MXPA97009752A - Meter and analyzer of computer use - Google Patents

Meter and analyzer of computer use

Info

Publication number
MXPA97009752A
MXPA97009752A MXPA/A/1997/009752A MX9709752A MXPA97009752A MX PA97009752 A MXPA97009752 A MX PA97009752A MX 9709752 A MX9709752 A MX 9709752A MX PA97009752 A MXPA97009752 A MX PA97009752A
Authority
MX
Mexico
Prior art keywords
computer
events
computers
record
predetermined
Prior art date
Application number
MXPA/A/1997/009752A
Other languages
Spanish (es)
Other versions
MX9709752A (en
Inventor
R Coffey Steven
B Pinsley David
A Poloniewicz Karen
J Costello Stephen
N Stanziani Steven
Original Assignee
Pc Meter Lp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/474,082 external-priority patent/US5675510A/en
Application filed by Pc Meter Lp filed Critical Pc Meter Lp
Publication of MX9709752A publication Critical patent/MX9709752A/en
Publication of MXPA97009752A publication Critical patent/MXPA97009752A/en

Links

Abstract

The present invention relates to a computer usage monitoring system comprising: a plurality of local computer usage meters installed in users' computers machines, each including a record of predetermined operation events of the machine stored in the memory of these machines, where said record of predetermined operation events of the machine identifies titles of open windows and shows a record of titles of the World Wide Web pages, a processing station installed on a computer that loads an event log machine default settings in the computer's memory; a database management system installed on a computer and configured to access, process and generate reports based on the machine's operation events stored in the computer's memory. computer, where the processing station is linked with the plural d of local computer use meters

Description

METER AND ANALYZER OF THE USE OF COMPUTERS Background of the Invention 1. Field of the Invention The invention relates to a system for monitoring the use of the computer and, more particularly, a system for collecting, recording and analyzing preselected operations on a personal computer and reporting usage trends. 2. Description of Related Technology The popularity of personal computers has emerged explosively in the past decade. Each year more and more people have used more and more personal computers in more and more ways. This rapid expansion has resulted in an astronomical increase in the amount of money spent on computers, computer-related services, computer programs, peripheral accessories for computers and electronic information and information services. In just a few years, online services such as CompuServe, Prodigy, and America On-Line have gone from virtual darkness to well-known words. Our children learn to navigate the "network" before being able to ride a bicycle. So far, there has not been an effective reliable mechanism to measure the use of the computer on a local or wide basis.
Organizations that sell a product or service related to computers or that conduct a commercial activity in any electronic format will need to intensely measure the use of resources related to computers and the dissemination of electronic information. Much as television advertisers depend on television viewer estimates and viewer demographics to evaluate television sales, "electronic" advertisers and sellers, and producers of products and services related to computers. they will need to evaluate the information about the use of the computer and the "online estimates". Summary of the Invention It is an object of the invention to facilitate the collection of reliable information regarding the use of personal computer programs. It is another object of the invention to facilitate the collection of reliable statistics from the multi-media auditorium of online commercial services and access to the "information road", including the use of the World Wide Web of the Internet. It is another object of the invention to facilitate the establishment of a panel of personal computers using home users in order to develop useful reports for a number of different industries including, without limitation, program manufacturers, online commercial service providers, manufacturers of computer hardware, and online merchants. According to the invention, a system can be provided to intercept and monitor operating system messages. These messages can include instructions directed to various applications or operating system header messages. These messages can be generated internally by the operating system software, such as Microsoft's Windows operating environment. A system according to the invention can filter messages through a vast array and capture only specific messages, such as messages indicating a change in focus from one application to another. These focus changes can include, but are not limited to, an application launch, the termination of an application, permute resources from one application to another, minimize an application, or restore an application. According to the invention, the messages of the operating system can be intercepted and the relevant messages can be recorded in a record file, together with other pertinent or useful information. This pertinent or useful information may include stamping the date, stamping the time, message types such as launch, termination, switching, minimizing, restoring, etc., identification numbers of the user's address, identification of individual users within an address, identification of a file name and file size of an executable program of an application, an application window title, and the handle for the "instance" of the application. A user identification number in an address can be a number that uniquely identifies a personal computer with a "panel" of users of an address, each of which is contributing information to the system through the use of a system of local measurement Conveniently, the system according to the invention can be used in association with a plurality of computers and computer users. Computers and users associated with the system may pretend to be representative of a much larger universe of users. This is analogous to a collection of television auditorium information used to establish television estimates based on a limited number of households. The limited number of households is considered representative of the total use of computers or the "auditorium". According to the invention, a measurement application installed on a personal computer can register events by higher level Windows for any given application. Events that are specific to the sub windows of an application may not necessarily be recorded. For certain applications, the additional event record detailed for the subVentana will be presented. If an application is directed to a more detailed record, the messages that indicate the creation of a subWindow will be recorded. Entries in the log file will advantageously include at least the date, time, user identification number in an address, the individual in an address using the computer, the handle for the example of the main application, the title of Real window of the main application, and the title of the sub windows. Furthermore, it is an object of the invention to monitor and record certain external communications. The local measurement application will monitor strings of characters sent to a communication port as a modem. The system can be tuned to the screen for certain predetermined character strings and certain registration information after the occurrence of these chains. If, for example, the system detects an "http:" string, then the system will recognize that what follows will be the remainder of a Universal Resource Locator (LRU) for a hypertext protocol site on the Internet World Wide Web. If the local meter application identifies a universal resource locator, it will intercept and register the universal resource locator. In this situation, the entry of the registry can include at least the date, the time, the identification number of the address, the individual user in an address. The handle to the main application instance, the actual Window title of the main application, and the universal resource locator (LRU). According to the invention, the application can also generate specialized registers or specialized registration events. These specialized records / events can focus on pre-selected applications or a class of applications, such as online services or Internet browsing applications. Conveniently, a stopwatch can be used to trigger a periodic verification of the focus of a personal computer. Periodic verification can be conducted, for example, every half second or at some other interval as may be appropriate. The interval may be longer to conserve processing resources to the extent of risking having a phase shift. In accordance with one aspect of the invention, periodic verification may combine the operating system for all open windows in order to determine whether pre-selected applications are running. These pre-selected applications can include online service applications, such as America Online, Prodigy, the Microsoft Network or Compuserve. If this application is running, the measurement of the application can register the textual content of the application title bars and the top window in that application. Conveniently, the system can register the title bar only if the textual content of the owner bar or the application of the upper window has changed since the previous verification. In addition, each check can monitor open windows for edit boxes. Upon discovering an edit box in an open window, the system can examine the syntax of the contents of the edit box to determine if it is consistent with a universal resource locator. If so, the universal resource locator can be registered in the event log or in a specialized registry. According to the invention, the measurement application can have several other "home-like" aspects, including a mechanism for installing the measurement application on the computer, a data compression and coding system for data recording, a transfer mechanism of registration, a form of automatic updating software, and a user. The cryptographic compression and coding system can be conveniently provided to minimize the memory resources that must be allocated for the storage of the event record and to cryptographically encode the event record in order to increase the security of the information contained therein. . The data transfer system can be provided to transfer the local personal computer use record to a central processing system. The central processing system can assimilate many records of use of local personal computers, translate the information of the registry into useful information, evaluate the information, and create several reports and analysis of computer use. The transfer can be carried out by any of several different mechanisms including automated electronic transfers, initiated by the user, or initiated at the central office, or copying a local program on a magnetic storage medium such as a diskette, and sending the diskette to a central processing place. The computer usage meter and its support software may from time to time suffer system updates. These updates are intended to add features to the software and to correct any defects. Each member of the panel will be contacted in a fixed cycle, conveniently once a month, in order to collect the activity recorded the previous month. This process can occur via a diskette sent by mail to the panel member, or telecommunicated via the modem. The data transfer program, sent by any means, can first verify notable software updates. If one is programmed, then the software will automatically be transferred to the panel member's computer. The system can include a questionnaire that is invoked in certain circumstances, such as after the use of a particular kind of software, type of application, or periodically the user can receive the notice to enter the desired information that can be stored in the event log or in a separate file. The data transfer system can be used to transmit the answers and copy additional issues or triggers. One of the advantages of the system according to the invention is the recording of changes in the focus of the processor in the event log. Software marketers have a pressing need for information about how users behave with their products. The "use" information is usually obtained, if possible, through paper questionnaires or telephone interviews. In these situations, the respondent is asked to remember their own uses of the product in question. This technique has significant flaws, including limitations and inaccuracies inherent in human memory, limitations on the amount of time that the individual computer user may wish to occupy to provide this information, and the individual response to the questionnaire may be only from one of the household members who uses the computer system and may not have all the relevant information. The system according to the invention overcomes the deficiencies mentioned above. After an initial installation process, the system can be completely passive. That is, the user of the computer does not have to do anything additional for the system to operate effectively. The use of any software product or application program can automatically trigger an event message in the operating system environment which can be registered by the system. Much more information can be gathered in this automated way by the computer than by the subsequent interaction with a computer user. For example, information related to the date and time of an event can easily be captured using the computer's internal clock and calendar, when this information would not normally be remembered by a user during a subsequent personal report. The construction of an event log is typically extremely rich in useful information and will allow for software usage ratings at least through the software title, software subcategory classification (eg, spreadsheets, screen savers, program). of communications, Personal Information Managers, word processors, etc., or by household demographics, v. gr., presence of children, income, geography, etc. The system according to the invention will also be able to measure the use of the program by the total minutes of use, that is, cumulative focus minutes, frequency of use, that is, number of accesses in a given time frame, and computer sharing. will be able to record certain applications in detail The online commercial services industry is very competitive, and with Microsoft entering the industry the competition will be growing. Currently, each of the three largest providers, CompuServe, Prodigy and America On-Line, has two million subscribers. The only major challenge for these organizations is to reduce the dropout rate of subscribers and increase the length of time each individual maintains a subscription. Attrition is in effect a measure of customer satisfaction and is inversely related to a stream of online service earnings. Reducing attrition means keeping subscribers for longer and increasing profits. The system according to the invention can advantageously collect subVentana information for online commercial service providers and user applications. The window titles of these application subwindows generally have useful descriptions of the activity at that time. For example, if a subscriber is using the mail system for that service, then the title of the Window will indicate it. The system according to the invention will register those titles in the record file. To illustrate, the Windows title for the window to write an email message is "Create Mail" on CompuServe, "Write" on Prodigy, and "Compose mail" on America On-Line. The collection and analysis of this information is valuable to online service providers in many ways that include, but are not limited to, time allocation used in various features in competitive services, identification of which characteristics of each are preferred by the users of multiple services, and the identification of which characteristics of several Services are popular and how the attention to these characteristics changes in relation to the duration of the subscription membership. The information registered in the registry is valuable for online service providers because it can give them direct feedback about clients and point out areas for the improvement of services. The system according to the invention can also measure traffic within an online content area of a commercial online service, as magazines and electronic newspapers. As publishers move to the online medium, media traffic statistics become critical. Provides a media plan with an important input. In addition, an advantageous aspect of the invention provides interception and registration of the communication port or modem traffic. As an extension of the tracking activities in commercial online services, the system according to the invention can create a complete picture of the online activity if it also measures the traffic in other communication channels such as the Internet World Wide Web. Internet sites in the "network" can be routed through a Universal Resource Locator scheme. Online merchants are trying to understand the characteristics of network traffic and how much time users spend on different sites. These traffic statistics become fundamental inputs for media planning, analogous to using TV audience estimates as a basis to buy or price commercial time. According to an additional convenient feature, the system includes automated file manager functions. These functions are needed to prevent the system from interfering with the efficient operation of the central computer. Event log files can grow quite a lot. Keeping the registry as small as possible can be important. Data compression techniques should be used to reduce the size of the event log. In addition, the system according to the invention must remain as passive in profile as possible. Thus the automated installation and the data transfer programs will reduce the interference with the use of the computer by the user and minimize the impact on any particular user. Brief Description of the Drawings Figure 1 shows a flow chart for the invention. Figure 2 shows one embodiment of the invention. Figure 3 shows the transmission of messages and events. Figure 4 shows responses to messages. Figure 5 shows a subsystem based on verification. Detailed Description of Preferred Modalities In accordance with one embodiment of the invention, a system is provided for collecting, processing and sending information regarding the use of personal computer resources. Figure 1 illustrates a flow diagram of an embodiment according to the invention. A meter for using the computer 1 can be installed on a personal computer owned and / or operated by a panel or group of users 10. The panel member will advantageously designate the members of a particular household and can constitute one or more individuals. The computer usage meter conveniently generates an event log file 11. A mechanism 2 is provided to transmit the event log files to a central processing station. The transmission can be carried out by transferring it to a portable medium such as a floppy disk or over a communication channel such as a telephone link or via email. The transmission can be triggered or triggered by any predetermined criteria such as the time, the number of registered events, the size of the record file, the resources used or available or any combination thereof. The central processing station accumulates log files from a plurality of separate computer usage meters 12. The central processing station at location 3 will load a database 13 with information from the plurality of event log files. The central processing station may be a microprocessor-based computer and may utilize a variety of custom-developed and / or commercially available database management systems 4 to administer the computer use database 13 and create a dictionary of 14 custom-made data. The custom data dictionary is provided to interpret the raw data provided by the event log files.
In addition, the database management system 4 can extract useful information, provide preliminary processing and / or analysis of the accumulated event record files. The system will also identify usage data in place 15. Any registered event that is not recognized by the dictionary made for the client's needs will be noted as an exception and stored for subsequent manual identification. The intervention of the user or manual intervention in this stage can enable greater identification and the dictionary 14 made for the needs of the client 14 can be updated so that subsequent occurrences of a similar event will automatically be identified by the dictionary 14 made for the needs of the user. client. All registered events identified either through the dictionary made for the needs of the client or through manual intervention 15 will be used to create a primary database of information in place 5. This database can be organized by different systems of database administration. It is contemplated that the database may be in the form of an NPD / POWERVIEW 16 database, commercially available from the NPD Group, Inc. group. In the 6th place, the Powerview database management system may generate reports or information. of preprocessing in the database for the subsequent analysis 7.
The system can generate reports that show information derived from the elements of the maintained database. The data can be organized and reported on virtually any desired formula and organization. Given the advantages and disadvantages of the different commercially available database management systems, the data can be processed through one or more available database systems to generate reports in hard copy 17 or generate sub-databases that they can be used for the analysis or generation of adequate reports. Figure 2 shows a meter of the use of the computer according to the invention with a representation of information and data flow installed in an IBM compatible personal computer operating in the Windows environment. The Windows environment internally generates messages used by various modules to manage the operation of the computer and allocates its resources. Most application program development does not require treatment with the internal header managed by the operating system. The Windows environment handles a vast array of header functions through the use of internal drives. The internal drives can include a Windows 20 keyboard drive and a Windows 21 mouse drive. These drives handle the manipulate mouse pointer header, press the mouse buttons and enter information about the keyboard. User interface events such as mouse events and keyboard events are transmitted to a Windows 22 user module. As shown in Figure 2, the main operation module 23 of the computer usage meter is identified as RITA and operates within its own window. The user module of Window 22 generates application-specific messages such as WM_CREATE, WM_SYSCOMMAND, WM_COMMAND, WM_QUERYENDSESSION, and WM_DESTROY. These messages are intended only for specific primary Windows application modules. The RITA module 23 monitors these messages by commands invoking the main window of the RITA application 23. After being invoked, the HOOKS module 24 operates to provide messages to the main window module RITA 23. During the operation of the personal computer , the user module of Window 22 generates an automatic window call or "CBT" events. Certain specific events are intercepted by the HOOKS DLL module and transmitted to the main RITA module 23. After receiving these messages, the main RITA window sends certain messages to the RITA 24 registry subsystem., the main window RITA 23 transmits program operation time parameters to the RITA INI 25 file subsystem. The RITA INI file subsystem will communicate with a panel member information dialog box 26 for the purpose of collecting the name of the RITA INI file. member of the panel. The panel member information dialog box 26 will also transmit an active user name to the main RITA window 23. The active user name is used in connection with the registration operation. Figure 3 illustrates the transmission of events of CBT windows and the user defined messages of Windows. After the Windows user module 22 generates an HCBT_ACTIVATE message, this message is recognized and registered by the HOOKS DLL module. The HCBT_ACTIVATE indicates the identification of a currently active window and the window that will be activated. After receiving the HCBT_ACTIVATE, the module HOOKS DLL will post a message WH_HCBT-ACTIVATE to indicate the handle to register through RITA the window that is being activated. A handle is an integer, which univocally identifies an active process in Microsoft Windows. After the interception of an HCBT_CREATEWND message indicating the handle of a window recently created by the Windows user module 22, the HOOKS module 24 will set a WH_HCBT__CREATEWND to RITA for registration. After the interception of a message HCBT_DESTROYWND from the module 22 of the Windows user indicating the handle of a window to be destroyed, the HOOKS module 24 will send a message WH_HCBT_DESTROYWND to the main window RITA 23 for registration. After the interception of a HCBT CBT-MINMAX message from the Windows user module indicating the handle of a window to be minimized or maximized, the HOOKS module 24 will post a message WH_HCBT_CBT INMAX to the main window RITA 23. The message HCBT_CBTMINMAX can take many forms, each of which will be operation codes that will indicate if the window is minimizing, maximizing, restoring, and so on. Depending on the intercepted operation code, the HOOKS DLL will settle one of several messages to RITA for registration, including a SW_HIDE, SW_SHOWMINIMIZED, SW_MINIMIZE, SW_RESTORE, SW_MAXIMIZE, SW_N0RMAL or SW-SHOW. Figure 4 illustrates the response of the RITA main window 23 to the Windows application messages generated by the window user module. Block 27 illustrates the response of RITA to a WM_CREATE message. A WM_CREATE message indicates that the application is starting. The answer will be to indicate the panel identification message (if this is the first time the application is executed), to register a METER operation code entry, to register a PANEL operation code entry, to register a code entry of START operation, and to register one or more RUNNG task entries. The indicator for the identification of the panel member allows the panel member to uniquely identify himself / herself with a seven-digit number. Each event that is registered requires the construction of a registry entry as described below. Each entry will include an operation code indicating the type of event that is being recorded. The RUNNG task entries are registered for any Windows application that is already running when the meter for using the computer is invoked through the RITA main module. Block 28 indicates the RITA response to a WM_SYSCOMMAND message. A WM-SYSCOMMAND message indicates that the user has activated the HTI icon of the Windows computer. The answer will be to change the user dialogue and register a PANEL operation code entry. Changing the user dialog affects the name of the user stored in records stored later. Block 29 indicates the RITA response to a WM_QUERYENDSESSION message. A WM_QUERYENDSESSION message indicates that Windows is closing, but first passes the control to RITA so that it can close it cleanly. The answer will be to register a STOPM operation code entry and align the record. Block 30 illustrates the RITA response to the WM_DESTROY message generated by the user module. A message from WM_DESTROY indicates that the user explicitly closed RITA. The answer is to register a STOPM operation code entry and align the record. The operation to align the registry is to write in the registry file any record that still stay in the memory. The log file can use a fixed column format to store data. The first column can contain a registration sequence number that can be used for post-processor parsing. The log file can also include columns for a date stamp and a time stamp to be applied to each record. The following column can include an operation code as follows: RUNNG This designates the tasks that are already running and PANEL The name and identification of the panel member are located in a portion of METER record data The application record and the information of START version Starts the ACTVT measurement Note that the TSTRT top-level window task was triggered Note that a task in the TSTOP top-level window was started Note that a task in the top-level window MINIM Note has been minimized a top-level window REST Note that a top-level window has been restored from its iconic states or restored to its original state from a maximized state STOPM Stops the INTRV measurement Data recorded in an interview The following represents an example of record entries. 00001 05/25/95 10:40:27 METER 1234561 0000 CD = 02.00-02] 00002 05/25/95 10:40:27 PANEL 1234561 0000 [D = Job_ Doe] 00003 05/25/95 10:40: 27 START 1234561 0000 [D = ini StartT EndTarea = l Minimize = 2 Maximize = 1 Acti var = 1 Restore = 1 Execute = 1] 00004 05/25/95 10:40:27 RUNNG 1234561 2a96 [D -C: \ DOS \ MOUSE \ POEN S R.EXS] [T = Options IndicatorJ [S = 10432] 00005 05/25/95 10:40:27 RUNNG 1234561 201e P = C: \ W_ DOWS \ NETDDE.E 'XS] [T-NetDDE] [S = §2432]. 00006 05/25/95 10:40:27 RUNNG 1234561 lfSe P = C: \ W_VDOWS \ S ^ * STE \ DDEML.DLL] [S- 39424] 00007 05/25/95 10:40:27 RUNNG 1234561 0736 [D -C: \ WINDOWS \ SYSTEM \ USER.EXE] [S = 264096] 00009 05/25/95 10:40:27 RUNNG 1234561 37de P = C: \ HTI \ H? .EXE] [T = HT? [S = 55656] 000010 05/25/95 10:40:27 MEMJM 1234561 37de 000011 05/25/95 10:40:28 ACTVT 1234561 164e P = C: \ APPWIN \ DASH \ DASH. EXE] 000014 052595 10:40:29 TSTRT 1234561 357ß [D = C: \ APPW_N \ OMGUI \ OMGUI.EXE] [T = Open Mail user 'pinsley' in server 'nyl'] S = 443360] 000015 05 25/95 10:40:33 TSTRT 1234561 36d6 P = C: \ WINDOWSAJALALLOC. EXE] [S = 3776] 000016 05/25 95 10:40:33 TSTRT 1234561 08cà P P = C: \ WE DOWS \ SYSTEM \ HSASRV.EXE] [T = Wi_dow3 Connectors Asynchronous Peer Server] [S = 6505 000017 05 / 25/95 10:40:34 TSTOP 1234561 357e [D = C: \ APPWIN \ OMGUI \ 0MG U1.EXE] 000018 05 25/95 10:40:34 TSTRT 1234561 357e [D = C: \ APPWr \ OMGUI \ OMG UI.EXE] 000019 05/25/95 10:40:34 ACTVT 1234561 164e P * C: \ APPWDí \ DASH \ D? SH EXE] 000022 05/25/95 10:40:36 ACTVT 1234561 164 * P = C? APP IN \ DASH \ DASH .EXE] 000024 05/25/95 10:40:36 TSTOP 1234561 lfBe 000025 05/25/95 10:40:36 TSTOP 1234561 lfBe 03 = C: \ WTNDO WS \ SYSTEM \ DDE . \ tL.DLL] 000026 05/25/95 10:40:40 ACTVT 1234561 164e P = C: \ APPWT \ D.ASH \ D? SH EXE] 000027 05/25/95 10:40:40 TSTRT 1234561 2fe6 P = C: \ WTNDO WS \ CALC.EXE] [T = Calculator] f S = 43072] 000028 05/25/95 10:40:41 ACTVT 1234561 164 * P -C: \ APPWIN \ DASH \ DAStr EXE] 000029 05/25/95 10:40:43 ACTVT 1234561 164e P = C: \ APPWIN \ DASH \ DASH EXE] 000030 05/25/95 10:40:43 TSTRT 1234561 3016 P = C: \ WINDOWS \ CARDFILE EXE] [T = Card file- (Untitled)] [S = 93184] 000031 05/25/95 10:40:44 ACTVT 1234561 164 * P = C: \ APPWIN \ DASH \ DASH EXE] 000032 0525/95 10:40:46 ACTVT 1234561 164 «P = C: \ APPWIN \ DASH \ DASH. EXE] 000033 05/25 95 10:40:46 TSTRT 1234561 2b 16 p = C: \ WINDO S \ N0TEPAD. EXE] [T = Notes- (Untitled)] ed)] (S = 32736] 000034 05/25 95 10:40:46 ACTVT 1234561 2bl6 P = C: \ WINDOWS \ NOTEPAD. EXE] 000035 05/25/95 10:40:51 ACTVT 1234561 3016 P = C: \ WIND0WS \ CAF-DFILE. EXE] 000036 05/2595 10:40:57 ACTVT 1234561 2fe6 P = C: \ WINDOWS / CALC.EXE] 000037 05/25/95 10:40:58 M3NIM 1234561 3016 P = C: \ WINT0 S \ CAP-DFILE. EXE) 000038 05/25/95 10:40:58 ACTVT 1234561 3016 P = C: \ WINDOWS \ CARDFILE. EXE] 000039 0525/95 10:41:00 ACTVT 1234561 2bl6 p = C: \ INDOWS \ N0TEPAD. EXE] 000040 05/25 95 10:41:02 TSTOP 1234561 2bl6 P = C: \ WINDOWS \ N0TEPAD. EXE] 000041 05/25/95 10: 41.02 ACTVT 1234561 3016 000042 05/25/95 10:41:04 ACTVT 1234561 2fe6 P * C: \ W_VDO S / CALC EX?] 000043 05/25/95 10:41:05 REST 1234561 2fe6- 'P = C: \ WT_vDO S / C.? LC EX?] 000044 05/25/95 10: 41.06 TSTOP 1234561 2 O6 P = C: \ WINT) OR S / CALC.EX?] 000045 05/25/95 10:41:06 ACTVT 1234561 3016 [D- C: \ VVT D0WS \ CARDFD_E EXE] 000046 05/25/95 10:41:08 TSTOP 1234561 3016 P = C: \ ^ T DOWS \ CARDFII__ EXE] 000047 05/25/95 10:41:08 ACTVT 1234561 164e P = C: \ APPWt \ DASH \ D.? SH EX?] 00004S 05 / 25.95 10:41:16 ACTVT 1234561 164e P »C: \ APP IN \ DASH \ DAS_fc EXE] 000049 0525/95 10:41:19 STOPM 1234561 0000 [D = Close Windows] As you can see from the log entry table, each entry includes a sequence number, stamp date, time stamp, operation code or type of event, and data field. The information contained in the data field is dictated by the type of event. In the example shown, the next field contains the panel member or user ID, in this case "1234561" followed by a field that contains the handle to the application instance, Yes, there is. The registration sequence number 00001 has a METER operation code entry that records the application, the logo and the version information in the data field. In the register entry having sequence number 00002, the PANEL operation code is presented to store the name of the panelist and can store other identification information. In the example given, the registered name is John Doe. After the start of the application, a START operation code register entry is made which records the configuration information in the data field. According to a convenient mode, the computer usage meter is automatically minimized after startup. Other relevant information can be included in the data portion of log entries for various types of events. The data field can include different information identified by label. In the example shown, the "S" label identifies the file size of an application. The "T" tag identifies the window title of the application. The "D" label identifies miscellaneous data, typically the complete path of the application. Other information labels could also be registered. According to another embodiment of the invention, the usage meter can record additional events either in the same record file or in auxiliary registered files. Additional events can be recorded based on periodic verification. The periodic verification can be triggered by a chronometer. This stopwatch is conveniently implemented in a software and can be executed in its own window or at a system level. Conveniently, a check is triggered every half second, although other firing periods may be selected. The usage meter can periodically verify the use of the computer to see the activity of online programs. The meter can be set to check the computer for preset or pre-selected applications or applications that depend on predetermined resources such as modem access. The preselected computer applications can be access to known online services and interface applications such as those provided by America Online, Compuserve, Prodigy or the Microsoft Network. If the verification reveals that one of the preselected applications is displayed on the screen, or alternatively, active, the information of the application window and the upper window can be recorded. Conveniently, the recorded information can be the textual content of the title bar of the application and that of the upper window of this application. According to a preferred refinement, the system will only record the textual content of the title bars if the content of the application or the title bars of the upper window are different from the title bars previously registered for the same application. Another modality of the periodical verification feature includes periodically checking preselected types of visual display elements. In the Windows operating system, each window displayed on the screen is made up of several deployment elements. The display elements include, among other things, edit boxes and buttons. According to a preferred form, the contents of the edit boxes can be examined. If the content is consistent with a previously determined criterion, the content will be registered. For example, it is assumed that, if the content of an edit box is consistent with the syntax for the universal resource locator, then the window corresponds to a browse program on the Internet. The registration of the contents of the edit box will be an indicator of the user's access to documents on the internet. Figure 5 shows a usage meter based on verification. The verification-based subsystem includes a timer 40. The timer 40 triggers the verification module 41. The verification module compares the contents of a verification objective 42 against predetermined criteria 43. If the predetermined criteria are satisfied, the verification module creates an entry in the event log 44. The objective may be a display or other information indicative of computer use and activity. Criterion 43 can be an identification of predetermined application programs, windows, or a syntax such as, for example, a syntax consistent with a universal resource locator for the Internet or, more particularly, for the World Wide Web. Technicians with ordinary skill in the art will understand that the usage meter, according to the invention, can be altered in various ways within the basic concept of the invention.

Claims (25)

  1. NOVELTY OF THE INVENTION Having described the foregoing invention, it is considered as a novelty and, therefore, the content of the following CLAIMS is claimed as property l. A computer usage monitoring system comprising: a plurality of local computer usage meters installed on user computers, each including a record of predetermined machine operation events stored in the memory of these machines; a processing station installed in a computer that loads a record of predetermined operation events of the machine in the memory of the computer; a database management system installed on a computer and configured to access, process and generate reports based on the operation events of the machine stored in the computer's memory, - where the processing station is linked to the plurality of meters of use of local computers.
  2. 2. A computer use monitoring system according to claim 1, characterized in that the processing station is linked to the plurality of local computer usage meters by means of an electronic communication channel.
  3. 3. A system for monitoring the use of computers in accordance with claim 2, characterized in that the communication channel is established based on predetermined criteria.
  4. 4. A computer use verification system according to claim 3, characterized in that the predetermined criteria are periodic.
  5. 5. A computer usage verification system according to claim 3, characterized in that the predetermined criterion is based on the amount of memory occupied by the registry.
  6. 6. A computer usage verification system according to claim 1, characterized in that the processing station is linked to the plurality of local computer usage meters by means of elements for transferring a record from a user's computer machine to portable magnetic means and elements for transferring the record from the portable magnetic means to a processing station.
  7. 7. A system for monitoring the use of computers in accordance with claim 1, characterized in that the predetermined events of machine operation include events corresponding to automatic call messages of the operating system.
  8. 8. A system for monitoring the use of computers in accordance with claim 1, characterized in that the predetermined operation events of the machine include events that correspond to an intercepted modem character string.
  9. 9. A system for supervising the use of computers according to claim 1, characterized in that it also comprises a dictionary file stored in the memory of the computer associated with the processing station; and an element to interpret the recorded events of the operation of the machine with reference to the dictionary file.
  10. 10. A method of supervising the use of computers, comprising the steps of: intercepting operating system messages and indicating receipt of predetermined types of messages that respond to an operating system messaging module; create and store an event log that responds to selected operating system messages; transfer one or more event records from one or more computer systems to a central system; and analyze the content of said event records.
  11. 11. A method for determining the nature of computer use by a plurality of computer systems comprising the steps of: generating a register of machine operation events in each of a plurality of computer systems of users; store each of the events in said registry in the local computer memory of the user's computer systems; transferring stored events from the plurality of user computer systems to a processing station computer; load said event logs into the memory associated with the processing station computer; interpret event logs by referring to a dictionary stored in the memory associated with the processing station computer; and - compile and report the records of computer events interpreted according to specified criteria.
  12. 12. A method for determining the nature of computer use by a plurality of computer systems in accordance with claim 11, characterized in that the step of transferring is through an electronic communication channel.
  13. 13. A method for determining the nature of computer use by a plurality of computer systems in accordance with claim 12, characterized by "that the step of transferring is initiated based on predetermined criteria.
  14. 14. A method for determining the nature of computer use by a plurality of computer systems in accordance with claim 13, characterized in that the predetermined criteria are periodic.
  15. 15. A method for determining the nature of computer use by a plurality of computer systems in accordance with claim 13, characterized in that the predetermined criteria are based on the amount of memory occupied by said registers.
  16. 16. A method for determining the nature of computer use by a plurality of computer systems in accordance with claim 11, characterized in that the step of transferring comprises transferring a record from a user's computer machine to a portable magnetic medium. and transferring the record of the portable magnetic medium to the computer of the processing station.
  17. 17. A method for determining the nature of computer use by a plurality of computer systems according to claim 11, characterized in that the machine operation events include predetermined events corresponding to automatic system call messages. operative
  18. 18. A method for determining the nature of computer use by a plurality of computer systems according to claim 11, characterized in that the machine operation events include events corresponding to an intercepted modem character string .
  19. 19. A method of supervising the use of computers that includes the steps of periodically verifying the information displayed on a computer monitor; and create and store a record of labels indicating the activity of use.
  20. 20. A method of monitoring the use of computers in accordance with claim 19, characterized in that the step of verifying scrutinizes information displayed by preselected computer application programs.
  21. 21. A method of monitoring the use of computers in accordance with claim 20, characterized in that the preselected computer application programs are access and interface programs to online services, and the step of creating and storing said record of labels. records titles of active visual display elements.
  22. 22. A method of monitoring the use of computers in accordance with claim 19, characterized in that the step of verifying monitors the content of the elements that are displayed satisfying and identifying the content according to predetermined creterios; and the step of creating and storing comprises registering the content of identified deployment elements.
  23. 23. A computer usage meter as claimed in claim 22, characterized in that the display elements are edit boxes and a predetermined criterion is a predetermined syntax.
  24. 24. A computer usage meter according to claim 23, characterized in that said syntax is a universal resource locator syntax.
  25. 25. A computer usage meter as claimed in claim 23, further comprising the step of intercepting operating system messages and indicating receipt of predetermined types of messages that respond to an operating system message module.
MXPA/A/1997/009752A 1995-06-07 1997-12-05 Meter and analyzer of computer use MXPA97009752A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/474,082 US5675510A (en) 1995-06-07 1995-06-07 Computer use meter and analyzer
US08474082 1995-06-07

Publications (2)

Publication Number Publication Date
MX9709752A MX9709752A (en) 1998-07-31
MXPA97009752A true MXPA97009752A (en) 1998-11-09

Family

ID=

Similar Documents

Publication Publication Date Title
US5675510A (en) Computer use meter and analyzer
WO1996041495A9 (en) Computer use meter and analyzer
US5918014A (en) Automated collaborative filtering in world wide web advertising
US6934687B1 (en) Computer architecture and method for supporting and analyzing electronic commerce over the world wide web for commerce service providers and/or internet service providers
US9779415B2 (en) Method and system for optimum placement of advertisements on a webpage
US7308497B2 (en) On-line experimentation
CN101563702A (en) Methods of detecting and avoiding fraudulent internet-based advertisement viewings
DE10244974A1 (en) Automatic advertiser notification for a system for providing place and price protection in a search result list generated by a computer network search engine
EP1015978A2 (en) Monitoring of remote file access on a public computer network
US7206835B2 (en) User operation log recording and storing apparatus using object-oriented technology
JP2002163562A (en) Information distribution server device
US20060212349A1 (en) Method and system for delivering targeted banner electronic communications
GB2357680A (en) Monitoring of services provided over a network with determination of interactive content of web pages
US20030040889A1 (en) Computer use meter and analyzer
KR100792277B1 (en) Method and apparatus for target-advertising using on-line trendy terms or topical terms collected in real time
US20020052787A1 (en) Method for providing advertisement contents
CN101887463A (en) Virtual domain-based HTTP reduction display method
WO2000074193A9 (en) User support system and method
JP2006195974A (en) Platform managing display as target of advertisement in computer network
EP1218835A4 (en) Managing the delivery of content to users
MXPA97009752A (en) Meter and analyzer of computer use
Cohen A two-tiered model for analyzing library web site usage statistics, part 2: log file analysis
KR100592079B1 (en) System for Providing On-line Personal Service and Method for Managing On-line Target Business Using Screen Saver
JP2003141410A (en) Advertisement management system and method on internet site
Darrow et al. United States Patent [19J