Abstract:
An online machine data collection and archiving process generates a machine data profile of a customer computer accessing a transaction form of a merchant web site and links the machine data profile and a transaction record with customer identifying information using a unique transaction identification string. The process may capture parameters typically communicated as a part of web accesses, such as an IP address, an HTTP header, and cookie information. The process additionally causes the customer computer to process self-identification routines by processing coding within the merchant transaction form, the self-identification routines yielding further profile parameters. The process further includes a routine for bypassing an intervening proxy to the merchant web site to reveal the true IP address of the customer computer. Identifying the customer computer is useful for functions such as fraud detection and marketing.
Abstract:
An online machine data collection and archiving process generates a machine data profile of a customer computer accessing a transaction form of a merchant web site and links the machine data profile and a transaction record with customer identifying information using a unique transaction identification string. The process may capture parameters typically communicated as a part of web accesses, such as an IP address, an HTTP header, and cookie information. The process additionally causes the customer computer to process self-identification routines by processing coding within the merchant transaction form, the self-identification routines yielding further profile parameters. The process further includes a routine for bypassing an intervening proxy to the merchant web site to reveal the true IP address of the customer computer. Identifying the customer computer is useful for functions such as fraud detection and marketing.
Abstract:
A method and system for providing service over a communication network. The method includes establishing a plurality of virtual DNS servers that is supported by a DNS server. A plurality of target IP addresses is assigned for the plurality of virtual DNS servers. Each target IP address includes a first IP subaddress identifying the DNS server, and a second IP subaddress identifying a corresponding virtual DNS server. A plurality of network capable devices is uniquely assigned to the plurality of virtual DNS servers for domain name resolution. Each network capable device accesses the communication network through a corresponding network device associated with a corresponding source IP address. A service plan of a client is assigned to a first network capable device used by the client. The service plan is implemented through a DNS request under a session established between the first network capable device and its assigned first virtual DNS server. The session is uniquely identified by a combination of a first source IP address of a first network device used by the first network capable device to access the communication network, and a first target IP address of the first virtual DNS server.
Abstract:
A highly distributed architecture for implementing payments for access to pay-per-view information offered on a network, especially the Internet. The architecture includes elements that not only collect payment for access to the pay-per-view information but also make possible a refund of the payment in case a consumer requests and is granted a refund. The architecture allows for monitoring the conduct of consumers and information vendors to detect behavior that might be unscrupulous. The architecture also includes elements that provide for compensating an advertiser for advertising pay-per-view information provided by an information vendor and for recovering the compensation in the case of a refund. The architecture scales to meet consumer demand by allowing for many of the kind of element in the architecture responsible for the more computationally intensive work of arranging for access to the information, and of charging for the information.
Abstract:
A method for charging a consumer for access, over a network, to a vendor's information; in particular, a method for this pay-per-access over the Internet. The method uses a third-party, called a banker, to mint tokens identified with particular information a consumer might want to purchase. The tokens are immediately available to the consumer because of the consumer's having already established an account with the banker, and purchased what are here called credit units, which can have a value of only a fraction of a cent, allowing vendors to charge very little for access to their information. A token is pre-authorization for a consumer to pay for access for a particular page of information. In one embodiment, when a consumer makes a purchase, i.e. chooses to access a Web page for which a vendor makes a charge, the transaction is routed through the banker, which charges in credit units (those already on account), and credits the vendor account. The vendor later redeems for payment whatever credit units have been credited to the vendor's banker account, not necessarily only those credit units resulting from transactions with a particular consumer. In another embodiment, a vendor uses a franker to test if a token is valid; this enables the vendor to collect a token from a consumer and later redeem it for payment with a banker. The method also allows for a vendor and consumer to have accounts with different bankers.
Abstract:
Systems and methods for emotional augmentation of emotionless software by inference from user emotions comprise initiating a call with a participant in communication with a communication module of the computer. A first communication is received by the computer from the participant, the first communication comprising an emotion attribute comprising information about an emotional characteristic expressed by the participant. Additionally, evaluating, by the computer, the emotion attribute expressed by the participant from the first communication. An emotion feedback attribute is generated based on the emotion attribute to elicit a response from the participant. A second communication is output comprising the emotional expression attribute.
Abstract:
Online entities oftentimes desire to ascertain information about their audience members. To determine information about audience members and their activities, online transactions including information about transactions performed by audience members are collected. One or more audience analysis processes are applied to the online transactions to determine the collection of online transactions performed by a given audience member. With an accurate assignment of online transaction to the audience member, the audience member and associated transactions may be classified as a legitimate or illegitimate.
Abstract:
Online entities oftentimes desire to ascertain information about their audience members. To determine information about audience members and their activities, online transactions including information about transactions performed by audience members are collected. One or more audience analysis processes are applied to the online transactions to determine the collection of online transactions performed by a given audience member. With an accurate assignment of online transaction to the audience member, the audience member and associated transactions may be classified as a legitimate or illegitimate.
Abstract:
An online machine data collection and archiving process generates a machine data profile of a customer computer accessing a transaction form of a merchant web site and links the machine data profile and a transaction record with customer identifying information using a unique transaction identification string. The process may capture parameters typically communicated as a part of web accesses, such as an IP address, an HTTP header, and cookie information. The process additionally causes the customer computer to process self-identification routines by processing coding within the merchant transaction form, the self-identification routines yielding further profile parameters. The process further includes a routine for bypassing an intervening proxy to the merchant web site to reveal the true IP address of the customer computer. Identifying the customer computer is useful for functions such as fraud detection and marketing.
Abstract:
A system establishes virtual DNS servers that are supported by a DNS server. Target IP addresses are assigned for the virtual DNS servers. Network capable devices are uniquely assigned to the virtual DNS servers for domain name resolution. Each network capable device accesses the communication network through a corresponding network device associated with a corresponding source IP address. A client's service plan is assigned to a first network capable device used by the client. The service plan is implemented through a DNS request under a session established between the first network capable device and its assigned first virtual DNS server. The session is uniquely identified by a first source IP address of a first network device used by the first network capable device to access the communication network and a first target IP address of the first virtual DNS server.