Monitoring application for automatically requesting content
First Claim
1. An article of manufacture including a non-transitory computer-readable storage medium having instructions stored thereon that, in response to execution by a computing device, cause the computing device to perform operations comprising:
- receiving a request for first data from a client computing device;
sending the first data, together with a monitoring application, to the client computing device in response to receiving the request, wherein the monitoring application is configured to automatically execute on the client computing device in response to display of the first data in a first user interface by the client computing device, and to generate a request for second data in response to determining that a defined trigger event has not occurred for at least a predetermined time period; and
sending the second data to the client computing device in response to receiving the request for the second data, wherein the second data is configured for display in a second user interface on the client computing device at least partially on top of the first user interface until the monitoring application detects input on the client computing device indicating that the first user interface should be redisplayed.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user'"'"'s activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer.
-
Citations
25 Claims
-
1. An article of manufacture including a non-transitory computer-readable storage medium having instructions stored thereon that, in response to execution by a computing device, cause the computing device to perform operations comprising:
-
receiving a request for first data from a client computing device; sending the first data, together with a monitoring application, to the client computing device in response to receiving the request, wherein the monitoring application is configured to automatically execute on the client computing device in response to display of the first data in a first user interface by the client computing device, and to generate a request for second data in response to determining that a defined trigger event has not occurred for at least a predetermined time period; and sending the second data to the client computing device in response to receiving the request for the second data, wherein the second data is configured for display in a second user interface on the client computing device at least partially on top of the first user interface until the monitoring application detects input on the client computing device indicating that the first user interface should be redisplayed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for transmitting data over a computer network, comprising:
-
a computing device configured to; receive, at the computing device, a request for first data from a client; in response to receiving the request, transmit to the client; the first data; and executable code configured to automatically execute in response to display of the first data by the client within a first user interface, to thereby detect occurrence of a defined trigger event associated with the first user interface on the client, to measure an amount of time from the occurrence of the defined trigger event, and to initiate a request for second data from the client, in response to the measured amount of time exceeding a defined threshold; receive the request for the second data from the client; and initiate transmission of the second data to the client in response to receiving the request for the second data, wherein the second data is configured for display in a second user interface on the client computing device at least partially on top of the first user interface. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of displaying information over a data network, wherein at least some of the method is performed by a suitably configured computing device having one or more processors, the method comprising:
-
receiving, at the computing device, first electronic content in response to a request for first electronic content; receiving a computer-implemented activity monitor at the computing device, the activity monitor configured to monitor at least a portion of open applications operating on the computing device and to detect a trigger event associated with a first user interface including the first electronic content; in response to detecting the trigger event, measuring an amount of time from the occurrence of the trigger event; and in response to determining that the measured amount of time exceeds a threshold time, transmitting a request for second electronic content and receiving the second electronic content at the computing device, wherein the second electronic content is configured for display on the client computing device at least partially on top of the first electronic content. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification