WO2002091226A1 - Method for detecting and identifying accesses to electronic documents - Google Patents

Method for detecting and identifying accesses to electronic documents Download PDF

Info

Publication number
WO2002091226A1
WO2002091226A1 PCT/CH2001/000280 CH0100280W WO02091226A1 WO 2002091226 A1 WO2002091226 A1 WO 2002091226A1 CH 0100280 W CH0100280 W CH 0100280W WO 02091226 A1 WO02091226 A1 WO 02091226A1
Authority
WO
WIPO (PCT)
Prior art keywords
document
client system
characterized
access
value
Prior art date
Application number
PCT/CH2001/000280
Other languages
German (de)
French (fr)
Inventor
Rolf Fey
Original Assignee
Rolf Fey
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rolf Fey filed Critical Rolf Fey
Priority to PCT/CH2001/000280 priority Critical patent/WO2002091226A1/en
Publication of WO2002091226A1 publication Critical patent/WO2002091226A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Abstract

According to the invention, a counting module connected to an electronic document (1), on a server system (S1), detects the number of accesses to the document (1) carried out by client systems (C) which are interconnected in a network, the internet, for example. Said counting module compares the actual access value with a pre-determined, regulated nominal access value and, if the two values correspond, sends an alternative document to the calling client system instead of the originally requested document (1). Said alternative document can have clear identification characteristics by which means the client system (C) can identify itself, in the server system (S1), in a conventional manner, preferably by means of electronic mail. The inventive method enables advantageous competitions to be carried out, whereby anonymous participation is possible, and whereby only in the case of a win, only the winner is identified.

Description

A method for detecting and identifying access to electronic documents

The present invention relates to a method according to the preamble of claim. 1

Electronic documents are stored, for example on a server system and made available for retrieval by the client system. The retrieval of documents takes place usually via an electronic network is being verified by the network structure of a legitimation of the access to the server system by the client system and possibly granted. Depending on the legitimacy this test can be done very superficial, or even be given free-without special identification check a general access. This condition is frequently asked at the general public electronic documents on the Internet so, where can access must take place generally anonymous and should.

To capture the number of accesses to such electronic documents so-called side counters are known, for example. These are programs that are activated in the server system when requesting the electronic document in question and store, inter alia, a counter value which is incremented by one unit for each access in each case. Often, the results of the count value are integrated in the document to be transmitted with the current value and displayed on the client system. Such side counter convey both the user of the client system as well as the author or distributor of the electronic document, the information on the frequency of the call of the electronic document in question. Traditionally, this information will be made available on the server system for statistical analysis and used.

Now, if the information contained on the electronic documents expect a response from the user of the client system, this information via separate means to the server system must be transmitted. For example, this is also done electronically via a postal system that allows you to send information to a specific location. Here, although the sender information is forwarded, but which in turn usually allow a reliable identification of the sender. In particular, this type of communication requires a response from the client system, with no specific call option is available through the server system, as this available to only about all client systems in the identical kind of electronic document communicated.

Now, if a reliable identification of the sender is necessary, as is the case for example with monetary transactions, a special commu- is established between the client system and the server system cation compound which is based on a predefined identification. Often this identification must be previously set up separately, in which process and an identification of the user, ie the person of the client system must be made. For applications requiring large number shall include users, but only for a very limited group of users ultimately must also be accurate identification, these prior identification now has an inhibitory effect. An example of such applications include

Competitions. Each participant in a competition must be able to be identified in case of winning. This is done conventionally either by a certificate of participation, is suspected in which that the owner was the true competitor and is therefore eligible to win, or it must make your participation in the competition, for example, on a corresponding entry form, the identification information of each participant will be given to the competitive supplier , Such competitors be carried out conventionally by paper and mail traffic, or even electronically through the Internet with electronic mail services.

The object of the present invention was to provide a method which permits, under exclusion of the existing means for providing and transmission of electronic documents nützung a specific identification of a particular client system to enable that triggers a defined event.

This object is achieved by the characterizing features of the method according to Claim. 1

Further preferred embodiments of the invention result from the features of claims 2 to x.

By the result of the page counter is exploited directly on the server, the server can the calling client system, which sets the counter directly to a defined value, transmit a message, in particular by transmitting the information of a created therefor, separate electronic document. Since the server system evaluates the request of the client system, which, for example, calls the document using the built-in page counter, and also operates these side counter itself, it can also be the requirement to such redirect alternative document. This document can now include identification features with which the client system can, in turn, identify with conventional transmission devices, such as electronic mail to the server system. The event triggering client system therefore receives a single client system this information, while the following client systems in turn receive the original document or also an alternative document. This makes it possible, for example, anonymously submit to competitions and to give only in case of winning the identity known or not.

Thus, the server system may preferably define a time window within which must receive a response from the client system, otherwise the prize will be considered unrealized. This ensures that in the meantime another client system can obtain the information of this alternative electronic document is not an unauthorized manner and in the case of a competition improperly identified as a winner. Advantageously, the attractiveness of such a competition can be increased by this method, since participation can be made anonymously. As an additional advantage, such a competition can use form as advertising platform, as an incentive is created to invoke the relevant electronic document several times to take advantage of the chance to win.

The use of the page counter increases the attractiveness of such a competition further, since the subscriber is able to estimate his chances of winning in a certain mass itself. If increased only very slightly with repeated call of the document while the counter value, which is an indication that the competition currently does not have many participants. For example, by the target value of the counter is specified as profit event on the electronic document, the alleged timing can be estimated to reach this target value.

Preferably, in the server system an electronic comparison is integrated deceleration unit, which prevents

Client system by using programs produce a high number of page views and thus virtually boot the counter alone in no time to the adjusted gain value. This can be done advantageously by a delay procedure which, respectively, the electronic signature. Network identification of the respective calling client system noted and imposes a barrier to further access during a particular period of time for this. Embodiments of the present invention will be explained in more detail below with reference to drawings. Show it

Figure 1 illustrates schematically the visual representation of an electronic document with an integrated counter representation.

FIG. 2 the scheme of integration of server and client systems with a document request.

In Figure 1, the visual representation of an electronic document is shown as page 1 in a frame 2 schematically. The side 1 preferably includes a counter display 3 and further regions 4 which may contain text or image information. The counter display 3 displays the data stored at the time of the call of the document 1 in the server system counter value. The side 1 can be displayed either as a separate page, or be part of another electronic document, and are represented in this within the frame. 2

As text and image information or an advertising message can now be used for example together with competition information. The competitive information advantageously contain the name of the competition counter value, ie the value of the counter display 3, in which the calling client system can get a win, as well as information related to the gain itself.

By repeatedly invoking the page 1 another, the current counter value is then in each case always displayed. Now if this counter value approaches the win count value, the incentive is increased view this page, several times in succession in order to possibly realize the profit. while also allowing this Page 1 the additional information is added deliberately or unconsciously, which can be used in particular for conveying advertising messages.

The side 1 can now be for example advantageously used in Internet instead a so-called banner as a side component of an information page. Here, this page one can be physically located on another server system as the information page, as described below.

2 shows the detail of a network with a client system C and two server systems Sl and S2 is shown schematically. The connection of these systems C, Sl and S2 with each other via the well-known networking technologies, advantageously, the connection over the Internet may take place.

In the server system Sl the electronic document 1 is now stored with counter module. The counter module, beispiels- example in the form of a program which is installed in the server system Sl and starts retrieving the electronic document, and thereby increments the stored counter value by the value 1, is constructed in a known manner.

In the server system S2 another electronic document is stored, among other things, which contains a reference to the document 1 in the server system Sl. In the display of this document on the client system C, the document 1 is displayed in a partial area of ​​this document, together with the dannzumal current count.

now reached the counter value by calling the document Dl in the server system Sl a predetermined desired value, so an alternative document to the client system C is transmitted in place of the document 1 is preferably. Since this alternative document will only be transmitted to a single client system C at the arrival of a single, particular state, this document can be used as a means of identification or certificate.

With this method, a competition can now be held on the electronic document beneficial. Winner of the competition is the user that accesses via the client system C as set point corresponding to the upstream give surrounded access number to the document. 1 Thus, for example, be recorded as additional information on the document 1, that the 10,000-th accessor receives a certain price. In the current access to the document 1 of the current state of Zäh- toddlers is displayed on the counter display 3, the user can therefore after repeated access to this document an idea of ​​the increase in traffic and thus also the chance the price if necessary to make to win. Since such requests on a network, in particular the Internet with the large number of connected client systems C can be rapidly carried out sequentially and in large numbers, the increase of the counter can be done very quickly or very slowly. Taking part in such a competition over the counter module respectively. the document 1 can be anonymous, meaning it must be provided no identification data that requesting for its electronic document alone is sufficient for participation. This increases the attractiveness of such a competition and also brings a Gros se advertising impact with it, because in addition to the quotation and winning a promotional message with the document can be transmitted. Participants in the competition will also become increasingly common view the document 1, the counter value 4 approaches closer to the target value.

At the same time can also be detected immediately if there is a chance of winning remain, namely as long as the setpoint has not yet been reached, or whether the competition by ER- rich of the desired value is completed.

Furthermore, the winner will also be notified immediately by the immediate transmission of the alternative document. This notification is still without identification of the subscriber, which can be identified as the winner only because of the profit statement or not. Thus, there is also the possibility that the profit is not taken up.

Advantageously, an attractive advertising medium to be created on an electronic document with virtually no further additional technical measures by the inventive method in addition to the purely statistical point of interest size of the accesses, which can be designed in the form of a competition. Of course, a plurality of such electronic documents 1 counter modules in another electronic document can be integrated, that is, it can be operated in parallel several competitions.

Advantageously, a central counter operators of such documents 1 can run a server system Sl to which several different operators of other server systems S2 connect.

To prevent influencing of the counter module with a running on egg nem client system C program that automatically a large number may generate access queries in a short time, preferably, the query time is latched each client system when calling the document and upon the occurrence of a Zugriffsabragen certain number within a certain period of time creates an access lock for an adjustable period of time. For each subsequent access of the client system in question, this time period may preferably be increased until it reaches a certain maximum period of time for the access barrier. Thus can be reliably prevented that a particular client system automatically the counter module quickly counts up to the target value and automated wins such as the competition.

Claims

claims
1. A method for detection and identification of a client system (C) upon reaching a defined target value access data stored on a on a server system (S2) electronic document (1) at the request of the document by the client system (C) characterized in that the document (1) is block-coupled with at least one count, which in each case detects the electronic access to the document, and increases a count for each access by one, whereby the count subsequently compared with the target access value and is with the target access value of the counter reading in according to the calling client system (C) an alternative electronic document instead of the originally requested document (1) transmitted.
2. The method according to claim 1, characterized in that the document (1) having a counter display (3), before WEL is coupled to the counter block and the current counter value with the document (1) transmitted.
3. The method of claim 1 or 2, characterized in that further information is stored and displayed in the document (1), in particular information about the target access value.
4. The method according to any one of claims 1 to 3, characterized in that the alternative document is stored in a storage area whose arrival of the server system (S) as the document (1).
5. The method according to any one of claims 1 to 4, characterized in that in the alternative document unique identification features are stored and displayed, preferably Identifikationsnummern- and -Zahlenfolgen.
6. A method according to any one of claims 1 to 5, characterized in that after a predefined number of calls to the document (1) (C) is blocked for a particular adjustable period of time by a particular client system access for the calling client system ,
7. The method according to claim 6, characterized in that the duration of the blocking time after each subsequent call by the respective client system (C) is increased by a single adjustable value.
8. The method of claim 6 or 7, characterized in that after reaching a certain maximum amount of time the access is released back to normal.
PCT/CH2001/000280 2001-05-08 2001-05-08 Method for detecting and identifying accesses to electronic documents WO2002091226A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CH2001/000280 WO2002091226A1 (en) 2001-05-08 2001-05-08 Method for detecting and identifying accesses to electronic documents

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP01925267A EP1386254A1 (en) 2001-05-08 2001-05-08 Method for detecting and identifying accesses to electronic documents
PCT/CH2001/000280 WO2002091226A1 (en) 2001-05-08 2001-05-08 Method for detecting and identifying accesses to electronic documents

Publications (1)

Publication Number Publication Date
WO2002091226A1 true WO2002091226A1 (en) 2002-11-14

Family

ID=4358202

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CH2001/000280 WO2002091226A1 (en) 2001-05-08 2001-05-08 Method for detecting and identifying accesses to electronic documents

Country Status (2)

Country Link
EP (1) EP1386254A1 (en)
WO (1) WO2002091226A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1897051A2 (en) * 2005-06-27 2008-03-12 The 41st Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US8826393B2 (en) 2006-03-31 2014-09-02 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US8862514B2 (en) 2004-03-02 2014-10-14 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US9060012B2 (en) 2007-09-26 2015-06-16 The 41St Parameter, Inc. Methods and apparatus for detecting fraud with time based computer tags
US9112850B1 (en) 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US9390384B2 (en) 2008-07-01 2016-07-12 The 41 St Parameter, Inc. Systems and methods of sharing information through a tagless device consortium
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US9703983B2 (en) 2005-12-16 2017-07-11 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US9754256B2 (en) 2010-10-19 2017-09-05 The 41St Parameter, Inc. Variable risk engine
US9990631B2 (en) 2012-11-14 2018-06-05 The 41St Parameter, Inc. Systems and methods of global identification
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10341344B2 (en) 2018-06-22 2019-07-02 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104866621A (en) * 2015-06-09 2015-08-26 苏州点通教育科技有限公司 Electronic document flowing method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6009410A (en) * 1997-10-16 1999-12-28 At&T Corporation Method and system for presenting customized advertising to a user on the world wide web
EP0994430A2 (en) * 1998-10-12 2000-04-19 Hitachi, Ltd. Contents management method
EP1056023A2 (en) * 1999-05-25 2000-11-29 Sony Corporation Apparatus, method and computer program for counting the number of accesses to a web page by different persons

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6009410A (en) * 1997-10-16 1999-12-28 At&T Corporation Method and system for presenting customized advertising to a user on the world wide web
EP0994430A2 (en) * 1998-10-12 2000-04-19 Hitachi, Ltd. Contents management method
EP1056023A2 (en) * 1999-05-25 2000-11-29 Sony Corporation Apparatus, method and computer program for counting the number of accesses to a web page by different persons

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8862514B2 (en) 2004-03-02 2014-10-14 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
EP1897051A4 (en) * 2005-06-27 2012-01-25 41St Parameter Inc Method and system for identifying users and detecting fraud by use of the internet
EP1897051A2 (en) * 2005-06-27 2008-03-12 The 41st Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US9703983B2 (en) 2005-12-16 2017-07-11 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US8826393B2 (en) 2006-03-31 2014-09-02 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US9754311B2 (en) 2006-03-31 2017-09-05 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US9196004B2 (en) 2006-03-31 2015-11-24 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US10089679B2 (en) 2006-03-31 2018-10-02 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US9060012B2 (en) 2007-09-26 2015-06-16 The 41St Parameter, Inc. Methods and apparatus for detecting fraud with time based computer tags
US9390384B2 (en) 2008-07-01 2016-07-12 The 41 St Parameter, Inc. Systems and methods of sharing information through a tagless device consortium
US9948629B2 (en) 2009-03-25 2018-04-17 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US9112850B1 (en) 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US9754256B2 (en) 2010-10-19 2017-09-05 The 41St Parameter, Inc. Variable risk engine
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US10021099B2 (en) 2012-03-22 2018-07-10 The 41st Paramter, Inc. Methods and systems for persistent cross-application mobile device identification
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US9990631B2 (en) 2012-11-14 2018-06-05 The 41St Parameter, Inc. Systems and methods of global identification
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10341344B2 (en) 2018-06-22 2019-07-02 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification

Also Published As

Publication number Publication date
EP1386254A1 (en) 2004-02-04

Similar Documents

Publication Publication Date Title
US7942738B2 (en) Verifying a gaming device is in communications with a gaming server
EP2302523B1 (en) Enhanced service platform with secure system and method for subscriber profile customization
AU2004246586B2 (en) Speaker recognition in a multi-speaker environment and comparison of several voice prints to many
DE60036143T2 (en) Game system with location-examination
US7100822B2 (en) Lottery system
AU2009202841B2 (en) Responsible gaming system
US7266585B2 (en) Method and system for using screen names to customize interactive agents
US5937392A (en) Banner advertising display system and method with frequency of advertisement control
US7383572B2 (en) Use of public switched telephone network for authentication and authorization in on-line transactions
EP1275053B1 (en) A system and method to determine the validity of an interaction on a network
EP1489529A1 (en) Method and apparatus for prioritising a listing of information providers
AU725748B2 (en) Monitoring of remote file access on a public computer network
US6607137B2 (en) Method and apparatus for casting a vote from home on elections
US20020155891A1 (en) Advertisement distribution system and server
US20020065136A1 (en) Website promotional applet process
US5766076A (en) Progressive gaming system and method for wide applicability
US6409593B1 (en) Drawing for winners over the internet
US20100251344A1 (en) Controlling access to name service for a domain name system
US7801736B1 (en) System, method, and article of manufacture for locating and communicating with a patron at a hospitality facility
US20020078192A1 (en) Cookie manager for control of cookie transfer in internet client-server computer systems
KR100513264B1 (en) Internet browsing control method
US20030069935A1 (en) Junk mail rejection system
US7128652B1 (en) System, method, and article of manufacture for gaming from an off-site location
DE69838769T2 (en) System and method for anonymous personalized browsing in a network
US20030023547A1 (en) Method of facilitating participation in lotteries

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2001925267

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2001925267

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase in:

Ref country code: JP

WWW Wipo information: withdrawn in national office

Ref document number: 2001925267

Country of ref document: EP