System and method for providing anonymous personalized browsing by a proxy system in a network
First Claim
1. A central proxy system for coupling to a network and for allowing users to browse server sites on said network anonymously via said central proxy system, said central proxy system comprising:
- a computer-executable first routine that processes site-specific substitute identifiers constructed from non-masked data specific to said users, such that said server sites are unable to determine an identity of said user;
a computer-executable second routine that transmits said substitute identifiers to said server sites and thereafter retransmits browsing commands received from said users to said server sites; and
a computer-executable third routine that removes portions of said browsing commands that would identify said users to said server sites.
5 Assignments
0 Petitions
Accused Products
Abstract
For use with a network having server sites capable of being browsed by users based on identifiers received into the server sites and personal to the users, alternative proxy systems for providing substitute identifiers to the server sites that allow the users to browse the server sites anonymously via the proxy system. A central proxy system includes computer-executable routines that process site-specific substitute identifiers constructed from data specific to the users, that transmits the substitute identifiers to the server sites, that retransmits browsing commands received from the users to the server sites, and that removes portions of the browsing commands that would identify the users to the server sites. The foregoing functionality is performed consistently by the central proxy system during subsequent visits to a given server site as the same site specific substitute identifiers are reused. Consistent use of the site specific substitute identifiers enables the server site to recognize a returning user and, possibly, provide personalized service.
986 Citations
55 Claims
-
1. A central proxy system for coupling to a network and for allowing users to browse server sites on said network anonymously via said central proxy system, said central proxy system comprising:
-
a computer-executable first routine that processes site-specific substitute identifiers constructed from non-masked data specific to said users, such that said server sites are unable to determine an identity of said user; a computer-executable second routine that transmits said substitute identifiers to said server sites and thereafter retransmits browsing commands received from said users to said server sites; and a computer-executable third routine that removes portions of said browsing commands that would identify said users to said server sites. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A peripheral proxy system for coupling to a network and for allowing at least one user to browse a server site on said network anonymously via a central proxy system, said peripheral proxy system comprising:
-
a computer-executable first routine that constructs a particular substitute identifier from non-masked data received from a particular user, such that said server site is unable to determine an identity of said user; and a computer-executable second routine that transmits said particular substitute identifier to said central proxy system, said central proxy system retransmitting said particular substitute identifier to said server site and thereafter retransmitting browsing commands received from said particular user to said server site. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A method for use with a network having a server site capable of being browsed by users and for allowing said users to browse said server site on said network anonymously via said proxy system, said method comprising the steps of:
-
constructing a particular substitute identifier from non-masked data received from a particular user, such that said server site is unable to determine an identity of said user; transmitting said particular substitute identifier to said server site; and thereafter retransmitting browsing commands received from said particular user to said server site. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55)
-
Specification