WO2001001275A1 - Browsing method for focusing research - Google Patents

Browsing method for focusing research Download PDF

Info

Publication number
WO2001001275A1
WO2001001275A1 PCT/US2000/017409 US0017409W WO0101275A1 WO 2001001275 A1 WO2001001275 A1 WO 2001001275A1 US 0017409 W US0017409 W US 0017409W WO 0101275 A1 WO0101275 A1 WO 0101275A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
project
research
url
project name
Prior art date
Application number
PCT/US2000/017409
Other languages
French (fr)
Inventor
John B. Moetteli
Original Assignee
Missiontrek Ltd. Co.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Missiontrek Ltd. Co. filed Critical Missiontrek Ltd. Co.
Priority to CA002377303A priority Critical patent/CA2377303A1/en
Priority to IL14723900A priority patent/IL147239A0/en
Priority to AU63376/00A priority patent/AU780165B2/en
Priority to EP00950248A priority patent/EP1208451A4/en
Publication of WO2001001275A1 publication Critical patent/WO2001001275A1/en
Priority to US09/951,572 priority patent/US7249315B2/en
Priority to US10/032,405 priority patent/US20020091836A1/en
Priority to US10/631,713 priority patent/US20040030575A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/954Navigation, e.g. using categorised browsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9562Bookmark management

Definitions

  • This invention relates to a method and system of viewing resources on a network and, more particularly, to a browsing method and system for inputting navigational instructions in a multi-server computer environment such as the "Internet”.
  • HTTP Hypertext Transfer Protocol
  • HTML Hypertext Markup Language
  • HTML is the standard page description language used with HTTP and provides basts document formatting. HTML allows a web page developer to specify these hypertext links to other servers and to other files.
  • a user using an HTML-compliant browser may specify a link via a Uniform Resource Locator ("URL").
  • URL Uniform Resource Locator
  • TCP/IP transmission control protocol/Interface protocol
  • XML is a substitute for HTML.
  • PROWLER Information available at http://www.webkeys.com/aboutwk.htm
  • PROWLER Access to certain catego ⁇ es of websites (i.e., "All age”, “Under 14, “Teenagers”, “Adult content”, and “Explicit violence/sexual content”) is granted or denied based on privileges that are determined by a system administrator. Further, a navigation history, associated with the user, is saved for administrative censoring purposes.
  • web resources such as "WESTLAW” and "LEXIS-NEXIS” provide Internet portals or web pages that require login by ID and password (i.e., subscriber sites) in order to gain access.
  • ID and password i.e., subscriber sites
  • a client matter number may be input, which, optionally, is checked against a database of the user's client matter numbers, to confirm accuracy.
  • the user may leave these subscriber sites and do other task/research on the Internet that is not attributed to the client matter number.
  • a method and system which provides a graphical interface with which a user may interact which hinders random movement of a download request on the Internet from one server to another server, measures user performance, and helps ensure directed movement of a download request, relevant to a given project goal, thus better allocating human resources, minimizing online time and facilitating and promoting concentrated research directed to one particular project at a time.
  • a browsing method is needed which minimizes the number of unnecessary or irrelevant research sessions, these sessions often representing unproductive diversions from project or business objectives and which permits secure posting of information on publicly accessible servers on the Internet or on an intranet.
  • a browsing method and system are provided which solve the problems identified above by enabling concentrated web browsing through encouraging or directing the user's concentration to one project at a time.
  • the browsing method is encoded on a computer readable and executable medium on a computer, such as a PC, a diskette, a server on the Internet, or the Internet itself.
  • the software uses a custom Graphical User Interface ("GUI") having input fields that demand certain user responses and which enable and encourage the user to postpone executing a potentially unrelated line of research until such time as the project at hand is terminated.
  • GUI Graphical User Interface
  • a user may be able to take advantage of interesting targeted banner promotions or follow potentially interesting hypertext links at a time convenient to the project at hand and attributable to the project for which the potentially interesting research may yield a benefit.
  • an object of the invention is to dramatically improve the management and efficiency of web browsing as a tool to reach predetermined business goals. This is accomplished by attributing online time to a project name, focusing research on the project at hand, allowing the time-shifting of less directed research sessions and quantifying and allocating wasteful online time to the responsible parties.
  • the method and system provide a convenient means to post and access information on publicly accessible servers on the Internet (or an intranet) in a secure manner
  • FIG. 1 is a block diagram of a system of the invention.
  • FIG. 2 is a block diagram of an alternate system of the invention.
  • FIG. 3 is a block diagram of a client/server architecture of the present invention.
  • FIG. 4 is a detailed diagram of a client server architecture of the present invention.
  • FIG. 5 is a relational UML class diagram of the method.
  • FIG. 6 is a flow chart of the method of the invention.
  • FIG. 7 is a plan view of a login window used in the invention.
  • FIG. 8 is an authorization table used in the invention.
  • FIG. 9 is a log-off window of the invention.
  • FIG. 10 is a table showing the URL listings associated with the project names of the invention.
  • FIG. 11 is a table of Temporary Bookmark Listings of the invention.
  • FIG. 12 is a flow chart of an off-line URL organization step of the invention.
  • FIG. 13 is a Graphical User Interface ("GUI”) of the invention
  • FIG. 14A is a flow chart of a submethod of the invention which executes upon activation of a link.
  • FIG. 14B is a flow chart of an alternate submethod to that shown in FIG. 14A.
  • FIG. 15 is a secondary window of the invention.
  • FIG. 16 is a UML class diagram of a system administration module of the invention
  • FIG. 17 is a flow diagram of a submethod of the invention.
  • FIG. 18 is a flow diagram of a logout submethod of the invention.
  • FIG. 19 is a diagram of the layout of a GUI of the invention which enables a user to sequentially follow a navigation history created by another.
  • FIG. 20 is a flowchart of a submethod of the invention for activating forward and back icons which navigate sequentially between content saved under a project name.
  • FIG. 21 is a flowchart of a submethod of the invention operating on a server that scans and updates the bookmarks and other content on a browser when the server is accessed.
  • FIG. 1 is a block diagram of a typical system 20 for practicing the va ⁇ ous embodiments of the present invention
  • the client browsing method 60 of the present invention is encoded on a computer-readable medium and manages access by users using a computer system 20 to a network of servers 54 and 54'(shown in FIG. 2) such as the Internet.
  • a computer system 20 typically includes a computer 22, a display device 24, an input device 26 such as a keyboard, a primary storage device 30, a secondary storage device 32 and a plurality of resources 23.
  • Each resource 23 is operatively coupled to at least one of the computers 22.
  • Resources 23 include, but are not limited to, printers, databases, special-purpose servers, secu ⁇ ty devices, modems, etc.
  • the display device 24 displays a graphical user interface ("GUI") 34 for facilitating the display of text and graphics for the user.
  • GUI graphical user interface
  • Display devices 24 include p ⁇ nters and computer display screens such as a CRT, LED displays, and LCDs.
  • Input devices 26 are numerous and include keyboards and pointing devices such as a mouse 27 having a left mouse button 28 and a right mouse button 29, a trackball, hghtpens, thumbwheels, digitizing tablets, microphones using voice recognition software, and touch screens and pads.
  • the computer 22 includes a CPU 36 as well as other components with which all who are skilled in the art are familiar. For a detailed discussion of these components and their interaction, see U.S Pat. No. 5,787,254, the content of which is incorporated by reference.
  • the secondary storage 32 supports the browsing method 60, preferably HTTP-compliant, as well as a number of Internet access tools
  • the secondary storage 32 may also support other Internet services including mail transfer protocol (SMTP), e- mail, file transfer protocol (“FTP”), network transfer protocol (“NNTP”) or "usenet” and remote terminal access (Telnet)
  • the CPU 36 fetches computer instructions from primary storage 30 through an interface 40 such as an input output subsystem connected to a bus 42.
  • the computer 22 can be, but is not limited to , an "IBM APTIVA” computer, a product of International Business Machines Corporation of Armonk, New York, or any computer compatible with the IBM PC computer systems based on the X86 or Pent ⁇ um(TM) series processor of Intel Corporation or compatible processors, or any of the "SPARC" station or "ULTRA” workstation computer systems available from Sun Microsystems, Inc. of Mountain View, California, any "MACINTOSH” computer systems based on a "POWERPC” processor and available from Apple Computer, Inc. of Cupertino, California.
  • the CPU 36 utilizes an operating system which, depending on the hardware used, may be DOS, "WINDOWS 3.X”, “WINDOWS 95", “NT”, “OS/2”, “AIX”, “LINUX”, or any other suitable operating system.
  • the CPU 36 executes these fetched computer instructions. Executing these instructions enables the CPU 36 to retrieve data or write data to the primary storage 30, display information on one or more display devices 24, receive command signals from one or more input devices 26, or transfer data to secondary storage 32 or even other computer systems which collectively form a computer network 25 (shown in FIG. 2).
  • primary storage 30 and secondary storage 32 can include any type of computer storage including RAM, ROM, application specific integrated circuits ("ASIC") and storage devices which include magnetic and optical storage media such as a CD-ROM.
  • the primary storage 30 stores a number of items including the method 60 and a runtime environment 46.
  • the runtime environment 46 typically is an operating system which manages computer resources, such as memory, disk or processor time, required for the method of the invention to run.
  • the runtime environment 46 may also be a message passing system, a microkernel, dynamic loadable linkable module(s), or any other system which manages computer resources
  • the system 21 includes client computers 22 arranged in a network 25 and a firewall 27 which interfaces with an online service provider 28 such as CompuServe, America Online, a subsc ⁇ ption resource (such as "WESTLAW”) and/or an Internet access provider 29.
  • the online service provider 28 and Internet access provider 29 connect to a network 31 of servers 54 which comprise a portion of the Internet.
  • FIG. 3 illustrates a block diagram of a client/server architecture which can be utilized in accordance with the method 60 of the present invention.
  • User requests 50 for information are sent by a client application program 52 to a server 54.
  • the server 54 can be a remote computer system accessible over the Internet or other communications medium.
  • Client application program 52 may be utilized with computer 22 of FIG. 1.
  • Server 54 performs scanning and searching of raw (e.g., unprocessed) information sources (e.g., newswire feeds or newsgroups) and, based upon these user requests, presents the filtered electronic information as server responses 56 to the client process.
  • raw information sources e.g., newswire feeds or newsgroups
  • FIG 4 illustrates a detailed block diagram of a client/server architecture which can be utilized in accordance with the method 60 of the present invention.
  • client 52 and server 54 are processes which are operative within two computer systems, these processes being generated from a high-level programming language (e.g. PERL), which is interpreted and executed in a computer system 20 at runtime (e.g., a workstation), it can be appreciated by one skilled in the art that they may be implemented in a variety of hardware devices, either programmed or dedicated.
  • Client 52 and server 54 communicate using the functionality provided by an HTTP connection 72.
  • the World Wide Web includes all the servers adhering to this standard which are accessible to clients via Uniform Resource Locators ("URLs").
  • URLs Uniform Resource Locators
  • Active within the client 52 is the browser method 60 of the present invention, which establishes the connections with the server 54 and presents information to the user.
  • Server 54 executes the corresponding server software which presents information to the client in the form of HTTP server responses 62.
  • the HTTP responses 62 correspond with web pages represented using HTML or other data which is generated by the server.
  • a web page contains data and a layout language which describes how data should be displayed.
  • the layout language used within each web page is predominantly HTML, but may also include "JAVA”, "JAVASCRIPT", VRML, or any other language which supports hypertext functionality 64.
  • the user views a web page (e.g., 152 of FIG. 13) from the World Wide Web using the browsing method 60 of the present invention.
  • the browsing method 60 accepts the data and the layout language and in response, produces a graphical image containing hypertext links along with text, graphics, and various other types of multimedia.
  • the tools needed to implement the browsing method 60 are known in the p ⁇ or art (e.g., see background section).
  • a Common Gateway Interface (“CGI") 66 is provided which allows the client program to direct server 54 to commence execution of a specified program contained within server 54. This may include a search engine which scans received information in the server for presentation to the user controlling the client. Using this interface and the HTTP responses 62, the server 54 may notify the client 52 of the results of that execution upon completion of the program steps.
  • CGI Common Gateway Interface
  • HTTP is a stateless protocol
  • every user request 50 for information from the server 54 is treated independently, with the server having no memory of previous connections. This statelessness results in the rapid and efficient transmission of hypertext documents (e.g., the web page 152 of FIG. 13).
  • connection 72 There are four states to a HTTP connection 72.
  • the connection 72 is opened. This means that contact is made between the client computer 52 and server 54 at the Internet address and port number specified by the URL.
  • the client 52 sends a message to the server 54, requesting service.
  • This user request 50 is made up of HTTP request headers that define the "method" requested for the transaction and provide information about the capabilities of the client 52, followed by the sending of the data to the server 54.
  • Typical HTTP methods are GET, for getting an object from a server 54, or POST, for posting data to an object on the server.
  • the server 54 sends a response to the client 52. This consists of response headers describing the state of the transaction, followed by the actual data.
  • the connection 72 is closed.
  • the relational database 53 is a client-server type 53b
  • the advantage of use of a client-server database 53b and access system is that processing on the database server 54'does not affect processing on the client 52.
  • Either type of database 53a or 53b may be defined and managed by "PARADOX" software, by Borland International, Inc., of Scotts Valley, CA..
  • PARADOX for DOS is a relational database that has features required for storing, viewing, printing, changing, sorting and finding data in tables such as Table 7.
  • PARADOX has a character user interface (CUI), supports a mouse and WINDOWS in that environment, and, together with its query by example (QBE) facility, provides all the tools which a person of ordinary skill will require in order to develop the relations and tables of the method
  • WINDOWS NT is the operating system
  • Microsoft Development Tools for Rapid Application Development can be used to define the database 53 to interchange data in a manner required in the method 60.
  • Shared data such as project summaries, project descriptions, etc., is shared in the form of a "virtual desktop" whereby computer systems connected in a network may be operated peer-to-peer with resources shared over the net Further, time may be aggregated from all "virtual" and "LAN" desktops working on a given project.
  • a Microsoft "ACCESS” relational database running under Microsoft "WINDOWS”
  • An “ACCESS” database is a relational database in which data is stored as a number of tables. Each table consists of a number of “records” (e.g. for different project names 100) and each record contains a number of "fields", such as "group/category”, “temporary bookmarks", “global bookmarks”, or “research session”. Where fields in two different tables take values from the same set, they are referred to as being shared fields. Shared fields have the same value and may therefore be shared between two or more tables. These fields are interrelated via a "join” operation which joins related records in the two tables. Often, but not always, these shared fields will have the same name across related tables. Further, ACCESS permits the filtering of records according to certain criteria and the searching for particular field values.
  • UML Unified Modeling Language
  • definitions of UML Class notation are available on the Internet at http://www.rational.com uml.
  • any one (“1") user in a user field 226 is joined to any number (".") of GlobalMarks in a GlobalMark field 228 (where the user is the pioneer user), any number of Temporary Bookmarks ("TBMs") in a temporary bookmark field 230, any number of groups in a group/category field 232 (and vice versa), and any number of research sessions in a session field 234, the user being generally associated with a participator field 236.
  • TBMs Temporary Bookmarks
  • any name of a project folder (i.e., a project name 100) in the project field 238 is associated with any number of sessions in the session field 240, any number of GlobalMarks in the GlobalMark field 228, and a defined number of AccessTokens in the AccessToken field 242.
  • a VisitMark field 244 indicates which URLs have been marked for deletion
  • a location field 246 associates each URL with a description
  • a SearchLocation field 248 associates keywords with each URL.
  • the Project field 238 associates a project description with a project name 100.
  • a ProjecfBookmark field 250 associates URLs with project names 100.
  • the method 60 is implementable on the Intranet 25 or a standalone PC 22.
  • «other users» refers to either other users of the standalone PC 22 or other users of the intranet who use the method for collaborative browsing, and the term «network administrator)) is interchangeable herein with the term «guard ⁇ an» (a supervisor such as a manager or a parent in the event that the system is used at least m part for censorship purposes), as the case may be.
