System, apparatus and method for presenting and displaying content on a wide area network
First Claim
1. A system for presenting unsolicited data over a wide area network to a user, wherein the user operates a browser in a user computer connected to the wide area network, the system comprising:
- a server computer adapted for connecting to the wide area network;
content data for presentation in a web-browser window on the user computer, wherein the web-browser window is a stand-alone application operating on the user computer and is adapted to be displayed on a desktop of the user computer when activated, and the content data is stored in a memory of the server computer;
a monitoring application in a memory of the server computer, the monitoring application configured to be sent to the user with content data requested by the user, to be linked to at least the web-browser window such that the monitoring application is closed when the web-browser window is closed, and to automatically execute on the user computer after being received by the user, the monitoring application comprising instructions for monitoring browser activity of the user;
a server application in a memory of the server computer, the server application comprising instructions for receiving a request for the content data from the user, sending the content data to the user computer, and sending the monitoring application with the content data to the user computer; and
unsolicited data for presentation to the user operating the user computer, the unsolicited data stored in a memory of the server computer;
wherein the server application further comprises instructions for receiving a request for the unsolicited data over the wide area network and for sending the unsolicited data to the computer of the user of the wide area network;
wherein the request for unsolicited data is generated by the monitoring application on the user computer and the unsolicited data is presented to the user operating the user computer only after a discontinuation of use by the user of the web-browser window presenting the content data for a predetermined period of time;
wherein the unsolicited data is presented to the user by the web-browser window presenting the content data; and
wherein the unsolicited data remains on the web-browser window after a continuation of use by the user of the web-browser window.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user'"'"'s activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer.
123 Citations
20 Claims
-
1. A system for presenting unsolicited data over a wide area network to a user, wherein the user operates a browser in a user computer connected to the wide area network, the system comprising:
-
a server computer adapted for connecting to the wide area network;
content data for presentation in a web-browser window on the user computer, wherein the web-browser window is a stand-alone application operating on the user computer and is adapted to be displayed on a desktop of the user computer when activated, and the content data is stored in a memory of the server computer;
a monitoring application in a memory of the server computer, the monitoring application configured to be sent to the user with content data requested by the user, to be linked to at least the web-browser window such that the monitoring application is closed when the web-browser window is closed, and to automatically execute on the user computer after being received by the user, the monitoring application comprising instructions for monitoring browser activity of the user;
a server application in a memory of the server computer, the server application comprising instructions for receiving a request for the content data from the user, sending the content data to the user computer, and sending the monitoring application with the content data to the user computer; and
unsolicited data for presentation to the user operating the user computer, the unsolicited data stored in a memory of the server computer;
wherein the server application further comprises instructions for receiving a request for the unsolicited data over the wide area network and for sending the unsolicited data to the computer of the user of the wide area network;
wherein the request for unsolicited data is generated by the monitoring application on the user computer and the unsolicited data is presented to the user operating the user computer only after a discontinuation of use by the user of the web-browser window presenting the content data for a predetermined period of time;
wherein the unsolicited data is presented to the user by the web-browser window presenting the content data; and
wherein the unsolicited data remains on the web-browser window after a continuation of use by the user of the web-browser window. - View Dependent Claims (2, 3, 4, 5, 6, 7)
instructions for detecting occurrence of a first trigger event performed by the user;
instructions for detecting occurrence of a second trigger event performed by the user;
instructions for measuring an amount of time from the occurrence of the first trigger event; and
instructions for comparing the amount of time measured with a predetermined amount of time.
-
-
4. The system of claim 3, wherein the monitoring application further comprises instructions for presenting the unsolicited data to the user operating the user computer if the amount of time measured is greater than the predetermined amount of time.
-
5. The system of claim 3, wherein the monitoring application further comprises instructions for resetting the amount of time measured if the amount of time measured at the occurrence of the second trigger event is not greater than the predetermined amount of time.
-
6. The system of claim 3, wherein the second trigger event is not an unload event.
-
7. The system of claim 3, wherein the monitoring application further comprises:
-
instructions for presenting the unsolicited data to the user operating the user computer if the amount of time measured is greater than the predetermined amount of time; and
instructions for resetting the amount of time measured if the amount of time measured at the occurrence of the second trigger event is not greater than the predetermined amount of time.
-
-
8. A system for presenting unsolicited data over a wide area network to a user, wherein the user operates a browser in a user computer connected to the wide area network, the system comprising:
-
a server computer adapted for connecting to the wide area network;
first content data for presentation in a first web-browser window on the user computer, the first content data stored in a memory of the server computer;
second content data for presentation in a second web-browser window on the user computer, wherein the first and second web-browser windows are applications operating on the user computer and are adapted to be displayed on a desktop of the user computer when activated;
a monitoring application in a memory of the server computer, the monitoring application configured to be sent to the user with the first content data requested by the user, to be linked to at least one of the first and second web-browser windows such that the monitoring application is closed when the at least one of the first and second web-browser windows is closed, and to automatically execute on the user computer after being received by the user, the monitoring application comprising instructions for monitoring browser activity of the user;
a server application in a memory of the server computer, the server application comprising instructions for receiving a request for the first content data from the user, sending the first content data to the user computer, and sending the monitoring application with the first content data to the user computer for presentation in the first web-browser window; and
unsolicited data for presentation to the user operating the user computer, the unsolicited data stored in a memory of the server computer;
wherein the server application further comprises instructions for receiving a request for the unsolicited data over the wide area network and for sending the unsolicited data to the computer of the user of the wide area network;
wherein the monitoring application further comprises (1) instructions for detecting occurrence of a first trigger event performed by the user, (2) instructions for detecting occurrence of a second trigger event performed by the user, (3) a timer for measuring an amount of time from the occurrence of the first trigger event and (4) instructions for comparing the amount of time measured with a predetermined amount of time; and
wherein the request for unsolicited data is generated by the monitoring application on the user computer only if the amount of time measured is greater than the predetermined amount of time. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for presenting unsolicited data over a wide area network to a user, wherein the user is operating a browser in a computer connected to the wide area network, the method comprising the steps of:
-
receiving a first request for first user-requested data from the user over the wide area network, wherein the first user-requested data is for presentation in a first web-browser window;
receiving a second request for second user-requested data from the user over the wide area network, wherein the second user-requested data is for presentation in a second web-browser window, wherein the first and second web-browser windows are applications operating on the user computer and are adapted to be displayed on a desktop of the user computer when activated;
sending the first and second user-requested data to the user over the wide area network;
sending program instructions for monitoring browser activity of the user to the user with the first user-requested data;
receiving a request for the unsolicited data over the wide area network, wherein the request for unsolicited data is generated by the program instructions; and
sending the unsolicited data to the computer of the user of the wide area network;
wherein the program instructions are configured to automatically execute after being received by the user and linked to at least one of the first and second web-browser windows such that execution of the program instructions is terminated if the at least one of the first and second web-browser windows is closed;
wherein the program instructions perform the steps of (1) detecting occurrence of a first trigger event performed by the user, (2) detecting occurrence of a second trigger event performed by the user, (3) measuring an amount of time from the occurrence of the first trigger event, (4) comparing the amount of time measured with a predetermined amount of time, (5) requesting the unsolicited data and presenting the unsolicited data to the user operating the browser only if the amount of time measured is greater than the predetermined amount of time, and (6) resetting the amount of time measured if the amount of time measured at the occurrence of the second trigger event is not greater than the predetermined amount of time; and
wherein the first trigger event comprises one of a discontinuation of use by the user of the first web-browser window presenting the first user-requested data and a discontinuation of use by the user of the second web-browser window presenting the second user-requested data; and
wherein the unsolicited data remains presented to the user after a continuation of use by the user of the first web-browser window and the second web-browser window. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification