GB2447048A - Determining whether a first party has accessed a website of a second party - Google Patents
Determining whether a first party has accessed a website of a second party Download PDFInfo
- Publication number
- GB2447048A GB2447048A GB0704164A GB0704164A GB2447048A GB 2447048 A GB2447048 A GB 2447048A GB 0704164 A GB0704164 A GB 0704164A GB 0704164 A GB0704164 A GB 0704164A GB 2447048 A GB2447048 A GB 2447048A
- Authority
- GB
- United Kingdom
- Prior art keywords
- party
- computer
- website
- signal
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A method for determining whether a first party has accessed a website of a second party, the method comprising causing a signal to be sent from the computer of the first party to the computer of the second party when the first party has accessed the website, the signal including information enabling the identity of the first party to be determined by the computer of the second party on receipt of the signal and the identity of the first party being caused to appear on the screen of the computer of the second party. When a client 3 accesses a website through an email link a signal is sent from the client's computer 5 to the first party's computer 2. The signal identifies the client and the identity of the client appears as a pop-up box on the screen of the first party's computer.
Description
A method for determining whether a first party has accessed a website
of a second party The present invention relates to a method for determining whether a first party has accessed a website of a second party.
According to the present invention a method for determining whether a first party has accessed a website of a second party, the method comprising causing a signal to be sent from a computer of a first party to a computer of a second party when the first party has accessed the website, the signal including information enabling the identity of the first party to be determined by the computer of the second party on receipt of the signal and the identity of the first party being caused to appear on a screen of the computer of the second party.
Preferably the signal is received on a server relating to the computer of the second party before reaching the computer screen of the second party.
Suitably the computer of the second party polls its server at intervals and when a signal has been received at the server the identity of the first party is caused to appear on the screen of the computer of the second party. * . * *.
Conveniently the identity of the first party appears in a pop-up box on the screen of the computer of the second party.
Preferably the website is accessed from an email sent by the second party to the first : * . party. *** * **.* * *
Suitably the email includes a link to the website, which link when activated by the first party opens the website.
In one embodiment of the invention the information is a number which is related to the identity of the first party and from which the identity of the first party can be determined at the computer of the second party.
In another embodiment of the invention the information is the email address of the first party, the computer of the second party determining the email address from the signal.
Preferably the website includes a document or documents which may be opened by the first party.
Suitably the document or documents relate to products or services offered by the second party.
Conveniently the document or documents is a brochure or brochures.
An embodiment of the invention will now be particularly described with reference to the accompanying drawing which illustrates the method of the present invention.
A first party or user 1 at a first computer 2 sends an email to a second party or client 3. The email appears on the screen 4 of the client's computer 5 and includes a link to a website owned by the user 1. When the client 3 clicks the link the website opens and reveals a document or documents. These could be a brochure or brochures containing details of the user's products or services. When the client 3 clicks on a document to open it a signal is sent from the computer 5 to the server 6 of the user's computer 2.
*::* The signal includes a number which is related to the identity of the user I and the identity of the user I can be determined from the number at the computer 2. The *. S. signal could instead include the email address of the client 1, the user's computer 2 determining the email address from the signal. The computer 2 polls its server 6 at : * discrete intervals and when a signal has been received at the server 6 the identity of S.. * the client 3 appears as a pop-up box 7 on the screen 8 of the computer 2. Alternatively the computer 2 could be permanently linked to the server 6 so that the identity of the client 3 appears on the computer screen 8 as soon as the signal reaches the server 6.
It will be appreciated that all the technology described is well known. The novelty lies in the production of a pop-up box with the identity of the client and other details from the signal which appears at the server
Claims (13)
- Claims 1. A method for determining whether a first party has accessed awebsite of a second party, the method comprising causing a signal to be sent from a computer of the first party to a computer of a second party when the first party has accessed the website, the signal including information enabling the identity of the first party to be determined by the computer of the second party on receipt of the signal and the identity of the first party being caused to appear on a screen of the computer of the second party.
- 2. A method as claimed in claim 1 in which the signal is received on a server relating to the computer of the second party before reaching the computer screen of the second party.
- 3. A method as claimed in either of claim I or claim 2 in which the computer of the second party polls its server at intervals and when a signal has been received at the server the identity of the first party is caused to appear on the screen of the computer of the second party.
- 4. A method as claimed in any of claims I to 3 in which the identity of the first party appears in a pop-up box on the screen of the computer of the second party. S... * . **S*
- 5. A method as claimed in any of the preceding claims in which the website is * * accessed from an email sent by the second party to the first party. * S..: ** *
- 6. A method as claimed in claim 5 in which the email includes a link to the website, ** S * . * which link when activated by the first party opens the website. *SI.
- 7. A method as claimed in any of the preceding claims in which the information is a number which is related to the identity of the first party and from which the identity of the first party can be determined at the computer of the second party.L
- 8. A method as claimed in any of the preceding clams, in which the information is the email address of the first party, the computer of the second party determining the email address from the signal.
- 9. A method as claimed in any of the preceding claims in which the website includes a document or documents which may be opened by the first party.
- 10. A method as claimed in claim 9 in which the document or documents are opened by clicking on a document.
- 11. A method as claimed in claim 9 or claim 10 in which the document or documents relate to products or services offered by the second party.
- 12. A method as claimed in any of claims 9 or claim 11 in which the document or documents is a brochure or brochures.
- 13. A method substantially as hereinbefore described with reference to the drawing. * * * S.. * SSS * q.* *. S * .S S...S * * S. * *5**S S..
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0704164A GB2447048A (en) | 2007-03-01 | 2007-03-01 | Determining whether a first party has accessed a website of a second party |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0704164A GB2447048A (en) | 2007-03-01 | 2007-03-01 | Determining whether a first party has accessed a website of a second party |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB0704164D0 GB0704164D0 (en) | 2007-04-11 |
| GB2447048A true GB2447048A (en) | 2008-09-03 |
Family
ID=37965888
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB0704164A Withdrawn GB2447048A (en) | 2007-03-01 | 2007-03-01 | Determining whether a first party has accessed a website of a second party |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2447048A (en) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2305494A1 (en) * | 2000-04-22 | 2001-10-22 | Robert M. Broadway | Method of identifying a visitor to a website and using information about the identified visitor to conditionally display information on said website |
| US6366298B1 (en) * | 1999-06-03 | 2002-04-02 | Netzero, Inc. | Monitoring of individual internet usage |
| US6393407B1 (en) * | 1997-09-11 | 2002-05-21 | Enliven, Inc. | Tracking user micro-interactions with web page advertising |
-
2007
- 2007-03-01 GB GB0704164A patent/GB2447048A/en not_active Withdrawn
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6393407B1 (en) * | 1997-09-11 | 2002-05-21 | Enliven, Inc. | Tracking user micro-interactions with web page advertising |
| US6366298B1 (en) * | 1999-06-03 | 2002-04-02 | Netzero, Inc. | Monitoring of individual internet usage |
| CA2305494A1 (en) * | 2000-04-22 | 2001-10-22 | Robert M. Broadway | Method of identifying a visitor to a website and using information about the identified visitor to conditionally display information on said website |
Also Published As
| Publication number | Publication date |
|---|---|
| GB0704164D0 (en) | 2007-04-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8856928B1 (en) | Protecting electronic assets using false profiles in social networks | |
| CN102957694B (en) | A kind of method and device judging fishing website | |
| US10574696B2 (en) | System and method for detecting phishing e-mails | |
| Wall | Digital realism and the governance of spam as cybercrime | |
| CN103491543A (en) | Method for detecting malicious websites through wireless terminal, and wireless terminal | |
| US20170318041A1 (en) | Method and system for detecting malicious behavior, apparatus and computer storage medium | |
| TW200701016A (en) | Word-related content searching method on web | |
| WO2005074213A1 (en) | Method and system for url-based screening of electronic communications | |
| CN102096683A (en) | A Method of Realizing Nameplate in Address Bar of Browser | |
| CN102844757A (en) | Company network | |
| US20090319377A1 (en) | Business method for self promotion and marketing | |
| Wakabayashi et al. | In Race Against Fake News, Google and Facebook Stroll to the Starting Line. | |
| WO2007126795A3 (en) | Targeting and/or scoring advertisements using information derived from called telephone numbers of the called telephone numbers themselves | |
| JP2016528632A (en) | Identifying software application events | |
| GB2447048A (en) | Determining whether a first party has accessed a website of a second party | |
| US10313347B2 (en) | Data counter measures | |
| US20160048883A1 (en) | System and Method for Distributed Advertising | |
| Paulson | Spam hits instant messaging | |
| ATE510389T1 (en) | SHARING EMAILS BETWEEN TWO USERS USING A SERVER | |
| Dewi Estri et al. | Implementation of cloudflare hosting for speeds and protection on the website | |
| Jakobsson | Social engineering 2.0: What’s next | |
| Kori et al. | Impact of social media online newspaper in India | |
| Carlson | Colonial Fracture and Community Cohesion: Governance in the Stó: Lõ Community of Shxw'õwhámél | |
| JP2021026690A (en) | Affiliate advertisement control device, method and program | |
| Hesse | Monitoring and Enforcement of CITES-Listed Timber in Lower Saxony, Germany |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |