throbber
PCT
`
`WORLD INTELLECTUAL PROPERTY ORGANIZATION
`International Bureau
`
`
`
`INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`(51) International Patent Classification 6 i
`G06F 17/60
`
`(11) International Publication Number:
`_
`_
`_
`(43) International Publication Date:
`
`WO 99/01834
`
`14 January 1999 (14.01.99)
`
`(21) International Application Number:
`
`PCT/US98/ 13405
`
`(81) Designated States: JP, European patent (AT, BE, CH, CY, DE,
`DK, ES, FI, FR, GB, GR, IE, IT, LU, MC, NL, PT, SE).
`
`(22) International Filing Date:
`
`30 June 1998 (30.06.98)
`
`(30) Priority Data:
`60/051,587
`09/001,778
`
`2July 1997 (02.07.97)
`31 December 1997 (31.12.97)
`
`US
`US
`
`With international search report.
`Before the expiration of the time limit for amending the
`claims and to be republished in the event of the receipt of
`amendments.
`
`Published
`
`(71) Applicant: COUEIGNOUX, Philippe, J., M.
`Blake Road, Lexington, MA 02173 (US).
`
`[FR/US]; 33
`
`(74) Agent: CAPRARO, Joseph, A.; Testa, Hurwitz & Thibeault,
`LLP, High Street Tower, 125 High Street, Boston, MA
`02110 (US).
`
`(54) Title: SYSTEM AND METHOD FOR THE SECURE DISCOVERY, EXPLOITATION AND PUBLICATION OF INFORMATION
`
`authorization for publication.
`
`5
`
`
`
`INTERFACE
`
`‘—
`
`WW II
`
`0. "1.0. n |
`PUBUC FACTS
`v
`
`(57) Abstract
`
`System and method of discovering and exploiting information such as private or confidential facts from a user, while securing the
`information from unauthorized publication include a sender having a processing module transmitting a request for publication of information
`about a user; an agent in communication with the sender receiving the request for the information, and a user in communication with the
`agent responding to prompts initiated by the agent. The prompts request the user to disclose facts relating to the information desired by the
`sender, and provide indicia relating to authorization for publication of the disclosed facts to the sender. The agent receives the facts and
`determines whether such facts are to be made available to the sender. The agent can include a memory module, and a processing module
`such as a rule engine using dialog classes, for communicating with the sender and user, determining whether the indicia of authorization
`for the facts permits publication of the facts to the sender, and publishing the facts to the sender when said indicia represents a grant of
`
`
`
`Monster Worldwide, Inc. Exhibit 1024 (p.1/74)
`
`Monster Worldwide, Inc. Exhibit 1024 (p.1/74)
`
`

`

`Zimbabwe
`
`Albania
`Armenia
`Austria
`Australia
`Azerbaijan
`Bosnia and Herzegovina
`Barbados
`Belgium
`Burkina Faso
`Bulgaria
`Benin
`Brazil
`Belarus
`Canada
`Central African Republic
`Congo
`Switzerland
`cote d’Ivoire
`Cameroon
`China
`Cuba
`Czech Republic
`Germany
`Denmark
`Estonia
`
`ES
`FI
`FR
`GA
`GB
`GE
`GH
`GN
`GR
`HU
`IE
`IL
`IS
`IT
`JP
`KE
`KG
`KP
`
`KR
`KZ
`LC
`LI
`LK
`LR
`
`Spain
`Finland
`France
`Gabon
`United Kingdom
`Georgia
`Ghana
`Guinea
`Greece
`Hungary
`Ireland
`Israel
`Iceland
`Italy
`Japan
`Kenya
`Kyrgyzstan
`Democratic People’s
`Republic of Korea
`Republic of Korea
`Kazakstan
`Saint Lucia
`Liechtenstein
`Sri Lanka
`Liberia
`
`LS
`LT
`LU
`LV
`MC
`MD
`MG
`MK
`
`ML
`MN
`MR
`MW
`MX
`NE
`NL
`NO
`NZ
`PL
`PT
`RO
`RU
`SD
`SE
`SG
`
`Lesotho
`Lithuania
`Luxembourg
`Latvia
`Monaco
`Republic of Moldova
`Madagascar
`The former Yugoslav
`Republic of Macedonia
`Mali
`Mongolia
`Mauritania
`Malawi
`Mexico
`Niger
`Netherlands
`Norway
`New Zealand
`Poland
`Portugal
`Romania
`Russian Federation
`Sudan
`Sweden
`Singapore
`
`FOR THE PURPOSES OF INFORMATION ONLY
`
`Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT.
`
`SI
`SK
`SN
`SZ
`TD
`TG
`TJ
`TM
`TR
`TT
`UA
`UG
`US
`UZ
`VN
`YU
`ZW
`
`Slovenia
`Slovakia
`Senegal
`Swaziland
`Chad
`Togo
`Tajikistan
`Turkmenistan
`Turkey
`Trinidad and Tobago
`Ukraine
`Uganda
`United States of America
`Uzbekistan
`Viet Nam
`Yugoslavia
`
`Monster Worldwide, Inc. Exhibit 1024 (p.2/74)
`
`Monster Worldwide, Inc. Exhibit 1024 (p.2/74)
`
`

`

`WO 99/01834
`
`PCT/US98/13405
`
`SYSTEM AND METHOD FOR THE SECURE DISCOVERY, EXPLOITATION
`
`AND PUBLICATION OF INFORMATION
`
`Field of the Invention
`
`The invention relates to a system and method of discovering and exploiting information
`
`such as private or confidential information from a user, while securing the information from
`
`unauthorized publication.
`
`Background of the Invention
`
`Consumer research has focused on discovering user information such as demographic,
`
`personal or identifying information and using this information to provide the user with products or
`
`services tailored to his geographic area, age, gender, nationality or preferences. Typically such
`
`information can be obtained through the use of cash-registers, kiosks, telephones, televisions and
`
`computers. While information is often obtained for marketing purposes, such information is also
`
`10
`
`useful for other purposes.
`
`A system for obtaining demographic information is described in US. Patent No.
`
`5,369,571 to Metts, in which a store clerk enters data relating to consumer socio-demographic
`
`characteristics while ringing consumer's purchases at a cash register.
`
`In US. Patent No.
`
`5,237,157 to Kaplan, discovery of marketing information relative to the tastes of music buyers is
`
`carried out while a user interacts with a music sampling kiosk in a music store. In US, Patent
`
`No. 5,515,098 to Carles, marketing data previously obtained and recorded on a central database
`
`is used to target specific commercial messages to on-demand television subscribers. The operation
`
`of a central database is a common characteristic of the above systems. Personalized interactions
`
`based on user-dependent data, if present, require a user to provide user information for this
`
`database as a condition to obtaining the benefit of any privileges provided thereby.
`
`15
`
`20
`
`In other systems used to obtain identifying information from a user, all interactions
`
`between a user and the system are localized, including user-dependent discovery, storage and use
`
`of the information. In US. Patent No. 5,555,074 to Jacobs disclosed is a system for delivering
`
`personalized greeting cards to consumers interacting with a kiosk. The system is able to query a
`
`Monster Worldwide, Inc. Exhibit 1024 (p.3/74)
`
`Monster Worldwide, Inc. Exhibit 1024 (p.3/74)
`
`

`

`WO 99/01834
`
`PCT/US98/13405
`
`_ 2 _
`
`consumer for user-dependent data, store it for the duration of the interactive session and use it to
`
`propose a selection of personalized products for purchase. Although this system does not provide
`
`for permanent recording of user-dependent data, its ability to perform data discovery and
`
`exploitation relative to a plurality of users is similar to the above systems that retain such data in a
`
`central database.
`
`In US. Patent No. 4,899,373 to Lee, a system providing personalized, location-
`
`independent telephone services is disclosed, in which user-dependent data is transmitted from a
`
`credit card and temporarily stored on the local exchange that services the telephone picked up by
`
`the user.
`In US. Patent No. 5,552,586 to Kalman, a memory card is used to store user data
`relative to the interactions of the user with a plurality of social agencies. While this system
`
`10
`
`provides access codes to allow for the protection of confidential data against disclosure to an
`
`unauthorized agency, when access is granted to an authorized agency, user data is unprotected as
`
`data is recorded in the computer of this case worker. These and other systems that record user-
`
`dependent data on a local medium, particularly a removable medium such as a disc drive, typically
`
`allow others to access this data independently of user control. Ofien, access is obtained by
`
`providers of the card or storage medium, as well as others with whom the user—dependent data
`
`was discovered in the first place.
`
`Similar observations can be made relative to the use of the Internet. Hypertext markup
`
`language HTML and Java applets can be used in a discovery phase to report their findings to a
`
`central database. Similarly, cookies and executable code for push technology can record user-
`
`dependent data locally to avoid repetitive data entry by the user. Such processes can be thought
`
`of as a local extension of the central server, as typically they provide no privacy protection besides
`
`a possible declaration of intent to preserve information in confidence.
`
`The proposal by Firefly, Inc. for an "Open Profiling Standard" (OPS) presents a
`
`framework for such ”before disclosure" user control. Within its scope, attention is given to
`
`important issues such as identification of entities and parties and security of communications
`
`between them. The OPS describes how an entity may negotiate access to confidential information
`
`on a party for the sake of ofi‘ering a personalized service to this party While the OPS gives an
`
`excellent description of the disclosure process and allows for party—dependent data to be kept
`
`locally under the party's control, its spirit is still to trade disclosure for personalization.
`
`It would
`
`15
`
`20
`
`25
`
`30
`
`Monster Worldwide, Inc. Exhibit 1024 (p.4/74)
`
`Monster Worldwide, Inc. Exhibit 1024 (p.4/74)
`
`

`

`WO 99/01834
`
`PCT/US98/13405
`
`be advantageous to break this link so as to reduce the need for disclosure while potentially
`
`increasing its economic value.
`
`_ 3 _
`
`Summary of the Invention
`
`The present invention is directed to a system and method for the disclosure and controlled
`
`publication of information. In one embodiment, the system and method requests disclosure of
`
`information and publishes such information only when consent for publication is affirmatively
`
`given. The present invention is further directed to a system and method for the controlled
`
`publication of information. In this embodiment, stored information is published only when
`
`consent for publication exists.
`
`10
`
`15
`
`20
`
`25
`
`In one embodiment, the system includes a sender in communication with a transmission
`
`medium, comprising a processing module transmitting a request for publication of a fact over the
`
`transmission medium; an agent in communication with the transmission medium, receiving said
`
`request for the fact from the sender, and a user in communication with the agent over the
`
`transmission medium. The agent requests that the user disclose facts, referred to herein as
`
`“private facts” and provide indicia relating to authorization for publication of the disclosed facts.
`
`Facts having indicia relating to positive authorization for publication are referred to herein as
`
`“public facts”. The agent receives the facts and determines whether such facts are to be made
`
`available to the sender, referred to herein as “published”. The agent can include a memory
`
`module storing a plurality of facts and the indicia of authorization for publication; a processing
`
`module in communication with the memory module for determining whether the indicia of
`
`authorization for the facts disclosed by a user permits publication of the facts to the sender, and
`
`providing the facts to the sender when said indicia of authorization permits publication of the
`
`facts, that is, when the facts are considered public facts.
`
`In one embodiment, the system is implemented using one or more rule engines, and a
`
`plurality of dialog classes that control the strategy of the interaction between the agent and the
`
`user such that the goals of the sender are carried out while the confidentiality of private facts
`
`disclosed by the user is maintained. Using the dialog classes the rule engine can prompt the user
`
`to disclose private facts and provide indicia of authorization for publication of such facts to the
`
`sender. The dialog classes further use the private and public facts associated with the user along
`
`Monster Worldwide, Inc. Exhibit 1024 (p.5/74)
`
`Monster Worldwide, Inc. Exhibit 1024 (p.5/74)
`
`

`

`WO 99/01834
`
`PCT/US98/13405
`
`with known facts about the sender, referred to herein as “inbound public facts”, to determine the
`
`content of additional prompts provided to the user, as well as to make suggestions to the user.
`
`_ 4 _
`
`In one embodiment, the dialog classes can include a plurality of rules, each of which is
`
`accorded a priority to aid in the process of rule selection. The rules can include pure rules and
`
`interactive rules that require interaction with the user for an action to be executed. Each rule
`
`typically includes a condition and an action that is carried out when the condition is satisfied.
`
`In one embodiment, the sender provides to the agent a publishing request list representing
`
`the facts desired to be known by the sender in response to the sender’s interaction strategy. The
`
`publishing request list can comprise a plurality of name and value pairs, each pair representing a
`
`10
`
`category of fact desired by a sender. Private facts authorized for publication to the sender can be
`
`implemented in a hash table, which can include a fact and an authorization for publication,
`
`referred to herein as “permission status”.
`
`In another embodiment, a plurality of interaction rules
`
`can be used to determine the action to be accorded to a sender’s publishing request.
`
`In yet
`
`another embodiment, a pure rule can determine the action to be accorded to a sender’s publishing
`
`15
`
`request.
`
`20
`
`25
`
`In another embodiment, a user can be provided with a questionnaire asking for a plurality
`
`of private facts, which result in a score that, if authorized for publication, can be published to the
`
`sender in response to a publishing request.
`
`In yet another embodiment, the agent can receive a special request from the sender, such
`
`as, for example, a special product or price offering that should be made known to the user
`
`immediately because of its temporal nature. In another embodiment, the agent can receive a
`
`special request from the user, such as, for example, a request for cancellation of an authorization
`
`for publication.
`
`In yet another embodiment, a plurality of senders can share one or more agents and public
`
`facts. In this embodiment, an agent can serve a plurality of senders using a common set of public
`
`facts, private facts and dialog classes, as well as sender—specific sets of public facts, private facts
`
`and dialog classes.
`
`In still another embodiment of the present invention, the sender and the user can exist as
`
`automated processing units, both having rule engines operating on specific dialog classes to obtain
`
`Monster Worldwide, Inc. Exhibit 1024 (p.6/74)
`
`Monster Worldwide, Inc. Exhibit 1024 (p.6/74)
`
`

`

`WO 99/01834
`
`PCT/US98/13405
`
`facts about the other party, provide facts, and authorize for publication certain facts which can be
`
`made known to the other party.
`
`_ 5 _
`
`In yet another embodiment of the present invention, a method of providing secure
`
`discovery and publication of facts about an entity comprises; receiving at an agent, a publishing
`
`request from a sender; prompting a user for disclosure of facts; requesting authorization for
`
`publication of the facts disclosed; and providing only those facts that include an authorization for
`
`publication to the sender.
`
`In yet another embodiment of the present invention, a method of providing controlled
`
`publication of facts to an entity comprises; transmitting from a sender to an agent a publishing
`
`request; retrieving from storage a fact relating to the publishing request and information relating
`
`to an authorization for publication associated with the fact; determining whether the authorization
`
`for publication indicates a grant of authorization; and providing the fact to the sender when a
`
`grant of authorization exists.
`
`The foregoing and other objects, features, and advantages of the invention will become
`
`apparent from the following, more particular description of the preferred embodiments of the
`
`invention, as illustrated in the accompanying drawings.
`
`Brief Description of Drawings
`
`FIG.
`
`1 is a block diagram of the system according to one embodiment of the present
`
`invention for discovering, exploiting and publishing facts.
`
`FIG. 2 is a block diagram illustrating the interface computer of Fig. 1.
`
`FIG. 3A illustrates the rules used in the discovery and publication of information
`
`according to one embodiment of the invention.
`
`FIG. 3B illustrates the rules used in the discovery and publication of information
`
`according to another embodiment of the invention.
`
`FIG. 4 is a flow chart describing a method of discovering and publishing facts according to
`
`one embodiment of the present invention.
`
`10
`
`15
`
`20
`
`25
`
`Monster Worldwide, Inc. Exhibit 1024 (p.7/74)
`
`Monster Worldwide, Inc. Exhibit 1024 (p.7/74)
`
`

`

`WO 99/01834
`
`PCT/US98/13405
`
`FIG. 5A is a flow chart illustrating rule selection in the discovery, exploitation, and
`
`publication process.
`
`_ 6 -
`
`FIG. 5B is a flow chart illustrating rule selection in the discovery, exploitation, and
`
`publication process.
`
`FIGS. 6A, 6B and 6C illustrate rules used by the system according to one embodiment of
`
`the present invention for determining whether private facts are to be published.
`
`FIGS. 7A, 7B and 7C illustrate rules used by the system for external prompting of the
`
`discovery and exploitation process according to one embodiment of the present invention.
`
`FIG. 8 illustrates rules for interpreting user-completed questionnaires according to another
`
`embodiment of the present invention.
`
`FIG. 9 is a block diagram illustrating another embodiment of the invention in which
`
`resources are shared by a plurality of senders.
`
`FIG. 10A is a block diagram illustrating an alternative embodiment of the system of the
`
`present invention in which the operations carried out by the sender and receiver are automated.
`
`FIGS. 10B, 10C, 10D, 10B and 10F illustrate rules for carrying out the discovery and
`
`exploitation process according to the embodiment of Fig. 10A.
`
`FIG. 11A is a block diagram illustrating another embodiment of the system of the present
`
`invention in which the sender and receiver are automated.
`
`FIG. 11B is a block diagram illustrating yet another embodiment of the system of the
`
`present invention in which the sender and receiver are automated.
`
`FIG. 12 is a block diagram illustrating an example of a sender and receiver carrying out
`
`automated processing using the system of the present invention.
`
`Detailed Description
`
`Referring to FIG. 1, shown is a block diagram of a system according to one embodiment
`
`of the present invention, for discovering, exploiting and publishing user information, hereinafter
`
`referred to as “facts”. The system of the present invention is described for purposes of illustration
`
`10
`
`15
`
`20
`
`25
`
`Monster Worldwide, Inc. Exhibit 1024 (p.8/74)
`
`Monster Worldwide, Inc. Exhibit 1024 (p.8/74)
`
`

`

`WO 99/01834
`
`PCT/US98/13405
`
`_ 7 _
`
`only, as being implemented on a software-programmable computer system using an object-
`
`oriented programming language such as Sun Java. The software-programmable computer system
`is preferably disposed on a network, such as the Internet. It is to be appreciated, however, that
`
`the present invention can be implemented in the context of other networks such as, for example,
`
`wide area networks WAN, local area networks LAN, intranets and on other computer systems
`
`known to hardware designers skilled in the art and using other computer languages known to
`
`software programmers skilled in the art.
`
`As shown, a site desiring to acquire information about users, hereinafter referred to as the
`
`sender or sending agent (SA) 4, is in communication with a distribution computer 2 and a memory
`
`module 1. The sender 4 can be, for example, a site on the world wide web (WWW) representing
`
`a vendor. The user 7 can be a person or entity that interacts with an interface computer 5 to
`
`communicate with the sender 4. The memory module 1 associated with the sender 4 stores dialog
`
`classes created by or developed for the sender 4. Classes, in object oriented programming, refer
`
`to a collection of data and method declarations, and can be used to encode facts and business
`
`rules that apply problem-solving knowledge to facts. In the present invention, dialog classes 1
`
`can be programs that control the interaction between the sender 4 and the user 7, particularly
`
`executable programs that seek to obtain from the user 7, information that is of interest to sender
`
`4.
`
`The memory module l is in communication with a distribution computer 2 which transmits
`
`copies of the dialog classes to a distribution network 3. Typically, such a transmission from the
`
`memory module 1 occurs in response to a command from a sender 4. The distribution computer
`
`2, upon obtaining the dialog classes, transmits them to the distribution network 3 which can
`
`broadcast identical copies of the dialog classes to the memory module 1’ via an interface
`
`computer 5, The interface computer 5, as fiirther described herein, can comprise, for example, a
`
`personal computer, a digital television, or a cable television digital interface that is local to the
`
`user 7. It is to be appreciated however, that in alternate embodiments of the present invention,
`
`the interface computer 5 need not be local, and can be disposed on a network that services a
`
`plurality of senders 4 and a plurality of users 7.
`
`The sender 4 further is in communication with a transaction computer 11 and a transaction
`
`network 12.
`
`In the present invention, the transaction computer 11 can comprise, for example, a
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Monster Worldwide, Inc. Exhibit 1024 (p.9/74)
`
`Monster Worldwide, Inc. Exhibit 1024 (p.9/74)
`
`

`

`WO 99/01834
`
`PCT/US98/13405
`
`_ 8 _
`
`remote server or a server at the sender’s 4 internet site. As shown, the transaction network 12 is
`
`in communication with the interface computer 5, thereby enabling the user 7 to interact with the
`
`sender 4 via the interface computer 5. The transaction computer ll further is in communication
`
`with a transaction information memory module 10 that stores transaction information, such as, for
`
`example, information provided by the user 7 and/or the sender 4, such as, comments, questions,
`
`purchase units, quantities and dates of delivery, prices and availability. The user 7 can therefore
`
`exchange with the transaction computer ll, transaction information. This exchange can then lead
`
`to the creation and storage of new transaction information, such as an order or comments, leading
`
`to the creation of a file or ently in memory module 10. The transaction information provided by
`
`the user 7 as described above, may further include personal information about the user 7 as sought
`
`by the sender.
`
`It is important to note that the distribution network 3 and the transaction network 12 can
`
`be implemented on the same logical and/or physical network, such as the Internet, a WAN or
`
`LAN, an intranet, or an EDI network. The transaction network 12 is essentially a two—way
`
`network, that enables the user 7 and the sender 4 to exchange information. The distribution
`
`network 3, as will be further described, can be a two-way network, that is, communication is
`
`typically carried out from the sender 4 to the interface computer 5, with signals transmitted from
`
`the interface computer 5 that request dialog classes, as further described herein. In yet another
`
`embodiment, the distribution network 3 can be a one-way network In another embodiment, the
`
`distribution network 3 can include, for example, a distribution of CD-ROMs in which
`
`communication is carried out through direct mailing or stores.
`
`The dialog classes stored in memory module 1 are transmitted over the distribution
`
`network 3 to the memory module 1’. The dialog classes are transmitted in response to a decision
`
`by the sender 4 to publish the dialog classes, that is, to make the dialog classes available to the
`
`user 7 in memory module 1’ so that the user 7 can interact with the dialog classes on the interface
`
`computer 5.
`
`In one embodiment of the present invention, the dialog classes can be provided in
`
`response to the decision by the sender 4 to publish the dialog classes, and a corresponding
`
`decision by the user 7 to receive the dialog classes.
`
`In response to such an indication, the sender
`
`4 can initiate transmission of the dialog classes to the memory module l’ and provide for
`
`additional updates of the dialog classes. The interaction between the sender 4 and the user 7 is
`
`known in Internet jargon, as push-pull technology or simply push technology.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Monster Worldwide, Inc. Exhibit 1024 (p.10/74)
`
`Monster Worldwide, Inc. Exhibit 1024 (p.10/74)
`
`

`

`WO 99/01834
`
`PCT/US98/13405
`
`_ 9 _
`
`The interface computer 5 can locally execute the dialog classes stored in memory
`
`module 1’. The dialog classes, as described above, are programs that automate the logic of the
`
`sender 4 and control the strategy of the interaction between the sender 4 and the user 7. The
`
`dialog classes can thus prompt the user 7 to provide information, such as personal, secret or
`
`confidential information, “private facts,” and upon receiving such private facts, determine whether
`
`additional prompts should be provided to the user 7 to obtain additional private facts, and what
`
`the content of such additional prompts should be. Therefore, during the execution of the dialog
`
`classes, as fiarther described, the user 7 can be asked to disclose certain private facts, such as, for
`
`example, date of birth, social security number, annual income, mother’s maiden name, other
`
`family information, eye and hair color, and user-preferences. Execution of the dialog classes
`
`enables the user 7 to authorize certain private facts to be made available and published as public
`
`facts. Public facts are thus private facts made available to the sender 4 only in response to
`
`authorization by the user 7. Additionally, public facts can further comprise sender-related data
`
`such as, for example, service messages. In the present embodiment, the interface computer 5 can
`
`therefore store, modify and retrieve private and public facts relative to the user 7 as well as public
`
`facts relative to the sender 4.
`
`Therefore, the interface computer 5 receives the dialog classes from memory module 1’,
`
`executes the dialog classes and interacts with the user 7. Any information provided by the user 7
`
`in response to such interactions is stored in the memory module 6 as private facts. These private
`
`facts remain in the memory module 6 and are copied as outbound public facts only in response to
`
`authorization by the user 7 for disclosure to the sender 4, as will be fiirther described. The
`
`outbound public facts are stored in memory module 8. As described above, system information or
`
`public facts previously provided by the user 7 to the sender 4, or simply provided by the sender 4,
`
`are stored in memory module 9 as inbound public facts, and are transmitted to the interface
`
`computer 5 to aid in allowing appropriately tailored prompts to be directed to the user 7.
`
`Referring to FIG. 2, shown in further detail is the interface computer 5. As shown, a
`
`multitasking operating system 13, such as, for example, a Java virtual machine running on
`
`Microsoft Windows 95, controls the operation of the interface computer 5. The operating system
`
`13 runs the discovery and exploitation engine 14, hereinafier referred to as the “DEP” 14, which
`
`can transmit local Copies of the dialog classes to the memory module 1’ and execute local copies
`
`of the dialog classes stored in the memory module 1’.
`
`In the present embodiment, the DEP 14 is
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Monster Worldwide, Inc. Exhibit 1024 (p.11/74)
`
`Monster Worldwide, Inc. Exhibit 1024 (p.11/74)
`
`

`

`WO 99/01834
`
`PCT/U598/13405
`
`_ 10 _
`
`implemented as a rule engine operating with a knowledge base. The knowledge base comprises
`
`the dialog classes in memory module 1’ and the public and private facts in memory modules 6, 8,
`
`9.
`
`It is important to note that each specific fact in object-oriented programming, is represented as
`
`an object which is an instance of the relevant generic fact class. For example, looking at the
`
`object “sports practiced: golf’, note that “golf” is a specific instance of the class “sports
`
`practiced”. The DEP 14 as a rule engine, thus interprets the dialog classes in the storage module
`
`1’ by determining which class is the most relevant to the fact objects held in the storage modules
`
`6, 8 and 9. The DEP 14 then creates new objects or updates existing objects according to the
`
`user 7 responses obtained Via a user interface 15.
`
`The DEP 14 thus creates, writes, updates, and reads the public facts held in memory
`
`module 8 and the private facts held in memory module 6. The DEP l4 fiirther determines which
`
`private facts are to become outbound public facts, and stores such facts in memory module 8 so
`
`that they are available for further processing by both the DEP l4 and the external process 16
`
`hereinafter referred to as the “EPR” 16. The EPR 16 communicates with the user 7 through the
`
`user interface 15, to enable the user 7 to communicate transaction information with the sender 4
`
`over the transaction network 12. As will be further described, private facts cannot be accessed by
`
`a system element other than the DEP 14, and can be discovered by the DEP 14 during a single
`
`user-interaction session or during multiple user-interaction sessions. The inbound public facts in
`
`memory module 9 can further be read by the DEP 14 as transmitted to by the EPR 16.
`
`It is to be noted that the DEP 14 can, in other embodiments, be configured using other
`
`elements while retaining the functionality described herein in connection with a rule engine. For
`
`example, the basic rule engine design described herein can be coupled with free form ancillary
`
`modules limited to the computation of some derived facts added to the list of private facts.
`
`The operating system 13 also runs the EPR 16, a rule engine that interacts with the sender
`
`4 and the user 7 via the user interface 15. The EPR 16 can be a local agent of the sender 4, such
`
`as a local server or an applet. In another embodiment, the EPR can simply be a local application
`
`programming interface (API) remotely accessible from the transaction computer 11 over the
`
`transaction network 12. In the present embodiment, the EPR 16 allows the DEP 14 to interact
`
`with the transaction computer 11. The EPR 16 can access the outbound public facts in storage
`
`module 8 as generated by the DEP 14, and transmit such facts to the sender 4 over the transaction
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Monster Worldwide, Inc. Exhibit 1024 (p.12/74)
`
`Monster Worldwide, Inc. Exhibit 1024 (p.12/74)
`
`

`

`WO 99/01834
`
`PCT/US98/13405
`
`_ 11 _
`
`network 12. Additionally, the EPR 16 can receive inbound public facts from the transaction
`
`network 12, and store the inbound public facts in memory module 9, to be retrieved by the DEP
`
`14. Further, the EPR 16 can be used to process independent commands received via the user
`
`interface 15.
`
`In another embodiment, the system can comprise a plurality of EPRS 16, each with
`
`its own set of inbound public facts. As fiirther described in FIG. 9, where multiple senders 4 are
`
`disposed on a network and share the private and public facts, a plurality of EPRs 16 can be
`
`desirable.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Referring to FIG. 3A, the dialog classes stored in memory modules 1 and 1’ generally
`
`comprise at least two types of rules known as pure rules 150 and interaction rules 152. As shown
`
`in this figure, pure rules 150 and interaction rules 152 are characterized by a priority value, such
`
`as, for example, an integer from 1 to ll, given by R-p. It is to be appreciated that any method of
`
`assigning differing values to a plurality of rules can be used, as the priority value is simply a value
`
`that can be ranked against the priorities of other rules to determine the order in which the rules
`
`are selected. Both the pure rules 150 and the interaction rules 152 further include a condition,
`
`given by R—c. A condition is a Boolean operation that results in an output that is either true or
`
`false. Both types of rules are configured in accordance with the objectives of the sender 4 in
`
`determining when the user 7 should be prompted for facts, what strategy should be employed in
`
`prompting a user 7 for facts and what suggestions should be made to the user 7 on the basis of
`
`such facts.
`
`Pure rules 150 further include a body, given by R—b, within which a conclusion, RR-c is
`
`found. Pure rules 150 incorporate the logic of the sender 4 using information already available to
`
`the DEP 14. That is, pure rules 150 are executed on the basis of existing private and public facts
`
`and do not rely on direct interaction with the user 7 for their execution. For example, a pure rule
`
`150, can include a timer, and include the condition that if more than a month has passed without
`
`effective interactions with the user 7, the user 7 is no longer of interest to the sender 4. The
`
`interaction rules l52 in

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket