US20210392139A1 - System, Method and Apparatus for Increasing Website Relevance While Protecting Privacy - Google Patents
System, Method and Apparatus for Increasing Website Relevance While Protecting Privacy Download PDFInfo
- Publication number
- US20210392139A1 US20210392139A1 US17/461,812 US202117461812A US2021392139A1 US 20210392139 A1 US20210392139 A1 US 20210392139A1 US 202117461812 A US202117461812 A US 202117461812A US 2021392139 A1 US2021392139 A1 US 2021392139A1
- Authority
- US
- United States
- Prior art keywords
- visitor
- content provider
- token
- content
- recited
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 230000001965 increasing effect Effects 0.000 title claims abstract description 17
- 238000013500 data storage Methods 0.000 claims abstract description 28
- 235000014510 cooky Nutrition 0.000 claims description 13
- 230000003542 behavioural effect Effects 0.000 claims description 9
- 238000003860 storage Methods 0.000 claims description 3
- 238000004590 computer program Methods 0.000 claims 2
- 238000013475 authorization Methods 0.000 description 14
- 230000008859 change Effects 0.000 description 6
- 238000012790 confirmation Methods 0.000 description 6
- 230000000694 effects Effects 0.000 description 5
- 238000013474 audit trail Methods 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 238000012552 review Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 235000013334 alcoholic beverage Nutrition 0.000 description 2
- 230000033228 biological regulation Effects 0.000 description 2
- 239000003086 colorant Substances 0.000 description 2
- 230000001276 controlling effect Effects 0.000 description 2
- 230000003247 decreasing effect Effects 0.000 description 2
- 239000002245 particle Substances 0.000 description 2
- 230000008439 repair process Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 239000002699 waste material Substances 0.000 description 2
- 206010001488 Aggression Diseases 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000007634 remodeling Methods 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
Definitions
- the present invention relates generally to the field of computerized information retrieval and, more particularly, to a system, method and apparatus for electronically making Content on the Internet more Relevant.
- the World Wide Web has become a major force for both individuals and business. But there are problems for both Visitors (any person or businesses visiting a Website) and the businesses behind a Website (any business using the World Wide Web to offer products or services).
- CRM Customer Relationship Management
- Consequences will include:
- Websites cannot protect Visitors is that personal information must travel from Visitors' devices, through the Web, to the Websites.
- Personal information is managed by millions of hardware components and millions of lines of code written by thousands of people from dozens of companies. No Website wants to assume the liability for all of this.
- the present invention increases Visitor Privacy and Website Relevance by turning conventional wisdom upside down with this: the less a business knows about a person, the better that business can serve that person. It is based on the fact that what a person wants has nothing to do with who that person is. Identity is only needed by a Website at the end of a transaction—for payment, delivery, and support. Until then, Visitors use the present invention to disclose their “Anonymous Unfulfilled Demand” (AUD) in a trusted, anonymous environment so that a Website can Customize Content/Ads to make it more Relevant for the benefit of all parties. This trust is further enhanced with a private, controlled Messaging system between Visitors and Websites.
- AUD Anonymous Unfulfilled Demand
- the present invention provides a computerized method for increasing relevance of a content provided to a visitor by a content provider by providing one or more server computers and at least one data storage communicably coupled to the one or more server computers, receiving at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, determining whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and sending at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- the present invention provides an apparatus for increasing relevance of a content provided to a visitor by a content provider that includes one or more server computers, and at least one data storage communicably coupled to the one or more server computers.
- the one or more server computers (a) receive at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, (b) determine whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and (c) send at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- the present invention also provides a system for increasing relevance of a content provided to a visitor by a content provider that includes a network, one or more visitor devices communicably coupled to the network, one or more content provider devices communicably coupled to the network, one or more server computers communicably coupled to the network and at least one data storage communicably coupled to the one or more server computers.
- the one or more server computers (a) receive at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, (b) determine whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and (c) send at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- the present invention provides a non-transitory computer readable medium for increasing relevance of a content provided to a visitor by a content provider
- program instructions when executed by a processor causes the processor to perform the steps of receiving at least a portion of a visitor token and at least a portion of a content provider token at the processor from a content provider device; determining whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in at least one data storage communicably coupled to the processor; and sending at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- FIG. 1 is a screenshot of a typical Website showing irrelevant Content (a popup Ad) in accordance with the prior art
- FIG. 2 is a flowchart that illustrates a Visitor Registration in accordance with one embodiment of the present invention
- FIG. 3 is a flowchart that illustrates a Website Registration in accordance with one embodiment of the present invention
- FIG. 4 is a flowchart that illustrates enabling Visitor Privacy and Website Relevance in accordance with one embodiment of the present invention
- FIG. 5 is a flowchart that illustrates a Secure Server increasing Website Relevance in accordance with one embodiment of the present invention
- FIG. 6 is a Customized Seal in accordance with one embodiment of the present invention.
- FIG. 7 is three Customized Seals in accordance with one embodiment of the present invention.
- FIG. 8 is a flowchart that illustrates how a Secure Server calculates a Website's Privacy Score in accordance with one embodiment of the present invention
- FIG. 9 is a flowchart that illustrates a Website establishing a Dialogue with a Visitor in accordance with one embodiment of the present invention.
- FIG. 10 is a flowchart that illustrates a Visitor establishing a Dialogue with a Website in accordance with one embodiment of the present invention
- FIG. 11 is a flowchart that illustrates a Visitor updating Preferences in accordance with one embodiment of the present invention.
- FIG. 12 is a screenshot of Requested Categories of interest in accordance with one embodiment of the present invention.
- FIG. 13 is a screenshot of Requested Category Attributes of interest in accordance with one embodiment of the present invention.
- FIG. 14 is a screenshot of Requested Category Attributes of interest from another system in accordance with one embodiment of the present invention.
- FIG. 15 is a flowchart that illustrates a Website updating Preferences in accordance with one embodiment of the present invention.
- FIG. 16 is a screenshot of a Search Engine result in accordance with one embodiment of the present invention.
- FIG. 17 is a screenshot of a Search Engine result in accordance with one embodiment of the present invention.
- FIG. 18 is bar representations in accordance with one embodiment of the present invention.
- FIG. 19 is a screenshot of a Search Engine result in accordance with one embodiment of the present invention.
- FIG. 20 is a flowchart that illustrates Search Engine processing in accordance with one embodiment of the present invention.
- the present invention gives consumers that trust and control for the benefit of all parties. Visitors Register and enter their “Anonymous Unfulfilled Demand” (AUD) for the products, services, relationships, etc. that they want. This is in the form of Requested Categories of interest and Requested Category Attributes of interest, and is used by a Website to make Content/Ads more Relevant.
- AUD onymous Unfulfilled Demand
- the present invention protects Visitors:
- the present invention protects Websites:
- the AUD is stored on a Secure Server without any associated personal information about the Visitor to whom it belongs. While this data is secured using standard security methods, the theft or misuse of this AUD cannot identify or hurt the Visitor because his or her identity is unknown.
- the AUD is now ready to be shared with a Website to increase Visitor Privacy and Website Relevance.
- a Visitor uses a Browser to Register on the Secure Server 202 so that he or she can enter their AUD.
- the Secure Server 202 adds a Visitor record in its central database in block 216 . Note that no personal information is requested or required.
- the Secure Server 202 also creates a globally unique Token in block 216 that is placed on the Visitor's device, such as a cookie on a personal computer, to be later used by a Website or the Secure Server 202 .
- This Token does not contain any personal information.
- a Website Administrator or Representative uses a Browser to Register on the Secure Server 202 so that the Website can access Visitor AUD.
- the Secure Server 202 adds a Website record in its central database in block 314 . Note that no personal information is requested or necessarily required.
- the Secure Server 202 also creates a globally unique Token for the Website in block 314 , such as a digital certificate. In one embodiment, this is later used by the Website to be authorized by the Secure Server 202 .
- Visitor and Website are now ready to improve Visitor Privacy and Website Relevance.
- a Registered Visitor uses a Browser 402 to visit a Registered Website 404 in block 406 :
- the Website 404 sends the Visitor and Website Tokens to the Secure Server 202 in block 408 .
- the Secure Server 202 performs the following:
- the Website 404 prepares its Regular Content/Ads in block 518 .
- the Website 404 performs the following:
- the Regular Content or Relevant Content/Ads with Seal are displayed on the Visitor Browser (see arrow 428 in FIG. 4 ).
- the present invention has made its Content/Ads Relevant to the Visitor while at the same time protecting that Visitor's Privacy.
- the Secure Server 202 creates a Customized Seal (e.g., Seals 700 , 702 , 704 in FIG. 7 , etc.) for a Website 404 :
- a Customized Seal e.g., Seals 700 , 702 , 704 in FIG. 7 , etc.
- Secure Server 202 uses the Website's Privacy Score to prepare a Custom Seal (e.g., Seals 700 , 702 , 704 in FIG. 7 , etc.) for this Website 404 in block 502 .
- a Custom Seal e.g., Seals 700 , 702 , 704 in FIG. 7 , etc.
- this Seal may include different colors and/or an additional diagonal line to accent acceptable and unacceptable Website Privacy Scores. Other designs, colors or indicia can be used.
- the Secure Server 202 displays a separate screen showing details about how the Website Privacy Score was calculated so that Visitors can make informed decisions about whether or not to trust this Website 404 or Search Engine result (see e.g., FIGS. 16-20 ).
- the decision to receive a Message is controlled not by the sending party but by the receiving party.
- a Message is like a “baton” that is passed from the sender to the receiver.
- the receiver continues the Dialogue by returning that baton, and ends the Dialogue by doing nothing with it.
- the baton goes back and forth until one party does not return it. This protects both Visitors and Websites.
- the Website wants to send a Message to a Visitor.
- Reasons for this may include:
- the Website 404 Contacts the Visitor through the Secure Server 202 :
- the Visitor's Website-to-Visitor Counter for this Website 404 is reset to the number of consecutive unanswered Messages permitted by this Website 404 to this Visitor.
- a Visitor may prefer the control of using the present invention to establish a Dialogue with a Website. He or she uses a Browser 402 to Contact the Website 404 by visiting the Secure Server 202 :
- the Website's Visitor-to-Website Counter for this Visitor is reset to the number of consecutive unanswered Messages permitted by this Visitor to this Website.
- an Authorized Visitor uses a Browser 402 to review and/or change the following Visitor information/preferences on the Secure Server 202 :
- an Authorized Website Administrator or Representative uses a Browser 1502 to review and/or change the following Website information/preferences on the Secure Server 202 :
- the Authorized Website Administrator or Representative uses the Browser 1502 to review and/or change the Website information/preferences on the Secure Server 202 as follows:
- the present invention further warns Visitors about Websites that do not respect their Privacy.
- a Visitor Browser 402 plug-in retrieves a Website's Privacy Score from the Secure Server 202 and displays it in a Search Engine result as a Customized Seal (e.g., 700 ) so that Visitors are warned before that Website is selected.
- Customized Seal e.g. 700
- These Privacy Score requests are stored on the Secure Server Log File so that Websites can measure Search Engine click through rates.
- the four websites could have Privacy Scores of 95%, 45%, 86% and 68% (these scores are for illustration purposes and do not represent actual scores for the websites shown).
- the plug-in displays a red “?” Score for Websites that are not using the present invention and do not have a Website Privacy Score.
- the Visitor's plug-in filters out results when a Website's Privacy Score is below a Visitor's Minimum Privacy Score.
- the website having a Privacy Score of 45% was filtered; whereas, the websites having Privacy Scores of 95%, 86% and 68% were displayed (these scores are for illustration purposes and do not represent actual scores for the websites shown).
- the Websites that are both shown and filtered out are updated on the Secure Server Log File for later analysis.
- bars may be used to visually indicate the Website's Privacy Score, either by the color of the bar and/or the length of the bar.
- a dark colored bar 1802 or bar having a colored in portion having a length of approximately 95% of the bar 1804 can represent a 95% Seal 700
- a medium colored bar 1806 or bar having a colored in portion having a length of approximately 74% of the bar 1808 can represent a 74% Seal 702
- a light colored bar 1810 or bar having a colored in portion having a length of approximately 54% of the bar 1812 can represent a 54% Seal 704 .
- Visitor Requested Categories of interest and Requested Category Attributes of interest are used to replace this guesswork by passing Visitor UAD, Ads, and Keywords directly to Websites like Google®, Microsoft®, Facebook®, and Yahoo®.
- FIG. 20 a flowchart 2000 for improving search engine relevance is shown.
- the Visitor's Search Engine request is passed to the Search Engine 2002 along with the Visitor's Token in block 2004 .
- This Token is forwarded along with the Search Engine's Token to Secure Server 202 in block 2006 .
- the Secure Server 202 performs the following:
- the Search Engine 2002 prepares its Regular Content/Ads in block 2024 .
- the Search Engine 2002 performs the following:
- the present invention enables new and unique revenue models, including charging:
- the present invention enables new and novel ways for a Visitor and a Website to interact, by improving prior art:
- the present invention can be provided in various embodiments, such as computerized methods, apparatuses, systems and/or non-transitory computer readable mediums.
- the present invention provides a computerized method for increasing relevance of a content provided to a visitor by a content provider by providing one or more server computers and at least one data storage communicably coupled to the one or more server computers, receiving at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, determining whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and sending at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- the content may include text, graphics, audio, video, hypertext links, music, video, applications, software, or a combination thereof.
- the content provider can be a search engine, a website, a service provider, an equipment provider, a device, an individual, an organization, a company, a governmental entity.
- the visitor device or the content provider device can be a computer, a laptop, a handheld computer, a personal data assistant, a telephone, a mobile telephone, a portable media player, a portable communications device, a facsimile device, or a Web-enabled device.
- Additional steps include receiving one or more preferences from a visitor device or a content provider device, storing the one or more preferences in the data storage, creating a token for the visitor or the content provider, and sending the token to the visitor device or the content provider.
- the token does not contain any personal information and may take the form of a cookie, a digital certificate, an electronic passport or other suitable vehicle.
- the one or more preferences may include one or more general preferences, one or more payment preferences, one or more contact preferences, or a combination thereof.
- Another step may include updating a log filed on the server computer or the data storage device.
- the one or more requested categories of interest and the one or more requested category attributes of interest can be selected using one or more drop down boxes, one or more check boxes, one or more radio buttons, one or more thumbnail pictures or videos, voice recognition, a fuzzy logic algorithm, or a neural network.
- two or more of the requested categories of interest can be grouped into one or more subject areas.
- the subject areas may include one of real estate, motor vehicles, employment, financial services, residential services, professional services, travel, vacation, computers, entertainment, dining, dating, hobbies, electronics, furniture, tools, home improvement, office supplies, household items, sporting goods, sporting events, recreation, or event tickets.
- the requested categories of interest within the real estate subject area may include houses, apartments, land, farms, commercial, insurance, finance or moving/storage.
- the requested categories of interest within the motor vehicles subject area may include cars, trucks, recreational, repairs, insurance or finance.
- the requested categories of interest within employment may include administrative, professional, education, healthcare, retail or manufacturing.
- the requested categories of interest within financial services may include mortgages, loans, brokerage accounts, mutual funds, small business or bill pay.
- the requested categories of interest within residential services may include plumber, electrician, lawn & garden, appliance repair, remodeling or cleaning.
- the requested categories of interest within professional service may include attorneys, accountants or computer services.
- a privacy score for the content provider is determined and with the content from the content provider to the visitor device.
- the privacy score can be incorporated into the customized seal.
- the privacy score can also be displayed on a visitor device as a number, a graphic or both along with a content from the content provider.
- the privacy score is determined based on a content provider rating, how the content provider settles disputes, how the content provider uses visitor behavioral profiles, spyware, cookies, Web beacons, Web bugs, adware, spam, visitor personal information, or a combination thereof.
- the present invention may also provide a messaging system between the visitor and the content provider.
- the present invention also provides a system for increasing relevance of a content provided to a visitor by a content provider that includes a network, one or more visitor devices communicably coupled to the network, one or more content provider devices communicably coupled to the network, one or more server computers communicably coupled to the network and at least one data storage communicably coupled to the one or more server computers.
- the one or more server computers (a) receive at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, (b) determine whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and (c) send at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- the present invention provides a non-transitory computer readable medium for increasing relevance of a content provided to a visitor by a content provider
- program instructions when executed by a processor causes the processor to perform the steps of receiving at least a portion of a visitor token and at least a portion of a content provider token at the processor from a content provider device; determining whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in at least one data storage communicably coupled to the processor; and sending at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- a general purpose processor e.g., microprocessor, conventional processor, controller, microcontroller, state machine or combination of computing devices
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- steps of a method or process described herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two.
- a software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
Abstract
The present invention provides a system, method and apparatus for increasing relevance of a content provided to a visitor by a content provider by providing one or more server computers and at least one data storage communicably coupled to the one or more server computers, receiving at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, determining whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and sending at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
Description
- This patent application claims priority to and is a continuation patent application of U.S. patent application Ser. No. 16/398,194 filed on Apr. 29, 2019, now U.S. Pat. No. 11,108,775, which is a continuation patent application of U.S. patent application Ser. No. 15/899,231 filed on Feb. 19, 2018, now U.S. Pat. No. 10,277,600, which is a continuation patent application of U.S. patent application Ser. No. 14/217,359 filed on Mar. 17, 2014, now U.S. Pat. No. 9,900,314, which is non-provisional patent application of U.S. Patent Application No. 61/793,804 filed on Mar. 15, 2013.
- This patent application is related to: (1) U.S. patent application Ser. No. 13/598,348 filed on Aug. 29, 2012, pending, entitled “System, Method and Apparatus for Electronically Searching for an Item”; and (2) U.S. patent application Ser. No. 13/752,024 filed on Jan. 28, 2013, pending, entitled “System, Method and Apparatus for Electronically Searching for an Item.” Both of these applications are continuation applications of U.S. Pat. No. 8,364,670, entitled “System, Method and Apparatus for Electronically Searching for an Item”, which is a non-provisional application of U.S. Patent Application No. 60/640,156 filed on Dec. 28, 2004. All of the foregoing applications are hereby incorporated by reference in their entirety.
- The present invention relates generally to the field of computerized information retrieval and, more particularly, to a system, method and apparatus for electronically making Content on the Internet more Relevant.
- The World Wide Web has become a major force for both individuals and business. But there are problems for both Visitors (any person or businesses visiting a Website) and the businesses behind a Website (any business using the World Wide Web to offer products or services).
- Visitors Need More Privacy
-
- Websites treat all Visitors the same, or worse, they try to guess what Visitors want based on secretly collecting data using techniques like behavioral profiling. In spite of this, Visitors waste time trying to find what is needed because Websites often have low Relevance with their Content and/or Ads (Content/Ads). For example and referring to
FIG. 1 , a large Ad blocked the Content of a Website that the inventor of the present invention visited. The inventor has no interest in purchasing alcoholic beverages, so this wasted his time. - Websites usually have Privacy Policies stating that Privacy is very important, but the corresponding Terms of Service (or equivalent) undoes all of this with legalese stating that if any Visitor's personal information is lost or misused, the Website cannot be held responsible. The Visitor remains 100% liable for problems he or she did not create.
- Visitors have no control over how their data is collected or used by a Website or how it is shared with other firms.
- Visitors have no way to share how they have been treated by a Website, and no way to learn from other Visitors about how they have been treated by that Website.
- Visitors have no warnings about a Website that does not respect Privacy.
- Visitors have no way to have a private, controlled Dialogue with a Website to get additional information, make suggestions, discuss problems, etc.
- Websites treat all Visitors the same, or worse, they try to guess what Visitors want based on secretly collecting data using techniques like behavioral profiling. In spite of this, Visitors waste time trying to find what is needed because Websites often have low Relevance with their Content and/or Ads (Content/Ads). For example and referring to
- Websites Need to be More Relevant
-
- Websites are always looking for ways to increase revenue and margins, but the Web has turned many of their products and services into commodities. There are few ways for a Website to differentiate and protect margins either by the products and services being offered or by being Privacy Champions.
- Relevance builds Visitor loyalty, but this is hard to achieve because of the ease of switching Websites to find a better price. This switching reduces Visitor loyalty and Website revenue. A Website needs to focus more on what is needed, rather than what it sells if it wants to increase Visitor Relevance, loyalty, and profitability.
- A Website has no way to start a Visitor Dialogue, mend a damaged Visitor relationship, or reactivate a lapsed Visitor relationship unless that Visitor has Registered with that Website.
- A Website has no way to share Visitor experiences with other Websites.
- Serving Ads that are not Relevant wastes Visitor time and reduces Website Ad revenue. Referring again to
FIG. 1 , a large Ad blocked the Content of a Website that the inventor visited. The inventor has no interest in purchasing alcoholic beverages, so this eliminated the opportunity for the Website to generate revenue from this Ad. - Trying to increase Relevance by secretly collecting additional behavioral data may violate Visitor Privacy and make a Website less attractive to Visitors who value their Privacy. While this is a growing problem in the U.S., this is already a major problem in countries that follow the European Data Directive, and may become an even bigger problem with the proposed European Data Regulation.
- Obtaining the proper balance of Privacy and Relevance is one of the major problems in businesses today. Customer Relationship Management (CRM) systems work on the know-thy-customer principle, believing that the more a business knows about a person, the better that business can serve that person. Prior art with CRM, behavioral profiling, tracking, cookies, adware, keyboard sniffing, Web bugs, spyware, etc. have all created a hostile environment summarized by industry analysts, as in the Gartner® Top End User Predictions for 2010: Coping with the New Balance of Power. It concludes:
- The potential backlash from consumers on Internet marketing cannot be underestimated. Eventually marketers WILL abuse the Internet channel and annoy customers enough to generate an outcry strong enough to push legislation regulating Internet marketing activity. Consequences will include:
-
- That companies focusing primarily on the Internet for marketing purposes could find themselves unable to market effectively to customers, putting themselves at a competitive disadvantage.
- Vendors that focus solely or predominately on producing Internet marketing could find themselves faced with a declining market, as companies shift marketing funds to other channels to compensate.
- Since the mid-90's Privacy Policies have attempted to solve these problems, but these have not been successful. Privacy Policies tell Visitors what rights they have, but their corresponding Terms of Service ensure that these rights seldom stand up in court. For example, the Google® Terms of Service disclaimer has wording that removes Visitor rights, and the exact wording can be found on tens of millions of other Websites! Visitors have no Website Privacy rights.
- On Dec. 1, 2010, The Federal Trade Commission released its “do not track” guidelines for the Internet. FTC Chairman Jon Leibowitz said “the report shows a failure of private industry to adequately address customer privacy concerns online. Despite some good actors, self-regulation of privacy has not worked adequately and is not working adequately for American consumers. We deserve far better from the companies we entrust our data to, and industry as a whole needs to do a far better job.” More than two years later, “do not track” practices have still not been implemented and the Digital Advertising Alliance®, which claims to represent more than 5,000 companies, has told its members to “simply ignore” any “do not track” request.
- Privacy outside U.S. is far more important because people in many countries are already protected by laws such as the European Data Directive, and the proposed European Data Regulation may give citizens even more rights, including the “right to be forgotten.” This puts U.S. companies doing business outside the U.S. at a disadvantage because few have the required Privacy expertise. In fact, some compliance requirements have even been called “technically impossible.” And even if compliance was easy, U.S. companies certainly do not want to risk taking better care of overseas Visitors than they do with their own U.S. Visitors.
- One reason why Websites cannot protect Visitors is that personal information must travel from Visitors' devices, through the Web, to the Websites. Personal information is managed by millions of hardware components and millions of lines of code written by thousands of people from dozens of companies. No Website wants to assume the liability for all of this.
- Lessons from Google®
- In 2007, Google's CEO Eric Schmidt was asked to define Web 3.0. He defined it as a different way of building applications:
-
- By piecing them together,
- Where data is in the cloud,
- That run on any device,
- That are very Customizable.
- This common practice has resulted in the steady decline of Privacy. Not surprisingly, Google® is now being sued more often by groups and governments that do not want increased Relevance at the expense of reduced Privacy. A better answer would have been a different way of building applications:
-
- That focus on what a person wants,
- Where data is protected in the cloud,
- That run privately on any device,
- That are Customized to what a person wants, not what is being sold.
- What is needed is a way to increase Visitor Privacy, while at the same time, increase Website Relevance.
- The present invention increases Visitor Privacy and Website Relevance by turning conventional wisdom upside down with this: the less a business knows about a person, the better that business can serve that person. It is based on the fact that what a person wants has nothing to do with who that person is. Identity is only needed by a Website at the end of a transaction—for payment, delivery, and support. Until then, Visitors use the present invention to disclose their “Anonymous Unfulfilled Demand” (AUD) in a trusted, anonymous environment so that a Website can Customize Content/Ads to make it more Relevant for the benefit of all parties. This trust is further enhanced with a private, controlled Messaging system between Visitors and Websites.
- The present invention provides a computerized method for increasing relevance of a content provided to a visitor by a content provider by providing one or more server computers and at least one data storage communicably coupled to the one or more server computers, receiving at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, determining whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and sending at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- In addition, the present invention provides an apparatus for increasing relevance of a content provided to a visitor by a content provider that includes one or more server computers, and at least one data storage communicably coupled to the one or more server computers. The one or more server computers (a) receive at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, (b) determine whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and (c) send at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- The present invention also provides a system for increasing relevance of a content provided to a visitor by a content provider that includes a network, one or more visitor devices communicably coupled to the network, one or more content provider devices communicably coupled to the network, one or more server computers communicably coupled to the network and at least one data storage communicably coupled to the one or more server computers. The one or more server computers (a) receive at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, (b) determine whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and (c) send at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- Moreover, the present invention provides a non-transitory computer readable medium for increasing relevance of a content provided to a visitor by a content provider comprising program instructions when executed by a processor causes the processor to perform the steps of receiving at least a portion of a visitor token and at least a portion of a content provider token at the processor from a content provider device; determining whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in at least one data storage communicably coupled to the processor; and sending at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- The above and further advantages of the invention may be better understood by referring to the following description in conjunction with the accompanying drawings, in which:
-
FIG. 1 is a screenshot of a typical Website showing irrelevant Content (a popup Ad) in accordance with the prior art; -
FIG. 2 is a flowchart that illustrates a Visitor Registration in accordance with one embodiment of the present invention; -
FIG. 3 is a flowchart that illustrates a Website Registration in accordance with one embodiment of the present invention; -
FIG. 4 is a flowchart that illustrates enabling Visitor Privacy and Website Relevance in accordance with one embodiment of the present invention; -
FIG. 5 is a flowchart that illustrates a Secure Server increasing Website Relevance in accordance with one embodiment of the present invention; -
FIG. 6 is a Customized Seal in accordance with one embodiment of the present invention; -
FIG. 7 is three Customized Seals in accordance with one embodiment of the present invention; -
FIG. 8 is a flowchart that illustrates how a Secure Server calculates a Website's Privacy Score in accordance with one embodiment of the present invention; -
FIG. 9 is a flowchart that illustrates a Website establishing a Dialogue with a Visitor in accordance with one embodiment of the present invention; -
FIG. 10 is a flowchart that illustrates a Visitor establishing a Dialogue with a Website in accordance with one embodiment of the present invention; -
FIG. 11 is a flowchart that illustrates a Visitor updating Preferences in accordance with one embodiment of the present invention; -
FIG. 12 is a screenshot of Requested Categories of interest in accordance with one embodiment of the present invention; -
FIG. 13 is a screenshot of Requested Category Attributes of interest in accordance with one embodiment of the present invention; -
FIG. 14 is a screenshot of Requested Category Attributes of interest from another system in accordance with one embodiment of the present invention; -
FIG. 15 is a flowchart that illustrates a Website updating Preferences in accordance with one embodiment of the present invention; -
FIG. 16 is a screenshot of a Search Engine result in accordance with one embodiment of the present invention; -
FIG. 17 is a screenshot of a Search Engine result in accordance with one embodiment of the present invention; -
FIG. 18 is bar representations in accordance with one embodiment of the present invention; -
FIG. 19 is a screenshot of a Search Engine result in accordance with one embodiment of the present invention; and -
FIG. 20 is a flowchart that illustrates Search Engine processing in accordance with one embodiment of the present invention. - There is only one way for any business to generate revenue:
-
- [the number of items sold] times [the margin of that item]
Consider these two examples: - Business A sells one item ten times to ten consumers.
- Business B sells the same ten items to one consumer.
Business A always makes the same amount of money as Business B. Some businesses prefer the former so that they have ten ways to increase revenue. Other businesses prefer the latter because they know that 20% of their consumers generate 80% of their revenue, and they want people with the highest “lifetime value.”
- [the number of items sold] times [the margin of that item]
- What's missing from these examples? The answer is who bought the items. It does not matter who bought the items—identity and personal information did not matter because both businesses make exactly the same revenue.
- The main reason why businesses collect personal information is so they can control Visitor relationships. Businesses are concerned about letting go of know-thy-customer because they fear that customers may not come back. But the Web has changed the rules of businesses forever. Customers may in fact come back several times a day if they want to. Customers have so much power that the conventional metrics of loyalty and lifetime value have changed forever. These have given way to new metrics like “trust” and “control.” As Gartner® predicted in 2005, data “only produces revenue when consumers allow it. In the new economics, the consumer controls the value.”
- The present invention gives consumers that trust and control for the benefit of all parties. Visitors Register and enter their “Anonymous Unfulfilled Demand” (AUD) for the products, services, relationships, etc. that they want. This is in the form of Requested Categories of interest and Requested Category Attributes of interest, and is used by a Website to make Content/Ads more Relevant.
- In one embodiment, the present invention protects Visitors:
-
- A Visitor enters a Minimum Privacy Score which is compared to a Website's Privacy Score before AUD is disclosed. A Visitor may override this Website's Privacy Score by adding the Website to a White List or Black List.
- A Visitor enters a Minimum Website Rating which is compared to a Website's Rating before AUD is disclosed. A Visitor may override this Website Rating by adding the Website to a White List or Black List.
- Visitors enter Website Ratings about individual Websites to tell other Visitors about their experience with this Website. This includes both positive and negative treatment, such as broken promises, poor customer service, great customer service, etc.
- In another embodiment, the present invention protects Websites:
-
- A Website enters a Minimum Visitor Rating which is compared to a Visitor's Rating before AUD is accepted. A Website may override this Visitor Rating by adding the Visitor to a White List or Black List.
- Websites enter Visitor Ratings about individual Visitors to tell other Websites about their experience with this Visitor. This includes both positive and negative treatment, such as excessive returned merchandise, click fraud abuse, etc.
- In one embodiment, the AUD is stored on a Secure Server without any associated personal information about the Visitor to whom it belongs. While this data is secured using standard security methods, the theft or misuse of this AUD cannot identify or hurt the Visitor because his or her identity is unknown.
- The AUD is now ready to be shared with a Website to increase Visitor Privacy and Website Relevance. The following describes the present invention in more detail.
- Visitor Registration
- In one embodiment and referring to the
flowchart 200 ofFIG. 2 , a Visitor uses a Browser to Register on theSecure Server 202 so that he or she can enter their AUD. A Visitor: -
- Enters a unique Visitor ID and password in
block 204. These are validated as shown indecision block 206. If the validation is not successful, the Visitor is notified and may attempt to reenter his/her unique Visitor ID and password inblock 204. The number of unsuccessful attempts can be limited. - Reads and accepts the Privacy Policy/Terms of Service that explains how their AUD may be collected and used in
block 208. - Enters General Preferences in
block 210, including:- Language, location, and Ad Preferences.
- Requested Categories of interest, such as computers as shown in
FIG. 12 . - Requested Category Attributes of interest, such as the type, processor, memory, hard disk size, and screen type as shown in
FIG. 13 . - Website-to-Visitor Counter for the maximum number of consecutive unanswered Messages permitted from a Website, typically set to one for maximum control. A value of zero means that that no Messages are permitted.
- Minimum Privacy Score required for AUD to be disclosed to a Website.
- Minimum Website Rating required for AUD to be disclosed to a Website.
- Optionally, enters Payment Preferences in
block 212 for a Website paying this Visitor for the use of their AUD, for time spent on the Website, for clicking on an Ad, etc. If Payment Preferences are not entered, they are set to default values and the amount totals are accrued for later instructions from the Visitor. - Optionally, enters Contact Preferences in
block 214 for how the Secure Server Contacts the Visitor, such as an instant message, email, text message, Facebook®, or Twitter® address. This is used to automatically notify the Visitor about an event, such as a Message received from the Secure Server. If Contact information is not entered, the Visitor accesses the Secure Server to get Messages.
- Enters a unique Visitor ID and password in
- The
Secure Server 202 adds a Visitor record in its central database in block 216. Note that no personal information is requested or required. - The
Secure Server 202 also creates a globally unique Token in block 216 that is placed on the Visitor's device, such as a cookie on a personal computer, to be later used by a Website or theSecure Server 202. This Token does not contain any personal information. - While the present invention refers to passing Tokens between various parties, it will be understood that cookies are not passed but are instead read by the receiving party.
- Website Registration
- In one embodiment and referring to the
flowchart 300 ofFIG. 3 , a Website Administrator or Representative uses a Browser to Register on theSecure Server 202 so that the Website can access Visitor AUD. A Website Administrator or Representative: -
- Enters a unique Website ID and password in
block 302. These are validated as shown indecision block 304. If the validation is not successful, the Visitor is notified and may attempt to reenter his/her unique Visitor ID and password inblock 302. The number of unsuccessful attempts can be limited. - Reads and accepts the Privacy Policy/Terms of Service that explains how the AUD may be accessed and used in
block 306. - Enters General Preferences in
block 308, including:- The attributes of the Website's own Privacy Policy/Terms of Service, including the use of tracking, spyware, data sharing, and its methods to resolve conflicts.
- Language.
- Location.
- Categories served by this Website, such as computers.
- Visitor-to-Website Counter for the maximum number of consecutive unanswered Messages permitted from a Visitor. A value of zero means that that no Messages are permitted and a value of 99 means that unlimited Messages are permitted.
- Minimum Visitor Rating which is compared to a Visitor's Rating before AUD is accessed by a Website.
- Enters Payment Preferences in
block 310 for accessing and using a service. - Optionally, enters Contact Preferences in
block 312 for how theSecure Server 202 Contacts the Website, such as an instant message, email, text message, or XML address. This is used to automatically notify the Website about an event, such as a Message received from theSecure Server 202. If Contact information is not entered, then the Website Administrator or Representative must return to theSecure Server 202 to get Messages.
- Enters a unique Website ID and password in
- The
Secure Server 202 adds a Website record in its central database inblock 314. Note that no personal information is requested or necessarily required. - The
Secure Server 202 also creates a globally unique Token for the Website inblock 314, such as a digital certificate. In one embodiment, this is later used by the Website to be authorized by theSecure Server 202. - The Visitor and Website are now ready to improve Visitor Privacy and Website Relevance.
- Enabling Visitor Privacy and Website Relevance
- In one embodiment and referring to the
flowchart 400 inFIG. 4 , a Registered Visitor uses aBrowser 402 to visit aRegistered Website 404 in block 406: -
- The
Website 404 reads the Visitor's Token, such as a cookie, and recognizes that this Visitor is using the present invention to protect his or her Privacy and increase Relevance on thisWebsite 404. - Information from the Visitor Token and the Website Token is sent to the
Secure Server 202 in block 408:- If the Visitor or
Website 404 are not Authorized to use the present invention, or if theWebsite 404 is not Authorized to use this Visitor's AUD, etc., as determined indecision block 410, Authorization Fails and the Visitor and Website Tokens are updated with a reason code inblock 412. Reasons for this Failure include:- The Website's Privacy Score is below the Minimum Privacy Score required by this Visitor. This protects Visitors.
- The Website's Rating is below the Minimum Website Rating required by this Visitor. This protects Visitors.
- The Website has been Black Listed by the Visitor. This protects Visitors.
- The Visitor's Rating is below the Minimum Visitor Rating required by this Website. This protects Websites.
- The Visitor has been Black Listed by the Website. This protects Websites.
- If the AUD is Authorized, as determined in
decision block 410, in one embodiment, theSecure Server 202 Prepares a Customized Seal, Visitor AUD, Secure Server Ads, and/or Keywords for third party Ads inblock 414, and updates these in the Visitor and Website Tokens inblock 416. - In all cases, the Secure Server Log File is updated in
block 418.
- If the Visitor or
- The Website Log File is updated in
block 420, including the Visitor Token for possibly establishing or continuing a Dialogue with the Visitor. - If Authorized by the
Secure Server 202, as determined indecision block 422, theWebsite 404 uses the Seal, AUD, Ads, and/or Keywords to create Relevant Content/Ads to increase the Website's Relevance for this Visitor while still respecting his or her Privacy inblock 424. Otherwise, theWebsite 404 uses its Regular Content/Ads inblock 426. - The Content/Ads are passed to the Visitor's Browser 402 (arrow 428).
- In one embodiment, if the
Browser 402 uses a plug-in to see the change in the Visitor's Token, or if there is no change because the present invention is not being used, as determined indecision block 430, a Warning is added to the Content to inform the Visitor that theWebsite 404 was not Authorized in block 432. Note that the Visitor can override this in Visitor Maintenance by lowering his or her Minimum Privacy Score for all Websites, by lowering his or her Minimum Website Rating for all Websites, and/or by adding thisWebsite 404 to a White List. - The Website's Content/Ads are displayed by the Visitor's Browser in
block 434.
- The
- Secure Server making Website Content/Ads Relevant
- The preceding is described in more detail. In one embodiment and referring now to the
flowchart 500 inFIG. 5 , theWebsite 404 sends the Visitor and Website Tokens to theSecure Server 202 inblock 408. TheSecure Server 202 performs the following: -
- If the
Website 404 is not Authorized by theSecure Server 202, as determined indecision block 410, a Failure Seal (e.g.,Seal 600 inFIG. 6 , etc.) is created and a Failure Update is stored in the Visitor and Website Tokens inblock 412. Other types and designs of Failure Seals or indicia can be used. Otherwise:- A Customized Seal (e.g.,
Seals FIG. 7 , etc.) is prepared inblock 502 based on the attributes of the Website's Privacy Policy/Terms of Service and the Website's Rating, as discussed inFIG. 8 . Other types and designs of Customized Seals or indicia can be used. - The AUD is reset in block 504 to ensure that the needs of the Visitor are always current and up-to-the-moment.
- Website Authorization may be given for several reasons, including Visitor Preferences or Websites paying for a service:
- If the
Website 404 is Authorized to receive this Visitor's AUD of Requested Categories of interest and Requested Category Attributes of interest, as determined indecision block 506, these are added to the Tokens inblock 508. - If the
Website 404 is Authorized to receive the Secure Server Ads based on the Visitor's Ad Preferences, as determined indecision block 510, they are added to the Tokens inblock 512. - If the
Website 404 is Authorized to receive Keywords based on the Visitor's Ad Preferences, as determined indecision block 514, they are added to the Tokens inblock 516.
- If the
- A Customized Seal (e.g.,
- In all cases, the Visitor and Website transaction is updated on the Secure Server Log File in
block 418.
- If the
- During this time, the
Website 404 prepares its Regular Content/Ads inblock 518. - With the return of the Tokens from the
Secure Server 202, theWebsite 404 performs the following: -
- The Website Log File is updated in
block 420. - If not Authorized, as determined in
decision block 422, theWebsite 404 uses its Regular Content (seeblock 426 inFIG. 4 ). Otherwise, the Seal can be prepared by theWebsite 404 for displaying and then:- If the Visitor's Token contains Requested Categories of interest and Requested Category Attributes of interest, as determined in
decision block 520, theWebsite 404 mass-customizes its Content for this Visitor to make it more Relevant inblock 522. - If the Visitor's Token contains Secure Server Ads, as determined in
decision block 524, theWebsite 404 prepares them for this Visitor to make them more Relevant inblock 526. - If the Visitor's Token contains Keywords, as determined in
decision block 528, theWebsite 404 passes them to third parties such as Google® AdWords® to make these ads more Relevant inblock 530.
- If the Visitor's Token contains Requested Categories of interest and Requested Category Attributes of interest, as determined in
- The Website Log File is updated in
- The Regular Content or Relevant Content/Ads with Seal are displayed on the Visitor Browser (see
arrow 428 inFIG. 4 ). - Whenever possible, the present invention has made its Content/Ads Relevant to the Visitor while at the same time protecting that Visitor's Privacy.
- Custom Seal Processing
- In one embodiment and referring now to the flowchart 800 in
FIG. 8 , theSecure Server 202 creates a Customized Seal (e.g.,Seals FIG. 7 , etc.) for a Website 404: -
- Website's Privacy Score starts with 10 points for using the present invention and attempting to be a Privacy Champion in
block 802. - From the Web site's General Preferences:
- If the Website supports “do not track” by agreeing to not store behavioral profiles without specific Visitor permission, as determined in
decision block 804, add 10 points to the Privacy Score (opt-in) inblock 806. - If the Website agrees not to use spyware, cookies, Web beacons, Web bugs, adware, spyware, spam, etc. without specific Visitor permission, as determined in
decision block 808, add 10 points to the Privacy Score (opt-in) inblock 810. - If the Website agrees not to share, trade, or sell personal information without specific Visitor permission, as determined in
decision block 812, add 10 points to the Privacy Score (opt-in) inblock 814. - If the Website agrees to use its best efforts to resolve disputed issues with its Visitors, as determined in
decision block 816, add 10 points to the Privacy Score inblock 818.
- If the Website supports “do not track” by agreeing to not store behavioral profiles without specific Visitor permission, as determined in
- If there are enough Website Ratings entered by Visitors about this Website, as determined in
decision block 820, divide the Average Website Rating by 2 and add it to calculate the final Website's Privacy Score inblock 822. Otherwise, double the Website's Privacy Score inblock 824.
- Website's Privacy Score starts with 10 points for using the present invention and attempting to be a Privacy Champion in
-
Secure Server 202 uses the Website's Privacy Score to prepare a Custom Seal (e.g.,Seals FIG. 7 , etc.) for thisWebsite 404 inblock 502. For example, this Seal may include different colors and/or an additional diagonal line to accent acceptable and unacceptable Website Privacy Scores. Other designs, colors or indicia can be used. - When a Visitor clicks on a Seal image, the
Secure Server 202 displays a separate screen showing details about how the Website Privacy Score was calculated so that Visitors can make informed decisions about whether or not to trust thisWebsite 404 or Search Engine result (see e.g.,FIGS. 16-20 ). - Message “Baton” Processing
- In one embodiment of the present invention, the decision to receive a Message is controlled not by the sending party but by the receiving party. A Message is like a “baton” that is passed from the sender to the receiver. The receiver continues the Dialogue by returning that baton, and ends the Dialogue by doing nothing with it. The baton goes back and forth until one party does not return it. This protects both Visitors and Websites.
- Website Establishing a Dialogue with a Visitor
- In one embodiment, the Website wants to send a Message to a Visitor. Reasons for this may include:
-
- Establishing a relationship after a Visitor visits the Website.
- Announcing an upcoming promotion, possibly tailored for this Visitor's Requested Categories of interest and Requested Category Attributes of interest.
- Correcting an Authorization Failure because of a low Website Privacy Score or a low Website Rating. Entries in the Website's Log File show which Visitors had a Failed Authorization. The Website may use the present invention's Messaging to resolve problems and encourage Visitors to add the Website to his or her White List and to give a positive recommendation in the Website's Rating so that Authorization is granted next time and the Website's Privacy Score may be improved.
- Referring now to the
flowchart 900 inFIG. 9 , theWebsite 404 Contacts the Visitor through the Secure Server 202: -
- The
Website 404 either manually or automatically selects a specific Visitor from the Website Log File inblock 902. The Website Log File is shown being updated inblock 420 inFIG. 4 . - The
Website 404 sends that Visitor's Token, its own Website Token, and the requested Message to theSecure Server 202 inblock 904. TheSecure Server 202 performs the following:- If the
Website 404 or Visitor are not Authorized to use the present invention, as determined indecision block 906, the Authorization Fails. - If the
Website 404 is not Authorized to use this Visitor's Token, such as being Black Listed by the Visitor, as determined indecision block 906, the Authorization Fails. - If the Website-to-Visitor Counter for this Visitor/Website combination is zero, as determined in
decision block 908, the Authorization Fails. Otherwise:- The Website-to-Visitor Counter for this Visitor/Website combination is decreased by one in
block 910. - If the
Secure Server 202 has Contact information for this Visitor, as determined indecision block 912, the Message is sent to Visitor in the preferred manner inblock 914, such as by an instant message, email, text message, Facebook®, or Twitter®. Note that the Visitor's Contact information is not given to theWebsite 404. - Otherwise the Message is stored on the
Secure Sever 202 inblock 916 to be later accessed by the Visitor's Browser.
- The Website-to-Visitor Counter for this Visitor/Website combination is decreased by one in
- If the
- The Secure Server Log File is updated in
block 418. - The Website Log File is updated in
block 420.
- The
- If the Visitor later replies to the Message, the Visitor's Website-to-Visitor Counter for this
Website 404 is reset to the number of consecutive unanswered Messages permitted by thisWebsite 404 to this Visitor. - Visitor Establishing a Dialogue with a Website
- In one embodiment and referring now to
FIG. 10 , a Visitor may prefer the control of using the present invention to establish a Dialogue with a Website. He or she uses aBrowser 402 to Contact theWebsite 404 by visiting the Secure Server 202: -
- A list of the Websites visited by the Visitor is displayed:
- If the desired Website is not shown, it is added to the list by the Visitor simply visiting that Website and then re-displaying this list.
- Alternatively, the Visitor can give the
Secure Server 202 the URL of the desired Website so that it is added to the list.
- The Visitor selects the specific Website in
block 1002 and enters the Message that is sent to theSecure Server 202 in block 1004. TheSecure Server 202 performs the following:- If the Visitor or Website are not Authorized to use the present invention, as determined in
decision block 1006, the Authorization Fails. - If the Visitor is not Authorized to use this Website Token, such as being Black Listed by the Website, as determined in
decision block 1006, the Authorization Fails. - If the Visitor-to-Website Counter for this Visitor/Website combination is zero, as determined in
decision block 1008, the Authorization Fails. Otherwise:- The Visitor-to-Website Counter for this Visitor/Website combination is decreased by one in
block 1010. - If the
Secure Server 202 has Contact information for this Website, as determined indecision block 1012, the Message is sent to the Website in the preferred manner inblock 1014, such as by an instant message, email, text message, or XML. Note that the Website's Contact information is not given to the Visitor. - Otherwise the Message is stored on the
Secure Sever 202 inblock 1016 to be later accessed by the Website Administrator or Representative's Browser.
- The Visitor-to-Website Counter for this Visitor/Website combination is decreased by one in
- If the Visitor or Website are not Authorized to use the present invention, as determined in
- The Secure Server Log File is updated in
block 418. - The Visitor's
Browser 402 receives Message confirmation from theSecure Server 202 inblock 1018. Optionally, confirmation is sent to Visitor in the preferred manner, such as an instant message, email, text message, Facebook®, or Twitter®.
- A list of the Websites visited by the Visitor is displayed:
- If the Website later replies to the Message, the Website's Visitor-to-Website Counter for this Visitor is reset to the number of consecutive unanswered Messages permitted by this Visitor to this Website.
- Visitor Maintenance on the Secure Server
- In one embodiment and referring now to flowchart 1100 in
FIG. 11 , an Authorized Visitor uses aBrowser 402 to review and/or change the following Visitor information/preferences on the Secure Server 202: -
- Password, language, location, and Ad Preferences.
- Requested Categories of interest from a Taxonomy. A Taxonomy, in one embodiment, is a collection of categories of products, services or individuals, and the questions and answers that define the features and options for each category. One embodiment is illustrated in
FIG. 12 . - Requested Category Attributes of interest from a Taxonomy. One embodiment is illustrated in
FIG. 13 . - Alternatively, or in addition, Requested Categories of interest and Requested Category Attributes of interest may be retrieved by other systems, as shown in FIG. 14 from U.S. Pat. No. 8,364,670 B2.
- The Website-to-Visitor Counter for the maximum number of consecutive unanswered Messages permitted from any Website.
- The acceptable Minimum Privacy Score for Websites.
- The acceptable Minimum Website Rating for Websites.
- Optional Payment Preferences and Contact Preferences.
- The audit trail of this Visitor's activity on the Secure Server Log File.
- For individual Websites:
- If disclosing AUD is not permitted (Black List).
- If sending AUD is permitted even if the calculated Website Privacy Score is below the Minimum Privacy Score required by this Visitor, or the Website's Rating is below the Minimum Website Rating required by this Visitor (White List).
- Website Ratings and comments of how the Website treated other Visitors. Website Ratings are collected by the Secure Server to warn other Visitors about Privacy violations, poor service, etc.
- The audit trail of Website activity on the Secure Server Log File.
- The Authorized Visitor uses the
Browser 402 to review and/or change the Visitor information/preferences on theSecure Server 202 as follows: -
- The Visitor accepts the Visitor information/preferences or changes thereto in
block 1102, which are then sent to theSecure Server 202 inblock 1104. TheSecure Server 202 performs the following:- If the Visitor is not Authorized to use the present invention, as determined in
decision block 1106, the Authorization Fails. Otherwise:- The Visitor information/preferences are updated in
block 1108. - The
Secure Server 202 creates a new Visitor Token inblock 1110.
- The Visitor information/preferences are updated in
- If the Visitor is not Authorized to use the present invention, as determined in
- The Secure Server Log File is updated in
block 418. - The Visitor's
Browser 402 receives update confirmation (success/fail) from theSecure Server 202 inblock 1112. Optionally, confirmation is sent to Visitor in the preferred manner, such as an instant message, email, text message, Facebook®, or Twitter®.
- The Visitor accepts the Visitor information/preferences or changes thereto in
- Website Maintenance on the Secure Server
- In one embodiment and referring now flowchart 1500 in
FIG. 15 , an Authorized Website Administrator or Representative uses aBrowser 1502 to review and/or change the following Website information/preferences on the Secure Server 202: -
- Password, General Preferences.
- Payment Preferences.
- Optional Contact Preferences.
- The audit trail of this Website's activity on the Secure Server Log File.
- For an individual Visitors:
- If accessing AUD has been blocked (Black List).
- If accessing AUD is permitted even if the Visitor Rating is below the Minimum Visitor Rating (White List).
- Visitor Ratings and comments of how the Visitors treated the Website. Visitor Ratings are collected by the Secure Server to warn other Websites of Visitors who show abusive behavior, etc.
- The audit trail of Visitor activity on the Secure Server Log File.
- The Authorized Website Administrator or Representative uses the
Browser 1502 to review and/or change the Website information/preferences on theSecure Server 202 as follows: -
- The Authorized Website Administrator or Representative accepts the Website information/preferences or changes thereto in
block 1504, which are then sent to theSecure Server 202 inblock 1506. TheSecure Server 202 performs the following:- If the Authorized Website Administrator or Representative is not Authorized to use the present invention, as determined in
decision block 1508, the Authorization Fails. Otherwise:- The Website information/preferences are updated in
block 1510. - The
Secure Server 202 creates a new Website Token inblock 1512.
- The Website information/preferences are updated in
- If the Authorized Website Administrator or Representative is not Authorized to use the present invention, as determined in
- The Secure Server Log File is updated in
block 418. - The Authorized Website Administrator or
Representative Browser 1502 receives update confirmation (success/fail) from theSecure Server 202 inblock 1514. Optionally, confirmation is sent to Authorized Website Administrator or Representative in the preferred manner, such as an instant message, email, text message, Facebook®, or Twitter®.
- The Authorized Website Administrator or Representative accepts the Website information/preferences or changes thereto in
- Warning Visitors Before Websites are Visited
- In another embodiment, the present invention further warns Visitors about Websites that do not respect their Privacy. As illustrated in
FIG. 16 , aVisitor Browser 402 plug-in retrieves a Website's Privacy Score from theSecure Server 202 and displays it in a Search Engine result as a Customized Seal (e.g., 700) so that Visitors are warned before that Website is selected. These Privacy Score requests are stored on the Secure Server Log File so that Websites can measure Search Engine click through rates. For example, the four websites could have Privacy Scores of 95%, 45%, 86% and 68% (these scores are for illustration purposes and do not represent actual scores for the websites shown). In one embodiment, the plug-in displays a red “?” Score for Websites that are not using the present invention and do not have a Website Privacy Score. - In another embodiment as illustrated in
FIG. 17 , the Visitor's plug-in filters out results when a Website's Privacy Score is below a Visitor's Minimum Privacy Score. In this example, the website having a Privacy Score of 45% was filtered; whereas, the websites having Privacy Scores of 95%, 86% and 68% were displayed (these scores are for illustration purposes and do not represent actual scores for the websites shown). The Websites that are both shown and filtered out are updated on the Secure Server Log File for later analysis. - In yet another embodiment as illustrated in
FIG. 18 , bars may be used to visually indicate the Website's Privacy Score, either by the color of the bar and/or the length of the bar. For example: (1) a darkcolored bar 1802 or bar having a colored in portion having a length of approximately 95% of thebar 1804 can represent a 95% Seal 700; (2) a mediumcolored bar 1806 or bar having a colored in portion having a length of approximately 74% of thebar 1808 can represent a 74% Seal 702; and (3) a lightcolored bar 1810 or bar having a colored in portion having a length of approximately 54% of thebar 1812 can represent a 54% Seal 704. Note that the color used inbars bars bars FIG. 19 illustrates the same information shown inFIG. 16 , except the Customized Seals are replaced with bars consistent with the examples shown inFIG. 18 . - Improving Search Engine Relevance
- In addition to improving Website Relevance, the present invention also improves Search Engine Relevance. These companies spend billions trying guess what a person wants. In another embodiment, Visitor Requested Categories of interest and Requested Category Attributes of interest are used to replace this guesswork by passing Visitor UAD, Ads, and Keywords directly to Websites like Google®, Microsoft®, Facebook®, and Yahoo®.
- Referring to
FIG. 20 , aflowchart 2000 for improving search engine relevance is shown. The Visitor's Search Engine request is passed to theSearch Engine 2002 along with the Visitor's Token inblock 2004. This Token is forwarded along with the Search Engine's Token toSecure Server 202 inblock 2006. TheSecure Server 202 performs the following: -
- If the
Search Engine 2002 is not Authorized by theSecure Server 202, as determined indecision block 2008, a Failure Update is stored in the Visitor Search Engine Tokens inblock 2010. Other types and designs of Failure Seals or indicia can be used. Otherwise:- The AUD is reset in
block 2012 to ensure that the needs of the Visitor are always current and up-to-the-moment. - Search Engine Authorization may be given for several reasons, including Visitor Preferences or Search Engines paying for a service:
- If the
Search Engine 2002 is Authorized to receive this Visitor's AUD of Requested Categories of interest and Requested Category Attributes of interest, as determined in decision block 2014, these are added to the Tokens inblock 2016. - If the
Search Engine 2002 is Authorized to receive the Secure Server Ads based on the Visitor's Ad Preferences, as determined indecision block 2018, they are added to the Tokens inblock 2020. - If the
Search Engine 2002 is Authorized to receive Keywords based on the Visitor's Ad Preferences, as determined indecision block 2022, they are added to the Tokens inblock 2024.
- If the
- The AUD is reset in
- In all cases, the Visitor and
Search Engine 2002 transaction is updated on the Secure Server Log File inblock 418.
- If the
- During this time, the
Search Engine 2002 prepares its Regular Content/Ads inblock 2024. - With the return of the Tokens from the
Secure Server 202, theSearch Engine 2002 performs the following: -
- If not Authorized by the
Secure Server 202, as determined indecision block 2026, theSearch Engine 2002 uses its Regular Content/Ads inblock 2028. - If Authorized by the
Secure Server 202, as determined indecision block 2026, theSearch Engine 2002 uses the Visitor's AUD, Ads, and Keywords to create Relevant Content/Ads to increase the Search Engine's Relevance for this Visitor while still respecting his or her Privacy inblock 2030. - The Content/Ads are passed to the Visitor's Browser 402 (arrow 2032).
- If not Authorized by the
- The Regular Content or Relevant Content/Ads with Seal are displayed on the Visitor Browser in
block 2034. - In yet another embodiment, the Visitor's AUD, Ads, and Keywords are embedded in the Search Engine's results so that when the Visitor clicks on an “organic listing” or “sponsored link,” this is automatically passed to the selected Website. In this way, the selected Website can mass-customize its Contents using a Visitor's AUD, Ads, and Keywords to make it Relevant. For example, if the Visitor is looking for waterfront property, the Search Engine filters out the search results that are not Relevant, and the selected Website displays only waterfront property for the Visitor. This is another new, unique, and novel way to increase Visitor Privacy, while at the same time, increase Website Relevance.
- Enhancing the Present Invention
- Those skilled in the art will create new ways for Visitor AUD, Ads, and Keywords to be shared with a Website and for a Visitor and Website to have a private Dialogue in a way that does not violate the Privacy of that Visitor while increasing the Relevance of that Website. These new ways will:
-
- Permit a Visitor to:
- Disclose his or her AUD to Authorized Websites.
- Only see Relevant Content/Ads.
- Use Warnings and Seals to quickly assess the Privacy compliance of a Website.
- Have a trusted Dialogue.
- Save time.
- Permit a Website to:
- Access AUD from an Authorized Visitor.
- Mass-customize Content/Ads to make them Relevant for each Visitor.
- Respect a Visitor's Privacy and time.
- Enable long-term, profitable relationships.
- Be protected from Visitors with low Visitor Ratings.
- Differentiate by being a consumer Privacy Champion.
- Increase the profitability of a Visitor relationship.
- Reactivate a lapsed Visitor relationship.
- Permit a Visitor to:
- Revenue Models
- In one embodiment, the present invention enables new and unique revenue models, including charging:
-
- A subscription fee.
- For the right to display a Seal rating the Privacy compliance of this Website.
- For personalizing the Content of the Website.
- For personalizing Ads from the Secure Server that are more Relevant than third party ads.
- For personalizing Keywords to make third party Ads more Relevant.
- For accepting and/or sending Messages.
- For marketing intelligence on how Websites are using AUD.
- For paying Visitors for time spent on a Website, for clicking on an Ad, etc.
- For access to Log Files.
- For protection from Visitors with low Visitor Ratings.
- For the level of compliance in a Website's Privacy Policy/Terms of Service. In one embodiment, a premium is charged to Websites with a low Website Privacy Score and/or low Website Rating.
- For making Websites more Relevant either when visited directly or based on the recommendation of a Search Engine that passes AUD to that Website.
- For marketing intelligence from Search Engine click through rates
- In summary, the present invention enables new and novel ways for a Visitor and a Website to interact, by improving prior art:
-
From To Guessing Knowing Pushing Content Pulling demand Not private Private Seller centric Buyer centric General Content Relevant, Customized Content What we sell What you want Senders controlling relationships Receivers controlling relationships - As demonstrated and described above, the present invention can be provided in various embodiments, such as computerized methods, apparatuses, systems and/or non-transitory computer readable mediums.
- The present invention provides a computerized method for increasing relevance of a content provided to a visitor by a content provider by providing one or more server computers and at least one data storage communicably coupled to the one or more server computers, receiving at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, determining whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and sending at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- The content may include text, graphics, audio, video, hypertext links, music, video, applications, software, or a combination thereof. The content provider can be a search engine, a website, a service provider, an equipment provider, a device, an individual, an organization, a company, a governmental entity. The visitor device or the content provider device can be a computer, a laptop, a handheld computer, a personal data assistant, a telephone, a mobile telephone, a portable media player, a portable communications device, a facsimile device, or a Web-enabled device.
- Additional steps include receiving one or more preferences from a visitor device or a content provider device, storing the one or more preferences in the data storage, creating a token for the visitor or the content provider, and sending the token to the visitor device or the content provider. Note that the token does not contain any personal information and may take the form of a cookie, a digital certificate, an electronic passport or other suitable vehicle. The one or more preferences may include one or more general preferences, one or more payment preferences, one or more contact preferences, or a combination thereof. Another step may include updating a log filed on the server computer or the data storage device.
- The one or more general preferences for a content provider may include the content provider's own privacy policy and terms of service, a preferred language, a preferred location, one or more requested categories of interest served by the content provider, a maximum number of consecutive unanswered messages permitted from a visitor, a minimum visitor rating, etc. The one or more general preferences for a visitor may include a language preference, location preference, an advertisement preference, one or more requested categories of interest, one or more requested category attributes of interest, a maximum number of consecutive unanswered messages permitted from a content provider, a minimum privacy score, a minimum content provider rating, etc.
- The one or more requested categories of interest and the one or more requested category attributes of interest can be selected using one or more drop down boxes, one or more check boxes, one or more radio buttons, one or more thumbnail pictures or videos, voice recognition, a fuzzy logic algorithm, or a neural network. Moreover, two or more of the requested categories of interest can be grouped into one or more subject areas. For example, the subject areas may include one of real estate, motor vehicles, employment, financial services, residential services, professional services, travel, vacation, computers, entertainment, dining, dating, hobbies, electronics, furniture, tools, home improvement, office supplies, household items, sporting goods, sporting events, recreation, or event tickets. The requested categories of interest within the real estate subject area may include houses, apartments, land, farms, commercial, insurance, finance or moving/storage. The requested categories of interest within the motor vehicles subject area may include cars, trucks, recreational, repairs, insurance or finance. The requested categories of interest within employment may include administrative, professional, education, healthcare, retail or manufacturing. The requested categories of interest within financial services may include mortgages, loans, brokerage accounts, mutual funds, small business or bill pay. The requested categories of interest within residential services may include plumber, electrician, lawn & garden, appliance repair, remodeling or cleaning. The requested categories of interest within professional service may include attorneys, accountants or computer services.
- Thereafter, a regular content is prepared at the content provider device whenever the release was not authorized, the regular content is sent from the content provider device to the visitor device. A warning may be displayed on the visitor device whenever the release was not authorized. A relevant content based on the at least the portion of the anonymous unfilled demand for the visitor is created at the content provider device whenever the release was authorized, and the relevant content is sent from the content provider device to the visitor device. Note that a customized seal can be prepared for the content provider whenever the release is authorized, and the seal can be sent with the content from the content provider to the visitor device.
- A privacy score for the content provider is determined and with the content from the content provider to the visitor device. The privacy score can be incorporated into the customized seal. The privacy score can also be displayed on a visitor device as a number, a graphic or both along with a content from the content provider. The privacy score is determined based on a content provider rating, how the content provider settles disputes, how the content provider uses visitor behavioral profiles, spyware, cookies, Web beacons, Web bugs, adware, spam, visitor personal information, or a combination thereof.
- The present invention may also provide a messaging system between the visitor and the content provider.
- In addition, the present invention provides an apparatus for increasing relevance of a content provided to a visitor by a content provider that includes one or more server computers, and at least one data storage communicably coupled to the one or more server computers. The one or more server computers (a) receive at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, (b) determine whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and (c) send at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- The present invention also provides a system for increasing relevance of a content provided to a visitor by a content provider that includes a network, one or more visitor devices communicably coupled to the network, one or more content provider devices communicably coupled to the network, one or more server computers communicably coupled to the network and at least one data storage communicably coupled to the one or more server computers. The one or more server computers (a) receive at least a portion of a visitor token and at least a portion of a content provider token at the one or more server computers from a content provider device, (b) determine whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, and (c) send at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- Moreover, the present invention provides a non-transitory computer readable medium for increasing relevance of a content provided to a visitor by a content provider comprising program instructions when executed by a processor causes the processor to perform the steps of receiving at least a portion of a visitor token and at least a portion of a content provider token at the processor from a content provider device; determining whether a release of an anonymous unfilled demand for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in at least one data storage communicably coupled to the processor; and sending at least a portion of the anonymous unfilled demand for the visitor to the content provider device when the release is authorized.
- It will be understood by those of skill in the art that information and signals may be represented using any of a variety of different technologies and techniques (e.g., data, instructions, commands, information, signals, bits, symbols, and chips may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof). Likewise, the various illustrative logical blocks, modules, circuits, and algorithm steps described herein may be implemented as electronic hardware, computer software, or combinations of both, depending on the application and functionality. Moreover, the various logical blocks, modules, and circuits described herein may be implemented or performed with a general purpose processor (e.g., microprocessor, conventional processor, controller, microcontroller, state machine or combination of computing devices), a digital signal processor (“DSP”), an application specific integrated circuit (“ASIC”), a field programmable gate array (“FPGA”) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. Similarly, steps of a method or process described herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. Although preferred embodiments of the present invention have been described in detail, it will be understood by those skilled in the art that various modifications can be made therein without departing from the spirit and scope of the invention as set forth in the appended claims.
Claims (46)
1. A computerized method for increasing relevance of a content provided to a visitor by a content provider, the method comprising:
providing a server computer and at least one data storage communicably coupled to the server computer;
receiving at least a portion of a visitor token and at least a portion of a content provider token at the server computer;
the server computer performs the following solely in response to receiving the visitor token and the content provider token without any request from the visitor:
determining whether a creation of a relevant content for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage;
updating the visitor token and the content provider token to include a portion of the one or more preferences, one or more categories, one or more ads or one or more keywords for the visitor when the creation of the relevant content for the visitor is authorized; and
sending the updated visitor token and the updated content provider token.
2. The method as recited in claim 1 , further comprising:
creating the visitor token for the visitor;
sending the visitor token to a visitor device;
receiving the one or more preferences from the visitor device; and
storing the one or more preferences for the visitor in the data storage.
3. The method as recited in claim 1 , wherein the one or more preferences comprise one or more general preferences, one or more payment preferences, one or more contact preferences, or a combination thereof.
4. The method as recited in claim 3 , wherein the one or more payment preferences comprise paying the visitor for: use of an unfilled demand for the visitor, time spent on the website by the visitor, or clicking on an advertisement.
5. The method as recited in claim 1 , wherein the one or more categories, the one or more ads or the one or more keywords for the visitor are provided by the server computer.
6. The method as recited in claim 1 , wherein server computer performs the determining, updating and sending steps in response to the visitor device accessing a website or a search engine.
7. The method as recited in claim 1 , wherein the visitor token or the content provider token do not contain any personal information.
8. The method as recited in claim 1 , wherein the visitor token and the content provider token comprise a cookie, a digital certificate or an electronic passport.
9. The method as recited in claim 1 , further comprising:
creating a regular content at the content provider device whenever the creation of the relevant content for the visitor was not authorized; and
sending the regular content from the content provider device to a visitor device.
10. The method as recited in claim 9 , further comprising displaying a warning on the visitor device whenever the creation of the relevant content for the visitor was not authorized.
11. The method as recited in claim 1 , further comprising:
creating the relevant content based on the at least the portion of the one or more preferences, one or more ads or one or more keywords for the visitor at the content provider device whenever the creation of the relevant content for the visitor was authorized; and
sending the relevant content from the content provider device to a visitor device.
12. The method as recited in claim 1 , further comprising preparing a customized seal for the content provider whenever the creation of the relevant content for the visitor is authorized, and sending the customized seal with the content from the content provider to a visitor device.
13. The method as recited in claim 1 , further comprising determining a privacy score for the content provider and sending the privacy score with the content from the content provider to a visitor device.
14. The method as recited in claim 13 , further comprising incorporating the privacy score in a customized seal.
15. The method as recited in claim 13 , wherein the privacy score is displayed on the visitor device as a number, a graphic or both along with the content from the content provider.
16. The method as recited in claim 13 , wherein the privacy score is determined based on a content provider rating, how the content provider settles disputes, how the content provider uses visitor behavioral profiles, spyware, cookies, Web beacons, Web bugs, adware, spam, visitor personal information, or a combination thereof.
17. The method as recited in claim 13 , wherein the privacy score is determined by:
setting the privacy score to a first value if the content provider uses the token, or to zero if the content provider does not use the token;
adding a second value to the privacy score if the content provider agrees not to store a behavioral profile without permission of the visitor;
adding a third value to the privacy score if the content provider does not use spyware, cookies, web beacons, web bugs, adware or spam without permission of the visitor;
adding a fourth value to the privacy score if the content provider agrees not to share, trade or sell personal information without permission of the visitor;
adding a fifth value to the privacy score if the content provider agrees to use best efforts to resolve disputes with the visitor;
multiplying the privacy score by a sixth value when there are a specified number of ratings for the content provider; and
adding an average rating for the website divided by a seventh value to the privacy score where there are not the specified number of ratings for the content provider.
18. The method as recited in claim 17 , wherein:
the first value, the second value, the third value, the fourth value and the fifth value are all equal to ten; and
the sixth value and the seventh value are equal to two.
19. The method as recited in claim 1 , further comprising providing a messaging system between the visitor and the content provider.
20. The method as recited in claim 19 , wherein the visitor remains private with the messaging system.
21. The method as recited in claim 1 , wherein the portion of the one or more preferences, one or more keywords, one or more ads or one or more keywords for the visitor does not reveal an identity of the visitor.
22. The method as recited in claim 1 , wherein a receiving device of the visitor or the content provider controls a receipt of any messages from a sending device to the receiving device.
23. An apparatus for increasing relevance of a content provided to a visitor by a content provider comprising:
a server computer;
at least one data storage communicably coupled to the server computer; and
the server computer receives at least a portion of a visitor token and at least a portion of a content provider token at the server computer, and the following are performed solely in response to receiving the visitor token and the content token without any request from the visitor: (a) determines whether a creation of a relevant content for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, (b) updates the visitor token and the content provider token to include portion of the one or more preferences, one or more categories, one or more ads or one or more keywords for the visitor when the creation of the relevant content for the visitor is authorized, and (c) sends the updated visitor token and the updated content provider token.
24. The apparatus as recited in claim 23 , wherein the server computer:
creates the visitor token for the visitor;
sends the visitor token to a visitor device;
receives the one or more preferences from the visitor device; and
stores the one or more preferences for the visitor in the data storage.
25. The apparatus as recited in claim 23 , wherein the one or more preferences comprise one or more general preferences, one or more payment preferences, one or more contact preferences, or a combination thereof.
26. The apparatus as recited in claim 25 , wherein the one or more payment preferences comprise paying the visitor for: use of an unfilled demand for the visitor, time spent on the website by the visitor, or clicking on an advertisement.
27. The apparatus as recited in claim 23 , wherein the one or more categories, the one or more ads or the one or more keywords for the visitor are provided by the server computer.
28. The apparatus as recited in claim 23 , wherein server computer performs the determining, updating and sending steps in response to the visitor device accessing a website or a search engine.
29. The apparatus as recited in claim 23 , wherein the visitor token or the content provider token do not contain any personal information.
30. The apparatus as recited in claim 23 , wherein the visitor token and the content provider token comprise a cookie, a digital certificate or an electronic passport.
31. The apparatus as recited in claim 23 , wherein:
a regular content is created at the content provider device whenever the creation of the relevant content for the visitor was not authorized; and
the regular content is sent from the content provider device to a visitor device.
32. The apparatus as recited in claim 31 , wherein a warning is displayed on the visitor device whenever the creation of the relevant content for the visitor was not authorized.
33. The apparatus as recited in claim 23 , further comprising:
the relevant content is created based on the at least the portion of the one or more preferences, one or more ads or one or more keywords for the visitor at the content provider device whenever the creation of the relevant content for the visitor was authorized; and
the relevant content is sent from the content provider device to a visitor device.
34. The apparatus as recited in claim 23 , wherein a customized seal is prepared for the content provider whenever the creation of the relevant content for the visitor is authorized, and the customized seal is sent with the content from the content provider to a visitor device.
35. The apparatus as recited in claim 23 , wherein a privacy score is determined for the content provider and the privacy score is sent with the content from the content provider to a visitor device.
36. The apparatus as recited in claim 35 , wherein the privacy score is incorporated in a customized seal.
37. The apparatus as recited in claim 35 , wherein the privacy score is displayed on the visitor device as a number, a graphic or both along with the content from the content provider.
38. The apparatus as recited in claim 35 , wherein the privacy score is determined based on a content provider rating, how the content provider settles disputes, how the content provider uses visitor behavioral profiles, spyware, cookies, Web beacons, Web bugs, adware, spam, visitor personal information, or a combination thereof.
39. The apparatus as recited in claim 35 , wherein the privacy score is determined by:
setting the privacy score to a first value if the content provider uses the token, or to zero if the content provider does not use the token;
adding a second value to the privacy score if the content provider agrees not to store a behavioral profile without permission of the visitor;
adding a third value to the privacy score if the content provider does not use spyware, cookies, web beacons, web bugs, adware or spam without permission of the visitor;
adding a fourth value to the privacy score if the content provider agrees not to share, trade or sell personal information without permission of the visitor;
adding a fifth value to the privacy score if the content provider agrees to use best efforts to resolve disputes with the visitor;
multiplying the privacy score by a sixth value when there are a specified number of ratings for the content provider; and
adding an average rating for the website divided by a seventh value to the privacy score where there are not the specified number of ratings for the content provider.
40. The apparatus as recited in claim 39 , wherein:
the first value, the second value, the third value, the fourth value and the fifth value are all equal ten; and
the sixth value and the seventh value equal two.
41. The apparatus as recited in claim 23 , wherein a messaging system is provided between the visitor and the content provider.
42. The apparatus as recited in claim 41 , wherein the visitor remains private with the messaging system.
43. The apparatus as recited in claim 23 , wherein the portion of the one or more preferences, one or more keywords, one or more ads or one or more keywords for the visitor does not reveal an identity of the visitor.
44. The apparatus as recited in claim 23 , wherein a receiving device of the visitor or the content provider controls a receipt of any messages from a sending device to the receiving device.
45. A system for increasing relevance of a content provided to a visitor by a content provider comprising:
a network;
one or more visitor devices communicably coupled to the network;
one or more content provider devices communicably coupled to the network;
server computer communicably coupled to the network;
at least one data storage communicably coupled to the server computer; and
the server computer receives at least a portion of a visitor token and at least a portion of a content provider token at the server computer, and the following are performed solely in response to receiving the visitor token and the content token without any request from the visitor: (a) determines whether a creation of a relevant content for the visitor is authorized based on the visitor token, the content provider token and one or more preferences stored in the at least one data storage, (b) updates the visitor token and the content provider token to include portion of the one or more preferences, one or more categories, one or more ads or one or more keywords for the visitor when the creation of the relevant content for the visitor is authorized, and (c) sends the updated visitor token and the updated content provider token.
46. A non-transitory computer readable storage medium storing a computer program for increasing relevance of a content provided to a visitor by a content provider, the computer program comprising program instructions that when executed by a processor cause the processor to:
receive one or more preferences from a visitor device;
store the one or more preferences for the visitor in at least one data storage communicably coupled to the processor;
create a visitor token for the visitor;
send the visitor token to the visitor device;
receive at least a portion of the visitor token and at least a portion of a content provider token at the processor;
the processor performs the following solely in response to receiving the visitor token and the content provider token without any request from the visitor:
determine whether a creation of a relevant content for the visitor is authorized based on the visitor token, the content provider token and the one or more preferences stored in the at least one data storage;
update the visitor token and the content provider token to include at least a portion of the one or more preferences, one or more ads or one or more keywords for the visitor when the creation of the relevant content for the visitor is authorized; and
send the updated visitor token and the updated content provider token.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/461,812 US20210392139A1 (en) | 2013-03-15 | 2021-08-30 | System, Method and Apparatus for Increasing Website Relevance While Protecting Privacy |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361793804P | 2013-03-15 | 2013-03-15 | |
US14/217,359 US9900314B2 (en) | 2013-03-15 | 2014-03-17 | System, method and apparatus for increasing website relevance while protecting privacy |
US15/899,231 US10277600B2 (en) | 2013-03-15 | 2018-02-19 | System, method and apparatus for increasing website relevance while protecting privacy |
US16/398,194 US11108775B2 (en) | 2013-03-15 | 2019-04-29 | System, method and apparatus for increasing website relevance while protecting privacy |
US17/461,812 US20210392139A1 (en) | 2013-03-15 | 2021-08-30 | System, Method and Apparatus for Increasing Website Relevance While Protecting Privacy |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/398,194 Continuation US11108775B2 (en) | 2013-03-15 | 2019-04-29 | System, method and apparatus for increasing website relevance while protecting privacy |
Publications (1)
Publication Number | Publication Date |
---|---|
US20210392139A1 true US20210392139A1 (en) | 2021-12-16 |
Family
ID=51535011
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/217,359 Active 2034-08-11 US9900314B2 (en) | 2013-03-15 | 2014-03-17 | System, method and apparatus for increasing website relevance while protecting privacy |
US15/899,231 Active US10277600B2 (en) | 2013-03-15 | 2018-02-19 | System, method and apparatus for increasing website relevance while protecting privacy |
US16/398,194 Active 2035-01-12 US11108775B2 (en) | 2013-03-15 | 2019-04-29 | System, method and apparatus for increasing website relevance while protecting privacy |
US17/461,812 Pending US20210392139A1 (en) | 2013-03-15 | 2021-08-30 | System, Method and Apparatus for Increasing Website Relevance While Protecting Privacy |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/217,359 Active 2034-08-11 US9900314B2 (en) | 2013-03-15 | 2014-03-17 | System, method and apparatus for increasing website relevance while protecting privacy |
US15/899,231 Active US10277600B2 (en) | 2013-03-15 | 2018-02-19 | System, method and apparatus for increasing website relevance while protecting privacy |
US16/398,194 Active 2035-01-12 US11108775B2 (en) | 2013-03-15 | 2019-04-29 | System, method and apparatus for increasing website relevance while protecting privacy |
Country Status (1)
Country | Link |
---|---|
US (4) | US9900314B2 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8364670B2 (en) | 2004-12-28 | 2013-01-29 | Dt Labs, Llc | System, method and apparatus for electronically searching for an item |
WO2016081715A1 (en) * | 2014-11-19 | 2016-05-26 | rocket-fueled, Inc. | Systems and methods for maintaining user privacy and security over a compouter network and/or within a related database |
US10747897B2 (en) * | 2014-12-09 | 2020-08-18 | Early Warning Services, Llc | Privacy policy rating system |
CN106022010A (en) * | 2016-05-20 | 2016-10-12 | 乐视控股(北京)有限公司 | File display method and device |
KR20230007571A (en) * | 2018-06-29 | 2023-01-12 | 구글 엘엘씨 | Media source measurement for incorporation into a censored media corpus |
US11572067B2 (en) | 2019-08-30 | 2023-02-07 | 7980302 Canada Inc. | Using ISA system to decelerate truck upon entering geofenced area |
US11702083B2 (en) | 2020-06-11 | 2023-07-18 | 7980302 Canada Inc. | Using ISA system to implement a speed policy identified based on profile of a driving instance |
US20240037169A1 (en) * | 2022-08-01 | 2024-02-01 | Acer Incorporated | Webpage scoring method used with search engine and electronic device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070154190A1 (en) * | 2005-05-23 | 2007-07-05 | Gilley Thomas S | Content tracking for movie segment bookmarks |
US20080270209A1 (en) * | 2007-04-25 | 2008-10-30 | Michael Jon Mauseth | Merchant scoring system and transactional database |
US20100071052A1 (en) * | 2008-09-13 | 2010-03-18 | Microsoft Corporation | Reverse proxy architecture |
US20110010308A1 (en) * | 2009-05-28 | 2011-01-13 | Beeber, Inc. | Managing demographic-based customer ratings |
US20120324551A1 (en) * | 2011-06-20 | 2012-12-20 | Digicert, Inc. | Method of Improving Online Credentials |
Family Cites Families (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5201048A (en) | 1988-12-01 | 1993-04-06 | Axxess Technologies, Inc. | High speed computer system for search and retrieval of data within text and record oriented files |
US5623679A (en) | 1993-11-19 | 1997-04-22 | Waverley Holdings, Inc. | System and method for creating and manipulating notes each containing multiple sub-notes, and linking the sub-notes to portions of data objects |
US5623652A (en) | 1994-07-25 | 1997-04-22 | Apple Computer, Inc. | Method and apparatus for searching for information in a network and for controlling the display of searchable information on display devices in the network |
US5778361A (en) | 1995-09-29 | 1998-07-07 | Microsoft Corporation | Method and system for fast indexing and searching of text in compound-word languages |
US6286002B1 (en) | 1996-01-17 | 2001-09-04 | @Yourcommand | System and method for storing and searching buy and sell information of a marketplace |
US6119101A (en) | 1996-01-17 | 2000-09-12 | Personal Agents, Inc. | Intelligent agents for electronic commerce |
US5907838A (en) | 1996-12-10 | 1999-05-25 | Seiko Epson Corporation | Information search and collection method and system |
US5848410A (en) | 1997-10-08 | 1998-12-08 | Hewlett Packard Company | System and method for selective and continuous index generation |
US5978779A (en) | 1997-11-14 | 1999-11-02 | Merrill Lynch, Pierce, Fenner & Smith | Distributed architecture utility |
US6766315B1 (en) | 1998-05-01 | 2004-07-20 | Bratsos Timothy G | Method and apparatus for simultaneously accessing a plurality of dispersed databases |
US6298369B1 (en) | 1998-09-30 | 2001-10-02 | Stmicroelectronics, Inc. | High speed multiplier |
US6484162B1 (en) | 1999-06-29 | 2002-11-19 | International Business Machines Corporation | Labeling and describing search queries for reuse |
US6489968B1 (en) | 1999-11-18 | 2002-12-03 | Amazon.Com, Inc. | System and method for exposing popular categories of browse tree |
US6466918B1 (en) | 1999-11-18 | 2002-10-15 | Amazon. Com, Inc. | System and method for exposing popular nodes within a browse tree |
US6678680B1 (en) | 2000-01-06 | 2004-01-13 | Mark Woo | Music search engine |
US6845448B1 (en) * | 2000-01-07 | 2005-01-18 | Pennar Software Corporation | Online repository for personal information |
US20010047353A1 (en) | 2000-03-30 | 2001-11-29 | Iqbal Talib | Methods and systems for enabling efficient search and retrieval of records from a collection of biological data |
US6876997B1 (en) | 2000-05-22 | 2005-04-05 | Overture Services, Inc. | Method and apparatus for indentifying related searches in a database search system |
US6469958B1 (en) | 2000-08-10 | 2002-10-22 | Eugene V. Bray | Calendar current day indicator |
US6574624B1 (en) | 2000-08-18 | 2003-06-03 | International Business Machines Corporation | Automatic topic identification and switch for natural language search of textual document collections |
US20020120506A1 (en) | 2000-12-15 | 2002-08-29 | Hagen Philip A. | Classified ads software program |
US6662178B2 (en) | 2001-03-21 | 2003-12-09 | Knowledge Management Objects, Llc | Apparatus for and method of searching and organizing intellectual property information utilizing an IP thesaurus |
US7272849B2 (en) * | 2001-04-20 | 2007-09-18 | Hewlett-Packard Development Company, L.P. | System and method for sharing data |
US7200590B2 (en) | 2001-08-15 | 2007-04-03 | Yahoo! Inc. | Data sharing |
US7497369B2 (en) | 2001-10-31 | 2009-03-03 | Amazon.Com, Inc. | Metadata service that supports user-to-user sales via third party web pages |
US7389294B2 (en) | 2001-10-31 | 2008-06-17 | Amazon.Com, Inc. | Services for generation of electronic marketplace listings using personal purchase histories or other indicia of product ownership |
US7136875B2 (en) | 2002-09-24 | 2006-11-14 | Google, Inc. | Serving advertisements based on content |
US7346606B2 (en) | 2003-06-30 | 2008-03-18 | Google, Inc. | Rendering advertisements with documents having one or more topics using user topic interest |
US6983273B2 (en) | 2002-06-27 | 2006-01-03 | International Business Machines Corporation | Iconic representation of linked site characteristics |
US20040138996A1 (en) | 2002-10-18 | 2004-07-15 | Daniel Bettenburg | System and method for evaluating secondary market options for loans |
KR101123426B1 (en) | 2003-04-04 | 2012-03-23 | 야후! 인크. | A system for generating search results including searching by subdomain hints and providing sponsored results by subdomain |
US20040249682A1 (en) | 2003-06-06 | 2004-12-09 | Demarcken Carl G. | Filling a query cache for travel planning |
US20040249799A1 (en) | 2003-06-06 | 2004-12-09 | Demarcken Carl G. | Query caching for travel planning systems |
US7840587B2 (en) | 2003-06-06 | 2010-11-23 | Ita Software, Inc. | Query caching for travel planning systems |
ATE455332T1 (en) | 2003-07-08 | 2010-01-15 | Sap Ag | METHOD AND COMPUTER SYSTEM FOR QUERY PROCESSING |
US20050071328A1 (en) | 2003-09-30 | 2005-03-31 | Lawrence Stephen R. | Personalization of web search |
US20050076003A1 (en) | 2003-10-06 | 2005-04-07 | Dubose Paul A. | Method and apparatus for delivering personalized search results |
US7346615B2 (en) | 2003-10-09 | 2008-03-18 | Google, Inc. | Using match confidence to adjust a performance threshold |
US20050125397A1 (en) | 2003-12-04 | 2005-06-09 | William Gross | Transparent search engine |
US20050160107A1 (en) | 2003-12-29 | 2005-07-21 | Ping Liang | Advanced search, file system, and intelligent assistant agent |
US7447678B2 (en) | 2003-12-31 | 2008-11-04 | Google Inc. | Interface for a universal search engine |
US8090698B2 (en) | 2004-05-07 | 2012-01-03 | Ebay Inc. | Method and system to facilitate a search of an information resource |
US20050283470A1 (en) | 2004-06-17 | 2005-12-22 | Or Kuntzman | Content categorization |
US7836044B2 (en) | 2004-06-22 | 2010-11-16 | Google Inc. | Anticipated query generation and processing in a search engine |
US7730012B2 (en) | 2004-06-25 | 2010-06-01 | Apple Inc. | Methods and systems for managing data |
US7783633B2 (en) | 2004-11-19 | 2010-08-24 | International Business Machines Corporation | Display of results of cross language search |
US8364670B2 (en) * | 2004-12-28 | 2013-01-29 | Dt Labs, Llc | System, method and apparatus for electronically searching for an item |
US20060155581A1 (en) | 2005-01-10 | 2006-07-13 | George Eisenberger | Systems with user selectable data attributes for automated electronic search, identification and publication of relevant data from electronic data records at multiple data sources |
US20070067275A1 (en) | 2005-09-20 | 2007-03-22 | Microsoft Corporation | Context sensitive web search queries |
-
2014
- 2014-03-17 US US14/217,359 patent/US9900314B2/en active Active
-
2018
- 2018-02-19 US US15/899,231 patent/US10277600B2/en active Active
-
2019
- 2019-04-29 US US16/398,194 patent/US11108775B2/en active Active
-
2021
- 2021-08-30 US US17/461,812 patent/US20210392139A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070154190A1 (en) * | 2005-05-23 | 2007-07-05 | Gilley Thomas S | Content tracking for movie segment bookmarks |
US20080270209A1 (en) * | 2007-04-25 | 2008-10-30 | Michael Jon Mauseth | Merchant scoring system and transactional database |
US20100071052A1 (en) * | 2008-09-13 | 2010-03-18 | Microsoft Corporation | Reverse proxy architecture |
US20110010308A1 (en) * | 2009-05-28 | 2011-01-13 | Beeber, Inc. | Managing demographic-based customer ratings |
US20120324551A1 (en) * | 2011-06-20 | 2012-12-20 | Digicert, Inc. | Method of Improving Online Credentials |
Also Published As
Publication number | Publication date |
---|---|
US20140282917A1 (en) | 2014-09-18 |
US10277600B2 (en) | 2019-04-30 |
US20180191724A1 (en) | 2018-07-05 |
US9900314B2 (en) | 2018-02-20 |
US20190253423A1 (en) | 2019-08-15 |
US11108775B2 (en) | 2021-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11108775B2 (en) | System, method and apparatus for increasing website relevance while protecting privacy | |
Crain | The limits of transparency: Data brokers and commodification | |
US11899760B2 (en) | System and method for adjusting privacy policies | |
Coyle | Precarious and productive work in the digital economy | |
Dobkin | Information fiduciaries in practice: data privacy and user expectations | |
Cumbley et al. | Is “big data” creepy? | |
Argyres et al. | Franchisee associations as sources of bargaining power? Some evidence | |
US11430024B2 (en) | System and method of providing a virtual guestbook | |
Rubin et al. | Privacy and the commercial use of personal information | |
Ward et al. | Internet Jurisdiction for E-commerce | |
Stuart | Too little too late? An exploration and analysis of the inadequacies of antitrust law when regulating gafam data-driven mergers and the potential legal remedies available in the age of Big Data | |
Ekow Kelly et al. | The contribution of government policy and financial security control in Ghana’s mobile money services | |
US20130304667A1 (en) | Method and System for Promoting Arbitration Between Evaluators and Evaluees | |
Ha et al. | Consumer protection in E-tailing computer sales: a case study of Dell | |
Costello | The Impacts of AdTech on Privacy Rights and the Rule of Law | |
Lee et al. | Security controls for employees’ satisfaction: perspective of controls framework | |
Đurović et al. | Good advice is expensive–bad advice even more: the regulation of online reviews | |
Lee | A Study on Consent of the GDPR in Advertising Technology focusing on Programmatic Buying | |
US20230237542A1 (en) | System and method of providing a virtual guestbook | |
Birget | Big Data and Price Discrimination | |
Ruttell | Buyers' Institution-Based Trust in South African C2C e-Commerce: A Social Capital Theory Perspective | |
Dinielli et al. | Consumer Protection for Online Markets and Large Digital Platforms | |
Lucarelli et al. | Economic and regulatory analysis of data platforms and value creation models of the on demand economy | |
Blend | Data Privacy Standards in the United States: A Case Study of Facebook | |
Hutchinson | Incorporating privacy considerations into EU data-driven merger review |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: YOUR COMMAND, LLC, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PECKOVER, DOUGLAS;REEL/FRAME:058332/0708 Effective date: 20180709 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |