[go: up one dir, main page]

WO2000062202A1 - System and method for controlling access to a communications medium - Google Patents

System and method for controlling access to a communications medium Download PDF

Info

Publication number
WO2000062202A1
WO2000062202A1 PCT/US2000/009375 US0009375W WO0062202A1 WO 2000062202 A1 WO2000062202 A1 WO 2000062202A1 US 0009375 W US0009375 W US 0009375W WO 0062202 A1 WO0062202 A1 WO 0062202A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
access
client
user
communications medium
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2000/009375
Other languages
French (fr)
Inventor
Steven L. Lampert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
POWERCHANNEL HOLDINGS Inc
Original Assignee
POWERCHANNEL HOLDINGS Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by POWERCHANNEL HOLDINGS Inc filed Critical POWERCHANNEL HOLDINGS Inc
Priority to EP00921898A priority Critical patent/EP1198763A1/en
Priority to AU42155/00A priority patent/AU4215500A/en
Publication of WO2000062202A1 publication Critical patent/WO2000062202A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]

Definitions

  • TITLE SYSTEM AND ETHOD FOR CONTROLLING ACCESS TO A COMMUNICATIONS MEDIUM
  • the present invention pertains generally to communications system access providers, and more particularly to a system and method for controlling access to a communications medium, such as the Internet, that provides users access in exchange for responding to queries, where the query responses can then be provided to third parties.
  • a communications medium such as the Internet
  • Access to communications media is controlled using a variety of systems and methods. Access to the Internet, long distance communications services, satellite telecommunications services, or to other "non-local" communications media is typically provided through a gateway or server that is connected to the public switched telephone network. For digital computer communications, a general purpose analog telephone line is typically connected to a modulator- demodulator ("modem") device of the digital computer. Access can also be provided using a cable television coaxial cable, an integrated services digital network connection, a hybrid telephone/cable television system, wireless service, or other suitable systems and methods. Regardless of the type of system used to provide access to the communications medium, the access is typically provided using a pay-for-access system.
  • modem modulator- demodulator
  • a user can be provided with a password and user identification code, and can be prompted for that code upon entry to the server or gateway.
  • a user can be charged a flat fee, a fee based on the amount of time the communications medium is used, a fee based on the number of content providers accessed, or other suitable fee structures can be used. In all of these fee structures, the only information obtained from the user is identification and security information, if any. The privacy of users is typically protected, so that the identification of content providers or other locations accessed by the user is not generally provided to third parties.
  • the present invention provides improved systems and methods for controlling access to a communications medium that overcome the disadvantages of previously developed systems and methods for controlling access to a communications medium.
  • a system and method for controlling access to a communications medium is provided that allows user data to be collected and provided to third parties for uses such as targeting potential marketing audiences.
  • a system for controlling access to a communications medium such as the Internet
  • the system includes one or more access client systems.
  • a client management server is connected to each of the access client systems and to the communications medium.
  • the client management server presents queries to users at the access client systems, stores query responses from each user, and allows the users to access the communications medium when they have responded to all queries.
  • a data client system that can be used by third parties to access the query responses is connected to the client management server, and accesses the query responses through the client management server.
  • the system for controlling communications medium access of the present invention allows communications medium user access to be tracked, such that all content providers accessed by the users can be monitored. For example, if Internet services are used over the communications medium, the present invention allows the Uniform Resource Locator addresses accessed by users to be tracked so that a content provider, such as a retailer, can determine which users are more likely to be interested in the products offered by that retailer. In this manner, content providers can improve content and more readily identify potential audiences.
  • the present invention also allows content providers to query communications medium users, so as to obtain information that is not typically available for individual consumers.
  • a content provider such as a retailer can present a query to each user regarding intended purchases. The retailer can then contact users that intend to purchase items that are sold by the retailer.
  • FIGURE 1 is a system diagram of a client management system in accordance with an exemplary embodiment of the present invention
  • FIGURE 2 is a block diagram of a user data system in accordance with an exemplary embodiment of the present invention
  • FIGURE 3 is a block diagram of a user access system in accordance with an exemplary embodiment of the present invention.
  • FIGURE 4 is a diagram of an access client system in accordance with an exemplary embodiment of present invention.
  • FIGURE 5 is flow chart of a method for controlling access to a communications medium in accordance with an exemplary embodiment of the present invention
  • FIGURE 6 is a flow chart of a method for controlling user access to a communications medium in accordance with an exemplary embodiment of the present invention.
  • FIGURE 7 is a flowchart of a method for controlling third party access to communications medium user data in accordance with an exemplary embodiment of the present invention.
  • FIGURE 1 is a system diagram of a client management system
  • Client management system 100 is used to control communications medium access for access clients, and to control access to data for data clients.
  • Client management system 100 includes client management server 102, communications medium 104, and a plurality of access client systems 106.
  • Client management server 102 includes a user data system 108 and a user access system 110.
  • User access system 110 is coupled to communications medium
  • Couple refers to suitable connections between two components, including, but not limited, to a physical connection (such as a copper conductor, a data bus, or a coaxial cable) , a logical connection (such as through logical devices of a general purpose processing platform) , a virtual connection (such as through randomly assigned memory locations of a random access memory, a magnetic media memory, or an optical medium memory) , or through other suitable connections.
  • a physical connection such as a copper conductor, a data bus, or a coaxial cable
  • a logical connection such as through logical devices of a general purpose processing platform
  • a virtual connection such as through randomly assigned memory locations of a random access memory, a magnetic media memory, or an optical medium memory
  • Each communications medium user can access client management server 102 through an access client system 106.
  • Client management server 102 controls access to communications medium 114 by the access client systems 106.
  • Client management server 102 also controls data provided to one or more data client system 118. While a single data client system 118 is depicted in FIGURE 1, one of ordinary skill in the art will recognize that a plurality of data client systems 118 may be provided.
  • the client management server 102, user data system 108, and user access system 110 can be implemented in hardware, software, or a suitable combination of hardware and software, and are preferably computer programs that operate on a general purpose computing platform such as a server, a personal computer, or a work station.
  • Client management server 102 manages access to communications medium 114 by access client systems 106. For example, client management server 102 can present a user of an access client system 106 with predetermined queries. The user must then provide responses for the predetermined queries in order to be provided with access to communications medium 114. If incorrect or incomplete responses to the queries are provided, access to communications medium 114 can be denied.
  • client management server 102 can monitor the activities of access client systems 106.
  • each access client system 106 can include an Internet browser, such that a log of all Uniform Resource Locator (URL) addresses or similar information can be maintained by each access client system 106.
  • Client management server 102 can periodically prompt each access client system 106 and retrieve the log of Uniform Resource Locators or other information that can be used to determine communications tasks performed by users of access client systems 106.
  • Client management server 102 can store such client data on user data system 108.
  • client management server 102 can store client responses to surveys on user data system 108.
  • the client survey response data and client communications access data can be cross- referenced, processed, or otherwise manipulated by user data system 108 to place the data in a format suitable for use by users of data client system 118.
  • Client management server 102 can also control data provided to data client system 118.
  • a user of data client system 118 can request predetermined data from client management server 102 that pertains to the use of communications medium 114 by users of access client systems 106.
  • User access system 110 of client management server 102 is used to track the data requested, such that data from user data system 108 can be periodically selected and transmitted by user access system 110 to data client system 118.
  • a user of data client system 118 can be a manufacturer, such as an auto manufacturer.
  • the user can request marketing data pertaining to automobiles through data client system 118 from client management server 102.
  • Client management server 102 can prompt data client system 118 for predetermined key words, data classes, or subjects, and use these terms to identify requested data.
  • Other suitable methods and systems for determining data of interest to a user of data client system 118 can also be used.
  • Client management server 102 then monitors and extracts data from user data system 108, and can transmit the data periodically to data client system 118.
  • a user of data client system 118 can then use the data for marketing purposes or other purposes, such as to determine whether additional contact with particular users of access client systems 106 is desired.
  • the user of data client system 118 can, for example, request data from client management server 102 pertaining to users of access client systems 106 who have requested automobile sales information, who have visited automobile sales web sites, or who have responded to survey questions indicating an interest in receiving automobile sales data.
  • Client management server 102 implements the request for automobile sales information from the user of data client system 118 with user access system 110.
  • User access system 110 then periodically retrieves the requested data from user data system 108, and transmits the data to the user at data client system 118.
  • the user of data client system 118 can then identify the users of access client systems 106 associated with the data transmitted by client management server 102.
  • User X of access client system 106 responds to a survey question pertaining to potential future purchases by selecting automobiles, and further has Uniform Resource Locator log data indicating visits to web sites of automobile manufacturer C
  • this data can be transmitted to a User Y of data client system 118 by client management server 102.
  • User Y can then transmit e-mail containing marketing information, such as sale prices of automobiles offered by automobile manufacturer C, through client management server 102 to User X.
  • User X can then respond directly to User Y.
  • highly relevant marketing data can be provided to interested third parties by client management server 102 on an automated basis without operator involvement.
  • Communications medium 104 is a suitable communications medium for coupling a plurality of users of access client systems 106 to client management server 102, and is preferably the public switched telephone system.
  • Communications medium 116 is a suitable alternate communications medium for coupling a plurality of users of access client systems 106 to client management server 102, and is preferably a cable television coaxial conductor.
  • Communications medium 114 is a suitable mass communications medium such as a long distance switched network, and is preferably the Internet. Users of access client system 106 are provided with access to communications medium 114 either through communications medium 104, communications medium 116, or a combination of communications media 104 and 116.
  • a user can send a Uniform Resource Locator address over communications media 104 and 114 to a content provider, and the content provider can respond by transmitting content over communications media 114 and 116, where communications medium 116 is a cable television coaxial cable.
  • the content can be broadcast to each user of access client system 106 who is coupled to communications medium 116.
  • the content provider's response can be transmitted directly to the user over communications medium 104, where communications medium 104 is a switched network, a local area network, a wide area network, or other suitable communications medium.
  • Each access client system 106 is a terminal device that allows a user to request and view content, and can be a set- top device that interfaces with a conventional television set, such as a WebPassportTM set top access unit available from American Interactive Media, Inc.
  • Each access client system 106 can also or alternatively be a personal computer, a work station, a video telephone, a laptop computer, a terminal, or other suitable devices.
  • Each access client system 106 can comprise hardware, software, or a suitable combination of hardware and software that allows a user to interact with other hardware and software systems over communications media 104, 114, and 116.
  • client management system 100 can be used to provide users of access client system 106 with access to communications medium 114 in exchange for the provision of data and information, such as demographic information and purchasing interests, pertaining to the users of access client systems 106.
  • Each user of an access client system 106 is prompted with queries, for example, that can be used to classify the user into predetermined marketing classes, identify potential marketing opportunities, or that seek various other data requested by users of data client system 118.
  • the Uniform Resource Locator data or other content provider identification data logged by each access client system 106 can also be collected and stored for each user.
  • each user of access client system 106 can then be provided with access to communications medium 114, such as the Internet, so that they can communicate with content providers over the Internet or other suitable medium.
  • communications medium 114 such as the Internet
  • the survey data and content provider data are then collated by client management server 102 and can be provided to each user of data client system 118.
  • the users of a data client system 118 typically purchase the information provided by client management server 102 in order to reach specifically targeted consumers from among the users of access client systems 106.
  • Client management server 102 thus manages two groups of related but independent users.
  • FIGURE 2 is a block diagram of a user data system 108 in accordance with an exemplary embodiment of the present invention.
  • User data system 108 can be implemented in hardware, software, or a suitable combination of hardware and software, but is preferably software that operates on a general purpose server platform.
  • User data system 108 comprises data request manager 202, data tracking system 204, client survey data system 206, and client resource data system 208, each of which can be implemented in hardware, software, or a suitable combination of hardware and software, and which are preferably implemented in computer code that operates on a general purpose computing platform.
  • Data request manager 202 is connected to communications medium 104 and manages access to data stored in client resource data system 208 and client survey data system 206. For example, data request manager 202 can receive a request from user access system 110 to verify that survey responses have been received for a given user. Data request manager 202 then verifies that the user' s survey responses have been stored in client survey data system 206. Data request manager 202 can also receive requests for data from users of data client systems 118, including, but not limited to, requests for data pertaining to certain types of searches performed, survey responses, or other pertinent data. Data request manager 202 transfers the request to data tracking system 204 which locates the requested data in client resource data system 208 and client survey data system 206.
  • a user of data client system 118 can request data on users that have an interest in automobiles offered for sale by a particular manufacturer.
  • Data tracking system 204 then performs a text search for the manufacturer's name on all data stored in the client resource data system 208 and the client survey data system 206.
  • the text search will identify records that include client identification data, content provider data such as URL address data, survey response data, and other suitable data. Some or all of the selected data can then be transferred to data request manager 202 and further transferred to data client system 118.
  • Data tracking system 204 is coupled to data request manager 202, client resource data system 208, and client survey data system 206.
  • Client resource data system 208 contains a database of resource addresses, such as Uniform Resource Locators, that are associated with each user of access client system 106. For example, users of access client system 106 can use access client system 106 to view data resources at Uniform Resource Locator addresses over the Internet.
  • a log system of access client system 106 keeps track of the Uniform Resource Locator addresses visited, and periodically transfers this data to user data system 108. This data can then be stored in a relational database and can be further processed, such as to determine classes of Uniform Resource Locator addresses accessed, the number of times or length of time each Uniform Resource Locator has been accessed, or other suitable data.
  • Client survey data system 206 contains survey data received in response to queries provided to users of access client system 106. As previously described, users can be required to respond to survey queries in order to be provided access to communications medium 114. These responses are stored in client survey data system 206. In addition, client survey data system 206 can include processed client survey response data, such as to determine effectiveness of survey questions, the percentage of clients responding to survey questions with certain responses, or other suitable data. Processing of the client survey data can be performed by data tracking system 204.
  • user data system 108 can be used to track data associated with each user of the access client systems 106.
  • This data typically comprises responses to surveys and resource data such as Uniform Resource Locator address data or other communications medium use data that is logged by access client system 106 as users utilize communications medium 114.
  • Data tracking system 204 can perform additional analysis in processing of the data, and data request manager 202 controls access to the client resource data system 208 and the client survey data system 206.
  • FIGURE 3 is a block diagram of a user access system 110 in accordance with an exemplary embodiment of the present invention.
  • User access system 110 comprises survey response system 302, access client monitoring system 304, access client security system 306, and data client access system 308, which can each be implemented in hardware, software, or a suitable combination of hardware and software, and which are preferably software systems operating on a general purpose processing platform.
  • Survey response system 302 is operable to prompt users of access client system 106 with queries, and to verify that the responses received from the users of access client system 106 meet predetermined criteria for such responses.
  • Survey response system 302 can contain lists of pre-determined questions that are hierarchically related, where different classes of questions can be subsequently presented depending on the responses received from the users.
  • Survey response system 302 is thus operable to process responses received from users to determine whether responses contain acceptable or pre-determined data.
  • a user of access client system 106 can be presented with a query, such as: "Do you plan on purchasing a vehicle in the next six months?" If the user responds with a "yes,” then survey response system 302 can present the user with a query, such as: "What type of vehicle do you plan on purchasing?" Otherwise, if the user responds with a "no" answer, survey response system 302 can then present the user with a different query, such as: "Have you purchased a vehicle in the past six months?" Furthermore, survey response system 302 is operable to determine if a response to a query is appropriate.
  • a user of access client system 106 can be presented with a query, such as: "What type of vehicle do you plan on purchasing in the next six months?" The user' s response can then be compared with a list of available vehicles. If the user responds with an inappropriate response, such as: "A lemon,” survey response system 302 can prompt the user to clarify or provide a suitable response, such as by transmitting to the user an appropriate message, for example: " ⁇ A lemon' does not appear to be a suitable response, please try again.”
  • Survey response system 302 is further operable to notify users of access client system 106 that failure to complete the survey can result in suspension of access privileges to communications medium 114.
  • Survey response system 302 can also change the state of an access variable or otherwise transmit suitable data to allow the user to access communications medium 114 after completion of the survey, such as by setting a flag from "disable” to "enable.”
  • Access client monitoring system 304 performs monitoring of access client system 106.
  • Access client monitoring system 304 can perform periodic checks on monitoring systems of access client system 106, such as to determine whether access client system 106 has received authorization to access communications medium 114, to determine whether access client system 106 is being operated in a manner that is not authorized, or other appropriate monitoring.
  • a user of access client system 106 can modify access client system 106 to allow the user to access communications medium 114 in a manner that is not authorized, such as by passing through Internet access to additional users.
  • Access client monitoring system 304 can be used to detect such improper use of access client system 106.
  • Access client security system 306 is used to control access to communications medium 114 by access client system 106. Access client security system 306 provides for secure access to communications medium 114 after survey response system 302 indicates that a complete survey response has been received from a user of access client system 106. Access client security system 306 can be further operable to transfer code keys, algorithms, encryption devices, or other security information to access client system 106 to control security for access client system 106, such that an authorized access client system 106 can provide a correct response to a query from access client security system 306.
  • Data client access system 308 performs client access functions for data client system 118. For example, a user of data client system 118 can access data stored in user data system 108 after being authorized by data client access system 308.
  • Data client access system 308 can generate a web page prompting a user of data client system 118 for account identification and password information, or other suitable approaches can be utilized. After the account identification and password information is provided and verified, data client access system 308 can interface a user of data client system 118 with data stored on user data system 108.
  • Data client access system 308 can also retrieve and transmit data to data client system 118.
  • data client access system 308 can monitor responses to queries stored on user data system 108, retrieve user information from user data system 108, and transmit the user information to users of data client system 118.
  • users of data client system 118 can receive real time access to users of access client system 106 who are seeking services or goods provided by users of data client system 118.
  • Data client access system 308 also interfaces with survey response system 302 to allow a user of data client system 118 to add or modify query data.
  • the user of data client system 118 can wish to present all or certain users of access client system 106 with predetermined queries in order to identify users who can be interested in goods or services of the user of data ' client system 118.
  • Data client access system 308 allows query data to be added or modified, such as to add a new query or to change the class of users of access client system 106 who are presented with the query.
  • user access system 110 is used to control access by access client system 106 to communications medium 114, and access by data client system 118 to data.
  • Users of access client system 106 are typically seeking access to communications medium 114, such as to visit Internet web sites to view web site content.
  • Users of data client system 118 typically request data pertaining to users of access client system 106, such as information that can be used to develop targeted marketing data for use in product or service sales.
  • User access system 110 controls the access to communications medium 114 or the user data profiles of the access client system 106 users.
  • FIGURE 4 is a diagram of an access client system 106 in accordance with an exemplary embodiment of the present invention.
  • Access client system 106, Internet access system 402, Internet authorization system 404, survey interface 406, and alternate medium system 408 can be implemented in hardware, software, or a suitable combination of hardware and software, and are preferably software systems operating on a set top access system that allows Internet access and viewing of web site content through a conventional television set.
  • the set top access system can be a WebPassportTM set top access unit.
  • Internet access system 402 of access client system 106 can be a conventional Internet access system such as a web browser.
  • Internet access system 402 allows a user to select Uniform Resource Locator addresses or other suitable address data, so as to transfer selected data over communications medium 114.
  • a user of Internet access system 402 can use interface device 410 to enter alphanumeric information so as to select hypertext links, enter Uniform Resource Locator data, or otherwise select locations that can be accessed via communications medium 114.
  • Internet authorization system 404 is operable to cause Internet access system 402 to be temporarily disabled.
  • Internet authorization system 404 can allow Internet access system 402 to operate upon receipt of pre-determined data from survey interface 406 and alternate medium system 408. In this manner, a second layer of security can be used to prevent unauthorized access, where the set top device is disabled unless an access protocol is followed.
  • Survey interface 406 is configured to receive queries from client management server 102 and to present the queries to a user of access client system 106. Survey interface 406 also receives data entered by the user of access client system 106 in response to the query, and transmits the response to client management server 102.
  • Alternate medium system 408 is operable to allow access to communications medium 114 through communications medium 116.
  • communications medium 104 is the public switched telephone network
  • communications medium 116 can be a cable television system medium such as coaxial cable.
  • Alternate medium system 408 can also be configured to receive content from communications medium 114, but Uniform Resource Locator addresses or other data requests can be transmitted from the access client system 106 to content providers over communications media 104 and 114.
  • Interface device 410 is a suitable interface device for entering user-selected data, such as a keyboard.
  • Interface device 410 can also or alternatively comprise a mouse pointer, a trackball device, a speech recognition system, or other suitable data entry devices or systems.
  • access client system 106 is used to control access to communications medium 114.
  • the user of access client system 106 must respond to a survey periodically in order to be provided with access.
  • Logging functions of Internet access system 402 are also used to provide Uniform Resource Locator access data to client management server 102.
  • FIGURE 5 is flow chart of a method 500 for controlling access to a communications medium in accordance with an exemplary embodiment of the present invention.
  • Method 500 can be implemented at a server or other centralized communications access gateway.
  • Method 500 begins at step 502 where user logon data is received. For example, a user can be prompted to enter a user ID and a password, which is then transmitted to the server. This information is received at step 502. After the user logon information has been validated, the method proceeds to step 504, where a query is transmitted to the user. For example, a set of predetermined queries can be developed for the user, such as areas of interest, areas of intended purchases, or other similar data. The method then proceeds to step 506, where the response that has been entered by the user is received. At step 508, it is determined whether the response is appropriate. For example, if the query requests the user to enter a selection from a list of choices, it is determined at step 508 whether the user has entered one of the appropriate choices. If an appropriate response has not been entered at step 508, the method proceeds to step 510, where a prompt for the proper response is transmitted to the user. The method then returns to step 506.
  • a query For example, a set of predetermined queries can be developed for the user, such as areas
  • step 508 the method proceeds to step 512, where it is determined whether the final query has been transmitted to the user. If the final query has not been transmitted, the method proceeds to step 514, where the next query is selected. For example, the next query can be selected based upon user responses previously received, on historical log file data received from the user, or based upon other criteria. The method then returns to step 504.
  • step 512 the method proceeds to step 516, where a log data download command is transmitted to the user.
  • the terminal device such as a set top unit, can be configured to log address data for Internet websites that have been accessed by the user. A request for this data is transmitted at step 516.
  • the log data is received from the user.
  • the method then proceeds to step 520 where the log data is verified.
  • Log data manipulation can be determined by referencing file access date stamps or other predetermined data. If it is determined at step 520 that the log data has been modified, the method proceeds to step 522 where a warning is transmitted to the user stating that additional modification of the log file can result in a suspension of user access to the communications medium. A flag can also be set such that if the user subsequently modifies the log data then communications medium access is suspended. The method then proceeds to step 524. Likewise, if the log data has been verified at step 520, the method proceeds directly to step 524.
  • user authorization is set so that the user can access the communications medium.
  • user access to the restricted communications medium can be allowed through the communications medium connecting the server to the user, or through an alternate communications medium.
  • access for the user to interface with the communications medium is granted. It can also be determined at step 524 whether appropriate security measures have been implemented, such as independent verification of access allowance. This additional step can be implemented in order to prevent users from "hacking" their way into access when the user has not been appropriately authorized for access.
  • the method then proceeds to step 526, where any stored e-mail for the user is retrieved from an e-mail data memory and transmitted to the user.
  • method 500 is used by a server or other suitable communications medium gateway to control access to the communications medium by users. Users are first prompted for query responses which are collated and stored for provision to third parties. In addition, user log file data is retrieved for provision to third parties. After satisfactory responses to queries and log file data have been received, the user is given access to the communications medium for a predetermined period of time. In this manner, method 500 can be used to obtain valuable marketing data that is targeted to specific users in exchange for granting the user access to the communications medium.
  • FIGURE 6 is a flow chart of a method 600 for controlling user access to a communications medium in accordance with an exemplary embodiment of the present invention. Method 600 can be implemented at a user terminal or other suitable device, such as a personal computer or workstation, but is preferably implemented using a WebPassportTM television set top apparatus, or other suitable Internet access devices for use with conventional television sets.
  • Method 600 begins at step 602 where logon data is transmitted to a server or other communications gateway system. For example, the user can be prompted at step 602 to enter a password, a user ID, and other logon information. This information is transmitted at step 602. The method then proceeds to step 604 where a query is received from the server or gateway. For example, the query can request the user to select from predetermined choices, or to enter suitable keywords. The response entered by the user is transmitted at step 606. The method then proceeds to step 608 where it is determined whether an improper response message has been received. If an improper response message has been received at 608, then the message is displayed to the user and the method proceeds to step 610. At step 610, response data entered by the user in response to the improper response message is transmitted to the server or gateway. The method then returns to step 608. If an improper response message has not been received at step 608, the method proceeds to step 612.
  • step 612 it is determined whether a final query has been transmitted. If the last query was not a final query, the method returns to step 604. Otherwise, the method proceeds to step 614 and log file data is transmitted, such as in response to a log file data request message. The method then proceeds to step 616, where it is determined whether an incomplete log file data message has been received. If an incomplete log file data message has been received, the method proceeds to step 618 where a warning received from the server or gateway is displayed to the user. The method then proceeds to step 620. Likewise, if no incomplete log file data message is received at step 616, the method proceeds directly to step 620. At step 620, an authorization message is displayed, such as a message informing the user that authorization to access the communications medium has been granted.
  • step 622 any stored e-mail messages that have been transmitted to the user are displayed.
  • third parties can send e-mail messages to the user when the user is not logged on.
  • Such e-mail messages are typically stored on an e-mail server, and a flag is set on the user' s e- mail client application indicating that such e-mail messages exist.
  • the e-mail messages can be transmitted at step 622, or flag data indicating the existence of the email message can likewise be transmitted.
  • method 600 is used to control communications medium access for a user from a terminal device, such as a set top terminal.
  • the user is prompted for responses to queries other than a password and user identification, and receives communications access after suitable query responses have been transmitted to a gateway, server, or other suitable control mechanism.
  • Log data files are also transmitted from the user's terminal to the gateway, server or suitable mechanism.
  • FIGURE 7 is a flowchart of a method 700 for controlling third party access to communications medium user data in accordance with an exemplary embodiment of the present invention.
  • Method 700 can be used to provide data to third parties that has been obtained from access users of the communications access system.
  • Method 700 begins at step 702 where logon data is received.
  • a third party can log on to a server or other suitable gateway system through a communications medium, such as the Internet, a telephone line, or other suitable medium.
  • authorization to access the system is transmitted at step 704, such as authorization to the third party, or authorization to an access control program.
  • step 704 authorization to access the system
  • step 704 authorization to access the system
  • step 704 authorization to access the system
  • the method then proceeds to step 706 where stored e-mail for the third party is transmitted to the third party.
  • the third party typically requests information from communications medium users, and typically communicates with such users by e-mail.
  • the server or access system is configured to store such e-mails until the time that the third party logs on and requests e-mail transmissions.
  • e-mail messages are transmitted at log on, but can also or alternatively be transmitted on demand by the third party or at other suitable times.
  • the method then proceeds to step 708.
  • step 708 data requests are received. For example, when the third party is authorized for use on the database, data of interest can be flagged, or can subsequently be selected in interactive sessions with the server or gateway. This data is transmitted to the server or gateway from the third party at step 708. The method then proceeds to step 710.
  • the database is searched for data responsive to the request received at step 708.
  • the request received at step 708 can include a request for data identifying users that are interested in purchasing certain consumer products, users that have accessed predetermined websites, or other suitable data pertaining to communications medium access users.
  • the method then proceeds to step 712, where any data identified in response to the request is transmitted to the third party user.
  • step 714 it is determined whether e-mail has been sent from the third party for subsequent transmission to communications access users. If e-mail has been sent, the method proceeds to step 716 where it is determined whether the recipient for the e-mail is logged on. If the recipient is logged on, the method proceeds to step 718 where a flag is transmitted to the recipient indicating that the recipient has received an e-mail message. Otherwise, the method proceeds to step 720 and the e-mail is stored in a database of undelivered messages, such that the user can be flagged at a later time. The method then proceeds to step 722.
  • step 722 it is determined whether a new query has been received from the third party. Queries can be transmitted to communications medium access users, and the access users then provide responses to the queries in exchange for access to the communications medium. These queries can include queries from third party users. For example, a third party that sells automobiles can desire to submit queries to all communications medium access users regarding intended future purposes of automobiles. Likewise, the third party can prefer that queries be transmitted to targeted users, such as users that have previously indicated an interest in automobile data. If it is determined at step 722 that such query has been received, then the method proceeds to step 724 where the query is stored in a relational database. For example, the relational database can correlate the query to certain predetermined users, to randomly determined users, or to all users. The method then proceeds to step 742 and terminates.
  • the relational database can correlate the query to certain predetermined users, to randomly determined users, or to all users.
  • method 700 is used to control third party access to a database that holds communications medium user data.
  • Third parties such as advertisers or website content providers can desire to obtain information regarding user interests, users that have accessed certain types of websites, or other suitable data.
  • Method 700 is used to control the provision of such data to third parties so that third parties can easily receive selected data, and so as to prevent unauthorized access to data that has been received from communications medium access users.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Marketing (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Signal Processing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A system for controlling access to a communications medium, such as the Internet, is provided. The system includes one or more access client systems (106). A client management server (102) is connected to each of the access client systems and to the communications medium. The client management server presents queries to users at the access client systems, stores query responses from each user, and allows the users to access the communications medium when they have responded to all queries. A data client system (118) is connected to the client management server, and accesses the query responses through the client management server.

Description

TITLE: SYSTEM AND ETHOD FOR CONTROLLING ACCESS TO A COMMUNICATIONS MEDIUM
FIELD OF THE INVENTION The present invention pertains generally to communications system access providers, and more particularly to a system and method for controlling access to a communications medium, such as the Internet, that provides users access in exchange for responding to queries, where the query responses can then be provided to third parties.
BACKGROUND Access to communications media is controlled using a variety of systems and methods. Access to the Internet, long distance communications services, satellite telecommunications services, or to other "non-local" communications media is typically provided through a gateway or server that is connected to the public switched telephone network. For digital computer communications, a general purpose analog telephone line is typically connected to a modulator- demodulator ("modem") device of the digital computer. Access can also be provided using a cable television coaxial cable, an integrated services digital network connection, a hybrid telephone/cable television system, wireless service, or other suitable systems and methods. Regardless of the type of system used to provide access to the communications medium, the access is typically provided using a pay-for-access system. A user can be provided with a password and user identification code, and can be prompted for that code upon entry to the server or gateway. A user can be charged a flat fee, a fee based on the amount of time the communications medium is used, a fee based on the number of content providers accessed, or other suitable fee structures can be used. In all of these fee structures, the only information obtained from the user is identification and security information, if any. The privacy of users is typically protected, so that the identification of content providers or other locations accessed by the user is not generally provided to third parties.
Nevertheless, it is increasingly desired by content providers and other third parties to obtain information on the content providers accessed by the users of communications media. Such information is currently obtained on a content provider basis, such as by asking users to respond to surveys offered by each content provider. A comprehensive system and method for tracking the content providers accessed by communications media users across all content providers that the user accesses for the purpose of providing this information to third parties does not presently exist. Accordingly, there has been a need for a system and method for tracking the content providers accessed by communications media users that allows all of the content providers accessed by each communications user to be tracked.
SUMMARY OF THE INVENTION The present invention provides improved systems and methods for controlling access to a communications medium that overcome the disadvantages of previously developed systems and methods for controlling access to a communications medium.
In particular, a system and method for controlling access to a communications medium is provided that allows user data to be collected and provided to third parties for uses such as targeting potential marketing audiences.
In accordance with one aspect of the present invention, a system for controlling access to a communications medium, such as the Internet, is provided. The system includes one or more access client systems. A client management server is connected to each of the access client systems and to the communications medium. The client management server presents queries to users at the access client systems, stores query responses from each user, and allows the users to access the communications medium when they have responded to all queries. A data client system that can be used by third parties to access the query responses is connected to the client management server, and accesses the query responses through the client management server.
The system for controlling communications medium access of the present invention allows communications medium user access to be tracked, such that all content providers accessed by the users can be monitored. For example, if Internet services are used over the communications medium, the present invention allows the Uniform Resource Locator addresses accessed by users to be tracked so that a content provider, such as a retailer, can determine which users are more likely to be interested in the products offered by that retailer. In this manner, content providers can improve content and more readily identify potential audiences.
The present invention also allows content providers to query communications medium users, so as to obtain information that is not typically available for individual consumers. For example, a content provider such as a retailer can present a query to each user regarding intended purchases. The retailer can then contact users that intend to purchase items that are sold by the retailer.
Those skilled in the art will further appreciate the advantages and superior features of the invention together with other important aspects thereof on reading the detailed description which follows in conjunction with the drawing. BRIEF DESCRIPTION OF THE DRAWINGS FIGURE 1 is a system diagram of a client management system in accordance with an exemplary embodiment of the present invention; FIGURE 2 is a block diagram of a user data system in accordance with an exemplary embodiment of the present invention;
FIGURE 3 is a block diagram of a user access system in accordance with an exemplary embodiment of the present invention;
FIGURE 4 is a diagram of an access client system in accordance with an exemplary embodiment of present invention;
FIGURE 5 is flow chart of a method for controlling access to a communications medium in accordance with an exemplary embodiment of the present invention;
FIGURE 6 is a flow chart of a method for controlling user access to a communications medium in accordance with an exemplary embodiment of the present invention; and
FIGURE 7 is a flowchart of a method for controlling third party access to communications medium user data in accordance with an exemplary embodiment of the present invention.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS In the description which follows, like parts are marked throughout the specification and drawing with the same reference numerals, respectively. The drawing figures can not be to scale and certain components can be shown in generalized or schematic form and identified by commercial designations in the interest of clarity and conciseness.
FIGURE 1 is a system diagram of a client management system
100 in accordance with an exemplary embodiment of the present invention. Client management system 100 is used to control communications medium access for access clients, and to control access to data for data clients.
Client management system 100 includes client management server 102, communications medium 104, and a plurality of access client systems 106. Client management server 102 includes a user data system 108 and a user access system 110.
User access system 110 is coupled to communications medium
104, communications medium 114, and communications medium 116.
As used in this application, "couple" refers to suitable connections between two components, including, but not limited, to a physical connection (such as a copper conductor, a data bus, or a coaxial cable) , a logical connection (such as through logical devices of a general purpose processing platform) , a virtual connection (such as through randomly assigned memory locations of a random access memory, a magnetic media memory, or an optical medium memory) , or through other suitable connections.
Each communications medium user can access client management server 102 through an access client system 106. Client management server 102 controls access to communications medium 114 by the access client systems 106. Client management server 102 also controls data provided to one or more data client system 118. While a single data client system 118 is depicted in FIGURE 1, one of ordinary skill in the art will recognize that a plurality of data client systems 118 may be provided.
The client management server 102, user data system 108, and user access system 110 can be implemented in hardware, software, or a suitable combination of hardware and software, and are preferably computer programs that operate on a general purpose computing platform such as a server, a personal computer, or a work station. Client management server 102 manages access to communications medium 114 by access client systems 106. For example, client management server 102 can present a user of an access client system 106 with predetermined queries. The user must then provide responses for the predetermined queries in order to be provided with access to communications medium 114. If incorrect or incomplete responses to the queries are provided, access to communications medium 114 can be denied.
In addition, client management server 102 can monitor the activities of access client systems 106. For example, each access client system 106 can include an Internet browser, such that a log of all Uniform Resource Locator (URL) addresses or similar information can be maintained by each access client system 106. Client management server 102 can periodically prompt each access client system 106 and retrieve the log of Uniform Resource Locators or other information that can be used to determine communications tasks performed by users of access client systems 106. Client management server 102 can store such client data on user data system 108. Likewise, client management server 102 can store client responses to surveys on user data system 108. The client survey response data and client communications access data can be cross- referenced, processed, or otherwise manipulated by user data system 108 to place the data in a format suitable for use by users of data client system 118.
Client management server 102 can also control data provided to data client system 118. A user of data client system 118 can request predetermined data from client management server 102 that pertains to the use of communications medium 114 by users of access client systems 106. User access system 110 of client management server 102 is used to track the data requested, such that data from user data system 108 can be periodically selected and transmitted by user access system 110 to data client system 118.
For example, a user of data client system 118 can be a manufacturer, such as an auto manufacturer. The user can request marketing data pertaining to automobiles through data client system 118 from client management server 102. Client management server 102 can prompt data client system 118 for predetermined key words, data classes, or subjects, and use these terms to identify requested data. Other suitable methods and systems for determining data of interest to a user of data client system 118 can also be used. Client management server 102 then monitors and extracts data from user data system 108, and can transmit the data periodically to data client system 118. A user of data client system 118 can then use the data for marketing purposes or other purposes, such as to determine whether additional contact with particular users of access client systems 106 is desired.
The user of data client system 118 can, for example, request data from client management server 102 pertaining to users of access client systems 106 who have requested automobile sales information, who have visited automobile sales web sites, or who have responded to survey questions indicating an interest in receiving automobile sales data. Client management server 102 implements the request for automobile sales information from the user of data client system 118 with user access system 110. User access system 110 then periodically retrieves the requested data from user data system 108, and transmits the data to the user at data client system 118. The user of data client system 118 can then identify the users of access client systems 106 associated with the data transmitted by client management server 102.
Thus, if User X of access client system 106 responds to a survey question pertaining to potential future purchases by selecting automobiles, and further has Uniform Resource Locator log data indicating visits to web sites of automobile manufacturer C, this data can be transmitted to a User Y of data client system 118 by client management server 102. User Y can then transmit e-mail containing marketing information, such as sale prices of automobiles offered by automobile manufacturer C, through client management server 102 to User X. User X can then respond directly to User Y. In this manner, highly relevant marketing data can be provided to interested third parties by client management server 102 on an automated basis without operator involvement. Communications medium 104 is a suitable communications medium for coupling a plurality of users of access client systems 106 to client management server 102, and is preferably the public switched telephone system. Communications medium 116 is a suitable alternate communications medium for coupling a plurality of users of access client systems 106 to client management server 102, and is preferably a cable television coaxial conductor. Communications medium 114 is a suitable mass communications medium such as a long distance switched network, and is preferably the Internet. Users of access client system 106 are provided with access to communications medium 114 either through communications medium 104, communications medium 116, or a combination of communications media 104 and 116. For example, a user can send a Uniform Resource Locator address over communications media 104 and 114 to a content provider, and the content provider can respond by transmitting content over communications media 114 and 116, where communications medium 116 is a cable television coaxial cable. In this configuration, the content can be broadcast to each user of access client system 106 who is coupled to communications medium 116. Likewise, the content provider's response can be transmitted directly to the user over communications medium 104, where communications medium 104 is a switched network, a local area network, a wide area network, or other suitable communications medium.
Each access client system 106 is a terminal device that allows a user to request and view content, and can be a set- top device that interfaces with a conventional television set, such as a WebPassport™ set top access unit available from American Interactive Media, Inc. Each access client system 106 can also or alternatively be a personal computer, a work station, a video telephone, a laptop computer, a terminal, or other suitable devices. Each access client system 106 can comprise hardware, software, or a suitable combination of hardware and software that allows a user to interact with other hardware and software systems over communications media 104, 114, and 116.
In operation, client management system 100 can be used to provide users of access client system 106 with access to communications medium 114 in exchange for the provision of data and information, such as demographic information and purchasing interests, pertaining to the users of access client systems 106. Each user of an access client system 106 is prompted with queries, for example, that can be used to classify the user into predetermined marketing classes, identify potential marketing opportunities, or that seek various other data requested by users of data client system 118. The Uniform Resource Locator data or other content provider identification data logged by each access client system 106 can also be collected and stored for each user.
After responding to the queries, each user of access client system 106 can then be provided with access to communications medium 114, such as the Internet, so that they can communicate with content providers over the Internet or other suitable medium. The survey data and content provider data are then collated by client management server 102 and can be provided to each user of data client system 118. The users of a data client system 118 typically purchase the information provided by client management server 102 in order to reach specifically targeted consumers from among the users of access client systems 106.
In this manner, users of access client systems 106 are provided with free or low cost Internet access in the exemplary embodiment. The users of data client system 118, who receive highly relevant and useful marketing data, pay for this free Internet access. Client management server 102 thus manages two groups of related but independent users.
FIGURE 2 is a block diagram of a user data system 108 in accordance with an exemplary embodiment of the present invention. User data system 108 can be implemented in hardware, software, or a suitable combination of hardware and software, but is preferably software that operates on a general purpose server platform. User data system 108 comprises data request manager 202, data tracking system 204, client survey data system 206, and client resource data system 208, each of which can be implemented in hardware, software, or a suitable combination of hardware and software, and which are preferably implemented in computer code that operates on a general purpose computing platform.
Data request manager 202 is connected to communications medium 104 and manages access to data stored in client resource data system 208 and client survey data system 206. For example, data request manager 202 can receive a request from user access system 110 to verify that survey responses have been received for a given user. Data request manager 202 then verifies that the user' s survey responses have been stored in client survey data system 206. Data request manager 202 can also receive requests for data from users of data client systems 118, including, but not limited to, requests for data pertaining to certain types of searches performed, survey responses, or other pertinent data. Data request manager 202 transfers the request to data tracking system 204 which locates the requested data in client resource data system 208 and client survey data system 206.
A user of data client system 118, for example, can request data on users that have an interest in automobiles offered for sale by a particular manufacturer. Data tracking system 204 then performs a text search for the manufacturer's name on all data stored in the client resource data system 208 and the client survey data system 206. The text search will identify records that include client identification data, content provider data such as URL address data, survey response data, and other suitable data. Some or all of the selected data can then be transferred to data request manager 202 and further transferred to data client system 118.
Data tracking system 204 is coupled to data request manager 202, client resource data system 208, and client survey data system 206. Client resource data system 208 contains a database of resource addresses, such as Uniform Resource Locators, that are associated with each user of access client system 106. For example, users of access client system 106 can use access client system 106 to view data resources at Uniform Resource Locator addresses over the Internet. A log system of access client system 106 keeps track of the Uniform Resource Locator addresses visited, and periodically transfers this data to user data system 108. This data can then be stored in a relational database and can be further processed, such as to determine classes of Uniform Resource Locator addresses accessed, the number of times or length of time each Uniform Resource Locator has been accessed, or other suitable data.
Client survey data system 206 contains survey data received in response to queries provided to users of access client system 106. As previously described, users can be required to respond to survey queries in order to be provided access to communications medium 114. These responses are stored in client survey data system 206. In addition, client survey data system 206 can include processed client survey response data, such as to determine effectiveness of survey questions, the percentage of clients responding to survey questions with certain responses, or other suitable data. Processing of the client survey data can be performed by data tracking system 204.
In operation, user data system 108 can be used to track data associated with each user of the access client systems 106. This data typically comprises responses to surveys and resource data such as Uniform Resource Locator address data or other communications medium use data that is logged by access client system 106 as users utilize communications medium 114. Data tracking system 204 can perform additional analysis in processing of the data, and data request manager 202 controls access to the client resource data system 208 and the client survey data system 206.
FIGURE 3 is a block diagram of a user access system 110 in accordance with an exemplary embodiment of the present invention. User access system 110 comprises survey response system 302, access client monitoring system 304, access client security system 306, and data client access system 308, which can each be implemented in hardware, software, or a suitable combination of hardware and software, and which are preferably software systems operating on a general purpose processing platform. Survey response system 302 is operable to prompt users of access client system 106 with queries, and to verify that the responses received from the users of access client system 106 meet predetermined criteria for such responses. Survey response system 302 can contain lists of pre-determined questions that are hierarchically related, where different classes of questions can be subsequently presented depending on the responses received from the users. Survey response system 302 is thus operable to process responses received from users to determine whether responses contain acceptable or pre-determined data.
For example, a user of access client system 106 can be presented with a query, such as: "Do you plan on purchasing a vehicle in the next six months?" If the user responds with a "yes," then survey response system 302 can present the user with a query, such as: "What type of vehicle do you plan on purchasing?" Otherwise, if the user responds with a "no" answer, survey response system 302 can then present the user with a different query, such as: "Have you purchased a vehicle in the past six months?" Furthermore, survey response system 302 is operable to determine if a response to a query is appropriate. For example, a user of access client system 106 can be presented with a query, such as: "What type of vehicle do you plan on purchasing in the next six months?" The user' s response can then be compared with a list of available vehicles. If the user responds with an inappropriate response, such as: "A lemon," survey response system 302 can prompt the user to clarify or provide a suitable response, such as by transmitting to the user an appropriate message, for example: " ΛA lemon' does not appear to be a suitable response, please try again." Survey response system 302 is further operable to notify users of access client system 106 that failure to complete the survey can result in suspension of access privileges to communications medium 114. Survey response system 302 can also change the state of an access variable or otherwise transmit suitable data to allow the user to access communications medium 114 after completion of the survey, such as by setting a flag from "disable" to "enable."
Access client monitoring system 304 performs monitoring of access client system 106. Access client monitoring system 304 can perform periodic checks on monitoring systems of access client system 106, such as to determine whether access client system 106 has received authorization to access communications medium 114, to determine whether access client system 106 is being operated in a manner that is not authorized, or other appropriate monitoring. For example, a user of access client system 106 can modify access client system 106 to allow the user to access communications medium 114 in a manner that is not authorized, such as by passing through Internet access to additional users. Access client monitoring system 304 can be used to detect such improper use of access client system 106.
Access client security system 306 is used to control access to communications medium 114 by access client system 106. Access client security system 306 provides for secure access to communications medium 114 after survey response system 302 indicates that a complete survey response has been received from a user of access client system 106. Access client security system 306 can be further operable to transfer code keys, algorithms, encryption devices, or other security information to access client system 106 to control security for access client system 106, such that an authorized access client system 106 can provide a correct response to a query from access client security system 306. Data client access system 308 performs client access functions for data client system 118. For example, a user of data client system 118 can access data stored in user data system 108 after being authorized by data client access system 308. Data client access system 308 can generate a web page prompting a user of data client system 118 for account identification and password information, or other suitable approaches can be utilized. After the account identification and password information is provided and verified, data client access system 308 can interface a user of data client system 118 with data stored on user data system 108.
Data client access system 308 can also retrieve and transmit data to data client system 118. For example, data client access system 308 can monitor responses to queries stored on user data system 108, retrieve user information from user data system 108, and transmit the user information to users of data client system 118. In this manner, users of data client system 118 can receive real time access to users of access client system 106 who are seeking services or goods provided by users of data client system 118. Data client access system 308 also interfaces with survey response system 302 to allow a user of data client system 118 to add or modify query data. For example, the user of data client system 118 can wish to present all or certain users of access client system 106 with predetermined queries in order to identify users who can be interested in goods or services of the user of data ' client system 118. Data client access system 308 allows query data to be added or modified, such as to add a new query or to change the class of users of access client system 106 who are presented with the query.
In operation, user access system 110 is used to control access by access client system 106 to communications medium 114, and access by data client system 118 to data. Users of access client system 106 are typically seeking access to communications medium 114, such as to visit Internet web sites to view web site content. Users of data client system 118 typically request data pertaining to users of access client system 106, such as information that can be used to develop targeted marketing data for use in product or service sales. User access system 110 controls the access to communications medium 114 or the user data profiles of the access client system 106 users.
FIGURE 4 is a diagram of an access client system 106 in accordance with an exemplary embodiment of the present invention. Access client system 106, Internet access system 402, Internet authorization system 404, survey interface 406, and alternate medium system 408 can be implemented in hardware, software, or a suitable combination of hardware and software, and are preferably software systems operating on a set top access system that allows Internet access and viewing of web site content through a conventional television set. For example, the set top access system can be a WebPassport™ set top access unit.
Internet access system 402 of access client system 106 can be a conventional Internet access system such as a web browser. Internet access system 402 allows a user to select Uniform Resource Locator addresses or other suitable address data, so as to transfer selected data over communications medium 114. A user of Internet access system 402 can use interface device 410 to enter alphanumeric information so as to select hypertext links, enter Uniform Resource Locator data, or otherwise select locations that can be accessed via communications medium 114.
Internet authorization system 404 is operable to cause Internet access system 402 to be temporarily disabled. For example, Internet authorization system 404 can allow Internet access system 402 to operate upon receipt of pre-determined data from survey interface 406 and alternate medium system 408. In this manner, a second layer of security can be used to prevent unauthorized access, where the set top device is disabled unless an access protocol is followed.
Survey interface 406 is configured to receive queries from client management server 102 and to present the queries to a user of access client system 106. Survey interface 406 also receives data entered by the user of access client system 106 in response to the query, and transmits the response to client management server 102.
Alternate medium system 408 is operable to allow access to communications medium 114 through communications medium 116. For example, if communications medium 104 is the public switched telephone network, then communications medium 116 can be a cable television system medium such as coaxial cable. Alternate medium system 408 can also be configured to receive content from communications medium 114, but Uniform Resource Locator addresses or other data requests can be transmitted from the access client system 106 to content providers over communications media 104 and 114.
Interface device 410 is a suitable interface device for entering user-selected data, such as a keyboard. Interface device 410 can also or alternatively comprise a mouse pointer, a trackball device, a speech recognition system, or other suitable data entry devices or systems.
In operation, access client system 106 is used to control access to communications medium 114. The user of access client system 106 must respond to a survey periodically in order to be provided with access. Logging functions of Internet access system 402 are also used to provide Uniform Resource Locator access data to client management server 102.
FIGURE 5 is flow chart of a method 500 for controlling access to a communications medium in accordance with an exemplary embodiment of the present invention. Method 500 can be implemented at a server or other centralized communications access gateway.
Method 500 begins at step 502 where user logon data is received. For example, a user can be prompted to enter a user ID and a password, which is then transmitted to the server. This information is received at step 502. After the user logon information has been validated, the method proceeds to step 504, where a query is transmitted to the user. For example, a set of predetermined queries can be developed for the user, such as areas of interest, areas of intended purchases, or other similar data. The method then proceeds to step 506, where the response that has been entered by the user is received. At step 508, it is determined whether the response is appropriate. For example, if the query requests the user to enter a selection from a list of choices, it is determined at step 508 whether the user has entered one of the appropriate choices. If an appropriate response has not been entered at step 508, the method proceeds to step 510, where a prompt for the proper response is transmitted to the user. The method then returns to step 506.
If an appropriate response is received at step 508, the method proceeds to step 512, where it is determined whether the final query has been transmitted to the user. If the final query has not been transmitted, the method proceeds to step 514, where the next query is selected. For example, the next query can be selected based upon user responses previously received, on historical log file data received from the user, or based upon other criteria. The method then returns to step 504.
If a final query has been transmitted at step 512, the method proceeds to step 516, where a log data download command is transmitted to the user. For example, the terminal device, such as a set top unit, can be configured to log address data for Internet websites that have been accessed by the user. A request for this data is transmitted at step 516.
At step 518, the log data is received from the user. The method then proceeds to step 520 where the log data is verified. For example, it can be possible for users to modify log data, such as to provide misleading data, to delete data, or for other purposes. Log data manipulation can be determined by referencing file access date stamps or other predetermined data. If it is determined at step 520 that the log data has been modified, the method proceeds to step 522 where a warning is transmitted to the user stating that additional modification of the log file can result in a suspension of user access to the communications medium. A flag can also be set such that if the user subsequently modifies the log data then communications medium access is suspended. The method then proceeds to step 524. Likewise, if the log data has been verified at step 520, the method proceeds directly to step 524.
At step 524, user authorization is set so that the user can access the communications medium. For example, user access to the restricted communications medium can be allowed through the communications medium connecting the server to the user, or through an alternate communications medium. At step 524, access for the user to interface with the communications medium is granted. It can also be determined at step 524 whether appropriate security measures have been implemented, such as independent verification of access allowance. This additional step can be implemented in order to prevent users from "hacking" their way into access when the user has not been appropriately authorized for access. The method then proceeds to step 526, where any stored e-mail for the user is retrieved from an e-mail data memory and transmitted to the user.
In operation, method 500 is used by a server or other suitable communications medium gateway to control access to the communications medium by users. Users are first prompted for query responses which are collated and stored for provision to third parties. In addition, user log file data is retrieved for provision to third parties. After satisfactory responses to queries and log file data have been received, the user is given access to the communications medium for a predetermined period of time. In this manner, method 500 can be used to obtain valuable marketing data that is targeted to specific users in exchange for granting the user access to the communications medium. FIGURE 6 is a flow chart of a method 600 for controlling user access to a communications medium in accordance with an exemplary embodiment of the present invention. Method 600 can be implemented at a user terminal or other suitable device, such as a personal computer or workstation, but is preferably implemented using a WebPassport™ television set top apparatus, or other suitable Internet access devices for use with conventional television sets.
Method 600 begins at step 602 where logon data is transmitted to a server or other communications gateway system. For example, the user can be prompted at step 602 to enter a password, a user ID, and other logon information. This information is transmitted at step 602. The method then proceeds to step 604 where a query is received from the server or gateway. For example, the query can request the user to select from predetermined choices, or to enter suitable keywords. The response entered by the user is transmitted at step 606. The method then proceeds to step 608 where it is determined whether an improper response message has been received. If an improper response message has been received at 608, then the message is displayed to the user and the method proceeds to step 610. At step 610, response data entered by the user in response to the improper response message is transmitted to the server or gateway. The method then returns to step 608. If an improper response message has not been received at step 608, the method proceeds to step 612.
At step 612, it is determined whether a final query has been transmitted. If the last query was not a final query, the method returns to step 604. Otherwise, the method proceeds to step 614 and log file data is transmitted, such as in response to a log file data request message. The method then proceeds to step 616, where it is determined whether an incomplete log file data message has been received. If an incomplete log file data message has been received, the method proceeds to step 618 where a warning received from the server or gateway is displayed to the user. The method then proceeds to step 620. Likewise, if no incomplete log file data message is received at step 616, the method proceeds directly to step 620. At step 620, an authorization message is displayed, such as a message informing the user that authorization to access the communications medium has been granted. The method then proceeds to step 622 where any stored e-mail messages that have been transmitted to the user are displayed. For example, third parties can send e-mail messages to the user when the user is not logged on. Such e-mail messages are typically stored on an e-mail server, and a flag is set on the user' s e- mail client application indicating that such e-mail messages exist. Thus, the e-mail messages can be transmitted at step 622, or flag data indicating the existence of the email message can likewise be transmitted.
In operation, method 600 is used to control communications medium access for a user from a terminal device, such as a set top terminal. The user is prompted for responses to queries other than a password and user identification, and receives communications access after suitable query responses have been transmitted to a gateway, server, or other suitable control mechanism. Log data files are also transmitted from the user's terminal to the gateway, server or suitable mechanism.
FIGURE 7 is a flowchart of a method 700 for controlling third party access to communications medium user data in accordance with an exemplary embodiment of the present invention. Method 700 can be used to provide data to third parties that has been obtained from access users of the communications access system.
Method 700 begins at step 702 where logon data is received. For example, a third party can log on to a server or other suitable gateway system through a communications medium, such as the Internet, a telephone line, or other suitable medium. Upon appropriate receipt and verification of the logon data, authorization to access the system is transmitted at step 704, such as authorization to the third party, or authorization to an access control program. The method then proceeds to step 706 where stored e-mail for the third party is transmitted to the third party. For example, the third party typically requests information from communications medium users, and typically communicates with such users by e-mail. The server or access system is configured to store such e-mails until the time that the third party logs on and requests e-mail transmissions. In the present embodiment such e-mail messages are transmitted at log on, but can also or alternatively be transmitted on demand by the third party or at other suitable times. The method then proceeds to step 708.
At step 708, data requests are received. For example, when the third party is authorized for use on the database, data of interest can be flagged, or can subsequently be selected in interactive sessions with the server or gateway. This data is transmitted to the server or gateway from the third party at step 708. The method then proceeds to step 710.
At step 710, the database is searched for data responsive to the request received at step 708. For example, the request received at step 708 can include a request for data identifying users that are interested in purchasing certain consumer products, users that have accessed predetermined websites, or other suitable data pertaining to communications medium access users. The method then proceeds to step 712, where any data identified in response to the request is transmitted to the third party user.
At step 714 it is determined whether e-mail has been sent from the third party for subsequent transmission to communications access users. If e-mail has been sent, the method proceeds to step 716 where it is determined whether the recipient for the e-mail is logged on. If the recipient is logged on, the method proceeds to step 718 where a flag is transmitted to the recipient indicating that the recipient has received an e-mail message. Otherwise, the method proceeds to step 720 and the e-mail is stored in a database of undelivered messages, such that the user can be flagged at a later time. The method then proceeds to step 722.
At step 722, it is determined whether a new query has been received from the third party. Queries can be transmitted to communications medium access users, and the access users then provide responses to the queries in exchange for access to the communications medium. These queries can include queries from third party users. For example, a third party that sells automobiles can desire to submit queries to all communications medium access users regarding intended future purposes of automobiles. Likewise, the third party can prefer that queries be transmitted to targeted users, such as users that have previously indicated an interest in automobile data. If it is determined at step 722 that such query has been received, then the method proceeds to step 724 where the query is stored in a relational database. For example, the relational database can correlate the query to certain predetermined users, to randomly determined users, or to all users. The method then proceeds to step 742 and terminates.
In operation, method 700 is used to control third party access to a database that holds communications medium user data. Third parties such as advertisers or website content providers can desire to obtain information regarding user interests, users that have accessed certain types of websites, or other suitable data. Method 700 is used to control the provision of such data to third parties so that third parties can easily receive selected data, and so as to prevent unauthorized access to data that has been received from communications medium access users. Although preferred and exemplary embodiments of systems and methods for controlling communications medium access have been described in detail herein, those skilled in the art will also recognize that various substitutions and modifications can be made to the systems and methods without departing from the scope and spirit of the appended claims.

Claims

WHAT IS CLAIMED IS:
1. A system for controlling access to a communications medium comprising: one or more access client systems; a client management server coupled to the one or more access client systems and the communications medium, the client management server operable to present each access client system with predetermined queries, and to allow the access client systems to access the communications medium after receiving response data to the queries from each client access system; and a data client system coupled to the client management server, the data client system operable to interface with the client management server so as to receive the response data.
2. The system of claim 1, wherein the client management server further comprises: a user access system operable to control access to the communications medium by each access client system; and a user data system operable to process query responses and log data from each access client system.
3. The system of claim 2, wherein the user data system further comprises: a client survey data system configured to store relational data that includes the queries presented to and the responses generated by each client access system; and a client resource data system configured to store relational data that includes addresses of content locations accessed over the communications medium by each client access system.
4. The system of claim 2, wherein the user data system further comprises a data request manager operable to transmit query data to the client access systems, to receive the query response data, to verify the query response data, and to select other query data based upon the query response data.
5. The system of claim 2, wherein the user access system further comprises a survey response system operable to determine when one of the client access systems has transmitted a response to all queries and to change the state of an access variable associated with the client access system.
6. The system of claim 2, wherein the user access system further comprises an access client monitoring system operable to determine whether any of the client access systems is being used in an unauthorized manner.
7. The system of claim 2, wherein the user access system further comprises a data client access system operable to receive request data from the data client system, to transmit selected data to the data client system in response to the request data, to receive query data from the data client system, and to store the query data in the client management server.
8. A system for accessing a communications medium comprising: a survey interface operable to receive predetermined survey queries and to transmit user-entered responses to a server; and an Internet access system coupled to the survey interface, where the Internet access system is operable to receive a communications medium access authorization and to access the communications medium after receipt of the communications medium access authorization.
9. The system of claim 8 further comprising an Internet authorization system coupled to the Internet access system, the Internet authorization system operable to receive predetermined data from an access client security system and to generate a predetermined response to the access client security system such that the access system client security system generates the communications medium access authorization.
10. The system of claim 8 further comprising an alternate medium system coupled to the Internet access system, the alternate medium system operable to receive data from the communications medium.
11. A method for controlling access to a communications medium comprising: responding to one or more queries at a client; allowing access to the communications medium by the client after a complete response to the one or more queries is received at a server; and transmitting query response data to a third party.
12. The method of claim 11 further comprising: receiving content provider address data, at the server from the client; and transmitting the content provider address data to the third party.
13. The method of claim 11 wherein responding to one or more queries at a client comprises: receiving predetermined query data from a client management server; transmitting response data to the client management server; and receiving data from the client management server indicating that the response data is complete.
14. The method of claim 11 wherein allowing access to the communications medium by the client after the complete response to the one or more queries is received at the server comprises setting a state variable at the server from an inactive state to an active state.
15. The method of claim 11 wherein transmitting query response data to a third party further comprises transmitting content provider address data to the third party.
16. A method for controlling access to a communications medium comprising: receiving one or more queries; transmitting response data for each of the one or more queries; transmitting content provider address data; and receiving authorization for communications medium access.
17. The method of claim 16 further comprising receiving email data from a third party in response to the response data and the content provider address data.
18. The method of claim 16 further comprising receiving query data from a third party in response to the response data and the content provider address data.
19. The method of claim 16 wherein transmitting response data for each of the one or more queries further comprises: receiving an improper response message; and transmitting a different response to the query.
20. The method of claim 16 further comprising transmitting the response data and the content provider address data from a client management server to a third party.
21. A method for providing communications medium access comprising: presenting predetermined queries to an access user; receiving query responses from the access user; coupling the access user to the communications medium after determining that the query responses are complete; and providing query response data to a data client.
22. The method of claim 21 wherein providing query response data to the data client comprises: receiving payment authorization data for a data client; and performing a search of the query response data based upon input from the data client.
23. The method of claim 21 further comprising: receiving a data client query from the data client; and adding the data client query to the predetermined queries provided to the access user.
PCT/US2000/009375 1999-04-09 2000-04-07 System and method for controlling access to a communications medium Ceased WO2000062202A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP00921898A EP1198763A1 (en) 1999-04-09 2000-04-07 System and method for controlling access to a communications medium
AU42155/00A AU4215500A (en) 1999-04-09 2000-04-07 System and method for controlling access to a communications medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US28923499A 1999-04-09 1999-04-09
US09/289,234 1999-04-09

Publications (1)

Publication Number Publication Date
WO2000062202A1 true WO2000062202A1 (en) 2000-10-19

Family

ID=23110627

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/009375 Ceased WO2000062202A1 (en) 1999-04-09 2000-04-07 System and method for controlling access to a communications medium

Country Status (3)

Country Link
EP (1) EP1198763A1 (en)
AU (1) AU4215500A (en)
WO (1) WO2000062202A1 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5774869A (en) * 1995-06-06 1998-06-30 Interactive Media Works, Llc Method for providing sponsor paid internet access and simultaneous sponsor promotion

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5774869A (en) * 1995-06-06 1998-06-30 Interactive Media Works, Llc Method for providing sponsor paid internet access and simultaneous sponsor promotion

Also Published As

Publication number Publication date
AU4215500A (en) 2000-11-14
EP1198763A1 (en) 2002-04-24

Similar Documents

Publication Publication Date Title
US20140372176A1 (en) Method and apparatus for anonymous data profiling
CN100414543C (en) Use of Extensible Markup Language in Database Search Systems and Methods
US6470338B1 (en) Computerized system and method for assisting potential clients to identify and appropriate provider for professional services
US9917827B2 (en) Internet server access control and monitoring systems
US7272639B1 (en) Internet server access control and monitoring systems
US7895121B2 (en) Method and system for tracking conversions in a system for targeted data delivery
US8996508B2 (en) Sending advertisements to customers
US20050038699A1 (en) System and method for targeted advertising via commitment
US20090204706A1 (en) Behavioral networking systems and methods for facilitating delivery of targeted content
US20030236729A1 (en) Systems and methods of directing, customizing, exchanging, negotiating, trading and provisioning of information, goods and services to information users
US20050038698A1 (en) Targeted advertisement with local consumer profile
US20040068477A1 (en) Method and system to publish the results of a search of descriptive profiles based on respective publication policies specified by owners of the descriptive profiles, and a profile service provider
US20150172214A1 (en) Systems and methods to provide information and services to authorized users
US20010020242A1 (en) Method and apparatus for processing client information
KR20010031840A (en) Electronic commerce with anonymous shopping and anonymous vendor shipping
KR19990066718A (en) Method and apparatus for providing and accessing data on internet sites
CA2615507A1 (en) Systems and methods for managing access to real estate content
US20040230562A1 (en) System and method of providing an online user with directory listing information about an entity
MX2010012304A (en) Encrypted banner overlays.
WO2000030005A1 (en) Electronic commerce search, retrieval and transaction system
JP2002055919A (en) Information processing apparatus and information processing method, service providing system, and recording medium
US8504829B2 (en) Certification system in network and method thereof
EP1198763A1 (en) System and method for controlling access to a communications medium
JP4663099B2 (en) System and method for performing authentication procedure of user of Web site and management of personal information by ASP device, ASP device
JP2002183493A (en) Intermediary method for property data in intermediary business using internet

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2000921898

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 2000921898

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 2000921898

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP