consumer using a computing device configured to send and receive data sets over the network, the data sets including data representative of the address of the computing device on the network, the network including a content server, the system comprising:
logic configured to send data to and receive data from the consumer over the network;
logic configured to negotiate a first encryption key with the consumer's computing device; and
logic configured to negotiate a second encryption key with the content server.
Description
    BACKGROUND OF THE INVENTION
  • [0001]
    1. Field of the Invention
  • [0002]
    The present invention relates to systems and methods useful for collecting consumer data, and more particularly to systems and methods for collecting data representative of consumer buying habits over networks.
  • [0003]
    2. Brief Description of the Related Art
  • [0004]
    Consumer decision making has been a focus for many years. Companies that are attempting to meet a particular need in the marketplace, or that are attempting to find out how their products or services are being received by the consumer, will often conduct market research to attempt to quantify attributes or characteristics of a particular consumer segment. If performed well, the data extracted from this research can inform companies about how their products or services are perceived and bought by purchasers or potential purchasers in the marketplace, and how the companies' products or services can be changed to achieve the companies' business goals.
  • [0005]
    Traditionally, there have been numerous other general protocols for performing consumer-oriented market research. A pool of consumers is first selected, and then each individual person in the pool is asked to provide information about themselves, their purchasing and perceptions of products or services, and/or their buying decisions, among other things. Many different ways have been proposed in the past for eliciting and recording this information from the individual consumer. For example, for television viewing habits, an electronic device has been attached to the television consumer's television set which is capable of recording which specific channels were tuned in, at what time, and for how long.
  • [0006]
    Perhaps the most simple prior protocol for collecting such data has been to simply ask the consumers to write down data about their buying habits, or to survey a random selection of people either personally, over the telephone, or by using a mailed survey.
  • [0007]
    Other prior data collection protocols concerned collecting data about consumers' buying habits. For example, one prior protocol involved the consumer being given an electronic device which includes a Universal Product Code (UPC) (bar code) scanner. The consumer was requested to scan in every item that the consumer bought over a period of time, and to enter other information regarding the purchase (e.g., at what retailer the purchase was made). The consumer then connected the device to an intelligent modem. The device would dial up and connect to a host computer, and upload the scanned information to the host computer to be collected and processed.
  • [0008]
    Another data collection protocol, commonly used by consumer package goods retailers, is to ask the consumer to show an ID card at checkout. The check-out clerk then inputs the ID number and scans the items bought for both pricing and gathering data about the consumer's grocery buying habits. The retailer then can use this data about the individual consumer to make consumer-specific promotional offers. Data from many consumers can be merged together and sold to another party for marketing intelligence, or the like.
  • [0009]
    The above prior data collection protocols suffer from numerous deficiencies, in the traditional and modem marketplace. In particular, it has proven difficult to adapt these protocols to internet-based electronic commerce. Compared to the relative ease by which consumers are able to receive information and make decisions based on information from the internet, prior data collection protocols are cumbersome, do not interface well (if at all) with computer-based consumer activity, and are therefore not well suited for collecting data about internet-based activity.
  • [0010]
    Some internet-activity monitoring has been proposed. For example, a server-side consumer data collection strategy has been proposed in which an individual internet content provider (“website”) monitors and collects data about each consumer who has requested data from (“visited”) the website, and then compiles this data about all the consumers who have visited that website. This data could include purchases; the specific type or subject of information requested from the site; and the like. Furthermore, the website also collects data about how frequently particular files or groups of files (“webpage”) have been visited (commonly referred to as “click through hits”), that is, a measure of the popularity of a particular website or webpage. This is one form of server-side data collection.
  • [0011]
    Another form of server-side consumer data collection requires a consumer to visit a particular website specifically for the purpose of providing information about that individual's buying habits, in return for which the website compensates the individual, with incentives such as money, gifts, credits, or the like.
  • [0012]
    Data collection directly from an internet consumer's computer has also been proposed, i.e., client-side data collection. Such systems commonly involve installing a large and cumbersome software application onto the consumer's computer, which operates at the same time as internet browser application software. The software then collects data about the consumer's internet usage, i.e., which websites the consumer has visited. The data is then uploaded to a data collecting computer on the internet.
  • [0013]
    These prior internet activity protocols and systems have numerous disadvantages and deficiencies. While both the above server-side and client-side data collection systems are capable of collecting data about a particular consumer, they both suffer from certain failings. For example, prior server-side systems only are capable of collecting data about a consumer's activities at a single website, as it is that website itself that is collecting the data. If the consumer clicks-through to another site, e.g., an advertiser's site, the consumer and their information is thereafter lost. Furthermore, it is difficult for server-side systems to collect data about the consumer, such as age, income level, marital status, and other demographic, economic, and personal information, which would allow the data to be compared with consumer databases from other source. Many consumers are simply unwilling to give this sensitive information to an otherwise unknown party without some incentive being provided. Thus, in order to get statistically significant market data, the website would have to be visited by an enormous number of internet consumers.
  • [0014]
    Prior client-side systems likewise suffer from different, but nevertheless severe, deficiencies. Because prior client-side systems require the use of an additional application to gather data, which application runs on the consumer's computer at the same time as the consumer's internet browser, the computer is slowed down by the added impact on its system's resources. Thus, the consumer notices a delay in the operation of her computer, which is not acceptable to many consumers. Uploading collected data also takes away from internet bandwidth, which also is unacceptable to many consumers. In order to interpret the raw data from the internet that this specialized software shares with the internet browser, it is necessary for the client-side software to include data or instructions which allows the software to interpret the data from specific websites. When these specific websites change the format of the data they send to internet consumers, the specialized software must be updated so that the new data format(s) can be properly interpreted. Thus, when a website changes the layout or content of a webpage that the client-side software is supposed to monitor, the client-side software on each participating internet consumer's computer must be updated. As will be immediately appreciated, this can be a large, cumbersome, and expensive undertaking. Because the software installed on the client-side computer is complicated, it is also not unusual for technical problems to occur. This necessitates the maintenance of a large customer service center to help answer consumer's questions and solve their problems. This can also be a very expensive undertaking.
  • [0015]
    Furthermore, such client-side systems require a very large sample size of internet users in order to have statistically significant data, because the number of internet users who visit a website is much greater than the number of internet consumers who perform some internet activity, such as making a purchase, listening to a sound or song, watching a video, or requesting a specific type of information. Because of the expensive features of prior client-side systems, the costs per panelist to maintain these measurement systems are extraordinarily high.
  • SUMMARY OF THE INVENTION
  • [0016]
    According to a first exemplary embodiment, a method of collecting data relating to a user's transactions over an unsecure network, the user utilizing a computing device to send and receive data sets over the network, the computing device having an address on the network, the data sets including data representative of the address of the computing device on the network, comprises the steps of directing all data sets from the computing device to a known domain, assigning a unique identifier to the computing device, readdressing data sets sent from the computing device to indicate that the data sets originated in the known domain, recording at least part of the data sets, and sending the readdressed data onto the network.
