Analyzing user-activity data using a heuristic-based approach
First Claim
1. A method, comprising:
- receiving user-activity data, the user-activity data comprising one or more network-access requests;
comparing a selected network-access request from the user-activity data to one or more known non-user-initiated network-access requests; and
designating the selected network-access request as being a user-initiated network-access request based at least in part on the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus, and systems for analyzing user-activity data are disclosed. In one disclosed embodiment, for example, two or more data streams of low-level, user-activity data are detected at a computer workstation via two or more respective sensors. The two or more respective sensors may comprise a first sensor configured to detect network-access requests and a second sensor configured to detect at least one of the following events: file-activity events, window-title-change events, or user-interface events. Targeted user activity is identified from at least one of the data streams. The targeted user activity can comprise, for example, a user initiating a network access; performing a search on a search engine; creating, opening, or modifying a file; or initiating a network access that causes a window title to change. Computer-readable media containing computer-executable instructions for causing a computer system to perform any of the described methods or for storing lists created or modified by any of the disclosed methods are also disclosed.
-
Citations
56 Claims
-
1. A method, comprising:
-
receiving user-activity data, the user-activity data comprising one or more network-access requests;
comparing a selected network-access request from the user-activity data to one or more known non-user-initiated network-access requests; and
designating the selected network-access request as being a user-initiated network-access request based at least in part on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
receiving data indicating activity at a computer workstation, wherein the data comprises entries indicative of network-access requests from the computer workstation, wherein the network-access requests comprise both user-initiated network-access requests and non-user-initiated network-access requests; and
via the data indicating activity at the computer workstation, designating one or more of the network-access requests as user-initiated network-access requests. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A method, comprising:
-
receiving user-activity data, the user-activity data comprising one or more network-access requests;
comparing a selected network-access request from the user-activity data to known search-engine-query addresses;
identifying the selected network-access request as being a search-engine query by matching the selected network-access request to one of the known search-engine-query addresses; and
identifying a user query to the search engine from the selected network-access request. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. A method, comprising:
-
receiving user-activity data, the user-activity data comprising one or more file-activity events, each file-activity event being indicative of a respective file that was accessed by a computer workstation and a process that accessed the respective file on the computer workstation;
clustering two or more of the file-activity events together, the two or more file-activity events involving a common file accessed by a common process, the two or more file-activity events occurring within respective time intervals from one another; and
classifying the clustered file-activity events as being representative of a targeted file action. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A method, comprising:
-
monitoring network-access requests from a computer workstation and network responses to the network-access requests;
identifying a network response that directs the computer workstation to perform a window title change, the identified network response being received in response to a corresponding network-access request;
determining that a window on the computer workstation changed as a result of the identified network response; and
associating the window with the corresponding network-access request. - View Dependent Claims (41, 42, 43, 44, 45, 46)
-
-
47. A method for analyzing user-activity data, comprising:
-
detecting two or more data streams of low-level, user-activity data at a computer workstation via two or more respective sensors, the two or more respective sensors comprising at least a first sensor configured to detect network-access requests and a second sensor configured to detect at least one of file-activity events, window-title-change events, or user-interface events at the computer workstation;
identifying targeted user activity from at least one of the data streams;
storingthe targeted user activity; and
disregarding a remainder of the at least one of the data streams from which the targeted user activity is identified. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56)
-
Specification