Passively attributing anonymous network events to their associated users
First Claim
1. A method for passively attributing an anonymous network event to an associated user, comprising:
- filtering network events occurring over a pre-determined time interval according to at least one of Internet Protocol (IP) address and event attribution type to generate a filtered event list; and
attributing the anonymous network event to a user associated with an event in said filtered event list, wherein said user maximizes an event attribution function.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and computer program products for passively attributing anonymous network events to their associated users are provided herein. Embodiments include filtering network events over a pre-determined time interval to generate a filtered event list. In an embodiment, event attribution includes attributing an anonymous network event to a user associated with a nearest-neighbor event relative to the anonymous network event. In another embodiment, event attribution includes attributing an anonymous network event to a user associated with an event in the filtered event list, wherein that user maximizes an event attribution function. In a further embodiment, event attribution includes determining a first potential attribution user for an anonymous network event based on a nearest-neighbor attribution approach; determining a second potential attribution user for the anonymous network event based on an event attribution function approach; and comparing the first and second potential attribution users to determine the attribution of the anonymous event.
41 Citations
25 Claims
-
1. A method for passively attributing an anonymous network event to an associated user, comprising:
-
filtering network events occurring over a pre-determined time interval according to at least one of Internet Protocol (IP) address and event attribution type to generate a filtered event list; and attributing the anonymous network event to a user associated with an event in said filtered event list, wherein said user maximizes an event attribution function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 19)
-
-
11. A method for passively attributing an anonymous network event to an associated user, comprising:
-
filtering network events occurring over a pre-determined time interval according to at least one of Internet Protocol (IP) address and event attribution type to generate a filtered event list; and attributing the anonymous network event to a user associated with a nearest-neighbor event relative to said anonymous network event in said filtered event list. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
20. A method for passively attributing an anonymous network event to an associated user, comprising:
-
filtering network events occurring over a pre-determined time interval according to at least one of Internet Protocol (IP) address and event attribution type to generate a filtered event list; determining a first potential attribution user in said filtered event list, wherein said first potential attribution user is associated with a nearest-neighbor event relative to said anonymous event in said filtered event list; determining a second potential attribution user in said filtered event list, wherein said second potential attribution user maximizes an event attribution function; and attributing the anonymous network event to the first or second potential attribution user when said first and second potential attribution users are the same user. - View Dependent Claims (21, 22)
-
-
23. A computer program product comprising a computer useable medium having computer program logic recorded thereon for enabling a processor to passively attribute an anonymous network event to an associated user, the computer program logic comprising:
-
filtering means for enabling a processor to filter network events occurring over a pre-determined time interval according to at least one of Internet Protocol (IP) address and event attribution type to generate a filtered event list; and attributing means for enabling a processor to attribute the anonymous network event to a user associated with an event in said filtered event list, wherein said user maximizes an event attribution function.
-
-
24. A computer program product comprising a computer useable medium having computer program logic recorded thereon for enabling a processor to passively attribute an anonymous network event to an associated user, the computer program logic comprising:
-
filtering means for enabling a processor to filter network events occurring over a pre-determined time interval according to at least one of Internet Protocol (IP) address and event attribution type to generate a filtered event list; and attributing means for enabling a processor to attribute the anonymous network event to a user associated with a nearest-neighbor event relative to said anonymous network event in said filtered event list.
-
-
25. A computer program product comprising a computer useable medium having computer program logic recorded thereon for enabling a processor to passively attribute an anonymous network event to an associated user, the computer program logic comprising:
-
filtering means for enabling a processor to filter network events occurring over a pre-determined time interval according to at least one of Internet Protocol (IP) address and event attribution type to generate a filtered event list; first determining means for enabling a processor to determine a first potential attribution user in said filtered event list, wherein said first potential attribution user is associated with a nearest-neighbor event relative to said anonymous event in said filtered event list; second determining means for enabling a processor to determine a second potential attribution user in said filtered event list, wherein said second potential attribution user maximizes an event attribution function; and attributing means for enabling a processor to attribute the anonymous network event to the first or second potential attribution user when said first and second potential attribution users are the same user.
-
Specification