  • [0017]
    According to a second exemplary embodiment, a system for collecting data relating to a user's transactions over an unsecure network, the user using a computing device configured to send and receive data sets over the network, the computing device having an address on the network, the data sets including data representative of the address of the computing device on the network, comprises logic configured to assign a unique identifier to the computing device, logic configured to readdress data sets sent from the computing device to indicate that the data sets originated in the known domain, logic configured to record at least part of the data sets, and logic configured to send the readdressed data onto the network.
  • [0018]
    According to a third exemplary embodiment, a system for collecting data relating to a consumer's transactions over an unsecure network, the consumer using a computing device configured to send and receive data sets over the network, the data sets including data representative of the address of the computing device on the network, the network including a content server, comprises logic configured to send data to and receive data from the consumer over the network, logic configured to negotiate a first encryption key with the consumer's computing device, and logic configured to negotiate a second encryption key with the content server.
  • [0019]
    Still other objects, features, and attendant advantages of the present invention will become apparent to those skilled in the art from a reading of the following detailed description of embodiments constructed in accordance therewith, taken in conjunction with the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0020]
    The invention of the present application will now be described in more detail with reference to preferred embodiments of the apparatus and method, given only by way of example, and with reference to the accompanying drawings, in which:
  • [0021]
    FIG. 1 schematically illustrates a prior network configuration;
  • [0022]
    FIG. 2 schematically illustrates an exemplary embodiment of a system in accordance with the present invention;
  • [0023]
    FIG. 3 schematically illustrates a portion of the system illustrated in FIG. 2; and
  • [0024]
    FIGS. 4 and 5 diagrammatically illustrate flow charts of steps of methods in accordance with the present invention.
  • DETAILED DESCRIPTION
  • [0025]
    Referring to the drawing figures, like reference numerals designate identical or corresponding elements throughout the several figures.
  • [0026]
    The present invention relates to systems and methods useful for collecting data indicative or representative of a specific internet user's activity. A domain is established with proxy servers and data servers to which all of a single internet user's activity is routed, which enables all of the activity to be filtered and data to be collected about specific types of activity and stored on the data servers. The domain is established on the internet, and by simply instructing the user's internet browser to route all internet traffic from the user through the domain, the domain can perform whatever data collection is desired without the user suffering from delays in webpage retrieval and the like. Enrollment in the system of the present invention would be entirely voluntary on the part of the individual internet user, and the enrolled internet user would be provided some incentive in return for allowing the system to have all of that user's internet traffic routed through the system's domain. Furthermore, specific information about the internet user could be gathered as a prerequisite for enrollment, which enriches the data collected about that user's internet usage habits and permits inter-database comparisons.
  • [0027]
    Systems of the present invention allow server-side data collection, but do not suffer from the failings described above, because all of the internet traffic of a single internet user is monitored, and not only a single user's activity at a single site. Therefore, for a single user, data can be collected indicative of usage of all sites while maintaining excellent data integrity and completeness. Different from client-side systems, systems and methods in accordance with the present invention do not demand significant computing resources, nor require an expensive customer service center. Furthermore, when websites change the formats of their webpages, only the data resident on the proxy servers in the domain of the present invention need be updated, which can dramatically reduce costs. As a result of one or more of the advantageous features of the present invention, many or all of the problems with prior client-side systems are eliminated.
  • [0028]
    Throughout the present application, an understanding of the use and function of general purpose computing devices, including what have come to be referred to as “personal computers” (“PC”), is assumed, as those of ordinary skill in the art are very skilled in their use and function. Furthermore, an understanding of the use and function of commercially available operating systems which control some of the functions of general purpose computing devices, as well as with commercially available application software such as Netscape® Navigator® (Netscape Communications Corp., Mountain View, Calif.; http://www.netscape.com), Microsoft® Internet Explorer® (Microsoft Corp., Redmond, Wash.; http://www.microsoft.com), and proxy server application software, is assumed. Throughout the present application, a natural person who uses a computer is referred to as a “user” or a “consumer”.
  • [0029]
    FIG. 1 illustrates a prior network configuration 10 over which a consumer is able to retrieve data and information, and send data and information, for a number of purposes. Configuration 10 includes a PC 12 which is in communication, either wired or wireless, with data input elements such as a keyboard and pointing device 14. PC 12 includes appropriate communications hardware and volatile and non-volatile memory elements (not illustrated) in or on which are stored an operating system and application software which allow a user to send and receive data, and to present that data in a form which is understandable to the user. Such software includes application software commonly referred to as a “browser”, such as Netscape and Internet Explorer.
  • [0030]
    PC 12 is connected to a wired or wireless communications line 16 which is connected to a computer or computing device 18. Computer 18 is preferably a general purpose computer which includes application software which controls the computer to function as a data server, and which is usually remote from PC 12. Computer 18, or its owner, can be an “internet server provider” (“ISP”), for which line 16 includes telephone, coaxial cable, or similar links between PC 16 and computer 18, as will be readily appreciated by one of ordinary skill in the art. Computer 18 can also be located on a private network, e.g., a local area network or LAN, and includes application software controlling computer 18 to function at least as a firewall, proxy server, or both.
  • [0031]
    Computer 18 is connected to what is commonly referred to as the World Wide Web or the Internet (together “WWW”, not illustrated) through a communications line 20. As will be readily appreciated by one of ordinary skill in the art, FIG. 1 presents a very simple representation of the WWW, which is much more distributed than is illustrated in FIG. 1. Also in communication with the WWW are a plurality (only three are illustrated) of content data servers 22, 24, 26, (i.e., in the language of the WWW, websites), which have stored therein data or information 28, 30, 32, (e.g., webpages) respectively.
  • [0032]
    A brief discussion of some of the differences between an “intranet” and the “Internet” (which includes the World Wide Web) will be beneficial. The Internet, sometimes called simply “the Net,” is a worldwide system of computer networks—a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANet. The original aim was to create a network that would allow users of a research computer at one university to be able to “talk to” research computers at other universities. A side benefit of ARPANet's design was that, because messages could be routed or rerouted in more than one direction, the network could continue to function even if parts of it were destroyed in the event of a military attack or other disaster.
  • [0033]
    Today, the Internet is a public, cooperative, and self-sustaining facility accessible to hundreds of millions of people worldwide. Physically, the Internet uses a portion of the total resources of the currently existing public telecommunication networks. Technically, what distinguishes the Internet is its use of a set of protocols called TCP/IP (Transmission Control Protocol/Internet Protocol). Two recent adaptations of Internet technology, the intranet and the extranet, also make use of the TCP/IP protocol.
  • [0034]
    When a person or organization has a computer connected to the public portion of the Internet, the computer is assigned an internet protocol (IP) address which uniquely identifies that computer. Typically, however, the computer is assigned a set of addresses at a certain class level (A, B, C, etc.), and all of the addresses within that set are routed to that computer. If that computer is a proxy server (see discussion below) for a private network of computers, then each of the computers within the private network can be assigned a unique IP address in the set assigned to the proxy server. Thus, the computers assigned IP addresses within the set define an “intranet”, because the IP addresses are all within the address set assigned to the proxy server.
  • [0035]
    The most widely used part of the Internet is the World Wide Web (often called “the Web”). Its outstanding feature is hypertext, a method of instant cross-referencing. In most Web sites, certain words or phrases appear in text of a different color than the rest; often this text is also underlined. When you select one of these words or phrases, you will be transferred to the site or page that is relevant to this word or phrase. Sometimes there are buttons, images, or portions of images that are “clickable.” If you move the pointer over a spot on a Web site and the pointer changes into a hand, this indicates that you can click and be transferred to another site. Using the Web, you have access to millions of pages of information. Web “surfing” is done with a Web browser, the most popular of which are Netscape Navigator and Microsoft Internet Explorer.
  • [0036]
    In an enterprise that uses the Internet, a proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion. A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user.
  • [0037]
    To the user, the proxy server is invisible; all Internet requests and returned responses appear to be directly with the addressed Internet server. (The proxy is not quite invisible; its IP address has to be specified as a configuration option to the browser or other protocol program.) An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. In fact, there are special servers called cache servers. A proxy can also do logging. The functions of proxy, firewall, and caching can be in separate server programs or combined in a single package. Different server programs can be in different computers. For example, a proxy server may be in the same machine with a firewall server or it may be on a separate server and forward requests through the firewall.
  • [0038]
    Thus, requests for data from one computer to another computer within the same assigned set of IP addresses are considered secure, because the request and the data sent in reply do not get passed to any computer not assigned an IP address within the set. When a request for data is addressed to a computer not within the set of IP addresses, the request must pass to computers which are assigned IP addresses not within the set assigned to the same person or entity, and are therefore considered insecure. This latter insecure request for data passes over the Internet, because it is passed to computers with IP addresses not in the same assigned set as the originating computer.
  • [0039]
    While the function of the system illustrated in FIG. 1 is well known to those of ordinary skill in the art, a brief summary will assist in a better understanding of the present invention. When a consumer using PC 12 wants to retrieve data (e.g., a webpage) from a website on the WWW, the user utilizes the application software on PC 12 to be assigned an. internet protocol (IP) address (including a classless interdomain routing, CIDR, address), i.e., to open a connection to the WWW. The user then launches and uses the browser software to request data from a specified machine, such as server 22 on the WWw, by entering the uniform resource locator (URL) designation for the machine, and preferably the specific data file on that machine, such as data 28. The data representing this request for data is communicated to computer 18, which processes the request data to be sent out onto the WWW, typically in the form of multiple data packets, including the IP address for computer 12.
  • [0040]
    As will be readily appreciated by one of ordinary skill in the art, servers 22, 24, or 26 usually are not directly connected to computer 18, and each data packet can take a different route from computer 18 to server 22. Upon being communicated to server 22, each packet is reassembled with the other packets to reconstruct the original data request from the user. Server 22 then retrieves data 28, and processes the data for the return trip across the WWW to the user's computer 12, typically in the same manner as the user's data request. The browser software running on computer 12 then reassembles the data packets to reconstruct data 28, and presents it to the user in a particular, usually an understandable, form, and can be either static or dynamic, i.e., can itself include instructions for controlling computer 12. For example, data 28 can include software instructions, such as instructions scripted in Java™ (Sun Microsystems, Inc., Palo Alto, Calif.; http://www.javasoft.com) which are executed on the computer 12.
  • [0041]
    Thus, when a consumer using computer 12 wants to place an order for a product or service which is offered through a merchant using server 22 on the WWW, the user requests a particular data file 28 from the server 22. The data file 28 oftentimes includes data that results in a form being generated by computer 12 and displayed to the user. The user then enters information into the form using keyboard 14, and sends the filled-out form back to server 22, including data representing what the user would like to buy, and payment information, such as credit card information. Such systems and processes are well known; see, e.g., U.S. Pat. No. 5,715,399, issued to Bezos, “Secure Method and System for Communicating a List of Credit Card Numbers Over a Non-Secure Network”, assigned to Amazon.com, which is incorporated by reference herein in its entirety.
  • [0042]
    FIG. 2 schematically illustrates an exemplary system 100 in accordance with the present invention. For purposes of brevity, individual elements included in system 100 which have been described above with reference to FIG. 1 will not be described further. System 100 includes a domain 102, which includes one or more computers and associated hardware, firnware, and software which together function as a domain on the WWW. In general, domain 102 is operatively in the path between PC 12 (and computer 18) and all other machines on the WWW, so that all of the data that is sent to and from PC 12 is routed through domain 102. As schematically illustrated in FIG. 2, however, domain 102 is on the public (WWW) side of computer 18, and is therefore not necessarily in direct communication with either computer 18 or any of servers 22, 24, 26.
  • [0043]
    Domain 102 includes at least one, and preferably a plurality of machines 102 X, each with associated hardware, firmware, and software as discussed above. As will be readily appreciated by one of ordinary skill in the art, each machine 102 X(X ε[1,N], wherein N is any positive integer) has a unique IP address within domain 102, and therefore can be located together or distributed throughout the WWW.
  • [0044]
    FIG. 3 schematically illustrates an exemplary embodiment of a configuration of domain 102. Domain 102 includes at least one, and preferably numerous (only three are illustrated) proxy servers 104, 106, 108, and at least one, and preferably numerous (only three are illustrated) data servers 110, 112, 114, which are in communication with the proxy servers. For example, data servers 110, 112, 114 can be Structured Query Language (SQL) servers. Proxy servers 104, 106, 108 include proxy server application software which allow pc 12 to route requests for data through domain 102. PC 12 is therefore aliased within domain 102, which requires all of the data which is sent from PC 12 onto the WWW and all of the data from the WWW which is intended for PC 12 to be copied, processed as by a filter 116, and stored within domain 102 on data servers 110, 112, 114. Thus, a complete copy of all data addressed for PC 12 is copied within domain 102, and is filtered. Filter 116 can be constructed to retain all of the data, or to retain portions of the data in servers 110, 112, 114.
  • [0045]
    Thus, when machines such as servers 22, 24, and 26 on the WWW receive data from PC 12, because it has been routed through domain 102 and readdressed with an IP address within domain 102, data sent by server 22 (for example) which was requested by the user of PC 12 is addressed to the internet user “in care of” domain 102. Proxy server 104 (for example) receives data 28 from server 22, readdresses the data to the PC 12 based on an unique identifier (see below) at the IP address assigned (either statically or dynamically) to the PC 12, and transmits the readdressed data 28 back into the WWW. As will be readily appreciated by one of ordinary skill in the art, data 28 is then collected by server 18, and transmitted to PC 12, as discussed above. Importantly, domain 102 is not an ISP or proxy server gateway from a private network. Domain 102 is another domain on the WWW through which consumer/PC-specific data is routed, and includes a proxy server gateway onto the public WWW network. According to less preferred embodiments, domain 102 is an ISP to which computer 12 directly connects, i.e., includes computer 18.
  • [0046]
    Because each computer 12 can be dynamically assigned an IP address by computer 18, domain 102 must first be provided with unique identifying information about computer 12 to differentiate it from other computers which are similarly proxied through domain 102. This information may be identifying information provided by a component (either software or hardware) of computer 12, such as by a “cookie” returned to domain 102, a “digital certificate” returned to domain 102, CPU chip identifying information (as has recently been commercially available in Pentium® III class chips from Intel Corp., Santa Clara, Calif.; http://www.intel.com), or other unique identifying information as will be readily apparent to one of ordinary skill in the art.
  • [0047]
    In a preferred embodiment of the present invention, identifying information or data can be included in each data packet, preferably in the header portion of each packet, so that each packet uniquely identifies each PC 12 from which it originated. By way of example and not of limitation, one or more fields in the packet header, such as the “language” field, can include unique identifying information. Changing the value that is contained in any particular field of a packet header to include such identifying information will be readily appreciated by one of ordinary skill in the art. Again by way of example and not of limitation, the language field value, for example, can be changed so that it is, or includes in addition to a language code, a unique identifier. This change in the language field, for example, can be readily achieved by changing the browser's preferences to include the unique identifier, which can be performed manually through the application tools provided with the browser. Alternatively, this change can be achieved by executing a series of logical instructions, as embodied in software, on PC 12, as will be readily apparent to one of ordinary skill in the art. Any other field in a packet header can be used instead of or in addition to the language field within the spirit and scope of the present invention.
  • [0048]
    According to yet another aspect of the present invention, secure internet transfer protocols can be used between an internet consumer and an internet content provider while still monitoring and collecting data about the user's internet activities. As readily appreciated by one of ordinary skill in the art, when an internet consumer initially requests a secure webpage, the consumer is sent an encryption key to enable encryption and decryption of webpages sent respectively to and from that website. Thus, other machines on the internet are unable (in theory) to interpret the data passing between the internet consumer and the website when in a secure mode.
  • [0049]
    Systems in accordance with the present invention accommodate secure/encrypted communications while still monitoring internet usage and enabling data collection, as diagrammatically illustrated in FIG. 5. For example, a proxy server of domain 102 can include two servers: proxy server 106 for transferring encrypted data to and from computer 12, and proxy server 108 for transferring encrypted data to and from server 22 (for example). As will be readily apparent to one of ordinary skill in the art, servers 106 and 108 may be the same proxy server functioning as described above. Thus, when domain 102 receives a request for an encrypted webpage from computer 12 (step 250), server 106 can negotiate and pass its own encryption key to computer 12 (step 252), thus initiating a secure session with computer 12. The original request from computer 12 bearing the unique identifier for the consumer on domain 102 (step 254) is passed back into the internet by server 108 to be received by computer 22 (step 256). Computer 22 and server 108 negotiate an encryption key for the data 28, and the encryption key is passed back to server 108, bearing the consumer's unique identifier in domain 102 (step 258).
  • [0050]
    When encrypted data 28 is sent by computer 22 and received by server 108 (step 260), server 108 decodes the data using its encryption key (step 262). Server 108 passes the decoded data to server 106, which readdresses the data for delivery to computer 12 at its IP address from computer 18 and encrypts the data using the encryption key held by server 106 (step 264). Thus, proxy server 106 securely transfers data to and from computer 12, proxy server 108 securely transfers data to and from computer 22 for the consumer, and servers 106 and 108 exchange the decoded data. In a preferred embodiment of the present invention, servers 106 and 108 are the same server which performs the operations and functions described above. According to a less preferred embodiment, yet still within the spirit and scope of the present invention, servers 106 and 108 are different servers which separately perform the operations and functions described above.
  • [0051]
    The present invention also relates to methods of collecting data about computer user habits, preferences, uses, and the like, and methods of using this data. While system 100 is preferably used to perform the methods of the present invention, one of ordinary skill in the art will readily appreciate that other systems can by used without departing from the spirit and scope of the present invention. FIG. 4 diagrammatically illustrates a flowchart of steps of methods in accordance with the present invention.
  • [0052]
    As discussed above, data representative of internet consumers' behavior, including (but not exclusively) what choices the consumer makes, why particular characteristics of a product or service are important, what products or services a consumer has considered and decides not to purchase, and how much money a consumer is willing to pay and has paid for a product or service, can be a valuable product in itself. As will be readily appreciated by one of ordinary skill in the art, the quality of the data, e.g., statistical significance and error, greatly impacts how valuable the data is to a party wanting to know about a particular consumer's habits.
  • [0053]
    Methods in accordance with the present invention collect and generate data which is extremely complete for an individual user, and therefore can be very useful by itself or when correlated with other data about that user, or other consumers that share characteristics with the user. Furthermore, because the methods of the present invention do not rely on client-side data collection, but instead utilize server-side data collection, the impact on the performance of the individual consumer's computer 12 is minimal, and does not require repeated software updating as with prior systems which were resident on a computer 12.
  • [0054]
    Initially, an internet consumer must be registered so that the consumer's computer can be uniquely identified (step 200). To encourage consumers to participate in the monitoring activity, incentives may be offered to the consumer in exchange for routing all of that consumer's internet data so that it can be monitored. As will be readily appreciated by one of ordinary skill in the art, the exact nature of the compensation can vary, and can include money, gifts, and the like. Additionally or alternatively, the compensation can be in the form of faster internet access to the consumer. For example, when using system 100 described above, data can be delivered to computer 12 in compressed form from domain 102. Because of the decrease in required bandwidth required for transmitting compressed data, the consumer experiences an overall increase in data transfer rates between domain 102 and computer 12, even when factoring in decompression of the data by computer 12. Thus, the retransmission of compressed data can be an incentive for the internet consumer to agree to proxy all of their internet data through domain 102.
  • [0055]
    Commercially available browser software, such as Navigator® and Internet Explorer®, include decompression software which can be configured to automatically decompress compressed data upon receipt by PC 12. Thus, according to a preferred embodiment of the present invention, domain 102 compresses data to be sent to PC 12, resulting in faster net times between the PC requesting data and that data being delivered to the PC. By way of example and not of limitation, domain 102 can include a set of logical instructions, e.g, software, which compresses data according to a known compression routine, e.g., the Gzip compression routine. As the browser software running on PC 12 can both recognize and decompress Gzip compressed data, the internet consumer receives the benefit of faster net data transmission without the need to intervene in the process of decompressing the data with a separate decompression application or tool. The particular compression protocol used to compress and decompress the data can be any of the numerous known data compression protocols, such a “zip”, “uuencode”, “tar”, “lzh”, “MIME”, “ARC”, “Binhex”, “sit”, “hqx”, etc., within the spirit and scope of the present invention, the protocol being selected so that the browser application running on PC 12 includes logic to automatically decompress data which has been compressed according to that algorithm.
  • [0056]
    Also by way of example, domain 102 can perform proxy caching, including hierarchical caching, of webpages and entire websites of predetermined interest. Thus, when a consumer requests a webpage which has been cached in domain 102, the data is served to the consumer much faster than if an original copy of the requested webpage were requested and passed through to the consumer. As data compression and proxy caching are well appreciated by one of ordinary skill in the art, further discussion of these types of compensation will not be described herein.
  • [0057]
    Of course, the decision to participate, i.e., to contract with the service provider, is entirely voluntary, and some consumers may elect not to participate. Those who do choose to participate supply the service provider with information about themselves; the exact data can vary, and could include demographic, socio-economic, geographic, and any other information commonly collected in market research studies. Such information can include, but is not limited to user age, user income level, user education level, household size, time of transmission of the data set, location of computing device, date of transmission of the data set, currency paid, type of product purchased, type of service purchased, network address of the intended recipient of a data set, click-through address, banner advertisement impression, and permission e-mail received, and combinations thereof.
  • [0058]
    Furthermore, the consumer is provided with a small application software applet which adjusts the browser application running on the consumer's computer so that it proxies to the service provider's proxy server, i.e., so that it redirects all of the consumer's outbound data to the domain 102. If the service provider is utilizing system 100, described above, the applet will reset the browser to proxy to domain 102. Publicly available browsers are provided with the ability to do this “reset” operation. The applet can be directly downloaded, shipped via a diskette, CD-ROM, or the like, or manually installed or modified by a technician who visits the consumer (step 202).
  • [0059]
    A database record is built based on the data set supplied by the consumer (step 204). A unique identifier is assigned to the consumer (step 206). Thereafter, as described above, all of the consumer's internet data will be routed to the service provider. The service provider can then.copy or otherwise monitor the data (step 208), and pass on the data into the internet (step 210) without impacting the overall data transfer rate from the consumer to the data's intended destination. According to one aspect of the invention, the service provider has predetermined the formats of the webpages for a set of domains, websites, and/or webpages that are of interest to the service provider. Thus, internet traffic directed to or coming from these destinations/sources is monitored, and the data of interest filtered and collected. As other websites become of interest to the service provider, for example because consumers visit their sites, the service provider retrieves a copy of the particular webpages of interest, and determines the specific data format that the webpage includes. This determination of webpage formats can be performed manually or by an automated process, as will be readily apparent to one of ordinary skill in the art. As most webpages are formatted so as to conform with publicly known, standardized data transfer protocols (e.g., http, hypertext transfer protocol) or known scripting languages (cgi, Java™), determining the data format of most webpages will be well within the skill of one skilled in the art.
  • [0060]
    When the service provider is routed a copy of a webpage from either the consumer or a website, the service provider is able to copy the data contained in the webpage. By knowing the data format used by that website in creating the webpage, the service provider is then able to extract from the data the exact information detailing what sort of internet transaction the consumer has just engaged in. Notably, however, the service provider does not impede the transaction, but merely extracts the data about the transaction, and passes the data on to the intended recipient. The extracted data is then filtered for data elements of interest to the service provider, such as the date and time of the transaction, URL of a click-through (e.g., on a banner ad), amount of money spent, type and number of items bought, delivery method, and so on (step 212). The data record for that particular consumer is then updated with the information (step 214). As will be readily appreciated by one of ordinary skill in the art, when more than one consumer has her internet data routed through the service provider, the service provider can generate a database of consumer internet activity of great detail about any single consumer's habits, any class of consumers differentiated based on any common characteristic in the database, any single domain, website, or webpage, and/or any class of domains, websites, or webpages which share a common characteristic in the database.
  • [0061]
    The foregoing description also applies to “push” and “broadcast” internet technologies which operate on the same principle of the internet consumer requesting data and the content server delivering data to the internet consumer.
  • [0062]
    Several specific embodiments of methods in accordance with the present invention will now be described. While the following are specific embodiments of methods according to the present invention, the present invention is not limited to the specific methods described herein.
  • [0063]
    A measure or metric can be established and generated from the data collected by the service provider, such as a dollar per thousand hits on a particular webpage (“$/K metric”) (step 216). The $/K metric therefore can indicate how much money is generated or received per one thousand times the particular webpage is served to any person on the internet. The $/K metric provides a useful measure for an internet content provider and/or an internet advertiser of how to price advertising rates, or how much to pay for internet advertising, respectively, based on the cost per thousand hits (CPM) versus the revenue generated by the internet advertiser per thousand hits (RPM). Furthermore, while a single internet merchant can generate its own CPM and RPM values based on the $/K metric, that internet merchant does not have the data to compare to its competitor's CPM and RPM. Thus, the service provider practicing methods in accordance with the present invention will be able to market and sell $/K metric data to internet merchant competitors without relying on the merchants themselves for the data.
  • [0064]
    In another aspect of the invention, a log of internet activity (“weblog”) can be generated from the data collected by the service provider (step 218). The weblog can include a listing of the particular URLs visited by consumers, separate from the data indicating the consumers' transaction habits. Because the database generated can include data regarding consumer's demographics and the like, the database can be easily mined for data records having web hits on a particular website. This information is particularly valuable to that website's competitors, as it gives an indication of who is visiting the website, and what those individuals' characteristics are. Such “competitive intelligence” can be marketed and sold to a wide variety of parties, and in particular to the particular website's competitors.
  • [0065]
    In yet another aspect of the invention, an electronic commerce (“e-commerce”) or retail price index, herein termed “EPI”, can be generated from the service provider's database, based on any electronic retailer's (“e-tailer”) data, mined from the database (step 220). That is, the prices of particular products can be retrieved from the database, and the relationships between time and price can be generated to provide an indication of the true market price for an item or service, or of the condition of a market as a whole.
  • [0066]
    The service provider's database can be further analyzed or mined to extract data relating to the amount of revenue a particular website generates over a particular time period or a particular number of website hits (step 222). Based on the sample size for the particular website of interest, and therefore within a known confidence interval based on known rules of statistical analysis, the service provider will be able to provide revenue projections over a given period of time for the website well in advance of the end of any particular time period or number of internet visits. As will be readily appreciated by one of ordinary skill in the art, revenue predictions for a business are very useful tools for pricing securities for that merchant, and therefore the service provider can market and sell such revenue predictions to parties interested in knowing this information before release of the actual revenue reports by the website owner to the rest of the securities market. Furthermore, sales forecasts can be used by the internet merchant for inventory control and just-in-time warehousing and delivery.
  • [0067]
    The database can also be analyzed for data representative of the frequency a particular website is visited (step 224). For example, the data filtering performed on the raw internet data received by the service provider can include tabulating the number of times a domain, website, or webpage is served to a consumer. By comparing this number to the number of times a purchase was made, a measure of the particular consumer's purchasing propensity can be generated, as well as the average amount spent per visit and per transaction. These measures can be marketed to e-tailers, or provided back to the consumer. Similarly, by retrieving from the database transactions at a single website across the database, cross-selling success can be measured (step 226). For example, for an e-tailer that sells products A and B, the database can be mined for transactions between the particular e-tailer and consumers for product A, and the e-tailer's success in also selling product B to that same consumer set can be extracted. Thus, the success of the e-tailer to cross-sell products A and B can be readily extracted, and that information can be marketed and sold to competing e-tailers.
  • [0068]
    More traditional market research data can also be easily mined from the service provider's database of internet consumer activity. For example, a particular e-tailer's total market share in a particular class of goods or services can be determined by extracting data of all transactions in that class attributable to the particular e-tailer, as well as all transactions for goods or services in the class. Similarly, for a particular consumer, the loyalty or share of the consumer's spending (“wallet”) spent at a particular e-tailer or for a particular product type can be easily extracted. The percentage of the entire consumer sample pool who visited or bought goods or services a specified number of times from a particular site can be determined, which represent the trial and repeat rates for both visiting and purchasing.
  • [0069]
    Profiling or generating scoring models can also be facilitated by the service provider practicing methods in accordance with still another aspect of the present invention. For example, the database can be used to provide data records for a particular consumer characteristic, such as education level (step 228). This data set can be compared to broad demographic data sets including indicators of education level, to predict the overall probability of a certain internet activity, such as buying a product or viewing a video, by persons at that education level for the entire population represented by the broad demographic data set (step 230). Other comparisons of the service provider's database to other databases will be readily appreciated by one of ordinary skill in the art, to generate profiling data on a certain population's internet activities.
  • [0070]
    The present invention provides numerous advantages over prior server-side and client-side systems. Because of the particular systems and processes of the present invention, statistically significant consumer data can be gathered at extremely low costs per panelist when compared with prior systems.
  • [0071]
    While the invention has been described in detail with reference to preferred embodiments thereof, it will be apparent to one skilled in the art that various changes can be made, and equivalents employed, without departing from the scope of the invention.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US31951 *Apr 9, 1861 burlingame
US4355372 *Dec 24, 1980Oct 19, 1982Npd Research Inc.Market survey data collection method
US4603232 *Sep 24, 1984Jul 29, 1986Npd Research, Inc.Rapid market survey collection and dissemination method
US4954699 *Apr 13, 1988Sep 4, 1990Npd Research, Inc.Self-administered survey questionnaire and method
US4958284 *Dec 6, 1988Sep 18, 1990Npd Group, Inc.Open ended question analysis system and method
US5023929 *Sep 15, 1988Jun 11, 1991Npd Research, Inc.Audio frequency based market survey method
US5060140 *Jan 16, 1986Oct 22, 1991Jupiter Technology Inc.Universal programmable data communication connection system
US5481294 *Oct 27, 1993Jan 2, 1996A. C. Nielsen CompanyAudience measurement system utilizing ancillary codes and passive signatures
US5488408 *Mar 22, 1994Jan 30, 1996A.C. Nielsen CompanySerial data channel metering attachment for metering channels to which a receiver is tuned
US5526427 *Dec 8, 1994Jun 11, 1996A.C. Nielsen CompanyUniversal broadcast code and multi-level encoded signal monitoring system
US5550928 *Dec 15, 1992Aug 27, 1996A.C. Nielsen CompanyAudience measurement system and method
US5557686 *Jan 13, 1993Sep 17, 1996University Of AlabamaMethod and apparatus for verification of a computer user's identification, based on keystroke characteristics
US5584050 *Oct 7, 1994Dec 10, 1996A.C. Nielsen CompanyProgram monitoring system
US5594934 *Sep 21, 1994Jan 14, 1997A.C. Nielsen CompanyReal time correlation meter
US5659469 *Apr 27, 1995Aug 19, 1997Credit Verification CorporationCheck transaction processing, database building and marketing method and system utilizing automatic check reading
US5675510 *Jun 7, 1995Oct 7, 1997Pc Meter L.P.Computer use meter and analyzer
US5710887 *Aug 29, 1995Jan 20, 1998BroadvisionComputer system and method for electronic commerce
US5715399 *May 30, 1995Feb 3, 1998Amazon.Com, Inc.Secure method and system for communicating a list of credit card numbers over a non-secure network
US5737025 *Feb 28, 1995Apr 7, 1998Nielsen Media Research, Inc.Co-channel transmission of program signals and ancillary signals
US5737026 *Jun 7, 1995Apr 7, 1998Nielsen Media Research, Inc.Video and data co-channel communication system
US5751450 *May 22, 1996May 12, 1998Medar, Inc.Method and system for measuring color difference
US5771307 *Dec 21, 1995Jun 23, 1998Nielsen Media Research, Inc.Audience measurement system and method
US5781913 *Jun 18, 1996Jul 14, 1998Felsenstein; LeeWearable hypermedium system
US5850249 *Oct 12, 1995Dec 15, 1998Nielsen Media Research, Inc.Receiver monitoring system with local encoding
US5862325 *Sep 27, 1996Jan 19, 1999Intermind CorporationComputer-based communication system and method using metadata defining a control structure
US5870546 *Dec 23, 1997Feb 9, 1999Infoseek CorporationMethod and apparatus for redirection of server external hyper-link reference
US5872850 *Mar 31, 1997Feb 16, 1999Microsoft CorporationSystem for enabling information marketplace
US5887140 *Mar 26, 1996Mar 23, 1999Kabushiki Kaisha ToshibaComputer network system and personal identification system adapted for use in the same
US5889548 *May 28, 1996Mar 30, 1999Nielsen Media Research, Inc.Television receiver use metering with separate program and sync detectors
US5897616 *Jun 11, 1997Apr 27, 1999International Business Machines CorporationApparatus and methods for speaker verification/identification/classification employing non-acoustic and/or acoustic models and databases
US5918014 *Dec 26, 1996Jun 29, 1999Athenium, L.L.C.Automated collaborative filtering in world wide web advertising
US5961593 *Jan 22, 1997Oct 5, 1999Lucent Technologies, Inc.System and method for providing anonymous personalized browsing by a proxy system in a network
US5970469 *Mar 26, 1996Oct 19, 1999Supermarkets Online, Inc.System and method for providing shopping aids and incentives to customers through a computer network
US5991735 *Aug 11, 1998Nov 23, 1999Be Free, Inc.Computer program apparatus for determining behavioral profile of a computer user
US6006197 *Apr 20, 1998Dec 21, 1999Straightup Software, Inc.System and method for assessing effectiveness of internet marketing campaign
US6018619 *May 24, 1996Jan 25, 2000Microsoft CorporationMethod, system and apparatus for client-side usage tracking of information server systems
US6026368 *Jul 17, 1995Feb 15, 200024/7 Media, Inc.On-line interactive system and method for providing content and advertising information to a targeted set of viewers
US6049821 *Jan 24, 1997Apr 11, 2000Motorola, Inc.Proxy host computer and method for accessing and retrieving information between a browser and a proxy
US6052730 *Jan 9, 1998Apr 18, 2000The Board Of Trustees Of The Leland Stanford Junior UniversityMethod for monitoring and/or modifying web browsing sessions
US6058381 *Oct 30, 1997May 2, 2000Nelson; Theodor HolmMany-to-many payments system for network content materials
US6070145 *Jul 12, 1996May 30, 2000The Npd Group, Inc.Respondent selection method for network-based survey
US6081900 *Mar 16, 1999Jun 27, 2000Novell, Inc.Secure intranet access
US6115680 *Jun 7, 1996Sep 5, 2000Media Metrix, Inc.Computer use meter and analyzer
US6128624 *Nov 12, 1997Oct 3, 2000Ncr CorporationCollection and integration of internet and electronic commerce data in a database during web browsing
US6138162 *Feb 11, 1997Oct 24, 2000Pointcast, Inc.Method and apparatus for configuring a client to redirect requests to a caching proxy server based on a category ID with the request
US6151593 *Apr 14, 1998Nov 21, 2000Postech FoundationApparatus for authenticating an individual based on a typing pattern by using a neural network system
US6256664 *Mar 19, 1999Jul 3, 2001Bigfix, Inc.Method and apparatus for computed relevance messaging
US6263371 *Jun 10, 1999Jul 17, 2001Cacheflow, Inc.Method and apparatus for seaming of streaming content
US6286046 *Dec 22, 1997Sep 4, 2001International Business Machines CorporationMethod of recording and measuring e-business sessions on the world wide web
US6381632 *Sep 10, 1996Apr 30, 2002Youpowered, Inc.Method and apparatus for tracking network usage
US6389403 *Sep 17, 1999May 14, 2002International Business Machines CorporationMethod and apparatus for uniquely identifying a customer purchase in an electronic distribution system
US6421724 *Aug 30, 1999Jul 16, 2002Opinionlab, Inc.Web site response measurement tool
US6421733 *Sep 8, 1997Jul 16, 2002Intel CorporationSystem for dynamically transcoding data transmitted between computers
US6567854 *Oct 21, 1999May 20, 2003Genuity Inc.Internet service delivery via server pushed personalized advertising dashboard
US6567857 *Jul 29, 1999May 20, 2003Sun Microsystems, Inc.Method and apparatus for dynamic proxy insertion in network traffic flow
US6606581 *Jun 14, 2000Aug 12, 2003Opinionlab, Inc.System and method for measuring and reporting user reactions to particular web pages of a website
US6684194 *Dec 2, 1999Jan 27, 2004Expanse Network, Inc.Subscriber identification system
US6694431 *Oct 12, 1999Feb 17, 2004International Business Machines CorporationPiggy-backed key exchange protocol for providing secure, low-overhead browser connections when a server will not use a message encoding scheme proposed by a client
US6704787 *Dec 3, 1999Mar 9, 2004Intercard Payments, Inc.Date of birth authentication system and method using demographic and/or geographic data supplied by a subscriber that is verified by a third party
US6839680 *Sep 30, 1999Jan 4, 2005Fujitsu LimitedInternet profiling
US6856963 *Jan 11, 2000Feb 15, 2005Intel CorporationFacilitating electronic commerce through automated data-based reputation characterization
US6883032 *Feb 2, 2000Apr 19, 2005Lucent Technologies Inc.Method and system for collecting data on the internet
US7039599 *Jun 15, 1998May 2, 2006Doubleclick Inc.Method and apparatus for automatic placement of advertising
US7080077 *Feb 26, 2001Jul 18, 2006Oracle International CorporationLocalized access
US7146505 *Jun 1, 1999Dec 5, 2006America Online, Inc.Secure data exchange between date processing systems
US7243129 *Sep 30, 2000Jul 10, 2007Worldwide Creative Techniques, Inc.Method and apparatus for customization of information content provided to a requestor over a network using anonymous demographic data stored on a demographic server
US20010014868 *Jul 22, 1998Aug 16, 2001Frederick HerzSystem for the automatic determination of customized prices and promotions
US20010014915 *Feb 22, 2001Aug 16, 2001Nielsen Media Research, Inc.Metering of internet content using a control
US20010020242 *Nov 16, 1998Sep 6, 2001Amit GuptaMethod and apparatus for processing client information
US20020069368 *Dec 6, 2000Jun 6, 2002Keith HinesData farming of network access
US20020077903 *Jul 2, 2001Jun 20, 2002Daniel FeldmanOn-line method and apparatus for collecting demographic information about a user of a world-wide-web site and dynamically selecting questions to present to the user
US20020099605 *Oct 1, 2001Jul 25, 2002Searchcactus, LlcSearch engine with demographic-based advertising
US20020116266 *Jan 14, 2002Aug 22, 2002Thaddeus MarshallMethod and system for tracking and providing incentives for time and attention of persons and for timing of performance of tasks
US20020124074 *Jan 13, 1998Sep 5, 2002Jeffrey C. LevyMonitoring of remote data access on a public computer network
US20020128803 *May 10, 2002Sep 12, 2002Skinner Gary R.Time and activity tracker
US20020178257 *Apr 5, 2002Nov 28, 2002Predictive Networks, Inc.Method and apparatus for identifying unique client users from user behavioral data
US20030009762 *Feb 12, 2001Jan 9, 2003Hooper Mark EdmundMethod and apparatus for the display of selected images at selected times using an autonomous distribution system
US20030018778 *Jan 25, 2002Jan 23, 2003Martin Anthony G.System, method and computer program product for collecting information about a network user
US20030033432 *Aug 8, 2001Feb 13, 2003Simpson Shell S.Web based imaging service that converts web pages into content on behalf of another web site
US20030065595 *Oct 2, 2001Apr 3, 2003Anglum Timothy J.Customer identification system & method
US20030076305 *Oct 22, 2001Apr 24, 2003Allen Stephen D.Keystroke recording device with integral time and date function
US20030083938 *Oct 29, 2001May 1, 2003Ncr CorporationSystem and method for profiling different users having a common computer identifier
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US7660862Feb 9, 2010Cvon Innovations LimitedApparatus and method of tracking access status of store-and-forward messages
US7702738Mar 14, 2008Apr 20, 2010Cvon Innovations LimitedApparatus and method of selecting a recipient of a message on the basis of data identifying access to previously transmitted messages
US7953791Apr 10, 2008May 31, 2011The Nielsen Company (Us), Llc.Network resource monitoring and measurement system and method
US8266031Sep 11, 2012Visa U.S.A.Systems and methods to provide benefits of account features to account holders
US8359274Jun 2, 2011Jan 22, 2013Visa International Service AssociationSystems and methods to provide messages in real-time with transaction processing
US8406792Aug 2, 2007Mar 26, 2013Apple Inc.Message modification system and method
US8407148Mar 26, 2013Visa U.S.A. Inc.Systems and methods to provide messages in real-time with transaction processing
US8510658Aug 11, 2010Aug 13, 2013Apple Inc.Population segmentation
US8595058Aug 3, 2010Nov 26, 2013Visa U.S.A.Systems and methods to match identifiers
US8606630Aug 30, 2011Dec 10, 2013Visa U.S.A. Inc.Systems and methods to deliver targeted advertisements to audience
US8607295Dec 30, 2011Dec 10, 2013Symphony Advanced MediaMedia content synchronized advertising platform methods
US8626579Aug 30, 2011Jan 7, 2014Visa U.S.A. Inc.Systems and methods for closing the loop between online activities and offline purchases
US8626705Jul 8, 2010Jan 7, 2014Visa International Service AssociationTransaction aggregator for closed processing
US8631473Dec 30, 2011Jan 14, 2014Symphony Advanced MediaSocial content monitoring platform apparatuses and systems
US8635674Dec 30, 2011Jan 21, 2014Symphony Advanced MediaSocial content monitoring platform methods
US8639567Mar 17, 2011Jan 28, 2014Visa U.S.A. Inc.Systems and methods to identify differences in spending patterns
US8650587Dec 30, 2011Feb 11, 2014Symphony Advanced MediaMobile content tracking platform apparatuses and systems
US8667520Dec 30, 2011Mar 4, 2014Symphony Advanced MediaMobile content tracking platform methods
US8676639May 12, 2010Mar 18, 2014Visa International Service AssociationSystem and method for promotion processing and authorization
US8676682Jun 11, 2008Mar 18, 2014Apple Inc.Method and a system for delivering messages
US8738418Mar 17, 2011May 27, 2014Visa U.S.A. Inc.Systems and methods to enhance search data with transaction based data
US8744906Aug 30, 2011Jun 3, 2014Visa U.S.A. Inc.Systems and methods for targeted advertisement delivery
US8781896Jun 28, 2011Jul 15, 2014Visa International Service AssociationSystems and methods to optimize media presentations
US8788337Jun 10, 2013Jul 22, 2014Visa International Service AssociationSystems and methods to optimize media presentations
US8799123Apr 28, 2011Aug 5, 2014Apple Inc.Method and a system for delivering messages
US8843391Oct 19, 2011Sep 23, 2014Visa U.S.A. Inc.Systems and methods to match identifiers
US8935718Apr 1, 2008Jan 13, 2015Apple Inc.Advertising management method and system
US8949342Mar 14, 2008Feb 3, 2015Apple Inc.Messaging system
US8955001Dec 30, 2011Feb 10, 2015Symphony Advanced MediaMobile remote media control platform apparatuses and methods
US8978086Dec 30, 2011Mar 10, 2015Symphony Advanced MediaMedia content based advertising survey platform apparatuses and systems
US9031860Oct 7, 2010May 12, 2015Visa U.S.A. Inc.Systems and methods to aggregate demand
US9185435Jun 24, 2014Nov 10, 2015The Nielsen Company (Us), LlcMethods and apparatus to characterize households with media meter data
US9237377Dec 30, 2011Jan 12, 2016Symphony Advanced MediaMedia content synchronized advertising platform apparatuses and systems
US9264764Dec 30, 2011Feb 16, 2016Manish BhatiaMedia content based advertising survey platform methods
US9277265Feb 10, 2015Mar 1, 2016The Nielsen Company (Us), LlcMethods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability
US9324088Feb 25, 2013Apr 26, 2016Visa International Service AssociationSystems and methods to provide messages in real-time with transaction processing
US9342835Aug 3, 2010May 17, 2016Visa U.S.ASystems and methods to deliver targeted advertisements to audience
US20080082617 *Aug 1, 2007Apr 3, 2008Cvon Innovations Ltd.Messaging system
US20080235341 *Mar 14, 2008Sep 25, 2008Cvon Innovations Ltd.Messaging system
US20080256235 *Apr 10, 2008Oct 16, 2008Lim Or SimNetwork resource monitoring and measurement system and method
US20080312948 *Jun 11, 2008Dec 18, 2008Cvon Innovations LimitedMethod and a system for delivering messages
US20100251270 *Mar 24, 2010Sep 30, 2010Comscore, Inc.Selective Mobile Metering
US20110202408 *Aug 18, 2011Cvon Innovations Ltd.Method and a system for delivering messages
US20130006705 *Jan 3, 2013Bank Of AmericaSmall business intelligence tool
WO2011073568A1Dec 14, 2010Jun 23, 2011France TelecomMeasure of activity between a client and a server site
Classifications
U.S. Classification1/1, 707/999.01
International ClassificationG06Q30/02, G06Q10/06, H04L29/08, G06F17/30
Cooperative ClassificationY10S707/99931, G06Q30/0236, G06Q30/0205, G06Q30/0204, G06Q30/0239, G06Q10/06375, G06Q30/02, G06Q30/0203, G06Q30/0277, H04L67/22, H04L69/329
European ClassificationG06Q30/02, G06Q30/0204, G06Q30/0277, G06Q30/0203, G06Q10/06375, G06Q30/0205, G06Q30/0239, G06Q30/0236, H04L29/08A7, H04L29/08N21
Legal Events
DateCodeEventDescription
Apr 18, 2007ASAssignment
Owner name: COMSCORE NETWORKS, INC., VIRGINIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ABRAHAM, MAGID;FULGONI, GIAN;MILLER, BRYAN;AND OTHERS;REEL/FRAME:019178/0040;SIGNING DATES FROM 20040401 TO 20040504