Systems and methods for user identification, user...

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S076000, C707S793000, C707S793000, C709S203000, C709S225000, C709S227000, C713S186000, C726S028000

Reexamination Certificate

active

10358376

ABSTRACT:
Several ways of identifying users and collecting demographic information and market information are disclosed, including branding a browser with a unique identification in each user request, identifying a user by his key strokes or mouse clicks, gathering demographic information using multiple data sets and by monitoring network traffic. Additionally, user requested content is distinguished from other, non-user content, and the performance of a server can be monitor and analyzed from a client a client perspective. Further, an Internet user's Internet data is routed to a known domain on the Internet, from which it is routed on to the intended recipient. The domain includes proxy servers which proxy the user's data requests to the domain, and database servers, which filter and build a database of the user's Internet usage. Particular data concerning certain behaviors of interest, such as purchasing data, is filtered into the database, and can form the basis for numerous market measures.

REFERENCES:
patent: 4355372 (1982-10-01), Johnson et al.
patent: RE31951 (1985-07-01), Johnson et al.
patent: 4603232 (1986-07-01), Kurland et al.
patent: 4954699 (1990-09-01), Coffey et al.
patent: 4958284 (1990-09-01), Bishop et al.
patent: 5023929 (1991-06-01), Call
patent: 5060140 (1991-10-01), Brown et al.
patent: 5481294 (1996-01-01), Thomas et al.
patent: 5488408 (1996-01-01), Maduzia et al.
patent: 5526427 (1996-06-01), Thomas et al.
patent: 5550928 (1996-08-01), Lu et al.
patent: 5557686 (1996-09-01), Brown et al.
patent: 5584050 (1996-12-01), Lyons
patent: 5594934 (1997-01-01), Lu et al.
patent: 5659469 (1997-08-01), Deaton et al.
patent: 5675510 (1997-10-01), Coffey et al.
patent: 5710887 (1998-01-01), Chelliah
patent: 5715399 (1998-02-01), Bezos
patent: 5737025 (1998-04-01), Dougherty et al.
patent: 5737026 (1998-04-01), Lu et al.
patent: 5751450 (1998-05-01), Robinson
patent: 5771307 (1998-06-01), Lu et al.
patent: 5781913 (1998-07-01), Felsenstein et al.
patent: 5850249 (1998-12-01), Massetti et al.
patent: 5862325 (1999-01-01), Reed et al.
patent: 5872850 (1999-02-01), Klein
patent: 5887140 (1999-03-01), Itsumi et al.
patent: 5889548 (1999-03-01), Chan
patent: 5961593 (1999-10-01), Gabber et al.
patent: 5970469 (1999-10-01), Scroggie
patent: 5991735 (1999-11-01), Gerace
patent: 6026368 (2000-02-01), Brown et al.
patent: 6052730 (2000-04-01), Felciano et al.
patent: 6058381 (2000-05-01), Nelson
patent: 6070145 (2000-05-01), Pinsley et al.
patent: 6081900 (2000-06-01), Subramaniam et al.
patent: 6115680 (2000-09-01), Coffee et al.
patent: 6128624 (2000-10-01), Papierniak et al.
patent: 6138162 (2000-10-01), Pistriotto et al.
patent: 6151593 (2000-11-01), Cho et al.
patent: 6286046 (2001-09-01), Bryant
patent: 6381632 (2002-04-01), Lowell
patent: 6421733 (2002-07-01), Tso et al.
patent: 6567857 (2003-05-01), Gupta
patent: 6606581 (2003-08-01), Crofoot
patent: 6704787 (2004-03-01), Umbreit
patent: 6856963 (2005-02-01), Hurwitz
patent: 7039599 (2006-05-01), Merriman et al.
patent: 7080077 (2006-07-01), Ramamurthy et al.
patent: 2001/0014915 (2001-08-01), Blumenau
patent: 2001/0020242 (2001-09-01), Gupta et al.
patent: 2002/0069368 (2002-06-01), Hines
patent: 2002/0077903 (2002-06-01), Feldman
patent: 2002/0128803 (2002-09-01), Skinner et al.
patent: 2002/0178257 (2002-11-01), Cerrato
patent: 2003/0009762 (2003-01-01), Hooper
patent: 2003/0018778 (2003-01-01), Martin
patent: 2003/0033432 (2003-02-01), Simpson et al.
patent: 2003/0065595 (2003-04-01), Anglum
patent: 2003/0076305 (2003-04-01), Allen
patent: WO96/41495 (1996-12-01), None
patent: WO98/31155 (1998-07-01), None
patent: WO 200055783 (2000-09-01), None
patent: WO 200152462 (2001-07-01), None
patent: WO 200250694 (2002-06-01), None
patent: WO 03/067376 (2003-08-01), None
Monrose, F., et al, ‘Authentication via keystroke dynamics’, ACM Press, 1997, entire document, http://delivery.acm.org/10.1145/270000/266434/p48-monrose.pdf?key1=266434&key2=9684754711&coll=portal&dl=ACM&CFID=14258302&CFTOKEN=37117304.
Choo C. W. et al. “A behavioral model of information seeking on the Web: preliminary results of a study of how managers and IT specialists use the Web” ASIS'98, Information Access in the Global Information Economy. Proceedings of the 61thAnnual Meeting of the American Society for Information Science, vol. 35, Inf. Today Medford, NJ, USA, 1998, pp. 290-302, XP009056075.
Chan, Yuen-Yan, “On privacy issues of Internet access services via proxy servers,” Secure Networking—Core ‘Secure!’ 99, International Exhibition and Congress. Proceedings (Lecture Notes in Computer Science vol. 1740) Springer-Verlag Berlin, Germany, 1999, pp. 183-191, XP09055060.
Boyan, J. “The Anonymizer—Protecting User Privacy on the Web,” Computer-Mediated Communication Magazine, 'Online! 1997, XP002231197, http://www.december.com/cmc/mag/1997/sep/toc.html, retrieved on 1997.
Oppliger, R. “Privacy protection and anonymity services for the World Wide Web (WWW),” Future Generations Computer Systems, Elsevier Science Publishers, Amsterdam, NL, vol. 16, No. 4, Feb. 2000, pp. 379-391, XP004185850.
Dossick, S. E. et al., “WWW access to legacy client/server applications,” Computer Networks and ISDN Systems, North Holland Publishing, Amsterdam, NL, vol. 28, No. 11, May 1996, pp. 931-940, XP004018197.
Chapman D. B. et al., “Building Internet Firewalls Proxy Systems,” Building Internet Firewalls, Sep. 1995, pp. 189-205, XP002911985.
Zenel, B., “A General Purpose Proxy Filtering Mechanism Applied to the Mobile Environment,” Wireless Networks, ACM, US, vol. 5, No. 5, Oct. 1999, pp. 391-409, XP000902494.
Diffie W. et al., “Privacy and Authentication: An Introduction to Crytopgraphy” Proceedings of the IEEE, IEEE. New York, US, vol. 67, No. 3, Mar. 1979, pp. 397-426, XP000575227.
Mambo, M. et al., “Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts” IEICE Transactions of Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronics Information and Comm. Eng. Tokyo, JP, vol. E80-A, No. 1, Jan. 1997, pp. 54-63, XP000742245.
Lee, J. et al., “Visualization and Analysis of Clickstream Data of Online Stores for Understanding Web Merchandising,” IBM Institute of Advanced Commerce Technical Papers, 'Online!, Jan. 1, 2000, XP002208026, http://www.research.ibm.com/iac/papers/lee.pdf, retrieved on 2000.
Zaiane O. R. et al., “Discovering Web access patterns and trends by applying OLAP and data mining technology on Web logs,” Research and Technology Advances in Digital Libraries, 1998, ADL 98, Proceedings, IEEE International Forum on Santa Barbara, CA, US, Apr. 22-24, 1998, Los Alamitos, CA, USA, IEEE Compt. Soc, US, Apr. 22, 1998, pp. 19-29, XP010276880.
International Search Report mailed Nov. 8, 2005 for International Application No. EP01922473.
Srivastava, J., et al. “Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data” ACM SIGKDD Explorations Newsletter, vol. 1, Issue 2, pp. 12-33, Jan. 2000.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Systems and methods for user identification, user... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Systems and methods for user identification, user..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for user identification, user... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3897911

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.