US20130218713A1 - Method for Providing Information and Recommendations Based on User Activity - Google Patents

Method for Providing Information and Recommendations Based on User Activity Download PDF

Info

Publication number
US20130218713A1
US20130218713A1 US13/781,467 US201313781467A US2013218713A1 US 20130218713 A1 US20130218713 A1 US 20130218713A1 US 201313781467 A US201313781467 A US 201313781467A US 2013218713 A1 US2013218713 A1 US 2013218713A1
Authority
US
United States
Prior art keywords
user
data
computer
activity data
profiler
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/781,467
Inventor
Elliot A. Gottfurcht
Grant E. Gottfurcht
Shawn C. Dunn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Personal Data Network Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US13/781,467 priority Critical patent/US20130218713A1/en
Assigned to PERSONAL DATA NETWORK CORPORATION reassignment PERSONAL DATA NETWORK CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DUNN, SHAWN C., GOTTFURCHT, ELLIOT A., GOTTFURCHT, GRANT E.
Publication of US20130218713A1 publication Critical patent/US20130218713A1/en
Priority to US14/298,620 priority patent/US20140289220A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H70/00ICT specially adapted for the handling or processing of medical references
    • G16H70/40ICT specially adapted for the handling or processing of medical references relating to drugs, e.g. their side effects or intended usage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • G06F16/43Querying
    • G06F16/435Filtering based on additional data, e.g. user or group profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/105Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3576Multiple memory zones on card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0224Discounts or incentives, e.g. coupons or rebates based on user history
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0631Item recommendations
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H20/00ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
    • G16H20/10ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H20/00ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
    • G16H20/30ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to physical therapies or activities, e.g. physiotherapy, acupressure or exercising
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H20/00ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
    • G16H20/60ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to nutrition control, e.g. diets

Definitions

  • the invention relates to a method for customizing searches of the internet. More specifically, the invention relates to a method for searching the internet and providing customized recommendations responsive to a user's real world activities.
  • the internet is ubiquitous in popular culture. As more and more people go on-line and begin experiencing what the internet has to offer, more and more people are becoming frustrated with the huge amount of data available for consumption via the enormous number of web sites existing in cyberspace. This includes users at home or at work using the internet to pursue hobbies, do homework, do research for school or work projects, etc.
  • a common method of finding information on the internet is by using one of the plethora of internet web search engines, e.g., ALTAVISTA.COM, GO.COM, and GOTO.COM.
  • ALTAVISTA.COM After entering key words describing a concept, thing or event, a multitude of web sites are provided to the user.
  • all but the most specialized requests return at least hundreds, typically thousands, and often tens of thousands of web sites.
  • the order in which the web sites are presented is determined by rules at the search engine or randomly.
  • One such rule is based on fees paid by web sites to be listed with the search engine such that the entities paying the larger sums have their web sites displayed on the top of the list provided to the user, e.g., GOTO.COM.
  • web sites provide a rudimentary customization of information for the user. These rudimentary customizations are, however, limited to selection and organization of the information available on the particular web sites and not over the entire internet.
  • shopping web sites allow users to select favorite product areas, choose favorite designers and manufacturers, specify user information such as sizes and colors, etc. (e.g., BLUEFLY.COM).
  • Other examples include news sites which display categories of news based on user specified interest areas and user information such as geographical location. (e.g., MYPAGE.GO.COM).
  • Internet activity of users is monitored by various companies that track usage patterns of internet web surfers. Web site operators use this information to direct adds to users based on typical web surfing patterns. These advertisements are, thus, responsive to users' interests as reflected in web site visitations. However, consumers and businesses do not have access to this information.
  • a method for providing recommendations to a user based on user activity A plurality of activity data tracking a plurality of activities of a user is obtained.
  • the activity data may be obtained over a wide area network such as the internet or downloaded from a data card which stores activity data whenever the user participates in an activity.
  • the activity data is either stored on the data card or transmitted over the network whenever the user uses a card when participating in any activity such as when making a purchase of goods, paying for services, watching television, etc.
  • the activity data is processed to identify a plurality of user patterns.
  • the user patterns are used to form a user profile and may include user habit data. Recommendations specific to the user based on the user patterns are then created for and provided to the user.
  • the recommendations are provided to a user when the user logs onto a computer network such as the internet.
  • the recommendations may also be provided by electronic mail, electronic pager or other methods.
  • the recommendations are provided by various data analysis techniques including rule based inference engines and other forms of artificial intelligence.
  • FIG. 1A illustrates the activities performed by a profiler system user.
  • FIG. 1B illustrates an example of the information and recommendations provided to a profiler system user after logging on to the profiler system.
  • FIG. 1C illustrates another example of the information and recommendations provided to a profiler system user after logging on to the profiler system.
  • FIG. 2A illustrates the activities performed by a profiler system user in which financial transaction information and activity data are communicated via the internet.
  • FIG. 2B illustrates the activities performed by a profiler system user and group manager in which financial transaction information and activity data are communicated via the internet.
  • FIG. 3A illustrates the activities performed by a profiler system user in which financial transaction information and activity data are stored on a data card.
  • FIG. 3B illustrates the activities performed by a profiler system user and group manager in which financial transaction information and activity data are stored on a data card.
  • FIG. 4 illustrates various devices connected to the internet and other devices with which the profiler system is used.
  • FIG. 5 illustrates the point of sale activities of a profiler system provider.
  • FIG. 6A illustrates the activities of a profiler system profiler server when initializing a profiler system user.
  • FIG. 6B illustrates the activities of a profiler system profiler server when initializing a profiler system group.
  • FIG. 6C illustrates the activities of a profiler system profiler server when used by a single user.
  • FIG. 6D illustrates the activities of a profiler system profiler server when used by a group and a group manager.
  • the data card is a transportable recordable medium (TRM) known to those skilled in the art.
  • TRM transportable recordable medium
  • the TRM may include a magnetic strip containing data and a writeable memory device.
  • the TRM may be comprised of a writeable memory device.
  • the TRM may also include transmitting and receiving means for sending and receiving the data stored on the memory device portion of the TRM.
  • the user presents the data card, and information about the activity is either stored on the card or transferred over the internet to a profiler server.
  • the profiler system then provides customized data and web site references to the user.
  • the profiler may also be used to assist groups such as groups of neighbors or relatives, or a business. In such embodiments, the profiler can search and locate bulk discounts and automatically request bids for goods and services regularly purchased based on group members' real world activities.
  • FIG. 1 illustrates the activities performed by a profiler system user.
  • every provider of any and all goods, services, entertainment, etc. maintains a cash register or computer coupled with or including a device to read, and in some embodiments, write, to the data card.
  • Devices for reading from and writing to the data card are denoted p-boxes, short for profiler boxes.
  • the p-boxes allow for reading from and/or writing to, and in some embodiments transmitting data to and receiving data from, the data card.
  • the user whenever a user makes a purchase at a retail establishment, pays for services rendered, etc., the user presents the data card, swipes the card at a p-box, that is, slides it through a data card reader, as shown in block 10 .
  • the user After swiping the card, the user then authorizes access to the data card and its features. In one embodiment, this is achieved by the user entering a personal identification number (PIN), such as by typing onto a key pad, as shown in block 12 . The PIN is then compared to an encoded, previously stored PIN on the data card or stored on the profiler server. In another embodiment, a finger print of the user is scanned and compared with data stored either on the data card or on the profiler server to authenticate use of the data card. In addition, in other embodiments, authorization may be achieved by any method known to those skilled in the art, including but not limited to retinal scan and voice print recognition.
  • the data card is swiped in addition to making payment by any traditional method. That is, the data card is swiped in addition to swiping a credit card or debit card or paying with cash or bank check.
  • activity data reflecting the activity is transferred to a profiler server via a wide are network (WAN) such as the internet, as shown in block 14 .
  • WAN wide are network
  • this transfer of activity data is transparent to the user.
  • transmission of activity data over the internet may be done securely by any encryption method known to those skilled in the art. In this way, the user's activity data remains private.
  • Activity data provides details about the activity entered into by the user.
  • activity data may include retail transaction data such as what items were purchased in what quantity and at what price. For example, when grocery shopping, each item purchased, the quantity of the items, and the price for the items is included as activity data.
  • service provider data such as what service was provided and at what price. Examples of services are numerous and include car wash, hair cut, gardening, maid service, plumbing repair, roof repair, and so on. If when making a purchase the user wants to keep the activity private or hidden from the profiler system, all the user need do is not swipe the data card.
  • the user After participating in some activities, the user then goes home and, in one embodiment, inserts the data card at a p-box attached to the user's personal computer, as shown in block 16 .
  • the user's computer may be any computing device such as a cellular telephone, portable computer, electronic personal organizer, desktop computer, dedicated internet device, etc. with access to a WAN such as the internet.
  • the location of the personal computing device is not limited to the home, but may be any location convenient to the user, including, but not limited to home, car, office, shopping mall, park, beach, etc.
  • a user's computer includes a p-box.
  • the p-box may be included in or attached to the user's computing device.
  • the user then authorizes access to the data card and the profiler system.
  • the user achieves this authorization by entering a PIN and logging on to the profiler server via the internet, as shown in block 18 .
  • the user is automatically provided web sites, recommendations and other relevant information as shown in block 20 .
  • the web sites and recommendations provided by the profiler server are customized to the user and are based on user patterns such as buying habits, eating habits, entertainment habits, and others culled from examining and processing the user's activity data.
  • the data card is not just read but is written to when the user pays for good or services, or pays for entertainment or participates in any activity.
  • the p-boxes are data card readers/writers. Whenever a user makes a purchase at a retail establishment, pays for services rendered, etc., the user presents the data card by inserting it into a provider p-box, as shown in block 22 . After inserting the data card, the user then authorizes access to the data card and its features. In one embodiment, this is achieved by entering a PIN, as shown in block 24 .
  • the data card is used in addition to making payment by any traditional method. In such an embodiment, activity data reflecting the activity is transferred to the user's data card, as shown in block 26 .
  • activity data providing details about the activity is written onto the data card according to any method known to those skilled in the art.
  • activity data is stored securely on the data card by any encryption method known to those skilled in the art. In this way, the user's activity data is protected from dissemination in the event the card is lost or stolen. As above, if when making a purchase the user wants to keep the activity hidden, all the user need do is not insert the data card.
  • the data card of the profiler system may also be used when participating in activities for which no payment is made.
  • a data card when watching television, a data card is placed in the television and activity data is either stored on the card or transmitted to the profiler server.
  • activity data includes the program watched, the channel watched, the time of day the program aired, and the length of time the television was turned on.
  • the user when using a television connected to a video tape player, video disc player, cable box or satellite dish, the user places the data card in a data card enabled video tape player, video disc player, cable box or satellite box such that activity data regarding the programs watched is recorded onto the data card.
  • the activity data is transmitted to the profiler server over the internet via any connection to the internet known to those skilled in the art, including, but not limited to a television cable, a satellite connection, a digital subscriber line (DSL), lines, etc.
  • DSL digital subscriber line
  • the data card when in a motor vehicle such as a car or truck.
  • information about the vehicle's systems and use of the vehicle is stored on the data card.
  • the activity data may include, but is not limited to, at what time of day the vehicle is driven, for what period of time the vehicle is in operation, and for what distance the vehicle is driven.
  • the data card is used as an access device such that the car cannot be started unless the data card is inserted into a data card receiver located in the vehicle.
  • a PIN or other form of authorization may also be required in conjunction with the data card to allow for starting the motor vehicle.
  • the telephone includes a data card receiver that records activity data about the phone calls made.
  • activity data may include, but is not limited to, the phone numbers called, the length of the call, and the telephone carrier used.
  • the data card is used as an access device such that the telephone cannot be used unless the data card is inserted into a data card receiver located in the phone.
  • a PIN or other form of authorization may also be required in conjunction with the data card to allow for using the telephone.
  • the user After participating in some activities, the user then goes home and inserts the data card at a p-box attached to the user's personal computer, as shown in block 30 .
  • the user then authorizes use of the profiler system by entering a PIN or performing another foam of authorization when logging on to the profiler application program on the user's computer, as shown in block 32 .
  • the activity data is uploaded from the data card to the user's computer, as shown in block 34 .
  • the uploading is automatic and may be hidden from the user.
  • the profiler application program asks the user if the user would like to transfer activity data from the data card to the user's computer.
  • the new activity data is then uploaded from the user's computer to the profiler server, as shown in block 36 .
  • the uploading is automatic and may be hidden from the user.
  • the profiler application program asks the user if the user would like to transfer activity data from the user's computer to the profiler server.
  • the user Upon connecting to the profiler server, and after uploading new activity data, the user is automatically provided web site recommendations and other relevant information tailored to the user, as shown in block 20 .
  • the customized web site recommendations and other data are reflective of the user's lifestyle and are based on the user profile which is culled from the activity data, and derived, inferred and extrapolated from user patterns and habits.
  • user profile data provided by the user may also be used in determining the recommendations and data.
  • the web sites are arranged on the user's screen grouped in categories and may be placed in multi-layered folders, or arranged in other ways known to those skilled in the art.
  • the user may customize how and in what format or organization the recommendations and information are displayed.
  • the arrangement is based on examination and evaluation of user patterns culled from the activity data.
  • the arrangement is designated by the user in a user profile and determined by the profiler server in conjunction with the user's interests based on examination and evaluation of user patterns culled from the activity data. The user then proceeds to investigate the various web sites listed and view the recommendations and relevant data, as shown in block 20 .
  • Examples of web site recommendations and relevant data which the user receives are numerous.
  • text and/or graphical icons are displayed representing categories or groupings of recommendations and data, and the user selects a category or grouping by clicking on the text or icon according to methods known to those skilled in the art. For example, in one embodiment when the user clicks on the entertainment category, the user receives a list of recommended newly released compact discs, upcoming concerts, upcoming television and cable shows of interest, as well as information about favorite entertainers. In one embodiment, this information may be displayed immediately, or in another embodiment, a grouping of icons representing sub-categories may appear from which the user chooses by clicking on to obtain the information listed in the prior sentence. In yet another embodiment, textual information of interest will be displayed adjacent to links to related web sites.
  • the recommendations and information provided are reflective of the user's habits and interests as they are derived from the user's activity data, user patterns, habit data and/or the user profile.
  • FIG. 1B illustrates an example of the information and recommendations provided to a profiler system user after logging on to the profiler system.
  • a portion of the user's display contains a list of categories or groupings including, but not limited to, shopping, entertainment, health, business, news, computers, food, events and friends, as shown in block 1 .
  • the list may not be a list, but may be a grouping of icons. After selecting “shopping” by clicking on the text or an icon representation, the user then sees a new list of sub-categories, this one comprising recent purchases, suggestions, coupons, sales, and history, as shown in block 2 .
  • a list of stores at which the user recently shopped is displayed, as shown in block 3 . If the user clicks on “Vons”, a new list of sub-sub-categories is displayed showing receipt, compare, suggestions, coupons, and shopping list, as shown in block 4 . If the user selects “compare”, in one embodiment, the profiler system takes the most recent Vons purchases, obtains prices for the same items from other local grocery stores, as well as one on-line merchant, and provides the results to the user, as shown in block 5 . In this embodiment, the distance from the particular stores is also displayed, and with regard to the on-line store, the user only needs to click on the total (or other associated region of the on-line merchant area of the display) to initiate purchasing the same items that were recently purchased at Vons.
  • FIG. 1C illustrates another example of the information and recommendations provided to a profiler system user after logging on to the profiler system.
  • the user selects “health” by clicking on the text or a health icon from a list or grouping of icons representing categories, as shown in block 6 .
  • the user is then presented with a list or grouping of sub-categories and selects “WARNINGS”, as shown in block 5 .
  • the profiler system then provides a window or display area that lists health warnings, as shown in block 8 .
  • the profiler system determined from the activity data that the user was prescribed and/or had purchased the drug Nizrol.
  • the profiler system then processed this information, issued internet queries and consulted its own database, and provided a drug warning concerning the side effects of the drug.
  • the profiler system also cross-referenced certain data it received about the drug with the user's recent activity data, which included an ice cream purchase, and prepared a warning about when the medication should be taken. That is, because retrieved drug data stated that the medication should not be taken with milk products, the profiler system issued a warning to the user not to take the drug when eating recently purchased ice cream.
  • the user upon logging on to the profiler system, the user is also provided email messages providing recommendations and relevant information based on user patterns and habit data derived and extrapolated from the activity data.
  • email may be sent to the user at any time, and the user receives such email when checking email by any method known to those skilled in the art, such as for example, via cellular telephone or other portable computing device.
  • the user may receive electronic pages or other transmissions from the profiler system via any method known in the art, including email, that provide pertinent information and recommendations.
  • the information and recommendations may be, for example, airline flight time data, an alert not to eat certain purchased food based on health data, or product recall notice information regarding recently purchased products.
  • the user's email may be sorted into categories by the profiler system, directed into themed groupings and presented with and under the categories of information and recommendations provided when logging on.
  • the user's email may be sorted and stored by the profiler system as themed mail boxes or stored under themed icons in the mailer program.
  • the user can choose from various personal analysis programs to evaluate the user's buying and other habits.
  • the personal analysis programs are provided as plug-ins to the profiler application program such that additional plug-ins can be either purchased or downloaded by the user.
  • the personal analysis programs are provided by the profiler server as special purpose mini-application programs, such as JAVA applets, that are downloaded when the user requests a particular personal analysis program.
  • the personal analysis programs evaluate data stored on the user's personal computer.
  • the personal analysis programs evaluate data stored on or uploaded to the profiler server.
  • An example of a personal analysis program is a personal accounting profiler.
  • the user Upon obtaining and running the personal accounting profiler, in one embodiment, the user invokes the personal accounting profiler from a pull-down menu and/or by clicking on a graphically displayed icon.
  • the personal accounting profiler opens on the user's screen, the user may request it to perform any one of a number of typical and helpful accounting tasks.
  • the user requests the personal accounting profiler to examine activity data to determine the amount of money spent in one of a plurality of categories, including, but not limited to, dining out, gasoline, entertainment, video rentals, etc. over a specified period of time, such as the last week, last month, last year, or a defined period with a start and end date.
  • the user interface may be any interface known to those skilled in the art including, but not limited to, pull-down menus, text tags adjacent to buttons, pull-down bars, sliders, etc.
  • other analysis options may be provided, such as to provide all potential tax deductions as derived from the activity data.
  • the personal accounting profiler runs while the user is connected to the internet, and the activity data is obtained from a profiler server.
  • the user need not be connected to the internet when running the personal accounting profiler, and activity data is accessed from the user's personal computer.
  • a personal analysis program is a personal shopping profiler.
  • the user Upon obtaining and running the personal shopping profiler, in one embodiment, the user invokes the personal shopping profiler from a pull-down menu and/or by clicking on a graphically displayed icon.
  • the personal shopping profiler opens on the user's screen, the user may request it to perform any one of a number of helpful analysis tasks.
  • the user requests the personal shopping profiler to examine activity data to determine the amount of money spent on one of a plurality of categories or kinds of clothing, including, but not limited to, shirts, blouses, pants, suits, underwear, panties, ties, shoes, dress shoes, athletic wear, athletic shoes, dress shoes, etc.
  • the personal shopping profiler may also allow or analysis of brands purchased, or provide a list of all items purchased manufactured by a specified company or from a specified retailer. More detailed analysis may also be provided such as providing a list of all clothing purchased made from cotton, from where it was purchased, and when; or providing a list of what foods containing milk were purchased, from what store, and when.
  • the personal shopping profiler runs while the user is connected to the internet, and the activity data is obtained from a profiler server.
  • the user need not be connected to the internet when running the personal shopping profiler, and activity data is accessed from the user's personal computer.
  • the user requests analysis from the profiler system, either the profiler server or the profiler application program, as shown in block 40 .
  • the personal analysis program runs, and the user then reviews the data provided, as shown in block 42 .
  • the user may request a web search from the profiler server, as shown in block 44 .
  • the profiler filters and evaluates the multitude of web pages responsive to the search and only provides the most pertinent web sites to the user based on the user patterns culled from the activity data.
  • the user then reviews the web sites provided by the profiler server, as shown in block 46 .
  • the user after entering basic user data into a user profile upon initially using the profiler system, or, in another embodiment, after the profiler server has created a user profile for the user, the user has the opportunity to update the user profile data whenever the user chooses, as shown in block 48 .
  • a user may choose to update the user profile for any number of reasons, such as to change a work or home address, to change color or brand preferences, to change weight or size information, etc.
  • the user profile is discussed in more detail below with regard to the profiler server.
  • FIG. 2A illustrates the activities performed by a profiler system user in which financial transaction information and activity data are communicated via the internet.
  • the data card is used to make a payment similar to a traditional transaction involving a credit card or a debit card.
  • the user when making any payment, the user presents the data card and swipes the card at a box, as shown in block 50 . After swiping the card, in one embodiment the user then authorizes access to the data card and its features by entering a PIN or performing another form of authorization, as shown in block 52 . The user then is provided with a list of accounts from which to choose. Payment for the transaction will then be taken from or debited to the selected account.
  • the list of accounts is obtained from the profiler server over the internet.
  • the accounts are any accounts the user has previously selected to be accessible via the data card when setting up or editing a user profile.
  • the accounts may be credit card accounts, bank checking accounts, bank savings accounts, money market or any other accounts from any number of financial institutions or entities.
  • the user selects an account to be used for payment of the transaction, as shown in block 54 .
  • the user then approves the transaction, as shown in block 56 , by, in one embodiment, responding to a question displayed on a screen asking the user to confirm that a specified total amount of the transaction will be drawn from the specified account.
  • information about the financial transaction is transmitted to the financial institution over the internet, as shown in block 58 .
  • activity data is transferred to a profiler server via the internet, as shown in block 60 .
  • the transmission to the financial institution and the profiler server may both be hidden from the user.
  • the user After participating in some activities, the user then goes home and inserts the data card at a p-box attached to the user's personal computer, as shown in block 62 .
  • the user then authorizes access to the profiler system by entering a PIN or performing another form of authorization when logging on to the profiler server via the internet, as shown in blocks 64 and 66 .
  • activity data that has been collected by the profiler server when the user was participating in activities is automatically downloaded to the user's computer, as shown in block 68 .
  • activity data is only temporarily stored on the profiler server so that only the user maintains a full set of activity data such that only the user has access to and control of the personal activity data.
  • the profiler server maintains only user habit data, user patterns, and/or the user profile. This provides added privacy to the system so that a user does not worry about what continued use the profiler server is making of the activity data.
  • the user may select and delete activity data items on the user's personal computer. In this way sensitive, personal activity data of any kind can be removed so that no one has access to it.
  • the user Upon logging on to the profiler system, the user is then automatically provided web sites, recommendations and other information tailored to the user, as shown in block 70 .
  • the user may choose what kind of access should be allowed to the data card during the current transaction or activity.
  • the user may want to opt out of the payment function of the data card.
  • the user chooses whether payment will be made via the data card or will be made external to the data card, that is by a traditional method such as credit card, debit card, cash or bank check.
  • the password entered by the user automatically designates the level of use of the data card.
  • the user may set passwords which, when entered, automatically block access to financial accounts while allowing access to basic personal information and causing activity data to be stored on the data card and/or transferred.
  • one password may allow access to health and medical information stored on the data card; another may allow access to health and medical information as well as financial data; yet another may only allow for activity data to be transferred over the internet to the user's account on a profiler server or onto the data card; and yet another may allow for financial data to be accessed and for activity data to be transferred.
  • FIG. 2B illustrates the activities performed by a profiler system user and group manager in which financial transaction information and activity data are communicated via the internet.
  • the profiler system user is a member of a group.
  • a group may be a business entity such that the group members are employees and staff.
  • a group may be a collection of neighbors from a neighborhood.
  • the group may be a collection of relatives.
  • the group may be a collection of businesses such that there are sub-groups of businesses.
  • a data card is used to make a payment similar to a traditional transaction involving a credit card or a debit card.
  • the user when making any payment, the user presents the data card and swipes the card at a p-box, as shown in block 51 . After swiping the card, in one embodiment the user then authorizes access to the data card and its features by entering a PIN or performing another form of authorization, as shown in block 53 . The user then is provided with a list of accounts from which to choose. Payment for the transaction will then be taken from or debited to the selected account.
  • the list of accounts in one embodiment, is obtained from the profiler server over the internet.
  • the accounts are any accounts the user has previously selected to be accessible via the data card when setting up or editing a user profile.
  • the accounts may be credit card accounts, bank checking accounts, or any other accounts from any number of financial institutions or entities.
  • the user is only provided the accounts to which the user has been granted access. In another embodiment, if there is only one account, this step may be skipped.
  • only the particular user's accounts may be provided to the particular user such that privacy is maintained by the group members.
  • the particular user is only provided a list of accounts to which the particular user has been given access. In other embodiments, both business and personal accounts may be listed.
  • the user selects an account to be used for payment of the transaction, as shown in block 55 .
  • the user then approves the transaction, as shown in block 57 , by, in one embodiment, responding to a question displayed on a screen asking the user to confirm that a specified total amount of the transaction will be drawn from the specified account.
  • information about the financial transaction is transmitted to the financial institution over the internet, as shown in block 59 .
  • activity data is transferred to a profiler server via the internet, as shown in block 61 .
  • the transmission to the financial institution and the profiler server may both be hidden from the user.
  • the user After participating in some activities, the user then goes home or to work (or any other location) and inserts the data card at a p-box attached to the user's computer, as shown in block 63 A.
  • the user then authorizes access to the profiler system by entering a PIN or performing another form of authorization when logging on to the profiler server via the internet, as shown in blocks 65 A and 67 A.
  • the user Upon logging on to the profiler system, the user is then automatically provided web sites, recommendations and other information tailored to the user, as shown in block 71 A.
  • the user may choose what kind of access should be allowed to the data card and activity data during the current transaction or activity.
  • the password entered by the user automatically designates the level of use of the data card.
  • the user when initializing the card, the user may set passwords which, when entered, automatically block access to financial accounts while allowing access to basic personal information and causing activity data to be stored on the data card and/or transferred.
  • there may be multiple levels of access to the card based on a plurality of passwords.
  • one password may allow access to health and medical information stored on the data card; another may allow access to health and medical information as well as financial data; yet another may only allow for activity data to be transferred over the internet to the user's account on a profiler server or onto the data card; and yet another may allow for financial data to be accessed and for activity data to be transferred.
  • other passwords will automatically block transfer of activity data from the group account on the profiler system but allow transfer of the activity data to the user's personal account on the profiler system.
  • a group manager or multiple group managers are designated.
  • the group manager is given access to the group activity data and recommendations and other information provided by the profiler system.
  • the group manager accesses the profiler system when at home or at work (or any other location) by first inserting the data card at a p-box attached to the group manager's computer, as shown in block 63 B.
  • the group manager then authorizes access to the profiler system by entering a PIN or performing another form of authorization when logging on to the profiler server via the internet, as shown in blocks 65 B and 67 B.
  • group's activity data that has been collected by the profiler server when the group members were participating in activities is automatically downloaded to the group manager's computer, as shown in block 69 B.
  • group activity data is only temporarily stored on the profiler server so that only the group manager maintains a full set of activity data such that only the group manager has access to and control of the group activity data.
  • the profiler server maintains only group habit data, group patterns, and/or the group profile. This provides added privacy to the system so that a group manager does not worry about what continued use the profiler server is making of the group activity data.
  • the group manager may select and delete activity data items on the group manager's computer.
  • group activity data of any kind can be removed so that no one has access to it.
  • this provides for removing of aberrant and un-ordinary group member activity data within the group activity data.
  • FIG. 3A illustrates the activities performed by a profiler system user in which financial transaction information and activity data are stored on a data card.
  • the data card is used to make a payment similar to a traditional transaction involving a credit card or a debit card.
  • the user when making any payment, the user inserts the data card at a p-box, as shown in block 72 . After inserting the card, the user then authorizes access to the data card and its features by entering a PIN or performing another form of authorization, as shown in block 74 . The user then is provided with a list of accounts from which to choose. Payment for the transaction will then be taken from or debited to the selected account.
  • the list of accounts in this embodiment, is obtained from financial data securely stored on the data card.
  • the accounts are any accounts the user has previously selected to be accessible via the data card when setting up or editing a user profile.
  • the accounts may be credit card accounts, bank checking accounts, bank savings accounts, money market or other accounts from any number of financial institutions or entities.
  • the user selects an account to be used for payment of the transaction, as shown in block 76 .
  • the user then approves the transaction, as shown in block 78 , by, in one embodiment, responding to a question displayed on a screen asking the user to confirm that a specified total amount of the transaction will be drawn from the specified account.
  • financial account data on the data card is updated such that information about the financial transaction is written to the data card, as shown in block 80 .
  • activity data is transferred to the data card, as shown in block 82 . Updating financial account data and transferring activity data may both be hidden from the user.
  • the user After participating in some activities, the user then goes home and inserts the data card at a p-box attached to the user's computer, as shown in block 84 .
  • the p-box allows for reading from and writing to the data card.
  • the user is prompted to and authorizes access to the profiler system by entering a PIN or performing another form of authorization, as shown in block 86 .
  • the user then logs on to the profiler server via the internet, as shown in block 88 .
  • transaction information regarding all recent financial transactions is stored on the user's computer and transferred to the user's financial institutions via the internet, as shown in block 90 ; and (2) activity data is automatically uploaded from the data card and stored on the user's computer, erased from the data card, and transferred to the profiler server, as shown in block 92 .
  • the user logs on to the profiler application program without connecting to the internet, and both transaction data and activity data are automatically uploaded from the data card, stored on the user's computer, and erased from the data card.
  • the transaction data and the activity data will then be transferred to the profiler server.
  • a benefit to erasing the activity data from the data card during uploading is added privacy and security. That is, when a user regularly transfers activity data from the data card to the user's personal computer and/or the profiler server, the activity data on the card is erased such that at any given time, there will only be a limited amount of activity data stored on the data card. This increases privacy and security such that, in the event the card is lost or stolen, only a small amount of activity data will be present on the card, namely the activity data stored since the last time the user uploaded the activity data from data card. In practice, this will typically be, at most, one day's worth of data.
  • the user is then automatically provided web sites, recommendations and other relevant data tailored to the user, as shown in block 94 .
  • the profiler system may also be used with groups of users.
  • the profiler system user is a member of a group.
  • a group may be a business entity such that the group members are employees and staff.
  • a group may be a collection of neighbors from a neighborhood.
  • the group may be a collection of relatives.
  • the group may be a collection of businesses such that there are sub-groups of businesses.
  • the data card is used to make a payment similar to a traditional transaction involving a credit card or a debit card.
  • the group member is a user, and the processing that occurs is that same as with regard to FIG. 3A .
  • the user of the profiler system When the user of the profiler system is a member of a group, the user may choose from one of multiple accounts, as shown in block 76 . However, in one embodiment, the user first selects between personal and group accounts. In one embodiment, the choice may be between personal accounts and business or work accounts.
  • the profiler server upon connecting to the profiler server two things occur, both of which may be hidden from the user: (1) transaction information regarding all recent financial transactions is stored on the user's computer and transferred to the user's and/or group's financial institutions via the internet, as shown in block 91 ; and (2) activity data is automatically uploaded from the data card and stored on the user's computer, erased from the data card, and transferred to the profiler server, as shown in block 93 .
  • the user's activity data is directed either or both to the user's profiler system account and/or the group's profiler system account.
  • Such routing of the activity data may be determined by which passwords were used by the user when using the data card or in other embodiments, based on the account selected for payment of the transaction, or any other method. In this way, the data card can be used for personal and group purposes. In other embodiments, the data card may be restricted to home or group uses.
  • the user logs on to the profiler application program without connecting to the internet, and both transaction data and activity data are automatically uploaded from the data card, stored on the user's computer, and erased from the data card.
  • the transaction data and the activity data will then be transferred to the profiler server.
  • a benefit to erasing the activity data from the data card during uploading is added privacy and security. That is, when a user regularly transfers activity data from the data card to the user's personal computer and/or the profiler server, the activity data on the card is erased such that at any given time, there will only be a limited amount of activity data stored on the data card.
  • FIG. 3B illustrates the activities performed by a profiler system user and group manager in which financial transaction information and activity data are stored on a data card.
  • the profiler system user is a member of a group.
  • a group such as a business or non-business group
  • a group manager or multiple group managers are designated.
  • the group manager is given access to the group activity data, offers from suppliers to provide goods and services, recommendations and other information provided by the profiler system.
  • the group manager when at home or at work (or any other location) inserts the data card at a p-box attached to the group manager's computer, as shown in block 97 .
  • the group manager then authorizes access to the profiler system by entering a PIN or performing another form of authorization when logging on to the profiler server via the internet, as shown in blocks 99 and 101 .
  • group activity data that has been collected by the profiler server when the group members were participating in activities is automatically downloaded to the group manager's computer, as shown in block 103 .
  • group activity data is only temporarily stored on the profiler server so that only the group manager maintains a full set of activity data such that only the group manager has access to and control of the group activity data.
  • the profiler server maintains only group habit data, group patterns, and/or the group profile.
  • the group manager may select and delete activity data items on the group manager's computer. In this way, sensitive, group activity data of any kind can be removed so that no one has access to it. In addition, this provides for removing of aberrant and un-ordinary group member activity data within the group activity data.
  • the group manager Upon logging on to the profiler system, the group manager is then automatically provided offers by providers of goods and services, recommendations and other information tailored to the group and based on the group's activity data, as shown in block 105 .
  • FIG. 4 illustrates various devices connected to the internet and other devices with which the profiler system is used.
  • various devices including p-boxes, are connected to the internet or other wide area network.
  • a data card reader/writer 110 is attached to a retailer's computer or cash register 112 which is connected to the internet 100 .
  • a data card reader/writer 114 is attached to a service provider's computer or cash register 116 which is connected to the internet 100 .
  • a data card reader/writer 124 is attached to a user's computer which is connected to the internet.
  • a data card reader/writer 125 is attached to a group manager's computer which is connected to the internet.
  • the profiler server 130 is likewise connected to the internet. Although only one retailer computer, one service provider computer, one user computer, one group manager computer, and one profiler server are depicted, multiple retailer computers, multiple service provider computers, multiple user computers, multiple group manager computers and multiple profiler server computers are contemplated in various embodiments. In addition, various financial institution computers 132 and web sites 134 are also connected to the internet, although only one of each are depicted.
  • the user's television apparatus 122 includes or is coupled to a data card reader/writer.
  • the television apparatus 122 includes, but is not limited to, televisions, video disc players, video tape players, cable television boxes, satellite television boxes, etc. which are connected to the internet.
  • the user's computer 126 may connect to the profiler server 130 over dial up connection 128 .
  • the group manager's computer 127 may connect to the profiler server 130 one of various connections depicted as connection 129 , including, but not limited to a local area network (LAN), WAN, or dial up connection.
  • LAN local area network
  • WAN wide area network
  • each of the retailer computer 112 , service provider computer 116 , and financial institution computer 132 may have direct leased line or dial-up connections to the profiler server 130 or one another in addition to or in place of the internet connection depicted.
  • the connections to the internet may be by any method known to those skilled in the art including fiber optic cable, twisted pair, infra-red, radio frequency bands, cellular phone frequency bands, or other method.
  • the internet 100 is depicted, any WAN may be used.
  • a data card reader/writer 140 is attached to a user's automobile 142 which may or may not be connected to the internet 100 .
  • the data card reader/writer 140 may be attached to or manufactured as part of a user's automobile 142 or any other system contained in the user's automobile.
  • a data card reader/writer 144 is attached to a user's telephone 146 which may or may not be connected to the internet 100 .
  • data card reader/writer 144 When the user's telephone 146 does not have a connection to the internet 100 by any method known to those skilled in the art, various data about the user's use of the user's telephone 146 is stored on the data card via data card reader/writer 144 .
  • the data card reader/writer 144 may be attached to or manufactured as part of a user's telephone 146 .
  • the telephone and automobile embodiments are described in more detail hereinabove.
  • FIG. 5 illustrates the point of sale activities of a profiler system provider.
  • a user of the profiler system presents a data card to a provider when involved with any kind of monetary transaction.
  • the provider may be a provider of goods or services.
  • the provider maintains a provider system comprised of a computer or cash register including or coupled to a p-box such that the computer or cash register is connected to the internet, or other WAN.
  • the provider After the provider receives the data card, as shown in block 150 , the provider prompts the user to authenticate use of the card and access to the profiler system such as by entering a PIN on a key pad or by any other method of authorization, as shown in block 152 .
  • authentication is achieved by comparing the PIN with an encoded number stored on the data card or on the profiler server.
  • a finger print scanning device (not shown) is also coupled to the computer of the provider to scan the user's finger print and compare it with data stored either on the data card or on the profiler server.
  • authentication may be achieved in other embodiments by any method known to those skilled in the art, including but not limited to retinal scan and voice print identification.
  • the provider system After authentication is completed, the provider system, in one embodiment, obtains a list of the user's financial accounts from the data card, as shown in block 156 . In another embodiment, the provider system reads certain financial data from the data card and obtains a list of the user's financial accounts over the internet by communicating with the profiler server, as shown in block 158 . The provider system then displays the list of financial accounts to the user and prompts the user to choose which financial account will be accessed to pay for the current transaction, as shown in block 160 . The provider system receives an account choice from the user, as shown in block 162 , and then asks the user to accept the financial transaction involving the account choice, as shown in block 164 .
  • the provider system obtains authorization for the financial transaction from the financial institution serving or providing the financial account chosen by the user, as shown in block 166 .
  • the authorization causes information concerning the transaction to be stored on the financial institution computer such that the user's account information is updated on the financial institution computer.
  • the user's account information may also be updated at the profiler server and/or on the data card.
  • the provider system updates financial account information on the data card, and stores activity data on the data card, as shown in blocks 168 and 170 .
  • the provider system stores activity data on the profiler server, as shown in block 172 .
  • the provider system asks the user whether activity data should be transferred to the profiler server and/or stored on the data card. In such an embodiment, only if the user answers affirmatively does the provider system store activity data on the profiler server and/or the data card, as shown in blocks 170 and 172 . In such an embodiment, the provider system may also give the user the option to choose whether activity data should be transferred to the profiler server, the data card, or to neither.
  • the data card is used only to store activity data on the data card or to cause activity data to be stored on a profiler server.
  • the data card is not used to make a payment and is swiped in addition to making payment by any traditional method.
  • the provider system receives the data card, as shown in block 150 .
  • the data card would typically be swiped by the user through a p-box coupled to the provider's computer or cash register.
  • the provider system then prompts the user to authenticate use of the card such as by entering a PIN on a key pad or other method of authentication, as shown in block 154 .
  • authentication is achieved by comparing the PIN with an encoded number stored on the data card or on the profiler server.
  • the provider system obtains further authorization for use of the data card by communicating with the profiler server by any method known to those skilled in the art, including, but not limited to, internet and telephone communication.
  • the profiler server checks, for example, whether the data card is stolen or has expired, etc.
  • the provider system then stores activity data on the data card or on the profiler server, as shown in blocks 170 and 172 . In such an embodiment, all blocks after 154 and before 170 are skipped.
  • FIG. 6A illustrates the activities of a profiler system profiler server when initializing a profiler system user.
  • the user may first initialize the data card and the profiler server with user profile data.
  • the initial profile data may include, but is not limited to, name, home address, work address, basic health information, personal data favorites, and financial data.
  • the basic health information may include, but is not limited to, maladies and allergies regularly suffered (e.g., diabetes and sinusitis), height, weight, and physical restrictions such as a bad knee, flat feet, eyeglasses, etc.
  • Personal data may include, but is not limited to, shirt size, pant size, physical measurements, shoe size, insurance information, etc.
  • Favorites may include, but are not limited to, favorite brands, restaurants, flavors, colors, kinds of food, kinds of restaurants, kinds of music, musical groups, avocations, interests and hobbies.
  • Financial data may include, but are not limited to, bank accounts and related information, credit card accounts and related information, investment accounts and related information, etc.
  • the user's data card is present in the p-box attached to or part of the user's personal computer.
  • the profiler server prompts the user for data to create an initial user profile, as shown in block 202 .
  • the prompting for user profile data is achieved via a sequence of internet web pages. The user supplies the requested information, the profiler server receives the user profile data, as shown in block 204 , and then creates an initial internal user profile, as shown in block 206 .
  • the user profile information is requested the first time a user starts the profiler application program on a user's personal computer.
  • the profiler application program prompts the user for the initial user profile data
  • the profiler application program creates an internal user profile.
  • the profiler application program then establishes a connection with the profiler server over the internet, and provides internal user profile information to the profiler server.
  • requests for user profile information are staggered and presented to the user over time so as to reduce the burden and inconvenience of entering a large quantity of data when first using the profiler system.
  • Such requests for user profile information may be made, in various embodiments, by the profiler server and/or the profiler application program.
  • the profiler system does not require any initial profile data to be entered by the user, and the profiler server skips steps 200 through 206 .
  • FIG. 6B illustrates the activities of a profiler system profiler server when initializing a profiler system group.
  • the user of the profiler system may be a member of a group. If so, the group manager may initialize or create the group on the profiler server.
  • the group manager's data card is present in the p-box attached to or part of the group manager's computer.
  • the profiler server prompts the group manager for data to create an initial group profile, as shown in block 203 .
  • the initial group profile consists of, at a minimum, a designation of all members in a group, either by name, data card number, employee number, or any other unique identifier or combination of unique identifiers.
  • the group manager enter each data card of group members into the p-box and concurrently initialize the data cards when initializing the group profile.
  • the prompting for group profile data is achieved via a sequence of internet web pages. The group manager supplies the requested information, the profiler server receives the group profile data, as shown in block 205 , and then the profiler server creates an initial internal group profile, as shown in block 207 .
  • FIG. 6C illustrates the activities of a profiler system profiler server when used by a single user.
  • the profiler server begins receiving activity data for the user from providers over the internet, as shown in block 208 .
  • activity data when activity data is received, it is first decrypted according to methods known to those skilled in the art.
  • the profiler server begins to automatically process the activity data to create a user profile, as shown in block 210 .
  • the profiler server continuously updates the user profile responsive to activity data received, as shown in blocks 208 and 210 . That is, basic factual information is retrieved and processed by the profiler server and added to the user profile data. Such information may include, for example, maladies found at a recent doctor's visit, and brand favorites derived from recently observed buying habits as determined by evaluation of user patterns seen through the activity data. In one embodiment, information may be obtained from the activity data by inference or the execution of an inference engine. In such an embodiment, user patterns comprised of various habit data are collected and used to build a user profile. For example, if a user always purchases one brand of orange juice, that brand is entered into the user profile.
  • Another example is, if a user always buys a particular item of clothing in one size, that size information is stored in the user profile. Examples are numerous. Various forms of artificial intelligence, including inference engines and neural nets may be used to analyze the activity data to create the user profile, user patterns and user habit data.
  • the profiler server searches the web in response to receiving the activity data and based on information contained in the user profile as shown in block 212 .
  • This automated search of the internet may be referred to as a reverse search as it is initiated by the profiler system and not by a direct request of the user. That is, the real world activities of a user are used to create user patterns which the profiler system uses to automatically issue and process searches of the internet on behalf of the user.
  • This is the reverse of a typical web search in which a user makes a request of a computer, as here, a computer issues web requests.
  • user patterns are regularly evaluated to create user habits unique to and reflective of the particular user based on the activity data.
  • These user habits include, but are not limited to buying habits, web habits, eating habits, user health data, entertainment habits, driving habits, telephone calling habits.
  • web queries are sent by the profiler server.
  • the web queries may be sent to specific web sites for specific information or may be general queries sent to existing search engines. For example, certain known health-related web sites may be queried for specific health information pertinent to the user, while general queries may be sent to a search engine for new news or any information concerning a particular health topic gleaned from the activity data and/or the user profile.
  • the processing and evaluation of activity data is ongoing.
  • the profiler system provides rules that the profiler server uses in evaluating the activity data to create user patterns and habit data.
  • additional intelligence is included in the profiler system to provide recommendations and information based on the user activity data, user patterns, habit data and/or user profile data.
  • the profiler system may also provide cross-referencing of the activity data and deduced and inferred user patterns and habit data, as well as the user profile. This processing and cross-referencing may take the form of multi-processing or simultaneously executing rule engines, inference engines, or an automated agent, all of which will collectively be referred to as “bots”.
  • One such example involves a “price checking bot.”
  • the “price checking bot” checks the activity data to see which products are either regularly or most often purchased, and provides suggestions to the user upon log in as to where the items can be purchased for less.
  • a certain amount of intelligence is used so that geographically desirable stores and web stores are directed to the user.
  • the stores will vary from user to user based on buying habits and the user profile.
  • the “price checking bot” may provide a local discount store to one user and an on-line store to another for the same product if the first user prefers bricks and mortar stores over internet stores.
  • the opposite applies to the second user.
  • the user's preferences may have been set by the user in the user profile or deduced from buying habits observed by the profiler system when analyzing the user's activity data.
  • a “medi-watch bot” that compares the user's health data with the user's diet.
  • the “medi-watch bot” issues warnings to the user when foods that conflict with medications or that may exacerbate a medical condition are either purchased or ordered at a restaurant.
  • the activity data when it arrives, it may be in a standard form such as a universal product code (UPC) or another code set created specially for this purpose.
  • UPC universal product code
  • Various “bots” then extract, organize, and extrapolate the activity data to create user patterns and habit data, as well as to provide recommendations to the user.
  • an “entertainment bot” receives an activity data specifying that the user watched a particular movie. The “entertainment bot” then looks up the movie code in a database, either on the profiler server or on the internet, and records the stars of the movie and various data about the type of movie.
  • the data for a movie that is considered important to the “entertainment bot” is what year the movie was made, whether it was a love story, a western, was a comedy, was violent, etc.
  • the “entertainment bot” creates data that is then used by the “night out bot”. Such data is used by the “night out bot” to provide recommendations about upcoming movies, plays and shows responsive to the data created by the “entertainment bot”.
  • An “eating habits bot” in conjunction with a “grocery bot” and a “restaurant bot” also provide cross-referencing, inference and deduction of and from activity data, habit data, user patterns and/or the user profile.
  • the “eating habits bot” extracts primary ingredients from restaurant selections and grocery store purchases to determine what foods the user prefers. For example whether the user buys cheese pizza, vegetarian pizza, or pepperoni pizza (at a grocery store or restaurant) will be evaluated to determine whether the user is a vegetarian, likes plain or spicy food, likes meats, etc.
  • a “grocery bot” and a “restaurant bot” then use this information to recommend grocery store sale items and make restaurant recommendations, respectively.
  • the number and kinds of “bots” is numerous and evolving.
  • the profiler server After issuing web queries, the profiler server then receives, reviews, and filters the responses to the various queries and creates web site and other recommendations for the user responsive to the search results, as shown in block 214 . In this way, customized web site and other recommendations are prepared for the user. Then, after authenticating the user's access to the data card and the profiler server, the profiler server accepts the user log on over the internet, as shown in block 216 . Whenever a user logs into the profiler server, users are automatically provided with customized web site and other recommendations as well as other relevant information, as shown in block 218 . The user then visits the recommended web sites, reads the recommendations, and reads the relevant data.
  • the profiler server keeps track of which recommendations and data are viewed and accessed by the user, and stores this as additional activity data.
  • the amount of time a user spends at various web sites, both by category or type of web site as well as by specific web site are stored as activity data and processed to create additional user patterns and web habit data which result in further recommendations.
  • the profiler server provides the user email messages providing recommendations and relevant information based on user patterns and habit data derived and extrapolated from the user's activity data.
  • the profiler server in addition to the recommendations received displayed on the user's monitor when the user logs on, the profiler server sends such email to the user at any time, and the user receives such email when checking email by any method known to those skilled in the art, such as for example, via cellular telephone or other portable computing device.
  • the profiler server sends by electronic page or transmission via any method known in the art, including email, a message that provides pertinent information and recommendations to the user.
  • Such information and recommendations may include, for example, airline flight time data, an alert not to eat certain purchased food based on health data, or product recall notice information regarding items recently purchased.
  • the profiler server retrieves activity data from the user's data card which is inserted in the user's computer, or a p-box coupled to the user's computer, as shown in block 220 .
  • activity data stored on the data card is transferred to the profiler server and evaluated, as shown in block 210 .
  • the activity data is received by the profiler server over the internet, or by direct connection of any kind known in the art, from the user's p-box or user's computer.
  • when activity data is received it is first decrypted according to methods known to those skilled in the art. This encryption make take place on both the user's computer and on the profiler server.
  • the activity data is transferred from the data card and decrypted on the user's computer, stored on the user's computer, and then encrypted and transferred to the profiler server which then decrypts the activity data for processing.
  • activity data when activity data is stored on the user's computer, it remains in encrypted form to prevent access to it by others than the intended user.
  • the profiler application program or other components of the profiler system decrypt activity data only when being accessed by a profiler application program after a user has entered a data card and authorized use of the data card and the profiler system.
  • the profiler server retrieves and services user web requests, as shown in block 222 .
  • the profiler server combines the request with pertinent stored information such as the user profile and user patterns including user habits to send better directed, more focused and more effective web queries.
  • the profiler server filters the web responses and provides only the most relevant and pertinent search results to the user based on evaluating the responses against the user's web request, the user profile data, and user patterns including user habits.
  • the user's web activities are stored by the profiler server as activity data, as shown in block 224 .
  • Web activity may include user web requests made by the user as well as all web sites visited by the user, the amount of time spent visiting particular web sites, etc.
  • the user is provided the opportunity to turn off the automatic monitoring of web viewing and creation of activity data resulting from web viewing.
  • This feature may be implemented according to any methods known to those skilled in the art, including, but not, limited to, an on-screen button or pull-down menu item.
  • whether automated monitoring of web viewing is on or off is reflected graphically on the screen according to methods known to those skilled in the art.
  • a small graphic commonly referred to as an icon may change color or change image depending on whether automatic web activity monitoring is selected by the user to be on or off.
  • the profiler server provides various personal analysis programs that a user can execute to evaluate the user's buying and other habits, as well as financial and other data.
  • the personal analysis programs are run on the profiler server and evaluate data stored on the profiler server.
  • the personal analysis programs are special purpose mini-application programs, such as JAVA applets, that are provided by the profiler server and downloaded when the user requests a particular personal analysis program.
  • the personal analysis programs may access either or both data stored on the user's computer or on the profiler server.
  • the profiler server retrieves and services the user's data analysis requests, as shown in block 226 . As with any other activities engaged in by the user, the requests for data analysis create activity data that is stored by the profiler server, as shown in block 228 .
  • the profiler system also allows the user to update the user profile data at any time after providing initial user profile data or after profile data is created by the profiler server.
  • the user pulls down a menu and chooses “update user profile.”
  • the user clicks on an “update user profile” button provided on the screen.
  • the profiler server provides user profile update screens to the user, as shown in block 230 .
  • the profiler server retrieves updated user profile data provided by the user, as shown in block 232 .
  • the profiler application program services the user's request to update user profile data and updates the profiler application program's internal user profile data. In this embodiment, the profiler application program then transmits updated user profile data to the profiler server.
  • FIG. 6D illustrates the activities of a profiler system profiler server when used by a group and a group manager.
  • the profiler server begins receiving activity data for the user from providers over the internet, as shown in block 251 .
  • the activity data is then routed to the appropriate group and/or user accounts depending on whether the data is group activity data, user activity data, or both.
  • Group activity data may be an aggregation of user activity data.
  • the profiler server begins to automatically process the activity data to create a group profile, as shown in block 253 .
  • the profiler server continuously updates the group profile responsive to activity data received, as shown in blocks 251 and 253 . That is, basic factual information is retrieved and processed by the profiler server and added to the group profile data.
  • basic factual information is retrieved and processed by the profiler server and added to the group profile data.
  • information may include, for example, brand and item trends, and favorite retailers and providers derived from recently observed buying habits as determined by evaluation of user patterns seen through the activity data.
  • information may include, for example, recent employee travel data and recent employee purchase data, including derivation of brand, retailer and provider favorites gleaned from the group member patterns culled from group activity data.
  • information may be obtained from the activity data by inference or the execution of an inference engine.
  • Various forms of artificial intelligence, including inference engines and neural nets may be used to analyze the activity data to create and grow the group profile, group patterns and group habit data
  • user patterns comprised of various group habit data are collected and used to build a group profile. For example, if a group regularly always purchases one brand of copy paper or toilet paper, that brand is entered into the group profile. Another example is, if a group always buys a particular item in one size, that size information is stored in the group profile entry for that item. Examples are numerous.
  • group patterns comprised of various habit data are collected and used to build a group profile. For example, if a group regularly purchases one brand or kind of a particular item, such as a stapler or copy machine paper, that brand and kind of item is entered into the group profile. Another example is, if a group always buys a particular item at particular time intervals or at a particular time of year or time of the month, such buying trends are learned and stored as group patterns, group habit data and/or in the group profile. Other examples are numerous.
  • the profiler server searches the web in response to receiving the group activity data and based on information contained in the group profile as shown in block 255 . More specifically, group patterns are regularly evaluated to create group habits unique to and reflective of the particular group based on the group activity data. Group habits may include, but are not limited to buying habits, web habits, restaurant habits, entertainment habits, driving habits, telephone calling habits. Based on these group habits, web queries are sent by the profiler server. The web queries may be sent to specific web sites for specific information or may be general queries sent to existing search engines. For example, certain known travel web sites may be queried for specific travel information pertinent to the group, such as derived from regular flight to San Jose airport the first Tuesday of every month.
  • General queries may be sent to a search engine for new news or any information concerning a particular topic gleaned from the group activity data and/or the group profile.
  • Such information may be, for example, tax related news stories for a group which happens to be an accounting firm which the profiler system to have an accounting interest based on analysis of group activity data such as group member web research activity data, or explicit statement of the group's business or purpose in the group profile.
  • the processing and evaluation of activity data is ongoing.
  • the profiler system provides rules that the profiler server uses in evaluating the group activity data to create group patterns and group habit data.
  • additional intelligence is included in the profiler system to provide recommendations and information based on the group activity data, group patterns, group habit data and/or group profile data.
  • the profiler system may also provide cross-referencing of the group activity data and deduced and inferred group patterns and group habit data, as well as the group profile.
  • This processing and cross-referencing may take the form of multi-processing or simultaneously executing rule engines, inference engines, or an automated agent, all of which will collectively be referred to as “bots”.
  • One such example involves a “price checking bot” that works hand in hand with a “goods purchased bot.”
  • the “goods purchased bot” examines group activity data to learn which products are either regularly or most often purchased by the group.
  • the “price checking bot” Based on information provided by the “goods purchased bot,” the “price checking bot” sends web queries to learn the prices of the goods at various provider's web sites. The “price checking bot” then receives and processes responses to the queries, and provides suggestions to the group manager upon log in as to where the items can be purchased for less or for a group or bulk discount. A certain amount of intelligence is used so that geographically desirable stores as well as web stores may be reported to the group manager. However, the stores will vary from group to group based on buying habits and the group profile. For example, the “price checking bot” may provide a local discount store to one group and an on-line store to another for the same product if the first group prefers bricks and mortar stores over internet stores. In this example, the group's preferences may have been set by the group in the group profile or deduced from buying habits observed by the profiler system when analyzing the group activity data.
  • a “travel bot” may determine flying habits such as regular trips or preferred airlines.
  • the profiler system also issues automatic requests for bids based on past group activity data, group patterns and the group profile. That is, using the example discussed above, if the “travel bot” determines that one or more members of a group regularly flies to San Jose airport on the first Tuesday of every month, a “request for bid” bot may take this information and send to known travel agent or airline web sites requesting a bid for a group of flights in an attempt to achieve a multiple purchase discount.
  • a “request for bid bot” may organize office supplies regularly purchased into a group and automatically send a request for bid for monthly or quarterly delivery of the group's office supplies to internet and local office supply stores. In this way, a buying cooperative comprised of businesses or groups of persons may achieve bulk and/or regular purchase discounts. In this way, the “request for bid bot” serves as an automated business to business reverse bidding mechanism. In one embodiment, such automatic request for bids may be turned off or specified to run as to only certain goods or services by the group manager.
  • the number and kinds of “bots” is numerous and evolving.
  • selling activity and inventory are stored as activity data.
  • a “selling activity bot” keeps track of goods sold by one company, and an “inventory watch bot” provides recommendations to the group manager of the company responsive to information obtained from the company's activity data and the “selling activity bot.” For example, in one embodiment, when the “inventory watch bot” learns that there is an oversupply of a particular good, the “inventory watch bot” may query the “selling activity bot” and prepare a recommendation to the group manager to offer a particular quantity of the overstocked item to a regular purchaser at a discount.
  • the “inventory watch bot” may automatically send offers to regular purchasers informing them of a sale on the item when the “inventory watch bot” deduces that there is an overstocked item.
  • the group manager may also be informed by the profiler system that the offers have been sent.
  • the “inventory watch bot” may determine that stock on an item is too low to meet anticipated demand as determined by automatic analysis of prior selling activity data. In such a situation, the “inventory watch bot” may recommend to the group manager to increase production of the particular item to meet anticipated demand of the item. In another embodiment, the “inventory watch bot” may automatically send mail to the company's factory requesting an increase in production of the particular item while concurrently informing the group manager that such a request has been sent.
  • inventory activity data may be acquired by an employee scanning bar coded, boxes, crates, pallets or containers of goods while a data card is inserted in a scanner or inserted in a computing device to which the scanner transmits.
  • inventory data may be obtained directly from a manufacturing facility in a similar manner.
  • selling activity data may be obtained using a data card while an employee processes orders such that each order entered by a particular employee is stored by the profiler system as selling activity data.
  • such selling activity data may be obtained from a database of filled invoices, purchase orders or the like.
  • the profiler server After issuing web queries, including requests for bids, the profiler server then receives, reviews, and filters the responses to the various queries and requests, and creates recommendations for the group manager responsive to the results, as shown in block 257 . In this way, customized recommendations are prepared for the group manager. Then, after authenticating the group manager's access to the data card and the profiler server, the profiler server accepts the group manager log on over the internet, as shown in block 259 . Whenever a group manager logs into the profiler server, group manager's are automatically provided with customized recommendations as well as other relevant information, as shown in block 261 . The group manager then visits recommended web sites, reads the recommendations, and reads other the relevant data.
  • the profiler server keeps track of which recommendations and data are viewed and accessed by the group manager, and stores this as additional activity data.
  • the amount of time group members spend at various web sites, both by category or type of web site as well as by specific web site are stored as group activity data and processed to create additional group patterns and group web habit data which result in further recommendations.
  • the profiler server transfers group activity data from the profiler server to the group manager's computer, as shown in block 263 .
  • the group activity data is transferred by the profiler server over the internet, or by direct connection of any kind known in the art, to the group manager's computer.
  • when activity data is received it is first decrypted according to methods known to those skilled in the art. This encryption make take place on both the user's computer and on the profiler server.
  • when group activity data is stored on the group manager's computer it remains in encrypted form to prevent access to it by others than the group manager.
  • the profiler application program or other components of the profiler system decrypt group activity data only when being accessed by a profiler application program after a group manager has entered a data card and authorized use of the data card and the profiler system.
  • the profiler server provides various group analysis programs that a program manager can execute to evaluate the group's buying and other habits.
  • the group analysis programs are run on the profiler server and evaluate data stored on the profiler server.
  • the group analysis programs are special purpose mini-application programs, such as JAVA applets, that are provided by the profiler server and downloaded when the group manager requests a particular personal analysis program.
  • the personal analysis programs may access either or both data stored on the group manager's computer or on the profiler server.
  • the profiler server retrieves and services the user's data analysis requests, as shown in block 265 .
  • the profiler system also allows the group manager to update the group profile data at any time after providing initial group profile data.
  • the group manager pulls down a menu and chooses “update group profile.”
  • the group manager clicks on an “update group profile” button provided on the screen.
  • the profiler server provides group profile update screens to the group manager, as shown in block 267 .
  • the profiler server retrieves updated group profile data provided by the group manager, as shown in block 269 .
  • the profiler application program services the program manager's request to update group profile data and updates the profiler application program's internal group profile data. In this embodiment, the profiler application program then transmits updated group profile data to the profiler server.

Abstract

A method for providing recommendations to a user based on user activity. A plurality of activity data tracking a plurality of activities of a user is obtained. The activity data may be obtained over a wide area network such as the internet or downloaded from a data card which stores activity data whenever the user participates in an activity. The activity data is either stored on the data card or transmitted over the network whenever the user uses a card when participating in any activity such as when making a purchase of goods, paying for services, watching television, etc. The activity data is processed to identify a plurality of user patterns. The user patterns are used to form a user profile and may include user habit data. Recommendations specific to the user based on the user patterns are then created for and provided to the user. The recommendations are provided to a user when the user logs onto a computer network such as the internet. The recommendations may also be provided by electronic mail, electronic pager or other methods. The recommendations are provided by various data analysis techniques including rule based inference engines and other forms of artificial intelligence.

Description

  • This is a continuation of pending patent application Ser. No. 13/152,173 filed on Jun. 2, 2011 entitled A METHOD FOR PROVIDING INFORMATION AND RECOMMENDATION BASED ON USER ACTIVITY which is a continuation of pending patent application Ser. No. 10/611,097 filed on Jun. 30, 2003 entitled A METHOD FOR PROVIDING INFORMATION AND RECOMMENDATIONS BASED ON USER ACTIVITY, which is a divisional of Issued U.S. Pat. No. 6,611,881, issued on Aug. 26, 2003, entitled METHOD AND SYSTEM OF PROVIDING CREDIT CARD USER WITH BARCODE PURCHASE DATA AND RECOMMENDATION AUTOMATICALLY ON THEIR PERSONAL COMPUTER.
  • BACKGROUND
  • 1. Field of the Invention
  • The invention relates to a method for customizing searches of the internet. More specifically, the invention relates to a method for searching the internet and providing customized recommendations responsive to a user's real world activities.
  • 2. Background
  • The internet is ubiquitous in popular culture. As more and more people go on-line and begin experiencing what the internet has to offer, more and more people are becoming frustrated with the huge amount of data available for consumption via the enormous number of web sites existing in cyberspace. This includes users at home or at work using the internet to pursue hobbies, do homework, do research for school or work projects, etc.
  • After a user establishes a connection with the internet, the user typically wants to find information of some sort. A common method of finding information on the internet is by using one of the plethora of internet web search engines, e.g., ALTAVISTA.COM, GO.COM, and GOTO.COM. After entering key words describing a concept, thing or event, a multitude of web sites are provided to the user. However, because of the enormous number of web sites that exist in cyberspace, all but the most specialized requests return at least hundreds, typically thousands, and often tens of thousands of web sites. The order in which the web sites are presented is determined by rules at the search engine or randomly. One such rule is based on fees paid by web sites to be listed with the search engine such that the entities paying the larger sums have their web sites displayed on the top of the list provided to the user, e.g., GOTO.COM.
  • To assist users in beginning to manage the enormous amount of data available on the internet, many web sites provide a rudimentary customization of information for the user. These rudimentary customizations are, however, limited to selection and organization of the information available on the particular web sites and not over the entire internet. For example, shopping web sites allow users to select favorite product areas, choose favorite designers and manufacturers, specify user information such as sizes and colors, etc. (e.g., BLUEFLY.COM). Other examples include news sites which display categories of news based on user specified interest areas and user information such as geographical location. (e.g., MYPAGE.GO.COM).
  • Internet activity of users is monitored by various companies that track usage patterns of internet web surfers. Web site operators use this information to direct adds to users based on typical web surfing patterns. These advertisements are, thus, responsive to users' interests as reflected in web site visitations. However, consumers and businesses do not have access to this information.
  • In the real world, the activities of persons and businesses are also tracked to a limited extent. For example, when a consumer makes purchases at a grocery or drug store, consumers often swipe a personal identification card to obtain discounted prices. Similarly, when purchases are made by consumers and businesses at membership only stores, a membership identification card is presented. In this way, retailers track information about and monitor the buying habits of their customers. However, consumers and businesses do not have access to this information.
  • The real world of bricks and mortar stores and cyberspace are beginning to overlap. Companies are now producing internet connected cash registers which have instant access to inventory and the company's web site, including web placed orders. To authorize a credit card transaction, cash register computers connected to the internet obtain automatic authorization of credit card purchases via the internet. In addition, to give users confidence in the security of transactions over the internet and to ease making purchases on the internet, credit card companies have developed credit cards which can be inserted into card readers attached to user's personal computers which authorize and ease on-line purchases.
  • Although the internet promises to be pervasive in our society, credit cards already are. Consumers routinely use credit cards to pay for any kind of transaction imaginable, from purchasing groceries, to paying for a dental exam, to buying movie tickets. Businesses also use credit cards for purchasing employee travel, office supplies, office equipment, etc. When credit card transactions are transmitted to the credit card issuer, limited information such as the total amount of the transaction and the name of the entity to be credited are maintained. In this way, general buying habits are monitored and maintained by credit card companies and are offered for sale. However, consumers and businesses do not have access to this information.
  • Consumers and groups of consumers have not benefited from and do not have access to the plethora of information maintained about them by retailers, credit card companies, internet tracking companies, and others. Similarly, businesses have not benefited from and do not have access to the plethora of information maintained about them and their employees by retailers, credit card companies, internet tracking companies, and others.
  • BRIEF SUMMARY OF THE INVENTION
  • A method for providing recommendations to a user based on user activity. A plurality of activity data tracking a plurality of activities of a user is obtained. The activity data may be obtained over a wide area network such as the internet or downloaded from a data card which stores activity data whenever the user participates in an activity. The activity data is either stored on the data card or transmitted over the network whenever the user uses a card when participating in any activity such as when making a purchase of goods, paying for services, watching television, etc. The activity data is processed to identify a plurality of user patterns. The user patterns are used to form a user profile and may include user habit data. Recommendations specific to the user based on the user patterns are then created for and provided to the user. The recommendations are provided to a user when the user logs onto a computer network such as the internet. The recommendations may also be provided by electronic mail, electronic pager or other methods. The recommendations are provided by various data analysis techniques including rule based inference engines and other forms of artificial intelligence.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1A illustrates the activities performed by a profiler system user.
  • FIG. 1B illustrates an example of the information and recommendations provided to a profiler system user after logging on to the profiler system.
  • FIG. 1C illustrates another example of the information and recommendations provided to a profiler system user after logging on to the profiler system.
  • FIG. 2A illustrates the activities performed by a profiler system user in which financial transaction information and activity data are communicated via the internet.
  • FIG. 2B illustrates the activities performed by a profiler system user and group manager in which financial transaction information and activity data are communicated via the internet.
  • FIG. 3A illustrates the activities performed by a profiler system user in which financial transaction information and activity data are stored on a data card.
  • FIG. 3B illustrates the activities performed by a profiler system user and group manager in which financial transaction information and activity data are stored on a data card.
  • FIG. 4 illustrates various devices connected to the internet and other devices with which the profiler system is used.
  • FIG. 5 illustrates the point of sale activities of a profiler system provider.
  • FIG. 6A illustrates the activities of a profiler system profiler server when initializing a profiler system user.
  • FIG. 6B illustrates the activities of a profiler system profiler server when initializing a profiler system group.
  • FIG. 6C illustrates the activities of a profiler system profiler server when used by a single user.
  • FIG. 6D illustrates the activities of a profiler system profiler server when used by a group and a group manager.
  • DETAILED DESCRIPTION
  • As credit card use is pervasive and as the internet is becoming more and more popular, various embodiments of this invention combine certain elements of both to increase the user's enjoyment of the internet by making the internet more useful. To achieve this, the user of the internet is provided a data card. The data card is a transportable recordable medium (TRM) known to those skilled in the art. In one embodiment, the TRM may include a magnetic strip containing data and a writeable memory device. In another embodiment, the TRM may be comprised of a writeable memory device. In either of these embodiments, the TRM may also include transmitting and receiving means for sending and receiving the data stored on the memory device portion of the TRM. Generally, whenever the user participates in any activity, the user presents the data card, and information about the activity is either stored on the card or transferred over the internet to a profiler server. The profiler system then provides customized data and web site references to the user. The profiler may also be used to assist groups such as groups of neighbors or relatives, or a business. In such embodiments, the profiler can search and locate bulk discounts and automatically request bids for goods and services regularly purchased based on group members' real world activities.
  • A. Using a Profiler System to Retain Activity Data and Provide Customized Recommendations
  • FIG. 1 illustrates the activities performed by a profiler system user. In one embodiment, every provider of any and all goods, services, entertainment, etc. maintains a cash register or computer coupled with or including a device to read, and in some embodiments, write, to the data card. Devices for reading from and writing to the data card are denoted p-boxes, short for profiler boxes. The p-boxes allow for reading from and/or writing to, and in some embodiments transmitting data to and receiving data from, the data card. In one embodiment, whenever a user makes a purchase at a retail establishment, pays for services rendered, etc., the user presents the data card, swipes the card at a p-box, that is, slides it through a data card reader, as shown in block 10. After swiping the card, the user then authorizes access to the data card and its features. In one embodiment, this is achieved by the user entering a personal identification number (PIN), such as by typing onto a key pad, as shown in block 12. The PIN is then compared to an encoded, previously stored PIN on the data card or stored on the profiler server. In another embodiment, a finger print of the user is scanned and compared with data stored either on the data card or on the profiler server to authenticate use of the data card. In addition, in other embodiments, authorization may be achieved by any method known to those skilled in the art, including but not limited to retinal scan and voice print recognition.
  • In one embodiment, the data card is swiped in addition to making payment by any traditional method. That is, the data card is swiped in addition to swiping a credit card or debit card or paying with cash or bank check. In such an embodiment, activity data reflecting the activity is transferred to a profiler server via a wide are network (WAN) such as the internet, as shown in block 14. In one embodiment, this transfer of activity data is transparent to the user. In various embodiments, transmission of activity data over the internet may be done securely by any encryption method known to those skilled in the art. In this way, the user's activity data remains private.
  • Activity data provides details about the activity entered into by the user. In one embodiment, activity data may include retail transaction data such as what items were purchased in what quantity and at what price. For example, when grocery shopping, each item purchased, the quantity of the items, and the price for the items is included as activity data. Another example of activity data is service provider data such as what service was provided and at what price. Examples of services are numerous and include car wash, hair cut, gardening, maid service, plumbing repair, roof repair, and so on. If when making a purchase the user wants to keep the activity private or hidden from the profiler system, all the user need do is not swipe the data card.
  • After participating in some activities, the user then goes home and, in one embodiment, inserts the data card at a p-box attached to the user's personal computer, as shown in block 16. The user's computer may be any computing device such as a cellular telephone, portable computer, electronic personal organizer, desktop computer, dedicated internet device, etc. with access to a WAN such as the internet. In addition, the location of the personal computing device is not limited to the home, but may be any location convenient to the user, including, but not limited to home, car, office, shopping mall, park, beach, etc. In this embodiment, to access the activity data transmitted when making payment for a transaction, a user's computer includes a p-box. The p-box may be included in or attached to the user's computing device. The user then authorizes access to the data card and the profiler system. In one embodiment, the user achieves this authorization by entering a PIN and logging on to the profiler server via the internet, as shown in block 18. Immediately upon connecting to the profiler server, the user is automatically provided web sites, recommendations and other relevant information as shown in block 20. The web sites and recommendations provided by the profiler server are customized to the user and are based on user patterns such as buying habits, eating habits, entertainment habits, and others culled from examining and processing the user's activity data.
  • In another embodiment, the data card is not just read but is written to when the user pays for good or services, or pays for entertainment or participates in any activity. In this embodiment, the p-boxes are data card readers/writers. Whenever a user makes a purchase at a retail establishment, pays for services rendered, etc., the user presents the data card by inserting it into a provider p-box, as shown in block 22. After inserting the data card, the user then authorizes access to the data card and its features. In one embodiment, this is achieved by entering a PIN, as shown in block 24. In this embodiment, the data card is used in addition to making payment by any traditional method. In such an embodiment, activity data reflecting the activity is transferred to the user's data card, as shown in block 26. That is, activity data providing details about the activity is written onto the data card according to any method known to those skilled in the art. In various embodiments, activity data is stored securely on the data card by any encryption method known to those skilled in the art. In this way, the user's activity data is protected from dissemination in the event the card is lost or stolen. As above, if when making a purchase the user wants to keep the activity hidden, all the user need do is not insert the data card.
  • The data card of the profiler system may also be used when participating in activities for which no payment is made. One example of this involves watching television and using a home television monitor. In one embodiment, when watching television, a data card is placed in the television and activity data is either stored on the card or transmitted to the profiler server. In this embodiment, activity data includes the program watched, the channel watched, the time of day the program aired, and the length of time the television was turned on. In a related embodiment, when using a television connected to a video tape player, video disc player, cable box or satellite dish, the user places the data card in a data card enabled video tape player, video disc player, cable box or satellite box such that activity data regarding the programs watched is recorded onto the data card. In another embodiment, the activity data is transmitted to the profiler server over the internet via any connection to the internet known to those skilled in the art, including, but not limited to a television cable, a satellite connection, a digital subscriber line (DSL), lines, etc.
  • Another example of activities not involving payment for which the data card is used is using the data card when in a motor vehicle such as a car or truck. In this embodiment, information about the vehicle's systems and use of the vehicle is stored on the data card. In this embodiment, the activity data may include, but is not limited to, at what time of day the vehicle is driven, for what period of time the vehicle is in operation, and for what distance the vehicle is driven. In a related embodiment, the data card is used as an access device such that the car cannot be started unless the data card is inserted into a data card receiver located in the vehicle. In such an embodiment, a PIN or other form of authorization may also be required in conjunction with the data card to allow for starting the motor vehicle.
  • Yet another example of activities not involving payment for which the data card is used is using the data card when making telephone calls, both with cellular telephones and with traditional telephones connected to fixed lines. In such embodiments, the telephone includes a data card receiver that records activity data about the phone calls made. Such phone activity data may include, but is not limited to, the phone numbers called, the length of the call, and the telephone carrier used. In a related embodiment, the data card is used as an access device such that the telephone cannot be used unless the data card is inserted into a data card receiver located in the phone. In such an embodiment, a PIN or other form of authorization may also be required in conjunction with the data card to allow for using the telephone.
  • After participating in some activities, the user then goes home and inserts the data card at a p-box attached to the user's personal computer, as shown in block 30. The user then authorizes use of the profiler system by entering a PIN or performing another foam of authorization when logging on to the profiler application program on the user's computer, as shown in block 32. In one embodiment, upon connecting to the profiler application program, the activity data is uploaded from the data card to the user's computer, as shown in block 34. In one embodiment, the uploading is automatic and may be hidden from the user. In another embodiment, the profiler application program asks the user if the user would like to transfer activity data from the data card to the user's computer. After logging onto the internet, as shown in block 35, the new activity data is then uploaded from the user's computer to the profiler server, as shown in block 36. In one embodiment, the uploading is automatic and may be hidden from the user. In another embodiment, the profiler application program asks the user if the user would like to transfer activity data from the user's computer to the profiler server.
  • Upon connecting to the profiler server, and after uploading new activity data, the user is automatically provided web site recommendations and other relevant information tailored to the user, as shown in block 20. The customized web site recommendations and other data are reflective of the user's lifestyle and are based on the user profile which is culled from the activity data, and derived, inferred and extrapolated from user patterns and habits. In one embodiment, user profile data provided by the user may also be used in determining the recommendations and data.
  • In one embodiment, the web sites are arranged on the user's screen grouped in categories and may be placed in multi-layered folders, or arranged in other ways known to those skilled in the art. In another embodiment, the user may customize how and in what format or organization the recommendations and information are displayed. In one embodiment, the arrangement is based on examination and evaluation of user patterns culled from the activity data. In another embodiment, the arrangement is designated by the user in a user profile and determined by the profiler server in conjunction with the user's interests based on examination and evaluation of user patterns culled from the activity data. The user then proceeds to investigate the various web sites listed and view the recommendations and relevant data, as shown in block 20.
  • Examples of web site recommendations and relevant data which the user receives are numerous. In one embodiment, text and/or graphical icons are displayed representing categories or groupings of recommendations and data, and the user selects a category or grouping by clicking on the text or icon according to methods known to those skilled in the art. For example, in one embodiment when the user clicks on the entertainment category, the user receives a list of recommended newly released compact discs, upcoming concerts, upcoming television and cable shows of interest, as well as information about favorite entertainers. In one embodiment, this information may be displayed immediately, or in another embodiment, a grouping of icons representing sub-categories may appear from which the user chooses by clicking on to obtain the information listed in the prior sentence. In yet another embodiment, textual information of interest will be displayed adjacent to links to related web sites. The recommendations and information provided are reflective of the user's habits and interests as they are derived from the user's activity data, user patterns, habit data and/or the user profile.
  • FIG. 1B illustrates an example of the information and recommendations provided to a profiler system user after logging on to the profiler system. In this example, a portion of the user's display contains a list of categories or groupings including, but not limited to, shopping, entertainment, health, business, news, computers, food, events and friends, as shown in block 1. In another embodiment, the list may not be a list, but may be a grouping of icons. After selecting “shopping” by clicking on the text or an icon representation, the user then sees a new list of sub-categories, this one comprising recent purchases, suggestions, coupons, sales, and history, as shown in block 2. If the user selects “recent”, a list of stores at which the user recently shopped is displayed, as shown in block 3. If the user clicks on “Vons”, a new list of sub-sub-categories is displayed showing receipt, compare, suggestions, coupons, and shopping list, as shown in block 4. If the user selects “compare”, in one embodiment, the profiler system takes the most recent Vons purchases, obtains prices for the same items from other local grocery stores, as well as one on-line merchant, and provides the results to the user, as shown in block 5. In this embodiment, the distance from the particular stores is also displayed, and with regard to the on-line store, the user only needs to click on the total (or other associated region of the on-line merchant area of the display) to initiate purchasing the same items that were recently purchased at Vons.
  • FIG. 1C illustrates another example of the information and recommendations provided to a profiler system user after logging on to the profiler system. In this example, the user selects “health” by clicking on the text or a health icon from a list or grouping of icons representing categories, as shown in block 6. The user is then presented with a list or grouping of sub-categories and selects “WARNINGS”, as shown in block 5. The profiler system then provides a window or display area that lists health warnings, as shown in block 8. In this example, the profiler system determined from the activity data that the user was prescribed and/or had purchased the drug Nizrol. The profiler system then processed this information, issued internet queries and consulted its own database, and provided a drug warning concerning the side effects of the drug. In addition, the profiler system also cross-referenced certain data it received about the drug with the user's recent activity data, which included an ice cream purchase, and prepared a warning about when the medication should be taken. That is, because retrieved drug data stated that the medication should not be taken with milk products, the profiler system issued a warning to the user not to take the drug when eating recently purchased ice cream.
  • In another embodiment, upon logging on to the profiler system, the user is also provided email messages providing recommendations and relevant information based on user patterns and habit data derived and extrapolated from the activity data. Such email may be sent to the user at any time, and the user receives such email when checking email by any method known to those skilled in the art, such as for example, via cellular telephone or other portable computing device. In yet another embodiment, the user may receive electronic pages or other transmissions from the profiler system via any method known in the art, including email, that provide pertinent information and recommendations. In either or both of the prior embodiments, the information and recommendations may be, for example, airline flight time data, an alert not to eat certain purchased food based on health data, or product recall notice information regarding recently purchased products. In yet another embodiment, the user's email may be sorted into categories by the profiler system, directed into themed groupings and presented with and under the categories of information and recommendations provided when logging on. In a related embodiment, the user's email may be sorted and stored by the profiler system as themed mail boxes or stored under themed icons in the mailer program.
  • In addition, when logged on to the internet, in one embodiment, the user can choose from various personal analysis programs to evaluate the user's buying and other habits. In one embodiment, the personal analysis programs are provided as plug-ins to the profiler application program such that additional plug-ins can be either purchased or downloaded by the user. In another embodiment, the personal analysis programs are provided by the profiler server as special purpose mini-application programs, such as JAVA applets, that are downloaded when the user requests a particular personal analysis program. In one embodiment, the personal analysis programs evaluate data stored on the user's personal computer. In another embodiment, the personal analysis programs evaluate data stored on or uploaded to the profiler server.
  • An example of a personal analysis program is a personal accounting profiler. Upon obtaining and running the personal accounting profiler, in one embodiment, the user invokes the personal accounting profiler from a pull-down menu and/or by clicking on a graphically displayed icon. When the personal accounting profiler opens on the user's screen, the user may request it to perform any one of a number of typical and helpful accounting tasks. In one embodiment, the user requests the personal accounting profiler to examine activity data to determine the amount of money spent in one of a plurality of categories, including, but not limited to, dining out, gasoline, entertainment, video rentals, etc. over a specified period of time, such as the last week, last month, last year, or a defined period with a start and end date. The user interface may be any interface known to those skilled in the art including, but not limited to, pull-down menus, text tags adjacent to buttons, pull-down bars, sliders, etc. In addition, other analysis options may be provided, such as to provide all potential tax deductions as derived from the activity data. In one embodiment, the personal accounting profiler runs while the user is connected to the internet, and the activity data is obtained from a profiler server. In another embodiment, the user need not be connected to the internet when running the personal accounting profiler, and activity data is accessed from the user's personal computer.
  • Another example of a personal analysis program is a personal shopping profiler. Upon obtaining and running the personal shopping profiler, in one embodiment, the user invokes the personal shopping profiler from a pull-down menu and/or by clicking on a graphically displayed icon. When the personal shopping profiler opens on the user's screen, the user may request it to perform any one of a number of helpful analysis tasks. In one embodiment, the user requests the personal shopping profiler to examine activity data to determine the amount of money spent on one of a plurality of categories or kinds of clothing, including, but not limited to, shirts, blouses, pants, suits, underwear, panties, ties, shoes, dress shoes, athletic wear, athletic shoes, dress shoes, etc. over a specified period of time, such as the last month, last year, or a defined period with a start and end date. The personal shopping profiler may also allow or analysis of brands purchased, or provide a list of all items purchased manufactured by a specified company or from a specified retailer. More detailed analysis may also be provided such as providing a list of all clothing purchased made from cotton, from where it was purchased, and when; or providing a list of what foods containing milk were purchased, from what store, and when. In one embodiment, the personal shopping profiler runs while the user is connected to the internet, and the activity data is obtained from a profiler server. In another embodiment, the user need not be connected to the internet when running the personal shopping profiler, and activity data is accessed from the user's personal computer.
  • Referring again to FIG. 1A, with regard to any of these embodiments, the user requests analysis from the profiler system, either the profiler server or the profiler application program, as shown in block 40. After providing any additional information required by the personal analysis program, the personal analysis program runs, and the user then reviews the data provided, as shown in block 42.
  • Further, when the user is logged on to the internet, in one embodiment, the user may request a web search from the profiler server, as shown in block 44. After initiating a web search, the profiler filters and evaluates the multitude of web pages responsive to the search and only provides the most pertinent web sites to the user based on the user patterns culled from the activity data. The user then reviews the web sites provided by the profiler server, as shown in block 46.
  • Furthermore, in one embodiment, after entering basic user data into a user profile upon initially using the profiler system, or, in another embodiment, after the profiler server has created a user profile for the user, the user has the opportunity to update the user profile data whenever the user chooses, as shown in block 48. A user may choose to update the user profile for any number of reasons, such as to change a work or home address, to change color or brand preferences, to change weight or size information, etc. The user profile is discussed in more detail below with regard to the profiler server.
  • B. Using the Profiler System to Retain Activity Data, Make Payments and Provide Customized Recommendations that May Include Offers from Suppliers of Goods and Services
  • FIG. 2A illustrates the activities performed by a profiler system user in which financial transaction information and activity data are communicated via the internet. In this embodiment, the data card is used to make a payment similar to a traditional transaction involving a credit card or a debit card. In this embodiment, when making any payment, the user presents the data card and swipes the card at a box, as shown in block 50. After swiping the card, in one embodiment the user then authorizes access to the data card and its features by entering a PIN or performing another form of authorization, as shown in block 52. The user then is provided with a list of accounts from which to choose. Payment for the transaction will then be taken from or debited to the selected account. The list of accounts, in one embodiment, is obtained from the profiler server over the internet. The accounts are any accounts the user has previously selected to be accessible via the data card when setting up or editing a user profile. The accounts may be credit card accounts, bank checking accounts, bank savings accounts, money market or any other accounts from any number of financial institutions or entities. The user then selects an account to be used for payment of the transaction, as shown in block 54. The user then approves the transaction, as shown in block 56, by, in one embodiment, responding to a question displayed on a screen asking the user to confirm that a specified total amount of the transaction will be drawn from the specified account.
  • In one embodiment, after the user approves the transaction, information about the financial transaction is transmitted to the financial institution over the internet, as shown in block 58. In addition, activity data is transferred to a profiler server via the internet, as shown in block 60. The transmission to the financial institution and the profiler server may both be hidden from the user.
  • After participating in some activities, the user then goes home and inserts the data card at a p-box attached to the user's personal computer, as shown in block 62. The user then authorizes access to the profiler system by entering a PIN or performing another form of authorization when logging on to the profiler server via the internet, as shown in blocks 64 and 66. In one embodiment, upon connecting to the profiler server, activity data that has been collected by the profiler server when the user was participating in activities is automatically downloaded to the user's computer, as shown in block 68. In this embodiment, activity data is only temporarily stored on the profiler server so that only the user maintains a full set of activity data such that only the user has access to and control of the personal activity data. In such an embodiment, the profiler server maintains only user habit data, user patterns, and/or the user profile. This provides added privacy to the system so that a user does not worry about what continued use the profiler server is making of the activity data. In addition, in another embodiment, the user may select and delete activity data items on the user's personal computer. In this way sensitive, personal activity data of any kind can be removed so that no one has access to it. Upon logging on to the profiler system, the user is then automatically provided web sites, recommendations and other information tailored to the user, as shown in block 70.
  • To address privacy and security concerns of profiler system users, in other embodiments, the user may choose what kind of access should be allowed to the data card during the current transaction or activity. In one embodiment, for example, the user may want to opt out of the payment function of the data card. In such an embodiment, before account information is displayed, the user chooses whether payment will be made via the data card or will be made external to the data card, that is by a traditional method such as credit card, debit card, cash or bank check. In another related embodiment, the password entered by the user automatically designates the level of use of the data card. In such an embodiment, when initializing the card, the user may set passwords which, when entered, automatically block access to financial accounts while allowing access to basic personal information and causing activity data to be stored on the data card and/or transferred. In other embodiments, there may be multiple levels of access to the card based on a plurality of passwords. For example, one password may allow access to health and medical information stored on the data card; another may allow access to health and medical information as well as financial data; yet another may only allow for activity data to be transferred over the internet to the user's account on a profiler server or onto the data card; and yet another may allow for financial data to be accessed and for activity data to be transferred.
  • FIG. 2B illustrates the activities performed by a profiler system user and group manager in which financial transaction information and activity data are communicated via the internet. In this embodiment, the profiler system user is a member of a group. In one embodiment, a group may be a business entity such that the group members are employees and staff. In another embodiment, a group may be a collection of neighbors from a neighborhood. In yet another embodiment, the group may be a collection of relatives. In still another embodiment, the group may be a collection of businesses such that there are sub-groups of businesses. In any of these embodiments, a data card is used to make a payment similar to a traditional transaction involving a credit card or a debit card. In this embodiment, when making any payment, the user presents the data card and swipes the card at a p-box, as shown in block 51. After swiping the card, in one embodiment the user then authorizes access to the data card and its features by entering a PIN or performing another form of authorization, as shown in block 53. The user then is provided with a list of accounts from which to choose. Payment for the transaction will then be taken from or debited to the selected account. The list of accounts, in one embodiment, is obtained from the profiler server over the internet. The accounts are any accounts the user has previously selected to be accessible via the data card when setting up or editing a user profile. The accounts may be credit card accounts, bank checking accounts, or any other accounts from any number of financial institutions or entities. In one embodiment, the user is only provided the accounts to which the user has been granted access. In another embodiment, if there is only one account, this step may be skipped. In addition, in the neighborhood group and relative group embodiments, only the particular user's accounts may be provided to the particular user such that privacy is maintained by the group members. In the business group context, the particular user is only provided a list of accounts to which the particular user has been given access. In other embodiments, both business and personal accounts may be listed.
  • The user then selects an account to be used for payment of the transaction, as shown in block 55. The user then approves the transaction, as shown in block 57, by, in one embodiment, responding to a question displayed on a screen asking the user to confirm that a specified total amount of the transaction will be drawn from the specified account.
  • In one embodiment, after the user approves the transaction, information about the financial transaction is transmitted to the financial institution over the internet, as shown in block 59. In addition, activity data is transferred to a profiler server via the internet, as shown in block 61. The transmission to the financial institution and the profiler server may both be hidden from the user.
  • After participating in some activities, the user then goes home or to work (or any other location) and inserts the data card at a p-box attached to the user's computer, as shown in block 63A. The user then authorizes access to the profiler system by entering a PIN or performing another form of authorization when logging on to the profiler server via the internet, as shown in blocks 65A and 67A. Upon logging on to the profiler system, the user is then automatically provided web sites, recommendations and other information tailored to the user, as shown in block 71A.
  • To address privacy and security concerns of profiler system users, particularly in the neighborhood group and relative group embodiments, and in other embodiments, the user may choose what kind of access should be allowed to the data card and activity data during the current transaction or activity. In one embodiment, the password entered by the user automatically designates the level of use of the data card. In such an embodiment, when initializing the card, the user may set passwords which, when entered, automatically block access to financial accounts while allowing access to basic personal information and causing activity data to be stored on the data card and/or transferred. In other embodiments, there may be multiple levels of access to the card based on a plurality of passwords. For example, one password may allow access to health and medical information stored on the data card; another may allow access to health and medical information as well as financial data; yet another may only allow for activity data to be transferred over the internet to the user's account on a profiler server or onto the data card; and yet another may allow for financial data to be accessed and for activity data to be transferred. Moreover, in yet other embodiments, other passwords will automatically block transfer of activity data from the group account on the profiler system but allow transfer of the activity data to the user's personal account on the profiler system.
  • When a group such as a business or non-business group is established on the profiler system, in one embodiment, a group manager or multiple group managers are designated. In such an embodiment, the group manager is given access to the group activity data and recommendations and other information provided by the profiler system. Just as with regular profiler system users, the group manager accesses the profiler system when at home or at work (or any other location) by first inserting the data card at a p-box attached to the group manager's computer, as shown in block 63B. The group manager then authorizes access to the profiler system by entering a PIN or performing another form of authorization when logging on to the profiler server via the internet, as shown in blocks 65B and 67B. In one embodiment, upon connecting to the profiler server, group's activity data that has been collected by the profiler server when the group members were participating in activities is automatically downloaded to the group manager's computer, as shown in block 69B. In this embodiment, group activity data is only temporarily stored on the profiler server so that only the group manager maintains a full set of activity data such that only the group manager has access to and control of the group activity data. In such an embodiment, the profiler server maintains only group habit data, group patterns, and/or the group profile. This provides added privacy to the system so that a group manager does not worry about what continued use the profiler server is making of the group activity data. In addition, in another embodiment, the group manager may select and delete activity data items on the group manager's computer. In this way sensitive, group activity data of any kind can be removed so that no one has access to it. In addition, this provides for removing of aberrant and un-ordinary group member activity data within the group activity data. Upon logging on to the profiler system, the group manager is then automatically provided web sites, recommendations and other information tailored to the group, as shown in block 71B.
  • FIG. 3A illustrates the activities performed by a profiler system user in which financial transaction information and activity data are stored on a data card. In this embodiment, the data card is used to make a payment similar to a traditional transaction involving a credit card or a debit card. In this embodiment, when making any payment, the user inserts the data card at a p-box, as shown in block 72. After inserting the card, the user then authorizes access to the data card and its features by entering a PIN or performing another form of authorization, as shown in block 74. The user then is provided with a list of accounts from which to choose. Payment for the transaction will then be taken from or debited to the selected account. The list of accounts, in this embodiment, is obtained from financial data securely stored on the data card. The accounts are any accounts the user has previously selected to be accessible via the data card when setting up or editing a user profile. The accounts may be credit card accounts, bank checking accounts, bank savings accounts, money market or other accounts from any number of financial institutions or entities. The user then selects an account to be used for payment of the transaction, as shown in block 76. The user then approves the transaction, as shown in block 78, by, in one embodiment, responding to a question displayed on a screen asking the user to confirm that a specified total amount of the transaction will be drawn from the specified account.
  • In one embodiment, after the user approves the transaction, financial account data on the data card is updated such that information about the financial transaction is written to the data card, as shown in block 80. In addition, activity data is transferred to the data card, as shown in block 82. Updating financial account data and transferring activity data may both be hidden from the user.
  • After participating in some activities, the user then goes home and inserts the data card at a p-box attached to the user's computer, as shown in block 84. In this embodiment, the p-box allows for reading from and writing to the data card. The user is prompted to and authorizes access to the profiler system by entering a PIN or performing another form of authorization, as shown in block 86. The user then logs on to the profiler server via the internet, as shown in block 88. In one embodiment, upon connecting to the profiler server two things occur, both of which may be hidden from the user: (1) transaction information regarding all recent financial transactions is stored on the user's computer and transferred to the user's financial institutions via the internet, as shown in block 90; and (2) activity data is automatically uploaded from the data card and stored on the user's computer, erased from the data card, and transferred to the profiler server, as shown in block 92. In another embodiment, the user logs on to the profiler application program without connecting to the internet, and both transaction data and activity data are automatically uploaded from the data card, stored on the user's computer, and erased from the data card. In such an embodiment, at a later time, when the user logs on to the internet, the transaction data and the activity data will then be transferred to the profiler server. A benefit to erasing the activity data from the data card during uploading is added privacy and security. That is, when a user regularly transfers activity data from the data card to the user's personal computer and/or the profiler server, the activity data on the card is erased such that at any given time, there will only be a limited amount of activity data stored on the data card. This increases privacy and security such that, in the event the card is lost or stolen, only a small amount of activity data will be present on the card, namely the activity data stored since the last time the user uploaded the activity data from data card. In practice, this will typically be, at most, one day's worth of data. The user is then automatically provided web sites, recommendations and other relevant data tailored to the user, as shown in block 94.
  • The profiler system may also be used with groups of users. In this embodiment, the profiler system user is a member of a group. In one embodiment, a group may be a business entity such that the group members are employees and staff. In another embodiment, a group may be a collection of neighbors from a neighborhood. In yet another embodiment, the group may be a collection of relatives. In still another embodiment, the group may be a collection of businesses such that there are sub-groups of businesses. In this embodiment, the data card is used to make a payment similar to a traditional transaction involving a credit card or a debit card. In this embodiment, the group member is a user, and the processing that occurs is that same as with regard to FIG. 3A. When the user of the profiler system is a member of a group, the user may choose from one of multiple accounts, as shown in block 76. However, in one embodiment, the user first selects between personal and group accounts. In one embodiment, the choice may be between personal accounts and business or work accounts.
  • In one embodiment, upon connecting to the profiler server two things occur, both of which may be hidden from the user: (1) transaction information regarding all recent financial transactions is stored on the user's computer and transferred to the user's and/or group's financial institutions via the internet, as shown in block 91; and (2) activity data is automatically uploaded from the data card and stored on the user's computer, erased from the data card, and transferred to the profiler server, as shown in block 93. In this embodiment, the user's activity data is directed either or both to the user's profiler system account and/or the group's profiler system account. Such routing of the activity data may be determined by which passwords were used by the user when using the data card or in other embodiments, based on the account selected for payment of the transaction, or any other method. In this way, the data card can be used for personal and group purposes. In other embodiments, the data card may be restricted to home or group uses.
  • In another embodiment, the user logs on to the profiler application program without connecting to the internet, and both transaction data and activity data are automatically uploaded from the data card, stored on the user's computer, and erased from the data card. In such an embodiment, at a later time, when the user logs on to the internet, the transaction data and the activity data will then be transferred to the profiler server. A benefit to erasing the activity data from the data card during uploading is added privacy and security. That is, when a user regularly transfers activity data from the data card to the user's personal computer and/or the profiler server, the activity data on the card is erased such that at any given time, there will only be a limited amount of activity data stored on the data card. This increases privacy and security such that, in the event the card is lost or stolen, only a small amount of activity data will be present on the card, namely the activity data stored since the last time the user uploaded the activity data from data card. In practice, this will typically be, at most, one day's worth of data. The user is then automatically provided web sites, recommendations and other relevant data tailored to the user, as shown in block 94.
  • FIG. 3B illustrates the activities performed by a profiler system user and group manager in which financial transaction information and activity data are stored on a data card. In this embodiment, the profiler system user is a member of a group. When a group such as a business or non-business group is established on the profiler system, in one embodiment, a group manager or multiple group managers are designated. In such an embodiment, the group manager is given access to the group activity data, offers from suppliers to provide goods and services, recommendations and other information provided by the profiler system. Just as with regular profiler system users, the group manager, when at home or at work (or any other location) inserts the data card at a p-box attached to the group manager's computer, as shown in block 97. The group manager then authorizes access to the profiler system by entering a PIN or performing another form of authorization when logging on to the profiler server via the internet, as shown in blocks 99 and 101. In one embodiment, upon connecting to the profiler server, group activity data that has been collected by the profiler server when the group members were participating in activities is automatically downloaded to the group manager's computer, as shown in block 103. In one embodiment, group activity data is only temporarily stored on the profiler server so that only the group manager maintains a full set of activity data such that only the group manager has access to and control of the group activity data. In such an embodiment, the profiler server maintains only group habit data, group patterns, and/or the group profile. This provides added privacy to the system so that the group members and group manager do not concern themselves with what use the profiler server is making of the group activity data. In addition, in another embodiment, the group manager may select and delete activity data items on the group manager's computer. In this way, sensitive, group activity data of any kind can be removed so that no one has access to it. In addition, this provides for removing of aberrant and un-ordinary group member activity data within the group activity data. Upon logging on to the profiler system, the group manager is then automatically provided offers by providers of goods and services, recommendations and other information tailored to the group and based on the group's activity data, as shown in block 105.
  • C. Configuration of a Profiler System
  • FIG. 4 illustrates various devices connected to the internet and other devices with which the profiler system is used. To achieve the functionality of the profiler system described above and further described below, various devices, including p-boxes, are connected to the internet or other wide area network. In one embodiment, a data card reader/writer 110 is attached to a retailer's computer or cash register 112 which is connected to the internet 100. Similarly, a data card reader/writer 114 is attached to a service provider's computer or cash register 116 which is connected to the internet 100. A data card reader/writer 124 is attached to a user's computer which is connected to the internet. In some embodiments, a data card reader/writer 125 is attached to a group manager's computer which is connected to the internet. The profiler server 130 is likewise connected to the internet. Although only one retailer computer, one service provider computer, one user computer, one group manager computer, and one profiler server are depicted, multiple retailer computers, multiple service provider computers, multiple user computers, multiple group manager computers and multiple profiler server computers are contemplated in various embodiments. In addition, various financial institution computers 132 and web sites 134 are also connected to the internet, although only one of each are depicted.
  • Further, in some embodiments, the user's television apparatus 122 includes or is coupled to a data card reader/writer. The television apparatus 122 includes, but is not limited to, televisions, video disc players, video tape players, cable television boxes, satellite television boxes, etc. which are connected to the internet. In another embodiment, the user's computer 126 may connect to the profiler server 130 over dial up connection 128. In another embodiment, the group manager's computer 127 may connect to the profiler server 130 one of various connections depicted as connection 129, including, but not limited to a local area network (LAN), WAN, or dial up connection. Although not shown, in other embodiments, each of the retailer computer 112, service provider computer 116, and financial institution computer 132 may have direct leased line or dial-up connections to the profiler server 130 or one another in addition to or in place of the internet connection depicted. Moreover, the connections to the internet may be by any method known to those skilled in the art including fiber optic cable, twisted pair, infra-red, radio frequency bands, cellular phone frequency bands, or other method. Although the internet 100 is depicted, any WAN may be used.
  • In yet another embodiment, a data card reader/writer 140 is attached to a user's automobile 142 which may or may not be connected to the internet 100. When the user's automobile 140 does not have a connection to the internet 100 by radio transmission or other methods of transmission and communication known to those skilled in the art, various data about the user's use of the automobile is stored on the data card via data card reader/writer 140. In various embodiments, the data card reader/writer 140 may be attached to or manufactured as part of a user's automobile 142 or any other system contained in the user's automobile. In a further embodiment, a data card reader/writer 144 is attached to a user's telephone 146 which may or may not be connected to the internet 100. When the user's telephone 146 does not have a connection to the internet 100 by any method known to those skilled in the art, various data about the user's use of the user's telephone 146 is stored on the data card via data card reader/writer 144. In various embodiments, the data card reader/writer 144 may be attached to or manufactured as part of a user's telephone 146. The telephone and automobile embodiments are described in more detail hereinabove.
  • D. How Providers Participate in a Profiler System
  • FIG. 5 illustrates the point of sale activities of a profiler system provider. As discussed above, in one embodiment, a user of the profiler system presents a data card to a provider when involved with any kind of monetary transaction. The provider may be a provider of goods or services. The provider maintains a provider system comprised of a computer or cash register including or coupled to a p-box such that the computer or cash register is connected to the internet, or other WAN. After the provider receives the data card, as shown in block 150, the provider prompts the user to authenticate use of the card and access to the profiler system such as by entering a PIN on a key pad or by any other method of authorization, as shown in block 152. In one embodiment, after reading a PIN typed by the user, as shown in block 154, authentication is achieved by comparing the PIN with an encoded number stored on the data card or on the profiler server. In another embodiment, to authenticate use of the data card, a finger print scanning device (not shown) is also coupled to the computer of the provider to scan the user's finger print and compare it with data stored either on the data card or on the profiler server. In addition, authentication may be achieved in other embodiments by any method known to those skilled in the art, including but not limited to retinal scan and voice print identification.
  • After authentication is completed, the provider system, in one embodiment, obtains a list of the user's financial accounts from the data card, as shown in block 156. In another embodiment, the provider system reads certain financial data from the data card and obtains a list of the user's financial accounts over the internet by communicating with the profiler server, as shown in block 158. The provider system then displays the list of financial accounts to the user and prompts the user to choose which financial account will be accessed to pay for the current transaction, as shown in block 160. The provider system receives an account choice from the user, as shown in block 162, and then asks the user to accept the financial transaction involving the account choice, as shown in block 164. More specifically, the user is asked to confirm that a certain sum representing the current transaction will be drawn from or debited from the particular account. Optionally, in one embodiment, the provider system then obtains authorization for the financial transaction from the financial institution serving or providing the financial account chosen by the user, as shown in block 166. In one embodiment, the authorization causes information concerning the transaction to be stored on the financial institution computer such that the user's account information is updated on the financial institution computer. In yet another embodiment, after a financial institution authorizes the transaction, the user's account information may also be updated at the profiler server and/or on the data card.
  • Then, in one embodiment, the provider system updates financial account information on the data card, and stores activity data on the data card, as shown in blocks 168 and 170. In another embodiment, the provider system stores activity data on the profiler server, as shown in block 172. In another embodiment, the provider system asks the user whether activity data should be transferred to the profiler server and/or stored on the data card. In such an embodiment, only if the user answers affirmatively does the provider system store activity data on the profiler server and/or the data card, as shown in blocks 170 and 172. In such an embodiment, the provider system may also give the user the option to choose whether activity data should be transferred to the profiler server, the data card, or to neither.
  • In yet another embodiment, the data card is used only to store activity data on the data card or to cause activity data to be stored on a profiler server. In this embodiment, the data card is not used to make a payment and is swiped in addition to making payment by any traditional method. In such embodiments, the provider system receives the data card, as shown in block 150. In such an embodiment, the data card would typically be swiped by the user through a p-box coupled to the provider's computer or cash register. The provider system then prompts the user to authenticate use of the card such as by entering a PIN on a key pad or other method of authentication, as shown in block 154. In one embodiment, after reading a PIN typed by the user, as shown in block 154, authentication is achieved by comparing the PIN with an encoded number stored on the data card or on the profiler server. Optionally, in one embodiment, the provider system then obtains further authorization for use of the data card by communicating with the profiler server by any method known to those skilled in the art, including, but not limited to, internet and telephone communication. In such embodiments, the profiler server checks, for example, whether the data card is stolen or has expired, etc. The provider system then stores activity data on the data card or on the profiler server, as shown in blocks 170 and 172. In such an embodiment, all blocks after 154 and before 170 are skipped.
  • E. A Profiler Server
  • FIG. 6A illustrates the activities of a profiler system profiler server when initializing a profiler system user. In one embodiment, before a user of the profiler system uses the data card when making purchases, receiving services, or participating in activities, the user may first initialize the data card and the profiler server with user profile data. In this embodiment, the initial profile data may include, but is not limited to, name, home address, work address, basic health information, personal data favorites, and financial data. The basic health information may include, but is not limited to, maladies and allergies regularly suffered (e.g., diabetes and sinusitis), height, weight, and physical restrictions such as a bad knee, flat feet, eyeglasses, etc. Personal data may include, but is not limited to, shirt size, pant size, physical measurements, shoe size, insurance information, etc. Favorites may include, but are not limited to, favorite brands, restaurants, flavors, colors, kinds of food, kinds of restaurants, kinds of music, musical groups, avocations, interests and hobbies. Financial data may include, but are not limited to, bank accounts and related information, credit card accounts and related information, investment accounts and related information, etc.
  • Referring to FIG. 6A, upon accepting an initial connection from a user, as shown in block 200, the user's data card is present in the p-box attached to or part of the user's personal computer. In this embodiment, when a user logs on for the first time, the profiler server prompts the user for data to create an initial user profile, as shown in block 202. In one embodiment, the prompting for user profile data is achieved via a sequence of internet web pages. The user supplies the requested information, the profiler server receives the user profile data, as shown in block 204, and then creates an initial internal user profile, as shown in block 206.
  • In another embodiment, the user profile information is requested the first time a user starts the profiler application program on a user's personal computer. In this embodiment, after the profiler application program prompts the user for the initial user profile data, the profiler application program creates an internal user profile. The profiler application program then establishes a connection with the profiler server over the internet, and provides internal user profile information to the profiler server. In yet another embodiment, requests for user profile information are staggered and presented to the user over time so as to reduce the burden and inconvenience of entering a large quantity of data when first using the profiler system. Such requests for user profile information may be made, in various embodiments, by the profiler server and/or the profiler application program. To avoid encumbering the user with the burden of entering the user profile data as described in the prior paragraphs, in another embodiment, the profiler system does not require any initial profile data to be entered by the user, and the profiler server skips steps 200 through 206.
  • FIG. 6B illustrates the activities of a profiler system profiler server when initializing a profiler system group. In some embodiments, the user of the profiler system may be a member of a group. If so, the group manager may initialize or create the group on the profiler server. Upon accepting an initial connection from a group manager, as shown in block 201, the group manager's data card is present in the p-box attached to or part of the group manager's computer. In this embodiment, when a group manager logs on for the first time, the profiler server prompts the group manager for data to create an initial group profile, as shown in block 203. In one embodiment, the initial group profile consists of, at a minimum, a designation of all members in a group, either by name, data card number, employee number, or any other unique identifier or combination of unique identifiers. During the creation of the initial group profile, in some embodiments, it is required that the group manager enter each data card of group members into the p-box and concurrently initialize the data cards when initializing the group profile. In one embodiment, the prompting for group profile data is achieved via a sequence of internet web pages. The group manager supplies the requested information, the profiler server receives the group profile data, as shown in block 205, and then the profiler server creates an initial internal group profile, as shown in block 207.
  • FIG. 6C illustrates the activities of a profiler system profiler server when used by a single user. When a user participates in activities using the data card, the profiler server begins receiving activity data for the user from providers over the internet, as shown in block 208. In various embodiments, when activity data is received, it is first decrypted according to methods known to those skilled in the art. In this embodiment, the profiler server begins to automatically process the activity data to create a user profile, as shown in block 210.
  • The profiler server continuously updates the user profile responsive to activity data received, as shown in blocks 208 and 210. That is, basic factual information is retrieved and processed by the profiler server and added to the user profile data. Such information may include, for example, maladies found at a recent doctor's visit, and brand favorites derived from recently observed buying habits as determined by evaluation of user patterns seen through the activity data. In one embodiment, information may be obtained from the activity data by inference or the execution of an inference engine. In such an embodiment, user patterns comprised of various habit data are collected and used to build a user profile. For example, if a user always purchases one brand of orange juice, that brand is entered into the user profile. Another example is, if a user always buys a particular item of clothing in one size, that size information is stored in the user profile. Examples are numerous. Various forms of artificial intelligence, including inference engines and neural nets may be used to analyze the activity data to create the user profile, user patterns and user habit data.
  • The profiler server then searches the web in response to receiving the activity data and based on information contained in the user profile as shown in block 212. This automated search of the internet may be referred to as a reverse search as it is initiated by the profiler system and not by a direct request of the user. That is, the real world activities of a user are used to create user patterns which the profiler system uses to automatically issue and process searches of the internet on behalf of the user. This is the reverse of a typical web search in which a user makes a request of a computer, as here, a computer issues web requests.
  • More specifically, user patterns are regularly evaluated to create user habits unique to and reflective of the particular user based on the activity data. These user habits include, but are not limited to buying habits, web habits, eating habits, user health data, entertainment habits, driving habits, telephone calling habits. Based on these user habits, web queries are sent by the profiler server. The web queries may be sent to specific web sites for specific information or may be general queries sent to existing search engines. For example, certain known health-related web sites may be queried for specific health information pertinent to the user, while general queries may be sent to a search engine for new news or any information concerning a particular health topic gleaned from the activity data and/or the user profile. The processing and evaluation of activity data is ongoing. The profiler system provides rules that the profiler server uses in evaluating the activity data to create user patterns and habit data.
  • In addition, in one embodiment, additional intelligence is included in the profiler system to provide recommendations and information based on the user activity data, user patterns, habit data and/or user profile data. In such an embodiment, the profiler system may also provide cross-referencing of the activity data and deduced and inferred user patterns and habit data, as well as the user profile. This processing and cross-referencing may take the form of multi-processing or simultaneously executing rule engines, inference engines, or an automated agent, all of which will collectively be referred to as “bots”. One such example involves a “price checking bot.” In one embodiment, the “price checking bot” checks the activity data to see which products are either regularly or most often purchased, and provides suggestions to the user upon log in as to where the items can be purchased for less. A certain amount of intelligence is used so that geographically desirable stores and web stores are directed to the user. However, the stores will vary from user to user based on buying habits and the user profile. For example, the “price checking bot” may provide a local discount store to one user and an on-line store to another for the same product if the first user prefers bricks and mortar stores over internet stores. In this example, the opposite applies to the second user. In this example, the user's preferences may have been set by the user in the user profile or deduced from buying habits observed by the profiler system when analyzing the user's activity data.
  • Another example is a “medi-watch bot” that compares the user's health data with the user's diet. In one embodiment, the “medi-watch bot” issues warnings to the user when foods that conflict with medications or that may exacerbate a medical condition are either purchased or ordered at a restaurant.
  • In one embodiment, when the activity data arrives, it may be in a standard form such as a universal product code (UPC) or another code set created specially for this purpose. Various “bots” then extract, organize, and extrapolate the activity data to create user patterns and habit data, as well as to provide recommendations to the user. For example, in one embodiment, an “entertainment bot” receives an activity data specifying that the user watched a particular movie. The “entertainment bot” then looks up the movie code in a database, either on the profiler server or on the internet, and records the stars of the movie and various data about the type of movie. In one embodiment, the data for a movie that is considered important to the “entertainment bot” is what year the movie was made, whether it was a love story, a western, was a comedy, was violent, etc.
  • An example of the profiler system providing cross-referencing of the activity data and deducing and inferring user patterns and habit data, as well as the user profile, involves the “entertainment bot” described in the prior paragraph. The “entertainment bot” creates data that is then used by the “night out bot”. Such data is used by the “night out bot” to provide recommendations about upcoming movies, plays and shows responsive to the data created by the “entertainment bot”. An “eating habits bot” in conjunction with a “grocery bot” and a “restaurant bot” also provide cross-referencing, inference and deduction of and from activity data, habit data, user patterns and/or the user profile. The “eating habits bot” extracts primary ingredients from restaurant selections and grocery store purchases to determine what foods the user prefers. For example whether the user buys cheese pizza, vegetarian pizza, or pepperoni pizza (at a grocery store or restaurant) will be evaluated to determine whether the user is a vegetarian, likes plain or spicy food, likes meats, etc. In one embodiment, a “grocery bot” and a “restaurant bot” then use this information to recommend grocery store sale items and make restaurant recommendations, respectively. The number and kinds of “bots” is numerous and evolving.
  • After issuing web queries, the profiler server then receives, reviews, and filters the responses to the various queries and creates web site and other recommendations for the user responsive to the search results, as shown in block 214. In this way, customized web site and other recommendations are prepared for the user. Then, after authenticating the user's access to the data card and the profiler server, the profiler server accepts the user log on over the internet, as shown in block 216. Whenever a user logs into the profiler server, users are automatically provided with customized web site and other recommendations as well as other relevant information, as shown in block 218. The user then visits the recommended web sites, reads the recommendations, and reads the relevant data. In one embodiment, the profiler server keeps track of which recommendations and data are viewed and accessed by the user, and stores this as additional activity data. In another embodiment, the amount of time a user spends at various web sites, both by category or type of web site as well as by specific web site are stored as activity data and processed to create additional user patterns and web habit data which result in further recommendations.
  • In another embodiment, the profiler server provides the user email messages providing recommendations and relevant information based on user patterns and habit data derived and extrapolated from the user's activity data. In this embodiment, in addition to the recommendations received displayed on the user's monitor when the user logs on, the profiler server sends such email to the user at any time, and the user receives such email when checking email by any method known to those skilled in the art, such as for example, via cellular telephone or other portable computing device. In yet another embodiment, the profiler server sends by electronic page or transmission via any method known in the art, including email, a message that provides pertinent information and recommendations to the user. Such information and recommendations may include, for example, airline flight time data, an alert not to eat certain purchased food based on health data, or product recall notice information regarding items recently purchased.
  • In another embodiment, upon the user logging on, the profiler server retrieves activity data from the user's data card which is inserted in the user's computer, or a p-box coupled to the user's computer, as shown in block 220. In such embodiments, activity data stored on the data card is transferred to the profiler server and evaluated, as shown in block 210. In various embodiments, the activity data is received by the profiler server over the internet, or by direct connection of any kind known in the art, from the user's p-box or user's computer. In various embodiments, when activity data is received, it is first decrypted according to methods known to those skilled in the art. This encryption make take place on both the user's computer and on the profiler server. In one embodiment, the activity data is transferred from the data card and decrypted on the user's computer, stored on the user's computer, and then encrypted and transferred to the profiler server which then decrypts the activity data for processing. In yet another embodiment, when activity data is stored on the user's computer, it remains in encrypted form to prevent access to it by others than the intended user. In such an embodiment, the profiler application program or other components of the profiler system decrypt activity data only when being accessed by a profiler application program after a user has entered a data card and authorized use of the data card and the profiler system.
  • In one embodiment, the profiler server retrieves and services user web requests, as shown in block 222. Upon receiving a web request, the profiler server combines the request with pertinent stored information such as the user profile and user patterns including user habits to send better directed, more focused and more effective web queries. In addition, the profiler server filters the web responses and provides only the most relevant and pertinent search results to the user based on evaluating the responses against the user's web request, the user profile data, and user patterns including user habits. Just as other activity data is transmitted to the profiler server, in one embodiment, the user's web activities are stored by the profiler server as activity data, as shown in block 224. Web activity may include user web requests made by the user as well as all web sites visited by the user, the amount of time spent visiting particular web sites, etc.
  • To allow for additional privacy, in one embodiment, the user is provided the opportunity to turn off the automatic monitoring of web viewing and creation of activity data resulting from web viewing. This feature may be implemented according to any methods known to those skilled in the art, including, but not, limited to, an on-screen button or pull-down menu item. In addition in any such embodiments, whether automated monitoring of web viewing is on or off is reflected graphically on the screen according to methods known to those skilled in the art. For example, in one embodiment, a small graphic commonly referred to as an icon may change color or change image depending on whether automatic web activity monitoring is selected by the user to be on or off.
  • In another embodiment, the profiler server provides various personal analysis programs that a user can execute to evaluate the user's buying and other habits, as well as financial and other data. In one embodiment, the personal analysis programs are run on the profiler server and evaluate data stored on the profiler server. In another embodiment, the personal analysis programs are special purpose mini-application programs, such as JAVA applets, that are provided by the profiler server and downloaded when the user requests a particular personal analysis program. In this embodiment, the personal analysis programs may access either or both data stored on the user's computer or on the profiler server. With regard to any of these embodiments, the profiler server retrieves and services the user's data analysis requests, as shown in block 226. As with any other activities engaged in by the user, the requests for data analysis create activity data that is stored by the profiler server, as shown in block 228.
  • The profiler system also allows the user to update the user profile data at any time after providing initial user profile data or after profile data is created by the profiler server. In one embodiment, when the user is logged onto the profiler server, the user pulls down a menu and chooses “update user profile.” In an other embodiment, the user clicks on an “update user profile” button provided on the screen. In response to receiving the request to update user profile data, in one such embodiment, the profiler server provides user profile update screens to the user, as shown in block 230. After providing the user profile update screen to the user, the profiler server retrieves updated user profile data provided by the user, as shown in block 232. In another embodiment, the profiler application program services the user's request to update user profile data and updates the profiler application program's internal user profile data. In this embodiment, the profiler application program then transmits updated user profile data to the profiler server.
  • FIG. 6D illustrates the activities of a profiler system profiler server when used by a group and a group manager. When a group member participates in activities using the data card, the profiler server begins receiving activity data for the user from providers over the internet, as shown in block 251. The activity data is then routed to the appropriate group and/or user accounts depending on whether the data is group activity data, user activity data, or both. Group activity data may be an aggregation of user activity data. As the processing that occurs when a single user uses the profiler system is already described with regard to FIG. 6C, the following discussion focuses only where group processing and group features of the profiler server may differ, even though group processing may be simultaneous with single user processing in some embodiments.
  • In one embodiment, the profiler server begins to automatically process the activity data to create a group profile, as shown in block 253. The profiler server continuously updates the group profile responsive to activity data received, as shown in blocks 251 and 253. That is, basic factual information is retrieved and processed by the profiler server and added to the group profile data. When used for non-business group purposes, such information may include, for example, brand and item trends, and favorite retailers and providers derived from recently observed buying habits as determined by evaluation of user patterns seen through the activity data. When used for business purposes, such information may include, for example, recent employee travel data and recent employee purchase data, including derivation of brand, retailer and provider favorites gleaned from the group member patterns culled from group activity data. In one embodiment, information may be obtained from the activity data by inference or the execution of an inference engine. Various forms of artificial intelligence, including inference engines and neural nets may be used to analyze the activity data to create and grow the group profile, group patterns and group habit data
  • In one embodiment, user patterns comprised of various group habit data are collected and used to build a group profile. For example, if a group regularly always purchases one brand of copy paper or toilet paper, that brand is entered into the group profile. Another example is, if a group always buys a particular item in one size, that size information is stored in the group profile entry for that item. Examples are numerous.
  • In another embodiment in which the group is a group of businesses, group patterns comprised of various habit data are collected and used to build a group profile. For example, if a group regularly purchases one brand or kind of a particular item, such as a stapler or copy machine paper, that brand and kind of item is entered into the group profile. Another example is, if a group always buys a particular item at particular time intervals or at a particular time of year or time of the month, such buying trends are learned and stored as group patterns, group habit data and/or in the group profile. Other examples are numerous.
  • The profiler server then searches the web in response to receiving the group activity data and based on information contained in the group profile as shown in block 255. More specifically, group patterns are regularly evaluated to create group habits unique to and reflective of the particular group based on the group activity data. Group habits may include, but are not limited to buying habits, web habits, restaurant habits, entertainment habits, driving habits, telephone calling habits. Based on these group habits, web queries are sent by the profiler server. The web queries may be sent to specific web sites for specific information or may be general queries sent to existing search engines. For example, certain known travel web sites may be queried for specific travel information pertinent to the group, such as derived from regular flight to San Jose airport the first Tuesday of every month. General queries may be sent to a search engine for new news or any information concerning a particular topic gleaned from the group activity data and/or the group profile. Such information may be, for example, tax related news stories for a group which happens to be an accounting firm which the profiler system to have an accounting interest based on analysis of group activity data such as group member web research activity data, or explicit statement of the group's business or purpose in the group profile. The processing and evaluation of activity data is ongoing. The profiler system provides rules that the profiler server uses in evaluating the group activity data to create group patterns and group habit data.
  • In addition, in one embodiment, additional intelligence is included in the profiler system to provide recommendations and information based on the group activity data, group patterns, group habit data and/or group profile data. In such an embodiment, the profiler system may also provide cross-referencing of the group activity data and deduced and inferred group patterns and group habit data, as well as the group profile. This processing and cross-referencing may take the form of multi-processing or simultaneously executing rule engines, inference engines, or an automated agent, all of which will collectively be referred to as “bots”. One such example involves a “price checking bot” that works hand in hand with a “goods purchased bot.” In one embodiment, the “goods purchased bot” examines group activity data to learn which products are either regularly or most often purchased by the group. Based on information provided by the “goods purchased bot,” the “price checking bot” sends web queries to learn the prices of the goods at various provider's web sites. The “price checking bot” then receives and processes responses to the queries, and provides suggestions to the group manager upon log in as to where the items can be purchased for less or for a group or bulk discount. A certain amount of intelligence is used so that geographically desirable stores as well as web stores may be reported to the group manager. However, the stores will vary from group to group based on buying habits and the group profile. For example, the “price checking bot” may provide a local discount store to one group and an on-line store to another for the same product if the first group prefers bricks and mortar stores over internet stores. In this example, the group's preferences may have been set by the group in the group profile or deduced from buying habits observed by the profiler system when analyzing the group activity data.
  • Various “bots” then extract, organize, and extrapolate the group activity data to create group patterns and group habit data, as well as to provide recommendations to the group. For example, in one embodiment, a “travel bot” may determine flying habits such as regular trips or preferred airlines.
  • In yet another embodiment, the profiler system also issues automatic requests for bids based on past group activity data, group patterns and the group profile. That is, using the example discussed above, if the “travel bot” determines that one or more members of a group regularly flies to San Jose airport on the first Tuesday of every month, a “request for bid” bot may take this information and send to known travel agent or airline web sites requesting a bid for a group of flights in an attempt to achieve a multiple purchase discount.
  • Similarly, the “request for bid bot” goes beyond what the “price checking bot” does. Based on the group activity data, group patterns and the group profile, and information provided by the “goods purchased bot”, a “request for bid bot” may organize office supplies regularly purchased into a group and automatically send a request for bid for monthly or quarterly delivery of the group's office supplies to internet and local office supply stores. In this way, a buying cooperative comprised of businesses or groups of persons may achieve bulk and/or regular purchase discounts. In this way, the “request for bid bot” serves as an automated business to business reverse bidding mechanism. In one embodiment, such automatic request for bids may be turned off or specified to run as to only certain goods or services by the group manager. The number and kinds of “bots” is numerous and evolving.
  • In another embodiment, in the business to business context, selling activity and inventory are stored as activity data. In such an embodiment, a “selling activity bot” keeps track of goods sold by one company, and an “inventory watch bot” provides recommendations to the group manager of the company responsive to information obtained from the company's activity data and the “selling activity bot.” For example, in one embodiment, when the “inventory watch bot” learns that there is an oversupply of a particular good, the “inventory watch bot” may query the “selling activity bot” and prepare a recommendation to the group manager to offer a particular quantity of the overstocked item to a regular purchaser at a discount. In another embodiment, the “inventory watch bot” may automatically send offers to regular purchasers informing them of a sale on the item when the “inventory watch bot” deduces that there is an overstocked item. In such an embodiment, the group manager may also be informed by the profiler system that the offers have been sent.
  • In a related embodiment, the “inventory watch bot” may determine that stock on an item is too low to meet anticipated demand as determined by automatic analysis of prior selling activity data. In such a situation, the “inventory watch bot” may recommend to the group manager to increase production of the particular item to meet anticipated demand of the item. In another embodiment, the “inventory watch bot” may automatically send mail to the company's factory requesting an increase in production of the particular item while concurrently informing the group manager that such a request has been sent. In these embodiments, inventory activity data may be acquired by an employee scanning bar coded, boxes, crates, pallets or containers of goods while a data card is inserted in a scanner or inserted in a computing device to which the scanner transmits. In another embodiment, inventory data may be obtained directly from a manufacturing facility in a similar manner. In these embodiments, selling activity data may be obtained using a data card while an employee processes orders such that each order entered by a particular employee is stored by the profiler system as selling activity data. In an alternative embodiment, such selling activity data may be obtained from a database of filled invoices, purchase orders or the like.
  • After issuing web queries, including requests for bids, the profiler server then receives, reviews, and filters the responses to the various queries and requests, and creates recommendations for the group manager responsive to the results, as shown in block 257. In this way, customized recommendations are prepared for the group manager. Then, after authenticating the group manager's access to the data card and the profiler server, the profiler server accepts the group manager log on over the internet, as shown in block 259. Whenever a group manager logs into the profiler server, group manager's are automatically provided with customized recommendations as well as other relevant information, as shown in block 261. The group manager then visits recommended web sites, reads the recommendations, and reads other the relevant data. In one embodiment, the profiler server keeps track of which recommendations and data are viewed and accessed by the group manager, and stores this as additional activity data. In another embodiment, the amount of time group members spend at various web sites, both by category or type of web site as well as by specific web site are stored as group activity data and processed to create additional group patterns and group web habit data which result in further recommendations.
  • In another embodiment, upon the group manager logging on, the profiler server transfers group activity data from the profiler server to the group manager's computer, as shown in block 263. In various embodiments, the group activity data is transferred by the profiler server over the internet, or by direct connection of any kind known in the art, to the group manager's computer. In various embodiments, when activity data is received, it is first decrypted according to methods known to those skilled in the art. This encryption make take place on both the user's computer and on the profiler server. In yet another embodiment, when group activity data is stored on the group manager's computer, it remains in encrypted form to prevent access to it by others than the group manager. In such an embodiment, the profiler application program or other components of the profiler system decrypt group activity data only when being accessed by a profiler application program after a group manager has entered a data card and authorized use of the data card and the profiler system.
  • In another embodiment, the profiler server provides various group analysis programs that a program manager can execute to evaluate the group's buying and other habits. In one embodiment, the group analysis programs are run on the profiler server and evaluate data stored on the profiler server. In another embodiment, the group analysis programs are special purpose mini-application programs, such as JAVA applets, that are provided by the profiler server and downloaded when the group manager requests a particular personal analysis program. In this embodiment, the personal analysis programs may access either or both data stored on the group manager's computer or on the profiler server. With regard to any of these embodiments, the profiler server retrieves and services the user's data analysis requests, as shown in block 265.
  • The profiler system also allows the group manager to update the group profile data at any time after providing initial group profile data. In one embodiment, when the group manager is logged onto the profiler server, the group manager pulls down a menu and chooses “update group profile.” In another embodiment, the group manager clicks on an “update group profile” button provided on the screen. In response to receiving the request to update group profile data, in one such embodiment, the profiler server provides group profile update screens to the group manager, as shown in block 267. After providing the user profile update screen to the user, the profiler server retrieves updated group profile data provided by the group manager, as shown in block 269. In another embodiment, the profiler application program services the program manager's request to update group profile data and updates the profiler application program's internal group profile data. In this embodiment, the profiler application program then transmits updated group profile data to the profiler server.
  • In the foregoing specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes can be made thereto without departing from the broader spirit and scope of the invention as set forth in the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. Therefore, the scope of the invention should be limited only by the appended claims.

Claims (48)

1. A method comprising:
recording activity data on a transportable recordable medium (TRM) when participating in an activity;
transferring the activity data by a user device to a profiler across a network, the profiler storing a user controlled profile including the activity data; and
receiving a plurality of recommendations for a user at the user device inferred from the activity data by a user selected profiling program.
2. The method of claim 1 further comprising:
sliding the TRM through a TRM reader when paying for goods, services, and entertainment.
3. The method of claim 2 wherein transferring comprises:
transferring the activity data over the network to the profiler responsive to sliding.
4. The method of claim 2 further comprising:
recording the activity data on the TRM via a TRM reader/writer when paying for goods, services, and entertainment.
5. The method of claim 4 wherein transferring comprises:
transferring the activity data from a TRM over the network to the profiler via a personal computing device.
6. The method of claim 2 further comprising:
sliding the TRM through a TRM reader when doing at least one of the following: watching television, paying for transportation, placing telephone calls, or driving a vehicle.
7. The method of claim 4 further comprising:
recording the activity data on the TRM via a TRM reader/writer when watching television, paying for transportation, placing telephone calls, and driving a vehicle.
8. The method of claim 1 further comprising:
invoking a monetary transaction;
presenting the TRM when a payment is requested;
authenticating access rights to the TRM;
selecting an account derived from a financial data on the TRM; and
consenting to the monetary transaction.
9. The method of claim 8 wherein selecting the account comprises:
choosing among accounts from at least two different financial entities.
10. The method of claim 9 wherein authenticating comprises:
entering a personal identification number (PIN) into the user device.
11. The method of claim 1, wherein the activity data is a universal product code (UPC).
12. The method of claim 1, wherein the plurality of recommendations include alternate locations for purchasing an item.
13. The method of claim 12, further comprising:
displaying alternate locations that are geographically relevant to a user.
14. The method of claim 1, further comprising:
receiving the activity data through scanning of a bar code.
15. The method of claim 5, wherein the personal computing device is a cellular phone.
16. The method of claim 1, wherein the plurality of recommendations include a comparison of prices for an item at local stores.
17. The method of claim 1, wherein the plurality of recommendations include a price for an item at an on-line store.
18. The method of claim 17, further comprising:
providing an interface to initiate purchase of the item through the user device.
20. The method of claim 12, wherein the alternate locations are determined based on user preferences.
21. The method of claim 1, wherein the activity data is transferred to the profiler to generate a web query.
22. The method of claim 1 wherein the activity data is recorded on the TRM by the user device, and wherein the plurality of recommendations are displayed by the user device.
23. The method of claim 22, wherein the user device is any one of a cellular telephone, a portable computer, an electronic personal organizer, desktop computer or dedicated Internet device.
24. The method of claim 8, wherein the user controlled profile has security and access settings controlled by a user.
25. A non-transient computer-readable medium having instructions stored therein, which when executed cause a computer to perform a set of operations comprising:
recording activity data on a transportable recordable medium (TRM) when participating in an activity;
transferring the activity data at a user device to a profiler across a network, the profiler storing a user controlled profile including the activity data; and
receiving a plurality of recommendations by the user device inferred from the activity data by a user selected profiling program.
26. The computer-readable medium of claim 25 further comprising:
sliding the TRM through a TRM reader when paying for goods, services, and entertainment.
27. The computer-readable medium of claim 26 wherein transferring comprises:
transferring the activity data over the network to the profiler responsive to sliding.
28. The computer-readable medium of claim 26 having further instructions stored therein which when executed cause the computer to perform a further set of operations comprising:
recording the activity data on the TRM via a TRM reader/writer when paying for goods, services, and entertainment.
29. The computer-readable medium of claim 28 wherein transferring comprises:
transferring the activity data from a TRM over the network to the profiler via a personal computing device.
30. The computer-readable medium of claim 26 having further instructions stored therein which when executed cause the computer to perform a further set of operations comprising:
sliding the TRM through a TRM reader when doing at least one of the following: watching television, paying for transportation, placing telephone calls, or driving a vehicle.
31. The computer-readable medium of claim 28 having further instructions stored therein which when executed cause the computer to perform a further set of operations comprising:
recording the activity data on the TRM via a TRM reader/writer when watching television, paying for transportation, placing telephone calls, and driving a vehicle.
32. The computer-readable medium of claim 25 having further instructions stored therein which when executed cause the computer to perform a further set of operations comprising:
invoking a monetary transaction;
presenting the TRM when a payment is requested;
authenticating access rights to the TRM;
selecting an account derived from a financial data on the TRM; and
consenting to the monetary transaction.
33. The computer-readable medium of claim 32 wherein selecting the account comprises:
choosing among accounts from at least two different financial entities.
34. The computer-readable medium of claim 33 wherein authenticating comprises:
entering a personal identification number (PIN) into the user device.
35. The computer-readable medium of claim 25, wherein the activity data is a universal product code (UPC).
36. The computer-readable medium of claim 26, wherein the plurality of recommendations include alternate locations for purchasing an item.
37. The computer-readable medium of claim 36, having further instructions stored therein which when executed cause the computer to perform a further set of operations comprising:
displaying alternate locations that are geographically relevant to a user.
38. The computer-readable medium of claim 25, having further instructions stored therein which when executed cause the computer to perform a further set of operations comprising:
receiving the activity data through scanning of a bar code.
39. The computer-readable medium of claim 29, wherein the personal computing device is a cellular phone.
40. The computer-readable medium of claim 25, wherein the plurality of recommendations include a comparison of prices for an item at local stores.
41. The computer-readable medium of claim 25, wherein the plurality of recommendations include a price for an item at an on-line store.
42. The computer-readable medium of claim 41, having further instructions stored therein which when executed cause the computer to perform a further set of operations comprising:
providing an interface to initiate purchase of the item through the user device.
43. The computer-readable medium of claim 36, wherein the alternate locations are determined based on user preferences.
44. The computer-readable medium of claim 25, wherein the activity data is transferred to the profiler to generate a web query.
45. The computer-readable medium of claim 25, wherein activity data is recorded on the TRM by the user device, and wherein the plurality of recommendations are displayed by the user device.
46. The computer-readable medium of claim 45, wherein the user device is any one of a cellular telephone, a portable computer, an electronic personal organizer, desktop computer or dedicated Internet device.
47. The computer-readable medium of claim 32, wherein the user controlled profile has security and access settings controlled by a user.
48. The method of claim 1, wherein the user selected profiling program is any one of a bot, an inference engine or a neural network.
49. The computer-readable medium of claim 25, wherein the user selected profiling program is any one of a bot, an inference engine or a neural network.
US13/781,467 2000-03-15 2013-02-28 Method for Providing Information and Recommendations Based on User Activity Abandoned US20130218713A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/781,467 US20130218713A1 (en) 2000-03-15 2013-02-28 Method for Providing Information and Recommendations Based on User Activity
US14/298,620 US20140289220A1 (en) 2000-03-15 2014-06-06 Tanner Project for Personalized Medicine

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US09/525,235 US6611881B1 (en) 2000-03-15 2000-03-15 Method and system of providing credit card user with barcode purchase data and recommendation automatically on their personal computer
US10/611,097 US8452653B1 (en) 2000-03-15 2003-06-30 Method for providing information and recommendations based on user activity
US13/152,173 US20110238478A1 (en) 2000-03-15 2011-06-02 Method for Providing Information and Recommendations Based on User Activity
US13/781,467 US20130218713A1 (en) 2000-03-15 2013-02-28 Method for Providing Information and Recommendations Based on User Activity

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/152,173 Continuation US20110238478A1 (en) 2000-03-15 2011-06-02 Method for Providing Information and Recommendations Based on User Activity

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/298,620 Continuation US20140289220A1 (en) 2000-03-15 2014-06-06 Tanner Project for Personalized Medicine

Publications (1)

Publication Number Publication Date
US20130218713A1 true US20130218713A1 (en) 2013-08-22

Family

ID=48445409

Family Applications (5)

Application Number Title Priority Date Filing Date
US09/525,235 Expired - Fee Related US6611881B1 (en) 2000-03-15 2000-03-15 Method and system of providing credit card user with barcode purchase data and recommendation automatically on their personal computer
US10/611,097 Expired - Fee Related US8452653B1 (en) 2000-03-15 2003-06-30 Method for providing information and recommendations based on user activity
US13/152,173 Abandoned US20110238478A1 (en) 2000-03-15 2011-06-02 Method for Providing Information and Recommendations Based on User Activity
US13/781,467 Abandoned US20130218713A1 (en) 2000-03-15 2013-02-28 Method for Providing Information and Recommendations Based on User Activity
US14/298,620 Abandoned US20140289220A1 (en) 2000-03-15 2014-06-06 Tanner Project for Personalized Medicine

Family Applications Before (3)

Application Number Title Priority Date Filing Date
US09/525,235 Expired - Fee Related US6611881B1 (en) 2000-03-15 2000-03-15 Method and system of providing credit card user with barcode purchase data and recommendation automatically on their personal computer
US10/611,097 Expired - Fee Related US8452653B1 (en) 2000-03-15 2003-06-30 Method for providing information and recommendations based on user activity
US13/152,173 Abandoned US20110238478A1 (en) 2000-03-15 2011-06-02 Method for Providing Information and Recommendations Based on User Activity

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/298,620 Abandoned US20140289220A1 (en) 2000-03-15 2014-06-06 Tanner Project for Personalized Medicine

Country Status (4)

Country Link
US (5) US6611881B1 (en)
EP (1) EP1588285A1 (en)
AU (1) AU2002247395A1 (en)
WO (1) WO2003081473A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120316865A1 (en) * 2011-06-13 2012-12-13 Mitsuhiro Miyazaki Information processing apparatus, information processing method, and program
US20140316889A1 (en) * 2013-03-14 2014-10-23 American Express Travel Related Services Company, Inc. Systems and Methods for Identifying and Delivering Tailored Content Based Upon a Service Dialog
US8909583B2 (en) 2011-09-28 2014-12-09 Nara Logics, Inc. Systems and methods for providing recommendations based on collaborative and/or content-based nodal interrelationships
US9009088B2 (en) 2011-09-28 2015-04-14 Nara Logics, Inc. Apparatus and method for providing harmonized recommendations based on an integrated user profile
US9489677B2 (en) 2012-06-04 2016-11-08 American Express Travel Related Services Company, Inc. Systems and methods for delivering tailored content based upon a consumer profile
US10419575B2 (en) 2014-08-25 2019-09-17 Samsung Electronics Co., Ltd. Method and apparatus for providing personalized service
US10467677B2 (en) 2011-09-28 2019-11-05 Nara Logics, Inc. Systems and methods for providing recommendations based on collaborative and/or content-based nodal interrelationships
US10789526B2 (en) 2012-03-09 2020-09-29 Nara Logics, Inc. Method, system, and non-transitory computer-readable medium for constructing and applying synaptic networks
US11151617B2 (en) 2012-03-09 2021-10-19 Nara Logics, Inc. Systems and methods for providing recommendations based on collaborative and/or content-based nodal interrelationships
US11443359B2 (en) * 2017-07-10 2022-09-13 Visa International Service Association System, method, and computer program product for segmenting users in a region based on predicted activity
US11727249B2 (en) 2011-09-28 2023-08-15 Nara Logics, Inc. Methods for constructing and applying synaptic networks

Families Citing this family (133)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8601373B1 (en) 1999-11-16 2013-12-03 Ebay Inc. Network-based sales system with customizable user interface
US6859608B1 (en) * 1999-12-10 2005-02-22 Sony Corporation Auto title frames generation method and apparatus
US20010032260A1 (en) * 2000-04-13 2001-10-18 Hiroyuki Kaneko Server
US7734758B1 (en) * 2000-07-19 2010-06-08 Cisco Technology, Inc. USB encapsulation for network transmission
US7590556B1 (en) * 2000-08-24 2009-09-15 International Apparel Group, Llc System and method for providing lifestyle specific information services, and products over a global computer network such as the internet
WO2002025459A1 (en) * 2000-09-20 2002-03-28 Sony Corporation Distribution system and distribution method
US7209733B2 (en) * 2000-10-06 2007-04-24 Pay X Pda, Llc Credit manager method and system
US7979057B2 (en) * 2000-10-06 2011-07-12 S.F. Ip Properties 62 Llc Third-party provider method and system
US20020165792A1 (en) * 2000-10-10 2002-11-07 Calvin Morrell Systems and methods for distributing goods, services and benefits according to grouped member matrices
US7860776B1 (en) * 2000-10-11 2010-12-28 Ebay Inc. Sales system with buyer price selection
AU2002258358A1 (en) * 2000-10-27 2002-09-04 Softconnex Technologies Automatic embedded host configuration system and method
US6754640B2 (en) * 2000-10-30 2004-06-22 William O. Bozeman Universal positive pay match, authentication, authorization, settlement and clearing system
US7174453B2 (en) 2000-12-29 2007-02-06 America Online, Inc. Message screening system
JP2002245229A (en) * 2001-02-20 2002-08-30 Sony Corp Customer management system for restaurant, customer management method, order reception/customer management system, and order reception/customer management method
CN100432963C (en) * 2001-05-18 2008-11-12 尼康照相机贩卖株式会社 Electronic shop and electronic noticing-plate providing method, site searching method
CN101853473B (en) * 2001-05-18 2013-08-14 株式会社尼康 Method for providing bulletin board for placing an image and method for providing electronic album service
CN100394422C (en) * 2001-05-18 2008-06-11 株式会社尼康 Electronic shop customer registration method
WO2003009105A2 (en) 2001-07-20 2003-01-30 Fairmarket, Inc. Automated listing management
US7644144B1 (en) * 2001-12-21 2010-01-05 Microsoft Corporation Methods, tools, and interfaces for the dynamic assignment of people to groups to enable enhanced communication and collaboration
JP2003196364A (en) * 2001-12-26 2003-07-11 Nec Infrontia Corp System and method for displaying menu
US6883709B2 (en) * 2002-02-12 2005-04-26 Famous Horse, Inc. Biometric identification and security system associated with cash register
US20030208755A1 (en) * 2002-05-01 2003-11-06 Koninklijke Philips Electronics N.V. Conversational content recommender
US8712218B1 (en) 2002-12-17 2014-04-29 At&T Intellectual Property Ii, L.P. System and method for providing program recommendations through multimedia searching based on established viewer preferences
US7640336B1 (en) * 2002-12-30 2009-12-29 Aol Llc Supervising user interaction with online services
US7614078B1 (en) * 2003-04-02 2009-11-03 Cisco Technology, Inc. Threshold access based upon stored credentials
US20040225542A1 (en) * 2003-04-04 2004-11-11 Charles Whiteman System and method for arranging group travel
US20050076182A1 (en) * 2003-10-03 2005-04-07 Minne Mark W. Memory module
US7734729B2 (en) * 2003-12-31 2010-06-08 Amazon Technologies, Inc. System and method for obtaining information relating to an item of commerce using a portable imaging device
WO2005094226A2 (en) 2004-03-04 2005-10-13 United States Postal Service System and method for providing centralized management and distribution of information to remote users
US20050221843A1 (en) * 2004-03-30 2005-10-06 Kimberley Friedman Distribution of location specific advertising information via wireless communication network
US7756879B2 (en) * 2004-07-23 2010-07-13 Jeffrey Parsons System and method for estimating user ratings from user behavior and providing recommendations
US10248917B1 (en) 2004-10-14 2019-04-02 Capital One Services, Llc System and method for developing and utilizing a contactability profile
US11283885B2 (en) * 2004-10-19 2022-03-22 Verizon Patent And Licensing Inc. System and method for location based matching and promotion
US20060224579A1 (en) * 2005-03-31 2006-10-05 Microsoft Corporation Data mining techniques for improving search engine relevance
US20080033857A1 (en) * 2005-04-25 2008-02-07 Moses Manuel B Pooling data for consumer credit or debit cards
US8700523B2 (en) * 2005-06-10 2014-04-15 American Express Travel Related Services Company, Inc. System and method for delegating management of a financial transaction account to a designated assistant
JP3948487B1 (en) * 2006-01-13 2007-07-25 オムロン株式会社 Isolated operation detection method, distributed power supply isolated operation detection control device, isolated operation detection device, and distributed power supply
US7966224B1 (en) * 2006-04-27 2011-06-21 Amdocs Software Systems Limited System, method and computer program product for generating a relationship-based recommendation
US7516418B2 (en) * 2006-06-01 2009-04-07 Microsoft Corporation Automatic tracking of user data and reputation checking
US20080004978A1 (en) * 2006-06-30 2008-01-03 Rothschild Trust Holdings, Llc System and method for identifying digital media content and downloading the content or a portion thereof to a mobile device
GB2442024A (en) * 2006-09-20 2008-03-26 Motorola Inc Context sensitive user preference prediction
US7826464B2 (en) * 2007-01-10 2010-11-02 Mikhail Fedorov Communication system
US8239274B2 (en) * 2007-01-11 2012-08-07 Microsoft Corporation Purchasing of individual features of a software product
US7738899B1 (en) * 2007-03-29 2010-06-15 Nextel Communications Inc. System and method for groups comprising non-communication address objects
US9607175B2 (en) * 2007-05-21 2017-03-28 International Business Machines Corporation Privacy safety manager system
US8972177B2 (en) * 2008-02-26 2015-03-03 Microsoft Technology Licensing, Llc System for logging life experiences using geographic cues
US8015144B2 (en) 2008-02-26 2011-09-06 Microsoft Corporation Learning transportation modes from raw GPS data
US8966121B2 (en) * 2008-03-03 2015-02-24 Microsoft Corporation Client-side management of domain name information
US20090289110A1 (en) * 2008-05-22 2009-11-26 Paul Regen Wireless Biometric Computer Mouse with Integrated Credit Card Reader
US9892468B1 (en) 2008-06-30 2018-02-13 Amazon Technologies, Inc. Method and system for recommending activities to a community of contacts
US8655820B2 (en) * 2008-08-28 2014-02-18 Empire Technology Development Llc Real-time lifestyle recommendation system
US8316020B1 (en) * 2008-12-09 2012-11-20 Amdocs Software Systems Limited System, method, and computer program for creating a group profile based on user profile attributes and a rule
US9063226B2 (en) * 2009-01-14 2015-06-23 Microsoft Technology Licensing, Llc Detecting spatial outliers in a location entity dataset
US8539359B2 (en) 2009-02-11 2013-09-17 Jeffrey A. Rapaport Social network driven indexing system for instantly clustering people with concurrent focus on same topic into on-topic chat rooms and/or for generating on-topic search results tailored to user preferences regarding topic
US8166104B2 (en) * 2009-03-19 2012-04-24 Microsoft Corporation Client-centered usage classification
US20100257035A1 (en) * 2009-04-07 2010-10-07 Microsoft Corporation Embedded content brokering and advertisement selection delegation
US20100262547A1 (en) * 2009-04-14 2010-10-14 Microsoft Corporation User information brokering
US9654590B2 (en) * 2009-06-26 2017-05-16 Telefonaktiebolaget L M Ericsson Method and arrangement in a communication network
US8352327B2 (en) * 2009-07-21 2013-01-08 Harris Intellectual Property, Lp System and method for tracking purchases
US8275649B2 (en) * 2009-09-18 2012-09-25 Microsoft Corporation Mining life pattern based on location history
US9009177B2 (en) 2009-09-25 2015-04-14 Microsoft Corporation Recommending points of interests in a region
US8732171B2 (en) * 2010-01-28 2014-05-20 Microsoft Corporation Providing query suggestions
US8612134B2 (en) * 2010-02-23 2013-12-17 Microsoft Corporation Mining correlation between locations using location history
US9261376B2 (en) * 2010-02-24 2016-02-16 Microsoft Technology Licensing, Llc Route computation based on route-oriented vehicle trajectories
US10288433B2 (en) * 2010-02-25 2019-05-14 Microsoft Technology Licensing, Llc Map-matching for low-sampling-rate GPS trajectories
US9124651B2 (en) 2010-03-30 2015-09-01 Microsoft Technology Licensing, Llc Controlling media consumption privacy settings
US8909950B1 (en) 2010-04-18 2014-12-09 Aptima, Inc. Systems and methods of power management
US8719198B2 (en) 2010-05-04 2014-05-06 Microsoft Corporation Collaborative location and activity recommendations
US20110288378A1 (en) * 2010-05-24 2011-11-24 Codd Timothy D Method of Administering A Lifestyle Tracking System
US9593957B2 (en) 2010-06-04 2017-03-14 Microsoft Technology Licensing, Llc Searching similar trajectories by locations
US20110302021A1 (en) * 2010-06-08 2011-12-08 Reid Christopher S Fundraising process using pos technology
US20120042263A1 (en) 2010-08-10 2012-02-16 Seymour Rapaport Social-topical adaptive networking (stan) system allowing for cooperative inter-coupling with external social networking systems and other content sources
US20120084309A1 (en) * 2010-10-04 2012-04-05 TDNC Corp. System and method for matching couples with events
US9177259B1 (en) * 2010-11-29 2015-11-03 Aptima Inc. Systems and methods for recognizing and reacting to spatiotemporal patterns
US8676937B2 (en) 2011-05-12 2014-03-18 Jeffrey Alan Rapaport Social-topical adaptive networking (STAN) system allowing for group based contextual transaction offers and acceptances and hot topic watchdogging
US9984338B2 (en) * 2011-05-17 2018-05-29 Excalibur Ip, Llc Real time e-commerce user interface for monitoring and interacting with consumers
US20130007609A1 (en) * 2011-06-30 2013-01-03 International Business Machines Corporation Constraint based reading recommendation
JP5745388B2 (en) * 2011-11-17 2015-07-08 日本電信電話株式会社 Content recommendation apparatus, method, and program
US9754226B2 (en) 2011-12-13 2017-09-05 Microsoft Technology Licensing, Llc Urban computing of route-oriented vehicles
US20130166188A1 (en) 2011-12-21 2013-06-27 Microsoft Corporation Determine Spatiotemporal Causal Interactions In Data
US9710480B2 (en) 2012-03-09 2017-07-18 Nokia Corporation Method and apparatus for performing an incremental update of a recommendation model
US20130268576A1 (en) * 2012-04-05 2013-10-10 Richard Barnett Method and apparatus for data transfer reconciliation
US20140067564A1 (en) 2012-08-30 2014-03-06 Ebay Inc. Shopping list creator and optimizer
US9660993B2 (en) * 2012-10-25 2017-05-23 Facebook, Inc. Event reporting and handling
US8527306B1 (en) * 2012-11-12 2013-09-03 State Farm Mutual Automobile Insurance Company Automation and security application store suggestions based on claims data
US8533144B1 (en) 2012-11-12 2013-09-10 State Farm Mutual Automobile Insurance Company Automation and security application store suggestions based on usage data
US20140164404A1 (en) * 2012-12-10 2014-06-12 Nokia Corporation Method and apparatus for providing proxy-based content recommendations
US9942334B2 (en) 2013-01-31 2018-04-10 Microsoft Technology Licensing, Llc Activity graphs
US20140229323A1 (en) * 2013-02-13 2014-08-14 vMobo, Inc. Location and transaction-based recommendations
US10664896B2 (en) * 2013-02-13 2020-05-26 Yan Or Location and transaction-based recommendations
US20140279505A1 (en) * 2013-03-14 2014-09-18 Bank Of America Corporation Recommending vehicle for payment based on social network data
US9589535B2 (en) 2013-07-19 2017-03-07 Paypal, Inc. Social mobile game for recommending items
US9773018B2 (en) 2013-08-13 2017-09-26 Ebay Inc. Mapping item categories to ambiguous queries by geo-location
US9786019B2 (en) 2013-09-20 2017-10-10 Bank Of America Corporation Grouped packages for a financial and social management system
US9786018B2 (en) 2013-09-20 2017-10-10 Bank Of America Corporation Activity list enhanced with images for a financial and social management system
US9323852B2 (en) 2013-09-20 2016-04-26 Bank Of America Corporation Activity list filters for a financial and social management system
US9324115B2 (en) 2013-09-20 2016-04-26 Bank Of America Corporation Activity review for a financial and social management system
US10002395B2 (en) 2013-09-20 2018-06-19 Bank Of America Corporation Interactive mapping system for user experience augmentation
US9934536B2 (en) 2013-09-20 2018-04-03 Bank Of America Corporation Interactive map for grouped activities within a financial and social management system
US9324114B2 (en) 2013-09-20 2016-04-26 Bank Of America Corporation Interactive map for grouped activities within a financial and social management system
CA2865802A1 (en) 2013-09-30 2015-03-30 The Toronto-Dominion Bank Systems and methods for administering investment portfolios based on transaction data
US20150100456A1 (en) 2013-10-09 2015-04-09 The Toronto-Dominion Bank Systems and methods for identifying product recommendations based on investment portfolio data
US10997183B2 (en) * 2013-12-05 2021-05-04 Lenovo (Singapore) Pte. Ltd. Determining trends for a user using contextual data
US9626697B2 (en) 2013-12-08 2017-04-18 Marshall Feature Recognition Llc Method and apparatus for accessing electronic data via a plurality of electronic tags
US20150199748A1 (en) * 2014-01-10 2015-07-16 Capital One Financial Corporation Systems and Methods for Managing Three Dimensional Manufacturing
US10311095B2 (en) * 2014-01-17 2019-06-04 Renée BUNNELL Method and system for qualitatively and quantitatively analyzing experiences for recommendation profiles
CN104112022B (en) * 2014-07-29 2018-06-05 青岛海信医疗设备股份有限公司 The recommendation method of sample in medical refrigerator system
US10678890B2 (en) 2015-08-06 2020-06-09 Microsoft Technology Licensing, Llc Client computing device health-related suggestions
US10360569B2 (en) * 2015-10-16 2019-07-23 International Business Machines Corporation Utilizing physical cookies to connect physical world experiences to digital world outcomes
US9438691B1 (en) * 2015-10-26 2016-09-06 Supirb Technologies, LLC Online social referral network
US10210582B2 (en) * 2015-12-03 2019-02-19 Mastercard International Incorporated Method and system for platform data updating based on electronic transaction product data
US10373131B2 (en) 2016-01-04 2019-08-06 Bank Of America Corporation Recurring event analyses and data push
US9679426B1 (en) 2016-01-04 2017-06-13 Bank Of America Corporation Malfeasance detection based on identification of device signature
US11068957B2 (en) * 2016-05-05 2021-07-20 Under Armour, Inc. System and method for providing recommendations based on travel path and activity data
US10430860B2 (en) * 2016-09-23 2019-10-01 Conduent Business Services, Llc Systems and methods for enhancing shopping experience in physical stores
US10361975B2 (en) 2016-10-10 2019-07-23 Microsoft Technology Licensing, Llc Messaging bot selection in multi-bot chat sessions
US10628458B2 (en) 2017-01-31 2020-04-21 Walmart Apollo, Llc Systems and methods for automated recommendations
US11609964B2 (en) 2017-01-31 2023-03-21 Walmart Apollo, Llc Whole page personalization with cyclic dependencies
US10592577B2 (en) 2017-01-31 2020-03-17 Walmart Apollo, Llc Systems and methods for updating a webpage
US10366133B2 (en) 2017-01-31 2019-07-30 Walmart Apollo, Llc Systems and methods for whole page personalization
US10554779B2 (en) 2017-01-31 2020-02-04 Walmart Apollo, Llc Systems and methods for webpage personalization
US11010784B2 (en) 2017-01-31 2021-05-18 Walmart Apollo, Llc Systems and methods for search query refinement
US10068284B1 (en) 2017-08-29 2018-09-04 Snowfall Technologies Llc Graphical user interface having scrollable, visual representation of historical product searches and direct shopping cart links
US11687800B2 (en) 2017-08-30 2023-06-27 P Tech, Llc Artificial intelligence and/or virtual reality for activity optimization/personalization
US10346896B1 (en) 2017-12-15 2019-07-09 Capital One Services, Llc Systems and methods for transaction-based real time pre-intent recommendations for a sequential purchase
US10931674B2 (en) 2018-04-30 2021-02-23 Paypal, Inc. Detecting whether to implement one or more security measures on a shared resource
US10949224B2 (en) 2019-01-29 2021-03-16 Walmart Apollo Llc Systems and methods for altering a GUI in response to in-session inferences
US11586681B2 (en) 2019-06-04 2023-02-21 Bank Of America Corporation System and methods to mitigate adversarial targeting using machine learning
CN110287225B (en) * 2019-06-28 2021-04-02 宇宙世代信息技术(深圳)有限公司 Data coding management method and device, computer equipment and storage medium
US11455655B2 (en) * 2019-12-20 2022-09-27 Walmart Apollo, Llc Methods and apparatus for electronically providing item recommendations for advertisement
US11341528B2 (en) 2019-12-30 2022-05-24 Walmart Apollo, Llc Methods and apparatus for electronically determining item advertisement recommendations
CN112948671A (en) * 2020-08-02 2021-06-11 吕维东 Service processing method and service processing system based on big data and artificial intelligence
US20220358246A1 (en) * 2021-05-06 2022-11-10 Jpmorgan Chase Bank, N.A. Systems and methods for local data storage

Family Cites Families (184)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL6814789A (en) * 1968-10-25 1970-04-20
US3961164A (en) 1974-09-13 1976-06-01 Westvaco Corporation UPC encodation verifier
US4650977A (en) * 1983-12-21 1987-03-17 International Business Machines Corporation Automatic self service machine system and method
US4723212A (en) 1984-07-18 1988-02-02 Catalina Marketing Corp. Method and apparatus for dispensing discount coupons
US4910672A (en) 1984-07-18 1990-03-20 Catalina Marketing Corporation Method and apparatus for dispensing discount coupons
US5173851A (en) 1984-07-18 1992-12-22 Catalina Marketing International, Inc. Method and apparatus for dispensing discount coupons in response to the purchase of one or more products
US4706121B1 (en) 1985-07-12 1993-12-14 Insight Telecast, Inc. Tv schedule system and process
US4977455B1 (en) 1988-07-15 1993-04-13 System and process for vcr scheduling
US5119188A (en) 1988-10-25 1992-06-02 Telaction Corporation Digital audio-video presentation display system
US5305196A (en) 1989-05-01 1994-04-19 Credit Verification Corporation Check transaction processing, database building and marketing method and system utilizing automatic check reading
US5621812A (en) 1989-05-01 1997-04-15 Credit Verification Corporation Method and system for building a database for use with selective incentive marketing in response to customer shopping histories
US6684195B1 (en) 1989-05-01 2004-01-27 Catalina Marketing International, Inc. Method and system for selective incentive point-of-sale marketing in response to customer shopping histories
US5644723A (en) 1989-05-01 1997-07-01 Credit Verification Corporation Method and system for selective incentive point-of-sale marketing in response to customer shopping histories
US6334108B1 (en) 1989-05-01 2001-12-25 Catalina Marketing International, Inc. Method and system for selective incentive point-of-sale marketing in response to customer shopping histories
JPH0378082A (en) * 1989-08-21 1991-04-03 Hitachi Ltd Reservation transaction processing method
CA2499761C (en) 1990-09-10 2005-11-29 Starsight Telecast, Inc. User interface for television schedule system
CA2067987A1 (en) 1991-05-06 1992-11-07 Michael R. O'brien Method and apparatus for selective distribution of discount coupons
US5832457A (en) 1991-05-06 1998-11-03 Catalina Marketing International, Inc. Method and apparatus for selective distribution of discount coupons based on prior customer behavior
US6292786B1 (en) 1992-05-19 2001-09-18 Incentech, Inc. Method and system for generating incentives based on substantially real-time product purchase information
US5410326A (en) 1992-12-04 1995-04-25 Goldstein; Steven W. Programmable remote control device for interacting with a plurality of remotely controlled devices
WO1994013107A1 (en) 1992-12-09 1994-06-09 Discovery Communications, Inc. Advanced set top terminal for cable television delivery systems
JPH07175868A (en) 1993-10-15 1995-07-14 Internatl Business Mach Corp <Ibm> Method and system for output of digital information to medium
US5617570A (en) * 1993-11-03 1997-04-01 Wang Laboratories, Inc. Server for executing client operation calls, having a dispatcher, worker tasks, dispatcher shared memory area and worker control block with a task memory for each worker task and dispatcher/worker task semaphore communication
US5553242A (en) * 1993-11-03 1996-09-03 Wang Laboratories, Inc. Client/server connection sharing
FR2713427B1 (en) 1993-12-01 1995-12-29 Thomson Consumer Electronics Method for selecting video programs.
US5689669A (en) 1994-04-29 1997-11-18 General Magic Graphical user interface for navigating between levels displaying hallway and room metaphors
US5559548A (en) 1994-05-20 1996-09-24 Davis; Bruce System and method for generating an information display schedule for an electronic program guide
US5640193A (en) 1994-08-15 1997-06-17 Lucent Technologies Inc. Multimedia service access by reading marks on an object
US5878222A (en) 1994-11-14 1999-03-02 Intel Corporation Method and apparatus for controlling video/audio and channel selection for a communication signal based on channel data indicative of channel contents of a signal
US5801702A (en) 1995-03-09 1998-09-01 Terrabyte Technology System and method for adding network links in a displayed hierarchy
US5935002A (en) 1995-03-10 1999-08-10 Sal Falciglia, Sr. Falciglia Enterprises Computer-based system and method for playing a bingo-like game
AU711508B2 (en) 1995-03-23 1999-10-14 Schlumberger Technology B.V. Nuclear magnetic resonance borehole logging apparatus and method
JPH08336970A (en) 1995-04-14 1996-12-24 Seiko Epson Corp Ink-jet type recording device
US6321208B1 (en) * 1995-04-19 2001-11-20 Brightstreet.Com, Inc. Method and system for electronic distribution of product redemption coupons
CA2150215C (en) 1995-05-25 2003-02-25 John Xidos Distributed gaming system
US5978773A (en) 1995-06-20 1999-11-02 Neomedia Technologies, Inc. System and method for using an ordinary article of commerce to access a remote computer
US6112186A (en) 1995-06-30 2000-08-29 Microsoft Corporation Distributed system for facilitating exchange of user information and opinion using automated collaborative filtering
JP3698273B2 (en) 1995-07-20 2005-09-21 ソニー株式会社 Electronic program guide transmission apparatus and method, electronic program guide reception apparatus and method, and electronic program guide transmission / reception system and method
US5857175A (en) 1995-08-11 1999-01-05 Micro Enhancement International System and method for offering targeted discounts to customers
US5710887A (en) 1995-08-29 1998-01-20 Broadvision Computer system and method for electronic commerce
US6075575A (en) 1995-10-02 2000-06-13 Starsight Telecast, Inc. Remote control device and method for using television schedule information
US6388714B1 (en) 1995-10-02 2002-05-14 Starsight Telecast Inc Interactive computer system for providing television schedule information
US5737533A (en) 1995-10-26 1998-04-07 Wegener Internet Projects Bv System for generating a virtual reality scene in response to a database search
US5625781A (en) 1995-10-31 1997-04-29 International Business Machines Corporation Itinerary list for interfaces
WO1997026729A2 (en) 1995-12-27 1997-07-24 Robinson Gary B Automated collaborative filtering in world wide web advertising
US6138107A (en) 1996-01-04 2000-10-24 Netscape Communications Corporation Method and apparatus for providing electronic accounts over a public network
US5925103A (en) 1996-01-26 1999-07-20 Magallanes; Edward Patrick Internet access device
US5892827A (en) 1996-06-14 1999-04-06 Catalina Marketing International, Inc. Method and apparatus for generating personal identification numbers for use in consumer transactions
US5821937A (en) 1996-02-23 1998-10-13 Netsuite Development, L.P. Computer method for updating a network design
US6330005B1 (en) 1996-02-23 2001-12-11 Visionael Corporation Communication protocol binding in a computer system for designing networks
US6199098B1 (en) 1996-02-23 2001-03-06 Silicon Graphics, Inc. Method and apparatus for providing an expandable, hierarchical index in a hypertextual, client-server environment
JP2000505616A (en) 1996-02-26 2000-05-09 イー グイド インコーポレイテッド Cordless phone backlinks for interactive television systems
US5758126A (en) 1996-03-19 1998-05-26 Sterling Commerce, Inc. Customizable bidirectional EDI translation system
US6005631A (en) 1996-03-28 1999-12-21 Scientific-Atlanta, Inc. Methods and apparatus for organizing and searching an electronic programming guide
US6025837A (en) 1996-03-29 2000-02-15 Micrsoft Corporation Electronic program guide with hyperlinks to target resources
US5848396A (en) 1996-04-26 1998-12-08 Freedom Of Information, Inc. Method and apparatus for determining behavioral profile of a computer user
CA2254944A1 (en) 1996-05-23 1997-11-27 Citibank, N.A. Global financial services integration system and process
US6014638A (en) * 1996-05-29 2000-01-11 America Online, Inc. System for customizing computer displays in accordance with user preferences
US5727129A (en) 1996-06-04 1998-03-10 International Business Machines Corporation Network system for profiling and actively facilitating user activities
US5900905A (en) 1996-06-05 1999-05-04 Microsoft Corporation System and method for linking video, services and applications in an interactive television system
US6314406B1 (en) 1996-06-26 2001-11-06 Telxon Corporation Customer information network
US5958012A (en) 1996-07-18 1999-09-28 Computer Associates International, Inc. Network management system using virtual reality techniques to display and simulate navigation to network components
US5956693A (en) 1996-07-19 1999-09-21 Geerlings; Huib Computer system for merchant communication to customers
US5911145A (en) 1996-07-29 1999-06-08 Rae Technology, Inc. Hierarchical structure editor for web sites
AU3908297A (en) 1996-08-06 1998-02-25 Starsight Telecast Incorporated Electronic program guide with interactive areas
US6292782B1 (en) 1996-09-09 2001-09-18 Philips Electronics North America Corp. Speech recognition and verification system enabling authorized data transmission over networked computer systems
US6618039B1 (en) 1996-09-12 2003-09-09 Gerry R. Grant Pocket-sized user interface for internet browser terminals and the like
US5902353A (en) 1996-09-23 1999-05-11 Motorola, Inc. Method, system, and article of manufacture for navigating to a resource in an electronic network
US5903729A (en) 1996-09-23 1999-05-11 Motorola, Inc. Method, system, and article of manufacture for navigating to a resource in an electronic network
US6172677B1 (en) 1996-10-07 2001-01-09 Compaq Computer Corporation Integrated content guide for interactive selection of content and services on personal computer systems with multiple sources and multiple media presentation
US6006252A (en) 1996-10-08 1999-12-21 Wolfe; Mark A. System and method for communicating information relating to a network resource
US6037944A (en) 1996-11-07 2000-03-14 Natrificial Llc Method and apparatus for displaying a thought network from a thought's perspective
EP1012694A4 (en) 1996-11-08 2005-04-06 Neomedia Tech Inc Automatic access of electronic information through machine-readable codes on printed documents
US5828839A (en) 1996-11-14 1998-10-27 Interactive Broadcaster Services Corp. Computer network chat room based on channel broadcast in real time
EP0847019A1 (en) 1996-12-04 1998-06-10 Koninklijke Philips Electronics N.V. Method and system for selecting an information item in an information processing system, and local station in such a system
US6240394B1 (en) 1996-12-12 2001-05-29 Catalina Marketing International, Inc. Method and apparatus for automatically generating advisory information for pharmacy patients
US5932869A (en) * 1996-12-27 1999-08-03 Graphic Technology, Inc. Promotional system with magnetic stripe and visual thermo-reversible print surfaced medium
JP3402100B2 (en) 1996-12-27 2003-04-28 カシオ計算機株式会社 Voice control host device
JPH10198486A (en) 1997-01-07 1998-07-31 Matsushita Electric Ind Co Ltd Wireless input device
US6160552A (en) 1997-01-09 2000-12-12 Sun Microsystems, Inc. Method and apparatus for managing multiple hierarchical lists within a browser
US6583797B1 (en) 1997-01-21 2003-06-24 International Business Machines Corporation Menu management mechanism that displays menu items based on multiple heuristic factors
US6285987B1 (en) 1997-01-22 2001-09-04 Engage, Inc. Internet advertising system
US5956694A (en) 1997-02-11 1999-09-21 Powell; Ken R. System and method for distributing and processing discount coupons
US6041312A (en) * 1997-03-28 2000-03-21 International Business Machines Corporation Object oriented technology framework for accounts receivable and accounts payable
US6193152B1 (en) 1997-05-09 2001-02-27 Receiptcity.Com, Inc. Modular signature and data-capture system and point of transaction payment and reward system
BR9809252A (en) 1997-05-09 2000-06-27 Neomedia Tech Inc Method and system for accessing electronic resources through machine-readable data in smart documents
US6028600A (en) 1997-06-02 2000-02-22 Sony Corporation Rotary menu wheel interface
US6072483A (en) 1997-06-02 2000-06-06 Sony Corporation Active frame scroll interface
US6260192B1 (en) 1997-06-02 2001-07-10 Sony Corporation Filtering system based on pattern of usage
US6397387B1 (en) 1997-06-02 2002-05-28 Sony Corporation Client and server system
US5978381A (en) 1997-06-06 1999-11-02 Webtv Networks, Inc. Transmitting high bandwidth network content on a low bandwidth communications channel during off peak hours
CA2401726C (en) 1997-06-25 2010-10-19 Richard James Humpleman Browser based command and control home network
US6269403B1 (en) 1997-06-30 2001-07-31 Microsoft Corporation Browser and publisher for multimedia object storage, retrieval and transfer
US6337715B1 (en) 1997-07-04 2002-01-08 Matsushita Electric Industrial Co., Ltd. Broadcasting reception apparatus and data broadcasting method
US5999924A (en) 1997-07-25 1999-12-07 Amazon.Com, Inc. Method and apparatus for producing sequenced queries
US6009320A (en) 1997-08-07 1999-12-28 Dudley; Sandra L. Vehicle alarm system triggerable cell phone activation circuit
US6101473A (en) 1997-08-08 2000-08-08 Board Of Trustees, Leland Stanford Jr., University Using speech recognition to access the internet, including access via a telephone
US6026370A (en) 1997-08-28 2000-02-15 Catalina Marketing International, Inc. Method and apparatus for generating purchase incentive mailing based on prior purchase history
US6018718A (en) * 1997-08-28 2000-01-25 Walker Asset Management Limited Partnership Method and system for processing customized reward offers
US5974399A (en) 1997-08-29 1999-10-26 Catalina Marketing International, Inc. Method and apparatus for generating purchase incentives based on price differentials
US7058591B2 (en) 1997-08-29 2006-06-06 Catalina Marketing International, Inc. Method and apparatus for generating purchase incentives based on price differentials
US6226642B1 (en) 1997-09-11 2001-05-01 International Business Machines Corporation Content modification of internet web pages for a television class display
US5960411A (en) 1997-09-12 1999-09-28 Amazon.Com, Inc. Method and system for placing a purchase order via a communications network
US5874906A (en) 1997-09-22 1999-02-23 Wilnel, Inc. Data entry system
JPH11122682A (en) 1997-10-16 1999-04-30 Nec Corp Remote control transmitter
US5926795A (en) 1997-10-17 1999-07-20 Catalina Marketing International, Inc. System and apparatus for dispensing coupons having selectively printed borders around preferred products
US6266098B1 (en) 1997-10-22 2001-07-24 Matsushita Electric Corporation Of America Function presentation and selection using a rotatable function menu
US6009411A (en) 1997-11-14 1999-12-28 Concept Shopping, Inc. Method and system for distributing and reconciling electronic promotions
US6148212A (en) 1997-12-18 2000-11-14 Ericsson Inc. System and method for cellular control of automobile electrical systems
US6445398B1 (en) 1998-02-04 2002-09-03 Corporate Media Partners Method and system for providing user interface for electronic program guide
US6012049A (en) * 1998-02-04 2000-01-04 Citicorp Development Center, Inc. System for performing financial transactions using a smartcard
IL123288A (en) 1998-02-13 2001-05-20 Nds Ltd Electronic game guide system
US6091417A (en) 1998-03-16 2000-07-18 Earthlink Network, Inc. Graphical user interface
CA2262730A1 (en) 1998-03-24 1999-09-24 Symbol Technologies, Inc. Bar code reader for portable computers
US6154205A (en) 1998-03-25 2000-11-28 Microsoft Corporation Navigating web-based content in a television-based system
US5915007A (en) 1998-04-14 1999-06-22 Catalina Marketing International, Inc. Method and system for using a frequent shopper card as a phone calling card
US6094156A (en) 1998-04-24 2000-07-25 Henty; David L. Handheld remote control system with keyboard
JP3440202B2 (en) 1998-04-30 2003-08-25 富士通株式会社 Customer service apparatus, method, card, and computer readable recording medium recording customer service processing program
US6280519B1 (en) 1998-05-05 2001-08-28 Exxon Chemical Patents Inc. Environmentally preferred fluids and fluid blends
US6151630A (en) 1998-05-15 2000-11-21 Avaya Technology Corp. Non-redundant browsing of a sequencing of web pages
US6129274A (en) 1998-06-09 2000-10-10 Fujitsu Limited System and method for updating shopping transaction history using electronic personal digital shopping assistant
US6530083B1 (en) * 1998-06-19 2003-03-04 Gateway, Inc System for personalized settings
US6334145B1 (en) 1998-06-30 2001-12-25 International Business Machines Corporation Method of storing and classifying selectable web page links and sublinks thereof to a predetermined depth in response to a single user input
US6237030B1 (en) 1998-06-30 2001-05-22 International Business Machines Corporation Method for extracting hyperlinks from a display document and automatically retrieving and displaying multiple subordinate documents of the display document
US6263332B1 (en) 1998-08-14 2001-07-17 Vignette Corporation System and method for query processing of structured documents
US6177936B1 (en) 1998-08-20 2001-01-23 International Business Machines Corporation Browser hierarchical contextual information for web pages
EP1105813A4 (en) 1998-08-25 2001-10-10 Mobshop Inc On-line marketing system and method
US6286043B1 (en) 1998-08-26 2001-09-04 International Business Machines Corp. User profile management in the presence of dynamic pages using content templates
US6829646B1 (en) 1999-10-13 2004-12-07 L. V. Partners, L.P. Presentation of web page content based upon computer video resolutions
US6078866A (en) 1998-09-14 2000-06-20 Searchup, Inc. Internet site searching and listing service based on monetary ranking of site listings
US6333753B1 (en) 1998-09-14 2001-12-25 Microsoft Corporation Technique for implementing an on-demand display widget through controlled fading initiated by user contact with a touch sensitive input device
US6054989A (en) 1998-09-14 2000-04-25 Microsoft Corporation Methods, apparatus and data structures for providing a user interface, which exploits spatial memory in three-dimensions, to objects and which provides spatialized audio
US6317722B1 (en) * 1998-09-18 2001-11-13 Amazon.Com, Inc. Use of electronic shopping carts to generate personal recommendations
US6223215B1 (en) 1998-09-22 2001-04-24 Sony Corporation Tracking a user's purchases on the internet by associating the user with an inbound source and a session identifier
US6076069A (en) 1998-09-25 2000-06-13 Oneclip.Com, Incorporated Method of and system for distributing and redeeming electronic coupons
US6513015B2 (en) * 1998-09-25 2003-01-28 Fujitsu Limited System and method for customer recognition using wireless identification and visual data transmission
US6343277B1 (en) * 1998-11-02 2002-01-29 Enermetrix.Com, Inc. Energy network commerce system
US6134548A (en) 1998-11-19 2000-10-17 Ac Properties B.V. System, method and article of manufacture for advanced mobile bargain shopping
US6260024B1 (en) * 1998-12-02 2001-07-10 Gary Shkedy Method and apparatus for facilitating buyer-driven purchase orders on a commercial network system
US6417873B1 (en) 1998-12-11 2002-07-09 International Business Machines Corporation Systems, methods and computer program products for identifying computer file characteristics that can hinder display via hand-held computing devices
US6055573A (en) 1998-12-30 2000-04-25 Supermarkets Online, Inc. Communicating with a computer based on an updated purchase behavior classification of a particular consumer
US6067524A (en) 1999-01-07 2000-05-23 Catalina Marketing International, Inc. Method and system for automatically generating advisory information for pharmacy patients along with normally transmitted data
US6522342B1 (en) 1999-01-27 2003-02-18 Hughes Electronics Corporation Graphical tuning bar for a multi-program data stream
US6651053B1 (en) 1999-02-01 2003-11-18 Barpoint.Com, Inc. Interactive system for investigating products on a network
ATE381734T1 (en) 1999-02-01 2008-01-15 Neomedia Tech Inc INTERACTIVE SYSTEM FOR SEARCHING PRODUCTS IN A NETWORK
US6418411B1 (en) 1999-03-12 2002-07-09 Texas Instruments Incorporated Method and system for adaptive speech recognition in a noisy environment
US6421066B1 (en) 1999-03-23 2002-07-16 Klab.Com - The Knowledge Infrastructure Laboratory Ltd. Method for creating a knowledge map
US6542933B1 (en) 1999-04-05 2003-04-01 Neomedia Technologies, Inc. System and method of using machine-readable or human-readable linkage codes for accessing networked data resources
US6963850B1 (en) * 1999-04-09 2005-11-08 Amazon.Com, Inc. Computer services for assisting users in locating and evaluating items in an electronic catalog based on actions performed by members of specific user communities
US6345279B1 (en) 1999-04-23 2002-02-05 International Business Machines Corporation Methods and apparatus for adapting multimedia content for client devices
US6430539B1 (en) * 1999-05-06 2002-08-06 Hnc Software Predictive modeling of consumer financial behavior
US6269361B1 (en) 1999-05-28 2001-07-31 Goto.Com System and method for influencing a position on a search result list generated by a computer network search engine
US6282516B1 (en) 1999-06-01 2001-08-28 Catalina Marketing International, Inc. Process, system and computer readable medium for in-store printing of discount coupons and/or other purchasing incentives in various departments within a retail store
US20020062225A1 (en) * 1999-06-30 2002-05-23 Vlad Siperco Personal health center
US7080070B1 (en) 1999-07-02 2006-07-18 Amazon Technologies, Inc. System and methods for browsing a database of items and conducting associated transactions
US6401132B1 (en) 1999-08-03 2002-06-04 International Business Machines Corporation Subchaining transcoders in a transcoding framework
US6965868B1 (en) * 1999-08-03 2005-11-15 Michael David Bednarek System and method for promoting commerce, including sales agent assisted commerce, in a networked economy
AU6539200A (en) * 1999-08-13 2001-03-13 Jean-Pierre Kocher Method and apparatus for scanning of food and medicine to provide outputs relative to a user profile
US6615248B1 (en) 1999-08-16 2003-09-02 Pitney Bowes Inc. Method and system for presenting content selection options
US6421724B1 (en) 1999-08-30 2002-07-16 Opinionlab, Inc. Web site response measurement tool
US6264559B1 (en) 1999-10-05 2001-07-24 Mediaone Group, Inc. Interactive television system and remote control unit
US20020049631A1 (en) 1999-10-12 2002-04-25 Eric Williams Process, system and computer readable medium for providing purchasing incentives to a plurality of retail store environments
US6466918B1 (en) 1999-11-18 2002-10-15 Amazon. Com, Inc. System and method for exposing popular nodes within a browse tree
US7228285B2 (en) 1999-12-01 2007-06-05 Catalina Marketing Corporation Automated method and system for automated tracking, charging and analysis of multiple sponsor discount coupons
SE9904380D0 (en) 1999-12-02 1999-12-02 Siemens Elema Ab Method and apparatus for selecting a software item using a graphical user interface
US7099835B2 (en) * 2000-01-31 2006-08-29 Roadside Telematics Corporation Methods and systems for providing life management and enhancement applications and services for telematics and other electronic medium
US6587835B1 (en) * 2000-02-09 2003-07-01 G. Victor Treyz Shopping assistance with handheld computing device
US6304849B1 (en) 2000-02-23 2001-10-16 Catalina Marketing International, Inc. Method and system for printing a combination pharmaceutical label and directed newsletter
US6766363B1 (en) 2000-02-28 2004-07-20 Barpoint.Com, Inc. System and method of linking items in audio, visual, and printed media to related information stored on an electronic network using a mobile device
US20020029339A1 (en) * 2000-02-28 2002-03-07 Rick Rowe Method and apparatus for facilitating monetary and commercial transactions and for securely storing data
US6675165B1 (en) 2000-02-28 2004-01-06 Barpoint.Com, Inc. Method for linking a billboard or signage to information on a global computer network through manual information input or a global positioning system
US7379885B1 (en) * 2000-03-10 2008-05-27 David S. Zakim System and method for obtaining, processing and evaluating patient information for diagnosing disease and selecting treatment
DE10128494A1 (en) 2000-04-07 2002-01-17 Ibm Personal digital shopping cart
US7421645B2 (en) 2000-06-06 2008-09-02 Microsoft Corporation Method and system for providing electronic commerce actions based on semantically labeled strings
US20020016750A1 (en) 2000-06-20 2002-02-07 Olivier Attia System and method for scan-based input, storage and retrieval of information over an interactive communication network
US20020038256A1 (en) 2000-07-07 2002-03-28 Minh Nguyen Transactional control system
US6535888B1 (en) 2000-07-19 2003-03-18 Oxelis, Inc. Method and system for providing a visual search directory
US6477575B1 (en) 2000-09-12 2002-11-05 Capital One Financial Corporation System and method for performing dynamic Web marketing and advertising
US6684062B1 (en) 2000-10-25 2004-01-27 Eleven Engineering Incorporated Wireless game control system
US7174512B2 (en) 2000-12-01 2007-02-06 Thomson Licensing S.A. Portal for a communications system
US20020078453A1 (en) 2000-12-15 2002-06-20 Hanchang Kuo Hub pages for set top box startup screen
US20020116292A1 (en) 2001-02-20 2002-08-22 Flip Ltd Competitive on-line merchandising system
US20030046182A1 (en) 2001-08-31 2003-03-06 Hartman Thomas H. System and method for providing articles electronically
US6826572B2 (en) 2001-11-13 2004-11-30 Overture Services, Inc. System and method allowing advertisers to manage search listings in a pay for placement search system using grouping

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9164981B2 (en) * 2011-06-13 2015-10-20 Sony Corporation Information processing apparatus, information processing method, and program
US20120316865A1 (en) * 2011-06-13 2012-12-13 Mitsuhiro Miyazaki Information processing apparatus, information processing method, and program
US9449336B2 (en) 2011-09-28 2016-09-20 Nara Logics, Inc. Apparatus and method for providing harmonized recommendations based on an integrated user profile
US11727249B2 (en) 2011-09-28 2023-08-15 Nara Logics, Inc. Methods for constructing and applying synaptic networks
US8909583B2 (en) 2011-09-28 2014-12-09 Nara Logics, Inc. Systems and methods for providing recommendations based on collaborative and/or content-based nodal interrelationships
US9009088B2 (en) 2011-09-28 2015-04-14 Nara Logics, Inc. Apparatus and method for providing harmonized recommendations based on an integrated user profile
US11651412B2 (en) 2011-09-28 2023-05-16 Nara Logics, Inc. Systems and methods for providing recommendations based on collaborative and/or content-based nodal interrelationships
US10467677B2 (en) 2011-09-28 2019-11-05 Nara Logics, Inc. Systems and methods for providing recommendations based on collaborative and/or content-based nodal interrelationships
US10423880B2 (en) 2011-09-28 2019-09-24 Nara Logics, Inc. Systems and methods for providing recommendations based on collaborative and/or content-based nodal interrelationships
US11151617B2 (en) 2012-03-09 2021-10-19 Nara Logics, Inc. Systems and methods for providing recommendations based on collaborative and/or content-based nodal interrelationships
US10789526B2 (en) 2012-03-09 2020-09-29 Nara Logics, Inc. Method, system, and non-transitory computer-readable medium for constructing and applying synaptic networks
US9928514B2 (en) 2012-06-04 2018-03-27 American Express Travel Related Services Company, Inc. Systems and methods for delivering tailored content based upon a consumer profile
US9754269B2 (en) 2012-06-04 2017-09-05 American Express Travel Related Services Company, Inc. Systems and methods for delivering tailored content based upon a consumer profile
US9940630B2 (en) 2012-06-04 2018-04-10 American Express Travel Related Services Company, Inc. Systems and methods for delivering tailored content based upon a consumer profile
US9760895B2 (en) 2012-06-04 2017-09-12 American Express Travel Related Services Company, Inc. Systems and methods for delivering tailored content based upon a consumer profile
US9514468B2 (en) 2012-06-04 2016-12-06 American Express Travel Related Services Company, Inc. Systems and methods for delivering tailored content based upon a consumer profile
US9489677B2 (en) 2012-06-04 2016-11-08 American Express Travel Related Services Company, Inc. Systems and methods for delivering tailored content based upon a consumer profile
US9292819B2 (en) 2013-03-14 2016-03-22 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US9355378B2 (en) 2013-03-14 2016-05-31 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US9292817B2 (en) * 2013-03-14 2016-03-22 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US20140316889A1 (en) * 2013-03-14 2014-10-23 American Express Travel Related Services Company, Inc. Systems and Methods for Identifying and Delivering Tailored Content Based Upon a Service Dialog
US9324103B2 (en) 2013-03-14 2016-04-26 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US9721274B2 (en) 2013-03-14 2017-08-01 American Express Travel Related Services Company, Inc. Modifying tailored content based upon a service dialog
US9734516B2 (en) 2013-03-14 2017-08-15 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US9292820B2 (en) 2013-03-14 2016-03-22 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US9349137B2 (en) 2013-03-14 2016-05-24 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US9846894B2 (en) 2013-03-14 2017-12-19 American Express Travel Related Services Company, Inc. Identifying and delivering tailored content based a reminder
US9501788B2 (en) 2013-03-14 2016-11-22 American Express Travel Related Services Company, Inc. Identifying and delivering tailored content with gift options
US9355411B2 (en) 2013-03-14 2016-05-31 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US9501787B2 (en) 2013-03-14 2016-11-22 American Express Travel Related Services Company, Inc. Delivering options for tailored content
US9292816B2 (en) 2013-03-14 2016-03-22 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US9292818B2 (en) 2013-03-14 2016-03-22 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US10643244B2 (en) 2013-03-14 2020-05-05 American Express Travel Related Services Company, Inc. Tailored content with tailored options related to reminders
US9286633B2 (en) 2013-03-14 2016-03-15 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US9256848B2 (en) 2013-03-14 2016-02-09 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US9245250B2 (en) 2013-03-14 2016-01-26 American Express Travel Related Services Company, Inc. Systems and methods for identifying and delivering tailored content based upon a service dialog
US10419575B2 (en) 2014-08-25 2019-09-17 Samsung Electronics Co., Ltd. Method and apparatus for providing personalized service
US11443359B2 (en) * 2017-07-10 2022-09-13 Visa International Service Association System, method, and computer program product for segmenting users in a region based on predicted activity

Also Published As

Publication number Publication date
EP1588285A1 (en) 2005-10-26
US20140289220A1 (en) 2014-09-25
WO2003081473A1 (en) 2003-10-02
US20110238478A1 (en) 2011-09-29
US6611881B1 (en) 2003-08-26
US8452653B1 (en) 2013-05-28
AU2002247395A1 (en) 2003-10-08

Similar Documents

Publication Publication Date Title
US8452653B1 (en) Method for providing information and recommendations based on user activity
US20200320600A1 (en) Virtual Marketplace Enabling Machine-to-Machine Commerce
US10482488B2 (en) Identifying and dispensing special offers based on current and/or past transactions
US8306908B1 (en) Methods and apparatus for intelligent selection of goods and services in telephonic and electronic commerce
JP4593790B2 (en) System and method for processing financial transactions
US8078503B1 (en) Methods and system for providing real time offers to a user based on obsolescence of possessed items
CA2412936C (en) Method of and system for managing promotions for purchase transactions over a network
US7792702B1 (en) Methods and system for providing offers in real time while preserving confidential information
US20150220979A1 (en) Controlling a Commerce System with Omnipresent Marketing
US20020055906A1 (en) Methods and apparatus for intelligent selection of goods and services in telephonic and electronic commerce
US20030144907A1 (en) System and method for administering incentive offers
US20150324828A1 (en) Commerce System and Method of Providing Communication Between Publishers and Intelligent Personal Agents
WO2002037926A9 (en) Methods and apparatus for intelligent selection of goods and services in telephonic and electronic commerce
JP2008165812A (en) System and method for processing financial transaction
US20040073497A1 (en) Method and system for automated linkable promotions
KR100854558B1 (en) Business branch system
KR20200006766A (en) Service providing system using an editable online SOHO Mall building platform
JP2005522782A (en) System and method for processing monetary transactions using various payment preferences
US20020038243A1 (en) Transaction processing system
US20020035509A1 (en) Transaction processing method and transaction processing system
KR100427683B1 (en) Electronic commerce system using network and smart card and method thereof
WO2000073931A2 (en) Method and apparatus for real-time electronic marketing
WO2001007987A2 (en) Systems and methods for the completion of transactions
WO2001020522A1 (en) Personalized web page based on multiple data sources
JP2002099722A (en) Method for obtaining debit sales information in debit card system

Legal Events

Date Code Title Description
AS Assignment

Owner name: PERSONAL DATA NETWORK CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GOTTFURCHT, ELLIOT A.;GOTTFURCHT, GRANT E.;DUNN, SHAWN C.;REEL/FRAME:030045/0350

Effective date: 20000315

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION