US20090070290A1 - Method and Apparatus for Providing Geographically Authenticated Electronic Documents - Google Patents
Method and Apparatus for Providing Geographically Authenticated Electronic Documents Download PDFInfo
- Publication number
- US20090070290A1 US20090070290A1 US12/235,434 US23543408A US2009070290A1 US 20090070290 A1 US20090070290 A1 US 20090070290A1 US 23543408 A US23543408 A US 23543408A US 2009070290 A1 US2009070290 A1 US 2009070290A1
- Authority
- US
- United States
- Prior art keywords
- digital certificate
- authenticated digital
- business
- electronic document
- authenticated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/29—Geographical information databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9537—Spatial or temporal dependent retrieval, e.g. spatiotemporal queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99937—Sorting
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99938—Concurrency, e.g. lock management in shared database
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99939—Privileged access
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99943—Generating database or data structure, e.g. via user interface
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99944—Object-oriented database structure
- Y10S707/99945—Object-oriented database structure processing
Definitions
- This invention relates generally to enhanced searching techniques for electronic documents, and more specifically to the authenticating of electronic documents, referenced by electronic document addresses associated with geographic locations used in searching.
- Searching for a particular electronic document on a network based upon geographic location currently presents many problems. For example, searching to find an HTML document on the World Wide Web associated with a geographic location returns many false positives (electronic documents not really associated with the geographic location specified) while also resulting in many misses (electronic documents not found that really are associated with the geographic location).
- the enormous number of electronic documents on the World Wide Web it is estimated that 2.2 million Web sites offer 300 million Web documents) multiplies the problem of false positives in a geographic based search.
- Keyword-based geographic searching functionality such as GeoSearch by Vicinity Corporation (used on www.northernlight.com) provides some geographic restricted search capability.
- GeoSearch by Vicinity Corporation (used on www.northernlight.com) provides some geographic restricted search capability.
- a keyword search based upon the geographic location specified is executed, then the user's location is determined and found electronic documents that are determined to be within a predefined range of the user are reported.
- the user's location is usually determined by querying the user for their city, state, country or zip code information.
- the geographic location of the electronic documents is determined by a specialized keyword parsing algorithm designed to identify addresses within electronic documents. Simply finding keywords that indicate an electronic document contains an address does not guarantee that the address corresponds to a geographic location associated with the electronic document.
- online yellow pages Another approach to searching for electronic documents associated with geographic locations is the use of “online yellow pages” type functionality.
- a directory of business names is created that is searchable and sortable using geographic location.
- Providers of online yellow pages directories solicit data from prospective businesses and provide a searchable online listing for the businesses.
- the listing includes a name, address and phone number and is searchable by business name or business category.
- Yellow page directories typically exclude non-business entities (e.g., schools, government offices). Some services provide a URL if the business has a Web site.
- An exemplary online yellow pages site is www.yellowpages.com.
- Search engines lack the ability to search by geography and existing keyword-based geographic searching functionality suffers from a lack of accuracy and authentication of the geographic locations coded into the electronic documents, as well as a lack of proper association of geographic location with electronic documents that may contain geographic location. Additionally, the present invention does not require that the geographic location information be stored within the electronic document, nor that an electronic document have a physical location associated with it. Attributes of electronic documents can be derived from information stored within the electronic document or attributes can be created from other sources with knowledge about the electronic document or its owners.
- the present invention provides for the creation of a digital certificate defined as a structured collection of data requiring only a name, an electronic address and a geographic location which are authenticated to create an authenticated digital certificate.
- Embodiments of the present invention can represent the authenticated digital certificate as a metatag, a separate file and a record in a database.
- a metatag For a traditional business its geographic location is its physical location or street address.
- a virtual business that has no physical location its geographic location may be its URL, the physical location of its hosting server, the address of the owner as listed on its articles of incorporation, its corporate headquarters, or another identifier.
- the name and the URL may also be the same.
- Yellow page directories represent a link between the physical world and the telephone.
- the minimum definition to be listed in the yellow pages (or the white pages) is a telephone number, and a name. Quite commonly an address is also listed, although it is not a requirement.
- the world represented by the paper-based yellow pages is a paid listing service, so a set of yellow pages does not represent the entire community of businesses, but only those who choose to pay for a listing. If the listings were free and every business subscribed, the yellow pages would represent a very good collection of local businesses and their phone numbers, sorted by category.
- the Internet equivalent of the yellow pages is simply an electronic version of the paper-based yellow pages that is available and can be viewed online.
- Yellow pages are a representation of the physical world and their phone numbers, they make no provision for businesses or entities that are solely Internet based virtual businesses, businesses which do not have phones, businesses which have unlisted phone numbers, or non-business entities.
- Online yellow pages directory systems are limited to businesses that have a phone number. These directory systems often require listees to pay to input their data, often their data does not include a URL. The present invention requires the existence of a URL, even if it must be generated in order to create an authenticated digital certificate.
- a business servicing a large geographical area may not be listed in areas where there are potential customers, due to the cost of these additional listings.
- the number of potential customers decreases the further out from a central location, but the yellow page costs are fixed on a per capita basis. Therefore, yellow pages are an expensive way to reach a large market area.
- online current yellow page systems lack a common format so that data interchange and data presentation within these systems suffer.
- Online yellow pages and city pages portals have no harmonious interface, some require keywords, others search by zip code, still others by SIC code.
- city pages the domains are different from city to city, so there is no way to know the URL of the city page if you are visiting another city without asking someone or using a search engine. Without a method that a user can be comfortable with to find any local business on a consistent basis, the process of searching and viewing is harder to accomplish.
- a database can be created that maps the electronic world and their physical or virtual locations.
- the minimum definition is that the listing must have a URL (therefore some existence in the electronic world), and a name associated with that URL and a geographic location, but the geographic location need not be a physical location.
- the virtual store may have no full time employees, no phone number and no physical location.
- a virtual business exists and is listed with no physical location. This type of business does not exist in the yellow pages environment.
- an online yellow pages directory does not require URLs it cannot sort or present its data by any characteristics that are URL dependent, such as privacy statements, recommended bandwidth or display resolution of the site, frames or no frames, terms of payment on line, language of web site, et cetera., without excluding valued listings.
- Localized portals suffer from many of the same problems as keyword-based geographic searching as they often operate simply using a predefined geographic term in a standard keyword-based geographic search, and also do not require URLs.
- the present invention provides a method of authentication for attributes of an electronic document stored on a computer network by identifying the attributes of the electronic document, comprising at least one attribute describing a geographic location associated with the electronic document. At least some of the attributes of the electronic document are then authenticated and an authenticated digital certificate describing the authenticated attributes of the electronic document is created and stored.
- the attributes can include a checksum to ensure integrity, encoding to provide space saving and accuracy, and encryption for security.
- the present invention authenticates attributes (e.g., geographic location) of an electronic document (e.g., Web page) allowing for more accurate geographic searching and filtering.
- An authenticated digital certificate is created and associated with an electronic document. Authentication with respect to an electronic document stored on a computer network is accomplished by identifying an electronic address associated with the electronic document and identifying a geographic location associated with the electronic document. The geographic location is authenticated and an authenticated digital certificate comprising the authenticated geographic location is stored in an authenticated digital certificate database.
- Authenticated digital certificates can improve searching for electronic documents on a computer network by providing a geographic location filter to a query interface and searching for electronic documents within an authenticated digital certificate database that match the geographic location. An authenticated set of electronic documents or electronic document addresses is returned.
- Another improvement related to searching for electronic documents on a computer network includes parsing a keyword query and determining that a geographic search is indicated based upon the identification of geographic terms in the keyword query.
- a keyword search is performed on an index of the electronic documents and a geographic search, with or without keywords, is performed on records in an authenticated digital certificate database.
- the geographic search can be used to tag or remove results from the keyword search, or the results of both searches can be displayed in separate windows.
- An authenticated digital certificate associated with an electronic document can be displayed on a computer by presenting, in a structured format, an electronic address associated with the authenticated digital certificate and displaying a representation of the authenticated digital certificate based upon selection of the electronic address.
- the integrity of a stored authenticated digital certificate can be verified by obtaining an electronic document address from the stored authenticated digital certificate and establishing the existence of an electronic document associated with the electronic document address and possibly the existence of other authenticated attributes.
- the travel agency's Web page may contain sections advertising five different vacation spots (e.g., Hawaii, Aruba, Las Vegas, Bermuda and Guelph). Within each section, locations of various hotels, museums and restaurants may be listed.
- a traditional search engine e.g., Yahoo! or a current geographic search engine (e.g., GeoSearch by NorthernLight) will identify the local travel agency's Web page as being associated with many addresses in Hawaii, Aruba, Las Vegas, Bermuda and Guelph, as well as Boston. This will produce many false positives in a search for local travel agencies.
- an authenticated digital certificate created according to an embodiment of the present invention will associate the local travel agency's Web page with its Boston street address. Using the authenticated digital certificate a Web searcher will be able to locate a business location more effectively and with much greater accuracy and confidence in the search results.
- FIG. 1 illustrates a computer system on which an embodiment of the present invention is implemented.
- FIG. 2 shows the internal structure of a computer in FIG. 1 .
- FIG. 3 illustrates an authenticated digital certificate showing basic attributes in a Retail Business classification as configured in an embodiment of the present invention.
- FIG. 4 illustrates an authenticated digital certificate showing basic attributes in a Virtual classification as configured in an embodiment of the present invention.
- FIG. 5 illustrates an authenticated digital certificate showing extended attributes as configured in an embodiment of the present invention.
- FIG. 6 is a flowchart of an embodiment of the present invention showing a process for creating an authenticated digital certificate.
- FIG. 6 a is a flowchart of an embodiment of the present invention showing a process for authorizing the submission of an authenticated digital certificate.
- FIG. 6 b is a flowchart of an embodiment of the present invention showing a process for authenticating the geographic location associated with an authenticated digital certificate.
- FIG. 7 is a flowchart of an embodiment of the present invention showing a process for direct searching using an authenticated digital certificate.
- FIG. 8 is a flowchart of an embodiment of the present invention showing a process for parallel searching using an authenticated digital certificate.
- FIG. 9 is a flowchart of an embodiment of the present invention showing a process for viewing an authenticated digital certificate.
- FIG. 10 is an illustration of a map displayed according to an embodiment of the present invention showing an interface for selecting and viewing an authenticated digital certificate.
- FIG. 11 is a flowchart of an embodiment of the present invention showing a process for verifying the integrity of an authenticated digital certificate.
- FIG. 1 illustrates a computer system on which an embodiment of the present invention is implemented.
- a computer 100 provides processing and input/output devices for searching and viewing geographically authenticated electronic documents.
- an authenticated digital certificate aware browser running on computer 100 is used to provide searching and viewing capabilities for geographically authenticated electronic documents.
- Computer 100 is connected to a keyboard 102 and mouse 104 for receiving input and a display 106 for presentation of geographically authenticated electronic documents. Keyboard 102 and mouse 104 are optional examples of input devices, specific computers 100 may have unique or custom input devices (e.g., trackball or touchpad controls).
- Computer 100 is also linked to a network 110 having access to servers ( 120 , 122 ).
- the network can be part of the Internet, the worldwide collection of computers, networks and gateways that use the TCP/IP suite of protocols to communicate with one another.
- the Internet provides a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, government, educational, and other computer systems, that route data and messages.
- Web Server 122 is connected to the network 110 hosts electronic documents for display on computer 100 .
- the electronic documents can include specially formatted HTML Web pages as well as other electronic document types hosted on a Web server 122 or other servers connected to the network 110 .
- Web server 122 hosts electronic documents associated with a plurality of business entities, each having an electronic document address in the form of a Uniform Resource Locator (“URL”).
- URL Uniform Resource Locator
- Web server 122 hosts electronic documents associated three business entities, namely Business A, Business B and Business C.
- the electronic documents associated with these business entities are referenced by the electronic document addresses www.Business_A.com 130 , www.Business_B.com 132 , and www.Business_C.com 134 .
- the electronic document referenced by electronic document address www.Business_A.com 130 is associated with a business having a single physical street address in Boston, Mass., USA.
- the electronic document referenced by electronic document address www.Business_B.com is associated with a business having multiple physical street addresses, including: Guelph, Ontario, Canada; Toronto, Ontario, Canada; and Brampton, Ontario, Canada.
- the electronic document referenced by electronic document address www.Business_C.com 130 is associated with a virtual business having no physical street address for doing business. All the electronic documents in this example are hosted on the same Web server, Web server 122 , which is physically located at a site independent of the business locations associated with the electronic documents it hosts. Although, for virtual businesses Web server 122 may be listed as the geographic location of www.Business_C.com 130 .
- a retail classification is an example of a business having a physical location.
- a virtual classification is an example of a business having no physical location (e.g., an online store).
- a hybrid business presenting a virtual storefront on the Web for doing business and maintaining a physical street address for back-office operations, corporate headquarters or warehousing can also be represented using authenticated digital certificates having extended attributes for these “non-business” addresses.
- the authenticated digital certificate is stored as a record in an online authenticated digital certificate database. Attributes of the electronic document can correspond to fields in the database record. Access and security of the authenticated digital certificate can be managed by the database management system managing the database record.
- the database storage configuration allows for creating authenticated digital certificates without impacting the storage or management of the electronic document itself.
- An authenticated digital certificate database 121 is used to store database records representing authenticated digital certificates (see FIGS. 3 , 4 , 5 ).
- the authenticated digital certificate database 121 is hosted on authenticated digital certificate database server 120 .
- the authenticated digital certificates provide information about electronic documents hosted on various computers (e.g., Web server 122 ) on network 110 .
- Authenticated digital certificate database server 120 also hosts processing routines to create, authenticate, search and verify authenticated digital certificates.
- Computer 100 hosts processing routines to initiate searching and viewing of authenticated digital certificates, for example through the use of a Web browser plug-in. These processing routines can run in memory 200 ( FIG. 2 ) as part of computer 100 or server 120 .
- a browser is a client application that enables a user to view HTML documents on the World Wide Web, another network, or the user's computer; follow the hyperlinks among them; and transfer files. Some Web browsers require helper applications or plug-ins to accomplish one or more of these tasks.
- a plug-in is a small software program (e.g., authenticated digital certificate searching routine) that plugs into a larger application (e.g., Web browser) to provide added functionality (e.g., improved geographic searching).
- FIG. 2 shows the internal structure of the computers in FIG. 1 .
- the computers ( 100 , 120 , 122 ) contains a system bus 204 , a bus is a set of hardware lines used for data transfer among the components of a computer system.
- a bus is essentially a shared highway that connects different parts of the system (e.g., processor, disk-drive controller, memory, and input/output ports) which enables the different parts to transfer information.
- Attached to system bus 204 is display interface 206 , display interface 206 allows display 106 to communicate with other components on system bus 204 .
- Keyboard interface 208 and mouse interface 210 are also attached to system bus 204 and allows the input devices to communicate with other components on system bus 204 .
- Network interface 212 provides the link to an external network (e.g., network 110 ) allowing processes running on computer 100 to communicate with servers (e.g., 120 , 122 ) connected to a network 110 .
- a memory 200 can store computer software instructions and data structures used to implement embodiments of the present invention.
- a processor 202 executes instructions stored in memory 200 , allowing the computer ( 100 , 120 ) to create, authenticate, search, view and verify geographically authenticated electronic documents.
- an electronic document address (e.g., URL) is associated with a business in one of two ways: as a physical location or as a virtual location.
- the first category are businesses (or other entities) with physical retail locations defined as a place of business where a consumer can visit to view, acquire, discuss, negotiate etc. in the normal course of business or operation. This category is called ‘physical’.
- the second category are businesses (or other entities) that do not have physical locations except possibly to support their non-physical (virtual) presence such as a website store. They may have physical locations such as a corporate headquarters, or warehouses, or home office, but there are not open to the public in the normal course of business or operation. These are defined as ‘virtual’ or ‘Web’ businesses. Hybrid combinations are also possible.
- FIG. 3 illustrates an authenticated digital certificate showing basic attributes in a Retail Business classification as configured in an embodiment of the present invention.
- a retail classification is an example of a business having a physical location.
- An authenticated digital certificate containing geographic location data is very important in identifying a business associated with an electronic document. Geographic location information includes street, town, country and zip code information as well as longitude, latitude and altitude information. This geographic location information can be used when searching for business within a certain proximity from a given location.
- the authenticated digital certificate can also be used when viewing an electronic document associated with a business to ensure the viewer is seeing verified geographic location information. Geographically verified URLs provide a level of reliability when searching and viewing electronic documents that is not provided by current geographic based searches.
- Businesses having a physical location have two sub-categories: businesses/entities with only one physical location and businesses/entities with more than one physical location.
- the physical category the physical location is the street address of the location of a business that the consumer can visit. In the case of commercial businesses, this would likely be the address where commerce takes place, a retail outlet.
- Basic attributes of an authenticated digital certificate include a certificate ID (identifier) which uniquely identifies the authenticated digital certificate.
- identifier Various phone numbers associated with the business are listed.
- One preferred embodiment for implementing authenticated digital certificates involves storing the authenticated digital certificates in memory as objects based upon classes defined in an object-oriented design. These objects can contain data structures for a header containing an identifier and geographic location, as well as a set of attributes associated with the authenticated digital certificate for the business.
- authentication is a tiered process, involving both automated and manual processing, therefore a trust level (e.g., “Gold”) is stored with the digital certificate along with a date the digital certificate was last authenticated.
- a trust level e.g., “Gold”
- authentication is categorized into an internationally recognizable, four-tiered, stoplight-based color trust/authentication scheme (i.e., Red, Yellow, Green, plus Gold).
- a red level (stop) indicates a dead link (e.g., the electronic document address no longer points to a valid electronic document). It may also indicate that an authenticated digital certificate could not be issued because of conflicting information found during authentication.
- a yellow level indicates an authenticated digital certificate that has recently had recurring access problems, or the spider had detected changes in information, or sites that have been reported as incorrect and not yet verified.
- a green level is used for newly created authenticated digital certificates that have not be given Gold status yet, all sites that have been automatically authenticated, and are believed to be accurate but have not passed the Gold level of authentication.
- a gold level (as good as gold) would be limited to authenticated digital certificates where contact had been made with the owner, and the complete set of basic attributes have been completed. Extended attributes are not required, but are desired.
- FIG. 4 illustrates an authenticated digital certificate showing basic attributes in a Virtual classification as configured in an embodiment of the present invention.
- a virtual classification is an example of a business having a virtual location.
- other attributes including a “zone of service”, where the entity or business can conduct commerce, can be defined.
- the zone of service could be defined as the area where the products sold, or services offered, by this virtual business can be legally sold and shipped (if shipping is involved).
- Virtual businesses may have several zones of service to cover cases of multiple product lines, each with different zones of service.
- a hybrid category of business exists where a business in a physical category also operates in a virtual fashion, in which case, they could also have a zones of service in addition to their physical location.
- a virtual business could open a physical store, in which case they could be reclassified as a hybrid as well, although their main category would still be virtual.
- the virtual businesses would be able to indicate the existence of their physical store, while the physical store can promote their Web presence.
- FIG. 5 illustrates an authenticated digital certificate showing extended attributes as configured in an embodiment of the present invention.
- FIG. 5 shows the extended attributes of the authenticated digital certificate of FIG. 3 .
- the extented attributes are exposed by performing a user interface gesture (e.g., clicking) on the extended profile link in the authenticated digital certificate of FIG. 3 .
- Extended attributes often vary depending upon the type of business that is represented by the electronic document, or electronic address (URL).
- One approach is to classify each electronic document according to the Standard Industry Classification (“SIC”) code associated with the business it represents, extended to include new virtual classes of businesses.
- SIC Standard Industry Classification
- a template of pertinent attributes can be derived and used as a basis for the extended attributes that are stored in the authenticated digital certificate.
- Extended attributes may not actually be stored within the authenticated digital certificate itself, but may be accessible by way of links to the extended attributes, which can be stored separately (e.g., in an online database).
- authenticated digital certificates that are returned can provide extended attributes (information) not found in directory listings. Examples of additional information include: hours of operations, credit cards accepted, return policies, privacy policies, membership in associations such as the Better Business Bureau, American Association of Retired People and the American Automobile Association.
- Authenticated digital certificates also resolve the problem of the directory listings listing businesses in non-intuitive SIC headings, by searching not only business names, but also business keywords and brand names carried. For example, a user performing a search on “Nike running shoes” using a authenticated digital certificate aware process would receive matches if the stores listed “Nike” as a brand that they carried.
- FIG. 6 is a flowchart of an embodiment of the present invention showing a process for creating an authenticated digital certificate.
- the creation process starts at step 602 with the submission of an electronic document for the purpose of creating an authenticated digital certificate. Certain attributes (e.g., geographic location) of the electronic document are identified as those for which authentication is to be performed.
- the submission is typically in the form of a reference to the electronic document, such as an electronic document address (URL).
- the process checks whether or not the submitter is authorized to submit the electronic document and whether the owner can be correctly verified (see FIG. 6 a ). If the submitter is not authorized the process ends, otherwise a check is made as to whether or not the submitted electronic document is already authenticated (Step 606 ). If the electronic document is already authenticated (i.e., a record for it exists in an authenticated digital certificate database) then the process ends.
- Step 610 the geographic location attribute of the electronic document is authenticated (see FIG. 6 b ). If the electronic document is associated with multiple locations (Step 612 ) then the geographic location verification (Step 610 ) is performed for each of the multiple geographic locations. When all the geographic locations have been processed Step 614 processes any other desired attributes of the electronic document for authentication according to an appropriate authentication process (e.g., cross-referencing a phone number attribute with current phone listing directory). Partial geographic verification (e.g., where only some of the multiple locations are verified) is possible, but not reflected in flowchart of FIG. 6 .
- the authenticated digital certificate is created at step 616 .
- the authenticated digital certificate can be stored (Step 618 ) in a variety of configurations.
- the authenticated digital certificate is stored as a record in an online authenticated digital certificate database. Attributes of the electronic document can correspond to fields in the database record. Access and security of the authenticated digital certificate can be managed by the database management system managing the database record.
- the database storage configuration allows for creating authenticated digital certificates without impacting the storage or management of the electronic document itself.
- Database record storage also allows for creation of authenticated digital certificates for electronic documents without the permission or knowledge of the electronic document owner.
- the electronic document is not pre-existing (e.g., the business submitted has no Web page). In this case, an electronic document address is created on-the-fly and stored with the authenticated digital certificate. Later, a matching electronic document may have to be created on-the-fly to satisfy a search or view request.
- the authenticated digital certificate can also be stored in a separate file within a directory from which the electronic document is accessed.
- the directory can be organized as a hierarchical tree structure, the authenticated digital certificate authenticating electronic documents within the directory.
- the authenticated digital certificate can also be stored in a parent directory within the hierarchical tree structured directory, optionally authenticating electronic documents in the parent directory and child directories.
- an authenticated digital certificates exist at various levels within a hierarchical tree structured directory the authenticated digital certificate located closest in the parental lineage to the electronic document (including the directory of the electronic document itself) is used.
- the authenticated digital certificate file can be secured by various existing methods, including locking and encryption schemes.
- the authenticated digital certificate can be stored as part of an existing signed and encrypted digital certificate. Technologies currently exist to encrypt and sign electronic documents, the authenticated digital certificate can be stored as an additional component of existing signed digital certificates. Optionally, existing digital signature and encryption technologies can be used to create a standalone authenticated digital certificate of the present invention.
- the authenticated digital certificate can be stored as part of the electronic document itself.
- One example is storing the authenticated digital certificate as an HTML metatag in an HTML Web page.
- Electronic documents using different page formats provide alternate mechanisms for storing information within an electronic document.
- a proposal for embedded metatags for geographic locations exists in the form of an Internet Engineering Task Force (“IETF”) Internet Draft entitled “Geographic registration of HTML documents” describing a concept of “geotags” (see draft at “http://search.ietf.org/internet-drafts/draft-daviel-html-geo-tag-02.txt”).
- the geotags described in the IETF Internet Draft contain some of the same information that is stored in the digital certificates of the present invention, but geotags lack a concept of authentication, encoding of attributes or checksum integrity verification.
- FIG. 6 a is a flowchart of an embodiment of the present invention showing a process for authorizing the submission of an authenticated digital certificate.
- This process for authorizing the submission of an authenticated digital certificate is an expansion of Step 604 described in FIG. 6 .
- the process insures that the submitter is authorized and that the owner is correctly verified.
- a primary domain is defined as any domain which is not a sub-domain of another domain (e.g., www.mystore.com).
- a sub-domain is defined as a domain which is hosted under a primary domain. (e.g., www.mystore.com/fredspizzaplace).
- online databases e.g., www.whois.org
- a “green level” authenticated digital certificate can be issued for the electronic document, upon further contact with the actual owner a “gold level” authenticated digital certificate may be issued.
- sub-domain URLs e.g., electronic documents stored below a primary domain URL
- verification of ownership is determined based upon the ability to legally access/modify the electronic document submitted.
- a digital certificate is generated and electronically mailed to the identified owner of the electronic document.
- an authenticated digital certificate can be created.
- Additional checks on the submitter can be performed to ensure an effective and efficient processing of electronic document submissions. For example, statistics can be maintained to determine if a certain submitter is submitting bogus electronic documents or mechanically generating excessive submissions based on robots or spidering. These checks help prevent fraudulent submissions as well as reduce the chances of spamming the authenticated digital certificate authority site.
- Step 620 the identity of the submitter of an electronic document for authentication is compared to the identity of the owner of that electronic document. If the submitter is validated and the submission is validated (Step 622 ) then an indication that the submitter is authorized is made at Step 628 and the process ends. If the submitter is not the owner then a check is made for a digital certificate inserted within the electronic document (Step 624 ). If the submitter matches the name in the digital certificate (Step 626 ) within the electronic document an assumption is made that the submitter had the authority to access/modify the electronic document to insert the digital certificate and the submitter is indicated as authorized (Step 628 ).
- a digital certificate for authorization purposes is produced and forwarded (Step 630 ) back to the submitter. If the submitter has the authority to access/modify the electronic document, as evidenced by the insertion of the digital certificate into the electronic document, then the electronic document address can be resubmitted. Validation of submitters can include online database searches (e.g., the WHOIS database supplied by Network Solutions®).
- FIG. 6 b is a flowchart of an embodiment of the present invention showing a process for authenticating the geographic location associated with an authenticated digital certificate.
- This process for authenticating the geographic location is an expansion of Step 610 described in FIG. 6 .
- the process begins at Step 640 where the business/entity name provided by the submitter is compared to the geographic location associated with the electronic document provided (e.g., “Joe's Pizza” and it's electronic document “wwwjoespizza.com”). If the geographic location of the business matches (Step 642 ) the locations listed in two independent sources (e.g., the VISA online merchant database and the United States Postal Service street listing database) then an indication of authenticated geographic location is made (Step 648 ).
- the electronic document e.g., “Joe's Pizza” and it's electronic document “wwwjoespizza.com”.
- Step 644 If the mis-match is resolved (Step 646 ) then an indication of authenticated geographic location is made (Step 648 ), otherwise the process ends with no indication of authenticated geographic location being made.
- authentication is categorized into an internationally recognizable, four-tiered, stoplight-based color trust/authentication scheme (i.e., Red, Yellow, Green, plus Gold).
- a red level (stop) indicates a dead link (e.g., the electronic document address does not point to a valid electronic document). It may also indicate that an authenticated digital certificate could not be issued because of conflicting information found during authentication.
- a yellow level (warning) indicates an authenticated digital certificate that has recently had recurring access problems, or the spider has detected changes in information, or sites that have been reported as incorrect and not yet verified.
- a green level (go) is used for newly created authenticated digital certificates that have not been given Gold status yet.
- a gold level (as good as gold) is assigned to authenticated digital certificates where contact has been made with the owner, and the complete set of basic attributes have been completed. Extended attributes are not required, but are desired.
- the information in a Gold certificate has been verified, and the owner has agreed that as a condition of being Gold, they must complete a monthly, or quarterly, data confirmation form, and notify the authenticated digital certificate authority promptly of any changes in their data. Additionally, sites having authenticated digital certificates are spidered on a regular basis to verify the accuracy of the data.
- authenticated digital certificates can be encoded as either representing a virtual Web business or a physical business/entity.
- Web businesses would have a slightly different authenticated digital certificate, they would be identified as a corporation, or individually run site, and include a corporate headquarters with contact info that can be “withheld upon request” (e.g., for individually run sites that do not want their home addresses listed).
- the location of the DNS server hosting the site could be displayed as a physical location for Web businesses.
- Extended attributes for authenticated digital certificates for a virtual business allow for the creation of a zone of service for a limited number of keywords (e.g., 25 maximum) which could specify different zones of service. These zones of service would be useful for large firms, like Amazon.com, that may ship books to many different countries, but might have to limit encryption-software sales to the US.
- This allows for multi-tiered results for example if a user of authenticated digital certificates searches for books in Guelph they would be shown all the local (Guelph) book stores first, but at the bottom, under the heading of virtual sites, they would see the online bookseller Amazon.com. If they were searching for encryption-software, they would see local (Guelph) software dealers, and Canadian virtual software sales sites, but not Amazon.com.
- a type-1 authentication indicates a primary domain where whois.org information matches website and the geographic location and business name are verified from two independent sources.
- a Green level authenticated digital certificate can be issued in this case, with further follow-up asking to verify and submit any missing information.
- Type-1 authentications are useful as a tool to “up-sell” existing authenticated digital certificate on extended attribute features.
- a type-2 authentication indicates a primary domain where whois.org information does not match business name or geographic location, but business name and geographic location on the site are verified as accurate from two independent sources.
- a yellow authenticated digital certificate can be issued in this case, with further follow-up including sending email to the WHOIS owner, and site operator requesting verification of data, and submission of missing information. When the owner returns the email, confirming the business data, then a Green authenticated digital certificate can be issued. Alternately, if the site operator inserts an authenticated digital certificate, a Green level can be issued, otherwise a Yellow level can be issued.
- the various levels can be combined for custom authentication levels (e.g., half-yellow/half green).
- a type-3 authentication indicates a sub-domain where geographic location and business name are verifiable and located in the electronic document and spiderable, but as a sub-domain, confirmation of ownership can not be made.
- an email is sent to URL's contact person, requesting confirmation of information and asking to have them insert an authenticated digital certificate in the electronic document. If they can insert the certificate it is assumed that they the authority to access/modify the electronic document and a Green authentication level can be assigned. There is no need to contact the host of the electronic document, but an email can be sent to the host. If the host confirms the information, a Green authentication level can be assigned to the electronic document. Otherwise, a Yellow authentication level is indicated. If there is no email address, then a fax or automated phone call will be initiated. Only an email sent from the identical electronic document address (URL) will be considered acceptable to submit additional non-verifiable information.
- URL electronic document address
- a type-4 authentication indicates a sub-domain submitted by third party that does not have geographic location and business name information within the electronic document (page), and therefore no contact information.
- a third party has suggested the name and geographic location that can be verified, but not to this page.
- a Yellow authentication level is initially indicated and email can be sent to a Web host indicating that one of their clients has an unverifiable URL. The Web host could be asked to pass on the request for data to the owner. The owner can then get the authenticated digital certificate authority Web site to get their authenticated digital certificate updated to a Green level and insert the authenticated digital certificate into their page as a metatag.
- the Web host would automatically receive an online credit towards certain authenticated digital certificate services (e.g., upgrades to extended attribute features) if the electronic document owner in question updates their authenticated digital certificate within a specified time limit.
- FIG. 7 is a flowchart of an embodiment of the present invention showing a process for direct searching using an authenticated digital certificate.
- the process starts with an authenticated digital certificate aware browser (or other computer application) initiating a search for electronic documents using geographic query criteria provided at Step 702 and keyword criteria provided at Step 704 .
- a search, using the geographic query and keyword criteria is performed on the authenticated digital certificate database (Step 706 ) and an authenticated set of electronic documents or electronic document addresses is returned at Step 708 .
- FIG. 8 is a flowchart of an embodiment of the present invention showing a process for parallel searching using an authenticated digital certificate.
- the process begins at Step 802 by parsing a keyword query.
- a keyword query is a string containing terms, some possibly geographic, some possibly non-geographic, used as criteria in a search.
- Step 804 checks for geographic terms that may indicate a geographic search should be done.
- a process run on the keyword query determines if it contains terms that match geographic categories. For example, the parser can detect that terms such as “Boston”, “Guelph”, “Massachusetts”, “Ontario”, and “Canada” are geographic terms. If a geographic search is not indicated then a keyword search is performed on the keyword-based index of electronic documents (Step 806 ) and results of the search are presented at Step 822 .
- Step 806 a check is made to determine if the geographic terms are to be removed from the keyword query.
- Step 808 the geographic terms are removed. Whether geographic term are removed or not, a keyword search is performed on the keyword-based index of electronic documents (Step 809 ).
- a geographic search performed on the authenticated digital certificate database conceptually is broken into two parts: a geographic boundary and a non-geographic keyword portion.
- An option to enhance the geographic boundary can be checked (Step 810 ), and if set the geographic boundary information can be modified.
- a keyword query involving “automobiles” and “Boston” can be modified to include geographic locations that are not in Boston proper, but located in “Greater Boston” (e.g., Dorchester, Mattapan and Roxbury).
- the keyword terms can also be modified to include words associated with the keyword terms prior to the search at step 809 (e.g., “automobile” can be changed to “automobile”, “car” or “vehicle”).
- the extent of the modification may, or may not, be tied to a proximity user preference associated with the user or subject of the query.
- a geographic search on the authenticated digital certificate database is performed using the possibly modified keyword query at Step 812 . Both the term removal/stripping process of Step 808 and the term enhancement process of Step 811 are optional based. These option are based upon user settings and system heuristics.
- the results of both searches, the keyword-based search and the geographic search are compared. The results of that comparison can provide for displaying each set of results in separate windows (Step 816 ), tagging matching electronic documents (Step 818 ) or removing non-matching electronic documents (Step 820 ). In all cases the results are presented for display in Step 822 .
- an authenticated digital certificate allows the browser to produce a list of electronic documents that more closely match the keyword-based search results that the user expects.
- the ability to use authenticated digital certificates in the search process significantly enhances the probability that the resulting electronic documents actually match the search results the user expected.
- a database would exist that would contain geographic terms that are often used for non-geographic purposes, including common popular names. Thus phrases such as “Bermuda shorts” would be identified as not referring to the island of Bermuda, other examples include “Boston creme pie”, “Black Forest ham”, “George Washington” or “Buffalo wings”. In these cases a geographic search would not be performed.
- the search criteria and authenticated geographic attributes can also interact to automatically derive proximity settings for a geographical search based upon other keywords in the search criteria.
- an algorithm can be used to match certain products to certain predefined proximity. For example when searching for “pizza” in an authenticated digital certificate aware browser, the algorithm may determine a distance of “3 miles” is acceptable, but if searching is done for “automobiles” a distance of “10 miles” may be used. This allows for the possibility that purchasers will travel different distances for different products. Proximity is not limited to linear distance, proximity can be defined in terms of zip code, driving miles, driving time, as well as other measurements.
- the algorithm is completely overrideable and has the ability to adjust its parameters (i.e., learn) based upon previous behavior of the user. The user also has the ability to supply user input to adjust any attribute parameters according to their own personal preferences.
- FIG. 9 is a flowchart of an embodiment of the present invention showing a process for viewing an authenticated digital certificate.
- a URL representing an electronic document is obtained at Step 902 .
- the URL is then used to check for an associated authenticated digital certificate (Step 904 ).
- Checking involves searching for an authenticated digital certificate stored in the authenticated digital certificate (Step 904 ). If an authenticated digital certificate is found (Step 906 ) it is used to display attributes associated with the electronic document at Step 910 , otherwise a message is displayed (Step 910 ).
- Authenticated digital certificates can be viewed by their owners (e.g., during the creation process) to verify information or by others searching for information about a business entity.
- the authenticated digital certificate can also be viewed by representatives of the authenticated digital certificate authority in the process of verifying information.
- FIG. 10 is an illustration of a map displayed according to an embodiment of the present invention showing an interface for selecting and viewing an authenticated digital certificate.
- the map illustrated in FIG. 10 is an example of a pop-up window that can appear when an authenticated digital certificate aware browser sees an authenticated digital certificate metatag or identifies a URL as having an authenticated digital certificate.
- the map would appear on the screen with cross hairs indicating where the URL was located, for example, near to Orlando, Fla.
- Other methods for displaying and selecting the URL are also possible, including links, buttons and lists.
- the user can zoom in or zoom out using zoom in button 978 and zoom out button 980 .
- Tracing ( 970 ) is available to show a trace route/path from the user to the business.
- a button ( 974 ) also exists allowing the user to view the authenticated digital certificate data. The user can set a host of other options, which would pull up another screen of choices. These options relating to the view are accessible using the Options button 972 .
- FIG. 11 is a flowchart of an embodiment of the present invention showing a process for verifying the integrity of an authenticated digital certificate.
- Authenticated digital certificates whether stored in a file, a signed digital certificate database or a metatag, always have some representation stored in an authenticated digital certificate database (e.g., on database server 120 ).
- an authenticated digital certificate database e.g., on database server 120 .
- the flowchart describes one process by which authenticated digital certificates are verified. The process starts at Step 952 by obtaining the URL from an authenticated digital certificate represented in the database.
- Step 954 The URL is checked for existence (i.e., an automated attempt is made to link to it) at Step 954 , if the attempt to link to the URL causes an error, a flag is set within the database to perform a manual check for existence (Step 960 ). Otherwise, the process continues to Step 956 where any geographic location attribute of the authenticated digital certificate is searched for within the electronic document associated with the URL. If the geographic location attribute does not match, a flag is set within the database to perform a manual check of the geographic location (Step 960 ). Otherwise, other attributes of the authenticated digital certificate are checked (Step 958 ), again if they do not match a flag is set within the database to perform a manual check of the specific attribute (Step 960 ). When all attributes have been checked the process ends. Steps 956 and 958 are optional, and can be performed in any order and for any number of attributes.
- searching involves the situation where a consumer desires to purchase a product.
- the customer goes online and researches the product using traditional Internet search tools with no regard to the location of the sites.
- the initial product research is to determine the desired product information, reviews, prices and other consumer's opinions.
- the user may visit several sites, chat rooms and discussion forums in this research process.
- the user may decide they want to purchase the product, and in many cases will not desire to buy the product online.
- There are many reasons for not purchasing online including the desire to have the goods immediately, the need to touch and feel the product especially where size or fit may be concerned, or in cases where the goods are not available for sale online (e.g., legal restrictions on the sale of alcohol or ammunition).
- the immediate need is to locate the nearest location offering the product or service.
- the methods to determine location are very poor, they typically involve the person going to a search engine, and typing in the product or service keyword, a geographical keyword representing their town, and scanning through a large number of listings that may be in the hundreds or thousands. The listings are often no where near the geographic location of the user, despite the search engine matching the words.
- online yellow page directories are consulted which contain a far more geographically concise list but often lack any URL listings to the business, and are often outdated in terms of geographic location.
- the business' Web site represents the best place to see what products and services are available at a given store.
- the user therefore is currently stuck with the choice of checking out a large number of possibly irrelevant URLs to find which web sites or using a directory that may not list URLs.
- a directory listing service the user is typically presented with a list of phone numbers, and must call around to find out what the Web sites URLs are, whether they have the product and if their address (geographic location) is still current.
- a preferred embodiment of the present invention helps both the overly large search list and the sparse directory listing situations.
- a process using authenticated digital certificates would parse the keyword entry and locate the geographical keyword, and perform a parallel search using the authenticated digital certificate database, but returning only matches that are physically located within the geographical area specified.
- the authenticated digital certificate would be used to indicate which URLs returned by the search engine are found in the authenticated digital certificate database, and if so, where they are geographically located, so the user has an immediate method of focusing their search on the correct URLs.
- they can consult the parallel search results that are all located in the geographical region. In the directory listing, a similar action takes place.
- a browser plug-in When a browser plug-in detects a geographic term in a query, a parallel search is returned. Some interactions with directory listings not be possible, due to selection coming from pull down menus preventing parsing efforts. When the user is provided with a list of geographic locations, they can simply highlight the table, or text listings, and the browser plug-in will perform a match with the authenticated digital certificate database, confirming the URLs of all the geographic locations that have web sites, thus confirming or correcting the geographic locations.
- Authenticated digital certificates enhance searching for businesses by providing accurate location filtering of search results, verification of information, increased depth of information, and URL addresses, where none were provided. This allows the consumer to locate a local business much more quickly, connect to their Web site and see if the product they want is available and at what price.
- a local portal such as a Yahoo!, or Altavista that contains only entries for a particular region of geography.
- Yahoo! offers local sites on a country by country basis, and has local city sites, but these are human generated, and cannot be searched using keywords. For example, when a user searches for “restaurants” in the Yahoo! San Francisco search window, twenty different sub-regions of restaurants appear and then a choice has to be made within in each of these for different types of food, such as Chinese, Japanese, cafes, European, Internet cafes etc. The actual search results report the entire web.
- a search for “Chinese restaurants MSG” or any other phrase that does not exactly match a predefined category provides no matches.
- Yahoo! and other search engines cannot provide true localized portals since they have no way of connecting the URLs from a search result with their geographic locations.
- a localized portal can be created, as authenticated digital certificates provide the critical URL to geographic location link.
- two options are available in a preferred embodiment of the present invention.
- a localized index approach is used.
- a filtered approach using large existing search engines is used.
- a region can be defined in a large number of ways, including a radius out from a central point, a city, state or postal code as a filter, a driving distance from a central point, or even one or more bounded regions drawn on a map.
- a spider In the case of portals for a small region, or a large region which will be topical for a long period of time, such as a local community, a spider would connect to the associated URLs and download the entire Web site and index onto a local machine. As storage space and bandwidth could be a factor, the user could request no graphics, audio or video be downloaded. Alternatively, the user can request a Web site's main URL only, or a specific depth of pages (e.g., only download two pages deep) to reduce resources required. As the pages are downloaded, they are stored in a compressed format, and indexed. If storage space is an issue, the original Web sites need not be stored as long as they are indexed. If storage space is not an issue, the pages are stored locally along with the index.
- dynamic content may also be stored.
- the user has a snapshot of the Internet, bounded by the specified regions. This snapshot can be stored on a DVD or CD and used in an offline device or sold as a snapshot of the Internet.
- Alternative implementations allow subsetting based upon particular categories of information, such as businesses, or schools.
- the user would have the choice of several front end interfaces to view snapshot data.
- One is a Yahoo! type portal/search engine interface.
- Another interface is a directory service interface, and yet another is a map with URLs displayed.
- the user could perform searches as in a traditional search engine, yet the results would be limited to the Web sites contained in the region.
- this service includes a set of CDs, DVDs or other mass storage devices created for popular tourist regions by category.
- a tourist could buy a DVD with all the restaurants and hotels in Las Vegas on one DVD, and all the casinos on another.
- the user is provided with a viewer to read these devices, as an alternative if a computer or similar device is not available.
- the program With Internet access, the program is able to update the snapshot of URLs if data has changed, allowing dynamic content to be accessed. Access time for these mass storage devices is almost immediate, since all the information is stored locally. Since these CDs, DVDs and mass storage devices can be erased and re-used, custom devices can be made with little lead time to meet unique demands.
- a single DVD can store 16 Gb of data, holding about 160,000 Web pages (based on a 100K average Web page size). Likely, the index may be 10 Gb, and the number of Web pages is reduced to 60,000, or less if additional graphics/audio/video is allowed, but still substantial and useful.
- a preferred embodiment of the present invention is used to create a local portal using authenticated digital certificates.
- the processes is similar in that a user specifies a region (e.g., city, distance from a central point, shape drawn on a map, driving distance) and boundaries represented by the user's inputs are calculated.
- a set of URLs is developed as a query against the authenticated digital certificate database. These URLs would be stored in a master table locally on the user's computer.
- a browser plug-in reads all the URLs requested, if the URL was not in the table it can prevent the URL from loading, or provide a warning to the user that they are leaving the local region and connecting to the Internet outside the region.
- the profile of the user's personal interests would be used to filter the results. For example, if the user is allergic to raw fish, then sushi restaurants would not be displayed. Descriptive information is already stored by some vendors, however the usefulness of profile data is only valid if the Web site of the restaurant matches the categories stored in the user profile. For example, if one of the user profile categories is “handicapped access”, then the obvious result is only to display restaurants that have handicapped access. However, if the only descriptive information known is address and phone number, then it is impossible to determine whether the establishment has handicapped access or not.
- Authenticated digital certificates are designed to provide a common format for basic and extended attribute information common to most businesses. Attribute information could include, name, address, latitude, and longitude (for location services), phone number, fax number, hours of operation, terms and methods of payment, language of service, return policy, and most importantly the URL and Wireless Application Protocol (“WAP”) URL for the business.
- WAP Wireless Application Protocol
- Authenticated digital certificates provide an extended template, that while different for every industry, has a common interface and file structure. These two types of authenticated digital certificates (basic and extended) provide a common format that can be read by any developer who wants to access business information. Additional levels of information can be supplied using authenticated digital certificates of different formats, providing either more or less information than supplied by the basic and extended type authenticated digital certificates. This also allows applications to be developed that can filter information by matching the personal profiles with business profiles using a much greater depth of information, and therefore providing a much more accurate searching/filtering experience. Even without providing additional sources of data, the availability of a single format for existing data is an improvement over present methods.
- authenticated digital certificates are authenticated and maintained by various methods, including changes to the user's Web site, providing a new level of accuracy that decreases false positive matches.
- the personal profile could be stored in an authenticated digital certificate aware browser plug-in, or could be a third party's own profile format.
- the process of contacting the businesses can commence. It is impossible to store all the information about a business or place of interest in a single authenticated digital certificate. There will be questions that the user has that require additional information and may require a contact. For example, in the case of a restaurant, the user needs to know whether seating is available at a certain time, whether they have a kids menu, whether they are located near a bus stop, or whether they use MSG in their food. Other examples include hotels. The user may want to know if they have a workout facility, if the pool is open this time of year, whether they have foam pillows, or if they have dataports in any of the rooms.
- the user may also want to confirm the information.
- the two options involve calling the business, which can involve long distance charges, be time consuming, require the business to be open, having a non-busy line, having someone to answer the phone who knows the answers, or having an automated attendant with options to answer the user's questions.
- the more functional option is to connect to the business' Web site.
- the Web site is accessible at no charge, at any time of day, usually contains far more detailed information than is in yellow pages or even an authenticated digital certificate and therefore is a good place to start any research.
- Web sites evolve the requirement to still contact the business by phone will become less and less, especially as expert systems collect queries and archive them so that the Web sites become more and more useful over time.
- Authenticated digital certificates provide the infrastructure to accomplish this.
- Authenticated digital certificates provide the URL to ground link, and additionally allow for continually monitoring these links to look for changes in information, and to ensure the URLs still exist so that at any given time, the authenticated digital certificates database is the most accurate source for current basic detailed information about local businesses and other places of interest.
- a further use of authenticated digital certificates represents an improvement over the basic use of authenticated digital certificates in a wireless environment by enabling a wireless device to connect directly to a Web site and negotiate a transaction with that Web site.
- the user of a wireless device can have a personal profile. This profile can be stored as a “personal authenticated digital certificate”, without providing the identity of the user, if privacy is a concern.
- a wireless device should minimize the user's involvement in non-decision based tasks, and maximize the productivity of the device itself.
- One embodiment that meets these criteria is having the wireless device receive a request from the user in the form of voice, keyboard, or other input. For example, the user may activate the device, and say, “Find me dinner for four people at 7:00 pm.”.
- This request triggers the device to load the user's profile, and to connect to the authenticated digital certificate database where it immediately has access to the authenticated digital certificates for all the local businesses that meet the criteria of the request (i.e., restaurants), within a set bounded range (i.e, within five miles) and matches these against the personal profile using a ranking system that is a combination of excluding and influencing factors that combine to create a percentile. Distance is be a major influencing factor. From this set of matches, a cut-off is used to include only relevant matches, or if there are many matches only those within a predefined cutoff are identified. A process using the personal authenticated digital certificate then contacts the Web site's authenticated digital certificates and may open up a secure communication (e.g., SSL).
- SSL secure communication
- the authenticated digital certificates can also be encrypted to insure that it contains information that the user can trust.
- the device requests a reservation for the four people at 7:00, and provides its personal authenticated digital certificate number that the business authenticated digital certificate process can identify as legitimate.
- the business authenticated digital certificate process can accept or reject the request automatically, or generate a request to a device belonging to the business owner. The business owner can then approve the request. Once an approval or non approval is issued, the user's device collects this information, and after repeating this procedure with all the identified matches, provides the owner with the choices.
- authenticated digital certificates provide benefits to businesses as well. Being able to authenticate a user allows a business to modify business behavior, thus allowing the business to block users who might abuse the business service or restrict transaction from certain authenticated users.
- Authenticated digital certificates provide a trusted mechanism for commerce to take place. Without authenticated digital certificates, there is a potential for businesses to identify themselves incorrectly to increase matches and thus commerce. Additionally, without a common protocol, each device would have to have hundreds of different negotiation programs (e.g., one for hotels, one for restaurants, one for dry cleaners, one for video stores etc.), with authenticated digital certificates, there is a common mechanism for securely initiating a transaction which can be interfaced with any back-end system being used by the businesses with little effort.
- negotiation programs e.g., one for hotels, one for restaurants, one for dry cleaners, one for video stores etc.
- An embodiment of the present invention allows users to view and search on authenticated attributes that are related to specific membership organizations. For example the Automobile Association of America (“AAA”) seal on a business is used by many travelers to access the quality of an establishment. Being able to display the AAA logo, using an authenticated digital certificate, allows viewers and searchers of electronic documents (e.g., Web pages) the ability to quickly determine which businesses they might purchase from. Access to the AAA extended attribute might come from a UserId and password issued from the organization when a membership subscription is purchased.
- AAA Automobile Association of America
- the authenticated digital certificates are used for searching and viewing geographically authenticated electronic documents associated with non-business entities. For example government, non-profit, educational organizations would benefit from using authenticated digital certificates. Additionally, individuals can also have authenticated digital certificates created and used for searching and viewing.
- authenticated digital certificates One benefit of individual, or personal, authenticated digital certificates is that they can be used to provide privacy to individuals while still supplying search process accurate geographic location data for searching. Based upon a user's geographic location a proximity search can access the user's geographic location, but prevent a viewer from accessing the underlying geographic location. When displayed, or mapped, the geographic location can be shown to be within a certain region without revealing the user's exact location.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- Marketing (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Remote Sensing (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A method and apparatus for providing geographically authenticated electronic documents is disclosed. Authentication for attributes for an electronic document stored on a computer network are defined, the attributes comprise at least one attribute describing a geographic location associated with the electronic document. Authenticated attributes (e.g., geographic location) of electronic documents (e.g., Web pages) allow for more accurate geographic searching and filtering. An authenticated digital certificate is created and associated with an electronic document. The authenticated digital certificate can be stored within the electronic document, such as can be done with HTML tags on a Web page. The digital certificate can also be stored as a separate file associated with the electronic document, as a separate signed digital certificate and as a database record.
Description
- This application is a continuation of U.S. application Ser. No. 11/800,284, filed May 4, 2007, which is a continuation of U.S. application Ser. No. 10/620,170, filed Jul. 15, 2003, now U.S. Pat. No. 7,233,942, which is a continuation of U.S. application Ser. No. 09/685,226, filed Oct. 10, 2000, now abandoned.
- The entire teachings of the above applications are incorporated herein by reference.
- This invention relates generally to enhanced searching techniques for electronic documents, and more specifically to the authenticating of electronic documents, referenced by electronic document addresses associated with geographic locations used in searching.
- Searching for a particular electronic document on a network based upon geographic location currently presents many problems. For example, searching to find an HTML document on the World Wide Web associated with a geographic location returns many false positives (electronic documents not really associated with the geographic location specified) while also resulting in many misses (electronic documents not found that really are associated with the geographic location). The enormous number of electronic documents on the World Wide Web (it is estimated that 2.2 million Web sites offer 300 million Web documents) multiplies the problem of false positives in a geographic based search.
- Keyword-based geographic searching functionality, such as GeoSearch by Vicinity Corporation (used on www.northernlight.com) provides some geographic restricted search capability. In these systems a keyword search based upon the geographic location specified is executed, then the user's location is determined and found electronic documents that are determined to be within a predefined range of the user are reported. The user's location is usually determined by querying the user for their city, state, country or zip code information. The geographic location of the electronic documents is determined by a specialized keyword parsing algorithm designed to identify addresses within electronic documents. Simply finding keywords that indicate an electronic document contains an address does not guarantee that the address corresponds to a geographic location associated with the electronic document. For example, when searching for a list of electronic documents related to “stores selling books in Boston, Mass.” many false positives are possible, including electronic documents listing “books I read while in Boston, Mass.”. Additionally, stores that do not format their addresses in such a way as to be recognized by the geographic keyword searching algorithm, or exclude their address completely, will not be reported. On the World Wide Web these electronic documents are referenced by electronic document addresses in the form of a Uniform Resource Locator (“URL”).
- Another approach to searching for electronic documents associated with geographic locations is the use of “online yellow pages” type functionality. In these systems a directory of business names is created that is searchable and sortable using geographic location. Providers of online yellow pages directories solicit data from prospective businesses and provide a searchable online listing for the businesses. Typically, the listing includes a name, address and phone number and is searchable by business name or business category. Yellow page directories typically exclude non-business entities (e.g., schools, government offices). Some services provide a URL if the business has a Web site. An exemplary online yellow pages site is www.yellowpages.com.
- Yet another approach is the creation of “localized” portals (e.g., www.ca.yahoo.com for Yahoo! Canada) and “city pages” (e.g., www.citysearch.com) which restrict their content to that associated with a specific, predetermined, geographic area. These portals allow users to restrict searches to a preselected geographic region (e.g., Canada), but the regions tend to be countries or large, well populated, cities. These localized portals and city pages are typically built by human operators indexing Web pages associated with the specific, predefined geographic location.
- An opportunity exists to provide a solution to the inadequacy of current search functions for electronic documents on the World Wide Web when restrictions are desired to be limited to, or confined within a geographic region. Search engines lack the ability to search by geography and existing keyword-based geographic searching functionality suffers from a lack of accuracy and authentication of the geographic locations coded into the electronic documents, as well as a lack of proper association of geographic location with electronic documents that may contain geographic location. Additionally, the present invention does not require that the geographic location information be stored within the electronic document, nor that an electronic document have a physical location associated with it. Attributes of electronic documents can be derived from information stored within the electronic document or attributes can be created from other sources with knowledge about the electronic document or its owners.
- The present invention provides for the creation of a digital certificate defined as a structured collection of data requiring only a name, an electronic address and a geographic location which are authenticated to create an authenticated digital certificate. Embodiments of the present invention can represent the authenticated digital certificate as a metatag, a separate file and a record in a database. For a traditional business its geographic location is its physical location or street address. For a virtual business that has no physical location its geographic location may be its URL, the physical location of its hosting server, the address of the owner as listed on its articles of incorporation, its corporate headquarters, or another identifier. The name and the URL may also be the same.
- Current lack of authentication allows others to “spoof” legitimate business addresses, either intentionally or unintentionally, and possibly influence search results of geographically restricted searches. Lack of proper association can cause the problem of false positives to be reported in a geographically restricted search. False positives occur when a search reveals an address within an electronic document, but the electronic document is not actually associated with that address. Keyword-based geographic searching often reports a listing of electronic documents that is too wide, such that important or relevant information is hard to find within the report. For example, a Web search containing “Bermuda shorts” may return electronic documents for “Bermuda beaches” as well as “Bermuda shorts”. This results in a poorly trusted environment. Trust is a critical component in enabling consumer confidence to use the Internet. The present invention provides an environment of trust of geographic locations or electronic addresses.
- Yellow page directories represent a link between the physical world and the telephone. The minimum definition to be listed in the yellow pages (or the white pages) is a telephone number, and a name. Quite commonly an address is also listed, although it is not a requirement. The world represented by the paper-based yellow pages is a paid listing service, so a set of yellow pages does not represent the entire community of businesses, but only those who choose to pay for a listing. If the listings were free and every business subscribed, the yellow pages would represent a very good collection of local businesses and their phone numbers, sorted by category. The Internet equivalent of the yellow pages is simply an electronic version of the paper-based yellow pages that is available and can be viewed online. The Internet has added the ability to add maps and directions to a business listing, but the underlying concept is the same. Yellow pages are a representation of the physical world and their phone numbers, they make no provision for businesses or entities that are solely Internet based virtual businesses, businesses which do not have phones, businesses which have unlisted phone numbers, or non-business entities.
- Online yellow pages directory systems are limited to businesses that have a phone number. These directory systems often require listees to pay to input their data, often their data does not include a URL. The present invention requires the existence of a URL, even if it must be generated in order to create an authenticated digital certificate. There are many Web sites that provide yellow pages functionality. Businesses that want to be listed must choose among an array of yellow page opportunities in an attempt to get the greatest coverage for the lowest cost. Coverage can vary based upon the popularity of the Web site. For example, a yellow pages directory on a “hot” Web site may receive a million queries a day, whereas the same yellow pages directory on a non-popular site may not be queried at all. A business servicing a large geographical area may not be listed in areas where there are potential customers, due to the cost of these additional listings. The number of potential customers decreases the further out from a central location, but the yellow page costs are fixed on a per capita basis. Therefore, yellow pages are an expensive way to reach a large market area. Also, since some customers have different preferences for how far away they want to shop, there will be potential customers who will not find the business they desire since they are in a region where the business choose not to list due to economic reasons. The combination of incomplete business listings for consumers and limited coverage for businesses, in addition to a lack of accurate URLs, make current yellow page directory systems too narrow to be effective geographic searching mechanisms.
- Additionally, online current yellow page systems lack a common format so that data interchange and data presentation within these systems suffer. Online yellow pages and city pages portals have no harmonious interface, some require keywords, others search by zip code, still others by SIC code. In the case of city pages, the domains are different from city to city, so there is no way to know the URL of the city page if you are visiting another city without asking someone or using a search engine. Without a method that a user can be comfortable with to find any local business on a consistent basis, the process of searching and viewing is harder to accomplish.
- In contrast, a database can be created that maps the electronic world and their physical or virtual locations. In this case, the minimum definition is that the listing must have a URL (therefore some existence in the electronic world), and a name associated with that URL and a geographic location, but the geographic location need not be a physical location. Although the majority of virtual businesses have a physical headquarters where staff and machines that support the virtual business reside, it is possible to have a virtual store that is hosted by another hosting service. The virtual store may have no full time employees, no phone number and no physical location. A virtual business exists and is listed with no physical location. This type of business does not exist in the yellow pages environment.
- Currently, there is an overlap between the online yellow page environment, and the electronic world. About 10% of online yellow page listings have URL addresses listed, and possibly as high as an additional 30% have URL addresses that are not displayed by the online yellow pages. In the electronic world a majority of URLs have a permanent identifiable place of business on the ground. Over time, as more and more businesses have URLs, the two worlds will start to overlap more and more, but neither will ever be a subset of the other. There will always be businesses that are not in the electronic world in any way, and there will always be virtual businesses that have no physical location. For a consumer who has a phone but no Internet connection, the paper-based yellow page database is of value and the electronic database has no value. Likewise, for someone who is online and wants to lookup URLs, the online yellow pages has limited value, and the paper-based yellow pages has no value.
- There are several other important differences that exist between the online yellow page directories and a directory of geographically authenticated digital certificates. For example, because an online yellow pages directory does not require URLs it cannot sort or present its data by any characteristics that are URL dependent, such as privacy statements, recommended bandwidth or display resolution of the site, frames or no frames, terms of payment on line, language of web site, et cetera., without excluding valued listings.
- Localized portals suffer from many of the same problems as keyword-based geographic searching as they often operate simply using a predefined geographic term in a standard keyword-based geographic search, and also do not require URLs.
- Current solutions to the problem of geographically based search functions for electronic documents on the World Wide Web present significant problems (as discussed above). Thus, an effective technique for geographically based searching is required. Accordingly, the present invention provides a method of authentication for attributes of an electronic document stored on a computer network by identifying the attributes of the electronic document, comprising at least one attribute describing a geographic location associated with the electronic document. At least some of the attributes of the electronic document are then authenticated and an authenticated digital certificate describing the authenticated attributes of the electronic document is created and stored. The attributes can include a checksum to ensure integrity, encoding to provide space saving and accuracy, and encryption for security.
- The present invention authenticates attributes (e.g., geographic location) of an electronic document (e.g., Web page) allowing for more accurate geographic searching and filtering. An authenticated digital certificate is created and associated with an electronic document. Authentication with respect to an electronic document stored on a computer network is accomplished by identifying an electronic address associated with the electronic document and identifying a geographic location associated with the electronic document. The geographic location is authenticated and an authenticated digital certificate comprising the authenticated geographic location is stored in an authenticated digital certificate database.
- Authenticated digital certificates can improve searching for electronic documents on a computer network by providing a geographic location filter to a query interface and searching for electronic documents within an authenticated digital certificate database that match the geographic location. An authenticated set of electronic documents or electronic document addresses is returned.
- Another improvement related to searching for electronic documents on a computer network includes parsing a keyword query and determining that a geographic search is indicated based upon the identification of geographic terms in the keyword query. A keyword search is performed on an index of the electronic documents and a geographic search, with or without keywords, is performed on records in an authenticated digital certificate database. The geographic search can be used to tag or remove results from the keyword search, or the results of both searches can be displayed in separate windows.
- An authenticated digital certificate associated with an electronic document can be displayed on a computer by presenting, in a structured format, an electronic address associated with the authenticated digital certificate and displaying a representation of the authenticated digital certificate based upon selection of the electronic address.
- The integrity of a stored authenticated digital certificate can be verified by obtaining an electronic document address from the stored authenticated digital certificate and establishing the existence of an electronic document associated with the electronic document address and possibly the existence of other authenticated attributes.
- An example of how the present invention differs from the prior art can be illustrated by describing a typical Web page for a local travel agency (e.g., located in Boston). The travel agency's Web page may contain sections advertising five different vacation spots (e.g., Hawaii, Aruba, Las Vegas, Bermuda and Guelph). Within each section, locations of various hotels, museums and restaurants may be listed. A traditional search engine (e.g., Yahoo!) or a current geographic search engine (e.g., GeoSearch by NorthernLight) will identify the local travel agency's Web page as being associated with many addresses in Hawaii, Aruba, Las Vegas, Bermuda and Guelph, as well as Boston. This will produce many false positives in a search for local travel agencies. In contrast, an authenticated digital certificate created according to an embodiment of the present invention will associate the local travel agency's Web page with its Boston street address. Using the authenticated digital certificate a Web searcher will be able to locate a business location more effectively and with much greater accuracy and confidence in the search results.
- The foregoing will be apparent from the following more particular description of example embodiments of the invention, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating embodiments of the present invention.
-
FIG. 1 illustrates a computer system on which an embodiment of the present invention is implemented. -
FIG. 2 shows the internal structure of a computer inFIG. 1 . -
FIG. 3 illustrates an authenticated digital certificate showing basic attributes in a Retail Business classification as configured in an embodiment of the present invention. -
FIG. 4 illustrates an authenticated digital certificate showing basic attributes in a Virtual classification as configured in an embodiment of the present invention. -
FIG. 5 illustrates an authenticated digital certificate showing extended attributes as configured in an embodiment of the present invention. -
FIG. 6 is a flowchart of an embodiment of the present invention showing a process for creating an authenticated digital certificate. -
FIG. 6 a is a flowchart of an embodiment of the present invention showing a process for authorizing the submission of an authenticated digital certificate. -
FIG. 6 b is a flowchart of an embodiment of the present invention showing a process for authenticating the geographic location associated with an authenticated digital certificate. -
FIG. 7 is a flowchart of an embodiment of the present invention showing a process for direct searching using an authenticated digital certificate. -
FIG. 8 is a flowchart of an embodiment of the present invention showing a process for parallel searching using an authenticated digital certificate. -
FIG. 9 is a flowchart of an embodiment of the present invention showing a process for viewing an authenticated digital certificate. -
FIG. 10 is an illustration of a map displayed according to an embodiment of the present invention showing an interface for selecting and viewing an authenticated digital certificate. -
FIG. 11 is a flowchart of an embodiment of the present invention showing a process for verifying the integrity of an authenticated digital certificate. - A description of example embodiments of the invention follows.
-
FIG. 1 illustrates a computer system on which an embodiment of the present invention is implemented. Acomputer 100 provides processing and input/output devices for searching and viewing geographically authenticated electronic documents. In one embodiment of the present invention an authenticated digital certificate aware browser, running oncomputer 100 is used to provide searching and viewing capabilities for geographically authenticated electronic documents.Computer 100 is connected to akeyboard 102 andmouse 104 for receiving input and adisplay 106 for presentation of geographically authenticated electronic documents.Keyboard 102 andmouse 104 are optional examples of input devices,specific computers 100 may have unique or custom input devices (e.g., trackball or touchpad controls).Computer 100 is also linked to anetwork 110 having access to servers (120, 122). The network can be part of the Internet, the worldwide collection of computers, networks and gateways that use the TCP/IP suite of protocols to communicate with one another. The Internet provides a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, government, educational, and other computer systems, that route data and messages. Web Server 122 is connected to thenetwork 110 hosts electronic documents for display oncomputer 100. - The electronic documents can include specially formatted HTML Web pages as well as other electronic document types hosted on a Web server 122 or other servers connected to the
network 110. As can be seen inFIG. 1 , Web server 122 hosts electronic documents associated with a plurality of business entities, each having an electronic document address in the form of a Uniform Resource Locator (“URL”). In this particular example, Web server 122 hosts electronic documents associated three business entities, namely Business A, Business B and Business C. The electronic documents associated with these business entities are referenced by the electronic document addresses www.Business_A.com 130, www.Business_B.com 132, and www.Business_C.com 134. The electronic document referenced by electronic document address www.Business_A.com 130 is associated with a business having a single physical street address in Boston, Mass., USA. The electronic document referenced by electronic document address www.Business_B.com is associated with a business having multiple physical street addresses, including: Guelph, Ontario, Canada; Toronto, Ontario, Canada; and Brampton, Ontario, Canada. The electronic document referenced by electronic document address www.Business_C.com 130 is associated with a virtual business having no physical street address for doing business. All the electronic documents in this example are hosted on the same Web server, Web server 122, which is physically located at a site independent of the business locations associated with the electronic documents it hosts. Although, for virtual businesses Web server 122 may be listed as the geographic location of www.Business_C.com 130. - Business entities can be organized into various classifications. A retail classification is an example of a business having a physical location. A virtual classification is an example of a business having no physical location (e.g., an online store). A hybrid business, presenting a virtual storefront on the Web for doing business and maintaining a physical street address for back-office operations, corporate headquarters or warehousing can also be represented using authenticated digital certificates having extended attributes for these “non-business” addresses.
- The authenticated digital certificate is stored as a record in an online authenticated digital certificate database. Attributes of the electronic document can correspond to fields in the database record. Access and security of the authenticated digital certificate can be managed by the database management system managing the database record. The database storage configuration allows for creating authenticated digital certificates without impacting the storage or management of the electronic document itself.
- An authenticated
digital certificate database 121 is used to store database records representing authenticated digital certificates (seeFIGS. 3 , 4, 5). The authenticateddigital certificate database 121 is hosted on authenticated digitalcertificate database server 120. - The authenticated digital certificates provide information about electronic documents hosted on various computers (e.g., Web server 122) on
network 110. Authenticated digitalcertificate database server 120 also hosts processing routines to create, authenticate, search and verify authenticated digital certificates. -
Computer 100 hosts processing routines to initiate searching and viewing of authenticated digital certificates, for example through the use of a Web browser plug-in. These processing routines can run in memory 200 (FIG. 2 ) as part ofcomputer 100 orserver 120. A browser is a client application that enables a user to view HTML documents on the World Wide Web, another network, or the user's computer; follow the hyperlinks among them; and transfer files. Some Web browsers require helper applications or plug-ins to accomplish one or more of these tasks. A plug-in is a small software program (e.g., authenticated digital certificate searching routine) that plugs into a larger application (e.g., Web browser) to provide added functionality (e.g., improved geographic searching). -
FIG. 2 shows the internal structure of the computers inFIG. 1 . The computers (100,120,122) contains a system bus 204, a bus is a set of hardware lines used for data transfer among the components of a computer system. A bus is essentially a shared highway that connects different parts of the system (e.g., processor, disk-drive controller, memory, and input/output ports) which enables the different parts to transfer information. Attached to system bus 204 isdisplay interface 206,display interface 206 allowsdisplay 106 to communicate with other components on system bus 204.Keyboard interface 208 andmouse interface 210 are also attached to system bus 204 and allows the input devices to communicate with other components on system bus 204.Network interface 212 provides the link to an external network (e.g., network 110) allowing processes running oncomputer 100 to communicate with servers (e.g., 120,122) connected to anetwork 110. Amemory 200 can store computer software instructions and data structures used to implement embodiments of the present invention. Aprocessor 202 executes instructions stored inmemory 200, allowing the computer (100, 120) to create, authenticate, search, view and verify geographically authenticated electronic documents. - In a preferred embodiment of the present invention an electronic document address (e.g., URL) is associated with a business in one of two ways: as a physical location or as a virtual location. Note that the term business also applies to non-business entities such as government buildings, tourist attractions, schools, museums, personal Web pages, etc. The first category are businesses (or other entities) with physical retail locations defined as a place of business where a consumer can visit to view, acquire, discuss, negotiate etc. in the normal course of business or operation. This category is called ‘physical’. The second category are businesses (or other entities) that do not have physical locations except possibly to support their non-physical (virtual) presence such as a website store. They may have physical locations such as a corporate headquarters, or warehouses, or home office, but there are not open to the public in the normal course of business or operation. These are defined as ‘virtual’ or ‘Web’ businesses. Hybrid combinations are also possible.
-
FIG. 3 illustrates an authenticated digital certificate showing basic attributes in a Retail Business classification as configured in an embodiment of the present invention. A retail classification is an example of a business having a physical location. An authenticated digital certificate containing geographic location data is very important in identifying a business associated with an electronic document. Geographic location information includes street, town, country and zip code information as well as longitude, latitude and altitude information. This geographic location information can be used when searching for business within a certain proximity from a given location. The authenticated digital certificate can also be used when viewing an electronic document associated with a business to ensure the viewer is seeing verified geographic location information. Geographically verified URLs provide a level of reliability when searching and viewing electronic documents that is not provided by current geographic based searches. Businesses having a physical location have two sub-categories: businesses/entities with only one physical location and businesses/entities with more than one physical location. In the physical category the physical location is the street address of the location of a business that the consumer can visit. In the case of commercial businesses, this would likely be the address where commerce takes place, a retail outlet. - Basic attributes of an authenticated digital certificate include a certificate ID (identifier) which uniquely identifies the authenticated digital certificate. Various phone numbers associated with the business are listed. The date the authenticated digital certificate was originally created, as well as an indication of who brought the URL to the attention of the authentication process may also be tracked. The date that information in the digital certificate was last changed, as opposed to last authenticated, is also included in an authenticated digital certificate. One preferred embodiment for implementing authenticated digital certificates involves storing the authenticated digital certificates in memory as objects based upon classes defined in an object-oriented design. These objects can contain data structures for a header containing an identifier and geographic location, as well as a set of attributes associated with the authenticated digital certificate for the business.
- Other attributes of an authenticated digital certificate include authentication. Authentication is a tiered process, involving both automated and manual processing, therefore a trust level (e.g., “Gold”) is stored with the digital certificate along with a date the digital certificate was last authenticated. In one preferred embodiment of the present invention authentication is categorized into an internationally recognizable, four-tiered, stoplight-based color trust/authentication scheme (i.e., Red, Yellow, Green, plus Gold). A red level (stop) indicates a dead link (e.g., the electronic document address no longer points to a valid electronic document). It may also indicate that an authenticated digital certificate could not be issued because of conflicting information found during authentication. A yellow level (caution) indicates an authenticated digital certificate that has recently had recurring access problems, or the spider had detected changes in information, or sites that have been reported as incorrect and not yet verified. A green level (go) is used for newly created authenticated digital certificates that have not be given Gold status yet, all sites that have been automatically authenticated, and are believed to be accurate but have not passed the Gold level of authentication. A gold level (as good as gold) would be limited to authenticated digital certificates where contact had been made with the owner, and the complete set of basic attributes have been completed. Extended attributes are not required, but are desired. The information in a Gold certificate has been verified, and the owner has agreed that as a condition of being Gold, they must complete a monthly, or quarterly, data confirmation form, and notify the authenticated digital certificate authority promptly of any changes in their data. Additionally, sites having authenticated digital certificates are spidered on a regular basis to verify the accuracy of the data.
-
FIG. 4 illustrates an authenticated digital certificate showing basic attributes in a Virtual classification as configured in an embodiment of the present invention. A virtual classification is an example of a business having a virtual location. In a virtual or Web business, in addition to the geographic location, other attributes including a “zone of service”, where the entity or business can conduct commerce, can be defined. In cases of informational Web sites, this would be the entire world, but for many commerce sites, local laws, government restrictions, economic and cultural issues, or personal choice, limit where goods may be sold. In these cases, the zone of service could be defined as the area where the products sold, or services offered, by this virtual business can be legally sold and shipped (if shipping is involved). Virtual businesses may have several zones of service to cover cases of multiple product lines, each with different zones of service. - A hybrid category of business exists where a business in a physical category also operates in a virtual fashion, in which case, they could also have a zones of service in addition to their physical location. Likewise a virtual business could open a physical store, in which case they could be reclassified as a hybrid as well, although their main category would still be virtual. The virtual businesses would be able to indicate the existence of their physical store, while the physical store can promote their Web presence.
-
FIG. 5 illustrates an authenticated digital certificate showing extended attributes as configured in an embodiment of the present invention.FIG. 5 shows the extended attributes of the authenticated digital certificate ofFIG. 3 . The extented attributes are exposed by performing a user interface gesture (e.g., clicking) on the extended profile link in the authenticated digital certificate ofFIG. 3 . Extended attributes often vary depending upon the type of business that is represented by the electronic document, or electronic address (URL). One approach is to classify each electronic document according to the Standard Industry Classification (“SIC”) code associated with the business it represents, extended to include new virtual classes of businesses. A template of pertinent attributes can be derived and used as a basis for the extended attributes that are stored in the authenticated digital certificate.FIG. 5 represents an example authenticated digital certificate with extended attributes related to a video sale and rental business. Various particulars, including types of videos available and business policies are available to be searched or viewed by those with access the extended attributes. Extended attributes may not actually be stored within the authenticated digital certificate itself, but may be accessible by way of links to the extended attributes, which can be stored separately (e.g., in an online database). - In addition, in both the search engine, and directory listings cases authenticated digital certificates that are returned can provide extended attributes (information) not found in directory listings. Examples of additional information include: hours of operations, credit cards accepted, return policies, privacy policies, membership in associations such as the Better Business Bureau, American Association of Retired People and the American Automobile Association. Authenticated digital certificates also resolve the problem of the directory listings listing businesses in non-intuitive SIC headings, by searching not only business names, but also business keywords and brand names carried. For example, a user performing a search on “Nike running shoes” using a authenticated digital certificate aware process would receive matches if the stores listed “Nike” as a brand that they carried.
-
FIG. 6 is a flowchart of an embodiment of the present invention showing a process for creating an authenticated digital certificate. The creation process starts atstep 602 with the submission of an electronic document for the purpose of creating an authenticated digital certificate. Certain attributes (e.g., geographic location) of the electronic document are identified as those for which authentication is to be performed. The submission is typically in the form of a reference to the electronic document, such as an electronic document address (URL). AtStep 604 the process checks whether or not the submitter is authorized to submit the electronic document and whether the owner can be correctly verified (seeFIG. 6 a). If the submitter is not authorized the process ends, otherwise a check is made as to whether or not the submitted electronic document is already authenticated (Step 606). If the electronic document is already authenticated (i.e., a record for it exists in an authenticated digital certificate database) then the process ends. - If an authenticated digital certificate does not already exist for the referenced electronic document then at
Step 610 the geographic location attribute of the electronic document is authenticated (seeFIG. 6 b). If the electronic document is associated with multiple locations (Step 612) then the geographic location verification (Step 610) is performed for each of the multiple geographic locations. When all the geographic locations have been processed Step 614 processes any other desired attributes of the electronic document for authentication according to an appropriate authentication process (e.g., cross-referencing a phone number attribute with current phone listing directory). Partial geographic verification (e.g., where only some of the multiple locations are verified) is possible, but not reflected in flowchart ofFIG. 6 . The authenticated digital certificate is created atstep 616. - The authenticated digital certificate can be stored (Step 618) in a variety of configurations. The authenticated digital certificate is stored as a record in an online authenticated digital certificate database. Attributes of the electronic document can correspond to fields in the database record. Access and security of the authenticated digital certificate can be managed by the database management system managing the database record. The database storage configuration allows for creating authenticated digital certificates without impacting the storage or management of the electronic document itself. Database record storage also allows for creation of authenticated digital certificates for electronic documents without the permission or knowledge of the electronic document owner. In some instances the electronic document is not pre-existing (e.g., the business submitted has no Web page). In this case, an electronic document address is created on-the-fly and stored with the authenticated digital certificate. Later, a matching electronic document may have to be created on-the-fly to satisfy a search or view request.
- The authenticated digital certificate can also be stored in a separate file within a directory from which the electronic document is accessed. The directory can be organized as a hierarchical tree structure, the authenticated digital certificate authenticating electronic documents within the directory. The authenticated digital certificate can also be stored in a parent directory within the hierarchical tree structured directory, optionally authenticating electronic documents in the parent directory and child directories. When an authenticated digital certificates exist at various levels within a hierarchical tree structured directory the authenticated digital certificate located closest in the parental lineage to the electronic document (including the directory of the electronic document itself) is used. The authenticated digital certificate file can be secured by various existing methods, including locking and encryption schemes.
- Another configuration in which the authenticated digital certificate can be stored is as part of an existing signed and encrypted digital certificate. Technologies currently exist to encrypt and sign electronic documents, the authenticated digital certificate can be stored as an additional component of existing signed digital certificates. Optionally, existing digital signature and encryption technologies can be used to create a standalone authenticated digital certificate of the present invention.
- In yet another configuration the authenticated digital certificate can be stored as part of the electronic document itself. One example is storing the authenticated digital certificate as an HTML metatag in an HTML Web page. Electronic documents using different page formats provide alternate mechanisms for storing information within an electronic document. A proposal for embedded metatags for geographic locations exists in the form of an Internet Engineering Task Force (“IETF”) Internet Draft entitled “Geographic registration of HTML documents” describing a concept of “geotags” (see draft at “http://search.ietf.org/internet-drafts/draft-daviel-html-geo-tag-02.txt”). The geotags described in the IETF Internet Draft contain some of the same information that is stored in the digital certificates of the present invention, but geotags lack a concept of authentication, encoding of attributes or checksum integrity verification.
-
FIG. 6 a is a flowchart of an embodiment of the present invention showing a process for authorizing the submission of an authenticated digital certificate. This process for authorizing the submission of an authenticated digital certificate is an expansion ofStep 604 described inFIG. 6 . The process insures that the submitter is authorized and that the owner is correctly verified. - For primary domain URLs (e.g., a registered domain name) the identity of the submitter is not a factor in the verification of the owner. In this embodiment a primary domain is defined as any domain which is not a sub-domain of another domain (e.g., www.mystore.com). A sub-domain is defined as a domain which is hosted under a primary domain. (e.g., www.mystore.com/fredspizzaplace). In the case of primary domain URLs, online databases (e.g., www.whois.org) list owner information, so the electronic document submitted can be verified, therefore the identity of the submitter does not have to be the owner. Once the ownership is verified a “green level” authenticated digital certificate can be issued for the electronic document, upon further contact with the actual owner a “gold level” authenticated digital certificate may be issued.
- For sub-domain URLs (e.g., electronic documents stored below a primary domain URL) verification of ownership is determined based upon the ability to legally access/modify the electronic document submitted. In this case, a digital certificate is generated and electronically mailed to the identified owner of the electronic document. When the digital certificate is subsequently embedded in the electronic document an authenticated digital certificate can be created.
- Additional checks on the submitter can be performed to ensure an effective and efficient processing of electronic document submissions. For example, statistics can be maintained to determine if a certain submitter is submitting bogus electronic documents or mechanically generating excessive submissions based on robots or spidering. These checks help prevent fraudulent submissions as well as reduce the chances of spamming the authenticated digital certificate authority site.
- At
Step 620 the identity of the submitter of an electronic document for authentication is compared to the identity of the owner of that electronic document. If the submitter is validated and the submission is validated (Step 622) then an indication that the submitter is authorized is made at Step 628 and the process ends. If the submitter is not the owner then a check is made for a digital certificate inserted within the electronic document (Step 624). If the submitter matches the name in the digital certificate (Step 626) within the electronic document an assumption is made that the submitter had the authority to access/modify the electronic document to insert the digital certificate and the submitter is indicated as authorized (Step 628). If the submitter does not match the digital certificate within the electronic document then a digital certificate for authorization purposes is produced and forwarded (Step 630) back to the submitter. If the submitter has the authority to access/modify the electronic document, as evidenced by the insertion of the digital certificate into the electronic document, then the electronic document address can be resubmitted. Validation of submitters can include online database searches (e.g., the WHOIS database supplied by Network Solutions®). -
FIG. 6 b is a flowchart of an embodiment of the present invention showing a process for authenticating the geographic location associated with an authenticated digital certificate. This process for authenticating the geographic location is an expansion ofStep 610 described inFIG. 6 . The process begins at Step 640 where the business/entity name provided by the submitter is compared to the geographic location associated with the electronic document provided (e.g., “Joe's Pizza” and it's electronic document “wwwjoespizza.com”). If the geographic location of the business matches (Step 642) the locations listed in two independent sources (e.g., the VISA online merchant database and the United States Postal Service street listing database) then an indication of authenticated geographic location is made (Step 648). Otherwise, a manual intervention to clarify the mis-match must be performed atStep 644. If the mis-match is resolved (Step 646) then an indication of authenticated geographic location is made (Step 648), otherwise the process ends with no indication of authenticated geographic location being made. - In one preferred embodiment of the present invention authentication is categorized into an internationally recognizable, four-tiered, stoplight-based color trust/authentication scheme (i.e., Red, Yellow, Green, plus Gold). A red level (stop) indicates a dead link (e.g., the electronic document address does not point to a valid electronic document). It may also indicate that an authenticated digital certificate could not be issued because of conflicting information found during authentication. A yellow level (warning) indicates an authenticated digital certificate that has recently had recurring access problems, or the spider has detected changes in information, or sites that have been reported as incorrect and not yet verified. A green level (go) is used for newly created authenticated digital certificates that have not been given Gold status yet. This includes all sites that have been automatically authenticated, and are believed to be accurate but have not passed the Gold level of authentication. A gold level (as good as gold) is assigned to authenticated digital certificates where contact has been made with the owner, and the complete set of basic attributes have been completed. Extended attributes are not required, but are desired. The information in a Gold certificate has been verified, and the owner has agreed that as a condition of being Gold, they must complete a monthly, or quarterly, data confirmation form, and notify the authenticated digital certificate authority promptly of any changes in their data. Additionally, sites having authenticated digital certificates are spidered on a regular basis to verify the accuracy of the data.
- In addition to authentication/trust levels, authenticated digital certificates can be encoded as either representing a virtual Web business or a physical business/entity. Web businesses would have a slightly different authenticated digital certificate, they would be identified as a corporation, or individually run site, and include a corporate headquarters with contact info that can be “withheld upon request” (e.g., for individually run sites that do not want their home addresses listed). The location of the DNS server hosting the site could be displayed as a physical location for Web businesses.
- Zones of service are also provided in this preferred environment. Under this arrangement, a single zone of service may be listed, such as US, world, “language=English” or “Canada, US, Mexico”. This zone of service refers to where the business' products are suitable to be sold, and can legally be sold or shipped. A business can pick a single state or radius from a location if they feel that their product is not practical for sale into a particular region. For example, a real estate agent does not want to, or may not be allowed to, accept listings outside their town, so a virtual Web site for a real estate agent would have a zone of service of their home town or home state only. Users in another state looking for real estate agents would not see their listings. This arrangement has a lot of practicality for online stores that may be restricted from selling across borders due to various legislation (e.g., ammunition, pornography, alcohol, financial services, as well as a host of other duty-able goods). It is unlikely that an online commerce site would ship goods that required the consumer to hire a customs broker or incur duty costs. However, if a business is selling steel or lumber where products are sold mostly between business to business, then this could be an acceptable practice. The zone of service would be up to the Web site to select with certain guidelines provided by the authenticated digital certificate authority.
- Extended attributes for authenticated digital certificates for a virtual business, allow for the creation of a zone of service for a limited number of keywords (e.g., 25 maximum) which could specify different zones of service. These zones of service would be useful for large firms, like Amazon.com, that may ship books to many different countries, but might have to limit encryption-software sales to the US. This allows for multi-tiered results, for example if a user of authenticated digital certificates searches for books in Guelph they would be shown all the local (Guelph) book stores first, but at the bottom, under the heading of virtual sites, they would see the online bookseller Amazon.com. If they were searching for encryption-software, they would see local (Guelph) software dealers, and Canadian virtual software sales sites, but not Amazon.com.
- In order not to penalize “brick-and-mortar” businesses that have zones of service far outside their local stores ranges (e.g., Barnes & Noble or Sears), physical businesses that utilize extended attributes can also list zones of service, and an authenticated digital certificate aware browser might not list Barnes & Noble or Sears as a virtual store if they have already listed them as a local store.
- The various types of authentications can be related to electronic documents stored in a directory/domain name structure. A type-1 authentication indicates a primary domain where whois.org information matches website and the geographic location and business name are verified from two independent sources. A Green level authenticated digital certificate can be issued in this case, with further follow-up asking to verify and submit any missing information. Type-1 authentications are useful as a tool to “up-sell” existing authenticated digital certificate on extended attribute features.
- A type-2 authentication indicates a primary domain where whois.org information does not match business name or geographic location, but business name and geographic location on the site are verified as accurate from two independent sources. A yellow authenticated digital certificate can be issued in this case, with further follow-up including sending email to the WHOIS owner, and site operator requesting verification of data, and submission of missing information. When the owner returns the email, confirming the business data, then a Green authenticated digital certificate can be issued. Alternately, if the site operator inserts an authenticated digital certificate, a Green level can be issued, otherwise a Yellow level can be issued. The various levels can be combined for custom authentication levels (e.g., half-yellow/half green).
- A type-3 authentication indicates a sub-domain where geographic location and business name are verifiable and located in the electronic document and spiderable, but as a sub-domain, confirmation of ownership can not be made. In this case an email is sent to URL's contact person, requesting confirmation of information and asking to have them insert an authenticated digital certificate in the electronic document. If they can insert the certificate it is assumed that they the authority to access/modify the electronic document and a Green authentication level can be assigned. There is no need to contact the host of the electronic document, but an email can be sent to the host. If the host confirms the information, a Green authentication level can be assigned to the electronic document. Otherwise, a Yellow authentication level is indicated. If there is no email address, then a fax or automated phone call will be initiated. Only an email sent from the identical electronic document address (URL) will be considered acceptable to submit additional non-verifiable information.
- A type-4 authentication indicates a sub-domain submitted by third party that does not have geographic location and business name information within the electronic document (page), and therefore no contact information. A third party has suggested the name and geographic location that can be verified, but not to this page. A Yellow authentication level is initially indicated and email can be sent to a Web host indicating that one of their clients has an unverifiable URL. The Web host could be asked to pass on the request for data to the owner. The owner can then get the authenticated digital certificate authority Web site to get their authenticated digital certificate updated to a Green level and insert the authenticated digital certificate into their page as a metatag. As an incentive, the Web host would automatically receive an online credit towards certain authenticated digital certificate services (e.g., upgrades to extended attribute features) if the electronic document owner in question updates their authenticated digital certificate within a specified time limit.
-
FIG. 7 is a flowchart of an embodiment of the present invention showing a process for direct searching using an authenticated digital certificate. - The process starts with an authenticated digital certificate aware browser (or other computer application) initiating a search for electronic documents using geographic query criteria provided at
Step 702 and keyword criteria provided atStep 704. A search, using the geographic query and keyword criteria is performed on the authenticated digital certificate database (Step 706) and an authenticated set of electronic documents or electronic document addresses is returned atStep 708. - It is possible to search for electronic documents using authenticated digital certificates when the electronic document does not actually preexist. This situation occurs when a business/entity does not yet have a Web site. In this case, an electronic document address is created for the business and stored in the authenticated digital certificate. When searching is performed using the authenticated digital certificate database an authenticated digital certificate having a created electronic document address may be accessed. If this occurs an electronic document is created “on-the-fly”, using information stored in the authenticated digital certificate. The newly created electronic document (or the electronic document address) can then be returned to the user.
-
FIG. 8 is a flowchart of an embodiment of the present invention showing a process for parallel searching using an authenticated digital certificate. The process begins atStep 802 by parsing a keyword query. A keyword query is a string containing terms, some possibly geographic, some possibly non-geographic, used as criteria in a search. Step 804 checks for geographic terms that may indicate a geographic search should be done. A process run on the keyword query determines if it contains terms that match geographic categories. For example, the parser can detect that terms such as “Boston”, “Guelph”, “Massachusetts”, “Ontario”, and “Canada” are geographic terms. If a geographic search is not indicated then a keyword search is performed on the keyword-based index of electronic documents (Step 806) and results of the search are presented atStep 822. - If a geographic search is indicated, a check is made to determine if the geographic terms are to be removed from the keyword query (Step 806). At
Step 808 the geographic terms are removed. Whether geographic term are removed or not, a keyword search is performed on the keyword-based index of electronic documents (Step 809). - A geographic search performed on the authenticated digital certificate database conceptually is broken into two parts: a geographic boundary and a non-geographic keyword portion. An option to enhance the geographic boundary can be checked (Step 810), and if set the geographic boundary information can be modified. For example, a keyword query involving “automobiles” and “Boston” can be modified to include geographic locations that are not in Boston proper, but located in “Greater Boston” (e.g., Dorchester, Mattapan and Roxbury). The keyword terms can also be modified to include words associated with the keyword terms prior to the search at step 809 (e.g., “automobile” can be changed to “automobile”, “car” or “vehicle”). The extent of the modification may, or may not, be tied to a proximity user preference associated with the user or subject of the query. A geographic search on the authenticated digital certificate database is performed using the possibly modified keyword query at
Step 812. Both the term removal/stripping process ofStep 808 and the term enhancement process of Step 811 are optional based. These option are based upon user settings and system heuristics. AtStep 814 the results of both searches, the keyword-based search and the geographic search are compared. The results of that comparison can provide for displaying each set of results in separate windows (Step 816), tagging matching electronic documents (Step 818) or removing non-matching electronic documents (Step 820). In all cases the results are presented for display inStep 822. - The use of an authenticated digital certificate allows the browser to produce a list of electronic documents that more closely match the keyword-based search results that the user expects. The ability to use authenticated digital certificates in the search process significantly enhances the probability that the resulting electronic documents actually match the search results the user expected.
- In a preferred embodiment a database would exist that would contain geographic terms that are often used for non-geographic purposes, including common popular names. Thus phrases such as “Bermuda shorts” would be identified as not referring to the island of Bermuda, other examples include “Boston creme pie”, “Black Forest ham”, “George Washington” or “Buffalo wings”. In these cases a geographic search would not be performed.
- The search criteria and authenticated geographic attributes can also interact to automatically derive proximity settings for a geographical search based upon other keywords in the search criteria. When searching for products sold by business an algorithm can be used to match certain products to certain predefined proximity. For example when searching for “pizza” in an authenticated digital certificate aware browser, the algorithm may determine a distance of “3 miles” is acceptable, but if searching is done for “automobiles” a distance of “10 miles” may be used. This allows for the possibility that purchasers will travel different distances for different products. Proximity is not limited to linear distance, proximity can be defined in terms of zip code, driving miles, driving time, as well as other measurements. The algorithm is completely overrideable and has the ability to adjust its parameters (i.e., learn) based upon previous behavior of the user. The user also has the ability to supply user input to adjust any attribute parameters according to their own personal preferences.
-
FIG. 9 is a flowchart of an embodiment of the present invention showing a process for viewing an authenticated digital certificate. A URL representing an electronic document is obtained atStep 902. The URL is then used to check for an associated authenticated digital certificate (Step 904). Checking involves searching for an authenticated digital certificate stored in the authenticated digital certificate (Step 904). If an authenticated digital certificate is found (Step 906) it is used to display attributes associated with the electronic document atStep 910, otherwise a message is displayed (Step 910). Authenticated digital certificates can be viewed by their owners (e.g., during the creation process) to verify information or by others searching for information about a business entity. The authenticated digital certificate can also be viewed by representatives of the authenticated digital certificate authority in the process of verifying information. -
FIG. 10 is an illustration of a map displayed according to an embodiment of the present invention showing an interface for selecting and viewing an authenticated digital certificate. The map illustrated inFIG. 10 is an example of a pop-up window that can appear when an authenticated digital certificate aware browser sees an authenticated digital certificate metatag or identifies a URL as having an authenticated digital certificate. The map would appear on the screen with cross hairs indicating where the URL was located, for example, near to Orlando, Fla. Other methods for displaying and selecting the URL are also possible, including links, buttons and lists. The user can zoom in or zoom out using zoom inbutton 978 and zoom out button 980. Tracing (970) is available to show a trace route/path from the user to the business. A button (974) also exists allowing the user to view the authenticated digital certificate data. The user can set a host of other options, which would pull up another screen of choices. These options relating to the view are accessible using theOptions button 972. -
FIG. 11 is a flowchart of an embodiment of the present invention showing a process for verifying the integrity of an authenticated digital certificate. Authenticated digital certificates, whether stored in a file, a signed digital certificate database or a metatag, always have some representation stored in an authenticated digital certificate database (e.g., on database server 120). Periodically, or upon specific request, the integrity of some or all of the authenticated digital certificates can be checked. The flowchart describes one process by which authenticated digital certificates are verified. The process starts atStep 952 by obtaining the URL from an authenticated digital certificate represented in the database. The URL is checked for existence (i.e., an automated attempt is made to link to it) at Step 954, if the attempt to link to the URL causes an error, a flag is set within the database to perform a manual check for existence (Step 960). Otherwise, the process continues to Step 956 where any geographic location attribute of the authenticated digital certificate is searched for within the electronic document associated with the URL. If the geographic location attribute does not match, a flag is set within the database to perform a manual check of the geographic location (Step 960). Otherwise, other attributes of the authenticated digital certificate are checked (Step 958), again if they do not match a flag is set within the database to perform a manual check of the specific attribute (Step 960). When all attributes have been checked the process ends.Steps - In a preferred embodiment of the present invention, searching involves the situation where a consumer desires to purchase a product. The customer goes online and researches the product using traditional Internet search tools with no regard to the location of the sites. The initial product research is to determine the desired product information, reviews, prices and other consumer's opinions. The user may visit several sites, chat rooms and discussion forums in this research process. At some point, the user may decide they want to purchase the product, and in many cases will not desire to buy the product online. There are many reasons for not purchasing online, including the desire to have the goods immediately, the need to touch and feel the product especially where size or fit may be concerned, or in cases where the goods are not available for sale online (e.g., legal restrictions on the sale of alcohol or ammunition). At the point the person decides to purchase the product or service, and they have determined not to purchase it online, the immediate need is to locate the nearest location offering the product or service. Currently, the methods to determine location are very poor, they typically involve the person going to a search engine, and typing in the product or service keyword, a geographical keyword representing their town, and scanning through a large number of listings that may be in the hundreds or thousands. The listings are often no where near the geographic location of the user, despite the search engine matching the words. Alternatively, online yellow page directories are consulted which contain a far more geographically concise list but often lack any URL listings to the business, and are often outdated in terms of geographic location. The business' Web site represents the best place to see what products and services are available at a given store. Without the ability to link to the business Web site, the user may physically visit a site and find out they do not carry the product mentioned, or have moved locations. Directory listings also have an inherent weakness in that they are sorted by SIC codes, so often services and locations are not intuitive and therefore missed.
- An example business is a running shoe store which you would expect to find under either “Shoes-retail” or “Shoe stores”. In fact, the correct SIC category is “sportswear-retail”. Often the consumer has no idea that this is the case, so a search on “running shoes” will either show no matches, or shoe stores, of which none or few carry running shoes. This presents a false representation of the local economy and therefore undermines the effectiveness of directory listings.
- The user therefore is currently stuck with the choice of checking out a large number of possibly irrelevant URLs to find which web sites or using a directory that may not list URLs. When using a directory listing service the user is typically presented with a list of phone numbers, and must call around to find out what the Web sites URLs are, whether they have the product and if their address (geographic location) is still current.
- A preferred embodiment of the present invention helps both the overly large search list and the sparse directory listing situations. In the case of the search engine, a process using authenticated digital certificates would parse the keyword entry and locate the geographical keyword, and perform a parallel search using the authenticated digital certificate database, but returning only matches that are physically located within the geographical area specified. In addition, the authenticated digital certificate would be used to indicate which URLs returned by the search engine are found in the authenticated digital certificate database, and if so, where they are geographically located, so the user has an immediate method of focusing their search on the correct URLs. Alternatively, they can consult the parallel search results that are all located in the geographical region. In the directory listing, a similar action takes place. When a browser plug-in detects a geographic term in a query, a parallel search is returned. Some interactions with directory listings not be possible, due to selection coming from pull down menus preventing parsing efforts. When the user is provided with a list of geographic locations, they can simply highlight the table, or text listings, and the browser plug-in will perform a match with the authenticated digital certificate database, confirming the URLs of all the geographic locations that have web sites, thus confirming or correcting the geographic locations.
- Authenticated digital certificates enhance searching for businesses by providing accurate location filtering of search results, verification of information, increased depth of information, and URL addresses, where none were provided. This allows the consumer to locate a local business much more quickly, connect to their Web site and see if the product they want is available and at what price.
- A very common task, especially for travelers is to research a foreign city or town before they visit it to see what restaurants, hotels, activities etc. are available. Each user has particular, interests. Using a search engine presents many problems mostly involving returns of large number of results that are tedious to sift through especially since the sites are not ordered by geographic locations of the entries portrayed on the Web sites. Therefore, a user can spend hours and hours reviewing Web sites that are not relevant to that particular region. While “city pages” provide a general overview of the city, they are not available for many regions, and lack the ability to search the businesses web sites provided on their city page, and often do not have the URLs of these businesses, so the user cannot connect to those sites.
- Ideally, the user would want a local portal such as a Yahoo!, or Altavista that contains only entries for a particular region of geography. Yahoo! offers local sites on a country by country basis, and has local city sites, but these are human generated, and cannot be searched using keywords. For example, when a user searches for “restaurants” in the Yahoo! San Francisco search window, twenty different sub-regions of restaurants appear and then a choice has to be made within in each of these for different types of food, such as Chinese, Japanese, cafes, European, Internet cafes etc. The actual search results report the entire web. A search for “Chinese restaurants MSG” or any other phrase that does not exactly match a predefined category provides no matches. Yahoo! and other search engines cannot provide true localized portals since they have no way of connecting the URLs from a search result with their geographic locations.
- Using authenticated digital certificates, a localized portal can be created, as authenticated digital certificates provide the critical URL to geographic location link. Depending on the size of the region, two options are available in a preferred embodiment of the present invention. For a small region, when bandwidth is available, a localized index approach is used. For larger regions, a filtered approach using large existing search engines is used. A region can be defined in a large number of ways, including a radius out from a central point, a city, state or postal code as a filter, a driving distance from a central point, or even one or more bounded regions drawn on a map. Once the region is selected, a list of all URLs in that region is extracted from the authenticated digital certificate database and stored in a local portal database table.
- In the case of portals for a small region, or a large region which will be topical for a long period of time, such as a local community, a spider would connect to the associated URLs and download the entire Web site and index onto a local machine. As storage space and bandwidth could be a factor, the user could request no graphics, audio or video be downloaded. Alternatively, the user can request a Web site's main URL only, or a specific depth of pages (e.g., only download two pages deep) to reduce resources required. As the pages are downloaded, they are stored in a compressed format, and indexed. If storage space is an issue, the original Web sites need not be stored as long as they are indexed. If storage space is not an issue, the pages are stored locally along with the index. Additionally, dynamic content may also be stored. At the end of the process, the user has a snapshot of the Internet, bounded by the specified regions. This snapshot can be stored on a DVD or CD and used in an offline device or sold as a snapshot of the Internet. Alternative implementations allow subsetting based upon particular categories of information, such as businesses, or schools.
- The user would have the choice of several front end interfaces to view snapshot data. One is a Yahoo! type portal/search engine interface. Another interface is a directory service interface, and yet another is a map with URLs displayed. In all cases, the user could perform searches as in a traditional search engine, yet the results would be limited to the Web sites contained in the region.
- In a preferred embodiment of the present invention this service includes a set of CDs, DVDs or other mass storage devices created for popular tourist regions by category. A tourist could buy a DVD with all the restaurants and hotels in Las Vegas on one DVD, and all the casinos on another. The user is provided with a viewer to read these devices, as an alternative if a computer or similar device is not available. With Internet access, the program is able to update the snapshot of URLs if data has changed, allowing dynamic content to be accessed. Access time for these mass storage devices is almost immediate, since all the information is stored locally. Since these CDs, DVDs and mass storage devices can be erased and re-used, custom devices can be made with little lead time to meet unique demands. A single DVD can store 16 Gb of data, holding about 160,000 Web pages (based on a 100K average Web page size). Likely, the index may be 10 Gb, and the number of Web pages is reduced to 60,000, or less if additional graphics/audio/video is allowed, but still substantial and useful.
- For larger regions, a preferred embodiment of the present invention is used to create a local portal using authenticated digital certificates. The processes is similar in that a user specifies a region (e.g., city, distance from a central point, shape drawn on a map, driving distance) and boundaries represented by the user's inputs are calculated. A set of URLs is developed as a query against the authenticated digital certificate database. These URLs would be stored in a master table locally on the user's computer. When the user connects to the Internet, a browser plug-in reads all the URLs requested, if the URL was not in the table it can prevent the URL from loading, or provide a warning to the user that they are leaving the local region and connecting to the Internet outside the region. Note that certain Web sites, such as Yahoo!, that might be located outside the defined region, could be added to an exclusion list, so that a user's popular Web sites are still accessible. Whenever URLs are displayed as either links or results from a search engine, the local links appear with some form of identifying ornamentation (e.g., color, highlight, double underline, italic, graphic insertion). Alternatively, search results can be stripped of all matches that are not local, so that they do not even appear. As technology storage devices increase, and bandwidth becomes less of an issue, the local storage implementation will probably become more desirable.
- Currently, there exist several solutions for providing locations of nearby businesses/entities based on locating a wireless device using various technologies, and then supplying names, addresses and phone numbers of local businesses to the wireless device. This benefits users not familiar with an area by allowing them to find places of interest including cash machines, restaurants, hotels etc. Many Web sites may store information about a user (e.g., cookies) so that a specific user's request for the nearest restaurant or hotel, is enhanced by knowing the user's preferences (e.g., non-smoking, Chinese food). The current method has several problems. First, if the user requests restaurants within a certain radius, a very large number of choices may be provided, but an option to display less than all the restaurants may result in preferred restaurants not being displayed. When all restaurants are displayed, the user must spend considerable time scanning through all the listings. Ideally, the profile of the user's personal interests would be used to filter the results. For example, if the user is allergic to raw fish, then sushi restaurants would not be displayed. Descriptive information is already stored by some vendors, however the usefulness of profile data is only valid if the Web site of the restaurant matches the categories stored in the user profile. For example, if one of the user profile categories is “handicapped access”, then the obvious result is only to display restaurants that have handicapped access. However, if the only descriptive information known is address and phone number, then it is impossible to determine whether the establishment has handicapped access or not. While some industries, such as restaurants, are listed by services that include additional information (e.g., AAA or Fodor's), the problem still exists that there is a different collection of data for every industry, with various levels of detail. Some industries have little additional data available. At other times this data is expensive to license, and often the data is prejudiced by membership requirements, or inaccuracy due to a lack of updates. Authenticated digital certificates are designed to provide a common format for basic and extended attribute information common to most businesses. Attribute information could include, name, address, latitude, and longitude (for location services), phone number, fax number, hours of operation, terms and methods of payment, language of service, return policy, and most importantly the URL and Wireless Application Protocol (“WAP”) URL for the business. Authenticated digital certificates provide an extended template, that while different for every industry, has a common interface and file structure. These two types of authenticated digital certificates (basic and extended) provide a common format that can be read by any developer who wants to access business information. Additional levels of information can be supplied using authenticated digital certificates of different formats, providing either more or less information than supplied by the basic and extended type authenticated digital certificates. This also allows applications to be developed that can filter information by matching the personal profiles with business profiles using a much greater depth of information, and therefore providing a much more accurate searching/filtering experience. Even without providing additional sources of data, the availability of a single format for existing data is an improvement over present methods. Also, since authenticated digital certificates are authenticated and maintained by various methods, including changes to the user's Web site, providing a new level of accuracy that decreases false positive matches. Note that the personal profile could be stored in an authenticated digital certificate aware browser plug-in, or could be a third party's own profile format.
- Once the ability to accurately filter information has been provided to the user, the process of contacting the businesses can commence. It is impossible to store all the information about a business or place of interest in a single authenticated digital certificate. There will be questions that the user has that require additional information and may require a contact. For example, in the case of a restaurant, the user needs to know whether seating is available at a certain time, whether they have a kids menu, whether they are located near a bus stop, or whether they use MSG in their food. Other examples include hotels. The user may want to know if they have a workout facility, if the pool is open this time of year, whether they have foam pillows, or if they have dataports in any of the rooms. Regardless of whether this information is provided in the authenticated digital certificate or not, the user may also want to confirm the information. The two options involve calling the business, which can involve long distance charges, be time consuming, require the business to be open, having a non-busy line, having someone to answer the phone who knows the answers, or having an automated attendant with options to answer the user's questions. Alternatively, the more functional option is to connect to the business' Web site. The Web site is accessible at no charge, at any time of day, usually contains far more detailed information than is in yellow pages or even an authenticated digital certificate and therefore is a good place to start any research. As Web sites evolve the requirement to still contact the business by phone will become less and less, especially as expert systems collect queries and archive them so that the Web sites become more and more useful over time.
- The ability to connect to a Web site is a requirement predicated on having a device that can access the Internet, which wireless devices either have directly, or can access through their a carrier. However, a second requirement is that the URL of the business must be known. This is a huge problem right now, as current locator services often have no URL information, and if they do it is sporadically available, and thus cannot be relied upon. Currently, when a URL is provided, there is no knowledge of whether the link is dead or not, or whether the link is correct. The lack of an infrastructure tool that provides a connection between the ground (geographic location) and URLs prevents the ability to consistently offer a powerful service—that being the ability to allow a user to locate the closest businesses, based on their personal profile, and connect to the most accurate source of information about those businesses (i.e., the businesses' own Web sites). Authenticated digital certificates provide the infrastructure to accomplish this. Authenticated digital certificates provide the URL to ground link, and additionally allow for continually monitoring these links to look for changes in information, and to ensure the URLs still exist so that at any given time, the authenticated digital certificates database is the most accurate source for current basic detailed information about local businesses and other places of interest.
- A further use of authenticated digital certificates represents an improvement over the basic use of authenticated digital certificates in a wireless environment by enabling a wireless device to connect directly to a Web site and negotiate a transaction with that Web site. The user of a wireless device can have a personal profile. This profile can be stored as a “personal authenticated digital certificate”, without providing the identity of the user, if privacy is a concern. In order to be most useful, a wireless device should minimize the user's involvement in non-decision based tasks, and maximize the productivity of the device itself. One embodiment that meets these criteria is having the wireless device receive a request from the user in the form of voice, keyboard, or other input. For example, the user may activate the device, and say, “Find me dinner for four people at 7:00 pm.”. This request triggers the device to load the user's profile, and to connect to the authenticated digital certificate database where it immediately has access to the authenticated digital certificates for all the local businesses that meet the criteria of the request (i.e., restaurants), within a set bounded range (i.e, within five miles) and matches these against the personal profile using a ranking system that is a combination of excluding and influencing factors that combine to create a percentile. Distance is be a major influencing factor. From this set of matches, a cut-off is used to include only relevant matches, or if there are many matches only those within a predefined cutoff are identified. A process using the personal authenticated digital certificate then contacts the Web site's authenticated digital certificates and may open up a secure communication (e.g., SSL). Because the device knows where it is located, and knows that authenticated digital certificates are authenticated to a geographic location, a level of trust with respect to distance is established. The authenticated digital certificates can also be encrypted to insure that it contains information that the user can trust. Once the communication is opened, the device requests a reservation for the four people at 7:00, and provides its personal authenticated digital certificate number that the business authenticated digital certificate process can identify as legitimate. The business authenticated digital certificate process can accept or reject the request automatically, or generate a request to a device belonging to the business owner. The business owner can then approve the request. Once an approval or non approval is issued, the user's device collects this information, and after repeating this procedure with all the identified matches, provides the owner with the choices. The owner can then see a number of openings, each being held for a period of time set by the business owner's website. The owner can then make a decision by picking one of the choices. The device can confirm the choice and optionally release credit card information to hold the reservation, as well as canceling the other choices. In addition to these benefits provided to users, authenticated digital certificates provide benefits to businesses as well. Being able to authenticate a user allows a business to modify business behavior, thus allowing the business to block users who might abuse the business service or restrict transaction from certain authenticated users.
- Authenticated digital certificates provide a trusted mechanism for commerce to take place. Without authenticated digital certificates, there is a potential for businesses to identify themselves incorrectly to increase matches and thus commerce. Additionally, without a common protocol, each device would have to have hundreds of different negotiation programs (e.g., one for hotels, one for restaurants, one for dry cleaners, one for video stores etc.), with authenticated digital certificates, there is a common mechanism for securely initiating a transaction which can be interfaced with any back-end system being used by the businesses with little effort.
- While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention encompassed by the appended claims. Particularly, a person of ordinary skill in the art will recognize that referring to an electronic document, electronic document address and a URL can sometimes be done synonymously. The use of these terms is in no way intended to limit the invention to a particular implementation and one of ordinary skill in the art will be able to distinguish among them based upon context.
- An embodiment of the present invention allows users to view and search on authenticated attributes that are related to specific membership organizations. For example the Automobile Association of America (“AAA”) seal on a business is used by many travelers to access the quality of an establishment. Being able to display the AAA logo, using an authenticated digital certificate, allows viewers and searchers of electronic documents (e.g., Web pages) the ability to quickly determine which businesses they might purchase from. Access to the AAA extended attribute might come from a UserId and password issued from the organization when a membership subscription is purchased.
- In yet another embodiment of the present invention the authenticated digital certificates are used for searching and viewing geographically authenticated electronic documents associated with non-business entities. For example government, non-profit, educational organizations would benefit from using authenticated digital certificates. Additionally, individuals can also have authenticated digital certificates created and used for searching and viewing. One benefit of individual, or personal, authenticated digital certificates is that they can be used to provide privacy to individuals while still supplying search process accurate geographic location data for searching. Based upon a user's geographic location a proximity search can access the user's geographic location, but prevent a viewer from accessing the underlying geographic location. When displayed, or mapped, the geographic location can be shown to be within a certain region without revealing the user's exact location.
Claims (2)
1. A computerized method of searching for electronic documents, the method comprising:
monitoring queries at a search engine interface;
detecting a geographic term in a search query the search engine;
searching, independent of the search performed by the search engine, a database for verified URL addresses associated with the geographic term, the database storing information about a plurality of online electronic documents, including a URL address of the document and a verified geographic location associated with the document, the geographic location being verified using a mechanism other than the content of the electronic document;
in response to the search engine providing query results, comparing the query results from the search engine with the verified URL, addresses from the database that correspond to the geographic term; and
updating the query results from the search engine to identify which URL addresses in the search results correspond to the verified URL addresses from the database.
2. A computerized method of searching for electronic documents, the method comprising:
creating a searchable index using content from electronic documents having geographically verified URL addresses that are associated with a geographic location verified by a mechanism other than the content of the electronic document;
storing, in one or more tables locally on the user computer, the geographically verified URL addresses, the searchable index, and the geographic location associated with the geographically verified address;
detecting a search query specifying the geographic location and a keyword;
responding to the query by searching the locally stored searchable index for geographically verified URL addresses having content associated with the keyword; and
identifying the geographically verified URL addresses having content associated with the keyword.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/235,434 US20090070290A1 (en) | 2000-10-10 | 2008-09-22 | Method and Apparatus for Providing Geographically Authenticated Electronic Documents |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US68522600A | 2000-10-10 | 2000-10-10 | |
US10/620,170 US7233942B2 (en) | 2000-10-10 | 2003-07-15 | Method and apparatus for providing geographically authenticated electronic documents |
US11/800,284 US7447685B2 (en) | 2000-10-10 | 2007-05-04 | Method and apparatus for providing geographically authenticated electronic documents |
US12/235,434 US20090070290A1 (en) | 2000-10-10 | 2008-09-22 | Method and Apparatus for Providing Geographically Authenticated Electronic Documents |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/800,284 Continuation US7447685B2 (en) | 2000-10-10 | 2007-05-04 | Method and apparatus for providing geographically authenticated electronic documents |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090070290A1 true US20090070290A1 (en) | 2009-03-12 |
Family
ID=32031186
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/620,170 Expired - Fee Related US7233942B2 (en) | 2000-10-10 | 2003-07-15 | Method and apparatus for providing geographically authenticated electronic documents |
US11/800,284 Expired - Fee Related US7447685B2 (en) | 2000-10-10 | 2007-05-04 | Method and apparatus for providing geographically authenticated electronic documents |
US12/235,434 Abandoned US20090070290A1 (en) | 2000-10-10 | 2008-09-22 | Method and Apparatus for Providing Geographically Authenticated Electronic Documents |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/620,170 Expired - Fee Related US7233942B2 (en) | 2000-10-10 | 2003-07-15 | Method and apparatus for providing geographically authenticated electronic documents |
US11/800,284 Expired - Fee Related US7447685B2 (en) | 2000-10-10 | 2007-05-04 | Method and apparatus for providing geographically authenticated electronic documents |
Country Status (1)
Country | Link |
---|---|
US (3) | US7233942B2 (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080177733A1 (en) * | 1996-05-10 | 2008-07-24 | Aol Llc | System and method for geographically organizing and classifying businesses on the world-wide web |
US20090235071A1 (en) * | 2008-03-13 | 2009-09-17 | Gm Global Technology Operations, Inc. | Certificate assignment strategies for efficient operation of the pki-based security architecture in a vehicular network |
US20100082590A1 (en) * | 2003-05-30 | 2010-04-01 | Nye Timothy G | Systems and Methods for Enhancing Web-Based Searching |
US20100299166A1 (en) * | 2009-05-19 | 2010-11-25 | Microsoft Corporation | Generating relevant keywords for monetization in an electronic map environment |
US20110119379A1 (en) * | 2009-11-16 | 2011-05-19 | International Business Machines Corporation | Geo-positionally based data access security |
US20110131204A1 (en) * | 2009-12-02 | 2011-06-02 | International Business Machines Corporation | Deriving Asset Popularity by Number of Launches |
US8265871B1 (en) * | 2011-03-31 | 2012-09-11 | Google Inc. | Mobile record information entry and geotagging |
US8489560B1 (en) * | 2010-09-08 | 2013-07-16 | Conductor, Inc. | System and method for facilitating the management of keyword/universal resource locator (URL) data |
US9152716B1 (en) * | 2012-12-31 | 2015-10-06 | Emc Corporation | Techniques for verifying search results over a distributed collection |
US20160373262A1 (en) * | 2015-06-16 | 2016-12-22 | Vellitas Llc | Systems and methods for digital certificate security |
US11043306B2 (en) | 2017-01-17 | 2021-06-22 | 3M Innovative Properties Company | Methods and systems for manifestation and transmission of follow-up notifications |
US11232402B2 (en) | 2010-02-26 | 2022-01-25 | 3M Innovative Properties Company | Clinical data reconciliation as part of a report generation solution |
US11282596B2 (en) | 2017-11-22 | 2022-03-22 | 3M Innovative Properties Company | Automated code feedback system |
US20220158997A1 (en) * | 2020-11-18 | 2022-05-19 | Evrythng Ltd | End-to-End Product Authentication Technique |
Families Citing this family (197)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7258983B2 (en) * | 1994-04-25 | 2007-08-21 | Genentech, Inc. | Cardiotrophin-1 compositions and methods for the treatment of tumor |
US6711146B2 (en) * | 1999-02-22 | 2004-03-23 | Genesys Telecommunications Laboratories, Inc. | Telecommunication system for automatically locating by network connection and selectively delivering calls to mobile client devices |
WO2001063479A1 (en) | 2000-02-22 | 2001-08-30 | Metacarta, Inc. | Spatially coding and displaying information |
US7233942B2 (en) * | 2000-10-10 | 2007-06-19 | Truelocal Inc. | Method and apparatus for providing geographically authenticated electronic documents |
US9311499B2 (en) * | 2000-11-13 | 2016-04-12 | Ron M. Redlich | Data security system and with territorial, geographic and triggering event protocol |
CA2328795A1 (en) | 2000-12-19 | 2002-06-19 | Advanced Numerical Methods Ltd. | Applications and performance enhancements for detail-in-context viewing technology |
US7685224B2 (en) * | 2001-01-11 | 2010-03-23 | Truelocal Inc. | Method for providing an attribute bounded network of computers |
JP2002236808A (en) * | 2001-02-07 | 2002-08-23 | Sony Corp | Information processing device and method, program storage medium and program |
DE10118127A1 (en) * | 2001-04-11 | 2002-10-17 | Philips Corp Intellectual Pty | Process for operating an automatic industry information system |
CA2345803A1 (en) | 2001-05-03 | 2002-11-03 | Idelix Software Inc. | User interface elements for pliable display technology implementations |
US8416266B2 (en) | 2001-05-03 | 2013-04-09 | Noregin Assetts N.V., L.L.C. | Interacting with detail-in-context presentations |
US9760235B2 (en) | 2001-06-12 | 2017-09-12 | Callahan Cellular L.L.C. | Lens-defined adjustment of displays |
US7084886B2 (en) | 2002-07-16 | 2006-08-01 | Idelix Software Inc. | Using detail-in-context lenses for accurate digital image cropping and measurement |
WO2002101534A1 (en) | 2001-06-12 | 2002-12-19 | Idelix Software Inc. | Graphical user interface with zoom for detail-in-context presentations |
US7647422B2 (en) * | 2001-11-06 | 2010-01-12 | Enterasys Networks, Inc. | VPN failure recovery |
CA2361341A1 (en) | 2001-11-07 | 2003-05-07 | Idelix Software Inc. | Use of detail-in-context presentation on stereoscopically paired images |
CA2370752A1 (en) | 2002-02-05 | 2003-08-05 | Idelix Software Inc. | Fast rendering of pyramid lens distorted raster images |
US20030163408A1 (en) * | 2002-02-26 | 2003-08-28 | Stephen Polston | Computerized system and method for exchanging information between a buyer, seller, and lender |
AU2003217819B2 (en) | 2002-03-01 | 2008-04-03 | Extreme Networks, Inc. | Location aware data network |
US7627753B2 (en) * | 2002-03-19 | 2009-12-01 | Microsoft Corporation | Secure digital data format and code enforced policy |
WO2003096585A1 (en) * | 2002-05-06 | 2003-11-20 | Bentley Systems, Inc. | Method and system for digital rights management and digital signatures |
US20030217267A1 (en) * | 2002-05-16 | 2003-11-20 | Kindberg Timothy P.J.G. | Authenticating a web hyperlink associated with a physical object |
JP3650611B2 (en) * | 2002-06-13 | 2005-05-25 | 一浩 宮本 | Program for encryption and decryption |
US7801945B1 (en) | 2002-07-03 | 2010-09-21 | Sprint Spectrum L.P. | Method and system for inserting web content through intermediation between a content server and a client station |
US7568002B1 (en) * | 2002-07-03 | 2009-07-28 | Sprint Spectrum L.P. | Method and system for embellishing web content during transmission between a content server and a client station |
US20070064018A1 (en) * | 2005-06-24 | 2007-03-22 | Idelix Software Inc. | Detail-in-context lenses for online maps |
US8120624B2 (en) | 2002-07-16 | 2012-02-21 | Noregin Assets N.V. L.L.C. | Detail-in-context lenses for digital image cropping, measurement and online maps |
CA2393887A1 (en) | 2002-07-17 | 2004-01-17 | Idelix Software Inc. | Enhancements to user interface for detail-in-context data presentation |
CA2406047A1 (en) | 2002-09-30 | 2004-03-30 | Ali Solehdin | A graphical user interface for digital media and network portals using detail-in-context lenses |
CA2449888A1 (en) | 2003-11-17 | 2005-05-17 | Idelix Software Inc. | Navigating large images using detail-in-context fisheye rendering techniques |
CA2411898A1 (en) | 2002-11-15 | 2004-05-15 | Idelix Software Inc. | A method and system for controlling access to detail-in-context presentations |
KR101123426B1 (en) * | 2003-04-04 | 2012-03-23 | 야후! 인크. | A system for generating search results including searching by subdomain hints and providing sponsored results by subdomain |
US20050021596A1 (en) * | 2003-07-23 | 2005-01-27 | Do Dung A. | Internet business directories, and promotion of the same |
CA2479567C (en) * | 2003-08-27 | 2012-04-24 | Inoventiv (Canada) Corp. | Method and system for dynamic display of inventory data on a webpage |
US8935243B2 (en) | 2003-08-27 | 2015-01-13 | Inoventiv (Canada) Corp. | Method and system for dynamic web display |
US20050080786A1 (en) * | 2003-10-14 | 2005-04-14 | Fish Edmund J. | System and method for customizing search results based on searcher's actual geographic location |
US8234373B1 (en) | 2003-10-27 | 2012-07-31 | Sprint Spectrum L.P. | Method and system for managing payment for web content based on size of the web content |
US7922083B2 (en) * | 2003-11-19 | 2011-04-12 | Harrison Sarah E | Payment programs for healthcare plans |
US7590557B2 (en) * | 2003-11-19 | 2009-09-15 | American Express Travel Related Services Company, Inc. | Healthcare card incentive program for multiple users |
US20060167720A1 (en) * | 2004-11-19 | 2006-07-27 | American Express Travel Related Services Company, Inc. | Incentive Programs for Healthcare Cards |
US20100211493A9 (en) * | 2003-11-19 | 2010-08-19 | American Express Travel Related Services Company, Inc. | Incentive Programs For Healthcare Cards |
US20070011088A1 (en) * | 2005-07-08 | 2007-01-11 | American Express Company | Assured Payments for Health Care Plans |
US20050192999A1 (en) * | 2003-11-21 | 2005-09-01 | Cook Scott J. | System and method of virtualizing physical locations |
US20050195756A1 (en) * | 2004-02-26 | 2005-09-08 | Frattura David E. | Status announcement system and method |
US7580403B2 (en) * | 2004-02-26 | 2009-08-25 | Enterasys Networks, Inc. | Status transmission system and method |
US20060037075A1 (en) * | 2004-03-10 | 2006-02-16 | Frattura David E | Dynamic network detection system and method |
US7486302B2 (en) | 2004-04-14 | 2009-02-03 | Noregin Assets N.V., L.L.C. | Fisheye lens graphical user interfaces |
US9203648B2 (en) | 2004-05-02 | 2015-12-01 | Thomson Reuters Global Resources | Online fraud solution |
US20070107053A1 (en) * | 2004-05-02 | 2007-05-10 | Markmonitor, Inc. | Enhanced responses to online fraud |
US8041769B2 (en) * | 2004-05-02 | 2011-10-18 | Markmonitor Inc. | Generating phish messages |
US7913302B2 (en) * | 2004-05-02 | 2011-03-22 | Markmonitor, Inc. | Advanced responses to online fraud |
US7457823B2 (en) | 2004-05-02 | 2008-11-25 | Markmonitor Inc. | Methods and systems for analyzing data related to possible online fraud |
US7870608B2 (en) * | 2004-05-02 | 2011-01-11 | Markmonitor, Inc. | Early detection and monitoring of online fraud |
US8769671B2 (en) * | 2004-05-02 | 2014-07-01 | Markmonitor Inc. | Online fraud solution |
US7231405B2 (en) * | 2004-05-08 | 2007-06-12 | Doug Norman, Interchange Corp. | Method and apparatus of indexing web pages of a web site for geographical searchine based on user location |
JP2008521066A (en) * | 2004-05-28 | 2008-06-19 | ラモント ヘッド トラヴィス | Internet-type resource search system |
US8106927B2 (en) | 2004-05-28 | 2012-01-31 | Noregin Assets N.V., L.L.C. | Graphical user interfaces and occlusion prevention for fisheye lenses with line segment foci |
AU2004320238B2 (en) * | 2004-06-04 | 2008-07-03 | Mitsubishi Denki Kabushiki Kaisha | Certificate issuance server and certification system for certifying operating environment |
US9105061B2 (en) * | 2004-06-16 | 2015-08-11 | Redfin Corporation | Online marketplace for real estate transactions |
US9213461B2 (en) * | 2004-06-16 | 2015-12-15 | Redfin Corporation | Web-based real estate mapping system |
US20050288959A1 (en) * | 2004-06-16 | 2005-12-29 | David Eraker | Map-based search for real estate service providers |
US9317945B2 (en) | 2004-06-23 | 2016-04-19 | Callahan Cellular L.L.C. | Detail-in-context lenses for navigation |
US7945945B2 (en) | 2004-08-06 | 2011-05-17 | Enterasys Networks, Inc. | System and method for address block enhanced dynamic network policy management |
US7714859B2 (en) | 2004-09-03 | 2010-05-11 | Shoemaker Garth B D | Occlusion reduction and magnification for multidimensional data presentations |
US7606687B2 (en) * | 2004-09-14 | 2009-10-20 | Friendster, Inc. | Proximity search methods using tiles to represent geographical zones |
US7995078B2 (en) | 2004-09-29 | 2011-08-09 | Noregin Assets, N.V., L.L.C. | Compound lenses for multi-source data presentation |
US9015263B2 (en) | 2004-10-29 | 2015-04-21 | Go Daddy Operating Company, LLC | Domain name searching with reputation rating |
US20060168225A1 (en) * | 2004-10-29 | 2006-07-27 | John Gunning | Network and a distributed electronic commerce system using the network |
US20100070409A1 (en) * | 2004-11-19 | 2010-03-18 | Harrison Sarah E | Healthcare Card Incentive Program for Multiple Users |
US20070185799A1 (en) * | 2004-11-19 | 2007-08-09 | American Express Travel Related Services Company, Inc. | Spending Account Systems and Methods |
US20070185802A1 (en) * | 2004-11-19 | 2007-08-09 | American Express Travel Related Services Company, Inc. | Incentive Programs For Healthcare Cards |
US20070194108A1 (en) * | 2004-11-19 | 2007-08-23 | American Express Travel Related Services Company, Inc. | Assured Payments For Health Care Plans |
US7905399B2 (en) * | 2004-11-19 | 2011-03-15 | Barnes Brian T | Linking transaction cards with spending accounts |
US8327131B1 (en) * | 2004-11-29 | 2012-12-04 | Harris Corporation | Method and system to issue trust score certificates for networked devices using a trust scoring service |
US7733804B2 (en) | 2004-11-29 | 2010-06-08 | Signacert, Inc. | Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain |
US7487358B2 (en) * | 2004-11-29 | 2009-02-03 | Signacert, Inc. | Method to control access between network endpoints based on trust scores calculated from information system component analysis |
US9450966B2 (en) * | 2004-11-29 | 2016-09-20 | Kip Sign P1 Lp | Method and apparatus for lifecycle integrity verification of virtual machines |
US8266676B2 (en) * | 2004-11-29 | 2012-09-11 | Harris Corporation | Method to verify the integrity of components on a trusted platform using integrity database services |
US20060149800A1 (en) * | 2004-12-30 | 2006-07-06 | Daniel Egnor | Authoritative document identification |
US20060167913A1 (en) * | 2005-01-27 | 2006-07-27 | Microsoft Corporation | Converting an address to a hyperlink |
US9436945B2 (en) | 2005-02-01 | 2016-09-06 | Redfin Corporation | Interactive map-based search and advertising |
US7698442B1 (en) * | 2005-03-03 | 2010-04-13 | Voltage Security, Inc. | Server-based universal resource locator verification service |
US20060218151A1 (en) * | 2005-03-25 | 2006-09-28 | The Go Daddy Group, Inc. | Use of a database storing domain names and business operational areas |
US20060218114A1 (en) * | 2005-03-25 | 2006-09-28 | Microsoft Corporation | System and method for location based search |
US7580036B2 (en) | 2005-04-13 | 2009-08-25 | Catherine Montagnese | Detail-in-context terrain displacement algorithm with optimizations |
US7599916B2 (en) * | 2005-04-20 | 2009-10-06 | Microsoft Corporation | System and method for personalized search |
US20060247338A1 (en) * | 2005-05-02 | 2006-11-02 | General Electric Company | Poly(arylene ether) compositions with improved ultraviolet light stability, and related articles |
KR100642935B1 (en) * | 2005-05-06 | 2006-11-10 | (주)아이디스 | Name service system and method thereof |
JP4690785B2 (en) * | 2005-06-09 | 2011-06-01 | 株式会社リコー | Image forming apparatus and recording medium |
CA2613782A1 (en) | 2005-06-28 | 2007-01-04 | Metacarta, Inc. | User interface for geographic search |
US8086232B2 (en) * | 2005-06-28 | 2011-12-27 | Enterasys Networks, Inc. | Time synchronized wireless method and operations |
US20070028301A1 (en) * | 2005-07-01 | 2007-02-01 | Markmonitor Inc. | Enhanced fraud monitoring systems |
US7970626B2 (en) * | 2005-07-08 | 2011-06-28 | Oltine Acquistitions NY LLC | Facilitating payments to health care providers |
US8959084B2 (en) * | 2005-07-13 | 2015-02-17 | Google Inc. | Identifying locations |
US20070023507A1 (en) * | 2005-07-26 | 2007-02-01 | Microsoft Corporation | Contact data structure and management |
US20070043770A1 (en) * | 2005-08-22 | 2007-02-22 | Redfin | Discovery method for buyers, sellers of real estate |
US8265864B1 (en) * | 2005-09-12 | 2012-09-11 | Navteq B.V. | Method of providing geographic information for a navigation system |
WO2007030897A1 (en) * | 2005-09-17 | 2007-03-22 | Telezygology Inc. | Location sensitive documents |
US8031206B2 (en) | 2005-10-12 | 2011-10-04 | Noregin Assets N.V., L.L.C. | Method and system for generating pyramid fisheye lens detail-in-context presentations |
AU2006304414B2 (en) | 2005-10-17 | 2011-01-20 | Cfph, Llc | Products and processes for managing life instruments |
US20070226015A1 (en) * | 2005-10-17 | 2007-09-27 | Lutnick Howard W | Products and processes for processing information in a market for life instruments |
US20090119143A1 (en) * | 2005-10-17 | 2009-05-07 | Markmonitor Inc. | Brand notification systems and methods |
US8874489B2 (en) * | 2006-03-17 | 2014-10-28 | Fatdoor, Inc. | Short-term residential spaces in a geo-spatial environment |
US20070218900A1 (en) * | 2006-03-17 | 2007-09-20 | Raj Vasant Abhyanker | Map based neighborhood search and community contribution |
US9459622B2 (en) | 2007-01-12 | 2016-10-04 | Legalforce, Inc. | Driverless vehicle commerce network and community |
JP4449899B2 (en) * | 2005-12-28 | 2010-04-14 | ブラザー工業株式会社 | Management device and program |
US8185567B2 (en) * | 2006-01-02 | 2012-05-22 | Telecommunication Systems, Inc. | Location aware content using presence information data formation with location object (PIDF-LO) |
US8316429B2 (en) * | 2006-01-31 | 2012-11-20 | Blue Coat Systems, Inc. | Methods and systems for obtaining URL filtering information |
WO2007095224A2 (en) | 2006-02-10 | 2007-08-23 | Metacarta, Inc. | Systems and methods for spatial thumbnails and companion maps for media objects |
US8700902B2 (en) | 2006-02-13 | 2014-04-15 | At&T Intellectual Property I, L.P. | Methods and apparatus to certify digital signatures |
CA2541763A1 (en) * | 2006-02-15 | 2007-08-15 | Sharon Rossmark | Retail deployment model |
US8041648B2 (en) | 2006-02-15 | 2011-10-18 | Allstate Insurance Company | Retail location services |
US8219535B1 (en) | 2006-02-15 | 2012-07-10 | Allstate Insurance Company | Retail deployment model |
US8738639B1 (en) * | 2006-02-23 | 2014-05-27 | Verizon Data Services Llc | Methods and systems for an information directory providing audiovisual content |
US20070203849A1 (en) * | 2006-02-24 | 2007-08-30 | Microsoft Corporation | Endpoint verification using common attributes |
US20070226079A1 (en) * | 2006-03-08 | 2007-09-27 | Restaurant.Com, Inc. | Method and system for linking customers and vendors |
US9002754B2 (en) | 2006-03-17 | 2015-04-07 | Fatdoor, Inc. | Campaign in a geo-spatial environment |
US9064288B2 (en) | 2006-03-17 | 2015-06-23 | Fatdoor, Inc. | Government structures and neighborhood leads in a geo-spatial environment |
US9037516B2 (en) | 2006-03-17 | 2015-05-19 | Fatdoor, Inc. | Direct mailing in a geo-spatial environment |
US9373149B2 (en) | 2006-03-17 | 2016-06-21 | Fatdoor, Inc. | Autonomous neighborhood vehicle commerce network and community |
US8965409B2 (en) | 2006-03-17 | 2015-02-24 | Fatdoor, Inc. | User-generated community publication in an online neighborhood social network |
US9071367B2 (en) * | 2006-03-17 | 2015-06-30 | Fatdoor, Inc. | Emergency including crime broadcast in a neighborhood social network |
US9070101B2 (en) | 2007-01-12 | 2015-06-30 | Fatdoor, Inc. | Peer-to-peer neighborhood delivery multi-copter and method |
US9098545B2 (en) | 2007-07-10 | 2015-08-04 | Raj Abhyanker | Hot news neighborhood banter in a geo-spatial social network |
US20160247211A2 (en) * | 2006-03-30 | 2016-08-25 | Vidangel, Inc. | Apparatus, system, and method for remote media ownership management |
US7913192B2 (en) * | 2006-03-31 | 2011-03-22 | Research In Motion Limited | Methods and apparatus for retrieving and displaying map-related data for visually displayed maps of mobile communication devices |
US7983473B2 (en) | 2006-04-11 | 2011-07-19 | Noregin Assets, N.V., L.L.C. | Transparency adjustment of a presentation |
US20080010273A1 (en) | 2006-06-12 | 2008-01-10 | Metacarta, Inc. | Systems and methods for hierarchical organization and presentation of geographic search results |
US9721157B2 (en) | 2006-08-04 | 2017-08-01 | Nokia Technologies Oy | Systems and methods for obtaining and using information from map images |
US20080033944A1 (en) * | 2006-08-04 | 2008-02-07 | Metacarta, Inc. | Systems and methods for presenting results of geographic text searches |
US20080140348A1 (en) * | 2006-10-31 | 2008-06-12 | Metacarta, Inc. | Systems and methods for predictive models using geographic text search |
US8788294B2 (en) * | 2006-08-30 | 2014-07-22 | Cfph, Llc | Products and processes for indicating documents for a life based product |
US10068107B2 (en) * | 2006-10-18 | 2018-09-04 | Adobe Systems Incorporated | Method and system to maintain the integrity of a certified document while persisting state in a dynamic form |
US8863245B1 (en) | 2006-10-19 | 2014-10-14 | Fatdoor, Inc. | Nextdoor neighborhood social network method, apparatus, and system |
US20080120234A1 (en) * | 2006-11-17 | 2008-05-22 | American Express Travel Related Services Company, Inc. | Variable Revenue Sharing For Multiple Account Payment Instruments |
WO2009075689A2 (en) * | 2006-12-21 | 2009-06-18 | Metacarta, Inc. | Methods of systems of using geographic meta-metadata in information retrieval and document displays |
US9940345B2 (en) * | 2007-01-10 | 2018-04-10 | Norton Garfinkle | Software method for data storage and retrieval |
US20080177647A1 (en) * | 2007-01-19 | 2008-07-24 | Veenstra John W | Online Compliance Engine |
US20080183627A1 (en) * | 2007-01-29 | 2008-07-31 | American Express Travel Related Services Company, Inc. | Filtered healthcare payment card linked to tax-advantaged accounts |
US7693833B2 (en) * | 2007-02-01 | 2010-04-06 | John Nagle | System and method for improving integrity of internet search |
US7949543B2 (en) * | 2007-02-13 | 2011-05-24 | Oltine Acquisitions NY LLC | Methods, systems, and computer program products for promoting healthcare information technologies to card members |
US20080197188A1 (en) * | 2007-02-15 | 2008-08-21 | American Express Travel Related Services Company, Inc. | Transmission and capture of line-item-detail to assist in transaction substantiation and matching |
US20090006135A1 (en) * | 2007-06-26 | 2009-01-01 | American Express Travel Related Services Company, Inc. | Accelerated Payments for Health Care Plans |
US20090006251A1 (en) * | 2007-06-28 | 2009-01-01 | American Express Travel Related Services Company, Inc. | Universal rollover account |
US9026938B2 (en) | 2007-07-26 | 2015-05-05 | Noregin Assets N.V., L.L.C. | Dynamic detail-in-context user interface for application access and content access on electronic displays |
US8086622B2 (en) * | 2007-08-29 | 2011-12-27 | Enpulz, Llc | Search engine using world map with whois database search restrictions |
US8055671B2 (en) * | 2007-08-29 | 2011-11-08 | Enpulz, Llc | Search engine using world map with whois database search restriction |
US9058608B2 (en) | 2007-09-12 | 2015-06-16 | Google Inc. | Placement attribute targeting |
US20090100323A1 (en) * | 2007-10-10 | 2009-04-16 | 39 Degrees North, Llc | Link generator |
US9547870B1 (en) * | 2007-11-02 | 2017-01-17 | Fair Isaac Corporation | System and methods for selective advertising |
US20090125556A1 (en) * | 2007-11-10 | 2009-05-14 | Naroian Sandra M | Website for presenting videos related to homes for sale and other places of interest within a specified region |
US9172707B2 (en) * | 2007-12-19 | 2015-10-27 | Microsoft Technology Licensing, Llc | Reducing cross-site scripting attacks by segregating HTTP resources by subdomain |
US20090165116A1 (en) * | 2007-12-20 | 2009-06-25 | Morris Robert P | Methods And Systems For Providing A Trust Indicator Associated With Geospatial Information From A Network Entity |
US7937387B2 (en) * | 2008-02-01 | 2011-05-03 | Mandiant | System and method for data preservation and retrieval |
US7890530B2 (en) * | 2008-02-05 | 2011-02-15 | International Business Machines Corporation | Method and system for controlling access to data via a data-centric security model |
US8635701B2 (en) * | 2008-03-02 | 2014-01-21 | Yahoo! Inc. | Secure browser-based applications |
US8219423B2 (en) * | 2008-05-09 | 2012-07-10 | Cfph, Llc | Transferring insurance policies |
US8676001B2 (en) * | 2008-05-12 | 2014-03-18 | Google Inc. | Automatic discovery of popular landmarks |
US20100031041A1 (en) * | 2008-08-04 | 2010-02-04 | Postalguard Ltd. | Method and system for securing internet communication from hacking attacks |
US8180682B2 (en) * | 2008-10-01 | 2012-05-15 | International Business Machines Corporation | System and method for generating a view of and interacting with a purchase history |
US9356925B2 (en) * | 2008-10-31 | 2016-05-31 | GM Global Technology Operations LLC | Apparatus and method for providing location based security for communication with a remote device |
US20100138414A1 (en) * | 2008-12-01 | 2010-06-03 | Andrew Newman | Methods and systems for associative search |
US8396287B2 (en) | 2009-05-15 | 2013-03-12 | Google Inc. | Landmarks from digital photo collections |
US9069884B2 (en) * | 2009-09-08 | 2015-06-30 | International Business Machines Corporation | Processing special attributes within a file |
US20110083018A1 (en) * | 2009-10-06 | 2011-04-07 | Validity Sensors, Inc. | Secure User Authentication |
US10826885B2 (en) * | 2010-03-02 | 2020-11-03 | Liberty Plugins, Inc. | Digital certificate and reservation |
US9002926B2 (en) | 2011-04-22 | 2015-04-07 | Go Daddy Operating Company, LLC | Methods for suggesting domain names from a geographic location data |
US20130091421A1 (en) | 2011-10-11 | 2013-04-11 | International Business Machines Corporation | Time relevance within a soft copy document or media object |
US8880496B2 (en) * | 2011-12-18 | 2014-11-04 | Microsoft Corporation | Map-based selection of query component |
US20150154611A1 (en) * | 2012-01-05 | 2015-06-04 | Google Inc. | Detecting potentially false business listings based on government zoning information |
US20140074871A1 (en) * | 2012-09-07 | 2014-03-13 | Research In Motion Limited | Device, Method and Computer-Readable Medium For Recognizing Places |
US9858571B2 (en) | 2013-01-02 | 2018-01-02 | Mastercard International Incorporated | Methods and systems for mitigating fraud losses during a payment card transaction |
KR101418741B1 (en) * | 2013-01-16 | 2014-07-11 | 네이버비즈니스플랫폼 주식회사 | Method and apparatus for providing positional inforamtion using wifi information |
US20140250113A1 (en) * | 2013-03-04 | 2014-09-04 | International Business Machines Corporation | Geographic relevance within a soft copy document or media object |
US20140279176A1 (en) | 2013-03-15 | 2014-09-18 | Redfin Corporation | Provision of real-estate market information |
US20150082424A1 (en) * | 2013-09-19 | 2015-03-19 | Jayant Shukla | Active Web Content Whitelisting |
US9715694B2 (en) | 2013-10-10 | 2017-07-25 | Go Daddy Operating Company, LLC | System and method for website personalization from survey data |
US9684918B2 (en) | 2013-10-10 | 2017-06-20 | Go Daddy Operating Company, LLC | System and method for candidate domain name generation |
US9439367B2 (en) | 2014-02-07 | 2016-09-13 | Arthi Abhyanker | Network enabled gardening with a remotely controllable positioning extension |
JP6289606B2 (en) * | 2014-02-26 | 2018-03-07 | 三菱電機株式会社 | Certificate management apparatus and certificate management method |
US9457901B2 (en) | 2014-04-22 | 2016-10-04 | Fatdoor, Inc. | Quadcopter with a printable payload extension system and method |
US9004396B1 (en) | 2014-04-24 | 2015-04-14 | Fatdoor, Inc. | Skyteboard quadcopter and method |
KR101926584B1 (en) | 2014-04-29 | 2018-12-07 | 네이버비즈니스플랫폼 주식회사 | Method and apparatus for providing positional inforamtion using wifi information |
US9022324B1 (en) | 2014-05-05 | 2015-05-05 | Fatdoor, Inc. | Coordination of aerial vehicles through a central server |
US9971985B2 (en) | 2014-06-20 | 2018-05-15 | Raj Abhyanker | Train based community |
US9441981B2 (en) | 2014-06-20 | 2016-09-13 | Fatdoor, Inc. | Variable bus stops across a bus route in a regional transportation network |
US9451020B2 (en) | 2014-07-18 | 2016-09-20 | Legalforce, Inc. | Distributed communication of independent autonomous vehicles to provide redundancy and performance |
US9953105B1 (en) | 2014-10-01 | 2018-04-24 | Go Daddy Operating Company, LLC | System and method for creating subdomains or directories for a domain name |
US9275074B1 (en) * | 2014-10-03 | 2016-03-01 | Tip Vyspots, LLC Vy | Systems and methods for content placement, retrieval and management based on geolocation and other parameters |
US9785663B2 (en) | 2014-11-14 | 2017-10-10 | Go Daddy Operating Company, LLC | Verifying a correspondence address for a registrant |
US9779125B2 (en) | 2014-11-14 | 2017-10-03 | Go Daddy Operating Company, LLC | Ensuring accurate domain name contact information |
US10783560B2 (en) * | 2015-11-04 | 2020-09-22 | Adobe Inc. | Systems and techniques for configuring profile merge rules prior to determining segments of recipients of electronic communication |
US10484373B2 (en) | 2017-04-11 | 2019-11-19 | Mastercard International Incorporated | Systems and methods for biometric authentication of certificate signing request processing |
US10520948B2 (en) | 2017-05-12 | 2019-12-31 | Autonomy Squared Llc | Robot delivery method |
US11551233B1 (en) * | 2020-01-27 | 2023-01-10 | Pizza Hut Connect, LLC | System and method for governing execution of a geography dependent computer process |
US11372939B2 (en) * | 2020-08-03 | 2022-06-28 | Walmart Apollo, Llc | Systems and methods for clustered inventory management |
US12061594B2 (en) * | 2021-02-04 | 2024-08-13 | Google Llc | Verified entity attributes |
Citations (70)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4974170A (en) * | 1988-01-21 | 1990-11-27 | Directional Data, Inc. | Electronic directory for identifying a selected group of subscribers |
US5375235A (en) * | 1991-11-05 | 1994-12-20 | Northern Telecom Limited | Method of indexing keywords for searching in a database recorded on an information recording medium |
US5469354A (en) * | 1989-06-14 | 1995-11-21 | Hitachi, Ltd. | Document data processing method and apparatus for document retrieval |
US5546578A (en) * | 1991-04-25 | 1996-08-13 | Nippon Steel Corporation | Data base retrieval system utilizing stored vicinity feature values |
US5659617A (en) * | 1994-09-22 | 1997-08-19 | Fischer; Addison M. | Method for providing location certificates |
US5682525A (en) * | 1995-01-11 | 1997-10-28 | Civix Corporation | System and methods for remotely accessing a selected group of items of interest from a database |
US5685003A (en) * | 1992-12-23 | 1997-11-04 | Microsoft Corporation | Method and system for automatically indexing data in a document using a fresh index table |
US5748954A (en) * | 1995-06-05 | 1998-05-05 | Carnegie Mellon University | Method for searching a queued and ranked constructed catalog of files stored on a network |
US5787295A (en) * | 1993-02-03 | 1998-07-28 | Fujitsu Limited | Document processing apparatus |
US5787421A (en) * | 1995-01-12 | 1998-07-28 | International Business Machines Corporation | System and method for information retrieval by using keywords associated with a given set of data elements and the frequency of each keyword as determined by the number of data elements attached to each keyword |
US5799184A (en) * | 1990-10-05 | 1998-08-25 | Microsoft Corporation | System and method for identifying data records using solution bitmasks |
US5813006A (en) * | 1996-05-06 | 1998-09-22 | Banyan Systems, Inc. | On-line directory service with registration system |
US5832479A (en) * | 1992-12-08 | 1998-11-03 | Microsoft Corporation | Method for compressing full text indexes with document identifiers and location offsets |
US5839088A (en) * | 1996-08-22 | 1998-11-17 | Go2 Software, Inc. | Geographic location referencing system and method |
US5845273A (en) * | 1996-06-27 | 1998-12-01 | Microsoft Corporation | Method and apparatus for integrating multiple indexed files |
US5845305A (en) * | 1994-10-11 | 1998-12-01 | Fujitsu Limited | Index creating apparatus |
US5848410A (en) * | 1997-10-08 | 1998-12-08 | Hewlett Packard Company | System and method for selective and continuous index generation |
US5848409A (en) * | 1993-11-19 | 1998-12-08 | Smartpatents, Inc. | System, method and computer program product for maintaining group hits tables and document index tables for the purpose of searching through individual documents and groups of documents |
US5852810A (en) * | 1996-01-29 | 1998-12-22 | Student Housing Network | Geographic specific information search system and method |
US5884038A (en) * | 1997-05-02 | 1999-03-16 | Whowhere? Inc. | Method for providing an Internet protocol address with a domain name server |
US5890172A (en) * | 1996-10-08 | 1999-03-30 | Tenretni Dynamics, Inc. | Method and apparatus for retrieving data from a network using location identifiers |
US5924090A (en) * | 1997-05-01 | 1999-07-13 | Northern Light Technology Llc | Method and apparatus for searching a database of records |
US5930474A (en) * | 1996-01-31 | 1999-07-27 | Z Land Llc | Internet organizer for accessing geographically and topically based information |
US5944769A (en) * | 1996-11-08 | 1999-08-31 | Zip2 Corporation | Interactive network directory service with integrated maps and directions |
US5948061A (en) * | 1996-10-29 | 1999-09-07 | Double Click, Inc. | Method of delivery, targeting, and measuring advertising over networks |
US6029165A (en) * | 1997-11-12 | 2000-02-22 | Arthur Andersen Llp | Search and retrieval information system and method |
US6070157A (en) * | 1997-09-23 | 2000-05-30 | At&T Corporation | Method for providing more informative results in response to a search of electronic documents |
US6078914A (en) * | 1996-12-09 | 2000-06-20 | Open Text Corporation | Natural language meta-search system and method |
US6094649A (en) * | 1997-12-22 | 2000-07-25 | Partnet, Inc. | Keyword searches of structured databases |
US6182068B1 (en) * | 1997-08-01 | 2001-01-30 | Ask Jeeves, Inc. | Personalized search methods |
US6202065B1 (en) * | 1997-07-02 | 2001-03-13 | Travelocity.Com Lp | Information search and retrieval with geographical coordinates |
US6216130B1 (en) * | 1998-04-24 | 2001-04-10 | Ingeo Acquisitions, Inc. | Geographic-based information technology management system |
US20010011270A1 (en) * | 1998-10-28 | 2001-08-02 | Martin W. Himmelstein | Method and apparatus of expanding web searching capabilities |
US6275820B1 (en) * | 1998-07-16 | 2001-08-14 | Perot Systems Corporation | System and method for integrating search results from heterogeneous information resources |
US6295528B1 (en) * | 1998-11-30 | 2001-09-25 | Infospace, Inc. | Method and apparatus for converting a geographic location to a direct marketing area for a query |
US20010037332A1 (en) * | 2000-04-27 | 2001-11-01 | Todd Miller | Method and system for retrieving search results from multiple disparate databases |
US20010039592A1 (en) * | 2000-02-24 | 2001-11-08 | Carden Francis W. | Web address assignment process |
US6321158B1 (en) * | 1994-06-24 | 2001-11-20 | Delorme Publishing Company | Integrated routing/mapping information |
US6324645B1 (en) * | 1998-08-11 | 2001-11-27 | Verisign, Inc. | Risk management for public key management infrastructure using digital certificates |
US6324646B1 (en) * | 1998-09-11 | 2001-11-27 | International Business Machines Corporation | Method and system for securing confidential data in a computer network |
US20020029162A1 (en) * | 2000-06-30 | 2002-03-07 | Desmond Mascarenhas | System and method for using psychological significance pattern information for matching with target information |
US20020038348A1 (en) * | 2000-01-14 | 2002-03-28 | Malone Michael K. | Distributed globally accessible information network |
US20020062310A1 (en) * | 2000-09-18 | 2002-05-23 | Smart Peer Llc | Peer-to-peer commerce system |
US6434548B1 (en) * | 1999-12-07 | 2002-08-13 | International Business Machines Corporation | Distributed metadata searching system and method |
US20020152222A1 (en) * | 2000-11-15 | 2002-10-17 | Holbrook David M. | Apparatus and method for organizing and-or presenting data |
US20020156917A1 (en) * | 2001-01-11 | 2002-10-24 | Geosign Corporation | Method for providing an attribute bounded network of computers |
US6523021B1 (en) * | 2000-07-31 | 2003-02-18 | Microsoft Corporation | Business directory search engine |
US20030088562A1 (en) * | 2000-12-28 | 2003-05-08 | Craig Dillon | System and method for obtaining keyword descriptions of records from a large database |
US20030163466A1 (en) * | 1998-12-07 | 2003-08-28 | Anand Rajaraman | Method and system for generation of hierarchical search results |
US6665659B1 (en) * | 2000-02-01 | 2003-12-16 | James D. Logan | Methods and apparatus for distributing and using metadata via the internet |
US6677894B2 (en) * | 1998-04-28 | 2004-01-13 | Snaptrack, Inc | Method and apparatus for providing location-based information via a computer network |
US6691105B1 (en) * | 1996-05-10 | 2004-02-10 | America Online, Inc. | System and method for geographically organizing and classifying businesses on the world-wide web |
US6707421B1 (en) * | 1997-08-19 | 2004-03-16 | Siemens Vdo Automotive Corporation | Driver information system |
US6732141B2 (en) * | 1996-11-29 | 2004-05-04 | Frampton Erroll Ellis | Commercial distributed processing by personal computers over the internet |
US6735585B1 (en) * | 1998-08-17 | 2004-05-11 | Altavista Company | Method for search engine generating supplemented search not included in conventional search result identifying entity data related to portion of located web page |
US6757730B1 (en) * | 2000-05-31 | 2004-06-29 | Datasynapse, Inc. | Method, apparatus and articles-of-manufacture for network-based distributed computing |
US6775831B1 (en) * | 2000-02-11 | 2004-08-10 | Overture Services, Inc. | System and method for rapid completion of data processing tasks distributed on a network |
US20040260677A1 (en) * | 2003-06-17 | 2004-12-23 | Radhika Malpani | Search query categorization for business listings search |
US20050120006A1 (en) * | 2003-05-30 | 2005-06-02 | Geosign Corporation | Systems and methods for enhancing web-based searching |
US20050149507A1 (en) * | 2003-02-05 | 2005-07-07 | Nye Timothy G. | Systems and methods for identifying an internet resource address |
US6963897B1 (en) * | 2000-03-30 | 2005-11-08 | United Devices, Inc. | Customer services and advertising based upon device attributes and associated distributed processing system |
US6976053B1 (en) * | 1999-10-14 | 2005-12-13 | Arcessa, Inc. | Method for using agents to create a computer index corresponding to the contents of networked computers |
US20060026152A1 (en) * | 2004-07-13 | 2006-02-02 | Microsoft Corporation | Query-based snippet clustering for search result grouping |
US7089301B1 (en) * | 2000-08-11 | 2006-08-08 | Napster, Inc. | System and method for searching peer-to-peer computer networks by selecting a computer based on at least a number of files shared by the computer |
US7124148B2 (en) * | 2003-07-31 | 2006-10-17 | Sap Aktiengesellschaft | User-friendly search results display system, method, and computer program product |
US7233942B2 (en) * | 2000-10-10 | 2007-06-19 | Truelocal Inc. | Method and apparatus for providing geographically authenticated electronic documents |
US20070156677A1 (en) * | 1999-07-21 | 2007-07-05 | Alberti Anemometer Llc | Database access system |
US20070282660A1 (en) * | 2006-06-01 | 2007-12-06 | Peter Forth | Task management systems and methods |
US7376640B1 (en) * | 2000-11-14 | 2008-05-20 | At&T Delaware Intellectual Property, Inc. | Method and system for searching an information retrieval system according to user-specified location information |
US7493565B2 (en) * | 2000-12-22 | 2009-02-17 | Microsoft Corporation | Environment-interactive context-aware devices and methods |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ATE316730T1 (en) | 1998-11-02 | 2006-02-15 | Airbiquity Inc | GEO-SPATIAL ADDRESSING TO THE INTERNET PROTOCOL |
-
2003
- 2003-07-15 US US10/620,170 patent/US7233942B2/en not_active Expired - Fee Related
-
2007
- 2007-05-04 US US11/800,284 patent/US7447685B2/en not_active Expired - Fee Related
-
2008
- 2008-09-22 US US12/235,434 patent/US20090070290A1/en not_active Abandoned
Patent Citations (75)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4974170A (en) * | 1988-01-21 | 1990-11-27 | Directional Data, Inc. | Electronic directory for identifying a selected group of subscribers |
US5469354A (en) * | 1989-06-14 | 1995-11-21 | Hitachi, Ltd. | Document data processing method and apparatus for document retrieval |
US5799184A (en) * | 1990-10-05 | 1998-08-25 | Microsoft Corporation | System and method for identifying data records using solution bitmasks |
US5546578A (en) * | 1991-04-25 | 1996-08-13 | Nippon Steel Corporation | Data base retrieval system utilizing stored vicinity feature values |
US5375235A (en) * | 1991-11-05 | 1994-12-20 | Northern Telecom Limited | Method of indexing keywords for searching in a database recorded on an information recording medium |
US5832479A (en) * | 1992-12-08 | 1998-11-03 | Microsoft Corporation | Method for compressing full text indexes with document identifiers and location offsets |
US5685003A (en) * | 1992-12-23 | 1997-11-04 | Microsoft Corporation | Method and system for automatically indexing data in a document using a fresh index table |
US5787295A (en) * | 1993-02-03 | 1998-07-28 | Fujitsu Limited | Document processing apparatus |
US5848409A (en) * | 1993-11-19 | 1998-12-08 | Smartpatents, Inc. | System, method and computer program product for maintaining group hits tables and document index tables for the purpose of searching through individual documents and groups of documents |
US6321158B1 (en) * | 1994-06-24 | 2001-11-20 | Delorme Publishing Company | Integrated routing/mapping information |
US5659617A (en) * | 1994-09-22 | 1997-08-19 | Fischer; Addison M. | Method for providing location certificates |
US5845305A (en) * | 1994-10-11 | 1998-12-01 | Fujitsu Limited | Index creating apparatus |
US5682525A (en) * | 1995-01-11 | 1997-10-28 | Civix Corporation | System and methods for remotely accessing a selected group of items of interest from a database |
US5787421A (en) * | 1995-01-12 | 1998-07-28 | International Business Machines Corporation | System and method for information retrieval by using keywords associated with a given set of data elements and the frequency of each keyword as determined by the number of data elements attached to each keyword |
US5748954A (en) * | 1995-06-05 | 1998-05-05 | Carnegie Mellon University | Method for searching a queued and ranked constructed catalog of files stored on a network |
US5852810A (en) * | 1996-01-29 | 1998-12-22 | Student Housing Network | Geographic specific information search system and method |
US5930474A (en) * | 1996-01-31 | 1999-07-27 | Z Land Llc | Internet organizer for accessing geographically and topically based information |
US5813006A (en) * | 1996-05-06 | 1998-09-22 | Banyan Systems, Inc. | On-line directory service with registration system |
US6691105B1 (en) * | 1996-05-10 | 2004-02-10 | America Online, Inc. | System and method for geographically organizing and classifying businesses on the world-wide web |
US5845273A (en) * | 1996-06-27 | 1998-12-01 | Microsoft Corporation | Method and apparatus for integrating multiple indexed files |
US5839088A (en) * | 1996-08-22 | 1998-11-17 | Go2 Software, Inc. | Geographic location referencing system and method |
US5890172A (en) * | 1996-10-08 | 1999-03-30 | Tenretni Dynamics, Inc. | Method and apparatus for retrieving data from a network using location identifiers |
US5948061A (en) * | 1996-10-29 | 1999-09-07 | Double Click, Inc. | Method of delivery, targeting, and measuring advertising over networks |
US5944769A (en) * | 1996-11-08 | 1999-08-31 | Zip2 Corporation | Interactive network directory service with integrated maps and directions |
US6732141B2 (en) * | 1996-11-29 | 2004-05-04 | Frampton Erroll Ellis | Commercial distributed processing by personal computers over the internet |
US6078914A (en) * | 1996-12-09 | 2000-06-20 | Open Text Corporation | Natural language meta-search system and method |
US5924090A (en) * | 1997-05-01 | 1999-07-13 | Northern Light Technology Llc | Method and apparatus for searching a database of records |
US5884038A (en) * | 1997-05-02 | 1999-03-16 | Whowhere? Inc. | Method for providing an Internet protocol address with a domain name server |
US6202065B1 (en) * | 1997-07-02 | 2001-03-13 | Travelocity.Com Lp | Information search and retrieval with geographical coordinates |
US6182068B1 (en) * | 1997-08-01 | 2001-01-30 | Ask Jeeves, Inc. | Personalized search methods |
US6707421B1 (en) * | 1997-08-19 | 2004-03-16 | Siemens Vdo Automotive Corporation | Driver information system |
US6070157A (en) * | 1997-09-23 | 2000-05-30 | At&T Corporation | Method for providing more informative results in response to a search of electronic documents |
US5848410A (en) * | 1997-10-08 | 1998-12-08 | Hewlett Packard Company | System and method for selective and continuous index generation |
US6029165A (en) * | 1997-11-12 | 2000-02-22 | Arthur Andersen Llp | Search and retrieval information system and method |
US6094649A (en) * | 1997-12-22 | 2000-07-25 | Partnet, Inc. | Keyword searches of structured databases |
US6216130B1 (en) * | 1998-04-24 | 2001-04-10 | Ingeo Acquisitions, Inc. | Geographic-based information technology management system |
US6677894B2 (en) * | 1998-04-28 | 2004-01-13 | Snaptrack, Inc | Method and apparatus for providing location-based information via a computer network |
US6275820B1 (en) * | 1998-07-16 | 2001-08-14 | Perot Systems Corporation | System and method for integrating search results from heterogeneous information resources |
US6324645B1 (en) * | 1998-08-11 | 2001-11-27 | Verisign, Inc. | Risk management for public key management infrastructure using digital certificates |
US6735585B1 (en) * | 1998-08-17 | 2004-05-11 | Altavista Company | Method for search engine generating supplemented search not included in conventional search result identifying entity data related to portion of located web page |
US6324646B1 (en) * | 1998-09-11 | 2001-11-27 | International Business Machines Corporation | Method and system for securing confidential data in a computer network |
US20010011270A1 (en) * | 1998-10-28 | 2001-08-02 | Martin W. Himmelstein | Method and apparatus of expanding web searching capabilities |
US6295528B1 (en) * | 1998-11-30 | 2001-09-25 | Infospace, Inc. | Method and apparatus for converting a geographic location to a direct marketing area for a query |
US20030163466A1 (en) * | 1998-12-07 | 2003-08-28 | Anand Rajaraman | Method and system for generation of hierarchical search results |
US20070156677A1 (en) * | 1999-07-21 | 2007-07-05 | Alberti Anemometer Llc | Database access system |
US6976053B1 (en) * | 1999-10-14 | 2005-12-13 | Arcessa, Inc. | Method for using agents to create a computer index corresponding to the contents of networked computers |
US6434548B1 (en) * | 1999-12-07 | 2002-08-13 | International Business Machines Corporation | Distributed metadata searching system and method |
US20020038348A1 (en) * | 2000-01-14 | 2002-03-28 | Malone Michael K. | Distributed globally accessible information network |
US6665659B1 (en) * | 2000-02-01 | 2003-12-16 | James D. Logan | Methods and apparatus for distributing and using metadata via the internet |
US6775831B1 (en) * | 2000-02-11 | 2004-08-10 | Overture Services, Inc. | System and method for rapid completion of data processing tasks distributed on a network |
US20010039592A1 (en) * | 2000-02-24 | 2001-11-08 | Carden Francis W. | Web address assignment process |
US6963897B1 (en) * | 2000-03-30 | 2005-11-08 | United Devices, Inc. | Customer services and advertising based upon device attributes and associated distributed processing system |
US20010037332A1 (en) * | 2000-04-27 | 2001-11-01 | Todd Miller | Method and system for retrieving search results from multiple disparate databases |
US6757730B1 (en) * | 2000-05-31 | 2004-06-29 | Datasynapse, Inc. | Method, apparatus and articles-of-manufacture for network-based distributed computing |
US20020029162A1 (en) * | 2000-06-30 | 2002-03-07 | Desmond Mascarenhas | System and method for using psychological significance pattern information for matching with target information |
US6523021B1 (en) * | 2000-07-31 | 2003-02-18 | Microsoft Corporation | Business directory search engine |
US7089301B1 (en) * | 2000-08-11 | 2006-08-08 | Napster, Inc. | System and method for searching peer-to-peer computer networks by selecting a computer based on at least a number of files shared by the computer |
US20020062310A1 (en) * | 2000-09-18 | 2002-05-23 | Smart Peer Llc | Peer-to-peer commerce system |
US7447685B2 (en) * | 2000-10-10 | 2008-11-04 | Truelocal Inc. | Method and apparatus for providing geographically authenticated electronic documents |
US7233942B2 (en) * | 2000-10-10 | 2007-06-19 | Truelocal Inc. | Method and apparatus for providing geographically authenticated electronic documents |
US20070208740A1 (en) * | 2000-10-10 | 2007-09-06 | Truelocal Inc. | Method and apparatus for providing geographically authenticated electronic documents |
US7376640B1 (en) * | 2000-11-14 | 2008-05-20 | At&T Delaware Intellectual Property, Inc. | Method and system for searching an information retrieval system according to user-specified location information |
US20020152222A1 (en) * | 2000-11-15 | 2002-10-17 | Holbrook David M. | Apparatus and method for organizing and-or presenting data |
US7493565B2 (en) * | 2000-12-22 | 2009-02-17 | Microsoft Corporation | Environment-interactive context-aware devices and methods |
US20030088562A1 (en) * | 2000-12-28 | 2003-05-08 | Craig Dillon | System and method for obtaining keyword descriptions of records from a large database |
US20020156917A1 (en) * | 2001-01-11 | 2002-10-24 | Geosign Corporation | Method for providing an attribute bounded network of computers |
US7685224B2 (en) * | 2001-01-11 | 2010-03-23 | Truelocal Inc. | Method for providing an attribute bounded network of computers |
US20050149507A1 (en) * | 2003-02-05 | 2005-07-07 | Nye Timothy G. | Systems and methods for identifying an internet resource address |
US7613687B2 (en) * | 2003-05-30 | 2009-11-03 | Truelocal Inc. | Systems and methods for enhancing web-based searching |
US20100082590A1 (en) * | 2003-05-30 | 2010-04-01 | Nye Timothy G | Systems and Methods for Enhancing Web-Based Searching |
US20050120006A1 (en) * | 2003-05-30 | 2005-06-02 | Geosign Corporation | Systems and methods for enhancing web-based searching |
US20040260677A1 (en) * | 2003-06-17 | 2004-12-23 | Radhika Malpani | Search query categorization for business listings search |
US7124148B2 (en) * | 2003-07-31 | 2006-10-17 | Sap Aktiengesellschaft | User-friendly search results display system, method, and computer program product |
US20060026152A1 (en) * | 2004-07-13 | 2006-02-02 | Microsoft Corporation | Query-based snippet clustering for search result grouping |
US20070282660A1 (en) * | 2006-06-01 | 2007-12-06 | Peter Forth | Task management systems and methods |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9043331B2 (en) | 1996-05-10 | 2015-05-26 | Facebook, Inc. | System and method for indexing documents on the world-wide web |
US7664767B2 (en) * | 1996-05-10 | 2010-02-16 | Aol Llc | System and method for geographically organizing and classifying businesses on the world-wide web |
US20100114904A1 (en) * | 1996-05-10 | 2010-05-06 | Aol Inc. | System and method for geographically organizing and classifying businesses on the world-wide web |
US9183300B2 (en) | 1996-05-10 | 2015-11-10 | Facebook, Inc. | System and method for geographically classifying business on the world-wide web |
US20080177733A1 (en) * | 1996-05-10 | 2008-07-24 | Aol Llc | System and method for geographically organizing and classifying businesses on the world-wide web |
US9075881B2 (en) | 1996-05-10 | 2015-07-07 | Facebook, Inc. | System and method for identifying the owner of a document on the world-wide web |
US8938455B2 (en) | 1996-05-10 | 2015-01-20 | Facebook, Inc. | System and method for determining a homepage on the world-wide web |
US8954442B2 (en) | 1996-05-10 | 2015-02-10 | Facebook, Inc. | System and method for classifying an electronic document |
US8949256B2 (en) | 1996-05-10 | 2015-02-03 | Facebook, Inc. | System and method for identifying an owner of a web page on the World-Wide Web |
US8768912B2 (en) | 1996-05-10 | 2014-07-01 | Facebook, Inc. | System and method for geographically organizing and classifying businesses on the world-wide web |
US20100082590A1 (en) * | 2003-05-30 | 2010-04-01 | Nye Timothy G | Systems and Methods for Enhancing Web-Based Searching |
US20090235071A1 (en) * | 2008-03-13 | 2009-09-17 | Gm Global Technology Operations, Inc. | Certificate assignment strategies for efficient operation of the pki-based security architecture in a vehicular network |
US8090949B2 (en) * | 2008-03-13 | 2012-01-03 | GM Global Technology Operations LLC | Certificate assignment strategies for efficient operation of the PKI-based security architecture in a vehicular network |
US20100299166A1 (en) * | 2009-05-19 | 2010-11-25 | Microsoft Corporation | Generating relevant keywords for monetization in an electronic map environment |
US8095656B2 (en) * | 2009-11-16 | 2012-01-10 | International Business Machines Corportion | Geo-positionally based data access security |
US20110119379A1 (en) * | 2009-11-16 | 2011-05-19 | International Business Machines Corporation | Geo-positionally based data access security |
US20110131204A1 (en) * | 2009-12-02 | 2011-06-02 | International Business Machines Corporation | Deriving Asset Popularity by Number of Launches |
US11232402B2 (en) | 2010-02-26 | 2022-01-25 | 3M Innovative Properties Company | Clinical data reconciliation as part of a report generation solution |
US11922373B2 (en) | 2010-02-26 | 2024-03-05 | 3M Innovative Properties Company | Clinical data reconciliation as part of a report generation solution |
US8489560B1 (en) * | 2010-09-08 | 2013-07-16 | Conductor, Inc. | System and method for facilitating the management of keyword/universal resource locator (URL) data |
US8265871B1 (en) * | 2011-03-31 | 2012-09-11 | Google Inc. | Mobile record information entry and geotagging |
US9152716B1 (en) * | 2012-12-31 | 2015-10-06 | Emc Corporation | Techniques for verifying search results over a distributed collection |
US11831785B2 (en) * | 2015-06-16 | 2023-11-28 | Vellitas Llc | Systems and methods for digital certificate security |
US10771260B2 (en) * | 2015-06-16 | 2020-09-08 | Vellitas Llc | Systems and methods for digital certificate security |
US20240089121A1 (en) * | 2015-06-16 | 2024-03-14 | Vellitas Llc | Systems and methods for digital certificate security |
US20160373262A1 (en) * | 2015-06-16 | 2016-12-22 | Vellitas Llc | Systems and methods for digital certificate security |
US11444786B2 (en) * | 2015-06-16 | 2022-09-13 | Vellitas Llc | Systems and methods for digital certificate security |
US20230028382A1 (en) * | 2015-06-16 | 2023-01-26 | Vellitas Llc | Systems and Methods for Digital Certificate Security |
US11043306B2 (en) | 2017-01-17 | 2021-06-22 | 3M Innovative Properties Company | Methods and systems for manifestation and transmission of follow-up notifications |
US11699531B2 (en) | 2017-01-17 | 2023-07-11 | 3M Innovative Properties Company | Methods and systems for manifestation and transmission of follow-up notifications |
US11282596B2 (en) | 2017-11-22 | 2022-03-22 | 3M Innovative Properties Company | Automated code feedback system |
US12131810B2 (en) | 2017-11-22 | 2024-10-29 | Solventum Intellectual Properties Company | Automated code feedback system |
US20220158997A1 (en) * | 2020-11-18 | 2022-05-19 | Evrythng Ltd | End-to-End Product Authentication Technique |
WO2022108886A1 (en) * | 2020-11-18 | 2022-05-27 | Evrythng Ltd. | End-to end product authentication technique |
US20220158996A1 (en) * | 2020-11-18 | 2022-05-19 | Evrythng Ltd | End-to-End Product Authentication Technique |
US20220156753A1 (en) * | 2020-11-18 | 2022-05-19 | Evrythng Ltd | End-to-End Product Authentication Technique |
Also Published As
Publication number | Publication date |
---|---|
US7447685B2 (en) | 2008-11-04 |
US7233942B2 (en) | 2007-06-19 |
US20040064334A1 (en) | 2004-04-01 |
US20070208740A1 (en) | 2007-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7447685B2 (en) | Method and apparatus for providing geographically authenticated electronic documents | |
US7620725B2 (en) | Metadata collection within a trusted relationship to increase search relevance | |
US20200151232A1 (en) | Enhanced seller-oriented search results | |
US9396173B2 (en) | Automatic website generator | |
US8712861B2 (en) | Methods and systems for delivering customized advertisements | |
US7092912B2 (en) | Security for uniquely generated electronic seals of certification | |
KR101037144B1 (en) | Enhanced search results | |
US7702521B2 (en) | Method for users of a network to provide other users with access to link relationships between documents | |
US20030131006A1 (en) | Method and system for communicating selected search results between first and second users over a network | |
US8515821B2 (en) | Online system and method for locating and referring an automobile dealer to customers | |
WO2006021088A1 (en) | Opt-in directory of verified individual profiles | |
US20020152134A1 (en) | System and method for protecting internet consumers and for certifying, identifying, segregating and locating traditional "brick and mortar" merchant businesses on the internet | |
WO2005057363A2 (en) | Method of and system for providing an online marketplace having global reach and local focus | |
US20030120614A1 (en) | Automated e-commerce authentication method and system | |
JP2005122606A (en) | Information-reading device, information-reading system and information reading program | |
KR20010103230A (en) | System and Method of Searching and Registering Domain Name | |
US20010054015A1 (en) | Method for facilitating the exchange of information over a computer network | |
JP2002157366A (en) | System for checking home page pretension using internet and method for the same | |
KR100489209B1 (en) | information system for starting business | |
JP2008077504A (en) | Application processor and application processing program | |
JP2002149953A (en) | Supporting method for customer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: GEOSIGN CORPORATION, CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NYE, TIMOTHY G.;REEL/FRAME:021945/0469 Effective date: 20010326 |
|
AS | Assignment |
Owner name: TRUELOCAL INC., CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GEOSIGN CORPORATION;REEL/FRAME:021946/0396 Effective date: 20051231 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |