Identifying spurious requests for information
First Claim
1. A computer-implemented method of identifying illegitimate requests for information, comprising:
- associating a first carrier with an electronic promotional item;
receiving a request relating to the electronic promotional item from a second carrier; and
identifying the request as illegitimate if the first carrier is different than the second carrier.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method of identifying illegitimate requests for information may include associating a first carrier with an electronic promotional item, receiving a request relating to the electronic promotional item from a second carrier, and identifying the request as illegitimate if the first carrier is different than the second carrier. The computer-implemented method may further include transmitting the electronic promotional item to the first carrier. The request may be a response to the electronic promotional item. In some embodiments, the electronic promotional item may be a link to more information about the electronic promotional item. The computer-implemented method may further include logging the request in a database and charging an ad sponsor for the request in the second database. In some embodiments, a charge may be canceled for the request if the request is identified as illegitimate.
41 Citations
20 Claims
-
1. A computer-implemented method of identifying illegitimate requests for information, comprising:
-
associating a first carrier with an electronic promotional item;
receiving a request relating to the electronic promotional item from a second carrier; and
identifying the request as illegitimate if the first carrier is different than the second carrier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for identifying spurious requests for information, comprising:
-
an interface that receives digital responses to promotional items from users, the digital responses including identifying information for carriers that transmit the responses to the interface; and
a response filter that compares identifying information for a carrier to which the promotional item was sent, with the identifying information for a carrier from which the response was received to determine whether the response is spurious. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for identifying illegitimate requests for information, comprising:
-
an interface that receives digital responses to promotional items from users, the digital responses including identifying information for carriers that carry the responses; and
means for determining responses to be illegitimate if the carrier-identifying information associated with the responses does not match carrier-identifying information associated with the promotional items. - View Dependent Claims (19, 20)
-
Specification