Price mining prevention systems and related methods
First Claim
1. A non-transitory computer-readable medium storing computer-executable instructions for preventing an unwanted access source from mining pricing information on an online retail website by:
- detecting, by one or more computer processors, an access to a particular web page containing pricing information;
determining, by one or more computer processors, whether a source of the access is an individual employed by one or more competitors of a company that owns the particular web page being accessed; and
at least partially in response to determining that the individual is employed by one or more competitors of a company that owns the particular web page being assessed, taking, by one or more computer processors, one or more defensive actions against the source of the access, wherein the one or more defensive actions comprise automatically blocking, by a processor, the source of the access from further access to the particular web page.
1 Assignment
0 Petitions
Accused Products
Abstract
A price-mining prevention system, in various embodiments, is configured for: (A) detecting an access to a particular web page containing pricing information; (B) determining whether a source of the access is an individual employed by one or more competitors of a company that owns the particular web page being accessed; and (C) at least partially in response to determining that the individual is employed by one or more competitors of a company that owns the particular web page being assessed, taking one or more defensive actions against the source of the access. The step of determining whether the individual is employed by a competitor of the company may comprise scanning a post made on one or more public message boards to determine, based on the content of the post, whether the message board poster is employed by a competitor of a company that owns the particular web page.
-
Citations
26 Claims
-
1. A non-transitory computer-readable medium storing computer-executable instructions for preventing an unwanted access source from mining pricing information on an online retail website by:
-
detecting, by one or more computer processors, an access to a particular web page containing pricing information; determining, by one or more computer processors, whether a source of the access is an individual employed by one or more competitors of a company that owns the particular web page being accessed; and at least partially in response to determining that the individual is employed by one or more competitors of a company that owns the particular web page being assessed, taking, by one or more computer processors, one or more defensive actions against the source of the access, wherein the one or more defensive actions comprise automatically blocking, by a processor, the source of the access from further access to the particular web page. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 22)
-
-
2. A non-transitory computer-readable medium storing computer-executable instructions for preventing an unwanted access source from mining pricing information on an online retail website by:
-
detecting, by one or more computer processors, an access to a particular web page containing pricing information; determining, by one or more computer processors, whether a source of the access is an individual employed by one or more competitors of a company that owns the particular web page being accessed; and at least partially in response to determining that the individual is employed by one or more competitors of a company that owns the particular web page being assessed, taking, by one or more computer processors, one or more defensive actions against the source of the access, wherein the one or more defensive actions comprise requiring the source of the access to complete one or more CAPTCHAs. - View Dependent Claims (3, 23, 24)
-
-
4. A non-transitory computer-readable medium storing computer-executable instructions for preventing an unwanted access source from mining pricing information on an online retail website by:
-
detecting, by one or more computer processors, an access to a particular web page containing pricing information; determining, by one or more computer processors, whether a source of the access is an individual employed by one or more competitors of a company that owns the particular web page being accessed; and at least partially in response to determining that the individual is employed by one or more competitors of a company that owns the particular web page being assessed, taking, by one or more computer processors, one or more defensive actions against the source of the access, wherein taking one or more defensive actions comprises limiting a number of accesses to the particular web page by the source to between 1 and 10 accesses in a 24 hour period. - View Dependent Claims (25, 26)
-
-
12. A computer-implemented method for preventing an unwanted access source from mining pricing information on an online retail website, the computer-implemented method comprising the steps of:
-
detecting, by one or more computer processors, an access to a particular web page containing pricing information; determining, by one or more computer processors, whether a source of the access is an individual that is employed by one or more competitors of a company that owns the particular web page being accessed; determining, by one or more computer processors, a job title of the individual; determining, by one or more computer processors, based on the job title, that the individual should be prohibited from obtaining pricing information from the online retail website; and
in response to determining that the individual should be prohibited from obtaining pricing information from the online retail website, taking, by a processor, one or more defensive actions against the source of the access, wherein the one or more defensive actions comprise automatically blocking, by a processor, the source of the access from further access to the particular web page. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
13. A computer-implemented method for preventing an unwanted access source from mining pricing information on an online retail website, the computer-implemented method comprising the steps of:
-
detecting, by one or more computer processors, an access to a particular web page containing pricing information; determining, by one or more computer processors, whether a source of the access is an individual that is employed by one or more competitors of a company that owns the particular web page being accessed; determining, by one or more computer processors, a job title of the individual; determining, by one or more computer processors, based on the job title, that the individual should be prohibited from obtaining pricing information from the online retail website; and in response to determining that the individual should be prohibited from obtaining pricing information from the online retail website, taking, by a processor, one or more defensive actions against the source of the access, wherein the one or more defensive actions comprise requiring the source of the access to complete one or more CAPTCHAs. - View Dependent Claims (14)
-
Specification