throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2003/0083938 Al
`(43) Pub. Date: May 1, 2003
`
`Smith et al.
`
`US 20030083938A1
`
`(54) SYSTEM AND METHOD FOR PROFILING
`DIFFERENT USERS HAVING A COMMON
`COMPUTER IDENTIFIER
`
`(75)
`
`Inventors: Tucker L. Smith, Irmo, SC (US);
`James L. Browning, Columbia, SC
`(US)
`
`Correspondence Address:
`JAMES M. STOVER, ESQ.
`NCR CORPORATION LAW DEPARTMENT,
`WHQ-4
`1700 S. PATTERSON BOULEVARD
`DAYTON,, OH 45479 (US)
`
`(73) Assignee: NCR Corporation
`
`(21) Appl. No:
`
`10/008,259
`
`(22)
`
`Filed:
`
`Oct. 29, 2001
`
`Publication Classification
`
`Int. Cl.7 ..................................................... G06F 17/60
`(51)
`(52) US. Cl.
`................................................................ 705/14
`
`(57)
`
`ABSTRACT
`
`A system and method profiles different users having a
`common terminal identifier in communication system. The
`
`system comprises a user activity data analyzer for extracting
`profile data from user terminal activity data, a user identifier
`for determining Whether the profile data corresponds to a
`profile data history associated With the user terminal, and a
`user profile generator for generating a profile data history
`from the profile data for another user to be associated with
`the terminal in response to the profile data not corresponding
`to the profile data history associated with the user terminal.
`The user activity data analyzer extracts site addresses,
`URLs, click event data, metadata and other user activity
`from a session log to compile information useful for assess-
`ing a user’s interests. This extracted profile data may then be
`compared to a profile history previously generated and
`associated with the terminal identifier. A low level of cor-
`
`respondence between the extracted profile data and the
`profile history associated with the terminal identifier indi-
`cates that a different user is generating the user activity data.
`The user profile generator then builds a profile history from
`the extracted profile data and associates it With the terminal
`identifier. The profile histories are provided different user
`identifiers. Upon subsequent detection of the terminal iden-
`tifier,
`the profile data extracted from the user activity is
`compared to both profile histories to determine which user
`is navigating the site. Once sufficient profile data has been
`extracted to determine which profile history corresponds to
`the extracted data, advertising content that corresponds to
`the identified user may be selected and included in the
`content requested by the current user.
`
`RECEIVE
`USER
`TERMINAL
`DATA
`
`100
`
`104
`
`108
`
`
`
`EXTRACT
`PROFILE
`DATA
`
`LOCATE
`
`
`KEY DATA
`
`USER
`PROFILE
`?
`
`N
`
`
`
` GENERATE USER
`
`PROFILE KEYS
`
`134
`
`MERGE
`
`PROFILE
`DATA
`
`110
`
`GENERATE
`USER
`
`
`PROFILE
`
`STORE
`USER
`
`PROFILE
`133
`
`END
`
`COMPARE
`OF TERMINAL
`
`PROFILES
`DATA?
`
`
`MERGE
`
`PROFILES
`
`148
`
`STORE
`PROFILES)
`
`1 4
`
`COHRELATED
`?
`
`SELECT CONTENT
`BASED ON
`PREFERENCES
`
`
`
`
`
`
`
`END SESSION
`
`
`
`SONY - Ex.-1017
`
`1
`
`Sony Corporation - Petitioner
`
`SONY - Ex.-1017
`Sony Corporation - Petitioner
`
`1
`
`

`

`Patent Application Publication May 1, 2003
`
`Sheet 1 0f 3
`
`US 2003/0083938 A1
`
`E
`o
`
`9..
`
`P.
`o
`
`g
`
`LU
`:_4
`LL03
`00
`II
`CL
`
`(0
`CC)
`
`1—
`021
`0
`
`55
`
`_
`
`(5
`O
`
`N
`
`.3
`
`
`
`fi-
`l\
`
`O‘—
`
`0L
`
`o
`
`CC
`
`$9
`D
`
`O0
`
`0
`
`O l
`
`\
`
`(D
`B
`
`C)
`(O
`
`F03
`l—g
`
`o
`
`00.
`
`5E
`H:
`
`.C}
`(D
`N
`
`C)
`
`vLO
`
`3
`
`CO
`00
`
`33
`0.203>
`—0:
`Lu
`(/3
`
`fi'
`CO
`
`Lu
`*—
`8
`a:
`
`38
`
`288
`
`PI!
`
`:5
`
`h:
`
`III
`III"
`
`B
`
`Er:
`
`0 N
`
`m
`w-
`
`9
`E
`
`\
`
`@‘\
`
`CU
`

`
`2
`
`

`

`Patent Application Publication May 1, 2003 Sheet 2 0f 3
`
`US 2003/0083938 A1
`
`USER
`ACRVRY
`DATA
`ANALYZE R
`
`CONTENT
`
`
` USER
`PROFILE
`
`
`
`SELECTOR RDBMS
`GENERATOR
`
`
`3
`
`

`

`Patent Application Publication May 1, 2003 Sheet 3 0f 3
`
`US 2003/0083938 A1
`
`RECBVE
`USER
`TERMINAL
`
`DATA
`
`100
`
`EXTRACT
`PRCRLE
`DATA
`
`104
`
`LOCATE
`KEYDATA
`
`108
`
`ITIIE}.23
`
`128
`
`134
`
`USER
`PRCELE
`?
`
`Y
`
`CORRELATED
`?
`
`MERGE
`N
`PROFKE
`
`DATA
`
`
`
`
`GENEEQTE
`GENERATE USER
`
`PROFILE KEYS
`PROFILE
`
`
`
`
`STORE
`USER
`
`120
`PROFILE
`
`
` END
`OF TERMINAL
`
`DATA?
`
`
`138
`
`140
`
`Y
`
`COMPARE
`
`pROFlES
`
`CORREUMED
`
`‘ MERGE
`
`SELECT CONTENT
`BASED ON
`PREFERENCES
`
`PROFLES
`
`148
`
`144
`
`STORE
`PROFILE(S)
`
`END SESSION
`
`4
`
`

`

`US 2003/0083938 A1
`
`May 1, 2003
`
`SYSTEM AND METHOD FOR PROFILING
`DIFFERENT USERS HAVING A COMMON
`COMPUTER IDENTIFIER
`
`FIELD OF THE INVENTION
`
`[0001] This invention relates generally to methods and
`systems for tracking user activity at a terminal on a com-
`munication network and, more particularly, to methods and
`systems for generating user profiles based on user activity a
`communication terminal.
`
`BACKGROUND OF THE INVENTION
`
`[0002] The Internet is a well-known computer network
`that supports the interaction of literally millions of comput-
`ers. Most of these computers communicate through a client/
`server scheme although the peer-to-peer communication
`model is used as well. Although the Internet was originally
`envisioned for the purpose of facilitating the dissemination
`of information between geographically divergent locations,
`many have tried to exploit the electronic commerce capa-
`bility of this network. Few companies, however, have suc-
`ceeded in establishing commercial Viability through revenue
`generated from sales occurring in Internet electronic trans-
`actions alone. Consequently, others have attempted to find a
`commercial opportunity in the prolific communication traf-
`fic that occurs over the Internet for the purposes of infor-
`mation acquisition and dissemination.
`
`[0003] Many Western nations are mass consumer markets
`and vendors Vie for the attention of consumers in order to
`
`interest them in their products and/or services. Advertising
`has moved into every media form as it has arisen, particu-
`larly in Western nations, to present products and services to
`potential consumers in an effort to influence their buying
`decisions. Advertising agencies and vendors spend signifi-
`cant amounts of resources to learn the attributes that identify
`those consumers most likely to purchase particular goods
`and services so the advertising can be placed in the media
`viewed most often these consumers.
`
`[0004] This targeting of consumers having a high degree
`of likelihood in purchasing a company’s products or services
`is very important. As the agencies and companies expend
`significant resources to develop advertising for various
`media, they want to present them where they are most likely
`to be effective. For example, car manufacturers do not buy
`television broadcast time for children’s programs and car-
`toons because the viewers of these shows are not consumers
`
`of automobiles. However, cereal manufacturers do purchase
`this broadcast time because these viewers do influence the
`
`buying decisions for breakfast cereals that are made by their
`parents. Thus, those persons responsible for buying access to
`media venues are very interested in the persons who view
`the various media venues.
`
`[0005] The problem with the Internet and indeed any
`communication network where people are able to view a
`media anonymously is that little or no knowledge about the
`demographics of the viewers is known. One particularly
`frustrating aspect of computer network communication is
`the inability to identify the computers accessing a server or
`peer over the network. For example, most users access the
`Internet through an Internet Service Provider (ISP). In this
`communication scheme, a user couples to an ISP’s commu-
`nication hub by communicating messages and files through
`
`a modem over an analog or digital telephone line. From the
`ISP’s hub, the messages and files may be routed internally
`through the ISP’s intranet
`to servers or peers that are
`subscribers to the ISPs services or the messages and files
`may be routed to the external Internet routers for delivery to
`servers or peers that are not ISP subscribers. In the message
`formats for
`the files and messages, a user’s computer
`includes an Internet Protocol (IP) address to identify the
`user’s computer. However, the ISP typically assigns a dif-
`ferent IP address to a computer each time a user accesses the
`ISP hub and the ISP may change the IP address before
`sending a message or file out to the external Internet in an
`effort to cloak the identity of the user’s computer. Likewise,
`computers known as firewalls and secure routers may also
`alter an IP address for external communications to frustrate
`
`efforts to compromise the integrity of a user’s computer.
`
`In an effort to pierce this level of anonymity, some
`[0006]
`sites utilize the cookie field of Transport Control Protocol/
`Internet Protocol (TCP/IP) messages. “Cookies,” as they
`have come to be commonly known, are identifiers assigned
`by a server or peer and placed in reply messages to another
`computer. Browsers, the application programs for commu-
`nicating over computer communication networks, particu-
`larly those using Hyper Text Transport Protocol (HTTP) for
`Hyper Text Markup Language (HTML) documents, use the
`cookie for subsequent messages to the site that assigned the
`cookie. At the conclusion of a communication session with
`
`a site, the communication program, such as a browser, stores
`the site address and cookie in a file on the user’s computer.
`If the user accesses the site during another subsequent
`browsing period, the browser determines that the site has
`been previously accessed by the user and inserts the stored
`cookie into the messages with the site. If the computer at the
`site has stored the cookies that it has previously assigned, it
`can detect the return of a computer that has previously
`visited. If any information was stored regarding the last time
`the computer identified by the cookie communicated with
`the site, then it can be retrieved and used. For example, if the
`user registered with the site by providing a user name and
`other user data during the previous visit, then, using the
`cookie as a key, the site computer can retrieve this data and
`welcome the user by name without requiring the user to
`login.
`
`If users were willing to register on computer sites
`[0007]
`then advertisers would be able to learn more about the
`
`people who visit computer sites. Unfortunately, most users
`are resistant
`to providing personal
`information. Conse-
`quently, a site computer may be able to detect the occurrence
`of another communication session with a computer to which
`a cookie was previously assigned but little or no information
`about the user can be ascertained. Not until the user provides
`personal data in response to a request
`to complete an
`information form or performs some transaction that accu-
`rately identifies the user will the site be able to obtain
`demographic data on the user. Once a user’s name and/or
`address can be obtained then personal information databases
`may be mined to obtain demographic data to further identify
`the user’s interests and attributes.
`
`[0008] Operators of Web sites or other computer sites on
`computer networks have attempted to exploit the potential of
`advertising to the users who view content delivered from a
`site. Site operators try to attract advertisers and vendors by
`touting the number of “clicks” or “hits” registered at their
`
`5
`
`

`

`US 2003/0083938 A1
`
`May 1, 2003
`
`site. They promote the advertising potential of the site by
`offering to run banner ads in their site content. Advertisers
`evaluate the advertising efiectiveness of a site by examining
`the amount of communication traffic at a site and the content
`
`of the site. Some content is more desirable to a particular age
`group, gender, or income level and, if that age group, gender,
`or income level is not an important consumer of the adver-
`tiser’s goods and services, advertising at the site is not a
`good investment.
`
`[0009] At least two problems make this evaluation diffi-
`cult. For one, some sites act as portals to a variety of content.
`Consequently, advertisers have a difficult time in assessing
`the content that is being most frequently viewed by users.
`Although a portal may have content that would attract new
`car buyers and after market car accessory buyers, if most of
`the hits demonstrate new car buyer visits then an after
`market accessory manufacturer would not do well in adver-
`tising at the site. To address this problem, systems have been
`developed that record and store session logs of a user’s
`activity with a site. These systems typically record the
`Universal Resource Locators (URL) that a user requests for
`viewing at a user’s computer. Using this information, a
`cookie may be associated with a session log and the content
`contained in the URLs of the log. An analysis of the most
`frequently requested logs may be performed to identify the
`most frequently obtained content from the site to assist in the
`identification of the users attracted by the site.
`
`[0010] The second problem for advertisers is information
`regarding the users. While a site operator may have suppo-
`sitions regarding the identity of a user accessing the site, the
`fact remains that all the site really knows is that a cookie
`identifier has been associated with a list of URLs accessed
`
`by the cookie-identified computer. However, there is rarely
`a one-to-one correspondence between a computer and a user.
`Many families use a common computer for all family
`members to access the Internet. Thus, when different family
`members use the computer during different browse periods
`to access the same site, a program at the site analyzing the
`user activity associates the activity with a single user. This
`assumption blurs the demographic distinctions that may be
`ascertained from the content previously viewed through the
`computer. If banner ads are selected based on this prior user
`activity then ads having little or no interest to the current
`user will be displayed. Because hits on banner ads are an
`important statistic for attracting advertisers to a site, a site
`operator wants to place ads before a viewer that are likely to
`result in a hit. Analyzing user activity from a single com-
`puter as if a single user generated it reduces the likelihood
`of accurately identifying the user during a session.
`
`[0011] What is needed is a method of analyzing user
`activity associated with a cookie that differentiates between
`users of a computer.
`
`[0012] What is needed is a system that recognizes different
`users of a single computer and selects appropriate advertis-
`ing for the recognized user.
`
`SUMMARY OF THE INVENTION
`
`[0013] The above-noted limitations of previously known
`systems and methods for analyzing user activity associated
`with a computer have been overcome by a system and
`method that operate in accordance with the principles of the
`present invention. The system for profiling different users
`
`having a common terminal identifier comprises a user activ-
`ity data analyzer for extracting profile data from user ter-
`minal activity data, a user identifier for determining whether
`the profile data corresponds to a profile data history asso-
`ciated with the user terminal, and a user profile generator for
`generating a profile data history from the profile data for
`another user to be associated with the terminal in response
`to the profile data not corresponding to the profile data
`history associated with the user terminal.
`
`site
`[0014] The user activity data analyzer extracts
`addresses, URLs, click event data, metadata and other user
`activity from a session log to compile information useful for
`assessing a user’s interests. This extracted profile data may
`then be compared to a profile history previously generated
`and associated with the terminal identifier. A low level of
`
`correspondence between the extracted profile data and the
`profile history associated with the terminal identifier indi-
`cates that a different user is generating the user activity data.
`The user profile generator then builds a profile history from
`the extracted profile data and associates it with the terminal
`identifier. The profile histories are provided different user
`identifiers. Upon subsequent detection of the terminal iden-
`tifier,
`the profile data extracted from the user activity is
`compared to both profile histories to determine which user
`is navigating the site. Once sufficient profile data has been
`extracted to determine which profile history corresponds to
`the extracted data, advertising content that corresponds to
`the identified user may be selected and included in the
`content requested by the current user.
`
`[0015] The system of the present invention may be imple-
`mented at a content communication site, such as a Web site,
`or at a content communication hub, such as an ISP hub. At
`a content communication site, the system analyzes session
`logs associated with a terminal identifier, such as a cookie.
`At a communication hub, the system may analyze a browse
`period log and the terminal identifier may be a cookie or an
`IP address. Abrowse period log is a database of user activity
`beginning with the initial access of the ISP hub and the
`user’s logout from the ISP hub. Within this browse period
`are the session logs containing the user activity data that has
`occurred between a user and the various content communi-
`
`cation sites visited by the user during the browse period. At
`the communication hub, therefore, the system of the present
`invention may obtain a wider range of profile data than is
`available at a content communication site alone. This addi-
`
`tional information is useful in identifying the interests of
`each user of a computer. Also, the IP addresses and infor-
`mation available to the ISP hub through its support software
`located on a terminal may be useful in further identifying the
`computer and user driving a browse period. For example, a
`laptop identified by the support software may indicate which
`family member is driving a browse period and that person’s
`identity may be used to supplement the data in the profile
`history. The stationary model used in the family house may
`indicate other users and help differentiate those users and
`their profiles from the laptop user even though they all
`access the computer through the same ISP account.
`
`[0016] The system of the present invention may be par-
`ticularly useful in cable television networks (CATV). To
`support view on demand and other user selection services,
`CATV networks are providing channels for receiving com-
`munication from subscriber sites. These channels may be
`used by the processors in set
`top boxes to send data
`
`6
`
`

`

`US 2003/0083938 A1
`
`May 1, 2003
`
`regarding the broadcast channel being viewed on a televi-
`sion set at a subscriber site. Messages indicating the power
`on and power off status of a television set may be used to
`identify browse periods and data regarding duration of View
`for each channel displayed may be evaluated as session data.
`These data may be analyzed to develop a parent profile, a
`husband profile, a wife profile, and group and individual
`child profiles for the viewers at a subscriber site. Comparing
`the extracted profile data to the profile histories associated
`with a subscriber identifier, the system at the head end of the
`CATV network may be able to identify the viewer or Viewer
`group at different television sets at a subscriber site. The
`system may then select different advertising content to be
`delivered to the different sets operating at the subscriber site.
`The ads or interest content may be displayed at a set as a
`scroll window along a border of the screen or as a window
`within screen display.
`[0017] The method of the present invention comprises
`extracting profile data from user terminal activity data,
`determining whether the profile data corresponds to a profile
`data history associated with the user terminal, and generat-
`ing a profile data history from the profile data for another
`user to be associated with the terminal in response to the
`profile data not corresponding to the profile data history
`associated with the user terminal. The method may be
`performed at a content communication site or a communi-
`cation hub in a communication network. The terminals may
`be computers identified by cookies or IP addresses or they
`may be television sets located at subscriber sites and further
`identified by data from set
`top processors. The method
`permits the different users and viewers of the terminals to be
`detected and associated with profile histories for the termi-
`nals. This data may also be used to better target advertising
`and further enhance the advertising potential of a commu-
`nication content site, an ISP service, or a CATV system.
`
`It is an object of the present invention to differen-
`[0018]
`tiate users and Viewers at terminals in a communication
`
`system without requiring registration information.
`
`It is an object of the present invention to identify a
`[0019]
`user during a session for purposes of targeting advertising to
`the user.
`
`It is an object of the present invention to build a
`[0020]
`user profile during a session in response to extracted profile
`data having a low degree of correspondence with existing
`profile histories associated with a terminal.
`
`It is an object of the present invention to mine
`[0021]
`session and browse period data to detect different users of a
`terminal.
`
`invention is the
`[0022] One advantage of the present
`ability to profile more users from hits at a content commu-
`nication site to improve the advertising potential of the site.
`
`[0023] Another advantage of the present invention is the
`ability to more accurately profile users from hits at a content
`communication site.
`
`[0024] Another advantage of the present invention is the
`ability to differentiate users or groups of users who access a
`content communication site through a secure access device
`such as a firewall.
`
`[0025] These and other objects, advantages and features of
`the present invention may be discerned from reviewing the
`accompanying drawings and the detailed description of the
`invention.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0026] The present invention may take form in various
`system and method components and arrangement of system
`and method components. The drawings are only for pur-
`poses of illustrating an exemplary embodiment and are not
`to be construed as limiting the invention.
`
`[0027] FIG. 1 depicts a diagram of communication net-
`work in which the present invention may be used;
`
`[0028] FIG. 2 is a block diagram of an exemplary embodi-
`ment of a system for differentiating users at a terminal that
`is shown in FIG. 1;
`
`[0029] FIG. 3 is a flowchart of an exemplary method for
`differentiating users at a terminal of the system shown in
`FIG. 2; and
`
`[0030] FIG. 4 is a diagram of a CATV network in which
`the present invention may be used.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`[0031] A system in which the system and method of the
`present invention may be used is shown in FIG. 1. System
`10 includes client computers 12, 16, and 20 that are coupled
`through telephone networks 24a and 24b and Point-of-
`Presence (POP) servers 28a and 28b to the local area
`network (LAN) or wide area network (WAN) 30 of an
`Internet Service Provider (ISP) 34.
`ISP 34 is coupled
`through a router 38 to a wide area network commonly
`known as the Internet and designated with the numeral 40 in
`the figure. By way of example, system 10 also includes
`terminals 44a-44m of a LAN/VVAN 48 that are coupled to
`network 40 through a firewall or other known secure server
`50. Terminals 44a-44m may also act as clients in system 10.
`Numeral 54 designates another ISP network that couples
`client computers C1-Cm to Internet 40. Web server 60 is
`coupled to network 40 to provide access to content stored in
`database servers 64 and 66 through Computer Gateway
`Interface (CGI) 70. CGI 70 is also coupled to a content
`server 74. Also coupled to CGI 70 is a user differentiating
`system 80 that includes a user profile database 84.
`
`In more detail, client computers 12, 16, 20, C1-Cm,
`[0032]
`and terminals T1-Tm may be any conventional known
`personal computers, work stations, desktop, portable, hand-
`held, set top, personal digital assistants, or wireless com-
`munication devices that may couple through an ISP, other
`service provider or communication hub to any wide area or
`local area network such as the Internet or an intranet. These
`
`devices typically include a processor, storage, programmed
`instruction for operating the device and a display. The
`examples shown in FIG. 1 may use a modem or network
`interface device to couple to a communication network such
`as a telephone or satellite network. Messages to and from the
`client devices may then be provided to an ISP or other
`service provider network. The ISP usually provides sub-
`scriber support services through one or more service servers
`36 such as email services, search engines, and other known
`services. Subscriber service providers include ISP compa-
`nies, commerce service providers (CSP), cellular and other
`wireless service providers who couple wireless communi-
`cation devices to communication networks such as the
`Internet or intranet communication networks. These various
`
`service providers couple users through computers and other
`
`7
`
`

`

`US 2003/0083938 A1
`
`May 1, 2003
`
`communication devices to a communication network for the
`
`purpose of exchanging information requests and the docu-
`ments and files responsive to those requests.
`
`[0033] Content for these information requests may come
`from other client users or from content communication sites
`
`such as Web server 60. Web servers typically establish and
`manage a session with a user. The requests for data and reply
`messages from a client device are typically provided to
`another computer for processing such as CGI 70. CGI 70
`typically executes script programs to locate resources for
`transmission to the requesting clients from databases located
`in proximity to CGI 70 such as databases 64 and 66 or from
`remote databases. These resources are typically identified by
`Universal Resource Locators (URL) that are included in the
`request and reply messages from client devices.
`
`In establishing the communication session with a
`[0034]
`client device, Web server 60 typically searches a data field
`in the request or reply for cookie data. Cookie data is
`identifying data placed in a message returned to a client
`device by a Web server. The communication application
`program in a client
`is commonly known as a browser.
`Browsers support communication over a communication
`network through a service provider in a variety of protocols.
`Although the HTTP protocol and documents in the HTML
`language/format are the ones most commonly used in many
`communication networks, other protocols and language/
`formats are typically supported. Most known browsers store
`in the client device the cookie data that is assigned by a
`server at a content communication site to the client device
`
`and insert the cookie data into data requests for subsequent
`communication sessions with the content communication
`site. In this manner, most servers at content communication
`sites may identify client devices communicating with them
`that have previously visited the site.
`
`In previously known systems, systems for gener-
`[0035]
`ating user profiles used the cookie data to recognize a client
`device that has subsequent communication sessions with the
`content communication site. These systems collect the user
`activity data such as length and time of a session, resources
`accessed in a session, a log of the mouse events occurring at
`the user client device, and transaction data entered by the
`user at the site. This data may be obtained by monitoring the
`messages returned to the site from the client device or the
`site may embed or otherwise download an application
`program with a document sent
`to the client device that
`executes on the client device and collects user activity. This
`user activity data may then be returned to the system at the
`site for data analysis and user profile generation. For
`example, a data object or a Java applet may be downloaded
`for user activity data collection purposes. If the user accepts
`a plug and play activity monitor, the application program for
`collecting user activity data may not only collect data but
`store the data on the user’s storage drives and monitor user
`activity data at other content communication sites. This
`stored data may then be returned to the content communi-
`cation site that downloaded the plug and play component.
`User activity components may also be part of the browser
`application program to obtain the same advantages as the
`plug and play modules. Regardless of the collection method,
`these previously known systems have evaluated the col-
`lected data as if they were generated by only one user. These
`systems perform Bayesian model analysis such as general
`Bayesian networks, hidden Markov models, and decision
`
`trees derived from Bayesian networks. Other statistical and
`probabilistic models are known and used to analyze the user
`activity data to construct a user profile for a single user. The
`limitation of these previously known systems is that they do
`not evaluate the user activity data to determine whether the
`user activity comports with a user profile associated with the
`client device. Thus, the analysis done on the user activity is
`used to alter the user profile history and that affects its
`accuracy. Only if the user has previously provided registra-
`tion data, such as a user name, account number or other
`specific user identifying data, are these previously known
`systems able to determine that a user activity corresponds to
`a user other than one for which a profile history has been
`previously generated. The system and method of the present
`invention overcomes this limitation of previously known
`systems.
`
`[0036] User identifying system 80 of FIG. 1 is shown as
`a separate system coupled to CGI 70 and Web server 60
`although such depiction is illustrative only. System 80 may
`be incorporated within a web server or CGI or distributed
`over one or more computers at a content communication
`site. Additionally, system 80 may be coupled to the ISP
`service server 36 or incorporated in such a server at the ISP
`site to collect and analyze user activity from subscriber sites
`to differentiate between users at the same site. When located
`
`at the ISP site or a content communication site, system 80
`may be used to identify which user is operating a client
`device during a session or browse period and the user’s
`profile history may be provided to a content server for
`purposes of providing targeted marketing to the user. Thus,
`a content server 74 may be provided at either or both ISP
`sites for communication with a system 80 at the site to
`provide targeted content such as advertising to the subscrib-
`ers of the ISP or
`to external users accessing publicly
`available documents from the ISP. System 80 may also be
`provided at any of the clients in FIG. 1. The user activity
`data extractor and analyzer may be program components or
`data objects that are downloaded from a content communi-
`cation site, a program component of the browser application,
`or a plug and play or other application program that pref-
`erably executes and communicates with the browser during
`network communication sessions. Of course, such an imple-
`mentation only extracts data and develops profiles for the
`users who access the computer on which system 80 executes
`but this data may be downloaded to a content server coupled
`to the communication network during browse periods. The
`content server may then select targeted content such as
`marketing documents for transmission to the client device.
`[0037] As shown in FIG. 1, system 80 is coupled to a
`profile history database 84 for storage of user profile histo-
`ries. Database 84 may be a relational database that
`is
`managed directly by system 80 or by a relational database
`management system (RDBMS). Database 84 may also be an
`object repository or other known managed data storage
`scheme. If memory or storage space on the components of
`system 80 permits, database 84 may be incorporated in
`system 80 or one of the other computers at the site where
`system 80 operates. By way of example, system 80 may be
`comprised of a Pentium II processor having sufficient RAM
`and hard disk storage, such as 64M of RAM and 20 GB hard
`drive. A read/write CD ROM drive may also be utilized for
`storage requirements. The operating system for system 80
`may be any known operating system such as Macintosh O/S,
`OS/2, AIX, BE OS, one of the Windows operating systems,
`
`8
`
`

`

`US 2003/0083938 A1
`
`May 1, 2003
`
`LINUX, UNIX, or the like. Communication between the
`computers at the site where system 80 is located may be
`performed through any known network method such as
`TCP/IP or other known Internet, intranet, LAN, or WAN
`implementation of a network protocol. The hardware speci-
`fication for the communication may be via Ethernet (IEEE
`802.3), Token Ring (IEEE 802.5), Fiber Distributed
`Dat

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket