Method and system for controlling and auditing content/service systems
First Claim
1. A method of controlling a financial transaction between a receiver and a content provider occurring over a network operated by a network operator, wherein said content provider offers enhanced content programming relating to the financial transaction, the method comprising the steps of:
- intercepting a user request for the enhanced content programming, said user request originating in the receiver, wherein said intercepting step is performed by a third party;
permitting the enhanced content programming to be provided to the receiver over the network in response to the user request only if the content provider is an authorized content provider of the third party and preventing the transmission of content to said user if said content provider is unauthorized, wherein said permitting step is performed by said third party;
storing information relating to the enhanced content programming provided to the receiver in response to the user request, wherein said storing step is performed by said third party, wherein said third party is not a content provider itself for said user request; and
determining if the content provider is authorized by the network operator to offer enhanced content programming over the network, wherein said request for said content is intercepted by said third party and rerouted by said third party to said authorized content provider for said enhanced content programming if said user request was directed to said unauthorized content provider.
6 Assignments
0 Petitions
Accused Products
Abstract
An improved interactive network system is provided that allows the Network Operator to control the transfer of information to and from the network end users, the system preferably using triggers or markers embedded within the programming broadcast to users via the network. As a consequence of this system, the Network Operator is able to efficiently garner revenues from third parties transacting business over the network and to control the look and feel of programming offered to network users. Additionally the system can be used as a means of limiting network access, filtering programming, providing on-screen graphics or audible signals for particular programming types or providers, bookmarking programming, profiling network users, targeting advertising, and simplifying network transactions.
-
Citations
30 Claims
-
1. A method of controlling a financial transaction between a receiver and a content provider occurring over a network operated by a network operator, wherein said content provider offers enhanced content programming relating to the financial transaction, the method comprising the steps of:
-
intercepting a user request for the enhanced content programming, said user request originating in the receiver, wherein said intercepting step is performed by a third party; permitting the enhanced content programming to be provided to the receiver over the network in response to the user request only if the content provider is an authorized content provider of the third party and preventing the transmission of content to said user if said content provider is unauthorized, wherein said permitting step is performed by said third party; storing information relating to the enhanced content programming provided to the receiver in response to the user request, wherein said storing step is performed by said third party, wherein said third party is not a content provider itself for said user request; and determining if the content provider is authorized by the network operator to offer enhanced content programming over the network, wherein said request for said content is intercepted by said third party and rerouted by said third party to said authorized content provider for said enhanced content programming if said user request was directed to said unauthorized content provider.
-
-
2. A method for monitoring a network transaction between a user receiver and a content provider, the method comprising the steps of:
-
intercepting a user request directed at the content provider by the user receiver, wherein said intercepting is performed by a third party; appending additional parameters to said user request;
directing said appended user request to the content provider if the content provider is authorized to provide enhanced content programming to the user receiver and performing at least one of the following steps if the content provider is unauthorized;terminating the network transaction between the user receiver and the content provider if the content provider is unauthorized, and forwarding said appended user request to a substitute content provider if the content provider is unauthorized; otherwise if the content provider is authorized intercepting a user request response directed at the user receiver by the content provider, wherein said user request response comprises at least a portion of the network transaction and said intercepting is performed by said third party; extracting information from said intercepted user request response; forwarding said user request response by said third party to the user receiver; and determining if the content provider is authorized by the network operator to offer enhanced content programming over the network, wherein said request for said content is intercepted by said third party and rerouted by said third party to said authorized content provider for said enhanced content programming if said user request was directed to said unauthorized content provider. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of controlling a network transaction, the method comprising the steps of:
-
directing enhanced broadcast information via a network to a plurality of receivers wherein said network is controlled by a network operator, and wherein at least a portion of said enhanced broadcast information is provided by at least one content operator; detecting triggers within said portion of said enhanced broadcast information provided by said at least one content provider, wherein said detecting step is performed by a third party; intercepting by said third party a user request directed at said at least one content provider from a receiver of said plurality of receivers coupled to said network; directing said intercepted user request to a third party controller; appending third party parameters to said intercepted user request; directing said appended user request to said at least one content provider if said at least one content provider is authorized and redirecting said user request to an authorized content provider if it is determined that said at least one content provider is not authorized; appending third party markers to a response to said appended user request, wherein said appending step is performed by said at least one content provider;
directing said appended response to said receiver;detecting by said third party controller said third party markers appended to said response; storing transaction information provided by said at least one content provider in said response, wherein said storing step is controlled by said third party controller; and determining if the content provider is authorized by the network operator to offer enhanced content programming over the network, wherein said request for said content is intercepted by said third party and rerouted by said third party to said authorized content provider for said enhanced content programming if said user request was directed to said unauthorized content provider. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification