[go: nahoru, domu]

USRE45351E1 - Method and apparatus for selectively sharing and passively tracking communication device experiences - Google Patents

Method and apparatus for selectively sharing and passively tracking communication device experiences Download PDF

Info

Publication number
USRE45351E1
USRE45351E1 US13/893,992 US201313893992A USRE45351E US RE45351 E1 USRE45351 E1 US RE45351E1 US 201313893992 A US201313893992 A US 201313893992A US RE45351 E USRE45351 E US RE45351E
Authority
US
United States
Prior art keywords
user
tracking data
tracking
data
buddies
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime, expires
Application number
US13/893,992
Inventor
Darren P. Briggs
Brady O. Bruce
Michael W. Mitchell
Emile L. Reed, IV
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Curtis Scott D
Helpingstine Michael W
Ikorongo Texas LLC
Svendsen Hugh B
Svendsen Sarah S
Original Assignee
Tena Technology LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=36659239&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=USRE45351(E1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Tena Technology LLC filed Critical Tena Technology LLC
Priority to US13/893,992 priority Critical patent/USRE45351E1/en
Priority to US14/550,100 priority patent/USRE48904E1/en
Priority to US14/577,746 priority patent/USRE47704E1/en
Application granted granted Critical
Publication of USRE45351E1 publication Critical patent/USRE45351E1/en
Assigned to CONCERT DEBT, LLC reassignment CONCERT DEBT, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TENA TECHNOLOGY, LLC
Assigned to CONCERT DEBT, LLC reassignment CONCERT DEBT, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TENA TECHNOLOGY, LLC
Assigned to CONCERT DEBT, LLC reassignment CONCERT DEBT, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CONCERT TECHNOLOGY CORPORATION
Assigned to CONCERT DEBT, LLC reassignment CONCERT DEBT, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CONCERT TECHNOLOGY CORPORATION
Assigned to Ikorongo Technology, LLC reassignment Ikorongo Technology, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TENA TECHNOLOGY, LLC
Assigned to Ikorongo Technology, LLC reassignment Ikorongo Technology, LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CONCERT DEBT, LLC
Assigned to Ikorongo Technology, LLC reassignment Ikorongo Technology, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CONCERT DEBT, LLC
Assigned to IKORONGO TEXAS, LLC reassignment IKORONGO TEXAS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CURTIS, SCOTT D, FARRELLY, EUGENE, HELPINGSTINE, MICHAEL W, SVENDSEN, HUGH B, SVENDSEN, SARAH S
Assigned to SVENDSEN, HUGH B, SVENDSEN, SARAH S, CURTIS, SCOTT D, FARRELLY, EUGENE, HELPINGSTINE, MICHAEL W reassignment SVENDSEN, HUGH B ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Ikorongo Technology, LLC
Adjusted expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0255Targeted advertisements based on user history
    • G06Q30/0256User search
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching

Definitions

  • the Internet has opened up new channels of communication and vectors of influence over decision-making.
  • Web sites, peer-to-peer technologies, e-mail and instant messengers are new communication technologies, which have major impacts.
  • the present invention includes methods and devices for sharing communication device usage experiences, including computer usage experiences. Particular aspects of the present invention are described in the claims, specification and drawings.
  • FIG. 1 is a block diagram of interrelated components of systems practicing aspects of the present invention.
  • FIG. 2 is a user interface for logging in or creating a new account.
  • FIG. 3 is a user interface for providing access to system features.
  • FIGS. 4 and 5 are user interfaces for inviting a “buddy” to join in practicing aspects of the present invention.
  • FIGS. 6 and 7 are user interfaces for sending a buddy an item.
  • FIGS. 8A-8D are aspects of a user interface for administration of a buddy list.
  • FIG. 9 is a user interface for viewing activity of buddies. The interface illustrated applies as well to viewing of other item or location related data.
  • FIG. 10 is a user interface for viewing a so-called hits list, combined with a user interface for viewing activity.
  • the interface illustrated applies as well to viewing of other item or location related data.
  • FIG. 11 is a user interface for viewing details regarding particular items. This user interface is combined, like FIG. 10 , with a user interface for viewing activity.
  • FIGS. 12 - 14 is 12A, 12B, 13, and 14 are flowcharts illustrating the capture of URL related data from a user. The actions illustrated by these flowcharts apply as well to capture of other item or location related data.
  • FIG. 15 is a flowchart of automated updating of a visited URL database (“VUD”), with exception processing. The actions illustrated by these flowcharts apply as well to updating of databases reflecting captures of other item or location related data.
  • VUD visited URL database
  • FIG. 16 is FIGS. 16A and 16B present a flow chart flowchart of an activity viewer. The actions illustrated by these flowcharts apply as well to viewing of other item or location related data.
  • FIGS. 17-19 are flow charts of buddy list and access control list (“ACL”) administration.
  • FIGS. 20-21 is flow charts of access control list interface actions.
  • FIG. 22 is a flow chart of the batch and custom query processes.
  • FIG. 23 extends aspects of the present invention to wireless devices, such as cellular telephones and pagers.
  • FIG. 24 is a flow chart of populating the visited location database (“VLD”).
  • a common theme among aspects of the present invention is collecting data regarding a user's computer usage experience and sharing that data. So-called “buddies” identified on buddy lists of instant messaging products can share selected aspects of their computer usage experiences. Administrative tools and processes can be provided to set up selective collection and sharing of data. Collection tools and processes operate on a variety of computer usage activities and user responses to their computer usage experiences. Processing tools and methods filter, integrate and correlate the collected data. Display tools and processes make portions of the data accessible on a pre-defined basis, such as according to defined rights of buddies. Aggregation tools and processes assemble statistics about user experiences across different bases, such as buddy lists, categories of users, and all service participants.
  • VUD visited URL database
  • a VUD stores URLs visited by users, or by participants. More generally, a user could visit a web site, listen to or watch content, rate a site or content, assign an emoticon or quick comment to a site or content, send or bookmark a site or content or download data; a VUD entry could result.
  • a rating may be thumbs up or thumbs down or its equivalent, a scaled alpha or numeric rating or its equivalent.
  • Quick comments may be user defined and later accessible through a menue, ush as a pull-down menu.
  • the database stores additional information such as page title, address, description, categories applicable to the URL, metadata, names of users accessing the URL, timestamps of visits, ratings of the URL, emoticons evaluating the URL, comments on and bookmarks to the URL, or keywords for retrieval.
  • the page title, address, description and metadata may be ascertained from visiting the URL itself. With assistance of the URL's author, metadata may include suggested categorization.
  • categorization may be provided by an existing content analysis provider, such as Yahoo or the Open Source Directory Project at www.dmoz.org 1506 .
  • content could be categorized by a service provider or other sponsor, either for web content or for intranet, extranet or other network content.
  • VLD visited location database
  • a VLD stores similar information for locations visited by users or participants carrying portable devices. For instance, a Bluetooth equipped cell phone or pager could interact with a location that a user entered. Walking in the door of a popular restaurant, nightclub or other location could trigger an interaction between a Bluetooth device and a Bluetooth access point sponsored at the location.
  • the Bluetooth device could learn the location visited and report that location immediately or later when the device returned to the proximity of a home access point or the device docked with a home access point.
  • the Bluetooth device could disclose its identity to a Bluetooth access point at a particular location and the access point could report the visit.
  • the user of the Bluetooth device could have the same options for providing additional information regarding the location, as for URLs.
  • the VLD also could store geographic information regarding the location. such as geo-coded data.
  • Sophisticated networks may fingerprint, triangulate or otherwise locate a wireless device based on radio signal characteristics.
  • Sophisticated devices may include circuits that determine the device's location; these circuits may utilize GPS, DGPS, Loran or any other location fixing protocol. The physics of how the device and the location are associated are relatively unimportant; an independent service may be used to track locations visited by a user based on any of the protocols identified above or any other protocol.
  • VUD and VLD databases are readily extended to a visited item database 100 , which could include items on a computer, intranet, extranet or any network. These items may be data such as multimedia files, XML documents, database searches or virtually any other material.
  • a visited item database 100 which could include items on a computer, intranet, extranet or any network. These items may be data such as multimedia files, XML documents, database searches or virtually any other material.
  • One distinction between practicing aspects of the present invention and general database processing is storing user-based information, such as the user's pattern of visiting and the user's rating, emoticon or comments regarding an item and making stored, user-based information available to buddies.
  • VXDs Collectively, VUDs, VLDs and visited item databases can be referred to as VXDs. Reference to one of the three VXDs is intended to refer to all three, unless the context makes it clear that only one of the three applies.
  • Access control lists (“ACLs”) 102 , 103 , 104 , 1609 also can be maintained as databases.
  • An ACL identifies buddies and controls their access to VUD, VLD, visited item and other activity-related data.
  • a user could set up his or her own ACL via buddy list and access control list administration functions.
  • An enterprise could set up ACLs for enterprise users.
  • ACL-like data complied for instant messaging products could be accessed and utilized to compile ACLs for users or enterprises.
  • a URL logo database (“ULD”) 101 can be useful for associating logos with web sites.
  • the logos may be sponsors, advertisers or others who provide support for operation of a service practicing aspects of the present invention.
  • Item categorization for VUD, VLD or visited items can generate exception databases, such as an item match exceptions database (for instance, a URL match exceptions database (“UMED”) 1505 ) or a topic match exceptions database (“TMED”) 1507 .
  • exception databases record data which require further attention after initial processing to update the VUD, VLD or a visited item database.
  • An activity viewer database (“AVD”) 1610 can store information associating particular users with URLs, locations or items. Raw data regarding user activity is filtered and matched with entries front the VUD, VLD or visited item database to create the AVD. The AVD holds users' activity parsed into a format for display via the Activity Viewer. It includes the activity, internal flag settings, the URL, the page title, the logo, the username, the timestamp & category for an entry. If a user filters the display of data on the Activity Viewer, data is pulled from this database.
  • Batch query results can be stored in a database, a “BQD” 2211 .
  • Pre-defined queries can be run against the VUD, VLD or visited item database. For instance, top 10 hits, top 50 hits or top 100 hits in a wide range of categories are most efficiently recalculated periodically on a batch basis, rather than in response to ad hoc inquiries.
  • Third party location detection data can be stored in a detection network directory 2312 .
  • Third party data can be provided as received, on an interrupt-like basis, or in response to periodic requests, on a polling or batch basis.
  • Location categorizations and descriptions 2413 e.g., Yellow Pages.Com, AutoDesk, etc. can be used to provide supplemental information about locations.
  • Location/topic entries which require further attention, after processing to update the VLD can be stored in another match exceptions database, a “LTMED” 2414 .
  • One aspect of practicing the present invention can include tying into a user's instant messaging products or, more generally, into the user's messaging facilities.
  • instant messaging users or participants typically set up so-called buddy lists. Other users or participants agree to participate in instant messaging.
  • One IM user can send an instant message to another IM user, if their IM products are compatible. The two can carry on a dialog or a so-called “chat”. More than two users may be included in a real-time chat, when the instant messaging product allows multiple participants.
  • Examples of instant messaging products include AOL's Instant Messenger software, MSN Messenger software, Yahoo! Messenger software, America Online's ICQ software, Odigo's instant messenger software and Jabber's instant messenger software. Reciprocal inclusion on buddy lists typically involves a closer relationship between participants than inclusion on an e-mail mailing list or directory, but tins is not necessarily the case. Buddy lists sometimes are shorter and more selective than general messaging lists or directories.
  • the present invention also may be applied to a user's messaging facilities by selectively enabling others listed on a general e-mail or messaging list or directory to participate. Selectively enabling others limits the intrusion on a user's privacy and limits various administrative (e.g., setup and administration) and responsive (e.g., junk mail) burdens.
  • group functions used for other e-mail or messaging purposes can be a basis for defining rights to sharing of activity data.
  • FIG. 1 is a block diagram of interrelated components of systems practicing aspects of the present invention.
  • Tracked activity may include Internet activity 120 , wireless network location track and interaction activity 121 and enterprise intranet activity 122 . Activities tracked in these domains may include view, listen, rate, comment, assign emoticon, send, watch, download, bookmark or visit.
  • a user views a URL, watches a visual presentation and listens to an audio presentation.
  • a user visits a restaurant or other location.
  • a user who views, watches, listens or visits may respond to their experience.
  • a user's response may be to rate, comment, assign an emoticon, send information to a buddy, download data or bookmark an item for later access.
  • Data stored regarding an experience may include VUD, VLD or VXD databases 100 , a logo database for URLs, locations or items 101 and a variety of ACL databases.
  • the access control lists can be maintained at the service provider level 104 , the enterprise level 102 or the individual user level 103 .
  • Data 130 reflecting individual experiences and aggregated experiences can be accessed or reported in a variety of ways.
  • An activity viewer running on a user's system 131 can appear in a window. Reports on locations, either the experiences of others visiting the location or the proximity of buddies or buddies of buddies can be reported automatically to Bluetooth enabled wireless devices 132 when such devices reach a location or are in contact with a location-sponsored Bluetooth access point. Wireless devices can be synchronized 133 when reasonable bandwidth is available to retain data that would be too voluminous to access via a low bandwidth connection.
  • the interfaces of instant message tools 134 can serve as an output channel, as licensing arrangements become available.
  • Physical reports 135 can be printed for analysis. These reports can cover analysis of interactions among participants and spreading of information from one user to others.
  • FIG. 2 is a user interface for logging in or creating a new account.
  • separate fields can be provided for user name 251 and password 254 . In other embodiments, these fields could be combined.
  • a user may select a sign on link 253 or press the enter, return key or other key or may take another action such as speaking a command or winking an eye, which triggers processing of the completed fields.
  • a link is provided for creating a new user 252 , which may be on demand or subject to an approval process.
  • a new user can either be a new name for a registered user or a new registration.
  • a user who forgot their password may use one of the commonly employed password recovery schemes, by selecting a forgotten password link 255 .
  • An additional link for new user registration is provided 256 .
  • the system implements a strict, anonymous access privacy policy and does not collect any information about the user which could be used for identification of the user or compilation of a database of user-identified activities.
  • the user can chose the amount of information that the user provides and corresponding services that are enabled by providing information such as an e-mail address.
  • the system can publish a range of privacy policies, including a default, and ask the user to opt-in to a specific privacy policy, which may include providing the user's name or e-mail address to a handful of select vendors that have products responsive or keyed to the user's shared activities.
  • FIG. 3 is a user interface for providing access to system features.
  • the embodiment illustrated is a relatively low profile access window.
  • a lower profile access window can be provided via an icon that is visually accessible, such as a floating menu bar having an always on top attribute or an icon in a system tray. Pressing a hot key is an alternative way to bring an access window into view.
  • the access window illustrated in FIG. 3 has many features, which can be included in a wide variety of combinations.
  • the service provider logo 360 doubles as providing access to features not immediately visible. These features may include maximize, minimize, quit or selection of a particular display format.
  • a current selection 361 identifies a current context, such as viewing an aggregated list of the best Hip Hop music of 2000.
  • Rating choices 362 such as thumbs up and thumbs down or emoticons allow a user to instantly express their view regarding the current context with a simple action, such as a single click of a mouse.
  • a user who wants to say more about their experience can select a comments button 363 to activate a window for entering comments.
  • a scroll button 364 also supports entry of free form comments, definition of user comments, selection from among user comments, or selection of emoticons, either system supplied or user defined emoticons. When the scroll button 364 is used, the default item may change from “comments.”
  • Other button choices 363 can be provided to a user, in addition to comments, such as emoticons or sending the current context to one or more buddies.
  • a send button 365 is immediately accessible and activates a window for selecting recipients of information from the current context.
  • the current context may be a list or a particular item, either front a hit list or the like or from the user's own activities.
  • the sharing status toggle 366 allows a user to turn sharing on and off.
  • rights defined in the ALL provide access for buddies to the user's activity.
  • sharing is off the user's activity will not be shared with buddies. However, the user's activity may still be recorded to a tracking server either for aggregation or to be associated with the user but not reported to buddies.
  • the user's options or access to information may be limited when sharing is off, tending to encourage the user to leave sharing activated.
  • the window maximize control 367 allows direct access to maximizing the window to a pre-selected format.
  • This interface includes space for a banner 368 (either static or moving), an invite button 369 , a hot list access 370 , a search entry window 371 and a search button 372 .
  • the banner could be used to generate advertising revenue.
  • the invite button 369 provides access to an invite interface such as FIG. 4 .
  • the hot list access 370 provides access to one or more options and access formats for aggregate ratings of items. The ratings may reflect the frequency of access to an item or rating scores assigned by users. The rating scores may be thumbs up/down or any of the other scoring approaches mentioned above.
  • the search entry window 371 accepts text and logical connectors.
  • the find button 372 can be implemented to search titles of items accessed by participants, content of such items, the Internet, an intranet or another domain of interest.
  • FIGS. 4-5 are aspects of an interface for inviting others to become buddies.
  • FIG. 4 is one of many possible initial invitation interfaces.
  • An instant messaging select button 473 allows a user to identify an instant messaging product which maintains a list of buddies who can be invited to join a group.
  • a network directory such as a Novell, NT or Windows 2000 server directory of users may be accessed instead of an instant messaging product.
  • an e-mail system user directory may be accessed for users to invite.
  • Group membership for enterprise implementations alternatively may be administered by a security department, instead of individual users.
  • a scroll button 474 allows a user who has more than one source of lists, such as more than one instant messaging product, to select the user to be invited.
  • the screen name window 475 accepts a text string. It may provide assisted field completion, including a list of near matches.
  • the screen name may be a name.
  • the screen name may be a number which ties to a name, which may be locally unique or not unique at all.
  • FIG. 5 is an invitation follow-up interface.
  • the invitation process may query the user to determine whether an invitation was sent successfully. This interface provides a user with three alternative responses. If the instant message transmission was successful, the user indicates “yes” 582 . If the user attempted the instant messaging invitation, but the buddy was not available, the user may press the e-mail link 581 . Alternatively, the user may elect to invite the buddy again later 583 . Then, the buddy's name will appear on a buddy administration list ( FIG.
  • the system may allow a user to clink on an entry in a list and resend the invitation, preferably when the invitee is on line.
  • the IM product may assure delivery of the message when the recipient is not instantly available.
  • the IM product may provide direct feedback to the activity sharing processes, so that an invitation or other follow-up interface appears only when needed and so that the user never needs to confirm that an invitation or item was successfully sent.
  • FIG. 6 depicts an interface for sending an item to a buddy.
  • This interface may be invoked, for instance, by selecting the send button 365 .
  • the item being sent is identified 691 .
  • the item identification 691 may be linked to the item, a pulldown menu of items recently viewed or recently sent, or to a dialogue for selecting an item to send.
  • the user selects between sending the item, a link to the item or other item-related information to a buddy who has enrolled to share activity data or to a person listed as an instant messaging buddy.
  • the user might select an addressee from a network registry of users or an e-mail list.
  • a personal note 695 may be sent along with an item.
  • the system may be configured so that the personal note is not retained on the tracking server or so that it is retained.
  • the send item button 696 signals that the items should be sent.
  • the cancel button 697 indicates that the item is not to be sent. Either the send or cancel button can be accompanied by a confirmation screen.
  • FIG. 7 is a confirmation interface for items sent. The three choices are as in FIG. 5 : to confirm that the message was sent 799 “yes”; to resend the item by e-mail 798 ; or to queue it to be resent later 799 “later.”
  • FIGS. 8A-8D depict interfaces for administration of buddy lists.
  • the embodiments depicted are adapted to integration with instant messaging products. Slightly different embodiments would be better adapted to e-mail or other types of messaging facilities, such as Lotus Notes.
  • FIG. 8A depicts one embodiment of a buddy list.
  • a link is provided 851 for inviting a new buddy.
  • An alternate link for adding a user may appear in the list of buddies 856 .
  • the columns provided in this embodiment include a tick box 852 , a buddy name 853 , and one or more instant messaging contact links 854 .
  • the tick box 852 may be used to delete several selected buddies.
  • the buddy name column 853 includes both buddy names and options to resend an invitation or add a new user.
  • the buddy names may be active links which lead to additional interfaces, such as those depicted in FIGS. 8B-8D .
  • the contact column 854 lists one or more instant messaging contact links.
  • the extension following the link may identify a particular instant messaging tool.
  • the link may be in the form of the user ID applicable to a particular instant messaging tool.
  • This interface also includes a link for deleting selected buddies 857 and for indicating completion of buddy list administration 858 .
  • FIG. 8B is another of the buddy list administration interfaces.
  • the name of the buddy being profiled appears as a header 861 .
  • a group of buddies may be administered.
  • Related buddy administration screens include a buddy overview screen 862 , contact information 863 , topic sharing rights 864 and file sharing rights 865 .
  • the user may either view 866 or edit 867 information regarding a buddy or group of buddies. More information can be obtained by clicking a link 868 .
  • a particular instant messaging tool is selected 869 and instant messaging ID is entered or selected 870 .
  • a user may select a link for adding additional links 871 .
  • the interface adds more rows, including more options for instant messaging tools and messaging ID's 872 , 873 . More than one instant messaging ID may be assigned to a buddy for a particular instant messaging tool.
  • the user selects the save changes link.
  • FIG. 8C uses tick boxes to select files or folders to be shared by default. Both default and particular user or user group administration is supported. Tick boxes 881 and directory or file names 882 can be used. Additional files or folders can be added to a list 883 . Alternatively, a Windows Explorer-style file directory tree can be used to select files and directories, as is done for backing up and restoring files or directories. Additional fields and links in FIG. 8C have the same placement and usage has in FIG. 8B .
  • FIG. 8D is a topic sharing interface. Both default and particular user or user group administration is supported. Tick boxes 891 and topic or sub topic names 892 can be used. Additional topics can be added to a list 893 . Alternatively, a browser-style bookmark tree can be used to select topics. Additional fields and links in FIG. 8B have the same placement and usage as in the previous figures.
  • FIG. 9 is a user interface for viewing activity of buddies.
  • the interface illustrated applies as well to viewing of other item or location related data.
  • Tab 963 indicates that the activity-viewing mode of the interface is currently active.
  • Other tabs may be provided for people 962 , files 964 , messages 965 or summaries 966 .
  • the people tab 962 may invoke buddy list administration.
  • the files tab 964 may invoke a hierarchical representation of the user's file system and selection boxes for designating directories and files, relative to particular buddies.
  • the buddy may appear as columns adjacent to the file system representation or with a separate list, with selection boxes for users to be associated with particular rights.
  • the message tab 965 may provide access to a message repository.
  • Button 961 provides access to commands such as minimize, maximize, always on top, etc., which were previously discussed in the context of FIG. 3 .
  • the sharing button and indicator 967 behaves as previously described, also in the context of FIG. 3 .
  • additional controls are provided in a row below the tabs and sharing button.
  • Three filters 971 , 972 and 973 are provided.
  • the who filter 971 specifies whose activity is of interest: for instance, all buddies or a user-defined group of buddies.
  • the topic filter 972 selects one or more pre-defined topics.
  • the view filter 973 allows viewing of all or selected portions of a participant's activity by topic. For instance, only items bookmarked or sent to others may be of interest, in a domain having substantial activity.
  • a keyword search is in effect a fourth filter, including the search term window 974 , the find button 975 and the advanced find button 976 .
  • FIG. 9 Several rows of information responsive to the filters 971 - 976 appear in FIG. 9 .
  • the columns of information displayed for each row include who 981 did 892 what 984 where 985 in what topic area 982 when 988 . Ratings 986 and comments 987 also may be provided.
  • This interface can convey a substantial amount of information compactly.
  • the who column 981 may use short labels, especially when the buddy list is short or subgroups of buddies are created.
  • the did column 982 is compactly represented by an icon, from a recognizably short list of activity types.
  • the icons depicted in this figure may signify viewing, visiting and sending items. Each of the activities mentioned above may be assigned an icon.
  • the topic column 983 also is compactly represented by an icon.
  • the variety of topics may be larger than the variety of activities.
  • a user may need to access more detailed information about an activity in order to understand the topic involved. This detailed information may be available through the topics filter 972 or by selecting a particular line including the icon.
  • the what column 984 is an informative title for the item identified. For a URL, a page title may be more informative than the URL. Accordingly, page titles may be stored for URLs, to guard against loss of the page title when a content provider updates the page. Similarly useful shorthands for other types of items may be used. For instance, the name of a restaurant may be used instead of its Bluetooth access point address.
  • the where column 985 is an opportunity to display banners, which may generate user impressions and revenue.
  • Display of banners may be limited to vendors who pay a fee for preferential banner display.
  • the rating column 986 may use a graphic, a color or a symbol to indicate a rating. In this embodiment, icons for thumbs up/down are depicted.
  • the thoughts column 987 may support either free text comments or pick-list comments such as emoticons or user-defined quick comments.
  • the when collum 988 records a date and time of an activity.
  • a send button 989 is included. In this embodiment, it appears as a large button on a bottom row, instead of as an icon near the sharing button. Row select commands, such as mouse-click, shift mouse-click and control mouse-click can be used to select one or more rows prior to selecting the send button.
  • FIG. 10 is a user interface for viewing a so-called hits list, combined with a user interface for viewing activity.
  • the interface illustrated applies as well to viewing of other item or location related data.
  • the bottom part of this interface combines features found in FIGS. 3 and 9 .
  • Much of the two rows 1070 is taken from FIG. 3 .
  • the who filter 1081 is from FIG. 9 .
  • the item rows 1071 are generally as in FIG. 9 , with an added column for send buttons 1082 .
  • Next and previous buttons 1084 , 1085 are provided for scrolling through activities.
  • the top part of the FIG. 10 interface is a hits list.
  • the title line 1051 identifies the category of hits, in this instance a Top 10 list.
  • Filter buttons are provided for activity type 1052 , group of persons sampled 1053 and location of persons sampled 1054 . When the desired filters are selected, the submit button 1055 signals for the screen to be refreshed.
  • Three columns of information about these 10 hits are provided in this embodiment: rank 1061 , what 1062 and where 1063 . These columns have been explained above, except the ranking, which is ordinal. The coincidence in this example between data lines in the top 10 list and in the activities is unlikely ever to occur at random in actual use; the repeat of the same lines twice in a top 10 list also is unlikely to occur in actual use.
  • FIG. 11 is a user interface for viewing details regarding particular items. This user interface is combined, like FIG. 10 , with a user interface for viewing activity.
  • the bottom part of this interface, 1070 , 1071 is as in FIG. 10 .
  • the top part includes two windows: 1151 through 1154 and 1155 through 1167 .
  • the larger frame in the top part displays search results, annotated with buddy-related information.
  • the search string appears at the top 1155 along with summary search statistics 1158 .
  • Both category results 1156 and individual items have been returned in this example.
  • One category 1156 has been returned.
  • Three items responsive to the search have been returned, each beginning with a title 1157 .
  • Information for an item may include a buddies rating 1161 .
  • the number of buddies of the user who have commented on the site is indicated parenthetically. A summary “thumbs up” is indicated and a percentage of favorable ratings appear. (In actual use, 78% would not be reported from a sample of three ratings.)
  • other group ratings can be reported. In this instance, ratings aggregated against all registered users 1162 are reported.
  • the second group could be user selected. In an enterprise implementation, it could be a division, subsidiary, a whole enterprise or any other predefined group.
  • the ratings 1161 , 1162 need not be up-to-the-moment ratings, they may be compiled periodically in a batch mode.
  • the information for an item may include a site furnished text 1163 , a review furnished description 1164 , one or more categories applicable to the item 1165 and links for retrieving a cached copy 1166 or similar pages 1167 .
  • the cached copy retrieval 1166 may be an alternative to retrieving a live copy of the item 1157 , which is useful when an item is deleted or moved after it is indexed.
  • the inset to FIG. 11 , 1151 - 54 is intended to provide detailed information related one or more of the items displayed.
  • the columns of detailed information in this embodiment include who 1151 , when 1152 , rating 1153 , and comments or emoticons 1154 . If there are more users then can readily be displayed in a single inset, previous and next buttons can be used to scroll through a list. Alternatively, the list can be sized into a larger window. The list also could be filtered to select particular buddies or groups of buddies, date ranges, ratings or comments. The names of individual users and their comments can be linked to additional information or functions related to the individual and to the detailed free text comments.
  • FIGS. 12-14 are a flowchart illustrating the capture of URL related data from a user. The actions illustrated by this flowchart apply as well to capture of other item or location related data.
  • FIGS. 12 and 13 are linked by the capture/track connector 1233 .
  • FIGS. 13 and 14 are linked by the file & item connector 1355 .
  • the flow in FIG. 12 begins with start 1201 .
  • the user may visit a URL 1202 utilizing any browser, from a PC, telephone, PDA or other device. Others processes described in the context of visiting or viewing a URL, it may be applied to other item types as well.
  • the URL visited is captured 1203 . This capture may be accomplished via a browser plug-in, an independently running process, or in a variety of other ways.
  • a page title or other descriptive text may be captured in addition to the URL address.
  • the page title or other text is stored in a temporary variable, along with a timestamp and a user ID.
  • the capture process next has to determine whether in the user's sharing status is on 1204 . If the sharing status is off 1205 , the system sets the status of the item to private. In other embodiments, the system might all processing of the item. If the sharing status is on 1206 , the system sets the status of the item to public. After the status is been sent, the process tests to determine whether metadata associated with the URL provides a page title 1207 . If not 1208 , the system stores a null indicator in a temporary variable.
  • the system stores the page title in a temporary variable.
  • the system next compares the URL to entries in the VUD 1210 . If the URL is found in VUD 1211 , the system has to determine whether a page title is stored on the VUD 1221 . If there is a page title on the VUD 1222 , the system action depends on whether the page title variable has been set to null. If not, the system over writes the value on the VUD with the value of the temporary page title variable 1224 . If the temporary page title variable is null, the page title stored on the VUD is used 1223 . Next, the system determines whether the URL has been categorized on the VUD 1225 .
  • the system sets a temporary category variable to uncategorized 1227 . This is the same action that the system takes in the URL is not on the VUD 1211 . If the URL has been categorized on the VUD, the system sets a temporary category variable based on the contents of the VUD 1226 . The system checks to determine if the URL or a portion of the URL is logged in a logo database 1228 . The logo or ULD database 101 holds vendor logo images that correspond to the vendor's URLs. If the vendor has not arranged for its logo to be stored on the VLD 1229 , the system sets the temporary local variable to null 1231 . If there is a corresponding logo, the temporary variable is set to the corresponding logo image 1230 . The system sets a temporary activity variable to view 1232 , corresponding to viewing a URL. The flow continues in FIG. 13 .
  • FIG. 13 depicts processing of URLs behind the interfaces presented above.
  • the user has several options after viewing a URL. Viewing the URL triggers background activities depicted in FIG. 12 . While the user is viewing the URL, system monitors for activity 1341 . If no activity is detected 1342 , monitoring continues. When activity is detected, the system determines the type of activity 1343 , 1345 , 1347 , 1349 , 1351 , 1353 . When the user moves to a new URL 1343 , the values stored in temporary variables for the old URL are added to the VUD 1344 . The new URL is processed in accordance with FIG. 12 . When the user selects an emoticon 1345 , the system processes the user's selection 1346 .
  • the system may associate either a predefined emoticon with the URL or it may associate a user-defined emoticon with the URL. These values may be stored in a temporary variable until the user moves to a new URL or another user activity triggers storing data to the VUD.
  • the system processes the free text 1348 . It associates a text string with the URL at a temporary location, which can later be transferred to the VUD. The system then resumes monitoring for URL activity 1341 .
  • the user selection of rating 1349 is processed 1350 in much the same way as an emoticon. In the embodiment described here, the rating is either thumbs up for thumbs down, a binary rating.
  • Multi-value ratings can also be processed, such as a scale of 1 to 5, 1 to 7, or 1 to 9.
  • the system then resumes monitoring for URL activity 1341 .
  • Choosing the send button 1351 causes two processing steps 1352 .
  • One or more items in the current context are sent to a buddy and the activity of sending the items is reported to a tracking server to be recorded in the VUD.
  • the system then resumes monitoring for URL activity 1341 .
  • Processing that follows detection of a bookmark activity 1353 is similar to processing of a send activity. Either the instant messaging product or the system may process the actual creation of the bookmark.
  • the activity of creating the bookmark is reported to a tracking server to be recorded in the VUD 1354 .
  • the system then resumes monitoring for I/O activity 1341 .
  • Other activities are processed as depicted in FIG. 14 .
  • a variety of activities may be associated with items other than URLs.
  • the user may listen to or watch the item 1461 , download the item 1463 , purchase the item 1465 , put the item on a wish list 1467 , transfer the item to a mobile device, such as a cell phone or PDA 1469 , or select some other process 1471 .
  • a mobile device such as a cell phone or PDA 1469
  • an unrecognized activity may occur 1473 , which the system may either ignore or treat is an error condition.
  • a listen to or watch activity 1461 causes the system to invoke a player and to record the action and properties of the item listened to or watched 1462 . The recorded information is forwarded for addition to the VUD.
  • a download activity invokes a process, which records the download action and properties of the item downloaded 1464 .
  • the recorded information is forwarded for addition to the VUD.
  • a purchase activity 1465 invokes a process 1466 , which records the purchase action and properties of the item purchased.
  • the recorded information is forwarded for addition to the VUD.
  • a wish list activity 1467 invokes a wish list process 1468 to maintain and add to the user's wish list.
  • the wish list can be maintained as part of the VUD or in a separate database. The information can be maintained redundantly as part of the VUD and as the result of a batch query.
  • the system invokes a process for sending the information to the mobile device, records the action and properties of the items sent to the mobile device, and forwards the recorded information for addition to the VUD 1470 .
  • the processing of each of these activities in FIG. 14 with the possible exception of error processing 1473 , leads back to monitoring for activity 1341 .
  • FIG. 15 is a flowchart of automated updating of a visited URL database or VUD, with exception processing.
  • An automated VUD updating routine 1511 updates keywords and metadata 1512 and topics 1513 .
  • the input for updating is a set of VUD update records from processing of user activity. Updating 1514 may take place and real-time or on a batch basis.
  • the updating of keywords and metadata utilizes a URL spider and an external search engine index to gather URL indices, keywords and metadata for each VUD entry being updated from the Internet 1522 . Unmatched entries are stored in an exceptions database 1505 and an exception report 1521 is generated.
  • Data in the exceptions database (“UMED”) may be manually added to the VUD. These exceptions also can be reprocessed for instance, if Internet access is restored or improved. Additional processing takes place to update topics associated with VUD entries 1513 .
  • the system compares VUD entries against one or more external URL categorization databases, such as the database provided by the Open Source Directory Project (www.dmoz.org). Matches are processed for addition to the VUD. VUD entries that do not match are marked as on categorized and stored in an exceptions database 1507 .
  • Data in this topic exceptions database (“TMED”) may be added manually to the VUD or reprocessed any time. Additional items to the exceptions database may cause an exceptions report 1523 to be generated.
  • FIG. 16 is a flow chart of an activity viewer. The actions illustrated by this flowchart apply as well to viewing of URL, other item or location related data.
  • the activity display population routine 1621 supports the interface 1629 , which previously has been discussed in the context of FIG. 9 .
  • the system keys 1622 on fields which provide access to the relevant database, such as the VUD, VLD 100 or VXD. For VUD entries, user ID and topic may be used as a key. Alternatively, the key may be fields which match filters available to or selected by the user. For a visited location, user ID and location or action may be used as a key.
  • the system 1622 matches data from the relevant database 100 with the user ACL database 1609 . This matching may run periodically on a schedule set by the system administrator or it may run on demand.
  • Matched data items are buffered 1623 .
  • the system checks for the existence of a logo on the location logo database (“LLD”) 1608 . Processing depends on whether or not a logo exists 1625 . If it exists, the system sets a temporary variable corresponding to the logo image retrieved from the database 1626 . Otherwise, the logo space is left blank.
  • Each matched entry is added 1627 to the corresponding shared users file within the activity viewer database (“AVD”) 1610 .
  • the system populates activity viewers of logged-in users by pulling entries from the AVD 1628 .
  • User ID, action, item, location, category, rating, emoticon, comment, time, or other relevant field may filter the displayed data from the AVD.
  • the activity viewer of the user refreshes the activity display automatically. The frequency for this refresh may be set by a system administrator and may be modified by the user.
  • FIGS. 17-19 are flow charts of buddy list and access control list (“ACL”) administration.
  • ACL access control list
  • the after the administration processes invoked 1721 the process tests to determine whether the user of the system is a new user 1722 .
  • a new user may either be invited or not 1725 .
  • An invited user is prompted to a start their buddy list with the person who and issued the invitation 1731 . If the new user adds the person who invited them 1732 , the new user optionally defines access rights 1735 .
  • the system sets flags for new and invited status to “no” 1736 .
  • the system adds the buddy and associated information in the user's buddy list to the ACL 1734 and loops back to the start 1721 with the user flagged as not new.
  • an error message is displayed indicating that at least one buddy must appear on a buddy list 1726 .
  • the user is routed to an add buddy screen 1733 .
  • This add buddy screen 1733 also may be reached by a non-new user who has an empty buddy list 1723 through the invite buddy error message 1726 or after the non-new user is shown their current buddy list 1724 and elects 1727 to add additional buddies. Processing of a non-new user who declines to add additional buddies proceeds to 1728 , in FIG. 18 .
  • the system checks the user's IM tool flags to determine which instant messaging tools are available and to provide an adapted message to the user 1734 .
  • the user's options 1738 may include asking for more information, canceling the addition of users or selecting an instant messaging tool such as AIM user, ICQ user, Odigo user or Yahoo IM user.
  • the user may be required to confirm my pressing an OK button after selection of an instant messaging tool. If the user presses OK 1741 , instead of cancel, the system tests to determine whether the user requests more information 1742 and provides an information screen 1745 upon request.
  • the system also tests to determine whether the user requests shared topics information 1743 and provides an information screen 1746 on request.
  • the system tests determine whether the user has selected one of the instant messaging options 1744 . If not, the system loops and waits 1741 . If an instant messaging tool has been selected, the system determines which class of instant messaging tool has been selected 1752 . For some instant messaging tools, the system displays a name field 1754 and prompts the user to enter a name 1756 . For other instant messaging tools 1751 , the system displays a user number field and prompts the user to enter a buddy number 1753 . For both classes of instant messaging tools 1755 , the user optionally defines access rights. Processing then continues to test for inviting a new buddy 1757 , as described in FIG. 19 .
  • FIG. 18 includes logic for editing entries in the buddy list, following other processing 1728 .
  • the system checks to determine whether one or more buddies have been selected 1861 . If not, processing 1862 returns to a previous screen. If a buddy has been selected, processing depends on the number of buddies in the list 1863 . If there are one or fewer buddies in the last 1864 , the system activates only the end button. If there is more than one buddy in the list 1866 , the system activates edit and remove buttons. The remove button is not activated for one or fewer buddies, as the system requires at least one buddy in a buddy list. The system checks to determine whether edit has been selected 1867 . If not, it checks to determine whether remove has been selected 1868 . If not, processing returns to the start 1865 .
  • remove has been selected 1869
  • the system displays a confirmation screen and tests whether the remove command has been confirmed 1872 . If not, the system loops again to test whether remove has been selected 1868 . If confirmation is given 1874 , the system removes one or more buddies from the user's buddy list and returns to the start 1865 . Remove will not have been selected if edit is selected 1871 .
  • the system responds to selection of edit with an edit user screen 1871 .
  • the user responds to the screen by editing any the fields of the selected buddy and clicking submit or cancel.
  • the system tests to determine whether submit has been selected 1875 and, if so, tests to determine whether mandatory fields have been completed 1877 .
  • Mandatory fields may include the identity of the instant messaging tool and a user ID, either a name or user number, as appropriate. If some of the mandatory fields are incomplete, an error screen 1876 is displayed and the user is given a further opportunity to add any of the fields 1873 . If the mandatory fields are completed, the system updates the buddy and associated information in the buddy list 1878 and returns to the start 1865 . If the user clicks cancel instead of submit or otherwise fails to submit 1875 , processing proceeds to test whether remove has been selected 1868 . The processing from this point proceeds as described above.
  • FIG. 19 depicts logic for sending invitations to new prospective buddies. This logic complements other interface processing 1757 .
  • the system determines whether the user has selected the send invitation link 1982 . If not, processing returns to the start 1981 . If so, the system checks to determine whether the user being invited is already registered for services 1984 .
  • the system uses the prospective buddy's IM tool ID as a key. if the prospective buddy has more than one IM tool, the system may either use only a primary IM tool ID or may use all listed IM tool ID's to check for current registration status. If the prospective buddy is not registered 1985 , the system invites the buddy by invoking the user's instant messaging tool and creating a message with standard text and a link to invoke a registration process 1983 .
  • the system queues the invited prospective buddy in a file of pending invitations 1986 .
  • the invited buddy's ACL and instant messaging ID will be stored against a temporary registration ID.
  • the system will use the temporary ID to match the invitee against the queue.
  • the system marks the user's buddy list as not empty 1989 and sets the user's new and invited flags to “no”.
  • the system notifies the user of the prospective buddy's status 1987 and stores the buddy name with relevant information, such adds an identification of the instant messaging tool used by the buddy 1988 .
  • the system adds the buddy and associated information to the user's buddy list 1990 .
  • the system allows the user to send messages to the buddy, including a message regarding their ACL status 1991 .
  • the system sets the user's new and invited flags to “no” 1992 and returns to start 1981 .
  • FIGS. 20-21 are a flowchart for access control list administration.
  • ACL administration begins with a start screen 2051 .
  • One sensible default organization is by topic 2052 .
  • the system checks 2053 to determine whether a “by buddy” view has been selected. If so, logic for displaying and processing the “by buddy” view is invoked 2054 . If not, the system checks to determine whether the administration session has been canceled 2055 . If “cancel” has been selected, the system determines whether the page has been marked as amended 2056 . If the page has not been amended, the system returns to a previous screen 2050 . If it has been marked as amended, the system prompts the user to save changes 2057 and tests whether the user wants to save changes.
  • the system simply the reverts to a previous screen 2050 . If so, the system updates various access flags and related data 2066 before reverting to the previous screen 2050 .
  • the system checks whether a topic folder has been selected 2059 . If so, the system shows the corresponding buddy list access level in a pane of the view screen 2060 . The system then determines whether tick boxes adjacent to any buddy name have been checked 2061 . If so, the display format of the buddy name may be altered to reinforce the tick mark and the page is marked as amended 2062 . Processing continues to determine whether a buddy name has been de-selected 2063 .
  • the display format of the buddy name may be altered to reinforce to the de-selection and page is marked as amended 2064 .
  • Processing continues to determine whether “submit” has been selected 2065 . If not, processing loops to before 2053 . If so, the update path 2066 is followed.
  • ACL administration proceeds from selection of the “by buddy” view 2054 .
  • This view is displayed 2172 .
  • the system determines whether the user has selected a change of view to “by topic”, for instance. If so, the display is changed 2171 . If not, the system determines whether the user has selected “cancel” 2175 . If “cancel” has been selected, the system determines whether the page has been marked as amended 2176 . If the page has not been amended, the system returns to a previous screen 2174 . If it has been marked as amended, the system prompts the user to save changes 2177 and tests whether the user wants to save changes 2178 . If not, the system simply the reverts to a previous screen 2174 .
  • the system updates various access flags and related data 2186 before reverting to the previous screen 2174 .
  • the system checks whether a buddy folder has been selected 2179 . If so, the system shows the corresponding topic list access level in a pane of the view screen 2180 . The system then determines whether tick boxes adjacent to any topic name have been checked 2181 . If so, the display format of the topic name may be altered to reinforce the tick mark, and the page is marked as amended 2182 . Processing continues to determine whether a topic name has been de-selected 2183 . If so, the display format of the topic name may be altered to reinforce the de-selection and the page is marked as amended 2184 . Processing continues to determine whether “submit” has been selected 2185 . If not, processing loops to before 2173 . If so, the update path 2186 is followed.
  • FIG. 22 is a flow chart of the batch and custom query processes. Batch processing of requests 2251 may be useful to reduce response time for certain processing-intensive queries. For instance, scoring the top 10 or top 100 hits in a category may require a substantial amount of processing which the user would be unlikely to endure. The selection of a hit list may be from a menu, which means that the number of processing-intensive queries is limited and manageable.
  • the system performs predefined queries 2252 against the VUD 100 A and the VLD 100 B or any similar database on a batch basis. The results are sent to a database of batch query results (“BQD”) 2211 . These predefined queries are accessible immediately to both Internet and wireless network queries.
  • FIG. 22 distinguishes between Internet queries 2253 and wireless queries 2255 .
  • Internet queries may include both predefined queries and custom-built queries 2254 .
  • wireless queries may be limited to predefined queries 2256 .
  • the processing of both types of queries is essentially the same 2257 .
  • the user submits a query to the system and the system either performs or real-time query 2258 or retrieves a predefined query from the batch query database 2259 .
  • the system returns results of the query to the user 2260 .
  • FIG. 23 extends aspects of the present invention to wireless devices, such as cellular telephones and pagers. Processing of wireless location and action data begins at 2351 .
  • the user's wireless communication device and location detection service is first activated 2352 . It is necessary for the user to have a wireless device 2354 , which supports a location detection service. This support may be by Bluetooth, GPS or any other location detection technology. Then, the link between location detection and activity sharing is activated 2353 .
  • a login process may be automated to execute whenever the wireless device 2354 is activated. Given the activation of a wireless device, the system periodically receives information regarding the location of the wireless device 2356 . As described above, this may be on an interrupt, polling or periodic batch transfer basis.
  • a location network directory 2312 is accessible, which reflects location of wireless devices 2354 and contains information such as the devices' location address, location description, a timestamp, and user ID 2358 . With this information, the system sets the action or activity type to “visit” a location and logs an entry into a visited location database 2358 . The system also monitors 2355 for activity related to a location, such as bookmarking a location, rating a location, adding an emoticon or comments about the location. Activity monitoring 2355 continues when no input/output activity is detected 2357 . When input/output activity is detected, the system determines the type of activity. Typical activities include bookmarking 2359 , rating, or adding an emoticon 2363 or free text comment to a location reference.
  • the system When a location is bookmarked 2359 , the system adds a bookmark flag, location address, location description, a timestamp and a user ID to the VLD or a buffer for later addition to the VLD.
  • a location When a location is rated 2361 , the system adds the rating, location address, location description, a timestamp and the user ID to the VLD or a buffer for later addition to the VLD.
  • a location is flagged with an emoticon 2363 , the system adds the emoticon, location address, location description, a timestamp and the user ID to the VLD or to a buffer for later addition to the VLD.
  • the system adds the comment, location address, location description, a timestamp and the user ID to the VLD or to a buffer for later addition to the VLD. For each of these activities, fewer or more fields may be utilized in various embodiments.
  • FIG. 24 is a flow chart of populating the visited location database (“VLD”).
  • VLD visited location database
  • the process for updating topics and descriptions begins at 2451 .
  • the system compares 2452 all VLD entries or buffer entries for addition to the VLD against location category and location description database entries 2413 . It updates the matching entries and records to categorization and descriptions to the VLD. Unmatched entries are recorded in an exceptions database 2414 .
  • This location-topic and location-description match exceptions database (“LTMED”) may be used to generate an exceptions report 2453 . Matched entries are written to the VLD 100 B.
  • LTMED location-topic and location-description match exceptions database
  • the interfaces and software described above support many methods and devices for sharing communication device and computer usage experiences.
  • One type of sharing communication device user experiences is sharing computer usage experiences, including Internet browsing experiences. Whichever communication device is used, sharing may depend on registration by a user with a registration server. Registration may involve downloading client software to run on the user's system. For enterprise applications, registration may be handled by a system administrator and integrated or coordinated with registration for network login, e-mail or other messaging. In some embodiments, registration may include contractual terms which limit the use of information collected from the user. In other embodiments, registration may be designed to exclude collection of certain user information, such as the user's e-mail address, actual name or physical address.
  • registration may make the user aware that at least a portion of the user's experiences with a communication device, computer or Internet browser will be collected and shared. It also may make the user aware that information collected from the user will be aggregated with information collected from other users.
  • Sharing communication device experiences also may include accessing one or more messaging buddy lists associated with the user. Accessing pre-existing buddy lists provides a base for linking the user and buddies with whom tracking data may be shared. Buddy lists may be maintained by AOL's Instant Messenger software, MSN's Messenger software, Yahoo! Messenger software, America Online's ICQ software, Indigo's instant messenger software or Jabber's instant messenger software. More generally, message recipient lists maintained in e-mail systems, such as Microsoft's Outlook products or AOL's Netscape products may maintain the lists that are accessed. Messaging systems such as Lotus Notes also may maintain message recipient lists that the system can access to identify persons with whom tracking data may be shared.
  • Buddies or groups of buddies are given defined rights to access tracking data collected from the user.
  • Defined rights of buddies to access tracking data may be based on content categories of material accessed. Examples of content categories or topics can be found in FIG. 8D .
  • Defined rights of buddies also could be based on keywords.
  • Definition of rights to access tracking data collected from the user may have multiple aspects. Access may be restricted by the type of activity involved, such as viewing, listening, rating, commenting, assigning an emoticon, sending, watching, downloading, bookmarking or visiting. Access may be further restricted by when the activity potentially accessed took place. It may be restricted based on a value assigned to a rating or emoticon. It can also be restricted based on its original source. Activities marked private, instead of public, may never be shared, based on a user's decision to turn sharing off. There are many useful combinations of these approaches to define the rights of buddies or groups of buddies to access tracking data.
  • At least a portion of the user's computer usage experiences are tracked and reported to a tracking server.
  • This tracking may be carried out by a module resident on the user's computer or by a device placed between the user's computer and an access point to the Internet.
  • tracking can be carried out by a server or proxy server.
  • the tracking data can be filtered before it is reported to the tracking server. Data may be filtered based on a sharing on/off option exercised by the user. It also may be filtered based on content categories. In some implementations, only those activities that fit content categories which the user agreed to share would be reported to the tracking server. Alternatively, activity could be reported to the tracking server that was never intended to be posted for access by buddies.
  • the tracking server or a posting server could filter the information before posting it for buddies to access.
  • the computer user experiences tracked could include viewing URLs, downloading files, listening to songs, viewing videos, making purchases, sending items from a user to their buddies, or general messaging between the user and buddies.
  • mobile communication device locations can be tracked, using any of the technologies described above. Activities related to location may include visiting the location, rating, commenting on it, assigning an emoticon, or connecting with another buddy or buddy of a buddy at the location. Proximity to a location may be variation on visiting the location.
  • the categorized tracking data would be subject to filtering and sorting. Categorized tracking data also could be searchable by content category and date range. For instance, a particular buddy's viewing of stock-related sites containing the name “Cisco” during a one or two-month period could be located.
  • Tracking data can be posted, after filtering, for buddies to access according to their defined access rights.
  • the interface for viewing activity reflected by the tracking data may include a send button, which allows a user to forward an item to a buddy, either with or without comment.
  • Interface also may include rating an emoticon buttons. It may facilitate free text comments on an item. These functions may apply to selected groups of items, in addition to applying to individual items. The buttons for free text comments and the feature for adding notes to items sent to buddies allow annotation of items.
  • the tracking process further may include generating a full text index of items viewed. This indexing may be performed in the context to viewing URLs or, in an enterprise implementation, in the context of the viewing internal work product or summaries of internal work product. Automated some regeneration may be combined with indexing, so that summaries are indexed.
  • Additional functionality of the system which passively tracks activities of registered users may include tracing the flow of information or data among registered users.
  • Information which is sent from a user to a buddy may be annotated with a history of users who forwarded the information. Alternatively, it may include a first user who forward the information and the immediately previous forwarding user. Or, it could identify a limited number of previous forwarding users. If less than a will history of users who forwarded the information is included with information sent from a user to a buddy, an analysis server may use a combination of timestamps and forwarding information to determine the dissemination or diffusion information and the velocity at which it is disseminated. Social network theory provides a number of metrics for evaluating the dissemination or diffusion of information.
  • the tracking capabilities which are an aspect of the present invention can readily be adapted to quantifying the relative influence of one or another user on their buddies, including the strength, frequency, extent and relative value of their influence. Certain users may be selected for introduction to information or new product releases. Certain users may be selected and rewarded as a result of efficient dissemination of information through their social network.
  • a system practicing aspects of the present invention can readily collect, collate and present user generated lists of superlatives regarding activities, products and services.
  • List may be generated by time period, utilizing date stamps and activities, number of top items (10 or 50 or 100 top items) or other filtering criteria.
  • location information for mobile communication devices allows the system practicing aspects of the present invention to present information regarding buddies and buddies of buddies who may be present at the user's physical location. Based on tracking visits to locations, information can be generated such as a particular user's list of favorite restaurants or favorite boutiques. Patterns of visits to physical locations can be reported. Information can be presented to users based on locations recently visited.
  • Information associated with particular locations can be offered up to users of mobile communication devices, in a context sensitive mode. Categories of information such as buddies' ratings of nearby restaurants can be provided, utilizing location information generated from the mobile communication device and established buddy lists.
  • a magnetic memory containing a program capable of practicing the claimed method is one such device.
  • a computer system having memory loaded with a program practicing the claimed method is another such device.
  • a system including a registration server and a tracking server practicing the methods described above is another such device.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention includes methods and devices for passively tracking and selectively sharing user experiences with communication devices, including computers, web-enabled telephones, and PDAs. User rating or comments on their experiences can be captured. Particular aspects of the present invention are described in the claims, specification and drawings.

Description

The present application is a reissue application of U.S. Pat. No. 7,080,139 which issued on Jul. 18, 2006 and a continuation of application Ser. No. 12/820,579, filed on Jun. 22, 2010, now U.S. Pat. No. Re. 44,324 which issued on Jun. 25, 2013, which is a reissue application of U.S. Pat. No. 7,080,139 which issued on Jul. 18, 2006 and a continuation of application Ser. No. 12/172,518, filed on Jul. 14, 2008, now U.S. Pat. No. Re. 41,450 which issued on Jul. 20, 2010, which is a reissue application of U.S. Pat. No. 7,080,139 which issued on Jul. 18, 2006.
BACKGROUND OF THE INVENTION
The Internet has opened up new channels of communication and vectors of influence over decision-making. Web sites, peer-to-peer technologies, e-mail and instant messengers are new communication technologies, which have major impacts.
Advertisers and marketers have shown great interest in the influence of these new technologies. However, it is difficult to observe the channels of communication or vectors of influence using traditional market research methods.
Users of the new communication technologies have been particularly quick to embrace instant messengers. Users desire new ways of sharing with friends the experiences they have and discoveries they make using the new communication technologies.
Therefore, there is an opportunity to introduce a new technology, a method and device which provide a new way of sharing experiences, potentially allowing advertisers and marketers to study channels of communication and vectors of influence at the same time.
SUMMARY OF THE INVENTION
The present invention includes methods and devices for sharing communication device usage experiences, including computer usage experiences. Particular aspects of the present invention are described in the claims, specification and drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram of interrelated components of systems practicing aspects of the present invention.
FIG. 2 is a user interface for logging in or creating a new account.
FIG. 3 is a user interface for providing access to system features.
FIGS. 4 and 5 are user interfaces for inviting a “buddy” to join in practicing aspects of the present invention.
FIGS. 6 and 7 are user interfaces for sending a buddy an item.
FIGS. 8A-8D are aspects of a user interface for administration of a buddy list.
FIG. 9 is a user interface for viewing activity of buddies. The interface illustrated applies as well to viewing of other item or location related data.
FIG. 10 is a user interface for viewing a so-called hits list, combined with a user interface for viewing activity. The interface illustrated applies as well to viewing of other item or location related data.
FIG. 11 is a user interface for viewing details regarding particular items. This user interface is combined, like FIG. 10, with a user interface for viewing activity.
FIGS. 12-14 is 12A, 12B, 13, and 14 are flowcharts illustrating the capture of URL related data from a user. The actions illustrated by these flowcharts apply as well to capture of other item or location related data.
FIG. 15 is a flowchart of automated updating of a visited URL database (“VUD”), with exception processing. The actions illustrated by these flowcharts apply as well to updating of databases reflecting captures of other item or location related data.
FIG. 16 is FIGS. 16A and 16B present a flow chart flowchart of an activity viewer. The actions illustrated by these flowcharts apply as well to viewing of other item or location related data.
FIGS. 17-19 are flow charts of buddy list and access control list (“ACL”) administration.
FIGS. 20-21 is flow charts of access control list interface actions.
FIG. 22 is a flow chart of the batch and custom query processes.
FIG. 23 extends aspects of the present invention to wireless devices, such as cellular telephones and pagers.
FIG. 24 is a flow chart of populating the visited location database (“VLD”).
DETAILED DESCRIPTION
The following detailed description is made with reference to the figures. Preferred embodiments are described to illustrate the present invention, not to limit its scope, which is defined by the claims. Those of ordinary skill in the art will recognize a variety of equivalent variations on the description that follows.
A common theme among aspects of the present invention is collecting data regarding a user's computer usage experience and sharing that data. So-called “buddies” identified on buddy lists of instant messaging products can share selected aspects of their computer usage experiences. Administrative tools and processes can be provided to set up selective collection and sharing of data. Collection tools and processes operate on a variety of computer usage activities and user responses to their computer usage experiences. Processing tools and methods filter, integrate and correlate the collected data. Display tools and processes make portions of the data accessible on a pre-defined basis, such as according to defined rights of buddies. Aggregation tools and processes assemble statistics about user experiences across different bases, such as buddy lists, categories of users, and all service participants.
DATA COMPILED
Aspects of the present invention include building and making accessible various databases and combinations of databases. The databases specifically described below are illustrated in one or another of the figures; reference numbers are provided for ease of reference. One database is a visited URL database (“VUD”) 100A. A VUD stores URLs visited by users, or by participants. More generally, a user could visit a web site, listen to or watch content, rate a site or content, assign an emoticon or quick comment to a site or content, send or bookmark a site or content or download data; a VUD entry could result. A rating may be thumbs up or thumbs down or its equivalent, a scaled alpha or numeric rating or its equivalent. An emoticon is an icon conveying a reaction, such as: “:)”, “:(”, “:\”, “=)”, “=(”, etc. Quick comments may be user defined and later accessible through a menue, ush as a pull-down menu. In addition to URLs, the database stores additional information such as page title, address, description, categories applicable to the URL, metadata, names of users accessing the URL, timestamps of visits, ratings of the URL, emoticons evaluating the URL, comments on and bookmarks to the URL, or keywords for retrieval. The page title, address, description and metadata may be ascertained from visiting the URL itself. With assistance of the URL's author, metadata may include suggested categorization. Alternatively, categorization may be provided by an existing content analysis provider, such as Yahoo or the Open Source Directory Project at www.dmoz.org 1506. A further alternative is that content could be categorized by a service provider or other sponsor, either for web content or for intranet, extranet or other network content.
Another database used to practice aspects of the present invention is the visited location database (“VLD”) 100B. A VLD stores similar information for locations visited by users or participants carrying portable devices. For instance, a Bluetooth equipped cell phone or pager could interact with a location that a user entered. Walking in the door of a popular restaurant, nightclub or other location could trigger an interaction between a Bluetooth device and a Bluetooth access point sponsored at the location. The Bluetooth device could learn the location visited and report that location immediately or later when the device returned to the proximity of a home access point or the device docked with a home access point. Alternatively, the Bluetooth device could disclose its identity to a Bluetooth access point at a particular location and the access point could report the visit. The user of the Bluetooth device could have the same options for providing additional information regarding the location, as for URLs. The VLD also could store geographic information regarding the location. such as geo-coded data. Several equivalent methods of associating a portable device with a location are available. Sophisticated networks may fingerprint, triangulate or otherwise locate a wireless device based on radio signal characteristics. Sophisticated devices may include circuits that determine the device's location; these circuits may utilize GPS, DGPS, Loran or any other location fixing protocol. The physics of how the device and the location are associated are relatively unimportant; an independent service may be used to track locations visited by a user based on any of the protocols identified above or any other protocol.
The VUD and VLD databases are readily extended to a visited item database 100, which could include items on a computer, intranet, extranet or any network. These items may be data such as multimedia files, XML documents, database searches or virtually any other material. One distinction between practicing aspects of the present invention and general database processing is storing user-based information, such as the user's pattern of visiting and the user's rating, emoticon or comments regarding an item and making stored, user-based information available to buddies. Collectively, VUDs, VLDs and visited item databases can be referred to as VXDs. Reference to one of the three VXDs is intended to refer to all three, unless the context makes it clear that only one of the three applies.
Access control lists (“ACLs”) 102, 103, 104, 1609 also can be maintained as databases. An ACL identifies buddies and controls their access to VUD, VLD, visited item and other activity-related data. A user could set up his or her own ACL via buddy list and access control list administration functions. An enterprise could set up ACLs for enterprise users. ACL-like data complied for instant messaging products could be accessed and utilized to compile ACLs for users or enterprises.
A URL logo database (“ULD”) 101 can be useful for associating logos with web sites. The logos may be sponsors, advertisers or others who provide support for operation of a service practicing aspects of the present invention.
Item categorization for VUD, VLD or visited items can generate exception databases, such as an item match exceptions database (for instance, a URL match exceptions database (“UMED”) 1505) or a topic match exceptions database (“TMED”) 1507. These exception databases record data which require further attention after initial processing to update the VUD, VLD or a visited item database.
An activity viewer database (“AVD”) 1610 can store information associating particular users with URLs, locations or items. Raw data regarding user activity is filtered and matched with entries front the VUD, VLD or visited item database to create the AVD. The AVD holds users' activity parsed into a format for display via the Activity Viewer. It includes the activity, internal flag settings, the URL, the page title, the logo, the username, the timestamp & category for an entry. If a user filters the display of data on the Activity Viewer, data is pulled from this database.
Batch query results can be stored in a database, a “BQD” 2211. Pre-defined queries can be run against the VUD, VLD or visited item database. For instance, top 10 hits, top 50 hits or top 100 hits in a wide range of categories are most efficiently recalculated periodically on a batch basis, rather than in response to ad hoc inquiries.
Third party location detection data can be stored in a detection network directory 2312. Third party data can be provided as received, on an interrupt-like basis, or in response to periodic requests, on a polling or batch basis. Location categorizations and descriptions 2413, e.g., Yellow Pages.Com, AutoDesk, etc. can be used to provide supplemental information about locations.
Location/topic entries which require further attention, after processing to update the VLD, can be stored in another match exceptions database, a “LTMED” 2414.
One aspect of practicing the present invention can include tying into a user's instant messaging products or, more generally, into the user's messaging facilities. For instant messaging (“IM”), users or participants typically set up so-called buddy lists. Other users or participants agree to participate in instant messaging. One IM user can send an instant message to another IM user, if their IM products are compatible. The two can carry on a dialog or a so-called “chat”. More than two users may be included in a real-time chat, when the instant messaging product allows multiple participants. Examples of instant messaging products include AOL's Instant Messenger software, MSN Messenger software, Yahoo! Messenger software, America Online's ICQ software, Odigo's instant messenger software and Jabber's instant messenger software. Reciprocal inclusion on buddy lists typically involves a closer relationship between participants than inclusion on an e-mail mailing list or directory, but tins is not necessarily the case. Buddy lists sometimes are shorter and more selective than general messaging lists or directories.
The present invention also may be applied to a user's messaging facilities by selectively enabling others listed on a general e-mail or messaging list or directory to participate. Selectively enabling others limits the intrusion on a user's privacy and limits various administrative (e.g., setup and administration) and responsive (e.g., junk mail) burdens. Alternatively, group functions used for other e-mail or messaging purposes can be a basis for defining rights to sharing of activity data.
OVERVIEW AND USER INTERFACES
FIG. 1 is a block diagram of interrelated components of systems practicing aspects of the present invention. Tracked activity may include Internet activity 120, wireless network location track and interaction activity 121 and enterprise intranet activity 122. Activities tracked in these domains may include view, listen, rate, comment, assign emoticon, send, watch, download, bookmark or visit. A user views a URL, watches a visual presentation and listens to an audio presentation. A user visits a restaurant or other location. A user who views, watches, listens or visits may respond to their experience. A user's response may be to rate, comment, assign an emoticon, send information to a buddy, download data or bookmark an item for later access.
Data stored regarding an experience may include VUD, VLD or VXD databases 100, a logo database for URLs, locations or items 101 and a variety of ACL databases. The access control lists can be maintained at the service provider level 104, the enterprise level 102 or the individual user level 103.
Data 130 reflecting individual experiences and aggregated experiences can be accessed or reported in a variety of ways. An activity viewer running on a user's system 131, either fixed or portable, can appear in a window. Reports on locations, either the experiences of others visiting the location or the proximity of buddies or buddies of buddies can be reported automatically to Bluetooth enabled wireless devices 132 when such devices reach a location or are in contact with a location-sponsored Bluetooth access point. Wireless devices can be synchronized 133 when reasonable bandwidth is available to retain data that would be too voluminous to access via a low bandwidth connection. The interfaces of instant message tools 134 can serve as an output channel, as licensing arrangements become available. Physical reports 135 can be printed for analysis. These reports can cover analysis of interactions among participants and spreading of information from one user to others.
FIG. 2 is a user interface for logging in or creating a new account. In one embodiment, separate fields can be provided for user name 251 and password 254. In other embodiments, these fields could be combined. After filling in identification data, a user may select a sign on link 253 or press the enter, return key or other key or may take another action such as speaking a command or winking an eye, which triggers processing of the completed fields. A link is provided for creating a new user 252, which may be on demand or subject to an approval process. A new user can either be a new name for a registered user or a new registration. A user who forgot their password may use one of the commonly employed password recovery schemes, by selecting a forgotten password link 255. An additional link for new user registration is provided 256. In one embodiment, the system implements a strict, anonymous access privacy policy and does not collect any information about the user which could be used for identification of the user or compilation of a database of user-identified activities. In another embodiment, the user can chose the amount of information that the user provides and corresponding services that are enabled by providing information such as an e-mail address. In this second embodiment, the system can publish a range of privacy policies, including a default, and ask the user to opt-in to a specific privacy policy, which may include providing the user's name or e-mail address to a handful of select vendors that have products responsive or keyed to the user's shared activities.
FIG. 3 is a user interface for providing access to system features. The embodiment illustrated is a relatively low profile access window. A lower profile access window can be provided via an icon that is visually accessible, such as a floating menu bar having an always on top attribute or an icon in a system tray. Pressing a hot key is an alternative way to bring an access window into view. The access window illustrated in FIG. 3 has many features, which can be included in a wide variety of combinations. The service provider logo 360 doubles as providing access to features not immediately visible. These features may include maximize, minimize, quit or selection of a particular display format. A current selection 361 identifies a current context, such as viewing an aggregated list of the best Hip Hop music of 2000. Rating choices 362 such as thumbs up and thumbs down or emoticons allow a user to instantly express their view regarding the current context with a simple action, such as a single click of a mouse. A user who wants to say more about their experience can select a comments button 363 to activate a window for entering comments. A scroll button 364 also supports entry of free form comments, definition of user comments, selection from among user comments, or selection of emoticons, either system supplied or user defined emoticons. When the scroll button 364 is used, the default item may change from “comments.” Other button choices 363 can be provided to a user, in addition to comments, such as emoticons or sending the current context to one or more buddies. A send button 365 is immediately accessible and activates a window for selecting recipients of information from the current context. The current context may be a list or a particular item, either front a hit list or the like or from the user's own activities.
The sharing status toggle 366 allows a user to turn sharing on and off. When sharing is on, rights defined in the ALL provide access for buddies to the user's activity. When sharing is off, the user's activity will not be shared with buddies. However, the user's activity may still be recorded to a tracking server either for aggregation or to be associated with the user but not reported to buddies. The user's options or access to information may be limited when sharing is off, tending to encourage the user to leave sharing activated. The window maximize control 367 allows direct access to maximizing the window to a pre-selected format.
Other aspects of this interface include space for a banner 368 (either static or moving), an invite button 369, a hot list access 370, a search entry window 371 and a search button 372. The banner could be used to generate advertising revenue. The invite button 369 provides access to an invite interface such as FIG. 4. The hot list access 370 provides access to one or more options and access formats for aggregate ratings of items. The ratings may reflect the frequency of access to an item or rating scores assigned by users. The rating scores may be thumbs up/down or any of the other scoring approaches mentioned above. The search entry window 371 accepts text and logical connectors. The find button 372 can be implemented to search titles of items accessed by participants, content of such items, the Internet, an intranet or another domain of interest.
FIGS. 4-5 are aspects of an interface for inviting others to become buddies. FIG. 4 is one of many possible initial invitation interfaces. An instant messaging select button 473 allows a user to identify an instant messaging product which maintains a list of buddies who can be invited to join a group. In some implementations, such as an enterprise implementation. a network directory such as a Novell, NT or Windows 2000 server directory of users may be accessed instead of an instant messaging product. In other implementations, an e-mail system user directory may be accessed for users to invite. Group membership for enterprise implementations alternatively may be administered by a security department, instead of individual users. A scroll button 474 allows a user who has more than one source of lists, such as more than one instant messaging product, to select the user to be invited. The screen name window 475 accepts a text string. It may provide assisted field completion, including a list of near matches. For some implementations, such as AIM or Yahoo IM, the screen name may be a name. For other implementations, such as Indigo and ICQ, the screen name may be a number which ties to a name, which may be locally unique or not unique at all. These alternatives are further presented in the discussion of FIG. 17, below. A send button 476 triggers transmission of an invitation to the identified buddy or other potential participant. The transmission may include a text message delivered by the instant messaging tool with a hyperlink for the recipient to sign up. The done button 477 signals that the user is done inviting buddies. A more information button 478 provides a help function.
FIG. 5 is an invitation follow-up interface. In some embodiments of the invitation process, there is no feedback from the instant messaging tool to an invitation process. The invitation process may query the user to determine whether an invitation was sent successfully. This interface provides a user with three alternative responses. If the instant message transmission was successful, the user indicates “yes” 582. If the user attempted the instant messaging invitation, but the buddy was not available, the user may press the e-mail link 581. Alternatively, the user may elect to invite the buddy again later 583. Then, the buddy's name will appear on a buddy administration list (FIG. 8A) with a link such as “resend invitation.” The system may allow a user to clink on an entry in a list and resend the invitation, preferably when the invitee is on line. In other embodiments or using other instant messaging products, the IM product may assure delivery of the message when the recipient is not instantly available. Yet another approach is for the IM product to provide direct feedback to the activity sharing processes, so that an invitation or other follow-up interface appears only when needed and so that the user never needs to confirm that an invitation or item was successfully sent.
FIG. 6 depicts an interface for sending an item to a buddy. This interface may be invoked, for instance, by selecting the send button 365. The item being sent is identified 691. The item identification 691 may be linked to the item, a pulldown menu of items recently viewed or recently sent, or to a dialogue for selecting an item to send. The user selects between sending the item, a link to the item or other item-related information to a buddy who has enrolled to share activity data or to a person listed as an instant messaging buddy. In an enterprise implementation, as described above, the user might select an addressee from a network registry of users or an e-mail list. A personal note 695 may be sent along with an item. The system may be configured so that the personal note is not retained on the tracking server or so that it is retained. The send item button 696 signals that the items should be sent. The cancel button 697 indicates that the item is not to be sent. Either the send or cancel button can be accompanied by a confirmation screen.
FIG. 7 is a confirmation interface for items sent. The three choices are as in FIG. 5: to confirm that the message was sent 799 “yes”; to resend the item by e-mail 798; or to queue it to be resent later 799 “later.”
FIGS. 8A-8D depict interfaces for administration of buddy lists. The embodiments depicted are adapted to integration with instant messaging products. Slightly different embodiments would be better adapted to e-mail or other types of messaging facilities, such as Lotus Notes. FIG. 8A depicts one embodiment of a buddy list. A link is provided 851 for inviting a new buddy. An alternate link for adding a user may appear in the list of buddies 856. The columns provided in this embodiment include a tick box 852, a buddy name 853, and one or more instant messaging contact links 854. The tick box 852 may be used to delete several selected buddies. The buddy name column 853 includes both buddy names and options to resend an invitation or add a new user. The buddy names may be active links which lead to additional interfaces, such as those depicted in FIGS. 8B-8D. The contact column 854 lists one or more instant messaging contact links. The extension following the link may identify a particular instant messaging tool. The link may be in the form of the user ID applicable to a particular instant messaging tool. This interface also includes a link for deleting selected buddies 857 and for indicating completion of buddy list administration 858.
FIG. 8B is another of the buddy list administration interfaces. The name of the buddy being profiled appears as a header 861. Optionally, a group of buddies may be administered. Related buddy administration screens include a buddy overview screen 862, contact information 863, topic sharing rights 864 and file sharing rights 865. The user may either view 866 or edit 867 information regarding a buddy or group of buddies. More information can be obtained by clicking a link 868. For particular buddy, a particular instant messaging tool is selected 869 and instant messaging ID is entered or selected 870. When a buddy has more than one instant messaging tool or ID, a user may select a link for adding additional links 871. The interface adds more rows, including more options for instant messaging tools and messaging ID's 872, 873. More than one instant messaging ID may be assigned to a buddy for a particular instant messaging tool. When the contact information is complete, the user selects the save changes link.
FIG. 8C uses tick boxes to select files or folders to be shared by default. Both default and particular user or user group administration is supported. Tick boxes 881 and directory or file names 882 can be used. Additional files or folders can be added to a list 883. Alternatively, a Windows Explorer-style file directory tree can be used to select files and directories, as is done for backing up and restoring files or directories. Additional fields and links in FIG. 8C have the same placement and usage has in FIG. 8B.
FIG. 8D is a topic sharing interface. Both default and particular user or user group administration is supported. Tick boxes 891 and topic or sub topic names 892 can be used. Additional topics can be added to a list 893. Alternatively, a browser-style bookmark tree can be used to select topics. Additional fields and links in FIG. 8B have the same placement and usage as in the previous figures.
FLOWCHARTS
FIG. 9 is a user interface for viewing activity of buddies. The interface illustrated applies as well to viewing of other item or location related data. Tab 963 indicates that the activity-viewing mode of the interface is currently active. Other tabs may be provided for people 962, files 964, messages 965 or summaries 966. The people tab 962 may invoke buddy list administration. The files tab 964 may invoke a hierarchical representation of the user's file system and selection boxes for designating directories and files, relative to particular buddies. The buddy may appear as columns adjacent to the file system representation or with a separate list, with selection boxes for users to be associated with particular rights. The message tab 965 may provide access to a message repository. Button 961 provides access to commands such as minimize, maximize, always on top, etc., which were previously discussed in the context of FIG. 3. The sharing button and indicator 967 behaves as previously described, also in the context of FIG. 3. In this embodiment, additional controls are provided in a row below the tabs and sharing button. Three filters 971, 972 and 973 are provided. The who filter 971 specifies whose activity is of interest: for instance, all buddies or a user-defined group of buddies. The topic filter 972 selects one or more pre-defined topics. The view filter 973 allows viewing of all or selected portions of a participant's activity by topic. For instance, only items bookmarked or sent to others may be of interest, in a domain having substantial activity. A keyword search is in effect a fourth filter, including the search term window 974, the find button 975 and the advanced find button 976.
Several rows of information responsive to the filters 971-976 appear in FIG. 9. The columns of information displayed for each row include who 981 did 892 what 984 where 985 in what topic area 982 when 988. Ratings 986 and comments 987 also may be provided. This interface can convey a substantial amount of information compactly. The who column 981 may use short labels, especially when the buddy list is short or subgroups of buddies are created. The did column 982 is compactly represented by an icon, from a recognizably short list of activity types. The icons depicted in this figure may signify viewing, visiting and sending items. Each of the activities mentioned above may be assigned an icon. The topic column 983 also is compactly represented by an icon. The variety of topics may be larger than the variety of activities. User defined subtopics may complicate the selection of icons. In some instances, a user may need to access more detailed information about an activity in order to understand the topic involved. This detailed information may be available through the topics filter 972 or by selecting a particular line including the icon. The what column 984 is an informative title for the item identified. For a URL, a page title may be more informative than the URL. Accordingly, page titles may be stored for URLs, to guard against loss of the page title when a content provider updates the page. Similarly useful shorthands for other types of items may be used. For instance, the name of a restaurant may be used instead of its Bluetooth access point address. The where column 985 is an opportunity to display banners, which may generate user impressions and revenue. Display of banners may be limited to vendors who pay a fee for preferential banner display. The rating column 986 may use a graphic, a color or a symbol to indicate a rating. In this embodiment, icons for thumbs up/down are depicted. The thoughts column 987 may support either free text comments or pick-list comments such as emoticons or user-defined quick comments. The when collum 988 records a date and time of an activity. A send button 989 is included. In this embodiment, it appears as a large button on a bottom row, instead of as an icon near the sharing button. Row select commands, such as mouse-click, shift mouse-click and control mouse-click can be used to select one or more rows prior to selecting the send button.
FIG. 10 is a user interface for viewing a so-called hits list, combined with a user interface for viewing activity. The interface illustrated applies as well to viewing of other item or location related data. The bottom part of this interface combines features found in FIGS. 3 and 9. Much of the two rows 1070 is taken from FIG. 3. The who filter 1081 is from FIG. 9. The item rows 1071 are generally as in FIG. 9, with an added column for send buttons 1082. Next and previous buttons 1084, 1085 are provided for scrolling through activities.
The top part of the FIG. 10 interface is a hits list. The title line 1051 identifies the category of hits, in this instance a Top 10 list. Filter buttons are provided for activity type 1052, group of persons sampled 1053 and location of persons sampled 1054. When the desired filters are selected, the submit button 1055 signals for the screen to be refreshed. Three columns of information about these 10 hits are provided in this embodiment: rank 1061, what 1062 and where 1063. These columns have been explained above, except the ranking, which is ordinal. The coincidence in this example between data lines in the top 10 list and in the activities is unlikely ever to occur at random in actual use; the repeat of the same lines twice in a top 10 list also is unlikely to occur in actual use.
FIG. 11 is a user interface for viewing details regarding particular items. This user interface is combined, like FIG. 10, with a user interface for viewing activity. The bottom part of this interface, 1070, 1071, is as in FIG. 10. The top part includes two windows: 1151 through 1154 and 1155 through 1167. The larger frame in the top part displays search results, annotated with buddy-related information. The search string appears at the top 1155 along with summary search statistics 1158. Both category results 1156 and individual items have been returned in this example. One category 1156 has been returned. Three items responsive to the search have been returned, each beginning with a title 1157. Information for an item may include a buddies rating 1161. The number of buddies of the user who have commented on the site is indicated parenthetically. A summary “thumbs up” is indicated and a percentage of favorable ratings appear. (In actual use, 78% would not be reported from a sample of three ratings.) In addition to user-buddy ratings, other group ratings can be reported. In this instance, ratings aggregated against all registered users 1162 are reported. The second group could be user selected. In an enterprise implementation, it could be a division, subsidiary, a whole enterprise or any other predefined group. The ratings 1161, 1162 need not be up-to-the-moment ratings, they may be compiled periodically in a batch mode. The information for an item may include a site furnished text 1163, a review furnished description 1164, one or more categories applicable to the item 1165 and links for retrieving a cached copy 1166 or similar pages 1167. The cached copy retrieval 1166 may be an alternative to retrieving a live copy of the item 1157, which is useful when an item is deleted or moved after it is indexed.
The inset to FIG. 11, 1151-54, is intended to provide detailed information related one or more of the items displayed. The columns of detailed information in this embodiment include who 1151, when 1152, rating 1153, and comments or emoticons 1154. If there are more users then can readily be displayed in a single inset, previous and next buttons can be used to scroll through a list. Alternatively, the list can be sized into a larger window. The list also could be filtered to select particular buddies or groups of buddies, date ranges, ratings or comments. The names of individual users and their comments can be linked to additional information or functions related to the individual and to the detailed free text comments.
FIGS. 12-14 are a flowchart illustrating the capture of URL related data from a user. The actions illustrated by this flowchart apply as well to capture of other item or location related data. FIGS. 12 and 13 are linked by the capture/track connector 1233. FIGS. 13 and 14 are linked by the file & item connector 1355. The flow in FIG. 12 begins with start 1201. The user may visit a URL 1202 utilizing any browser, from a PC, telephone, PDA or other device. Others processes described in the context of visiting or viewing a URL, it may be applied to other item types as well. The URL visited is captured 1203. This capture may be accomplished via a browser plug-in, an independently running process, or in a variety of other ways. A page title or other descriptive text may be captured in addition to the URL address. The page title or other text is stored in a temporary variable, along with a timestamp and a user ID. In this embodiment, the capture process next has to determine whether in the user's sharing status is on 1204. If the sharing status is off 1205, the system sets the status of the item to private. In other embodiments, the system might all processing of the item. If the sharing status is on 1206, the system sets the status of the item to public. After the status is been sent, the process tests to determine whether metadata associated with the URL provides a page title 1207. If not 1208, the system stores a null indicator in a temporary variable.
If the metadata provides a page title 1209, the system stores the page title in a temporary variable. The system next compares the URL to entries in the VUD 1210. If the URL is found in VUD 1211, the system has to determine whether a page title is stored on the VUD 1221. If there is a page title on the VUD 1222, the system action depends on whether the page title variable has been set to null. If not, the system over writes the value on the VUD with the value of the temporary page title variable 1224. If the temporary page title variable is null, the page title stored on the VUD is used 1223. Next, the system determines whether the URL has been categorized on the VUD 1225. If not, the system sets a temporary category variable to uncategorized 1227. This is the same action that the system takes in the URL is not on the VUD 1211. If the URL has been categorized on the VUD, the system sets a temporary category variable based on the contents of the VUD 1226. The system checks to determine if the URL or a portion of the URL is logged in a logo database 1228. The logo or ULD database 101 holds vendor logo images that correspond to the vendor's URLs. If the vendor has not arranged for its logo to be stored on the VLD 1229, the system sets the temporary local variable to null 1231. If there is a corresponding logo, the temporary variable is set to the corresponding logo image 1230. The system sets a temporary activity variable to view 1232, corresponding to viewing a URL. The flow continues in FIG. 13.
FIG. 13 depicts processing of URLs behind the interfaces presented above. The user has several options after viewing a URL. Viewing the URL triggers background activities depicted in FIG. 12. While the user is viewing the URL, system monitors for activity 1341. If no activity is detected 1342, monitoring continues. When activity is detected, the system determines the type of activity 1343, 1345, 1347, 1349, 1351, 1353. When the user moves to a new URL 1343, the values stored in temporary variables for the old URL are added to the VUD 1344. The new URL is processed in accordance with FIG. 12. When the user selects an emoticon 1345, the system processes the user's selection 1346. The system may associate either a predefined emoticon with the URL or it may associate a user-defined emoticon with the URL. These values may be stored in a temporary variable until the user moves to a new URL or another user activity triggers storing data to the VUD. When the user decides to enter a free text comment 1347, the system processes the free text 1348. It associates a text string with the URL at a temporary location, which can later be transferred to the VUD. The system then resumes monitoring for URL activity 1341. The user selection of rating 1349 is processed 1350 in much the same way as an emoticon. In the embodiment described here, the rating is either thumbs up for thumbs down, a binary rating. Multi-value ratings can also be processed, such as a scale of 1 to 5, 1 to 7, or 1 to 9. The system then resumes monitoring for URL activity 1341. Choosing the send button 1351 causes two processing steps 1352. One or more items in the current context are sent to a buddy and the activity of sending the items is reported to a tracking server to be recorded in the VUD. The system then resumes monitoring for URL activity 1341. Processing that follows detection of a bookmark activity 1353 is similar to processing of a send activity. Either the instant messaging product or the system may process the actual creation of the bookmark. The activity of creating the bookmark is reported to a tracking server to be recorded in the VUD 1354. Again, the system then resumes monitoring for I/O activity 1341. Other activities, more often associated with an item other than a URL, are processed as depicted in FIG. 14.
A variety of activities may be associated with items other than URLs. Depending on the type of item involved, the user may listen to or watch the item 1461, download the item 1463, purchase the item 1465, put the item on a wish list 1467, transfer the item to a mobile device, such as a cell phone or PDA 1469, or select some other process 1471. In some circumstances, an unrecognized activity may occur 1473, which the system may either ignore or treat is an error condition. A listen to or watch activity 1461 causes the system to invoke a player and to record the action and properties of the item listened to or watched 1462. The recorded information is forwarded for addition to the VUD. A download activity invokes a process, which records the download action and properties of the item downloaded 1464. The recorded information is forwarded for addition to the VUD. A purchase activity 1465 invokes a process 1466, which records the purchase action and properties of the item purchased. The recorded information is forwarded for addition to the VUD. A wish list activity 1467 invokes a wish list process 1468 to maintain and add to the user's wish list. The wish list can be maintained as part of the VUD or in a separate database. The information can be maintained redundantly as part of the VUD and as the result of a batch query. When the activity is to transfer the item to a mobile device 1469, the system invokes a process for sending the information to the mobile device, records the action and properties of the items sent to the mobile device, and forwards the recorded information for addition to the VUD 1470. The processing of each of these activities in FIG. 14, with the possible exception of error processing 1473, leads back to monitoring for activity 1341.
FIG. 15 is a flowchart of automated updating of a visited URL database or VUD, with exception processing. The actions illustrated by these flowcharts apply as well to updating of databases reflecting captures of other item or location related data. An automated VUD updating routine 1511 updates keywords and metadata 1512 and topics 1513. The input for updating is a set of VUD update records from processing of user activity. Updating 1514 may take place and real-time or on a batch basis. The updating of keywords and metadata utilizes a URL spider and an external search engine index to gather URL indices, keywords and metadata for each VUD entry being updated from the Internet 1522. Unmatched entries are stored in an exceptions database 1505 and an exception report 1521 is generated. Data in the exceptions database (“UMED”) may be manually added to the VUD. These exceptions also can be reprocessed for instance, if Internet access is restored or improved. Additional processing takes place to update topics associated with VUD entries 1513. During processing 1515, the system compares VUD entries against one or more external URL categorization databases, such as the database provided by the Open Source Directory Project (www.dmoz.org). Matches are processed for addition to the VUD. VUD entries that do not match are marked as on categorized and stored in an exceptions database 1507. Data in this topic exceptions database (“TMED”) may be added manually to the VUD or reprocessed any time. Additional items to the exceptions database may cause an exceptions report 1523 to be generated.
FIG. 16 is a flow chart of an activity viewer. The actions illustrated by this flowchart apply as well to viewing of URL, other item or location related data. The activity display population routine 1621 supports the interface 1629, which previously has been discussed in the context of FIG. 9. The system keys 1622 on fields which provide access to the relevant database, such as the VUD, VLD 100 or VXD. For VUD entries, user ID and topic may be used as a key. Alternatively, the key may be fields which match filters available to or selected by the user. For a visited location, user ID and location or action may be used as a key. The system 1622 matches data from the relevant database 100 with the user ACL database 1609. This matching may run periodically on a schedule set by the system administrator or it may run on demand. Data “matches” when the ACL database authorizes the requester or a particular user to have access (e.g., by user ID and topic) to the VXD entry and the status flag is public (as opposed to private) for the VXD entry. Matched data items are buffered 1623. For each buffered entry 1624, the system checks for the existence of a logo on the location logo database (“LLD”) 1608. Processing depends on whether or not a logo exists 1625. If it exists, the system sets a temporary variable corresponding to the logo image retrieved from the database 1626. Otherwise, the logo space is left blank. Each matched entry is added 1627 to the corresponding shared users file within the activity viewer database (“AVD”) 1610. The system populates activity viewers of logged-in users by pulling entries from the AVD 1628. User ID, action, item, location, category, rating, emoticon, comment, time, or other relevant field may filter the displayed data from the AVD. The activity viewer of the user refreshes the activity display automatically. The frequency for this refresh may be set by a system administrator and may be modified by the user.
FIGS. 17-19 are flow charts of buddy list and access control list (“ACL”) administration. The after the administration processes invoked 1721, the process tests to determine whether the user of the system is a new user 1722. A new user may either be invited or not 1725. An invited user is prompted to a start their buddy list with the person who and issued the invitation 1731. If the new user adds the person who invited them 1732, the new user optionally defines access rights 1735. The system then sets flags for new and invited status to “no” 1736. The system adds the buddy and associated information in the user's buddy list to the ACL 1734 and loops back to the start 1721 with the user flagged as not new. In the processing of the new user, if the new user is not invited 1725 or declines to add the person who invited them to the new user's buddy list 1732, an error message is displayed indicating that at least one buddy must appear on a buddy list 1726. The user is routed to an add buddy screen 1733. This add buddy screen 1733 also may be reached by a non-new user who has an empty buddy list 1723 through the invite buddy error message 1726 or after the non-new user is shown their current buddy list 1724 and elects 1727 to add additional buddies. Processing of a non-new user who declines to add additional buddies proceeds to 1728, in FIG. 18. After the add buddy screen, the system checks the user's IM tool flags to determine which instant messaging tools are available and to provide an adapted message to the user 1734. The user's options 1738 may include asking for more information, canceling the addition of users or selecting an instant messaging tool such as AIM user, ICQ user, Odigo user or Yahoo IM user. The user may be required to confirm my pressing an OK button after selection of an instant messaging tool. If the user presses OK 1741, instead of cancel, the system tests to determine whether the user requests more information 1742 and provides an information screen 1745 upon request. The system also tests to determine whether the user requests shared topics information 1743 and provides an information screen 1746 on request. After information has been provided the system tests determine whether the user has selected one of the instant messaging options 1744. If not, the system loops and waits 1741. If an instant messaging tool has been selected, the system determines which class of instant messaging tool has been selected 1752. For some instant messaging tools, the system displays a name field 1754 and prompts the user to enter a name 1756. For other instant messaging tools 1751, the system displays a user number field and prompts the user to enter a buddy number 1753. For both classes of instant messaging tools 1755, the user optionally defines access rights. Processing then continues to test for inviting a new buddy 1757, as described in FIG. 19.
FIG. 18 includes logic for editing entries in the buddy list, following other processing 1728. The system checks to determine whether one or more buddies have been selected 1861. If not, processing 1862 returns to a previous screen. If a buddy has been selected, processing depends on the number of buddies in the list 1863. If there are one or fewer buddies in the last 1864, the system activates only the end button. If there is more than one buddy in the list 1866, the system activates edit and remove buttons. The remove button is not activated for one or fewer buddies, as the system requires at least one buddy in a buddy list. The system checks to determine whether edit has been selected 1867. If not, it checks to determine whether remove has been selected 1868. If not, processing returns to the start 1865. If remove has been selected 1869, the system displays a confirmation screen and tests whether the remove command has been confirmed 1872. If not, the system loops again to test whether remove has been selected 1868. If confirmation is given 1874, the system removes one or more buddies from the user's buddy list and returns to the start 1865. Remove will not have been selected if edit is selected 1871. The system responds to selection of edit with an edit user screen 1871. The user responds to the screen by editing any the fields of the selected buddy and clicking submit or cancel. The system tests to determine whether submit has been selected 1875 and, if so, tests to determine whether mandatory fields have been completed 1877. Mandatory fields may include the identity of the instant messaging tool and a user ID, either a name or user number, as appropriate. If some of the mandatory fields are incomplete, an error screen 1876 is displayed and the user is given a further opportunity to add any of the fields 1873. If the mandatory fields are completed, the system updates the buddy and associated information in the buddy list 1878 and returns to the start 1865. If the user clicks cancel instead of submit or otherwise fails to submit 1875, processing proceeds to test whether remove has been selected 1868. The processing from this point proceeds as described above.
FIG. 19 depicts logic for sending invitations to new prospective buddies. This logic complements other interface processing 1757. The system determines whether the user has selected the send invitation link 1982. If not, processing returns to the start 1981. If so, the system checks to determine whether the user being invited is already registered for services 1984. The system uses the prospective buddy's IM tool ID as a key. if the prospective buddy has more than one IM tool, the system may either use only a primary IM tool ID or may use all listed IM tool ID's to check for current registration status. If the prospective buddy is not registered 1985, the system invites the buddy by invoking the user's instant messaging tool and creating a message with standard text and a link to invoke a registration process 1983. The system queues the invited prospective buddy in a file of pending invitations 1986. The invited buddy's ACL and instant messaging ID will be stored against a temporary registration ID. When the invited buddy responds to the invitation, the system will use the temporary ID to match the invitee against the queue. After an invitation has been made, the system marks the user's buddy list as not empty 1989 and sets the user's new and invited flags to “no”. For a the prospective buddy 1985 who is already registered, the system notifies the user of the prospective buddy's status 1987 and stores the buddy name with relevant information, such adds an identification of the instant messaging tool used by the buddy 1988. The system adds the buddy and associated information to the user's buddy list 1990. The system allows the user to send messages to the buddy, including a message regarding their ACL status 1991. Either the user's instant messaging tool with standard text and links or an e-mail message may be used for this purpose. The system sets the user's new and invited flags to “no” 1992 and returns to start 1981.
FIGS. 20-21 are a flowchart for access control list administration. In FIG. 20, ACL administration begins with a start screen 2051. One sensible default organization is by topic 2052. In the “by topic” view, the system checks 2053 to determine whether a “by buddy” view has been selected. If so, logic for displaying and processing the “by buddy” view is invoked 2054. If not, the system checks to determine whether the administration session has been canceled 2055. If “cancel” has been selected, the system determines whether the page has been marked as amended 2056. If the page has not been amended, the system returns to a previous screen 2050. If it has been marked as amended, the system prompts the user to save changes 2057 and tests whether the user wants to save changes. If not, the system simply the reverts to a previous screen 2050. If so, the system updates various access flags and related data 2066 before reverting to the previous screen 2050. When “cancel” has not been selected, the system checks whether a topic folder has been selected 2059. If so, the system shows the corresponding buddy list access level in a pane of the view screen 2060. The system then determines whether tick boxes adjacent to any buddy name have been checked 2061. If so, the display format of the buddy name may be altered to reinforce the tick mark and the page is marked as amended 2062. Processing continues to determine whether a buddy name has been de-selected 2063. If so, the display format of the buddy name may be altered to reinforce to the de-selection and page is marked as amended 2064. Processing continues to determine whether “submit” has been selected 2065. If not, processing loops to before 2053. If so, the update path 2066 is followed.
In FIG. 21, ACL administration proceeds from selection of the “by buddy” view 2054. This view is displayed 2172. The system determines whether the user has selected a change of view to “by topic”, for instance. If so, the display is changed 2171. If not, the system determines whether the user has selected “cancel” 2175. If “cancel” has been selected, the system determines whether the page has been marked as amended 2176. If the page has not been amended, the system returns to a previous screen 2174. If it has been marked as amended, the system prompts the user to save changes 2177 and tests whether the user wants to save changes 2178. If not, the system simply the reverts to a previous screen 2174. If so, the system updates various access flags and related data 2186 before reverting to the previous screen 2174. When “cancel” has not been selected, the system checks whether a buddy folder has been selected 2179. If so, the system shows the corresponding topic list access level in a pane of the view screen 2180. The system then determines whether tick boxes adjacent to any topic name have been checked 2181. If so, the display format of the topic name may be altered to reinforce the tick mark, and the page is marked as amended 2182. Processing continues to determine whether a topic name has been de-selected 2183. If so, the display format of the topic name may be altered to reinforce the de-selection and the page is marked as amended 2184. Processing continues to determine whether “submit” has been selected 2185. If not, processing loops to before 2173. If so, the update path 2186 is followed.
FIG. 22 is a flow chart of the batch and custom query processes. Batch processing of requests 2251 may be useful to reduce response time for certain processing-intensive queries. For instance, scoring the top 10 or top 100 hits in a category may require a substantial amount of processing which the user would be unlikely to endure. The selection of a hit list may be from a menu, which means that the number of processing-intensive queries is limited and manageable. The system performs predefined queries 2252 against the VUD 100A and the VLD 100B or any similar database on a batch basis. The results are sent to a database of batch query results (“BQD”) 2211. These predefined queries are accessible immediately to both Internet and wireless network queries. FIG. 22 distinguishes between Internet queries 2253 and wireless queries 2255. Internet queries may include both predefined queries and custom-built queries 2254. To the extent that wireless queries are hampered by limited bandwidth, wireless queries may be limited to predefined queries 2256. The processing of both types of queries is essentially the same 2257. The user submits a query to the system and the system either performs or real-time query 2258 or retrieves a predefined query from the batch query database 2259. The system returns results of the query to the user 2260.
FIG. 23 extends aspects of the present invention to wireless devices, such as cellular telephones and pagers. Processing of wireless location and action data begins at 2351. The user's wireless communication device and location detection service is first activated 2352. It is necessary for the user to have a wireless device 2354, which supports a location detection service. This support may be by Bluetooth, GPS or any other location detection technology. Then, the link between location detection and activity sharing is activated 2353. A login process may be automated to execute whenever the wireless device 2354 is activated. Given the activation of a wireless device, the system periodically receives information regarding the location of the wireless device 2356. As described above, this may be on an interrupt, polling or periodic batch transfer basis. A location network directory 2312 is accessible, which reflects location of wireless devices 2354 and contains information such as the devices' location address, location description, a timestamp, and user ID 2358. With this information, the system sets the action or activity type to “visit” a location and logs an entry into a visited location database 2358. The system also monitors 2355 for activity related to a location, such as bookmarking a location, rating a location, adding an emoticon or comments about the location. Activity monitoring 2355 continues when no input/output activity is detected 2357. When input/output activity is detected, the system determines the type of activity. Typical activities include bookmarking 2359, rating, or adding an emoticon 2363 or free text comment to a location reference. When a location is bookmarked 2359, the system adds a bookmark flag, location address, location description, a timestamp and a user ID to the VLD or a buffer for later addition to the VLD. When a location is rated 2361, the system adds the rating, location address, location description, a timestamp and the user ID to the VLD or a buffer for later addition to the VLD. When a location is flagged with an emoticon 2363, the system adds the emoticon, location address, location description, a timestamp and the user ID to the VLD or to a buffer for later addition to the VLD. Similarly, when a user makes a comment on a location 2365, the system adds the comment, location address, location description, a timestamp and the user ID to the VLD or to a buffer for later addition to the VLD. For each of these activities, fewer or more fields may be utilized in various embodiments.
FIG. 24 is a flow chart of populating the visited location database (“VLD”). The process for updating topics and descriptions begins at 2451. The system compares 2452 all VLD entries or buffer entries for addition to the VLD against location category and location description database entries 2413. It updates the matching entries and records to categorization and descriptions to the VLD. Unmatched entries are recorded in an exceptions database 2414. This location-topic and location-description match exceptions database (“LTMED”) may be used to generate an exceptions report 2453. Matched entries are written to the VLD 100B.
APPLICATION EXAMPLES
The interfaces and software described above support many methods and devices for sharing communication device and computer usage experiences. One type of sharing communication device user experiences is sharing computer usage experiences, including Internet browsing experiences. Whichever communication device is used, sharing may depend on registration by a user with a registration server. Registration may involve downloading client software to run on the user's system. For enterprise applications, registration may be handled by a system administrator and integrated or coordinated with registration for network login, e-mail or other messaging. In some embodiments, registration may include contractual terms which limit the use of information collected from the user. In other embodiments, registration may be designed to exclude collection of certain user information, such as the user's e-mail address, actual name or physical address. Some users may feel more comfortable registering with the system if registration excludes collection of any information that identifies the user in a manner adapted to direct marketing. Even if registration excludes initial collection of user identifying information, the user may be given the option of entering additional personal information for general use by the providers of the system or for restricted use, in accordance with contractual terms. The registration process may make the user aware that at least a portion of the user's experiences with a communication device, computer or Internet browser will be collected and shared. It also may make the user aware that information collected from the user will be aggregated with information collected from other users.
Sharing communication device experiences also may include accessing one or more messaging buddy lists associated with the user. Accessing pre-existing buddy lists provides a base for linking the user and buddies with whom tracking data may be shared. Buddy lists may be maintained by AOL's Instant Messenger software, MSN's Messenger software, Yahoo! Messenger software, America Online's ICQ software, Indigo's instant messenger software or Jabber's instant messenger software. More generally, message recipient lists maintained in e-mail systems, such as Microsoft's Outlook products or AOL's Netscape products may maintain the lists that are accessed. Messaging systems such as Lotus Notes also may maintain message recipient lists that the system can access to identify persons with whom tracking data may be shared.
Buddies or groups of buddies are given defined rights to access tracking data collected from the user. Defined rights of buddies to access tracking data may be based on content categories of material accessed. Examples of content categories or topics can be found in FIG. 8D. Defined rights of buddies also could be based on keywords. Definition of rights to access tracking data collected from the user may have multiple aspects. Access may be restricted by the type of activity involved, such as viewing, listening, rating, commenting, assigning an emoticon, sending, watching, downloading, bookmarking or visiting. Access may be further restricted by when the activity potentially accessed took place. It may be restricted based on a value assigned to a rating or emoticon. It can also be restricted based on its original source. Activities marked private, instead of public, may never be shared, based on a user's decision to turn sharing off. There are many useful combinations of these approaches to define the rights of buddies or groups of buddies to access tracking data.
At least a portion of the user's computer usage experiences are tracked and reported to a tracking server. This tracking may be carried out by a module resident on the user's computer or by a device placed between the user's computer and an access point to the Internet. In an enterprise implementation, tracking can be carried out by a server or proxy server. The tracking data can be filtered before it is reported to the tracking server. Data may be filtered based on a sharing on/off option exercised by the user. It also may be filtered based on content categories. In some implementations, only those activities that fit content categories which the user agreed to share would be reported to the tracking server. Alternatively, activity could be reported to the tracking server that was never intended to be posted for access by buddies. The tracking server or a posting server could filter the information before posting it for buddies to access. The computer user experiences tracked could include viewing URLs, downloading files, listening to songs, viewing videos, making purchases, sending items from a user to their buddies, or general messaging between the user and buddies.
In addition to computer user experiences, mobile communication device locations can be tracked, using any of the technologies described above. Activities related to location may include visiting the location, rating, commenting on it, assigning an emoticon, or connecting with another buddy or buddy of a buddy at the location. Proximity to a location may be variation on visiting the location.
It further may be useful to categorize at least a portion of the tracking data by content. The categorized tracking data would be subject to filtering and sorting. Categorized tracking data also could be searchable by content category and date range. For instance, a particular buddy's viewing of stock-related sites containing the name “Cisco” during a one or two-month period could be located.
Tracking data can be posted, after filtering, for buddies to access according to their defined access rights. The interface for viewing activity reflected by the tracking data may include a send button, which allows a user to forward an item to a buddy, either with or without comment. Interface also may include rating an emoticon buttons. It may facilitate free text comments on an item. These functions may apply to selected groups of items, in addition to applying to individual items. The buttons for free text comments and the feature for adding notes to items sent to buddies allow annotation of items.
The tracking process further may include generating a full text index of items viewed. This indexing may be performed in the context to viewing URLs or, in an enterprise implementation, in the context of the viewing internal work product or summaries of internal work product. Automated some regeneration may be combined with indexing, so that summaries are indexed.
Additional functionality of the system, which passively tracks activities of registered users may include tracing the flow of information or data among registered users. Information which is sent from a user to a buddy may be annotated with a history of users who forwarded the information. Alternatively, it may include a first user who forward the information and the immediately previous forwarding user. Or, it could identify a limited number of previous forwarding users. If less than a will history of users who forwarded the information is included with information sent from a user to a buddy, an analysis server may use a combination of timestamps and forwarding information to determine the dissemination or diffusion information and the velocity at which it is disseminated. Social network theory provides a number of metrics for evaluating the dissemination or diffusion of information. The tracking capabilities which are an aspect of the present invention can readily be adapted to quantifying the relative influence of one or another user on their buddies, including the strength, frequency, extent and relative value of their influence. Certain users may be selected for introduction to information or new product releases. Certain users may be selected and rewarded as a result of efficient dissemination of information through their social network.
A system practicing aspects of the present invention can readily collect, collate and present user generated lists of superlatives regarding activities, products and services. List may be generated by time period, utilizing date stamps and activities, number of top items (10 or 50 or 100 top items) or other filtering criteria.
The availability of location information for mobile communication devices allows the system practicing aspects of the present invention to present information regarding buddies and buddies of buddies who may be present at the user's physical location. Based on tracking visits to locations, information can be generated such as a particular user's list of favorite restaurants or favorite boutiques. Patterns of visits to physical locations can be reported. Information can be presented to users based on locations recently visited.
Information associated with particular locations can be offered up to users of mobile communication devices, in a context sensitive mode. Categories of information such as buddies' ratings of nearby restaurants can be provided, utilizing location information generated from the mobile communication device and established buddy lists.
While the preceding example applications are cast in terms of a method, devices and systems employing this method are easily understood. A magnetic memory containing a program capable of practicing the claimed method is one such device. A computer system having memory loaded with a program practicing the claimed method is another such device. A system including a registration server and a tracking server practicing the methods described above is another such device.
While the present invention is disclosed by reference to the embodiments and examples detailed above, it is understood that these examples are intended in an illustrative rather than in a limiting sense. It is contemplated that modifications and combinations will readily occur to those skilled in the art, which modifications and combinations will be within the spirit of the invention and the scope of the following claims.

Claims (36)

We claim:
1. A method of sharing computer user experiences, including:
communicating with a registration server to register a user, for automatic client-side collection of computer usage experiences for future sharing, wherein the computer usage experiences include one or more of browsing URLs or visiting a location with a location-aware device that records the visited location;
accessing one or more of the user's messaging buddy lists and selecting one or more buddies with whom to share the automatically collected computer usage experiences;
defining categories of computer usage experiences to be shared with particular selected buddies;
tracking automatically on the client-side at least a portion of the user's computer usage experiences and reporting the user's computer usage experiences to a tracking server to be published to the particular buddies in accordance with their defined categories of sharing.
2. The method of claim 1, wherein the registration server and the tracking server are a single server.
3. The method of claim 1, wherein the registration server and the tracking server are distinct servers.
4. The method of claim 1, wherein registering the user excludes collection of the user's e-mail address.
5. The method of claim 1, wherein registering the user excludes collection of the user's actual name.
6. The method of claim 1, wherein registering the user excludes collection of the user's physical address.
7. The method of claim 1, wherein registering the user excludes collection of any information that identities a user in a manner adapted to direct marketing.
8. The method of claim 1, wherein registering the user further includes establishing an anonymous unique identifier for the user.
9. The method of claim 8, wherein reporting the tracking data includes reporting the anonymous unique identifier.
10. The method of claim 1, wherein the messaging buddy list is maintained by AOL's Instant Messenger software.
11. The method of claim 1, wherein the messaging buddy list is maintained by MSN Messenger software.
12. The method of claim 1, wherein the messaging buddy list is maintained by Yahoo! Messenger software.
13. The method of claim 1, wherein the messaging buddy list is maintained by America Online's ICQ software.
14. The method of claim 1, wherein the messaging buddy list is maintained by Odigo's instant messenger software.
15. The method of claim 1, wherein the messaging buddy list is maintained by Jabber's instant messenger software.
16. The method of claim 1, wherein the rights of the buddies are defined by content category of the user's computer usage.
17. The method of claim 1, wherein the rights of the buddies are defined by appearance of one or more keywords on pages corresponding to URLs viewed.
18. The method of claim 1, wherein the rights of the buddies are defined by activity type of the user's computer usage.
19. The method of claim 1, wherein the user utilizes a computer and tracking is carried out by a module resident on the computer.
20. The method of claim 1, wherein the tracking is carried out by a device placed between a computer utilized by the user and an access point to the Internet.
21. The method of claim 1, wherein the computer usage experience tracked is filtered before it is reported to the tracking server.
22. The method of claim 1, wherein the computer usage reported is filtered after it is reported to the tracking server and before it is posted for the buddies to access.
23. The method of claim 1, wherein the messaging buddy list is maintained by an instant messenger software.
24. The method of claim 1, further including sending tracking data regarding one of a user's computer usage experiences to one or more buddies.
25. The method of claim 1, further including categorizing at least a portion of the tracking data by content and sorting the tracking data by content category.
26. The method of claim 1, further including categorizing at least a portion of the tracking data by content and making the tracking data searchable by content category and date range.
27. The method of claim 1, wherein posting further includes providing annotation tools for associating notes with individual tracking data entries.
28. The method of claim 1, wherein posting further includes providing annotation tools for associating ratings with individual tracking data entries.
29. The method of claim 1, wherein posting further includes indexing text portions of at least a portion of pages reported from tracking the user's Internet usage.
30. The method of claim 29, wherein text indexing is limited to pages reported from tracking as having been annotated or forwarded by the user.
31. A method of sharing Internet browsing experiences, including:
tracking automatically with a client-side application at least a portion of a user's Internet usage and reporting the tracking data to a server;
categorizing at least a portion of the reported tracking data by content category;
presenting to the user a history of the reported tracking data, with tools for searching and forwarding the tracking data;
receiving from the user data identifying of one or more persons on the user's buddy lists and authorizing the persons to receive tracking data;
responsive to a user request, sending one or more entries from the history of the reported tracking data to the authorized persons.
32. A method of sharing computer user experiences, including:
registering a user with a registration server to collect and share visited location data using a client-side application collected while visiting a location with a location-aware device that records the visited location;
accessing one or more of the user's messaging buddy lists to identify one or more buddies with whom the tracking data may be shared;
defining rights of the buddies to access the visited location data;
posting at least a portion of the user's visited location data for the buddies to access according to their defined rights.
33. A method of operation of a tracking server to share Internet browsing experiences, comprising the following computer-implemented steps:
receiving, by the tracking server, tracking data from a client-side application of a user to automatically track at least a portion of the user's Internet usage;
categorizing at least a portion of the tracking data by content category;
receiving data identifying one or more persons on one or more buddy lists of the user authorized by the user to receive the tracking data;
receiving a user request to share one or more entries from a history of the tracking data; and
sending information indicating the one or more entries from the history of the tracking data to the one or more persons authorized to receive the tracking data.
34. A method of operation of a client-side application of a user to share Internet browsing experiences, including:
tracking automatically with the client-side application at least a portion of the user's Internet usage to provide tracking data;
reporting the tracking data to a server so that at least a portion of the tracking data is categorized by content category;
enabling viewing of a history of the tracking data;
enabling selection of one or more persons on one or more buddy lists of the user to authorize to receive the tracking data; and
enabling selection of one or more entries from the history of the tracking data to be shared such that information indicating the one or more entries from the history of the tracking data are shared with the one or more persons authorized to receive the tracking data.
35. A non-transitory computer-readable medium storing software for instructing a controller of a server to:
receive tracking data from a client-side application operating on a user device of a user, the tracking data comprising information indicating at least a portion of the user's Internet usage automatically tracked by the client-side application;
categorize at least a portion of the tracking data by content category;
present to the user a history of the tracking data;
receive data identifying one or more persons and authorizing the one or more persons to receive the tracking data;
receive a user request to share one or more entries from the history of the tracking data; and
send the one or more entries from the history of the tracking data to the one or more persons authorized to receive the tracking data.
36. A non-transitory computer-readable medium storing software for instructing a controller of a user device of a user to:
track automatically with a client-side application at least a portion of the user's Internet usage to provide tracking data;
report the tracking data to a server;
enable the user to view a history of the tracking data;
enable the user to select one or more persons on one or more buddy lists of the user to authorize to receive the tracking data; and
enable the user to select one or more entries from the history of the tracking data to be shared such that the one or more entries from the history of the tracking data are capable of being shared with the one or more persons authorized to receive the tracking data.
US13/893,992 2001-04-24 2013-05-14 Method and apparatus for selectively sharing and passively tracking communication device experiences Expired - Lifetime USRE45351E1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US13/893,992 USRE45351E1 (en) 2001-04-24 2013-05-14 Method and apparatus for selectively sharing and passively tracking communication device experiences
US14/550,100 USRE48904E1 (en) 2001-04-24 2014-11-21 Method and apparatus for selectively sharing and passively tracking communication device experiences
US14/577,746 USRE47704E1 (en) 2001-04-24 2014-12-19 Method and apparatus for selectively sharing and passively tracking communication device experiences

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US09/841,475 US7080139B1 (en) 2001-04-24 2001-04-24 Method and apparatus for selectively sharing and passively tracking communication device experiences
US12/172,518 USRE41450E1 (en) 2001-04-24 2008-07-14 Method and apparatus for selectively sharing and passively tracking communication device experiences
US12/820,579 USRE44324E1 (en) 2001-04-24 2010-06-22 Method and apparatus for selectively sharing and passively tracking communication device experiences
US13/893,992 USRE45351E1 (en) 2001-04-24 2013-05-14 Method and apparatus for selectively sharing and passively tracking communication device experiences

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US09/841,475 Reissue US7080139B1 (en) 2001-04-24 2001-04-24 Method and apparatus for selectively sharing and passively tracking communication device experiences
US12/820,579 Continuation USRE44324E1 (en) 2001-04-24 2010-06-22 Method and apparatus for selectively sharing and passively tracking communication device experiences

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US09/841,475 Continuation US7080139B1 (en) 2001-04-24 2001-04-24 Method and apparatus for selectively sharing and passively tracking communication device experiences

Publications (1)

Publication Number Publication Date
USRE45351E1 true USRE45351E1 (en) 2015-01-20

Family

ID=36659239

Family Applications (7)

Application Number Title Priority Date Filing Date
US09/841,475 Ceased US7080139B1 (en) 2001-04-24 2001-04-24 Method and apparatus for selectively sharing and passively tracking communication device experiences
US12/172,518 Expired - Lifetime USRE41450E1 (en) 2001-04-24 2008-07-14 Method and apparatus for selectively sharing and passively tracking communication device experiences
US12/820,579 Expired - Lifetime USRE44324E1 (en) 2001-04-24 2010-06-22 Method and apparatus for selectively sharing and passively tracking communication device experiences
US13/894,009 Expired - Lifetime USRE45543E1 (en) 2001-04-24 2013-05-14 Method and apparatus for selectively sharing and passively tracking communication device experiences
US13/893,992 Expired - Lifetime USRE45351E1 (en) 2001-04-24 2013-05-14 Method and apparatus for selectively sharing and passively tracking communication device experiences
US14/550,100 Expired - Lifetime USRE48904E1 (en) 2001-04-24 2014-11-21 Method and apparatus for selectively sharing and passively tracking communication device experiences
US14/577,746 Expired - Lifetime USRE47704E1 (en) 2001-04-24 2014-12-19 Method and apparatus for selectively sharing and passively tracking communication device experiences

Family Applications Before (4)

Application Number Title Priority Date Filing Date
US09/841,475 Ceased US7080139B1 (en) 2001-04-24 2001-04-24 Method and apparatus for selectively sharing and passively tracking communication device experiences
US12/172,518 Expired - Lifetime USRE41450E1 (en) 2001-04-24 2008-07-14 Method and apparatus for selectively sharing and passively tracking communication device experiences
US12/820,579 Expired - Lifetime USRE44324E1 (en) 2001-04-24 2010-06-22 Method and apparatus for selectively sharing and passively tracking communication device experiences
US13/894,009 Expired - Lifetime USRE45543E1 (en) 2001-04-24 2013-05-14 Method and apparatus for selectively sharing and passively tracking communication device experiences

Family Applications After (2)

Application Number Title Priority Date Filing Date
US14/550,100 Expired - Lifetime USRE48904E1 (en) 2001-04-24 2014-11-21 Method and apparatus for selectively sharing and passively tracking communication device experiences
US14/577,746 Expired - Lifetime USRE47704E1 (en) 2001-04-24 2014-12-19 Method and apparatus for selectively sharing and passively tracking communication device experiences

Country Status (1)

Country Link
US (7) US7080139B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE47704E1 (en) 2001-04-24 2019-11-05 Ikorongo Technology, LLC Method and apparatus for selectively sharing and passively tracking communication device experiences

Families Citing this family (204)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7624172B1 (en) 2000-03-17 2009-11-24 Aol Llc State change alerts mechanism
US9246975B2 (en) 2000-03-17 2016-01-26 Facebook, Inc. State change alerts mechanism
US20060074727A1 (en) 2000-09-07 2006-04-06 Briere Daniel D Method and apparatus for collection and dissemination of information over a computer network
US7246164B2 (en) * 2001-05-10 2007-07-17 Whoglue, Inc. Distributed personal relationship information management system and methods
US8099364B2 (en) 2001-05-31 2012-01-17 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
US7725401B2 (en) 2001-05-31 2010-05-25 Contentguard Holdings, Inc. Method and apparatus for establishing usage rights for digital content to be created in the future
US8275716B2 (en) 2001-05-31 2012-09-25 Contentguard Holdings, Inc. Method and system for subscription digital rights management
US8275709B2 (en) * 2001-05-31 2012-09-25 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
US6876984B2 (en) 2001-05-31 2005-04-05 Contentguard Holdings, Inc. Method and apparatus for establishing usage rights for digital content to be created in the future
US7266583B2 (en) * 2001-08-20 2007-09-04 International Business Machines Corporation Method and system for providing contact management to chat session participants
AUPR796801A0 (en) * 2001-09-27 2001-10-25 Plugged In Communications Pty Ltd Computer user interface tool for navigation of data stored in directed graphs
EP1338982A1 (en) * 2002-02-26 2003-08-27 Hewlett-Packard Company Process for enhancing the access to resources
US7640300B2 (en) * 2002-06-10 2009-12-29 Microsoft Corporation Presence and notification system for maintaining and communicating information
US7444297B2 (en) * 2002-06-13 2008-10-28 Aol Llc, A Delaware Limited Liability Company Method and medium for associating a wish list with buddy list screen name
US8122137B2 (en) 2002-11-18 2012-02-21 Aol Inc. Dynamic location of a subordinate user
CA2506585A1 (en) 2002-11-18 2004-06-03 Valerie Kucharewski People lists
US7899862B2 (en) * 2002-11-18 2011-03-01 Aol Inc. Dynamic identification of other users to an online user
US8701014B1 (en) 2002-11-18 2014-04-15 Facebook, Inc. Account linking
US8965964B1 (en) 2002-11-18 2015-02-24 Facebook, Inc. Managing forwarded electronic messages
US7590696B1 (en) 2002-11-18 2009-09-15 Aol Llc Enhanced buddy list using mobile device identifiers
US7640306B2 (en) 2002-11-18 2009-12-29 Aol Llc Reconfiguring an electronic message to effect an enhanced notification
US7428580B2 (en) 2003-11-26 2008-09-23 Aol Llc Electronic message forwarding
US8005919B2 (en) 2002-11-18 2011-08-23 Aol Inc. Host-based intelligent results related to a character stream
US20040162878A1 (en) 2002-11-22 2004-08-19 Lewis Michael Pescatello System and method to facilitate real-time communications and content sharing among users over a network
JP4218336B2 (en) * 2002-12-12 2009-02-04 ソニー株式会社 Information processing system, service providing apparatus and method, information processing apparatus and method, and program
JP2004252947A (en) * 2003-01-27 2004-09-09 Fuji Xerox Co Ltd Evaluation device and method
JP2004265193A (en) * 2003-03-03 2004-09-24 Canon Inc Information processing method, information processor, control method of server device, and server device
US7613776B1 (en) 2003-03-26 2009-11-03 Aol Llc Identifying and using identities deemed to be known to a user
US7941396B2 (en) * 2003-04-25 2011-05-10 Symbion Systems, Inc. Process control method with integrated database for electronically documenting the configuration, modification and operation of a controlled process
US7363378B2 (en) * 2003-07-01 2008-04-22 Microsoft Corporation Transport system for instant messaging
US7539727B2 (en) * 2003-07-01 2009-05-26 Microsoft Corporation Instant messaging object store
US20050005007A1 (en) * 2003-07-01 2005-01-06 International Business Machines Corporation World wide web document distribution system to receiving web display stations with tracking at the receiving station of the extent of usage of documents previously accessed and stored at receiving station
US8001187B2 (en) * 2003-07-01 2011-08-16 Apple Inc. Peer-to-peer active content sharing
US7653693B2 (en) 2003-09-05 2010-01-26 Aol Llc Method and system for capturing instant messages
US20050060377A1 (en) * 2003-09-12 2005-03-17 Chen Chien Lo Transitory messaging with location information
US8255514B2 (en) * 2003-11-04 2012-08-28 Covenant Eyes, Inc. Internet use monitoring system and method
US8171084B2 (en) * 2004-01-20 2012-05-01 Microsoft Corporation Custom emoticons
US20050165935A1 (en) * 2004-01-22 2005-07-28 Moody Paul B. Method and system for providing information regarding recently accessed documents of a remote user through an awareness client program
US7991636B1 (en) * 2004-02-11 2011-08-02 Aol Inc. Buddy list-based calendaring
US7383308B1 (en) 2004-02-11 2008-06-03 Aol Llc, A Delaware Limited Liability Company Buddy list-based sharing of electronic content
US7536672B1 (en) * 2004-03-05 2009-05-19 Adobe Systems Incorporated Management of user interaction history with software applications
US7802262B1 (en) 2004-03-05 2010-09-21 Adobe Systems Incorporated System and method for communicating state and title information between a browser and a rich internet application with browser forward and back button support
US7934210B1 (en) 2004-03-26 2011-04-26 Adobe Systems Incorporated System and method for updating one or more programs and their environment
US7856469B2 (en) * 2004-04-15 2010-12-21 International Business Machines Corporation Searchable instant messaging chat repositories using topic and identifier metadata
US7424476B2 (en) * 2004-04-16 2008-09-09 Aol Llc Categorized web browsing history
US8499248B1 (en) * 2004-04-29 2013-07-30 Paul Erich Keel Methods and apparatus for managing and exchanging information using information objects
US8209376B1 (en) * 2004-05-06 2012-06-26 Apple Inc. Application-specific group listing
US20060004921A1 (en) * 2004-06-30 2006-01-05 Suess Carol S Systems and methods for establishing communication between users
US20060047770A1 (en) * 2004-09-02 2006-03-02 International Business Machines Corporation Direct information copy and transfer between real-time messaging applications
US7321889B2 (en) * 2004-09-10 2008-01-22 Suggestica, Inc. Authoring and managing personalized searchable link collections
US7669213B1 (en) 2004-10-28 2010-02-23 Aol Llc Dynamic identification of other viewers of a television program to an online viewer
DE102004053597B4 (en) * 2004-11-05 2008-05-29 Infineon Technologies Ag A method for automatically generating and / or controlling a telecommunications conference with a plurality of subscribers, telecommunication conference terminal and telecommunication conference server
US7433700B2 (en) 2004-11-12 2008-10-07 Microsoft Corporation Strategies for peer-to-peer instant messaging
US8117623B1 (en) 2004-11-18 2012-02-14 Adobe Systems Incorporated System and method for providing notices to users of a computer program in a flexible way
US11321408B2 (en) * 2004-12-15 2022-05-03 Applied Invention, Llc Data store with lock-free stateless paging capacity
US8996486B2 (en) * 2004-12-15 2015-03-31 Applied Invention, Llc Data store with lock-free stateless paging capability
US20060167991A1 (en) * 2004-12-16 2006-07-27 Heikes Brian D Buddy list filtering
CN1791070B (en) * 2004-12-17 2010-04-28 腾讯科技(深圳)有限公司 Method for transmitting document on network
US8230456B2 (en) * 2005-01-05 2012-07-24 Yahoo! Inc. Framework for delivering a plurality of content and providing for interaction with the same in a television environment
US20060167994A1 (en) * 2005-01-11 2006-07-27 Yen-Fu Chen System and method for automatically segmenting content from an instant messaging transcript and applying commands contained within the content segments
US8275832B2 (en) * 2005-01-20 2012-09-25 International Business Machines Corporation Method to enable user selection of segments in an instant messaging application for integration in other applications
US7490080B2 (en) * 2005-01-28 2009-02-10 International Business Machines Corporation Method for delivering information with caching based on interest and significance
US20060195532A1 (en) * 2005-02-28 2006-08-31 Microsoft Corporation Client-side presence documentation
US20080307339A1 (en) 2006-03-20 2008-12-11 Kidzui, Inc. Child-oriented computing system
US7353034B2 (en) * 2005-04-04 2008-04-01 X One, Inc. Location sharing and tracking using mobile phones or other wireless devices
US20070210937A1 (en) * 2005-04-21 2007-09-13 Microsoft Corporation Dynamic rendering of map information
US8850011B2 (en) 2005-04-21 2014-09-30 Microsoft Corporation Obtaining and displaying virtual earth images
US7529255B2 (en) * 2005-04-21 2009-05-05 Microsoft Corporation Peer-to-peer multicasting using multiple transport protocols
US7777648B2 (en) * 2005-04-21 2010-08-17 Microsoft Corporation Mode information displayed in a mapping application
US7466244B2 (en) * 2005-04-21 2008-12-16 Microsoft Corporation Virtual earth rooftop overlay and bounding
US7617296B2 (en) * 2005-04-22 2009-11-10 Realnetworks, Inc. Data compilation system and method
US20060259293A1 (en) * 2005-05-11 2006-11-16 France Telecom Computerized method and apparatus for automatically generating a natural language description of a person's activities
US20060271620A1 (en) * 2005-05-27 2006-11-30 Beaty Robert M Digital music social network player system
US7610287B1 (en) * 2005-06-28 2009-10-27 Google Inc. System and method for impromptu shared communication spaces
US9268867B2 (en) 2005-08-03 2016-02-23 Aol Inc. Enhanced favorites service for web browsers and web applications
US8739020B2 (en) * 2005-08-03 2014-05-27 Aol Inc. Enhanced favorites service for web browsers and web applications
US7702675B1 (en) * 2005-08-03 2010-04-20 Aol Inc. Automated categorization of RSS feeds using standardized directory structures
US20070033290A1 (en) * 2005-08-03 2007-02-08 Valen Joseph R V Iii Normalization and customization of syndication feeds
CN100568235C (en) * 2005-09-09 2009-12-09 国际商业机器公司 Be used to carry out instant messaging client computer and the method that project is shared
US7623857B1 (en) * 2005-10-21 2009-11-24 At&T Intellectual Property I, L.P. Intelligent pico-cell for transport of wireless device communications over wireline networks
US8001458B1 (en) 2005-11-14 2011-08-16 Adobe Systems Incorporated System and method for communicating state and title information between a browser and a rich Internet application
US8327297B2 (en) * 2005-12-16 2012-12-04 Aol Inc. User interface system for handheld devices
US7801542B1 (en) * 2005-12-19 2010-09-21 Stewart Brett B Automatic management of geographic information pertaining to social networks, groups of users, or assets
US7783592B2 (en) * 2006-01-10 2010-08-24 Aol Inc. Indicating recent content publication activity by a user
US20070266003A1 (en) * 2006-05-09 2007-11-15 0752004 B.C. Ltd. Method and system for constructing dynamic and interacive family trees based upon an online social network
US7831928B1 (en) * 2006-06-22 2010-11-09 Digg, Inc. Content visualization
US8793066B2 (en) * 2006-06-27 2014-07-29 Microsoft Corporation Route monetization
US7610151B2 (en) 2006-06-27 2009-10-27 Microsoft Corporation Collaborative route planning for generating personalized and context-sensitive routing recommendations
US8326296B1 (en) 2006-07-12 2012-12-04 At&T Intellectual Property I, L.P. Pico-cell extension for cellular network
US8601162B1 (en) 2006-07-27 2013-12-03 Aol Inc. Sharing network addresses
US8595057B2 (en) * 2006-08-08 2013-11-26 Narbeh AVEDISSIAN System for apportioning revenue based on content delivery by an online community
US20080050713A1 (en) * 2006-08-08 2008-02-28 Avedissian Narbeh System for submitting performance data to a feedback community determinative of an outcome
US10796093B2 (en) 2006-08-08 2020-10-06 Elastic Minds, Llc Automatic generation of statement-response sets from conversational text using natural language processing
US20080104626A1 (en) * 2006-10-27 2008-05-01 Avedissian Narbeh System and method for ranking media
US20080189047A1 (en) * 2006-11-01 2008-08-07 0752004 B.C. Ltd. Method and system for genetic research using genetic sampling via an interactive online network
US20080215589A1 (en) * 2006-11-10 2008-09-04 Getingate, Inc. System, Method, and Computer-Readable Medium for Collection and Distribution of User-Supplied Comments Associated with Network and Local Content
US8578501B1 (en) 2006-11-14 2013-11-05 John W. Ogilvie Anonymous social networking with community-based privacy reviews obtained by members
US20080189366A1 (en) * 2006-12-15 2008-08-07 Cox Richard D Online Social and Professional Networking and Collaboration Services with Enhanced Communications Capabilities
US7559017B2 (en) 2006-12-22 2009-07-07 Google Inc. Annotation framework for video
US9071729B2 (en) * 2007-01-09 2015-06-30 Cox Communications, Inc. Providing user communication
US20090313664A1 (en) * 2007-01-23 2009-12-17 Cox Communications, Inc. Providing a Video User Interface
US8869191B2 (en) 2007-01-23 2014-10-21 Cox Communications, Inc. Providing a media guide including parental information
US8806532B2 (en) * 2007-01-23 2014-08-12 Cox Communications, Inc. Providing a user interface
US9135334B2 (en) * 2007-01-23 2015-09-15 Cox Communications, Inc. Providing a social network
US8789102B2 (en) * 2007-01-23 2014-07-22 Cox Communications, Inc. Providing a customized user interface
US7698263B2 (en) * 2007-01-23 2010-04-13 Cox Communications, Inc. Providing a lateral search
US20090049473A1 (en) * 2007-01-23 2009-02-19 Cox Communications, Inc. Providing a Video User Interface
US7680882B2 (en) * 2007-03-06 2010-03-16 Friendster, Inc. Multimedia aggregation in an online social network
US8688991B1 (en) * 2007-06-01 2014-04-01 Adobe Systems Incorporated Media player embodiments and secure playlist packaging
US8230417B1 (en) 2007-06-08 2012-07-24 Adobe Systems Incorporated Combined application and execution environment install
US20090037431A1 (en) * 2007-07-30 2009-02-05 Paul Martino System and method for maintaining metadata correctness
US8448161B2 (en) 2007-07-30 2013-05-21 Adobe Systems Incorporated Application tracking for application execution environment
US8375381B1 (en) 2007-07-30 2013-02-12 Adobe Systems Incorporated Management user interface for application execution environment
US7930273B1 (en) 2007-07-30 2011-04-19 Adobe Systems Incorporated Version management for application execution environment
US8892558B2 (en) * 2007-09-26 2014-11-18 International Business Machines Corporation Inserting data into an in-memory distributed nodal database
US9060034B2 (en) 2007-11-09 2015-06-16 Napo Enterprises, Llc System and method of filtering recommenders in a media item recommendation system
US8935381B2 (en) 2007-11-27 2015-01-13 Zettics, Inc. Method and apparatus for real-time collection of information about application level activity and other user information on a mobile data network
US8775391B2 (en) * 2008-03-26 2014-07-08 Zettics, Inc. System and method for sharing anonymous user profiles with a third party
US8027996B2 (en) * 2007-11-29 2011-09-27 International Business Machines Corporation Commitment control for less than an entire record in an in-memory database in a parallel computer system
US20090150801A1 (en) * 2007-12-05 2009-06-11 International Business Machines Corporation System and method to handle vandalism in a virtual world
US9122751B2 (en) * 2007-12-07 2015-09-01 International Business Machines Corporation Method of tagging instant messaging (IM) conversations for easy information sharing
US8060297B2 (en) * 2007-12-14 2011-11-15 Microsoft Corporation Route transfer between devices
US8473198B2 (en) 2007-12-14 2013-06-25 Microsoft Corporation Additional content based on intended travel destination
US20090157499A1 (en) * 2007-12-14 2009-06-18 Microsoft Corporation Automatic splices for targeted advertisements
US8090532B2 (en) * 2007-12-14 2012-01-03 Microsoft Corporation Pedestrian route production
US8428859B2 (en) 2007-12-14 2013-04-23 Microsoft Corporation Federated route production
US20090157312A1 (en) * 2007-12-14 2009-06-18 Microsoft Corporation Social network based routes
US20090172783A1 (en) * 2008-01-02 2009-07-02 George Eberstadt Acquiring And Using Social Network Information
US20110131106A1 (en) * 2009-12-02 2011-06-02 George Eberstadt Using social network and transaction information
US20090171686A1 (en) * 2008-01-02 2009-07-02 George Eberstadt Using social network information and transaction information
US20090210276A1 (en) * 2008-02-19 2009-08-20 Microsoft Corporation Ad hoc and opportunistic transportation services
US8112702B2 (en) 2008-02-19 2012-02-07 Google Inc. Annotating video intervals
US8793065B2 (en) * 2008-02-19 2014-07-29 Microsoft Corporation Route-based activity planner
US8868741B2 (en) * 2008-03-03 2014-10-21 Leapfrog Enterprises, Inc. Method and apparatus for custodial monitoring, filtering, and approving of content
US8078677B2 (en) * 2008-03-11 2011-12-13 Voxp Pte. Ltd. Method for making recommendations in a social networking system based on personal communication information and a social networking system incorporating same
US20090247193A1 (en) * 2008-03-26 2009-10-01 Umber Systems System and Method for Creating Anonymous User Profiles from a Mobile Data Network
US20090265607A1 (en) * 2008-04-17 2009-10-22 Razoss Ltd. Method, system and computer readable product for management, personalization and sharing of web content
US8626223B2 (en) 2008-05-07 2014-01-07 At&T Mobility Ii Llc Femto cell signaling gating
US8126496B2 (en) * 2008-05-07 2012-02-28 At&T Mobility Ii Llc Signaling-triggered power adjustment in a femto cell
US8094551B2 (en) 2008-05-13 2012-01-10 At&T Mobility Ii Llc Exchange of access control lists to manage femto cell coverage
US8719420B2 (en) 2008-05-13 2014-05-06 At&T Mobility Ii Llc Administration of access lists for femtocell service
US20090307003A1 (en) * 2008-05-16 2009-12-10 Daniel Benyamin Social advertisement network
US8566353B2 (en) 2008-06-03 2013-10-22 Google Inc. Web-based system for collaborative generation of interactive videos
US20100041365A1 (en) 2008-06-12 2010-02-18 At&T Mobility Ii Llc Mediation, rating, and billing associated with a femtocell service framework
US9892468B1 (en) 2008-06-30 2018-02-13 Amazon Technologies, Inc. Method and system for recommending activities to a community of contacts
US20100036713A1 (en) * 2008-08-11 2010-02-11 Dung-Yuan Tang Collecting personal data from a user and sharing revenue generated from the sale of the personal data
US8375291B2 (en) * 2008-11-07 2013-02-12 Web Filings, Inc. Method and system for generating and utilizing persistent electronic tick marks
US8108474B2 (en) 2008-12-30 2012-01-31 International Business Machines Corporation System and method for indication of IM tracking
US8265658B2 (en) * 2009-02-02 2012-09-11 Waldeck Technology, Llc System and method for automated location-based widgets
US8417262B2 (en) 2009-03-13 2013-04-09 Tti Inventions D Llc System and method for privacy-enabled mobile locator services with dynamic encounter horizon
US20100250755A1 (en) * 2009-03-31 2010-09-30 Morris Robert P Methods, Systems, And Computer Program Products For Establishing A Shared Browsing Session Between A User Of A Web Browser With A User Of Another Web Browser
US20100250756A1 (en) * 2009-03-31 2010-09-30 Morris Robert P Methods, Systems, And Computer Program Products For Establishing A Shared Browsing Session Between A User Of A Web Browser With A User Of Another Web Browser
US8504550B2 (en) * 2009-05-15 2013-08-06 Citizennet Inc. Social network message categorization systems and methods
US20100312653A1 (en) * 2009-06-05 2010-12-09 Microsoft Corporation Verifiable advertisement presentation
US8949407B2 (en) * 2009-06-17 2015-02-03 Microsoft Corporation Capturing a computing experience
US8510801B2 (en) 2009-10-15 2013-08-13 At&T Intellectual Property I, L.P. Management of access to service in an access point
US8973049B2 (en) * 2009-12-04 2015-03-03 Cox Communications, Inc. Content recommendations
US8554854B2 (en) * 2009-12-11 2013-10-08 Citizennet Inc. Systems and methods for identifying terms relevant to web pages using social network messages
US7970850B1 (en) * 2009-12-29 2011-06-28 International Business Machines Corporation Instant messaging based virtual file system
US8595297B2 (en) 2010-02-08 2013-11-26 At&T Intellectual Property I, L.P. Searching data in a social network to provide an answer to an information request
US8832749B2 (en) 2010-02-12 2014-09-09 Cox Communications, Inc. Personalizing TV content
WO2012002951A1 (en) 2010-06-30 2012-01-05 Hewlett-Packard Development Company, L.P. System and method for service recommendation service
WO2012002956A1 (en) * 2010-06-30 2012-01-05 Hewlett-Packard Development Company, L.P. System and method for collaborative information services
EP2589005A4 (en) 2010-06-30 2014-04-23 Hewlett Packard Development Co System and method for a serialized data service
US10216393B2 (en) 2010-07-30 2019-02-26 International Business Machines Corporation Efficiently sharing user selected information with a set of determined recipients
TW201205307A (en) 2010-07-30 2012-02-01 Ibm Method, apparatus and computer program product for efficiently sharing information
US8838784B1 (en) 2010-08-04 2014-09-16 Zettics, Inc. Method and apparatus for privacy-safe actionable analytics on mobile data usage
US20120036188A1 (en) * 2010-08-06 2012-02-09 Nokia Corporation Method and Apparatus for Aggregating Document Information
US9170123B2 (en) 2010-08-06 2015-10-27 Nokia Technologies Oy Method and apparatus for generating information
US9715544B2 (en) 2010-08-17 2017-07-25 International Business Machines Corporation Online location sharing through an internet service search engine
US8789117B2 (en) 2010-08-26 2014-07-22 Cox Communications, Inc. Content library
US8364013B2 (en) 2010-08-26 2013-01-29 Cox Communications, Inc. Content bookmarking
US9167302B2 (en) 2010-08-26 2015-10-20 Cox Communications, Inc. Playlist bookmarking
US9563751B1 (en) * 2010-10-13 2017-02-07 The Boeing Company License utilization management system service suite
US8612293B2 (en) 2010-10-19 2013-12-17 Citizennet Inc. Generation of advertising targeting information based upon affinity information obtained from an online social network
US8615434B2 (en) 2010-10-19 2013-12-24 Citizennet Inc. Systems and methods for automatically generating campaigns using advertising targeting information based upon affinity information obtained from an online social network
US20120246228A1 (en) * 2011-03-21 2012-09-27 Microsoft Corporation Sharing channels
US9063927B2 (en) 2011-04-06 2015-06-23 Citizennet Inc. Short message age classification
US8521190B2 (en) 2011-06-09 2013-08-27 Qualcomm Incorporated Methods and apparatus for leaving and/or discovering locally relevant pieces of information
KR101110639B1 (en) 2011-06-22 2012-06-12 팅크웨어(주) Safe service system and method thereof
US9002892B2 (en) 2011-08-07 2015-04-07 CitizenNet, Inc. Systems and methods for trend detection using frequency analysis
US9208517B1 (en) 2011-08-16 2015-12-08 The New York Times Company System for and method of generating advertising inventory by marketers sharing content with others
US9519648B2 (en) * 2011-09-27 2016-12-13 International Business Machines Corporation Software detection
WO2013142429A1 (en) 2012-03-19 2013-09-26 Farver Brandon System and method for mode-based social networking
US10506278B2 (en) 2012-04-18 2019-12-10 Scorpoast, LLC Interactive video distribution system and video player utilizing a client server architecture
US8682809B2 (en) 2012-04-18 2014-03-25 Scorpcast, Llc System and methods for providing user generated video reviews
US9832519B2 (en) 2012-04-18 2017-11-28 Scorpcast, Llc Interactive video distribution system and video player utilizing a client server architecture
US20140150029A1 (en) 2012-04-18 2014-05-29 Scorpcast, Llc System and methods for providing user generated video reviews
US9053497B2 (en) 2012-04-27 2015-06-09 CitizenNet, Inc. Systems and methods for targeting advertising to groups with strong ties within an online social network
US9686085B2 (en) * 2012-07-09 2017-06-20 Sqeeqee, Inc. Social network system and method
US9286263B1 (en) * 2012-07-12 2016-03-15 Google Inc. System and method for providing information regarding posts on social networking sites
US9626340B2 (en) * 2012-08-28 2017-04-18 Dropbox, Inc. Bookmarking shared file and folder links
KR20140033672A (en) * 2012-09-10 2014-03-19 삼성전자주식회사 Method and device for trasmitting information related to event
US8898804B2 (en) * 2012-11-27 2014-11-25 Applied Research Works, Inc. System and method for selectively sharing information
US9628413B2 (en) 2012-12-14 2017-04-18 International Business Machines Corporation Low latency messaging chat server
US20150172399A1 (en) * 2012-12-17 2015-06-18 Dong Liu System and method of automatic sharing of online activities
US10776756B2 (en) 2013-01-08 2020-09-15 Emm Patents Ltd. System and method for organizing and designing comment
US8918339B2 (en) 2013-03-15 2014-12-23 Facebook, Inc. Associating an indication of user emotional reaction with content items presented by a social networking system
US9990440B2 (en) * 2013-12-30 2018-06-05 Oath Inc. Smart content pre-loading on client devices
JP2015158761A (en) * 2014-02-24 2015-09-03 株式会社リコー Information providing device, program and information providing method
KR20150126196A (en) * 2014-05-02 2015-11-11 삼성전자주식회사 Data processing apparatus and method for processing data based on user feeling
US20160117523A1 (en) * 2014-10-23 2016-04-28 Applied Research Works, Inc. System and Method for Selectively Sharing Information
US12120132B2 (en) 2022-08-12 2024-10-15 Bank Of America Corporation Dynamic quarantine engine integration with a validated network resource component library for network security
US12107880B2 (en) 2022-08-12 2024-10-01 Bank Of America Corporation Electronic security system of network resource component tracking and analysis across a distributed network and construction of a validated network resource component library

Citations (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5568645A (en) 1991-08-21 1996-10-22 Norand Corporation Versatile RF data capture system
US5760917A (en) * 1996-09-16 1998-06-02 Eastman Kodak Company Image distribution method and system
US5808613A (en) 1996-05-28 1998-09-15 Silicon Graphics, Inc. Network navigator with enhanced navigational abilities
US6018619A (en) 1996-05-24 2000-01-25 Microsoft Corporation Method, system and apparatus for client-side usage tracking of information server systems
US6195654B1 (en) * 1995-11-16 2001-02-27 Edward I Wachtel System and method for obtaining improved search results and for decreasing network loading
US6250930B1 (en) 1997-05-30 2001-06-26 Picante Communications Corporation Multi-functional communication and aggregation platform
US20010036224A1 (en) * 2000-02-07 2001-11-01 Aaron Demello System and method for the delivery of targeted data over wireless networks
KR20020007934A (en) 2000-07-19 2002-01-29 박종득 Electronic album system for wired and wireless internet diary
WO2002021864A1 (en) 2000-09-08 2002-03-14 Rovingradar, Inc. Location dependent user matching system
US20020049686A1 (en) * 2000-10-20 2002-04-25 Shu-Min Chuang System, method and article of manufacuture for personal catalog and knowledge management
US20020052925A1 (en) * 2000-08-29 2002-05-02 Yoohwan Kim Method and apparatus for information delivery on the internet
US20020065802A1 (en) 2000-05-30 2002-05-30 Koki Uchiyama Distributed monitoring system providing knowledge services
US20020072955A1 (en) 2000-09-01 2002-06-13 Brock Stephen P. System and method for performing market research studies on online content
US20020087382A1 (en) 2001-01-03 2002-07-04 Tiburcio Vincio B. Method and system for assigning and tracking tasks, such as under an electronic auction
US20020087496A1 (en) * 2000-04-05 2002-07-04 Stirpe Paul A. System, method and applications for knowledge commerce
JP2002196778A (en) 2000-12-25 2002-07-12 Kenwood Corp Information reproducing apparatus with reproduction function giving priority to history
US20020144259A1 (en) 2001-03-29 2002-10-03 Philips Electronics North America Corp. Method and apparatus for controlling a media player based on user activity
US6480885B1 (en) * 1998-09-15 2002-11-12 Michael Olivier Dynamically matching users for group communications based on a threshold degree of matching of sender and recipient predetermined acceptance criteria
US20030018799A1 (en) 2000-01-24 2003-01-23 Aviv Eyal System and method for media search and playback
US20030054810A1 (en) * 2000-11-15 2003-03-20 Chen Yih-Farn Robin Enterprise mobile server platform
US6549768B1 (en) 1999-08-24 2003-04-15 Nokia Corp Mobile communications matching system
US6578072B2 (en) * 1998-01-14 2003-06-10 Fuji Photo Film, Co., Ltd. Network photograph service system
US6606657B1 (en) * 1999-06-22 2003-08-12 Comverse, Ltd. System and method for processing and presenting internet usage information
US6654789B1 (en) 1999-07-20 2003-11-25 Freshaddress, Inc. System for storing and retrieving old and new electronic identifiers
US20030225836A1 (en) * 2002-05-31 2003-12-04 Oliver Lee Systems and methods for shared browsing among a plurality of online co-users
US6662231B1 (en) 2000-06-30 2003-12-09 Sei Information Technology Method and system for subscriber-based audio service over a communication network
US20040088271A1 (en) 2000-10-10 2004-05-06 Damon Cleckler Media type identification
US20040088355A1 (en) * 1999-12-21 2004-05-06 Thomas Hagan Method of customizing a user's browsing experience on a World-Wide-Web site
US6895084B1 (en) 1999-08-24 2005-05-17 Microstrategy, Inc. System and method for generating voice pages with included audio files for use in a voice page delivery system
US20050271514A1 (en) 2003-02-24 2005-12-08 General Electric Company Coating and coating process incorporating raised surface features for an air-cooled surface
US7080139B1 (en) 2001-04-24 2006-07-18 Fatbubble, Inc Method and apparatus for selectively sharing and passively tracking communication device experiences
US7366522B2 (en) 2000-02-28 2008-04-29 Thomas C Douglass Method and system for location tracking
US20090183091A1 (en) 2000-09-26 2009-07-16 6S Limited Method and system for archiving and retrieving items based on episodic memory of groups of people
US20090271514A1 (en) 1999-06-03 2009-10-29 Yahoo! Inc. System and method for monitoring user interaction with web pages

Family Cites Families (116)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA1341310C (en) 1988-07-15 2001-10-23 Robert Filepp Interactive computer network and method of operation
US7072849B1 (en) 1988-07-15 2006-07-04 International Business Machines Corporation Method for presenting advertising in an interactive service
US5493692A (en) 1993-12-03 1996-02-20 Xerox Corporation Selective delivery of electronic messages in a multiple computer system based on context and environment of a user
US5956715A (en) * 1994-12-13 1999-09-21 Microsoft Corporation Method and system for controlling user access to a resource in a networked computing environment
US5659596A (en) * 1995-04-12 1997-08-19 International Business Machines Corporation System for location of communication end users
US5761669A (en) * 1995-06-06 1998-06-02 Microsoft Corporation Controlling access to objects on multiple operating systems
US6041311A (en) * 1995-06-30 2000-03-21 Microsoft Corporation Method and apparatus for item recommendation using automated collaborative filtering
GB2309105A (en) 1996-01-12 1997-07-16 Ibm Intuitive GUI in the form of a representation of a physical environment
JP3370526B2 (en) 1996-04-24 2003-01-27 富士通株式会社 Mobile communication system and mobile terminal and information center used in the mobile communication system
US5790426A (en) * 1996-04-30 1998-08-04 Athenium L.L.C. Automated collaborative filtering system
US6016475A (en) * 1996-10-08 2000-01-18 The Regents Of The University Of Minnesota System, method, and article of manufacture for generating implicit ratings based on receiver operating curves
US6750881B1 (en) 1997-02-24 2004-06-15 America Online, Inc. User definable on-line co-user lists
US5796952A (en) * 1997-03-21 1998-08-18 Dot Com Development, Inc. Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource database
JPH10300835A (en) 1997-04-25 1998-11-13 Lockheed Martin Corp Quick and accurate specification of geographical position for cellular telephone using gps satellite system
US6052122A (en) 1997-06-13 2000-04-18 Tele-Publishing, Inc. Method and apparatus for matching registered profiles
DE19734671C2 (en) 1997-08-11 1999-10-21 Daimler Chrysler Ag Folding roof arrangement for a motor vehicle with a folding cover
US5948083A (en) 1997-09-30 1999-09-07 S3 Incorporated System and method for self-adjusting data strobe
US6269369B1 (en) 1997-11-02 2001-07-31 Amazon.Com Holdings, Inc. Networked personal contact manager
US8380796B2 (en) 1997-11-02 2013-02-19 Amazon Technologies, Inc. Social networking system
US6236978B1 (en) * 1997-11-14 2001-05-22 New York University System and method for dynamic profiling of users in one-to-one applications
US6064980A (en) * 1998-03-17 2000-05-16 Amazon.Com, Inc. System and methods for collaborative recommendations
JPH11272698A (en) 1998-03-20 1999-10-08 Seiko Epson Corp Information providing system
US6249773B1 (en) * 1998-03-26 2001-06-19 International Business Machines Corp. Electronic commerce with shopping list builder
US6094681A (en) * 1998-03-31 2000-07-25 Siemens Information And Communication Networks, Inc. Apparatus and method for automated event notification
US6151585A (en) 1998-04-24 2000-11-21 Microsoft Corporation Methods and apparatus for determining or inferring influential rumormongers from resource usage data
US6714931B1 (en) * 1998-04-29 2004-03-30 Ncr Corporation Method and apparatus for forming user sessions and presenting internet data according to the user sessions
US6654786B1 (en) 1998-04-30 2003-11-25 Openwave Systems Inc. Method and apparatus for informing wireless clients about updated information
US6799277B2 (en) 1998-06-04 2004-09-28 Z4 Technologies, Inc. System and method for monitoring software
US6240069B1 (en) 1998-06-16 2001-05-29 Ericsson Inc. System and method for location-based group services
US7769620B1 (en) 1998-09-01 2010-08-03 Dennis Fernandez Adaptive direct transaction for networked client group
US5982289A (en) 1998-09-25 1999-11-09 Dowty Aerospace Yakima Drip counter apparatus
US6466788B1 (en) 1998-12-21 2002-10-15 Telefonaktiebolaget Lm Ericsson (Publ) Methods and apparatus for transferring position data between terminals in wireless communications systems
US6782374B2 (en) 1998-12-22 2004-08-24 Accenture Global Services Gmbh System, method and article of manufacturing for a runtime program analysis tool for a simulation engine
US6208866B1 (en) 1998-12-30 2001-03-27 Ericsson Inc. System and method for location-based marketing to mobile stations within a cellular network
US6332127B1 (en) 1999-01-28 2001-12-18 International Business Machines Corporation Systems, methods and computer program products for providing time and location specific advertising via the internet
US20030022684A1 (en) 1999-02-02 2003-01-30 Seeger Stephen C. System, method and device for warning notification
US6317718B1 (en) 1999-02-26 2001-11-13 Accenture Properties (2) B.V. System, method and article of manufacture for location-based filtering for shopping agent in the physical world
US6631496B1 (en) * 1999-03-22 2003-10-07 Nec Corporation System for personalizing, organizing and managing web information
US6813775B1 (en) 1999-03-29 2004-11-02 The Directv Group, Inc. Method and apparatus for sharing viewing preferences
US6757740B1 (en) 1999-05-03 2004-06-29 Digital Envoy, Inc. Systems and methods for determining collecting and using geographic locations of internet users
US6493702B1 (en) * 1999-05-05 2002-12-10 Xerox Corporation System and method for searching and recommending documents in a collection using share bookmarks
US8346626B2 (en) 1999-05-07 2013-01-01 Robertson Steven C System and method for providing electronic multi-merchant gift registry services over a distributed network
US8140402B1 (en) 2001-08-06 2012-03-20 Ewinwin, Inc. Social pricing
IL130303A0 (en) 1999-06-03 2000-06-01 M G Novobiotech Ltd A bacterial strain processed plant extracts and probiotic compositions for human and veterinary use
US6301609B1 (en) * 1999-07-07 2001-10-09 Lucent Technologies Inc. Assignable associate priorities for user-definable instant messaging buddy groups
AU5934900A (en) 1999-07-16 2001-02-05 Agentarts, Inc. Methods and system for generating automated alternative content recommendations
KR100328670B1 (en) 1999-07-21 2002-03-20 정만원 System For Recommending Items With Multiple Analyzing Components
US6549937B1 (en) 1999-07-21 2003-04-15 Microsoft Corporation System and method for multi-protocol communication in a computer network
US7478054B1 (en) * 1999-11-19 2009-01-13 Amazon.Com, Inc. Sharing information about purchases
US7433832B1 (en) * 1999-11-19 2008-10-07 Amazon.Com, Inc. Methods and systems for distributing information within a dynamically defined community
US8271487B1 (en) * 1999-11-23 2012-09-18 Koninklijke Philips Electronics N.V. Hypervideo tracking and reporting system
US7143130B2 (en) 1999-12-09 2006-11-28 Ching-Fang Lin Portable multi-tracking method and system
AU2073401A (en) 1999-12-10 2001-06-18 Myteam.Com, Inc. Tools for administering leagues and accessing and populating a community websitestructure
US7822823B2 (en) 1999-12-14 2010-10-26 Neeraj Jhanji Systems for communicating current and future activity information among mobile internet users and methods therefor
US6832230B1 (en) 1999-12-22 2004-12-14 Nokia Corporation Apparatus and associated method for downloading an application with a variable lifetime to a mobile terminal
US6993590B1 (en) * 2000-01-13 2006-01-31 Inktomi Corporation Method of creating data streams for user-specific usage data gathering systems
US20010034638A1 (en) * 2000-02-05 2001-10-25 John Kelley Server side processing of internet requests
US6934532B2 (en) 2000-02-09 2005-08-23 Apriva, Inc. Communication systems, components, and methods operative with programmable wireless devices
US6931419B1 (en) * 2000-02-11 2005-08-16 Hallmark Cards Incorporated Data management system for automatically accessing, maintaining, propagating user data among plurality of communities, each of which contains plurality of members
AU4327501A (en) 2000-02-29 2001-09-12 Benjamin D Baker Intelligence driven paging process for a chat room
US7072665B1 (en) 2000-02-29 2006-07-04 Blumberg Brad W Position-based information access device and method of searching
GB2360173B (en) 2000-03-07 2004-04-07 Hewlett Packard Co Distributed telemetry method and system
US20020023132A1 (en) 2000-03-17 2002-02-21 Catherine Tornabene Shared groups rostering system
US20030014477A1 (en) * 2000-03-22 2003-01-16 Oppenheimer David Mig Integrated system and method of providing online access to files
US20010027472A1 (en) * 2000-03-27 2001-10-04 Feng Guan Dynamic information sharing based on unique individual ID
US6553236B1 (en) 2000-03-28 2003-04-22 Ericsson Inc. On demand location function for mobile terminal
JP2003530793A (en) 2000-04-11 2003-10-14 アメリカン カルカー インコーポレイテッド GPS issuing application server
US7725523B2 (en) * 2000-04-11 2010-05-25 Bolnick David A System, method and computer program product for gathering and delivering personalized user information
US6506657B1 (en) 2000-04-19 2003-01-14 National Semiconductor Corporation Process for forming damascene-type isolation structure for BJT device formed in trench
US7039699B1 (en) * 2000-05-02 2006-05-02 Microsoft Corporation Tracking usage behavior in computer systems
US6456854B1 (en) 2000-05-08 2002-09-24 Leap Wireless International System and method for locating and tracking mobile telephone devices via the internet
JP2001318847A (en) * 2000-05-11 2001-11-16 Sony Corp Update notifying system, update monitoring device, portable communication terminal, information processor, contents acquisition instructing method, contents acquiring method and program storing medium
US7032023B1 (en) 2000-05-16 2006-04-18 America Online, Inc. Throttling electronic communications from one or more senders
US6947922B1 (en) * 2000-06-16 2005-09-20 Xerox Corporation Recommender system and method for generating implicit ratings based on user interactions with handheld devices
US6795856B1 (en) * 2000-06-28 2004-09-21 Accountability International, Inc. System and method for monitoring the internet access of a computer
US7185192B1 (en) * 2000-07-07 2007-02-27 Emc Corporation Methods and apparatus for controlling access to a resource
US20020069312A1 (en) 2000-07-10 2002-06-06 Jones Gad Quentin System and method for the storage, management and sharing of spatial-temporal based information
US6356838B1 (en) 2000-07-25 2002-03-12 Sunil Paul System and method for determining an efficient transportation route
WO2002009456A2 (en) 2000-07-20 2002-01-31 Aeptec Microsystems, Inc. Method, system, and protocol for location-aware mobile devices
US6968179B1 (en) * 2000-07-27 2005-11-22 Microsoft Corporation Place specific buddy list services
CA2316417A1 (en) 2000-08-18 2002-02-18 Jean-Sebastien Lessard Location bookmarks method and system
US6957199B1 (en) 2000-08-30 2005-10-18 Douglas Fisher Method, system and service for conducting authenticated business transactions
US6895437B1 (en) * 2000-09-07 2005-05-17 Usability Sciences Corporation System for monitoring browsing activity of a visitor and decrementing a reference count upon a web page change for automatic unloading a client program
US20020062368A1 (en) 2000-10-11 2002-05-23 David Holtzman System and method for establishing and evaluating cross community identities in electronic forums
US6414635B1 (en) * 2000-10-23 2002-07-02 Wayport, Inc. Geographic-based communication service system with more precise determination of a user's known geographic location
US7039871B2 (en) * 2000-10-27 2006-05-02 Swiftknowledge, Inc. Secure data access in a multidimensional data environment
US20020107027A1 (en) 2000-12-06 2002-08-08 O'neil Joseph Thomas Targeted advertising for commuters with mobile IP terminals
US6668173B2 (en) * 2000-12-15 2003-12-23 Motorola, Inc. Instant message user location tracking system
US7130630B1 (en) 2000-12-19 2006-10-31 Bellsouth Intellectual Property Corporation Location query service for wireless networks
US6993564B2 (en) * 2000-12-22 2006-01-31 At&T Corp. Method of authorizing receipt of instant messages by a recipient user
US7467212B2 (en) * 2000-12-28 2008-12-16 Intel Corporation Control of access control lists based on social networks
US7133909B2 (en) * 2001-01-12 2006-11-07 Microsoft Corporation Systems and methods for locating mobile computer users in a wireless network
US7343317B2 (en) * 2001-01-18 2008-03-11 Nokia Corporation Real-time wireless e-coupon (promotion) definition based on available segment
US20020103734A1 (en) * 2001-01-27 2002-08-01 Glassco David H.J. Method and apparatus for managing publication and sharing of data
US7139252B2 (en) 2001-01-31 2006-11-21 International Business Machines Corporation System and method for aggregating information to determine users' locations
AU2002247046B2 (en) 2001-02-02 2006-10-05 Opentv, Inc. A method and apparatus for reformatting of content fir display on interactive television
DE60139507D1 (en) 2001-02-08 2009-09-17 Nokia Corp OSITION PROFILES IN MOBILE ADDED VALUE SERVICES
US20020115453A1 (en) 2001-02-16 2002-08-22 Poulin Ronald Leon Method and system for location based wireless communication services
US6714791B2 (en) * 2001-02-23 2004-03-30 Danger, Inc. System, apparatus and method for location-based instant messaging
US7409429B2 (en) 2001-02-26 2008-08-05 International Business Machines Corporation Cooperative location based tasks
US7302634B2 (en) * 2001-03-14 2007-11-27 Microsoft Corporation Schema-based services for identity-based data access
US20030055983A1 (en) * 2001-03-19 2003-03-20 Jeff Callegari Methods for providing a virtual journal
US20020194006A1 (en) 2001-03-29 2002-12-19 Koninklijke Philips Electronics N.V. Text to visual speech system and method incorporating facial emotions
US7412202B2 (en) * 2001-04-03 2008-08-12 Koninklijke Philips Electronics N.V. Method and apparatus for generating recommendations based on user preferences and environmental characteristics
US7003565B2 (en) * 2001-04-03 2006-02-21 International Business Machines Corporation Clickstream data collection technique
US6944447B2 (en) 2001-04-27 2005-09-13 Accenture Llp Location-based services
DE60218152T2 (en) 2001-05-02 2007-12-06 Symbian Ltd. GROUP COMMUNICATION METHOD FOR A RADIO COMMUNICATION DEVICE
US20030013449A1 (en) 2001-07-11 2003-01-16 Hose David A. Monitoring boundary crossings in a wireless network
US7107317B2 (en) * 2002-06-24 2006-09-12 International Business Machines Corporation Targeted information delivery to multiple users
US9940401B2 (en) * 2002-11-18 2018-04-10 Oath Inc. Buddy share
US7343564B2 (en) * 2003-08-11 2008-03-11 Core Mobility, Inc. Systems and methods for displaying location-based maps on communication devices
US20050165920A1 (en) * 2004-01-22 2005-07-28 Kerr Bernard J. Method and system for providing detail information about computer system users for which on-line status and instant messaging capabilities are available
US8090776B2 (en) * 2004-11-01 2012-01-03 Microsoft Corporation Dynamic content change notification
US7801542B1 (en) * 2005-12-19 2010-09-21 Stewart Brett B Automatic management of geographic information pertaining to social networks, groups of users, or assets
US7627652B1 (en) * 2006-01-31 2009-12-01 Amazon Technologies, Inc. Online shared data environment
US20070282621A1 (en) * 2006-06-01 2007-12-06 Flipt, Inc Mobile dating system incorporating user location information

Patent Citations (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5568645A (en) 1991-08-21 1996-10-22 Norand Corporation Versatile RF data capture system
US6195654B1 (en) * 1995-11-16 2001-02-27 Edward I Wachtel System and method for obtaining improved search results and for decreasing network loading
US6018619A (en) 1996-05-24 2000-01-25 Microsoft Corporation Method, system and apparatus for client-side usage tracking of information server systems
US5808613A (en) 1996-05-28 1998-09-15 Silicon Graphics, Inc. Network navigator with enhanced navigational abilities
US5760917A (en) * 1996-09-16 1998-06-02 Eastman Kodak Company Image distribution method and system
US6250930B1 (en) 1997-05-30 2001-06-26 Picante Communications Corporation Multi-functional communication and aggregation platform
US6578072B2 (en) * 1998-01-14 2003-06-10 Fuji Photo Film, Co., Ltd. Network photograph service system
US6480885B1 (en) * 1998-09-15 2002-11-12 Michael Olivier Dynamically matching users for group communications based on a threshold degree of matching of sender and recipient predetermined acceptance criteria
US20090271514A1 (en) 1999-06-03 2009-10-29 Yahoo! Inc. System and method for monitoring user interaction with web pages
US6606657B1 (en) * 1999-06-22 2003-08-12 Comverse, Ltd. System and method for processing and presenting internet usage information
US6654789B1 (en) 1999-07-20 2003-11-25 Freshaddress, Inc. System for storing and retrieving old and new electronic identifiers
US6549768B1 (en) 1999-08-24 2003-04-15 Nokia Corp Mobile communications matching system
US6895084B1 (en) 1999-08-24 2005-05-17 Microstrategy, Inc. System and method for generating voice pages with included audio files for use in a voice page delivery system
US20040088355A1 (en) * 1999-12-21 2004-05-06 Thomas Hagan Method of customizing a user's browsing experience on a World-Wide-Web site
US20030018799A1 (en) 2000-01-24 2003-01-23 Aviv Eyal System and method for media search and playback
US20010036224A1 (en) * 2000-02-07 2001-11-01 Aaron Demello System and method for the delivery of targeted data over wireless networks
US7366522B2 (en) 2000-02-28 2008-04-29 Thomas C Douglass Method and system for location tracking
US20020087496A1 (en) * 2000-04-05 2002-07-04 Stirpe Paul A. System, method and applications for knowledge commerce
US20020065802A1 (en) 2000-05-30 2002-05-30 Koki Uchiyama Distributed monitoring system providing knowledge services
US6662231B1 (en) 2000-06-30 2003-12-09 Sei Information Technology Method and system for subscriber-based audio service over a communication network
KR20020007934A (en) 2000-07-19 2002-01-29 박종득 Electronic album system for wired and wireless internet diary
US20020052925A1 (en) * 2000-08-29 2002-05-02 Yoohwan Kim Method and apparatus for information delivery on the internet
US20020072955A1 (en) 2000-09-01 2002-06-13 Brock Stephen P. System and method for performing market research studies on online content
EP2312871A1 (en) 2000-09-08 2011-04-20 ConFine, Inc. Location dependent user matching system
EP1323318A1 (en) 2000-09-08 2003-07-02 Rovingradar, Inc. Location dependent user matching system
US6618593B1 (en) 2000-09-08 2003-09-09 Rovingradar, Inc. Location dependent user matching system
WO2002021864A1 (en) 2000-09-08 2002-03-14 Rovingradar, Inc. Location dependent user matching system
US20090183091A1 (en) 2000-09-26 2009-07-16 6S Limited Method and system for archiving and retrieving items based on episodic memory of groups of people
US20040088271A1 (en) 2000-10-10 2004-05-06 Damon Cleckler Media type identification
US20020049686A1 (en) * 2000-10-20 2002-04-25 Shu-Min Chuang System, method and article of manufacuture for personal catalog and knowledge management
US20030054810A1 (en) * 2000-11-15 2003-03-20 Chen Yih-Farn Robin Enterprise mobile server platform
JP2002196778A (en) 2000-12-25 2002-07-12 Kenwood Corp Information reproducing apparatus with reproduction function giving priority to history
US20020087382A1 (en) 2001-01-03 2002-07-04 Tiburcio Vincio B. Method and system for assigning and tracking tasks, such as under an electronic auction
US20020144259A1 (en) 2001-03-29 2002-10-03 Philips Electronics North America Corp. Method and apparatus for controlling a media player based on user activity
US7080139B1 (en) 2001-04-24 2006-07-18 Fatbubble, Inc Method and apparatus for selectively sharing and passively tracking communication device experiences
USRE41450E1 (en) 2001-04-24 2010-07-20 Tena Technology, Llc Method and apparatus for selectively sharing and passively tracking communication device experiences
USRE44324E1 (en) 2001-04-24 2013-06-25 Tena Technology, Llc Method and apparatus for selectively sharing and passively tracking communication device experiences
US20030225836A1 (en) * 2002-05-31 2003-12-04 Oliver Lee Systems and methods for shared browsing among a plurality of online co-users
US20050271514A1 (en) 2003-02-24 2005-12-08 General Electric Company Coating and coating process incorporating raised surface features for an air-cooled surface

Non-Patent Citations (15)

* Cited by examiner, † Cited by third party
Title
Advisory Action for U.S. Appl. No. 12/820,579, mailed Oct. 19, 2012, 3 pages.
Advisory Action for U.S. Patent Application No. 131894,009 mailed Aug. 21, 2014, 2 pages.
Author Unknown "Rhapsody Unlimited," Listen.com. Subsidiary of RealNetworks, copyright 2001-2008, printed Aug. 13, 2009, 1 page, .
Author Unknown "Rhapsody Unlimited," Listen.com. Subsidiary of RealNetworks, copyright 2001-2008, printed Aug. 13, 2009, 1 page, <http://learn.rhapsody.com/plans/unlimited?src=rcom—acctcrt—uld&pcode=rn>.
Final Office Action for U.S. Appl. No. 09/841,475, mailed Jun. 8, 2005, 15 pages.
Final Office Action for U.S. Appl. No. 12/820,579, mailed Jun. 18, 2012, 27 pages.
Final Office Action for U.S. Appl. No. 13/894,009 mailed May 13, 2014, 18 pages.
Google News, "Google Google Acquires Usenet Discussion Service and Significant Assets from Deja.com", Feb. 12, 2001. *
Non-Final Office Action for U.S. Appl. No. 09/841,475, mailed Aug. 12, 2004, 12 pages.
Non-Final Office Action for U.S. Appl. No. 12/820,579, mailed May 23, 2011, 19 pages.
Non-Final Office Action for U.S. Appl. No. 13/894,009, mailed Nov. 12, 2013, 17 pages.
Notice of Allowance and Examiner-Initiated Interview Summary for U.S. Patent Application No. 13/894,009 mailed Nov. 14, 2014, 6 pages.
Notice of Allowance for U.S. Appl. No. 09/841,475, mailed Feb. 28, 2006, 7 pages.
Notice of Allowance for U.S. Appl. No. 12/172,518, mailed Mar. 5, 2010, 17 pages.
Notice of Allowance for U.S. Appl. No. 12/820,579, mailed Feb. 14, 2013, 11 pages.

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE47704E1 (en) 2001-04-24 2019-11-05 Ikorongo Technology, LLC Method and apparatus for selectively sharing and passively tracking communication device experiences
USRE48904E1 (en) 2001-04-24 2022-01-25 Ikorongo Technology, LLC Method and apparatus for selectively sharing and passively tracking communication device experiences

Also Published As

Publication number Publication date
USRE44324E1 (en) 2013-06-25
USRE45543E1 (en) 2015-06-02
USRE47704E1 (en) 2019-11-05
US7080139B1 (en) 2006-07-18
USRE48904E1 (en) 2022-01-25
USRE41450E1 (en) 2010-07-20

Similar Documents

Publication Publication Date Title
USRE48904E1 (en) Method and apparatus for selectively sharing and passively tracking communication device experiences
US11556544B2 (en) Search system and methods with integration of user annotations from a trust network
US9189479B2 (en) Semantic web portal and platform
US10740723B2 (en) Computer method and system for searching and navigating published content on a global computer network
US10049345B2 (en) Social network for providing recommendations for items of interest
JP5395014B2 (en) Search system and method integrating user annotations from a trust network
US10740722B2 (en) User-driven media system in a computer network
US20070174389A1 (en) Indicating Recent Content Publication Activity By A User
AU2010200995B2 (en) User-driven media system in a computer network
AU2011250794B2 (en) User-driven media system in a computer network

Legal Events

Date Code Title Description
AS Assignment

Owner name: CONCERT DEBT, LLC, NEW HAMPSHIRE

Free format text: SECURITY INTEREST;ASSIGNOR:TENA TECHNOLOGY, LLC;REEL/FRAME:036501/0123

Effective date: 20150801

Owner name: CONCERT DEBT, LLC, NEW HAMPSHIRE

Free format text: SECURITY INTEREST;ASSIGNOR:TENA TECHNOLOGY, LLC;REEL/FRAME:036501/0280

Effective date: 20150501

AS Assignment

Owner name: CONCERT DEBT, LLC, NEW HAMPSHIRE

Free format text: SECURITY INTEREST;ASSIGNOR:CONCERT TECHNOLOGY CORPORATION;REEL/FRAME:036515/0471

Effective date: 20150501

Owner name: CONCERT DEBT, LLC, NEW HAMPSHIRE

Free format text: SECURITY INTEREST;ASSIGNOR:CONCERT TECHNOLOGY CORPORATION;REEL/FRAME:036515/0495

Effective date: 20150801

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.)

FEPP Fee payment procedure

Free format text: 11.5 YR SURCHARGE- LATE PMT W/IN 6 MO, LARGE ENTITY (ORIGINAL EVENT CODE: M1556)

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553)

Year of fee payment: 12

AS Assignment

Owner name: IKORONGO TECHNOLOGY, LLC, NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CONCERT DEBT, LLC;REEL/FRAME:046726/0749

Effective date: 20180827

Owner name: IKORONGO TECHNOLOGY, LLC, NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TENA TECHNOLOGY, LLC;REEL/FRAME:046728/0857

Effective date: 20180802

Owner name: IKORONGO TECHNOLOGY, LLC, NORTH CAROLINA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CONCERT DEBT, LLC;REEL/FRAME:046728/0647

Effective date: 20180827

AS Assignment

Owner name: SVENDSEN, HUGH B, NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:IKORONGO TECHNOLOGY, LLC;REEL/FRAME:052246/0756

Effective date: 20200320

Owner name: IKORONGO TEXAS, LLC, NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SVENDSEN, HUGH B;SVENDSEN, SARAH S;CURTIS, SCOTT D;AND OTHERS;REEL/FRAME:052246/0791

Effective date: 20200320

Owner name: FARRELLY, EUGENE, NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:IKORONGO TECHNOLOGY, LLC;REEL/FRAME:052246/0756

Effective date: 20200320

Owner name: SVENDSEN, SARAH S, NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:IKORONGO TECHNOLOGY, LLC;REEL/FRAME:052246/0756

Effective date: 20200320

Owner name: CURTIS, SCOTT D, NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:IKORONGO TECHNOLOGY, LLC;REEL/FRAME:052246/0756

Effective date: 20200320

Owner name: HELPINGSTINE, MICHAEL W, NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:IKORONGO TECHNOLOGY, LLC;REEL/FRAME:052246/0756

Effective date: 20200320