  • the browsing method 60 is encoded on a computer-readable medium.
  • the method 60 is implemented in software which instructs a microprocessor to manage system components, inputs and outputs in a manner which controls access to the Internet.
  • the method 60 includes an access control matrix having at least the parameter of project name 100 which must be input in order for access to the Internet to be permitted.
  • the data st ⁇ ng is classified and filtered against the access control matnx. If the data st ⁇ ng includes a stnng identified as a project name 100, access is permitted; otherwise, access is limited (e.g., only a limited number of preapproved web pages may be accessed, such as a page providing instructions on how to use the method) or denied altogether.
  • a first step 80 by clicking on an icon for example on the user's desktop, the browsing method 60, operating on the system 20 of the invention, is loaded into the working directory of the computer 22
  • a second step 82 the method then presents an input window (similar to that shown in FIG. 7) in which the user inputs an individual user name 90 and an individual user password 92 (if the system is configured for multi-user access, this may be omitted if only one user is permitted to access the PC). If this information is correctly input, the user then logged on to a PC -resident HTML page.
  • This page includes links to subpages and to other pages on the Internet, preferably on a subject related to the target market of the software (for example, legal links would be provided if the software is customized for the legal market).
  • a third step 84 upon clicking on a drop-down menu item entitled "begin new project", the method 60, using the display device 24 of the computer 22, then presents the user with a selectable presentation of frequently used bookmarks or URLs. Optionally, entire contents of web pages may be saved in memory, to aid in off-line research. If another drop-down menu item, entitled “Begin Session” is selected, the method 60 goes to step 86.
  • the method 60 presents a single input window 101 in which the individual user name 90, the individual user password 92, the project name 100, and, optionally, subproject name 103 (e.g., for project name "TELEPHONE", the subproject name might be "LONG DISTANCE PROVIDERS") are input. If all required fields are completed correctly, then the method jumps to step 102. Further, finding aids such as a browse project name button 105 may be added, should the user not know the name.
  • finding aids such as a browse project name button 105 may be added, should the user not know the name.
  • Clicking on the "browse project name” button 105 calls up a listing of project names 100, possibly alphabetically listed, from which the user, using the cursor 156, may activate and choose by clicking, or to compare his project name 100 with, to determine whether he made an error in recording the project name.
  • Research results associated with any subproject names 103 are stored m association with their root project name 100.
  • a begin new project button 107 returns the program to third step 84, above.
  • the method 60 presents the user with an input window (such as window 101 of FIG. 7) in which the user must input an individual project name 100, such as PERSONAL or CLIENT 082361. After the user transmits the entered information, the method 60 compares the input name 100 with each name in an approved project name table stored in computer memory.
  • the user is prompted to verify that this is a new project and to input a desc ⁇ ption of the project (optional) to be used, for example, in providing a basis for key word search associated with a modified third step 84, desc ⁇ bed in detail below.
  • a desc ⁇ ption of the project optionally used, for example, in providing a basis for key word search associated with a modified third step 84, desc ⁇ bed in detail below.
  • the method declines access to the Internet unless the input project name matches an existing listing of preapproved project names including such gene ⁇ c project names mentioned above which are stored in a relational database management system running a relational database 53.
  • a fifth step 94 after the user has input the required information, he is then presented with any associated (with the project name 100 and the user name 90) TBM Listings (in HTML format and described in detail below in association with FIG. 11) from which he can initiate a new search.
  • the research summary or global navigational history shown in FIG. 10 can also be saved as an attachment in an importable form and e-mailed to a third party. If the third party has a compatible browser, the third party may import this data and use it to launch their own research.
  • a sixth step 102 particularly where multi-user access is permitted on a standalone PC or an intranet, the individual user name 90 and project name 100 are checked against permissions or AccessTokens in an authorization table (Table 1 of FIG. 8) stored in the relational database 53, to determine whether or not that particular user is permitted to work on the named project 100 and if so, whether the rest ⁇ ctions on use apply (a guardian or system administrator determines the limitations which apply to a given user or project: only he may change these restrictions, as directed by company management for example) If there are no applicable restrictions indicated in the authorization table, the user is permitted to continue.
  • an authorization table Table 1 of FIG. 8
  • the user can limit access to such projects (over which they have control) to categories/groups of other users, such as management, staff, secreta ⁇ al, attorneys, paralegals, etc.
  • the user accomplishes this by checking off a dialog box when the user logs off the current project name 100 as shown in FIG. 9.
  • a log off window (not shown) is presented to the user when the user activates a log off feature (such as a pull-down menu, an icon, or answering approp ⁇ ately to a dialog window presented, asking if the user wishes to continue or terminate the current research project).
  • An optional window 157 is then presented, which includes, for example, the text "permit access to the following catego ⁇ es: [ ] all: [ ] administration, [ ] lawyers, [ ] staff
  • Checking off any box will limit access to the extent of the user category.
  • the user will generally have the authority to limit access to anyone in the same category, or of a category which plays a support role in relation to the user.
  • certain catego ⁇ es of users (“p ⁇ vileged users") will always have access to research results, such as the system administrator or the responsible attorney in charge of a particular client, or the employee's direct supervisor.
  • the method 60 accesses the database 53 (described in detail above in connection with FIG. 5) and checks the user authorization table to determine whether the pnvileged user is the supervisor of the user who performed the research, or whether he is catego ⁇ zed in a privileged level with respect to the user whose research results are sought. If so, the user is granted access, unless otherwise denied by the system administrator (such as in the case of a Chinese wall).
  • a seventh step 104 if a previously saved URL Listing, Navigation History or Research Summary exists in association with the project name 100, the user is presented with the associated URL Listing, including all URLs saved in association with the project name 100, or SessionMarks created m a research summary/navigation history associated with the project name (again, see Table 2 and FIG. 5).
  • This summary shown in FIG. 10 may be recalled and brought to top of the user's screen at any time during the research session by simply clicking on, for example, a special icon on the field 154 of the GUI 34 (shown m FIG. 13).
  • an eighth step 106 upon the input of a user command orde ⁇ ng the downloading of information located on the Internet (such as by clicking on a hypertext link), the log on to the Internet is made (wherein the user name and password for access to the ISP is input), an HTTP connection 72 to a desired server 54 is established, a time Tl is read from the system clock and stored in RAM, a buffer memory or a cache, and the URL is checked against the global navigation history, including the GlobalMarks 228 associated with the project name 100 to see whether the URL is being accessed for the first time. If so, the URL is added to the listing and the user name 90 is listed in Col. 6 of Table 2 as the pioneer user associated with the URL link. The number "1" is attributed to the counter associated with this URL.
  • a ninth step 110 the user is provided with the opportunity and means to perform his research.
  • the navigation path of the research is tracked and stored by any number of suitable methods, such as that desc ⁇ bed in U.S. Pat. Nos. 5,717,860 and 5,712,979, the contents of which are incorporated herein by reference.
  • the downloading of web pages is indicated by a light icon (not shown) which flashes by changing color between red and green du ⁇ ng downloading.
  • Each web page associated with the project name 100 may have keywords or comments stored in association with it. These comments or keywords are input by a user upon the creation of a new project and are stored in a corresponding relational database field in association with the project name 100.
  • a scan submethod scans the text of each downloaded page for words which match these keywords or comments. If a match is found, the submethod changes the color of the light icon from red to green and stops its flashing. Thus the user can quickly see whether the downloaded page is not relevant to the project name 100 while at the same time receiving an indication that online activity is underway.
  • an eleventh step 114 the user ends his research session.
  • the total time T ⁇ spent on researching the project name 100 is calculated using conventional methods and is recorded in the research summary section of Table 2.
  • the user may close the connection or indicate that a new research session should begin. If the user chooses to end the research, this begins the logout process 116 which includes a twelfth optional step 120 and a thirteenth step 122.
  • the user may display the research summary, and edit the bookmarks which he added du ⁇ ng the session. He may also mark any sites which are attributable to him (as the pioneer user) either in the global navigation history or the research summary, for deletion, but he may not delete them himself (unless he is the system administrator).
  • the marking tags these records in the file in which is then stored in memory, for easy retrieval by the system administrator or guardian upon scanning the memory for such marked records. Further, such marking for deletion moves the bookmarks or URLs off of the Research Summary and/or the Project Global Navigation History (see Table 2) page and onto a page which is hypertext linked (via a link entitled "Marked for Deletion” for example) to the page on which the summary and navigation history are listed.
  • any links which are marked for deletion are not printed, thus permitting the placement of the summary in a client's file without including any potentially emba ⁇ assing or unprofessional information thereon (a "marked for deletion" notation on the print out makes sense because the deletion of sites which are not of interest to a client is an administrative task).
  • the system administrator or guardian may then delete these marked records, and adjust the user authorization table appropriately (e.g., if the system administrator finds that a user has marked for deletion a series of sites that fit a particular category to which the system administer may block access in the user authorization table, he may so adjust the user authorization table in order to prevent this content from being accessible to the user.
  • the research summary of the session (Table 2, Section 3) is saved in the database 53 for common access and for presentation upon the user's or another privileged user's next login under that project name 100.
  • the research summary includes the individual user name 90, project name 100 and navigation path or history 124 (shown in FIG. 10) of the last research session.
  • the method 60 presents the user with the opportunity to print out the research summary, project navigation history, and/or associated bookmarks, for placing in an associated file for later reference.
  • the printout may simply be that of Table 2 of FIG. 10.
  • the user is presented with an input screen which queries the user as to whether he would like the individual user name 90, project name 100 and navigation history 124 printed out. If the user answers affirmatively, the summary is submitted to a printing cache of a connected printer for printing.
  • a fourteenth step 126 the user is queried as to whether he would like to begin another research session and if so, the method 60 returns to step three 84 above, the input window 101 of FIG. 7 (wherein the user name 90 and password 92 are automatically input into the windows, or, if the TBMs were created during the research session, the method returns to step 86 above and the TBM listing is presented, carried over to the next research session. If not, the connection closes, the user is asked whether he wishes to save any TBMs created during the research session. If the user responds in the negative, any unsaved TBMs are automatically deleted and the method 60 ends. If the user responds in the positive, the TBMs are saved in association with the project name 100 for presentation, in a selectable form in chronological order with other TBM listings, next time that step 94 is executed.
  • the second step 82 and third step 84 may be reversed.
  • the third step 84 of presenting frequently used URLs is performed in the following manner.
  • the method 60 provides a pull-down menu or a dialog window 137 (such as that shown in FIG. 13), which permits the user to perform a key word search of all descriptions of project names 100 previously searched by others, including any associated or unassociated (i.e., all) bookmarks (by name and by associated description of the bookmark).
  • a second substep 132 after input is received from the user, any descriptions, project or bookmark names matching the search criteria are presented to the user in a selectable format such as a URL and description listing in the form of a research summary such as that shown in FIG. 10.
  • the research summary may include shortcuts to folders of links common to a particular type of research, thus not requiring duplication in each related project research summary and providing easy access to frequently referenced links.
  • These shortcuts may be dragged and dropped into the URL listing in the research summary using, e.g., a project management subroutine controlled by a sub-interface.
  • a project management subroutine controlled by a sub-interface.
  • This folder is actually a hypertext-type link to a single global folder such as that shown in the upper portion of FIG. 10, which might have links of particular interest to patent related projects
  • the project names 100 presented may be limited to those which the user is authorized to view and/use, using the user autho ⁇ zation table 1 of FIG 8.
  • the search results are scanned to identify and automatically delete any duplicate URLs from the project global navigation history or bookmarks.
  • the user may edit the presented listing for saving in association with a project. Alternatively, the user may begin his search using the bookmarks which he has saved for general use, as is the case in the prior art.
  • the method prompts the user for a project name 100 (and subproject name 101, as the case may be) with which to associate the edited URL listing.
  • a project name is input
  • the selectable listing is saved in association with project name 100 for later access and the user is prompted to input a project descnption (to permit key- word searching by project name).
  • the method saves the selectable presentation of matches as the bookmark listing associated with the input new project name 100' and the new individual user name 90. This is done off-line.
  • the submethod returns to the method 60, the fourth step 86.
  • the method 60 further provides the user with an option enabling the user to focus the key word search on only those projects which he has previously worked on, by scanning saved URL listings for his individual user name and presenting only those navigation histories and/or bookmarks associated with these project names 100
  • the user may search by his or another's user name, and receive all URL listing which he or another user (to the extent of his authorization to receive such information from the other user) in listing form.
  • the method then returns to the third substep 134.
  • the third step 84 provides the search input field 137 (shown in FIG. 13) and search engine (such as that desc ⁇ bed in U.S. Pat. No. 5,864,863 to Bunows, U.S Pat. No. 5,933,822 to Braden-Harder et al. and U.S. Pat. No. 5,924,090 to Krellerstein, the contents of which are incorporated herein by reference) together with canned, pre-organized listing of bookmarks which are pre-loaded in the method, after learning of or estimating/projecting the likely needs or requests of the user.
  • the search engine searches the bookmarks using keyword inputs of the user.
  • bookmarks and sample searchable projects associated with a project name and potentially relevant URLs are added in order to provide the user with an initial off-line listing of research tasks which are commonly performed among such users
  • research tasks such as seeking paralegal service providers, sources of information regarding local or national courts, SEC filing information, private investigation services, corporate address information and officer biographies, telephone or Internet services, computer support services, web page development services, etc., including URLs addressing websites having listings of FAQs and sources of other helpful background information of the user are provided.
  • the prepackaged bookmark or URL listings are associated with a readily recognizable generic, descriptive project name 100 and project descnption and generated by experts in the field who have actually performed a typical search. This navigation history generated by these expert searches is pre-packaged in association with generic project names 100. Because bookmarks are saved in association with user name, the user can execute a keyword search constrained to a project name 100 as well as a particular user name 90. This would be particularly useful in large organizations with multiple departments.
  • step 106 of method 60 above wherein a user using a client computer 22 initiates a request for information and the request for information is interpreted and retneved, the URL is filtered against a listing of unapproved URLs and, if unapproved, the download is terminated prior to the document being transmitted to the client computer and displayed.
  • identifying code of banner advertisements are detected and such advertisements are stnpped from the HTML code prior to the CGI reassembling the page for presentation to the user by the browser.
  • FIG. 12 illustrates a GUI layout 150 in which a sample World Wide Web page 152 is displayed in accordance with the method 60 of the present invention.
  • a GUI is a type of display format that enables a user to choose commands, start programs, and see lists of files and other options by pointing to picto ⁇ al representations, called "icons", and menu bars and/or buttons 154 allowing the selection of menu items from pull-down lists on the display device.
  • Choices can generally be activated by either a keyboard 26 or a mouse cursor 156
  • the size and position of elevator 160 within scroll bar 162 corresponds to the size and position of the current viewable page m relation to the document displayed within window 164
  • the user can position the mouse cursor 156 over the arrow section 166 or arrow section 170 of scroll bar 162 and click a pointing device (e.g., the mouse 27) to scroll the document upward or downward, as approp ⁇ ate. Scrolling in this manner permits viewing of any desired portion of the document.
  • Arrow sections 172 and 174 allow a user to scroll respectively left or right.
  • Window 174 is a location field indicating the cwrent URL address.
  • a hypertext link 180 permits navigation between the current page 152 and the page referenced by a URL address associated with the link, discussed in more detail below.
  • Window 182 includes the description of the page 152, taken from the corresponding tag of the page itself.
  • a window 154 indicates the current amount of time on-line for the current project 100.
  • the GUI 150 may have a banner display field 184 where display advertisements may be presented, preferably screened or filtered by a suitable method such as described in U.S. Pat. No. 5,826,267 so as to present only approved advertising banners which may be selected based on their relevance to the research goals of the project.
  • the links 180 point to Internet services which are typically accessed by specifying a unique address or URL which is associated with the link.
  • URLs can point to numerous resources on the Internet, including HTML documents, pictures, sound files, movie files, or database search engines including specific search queries.
  • URLs can point to resources located on the client computer 22, or anywhere on the Internet. They can be accessed either through an HTTP server or another Internet server running on top of TCP/IP. The URL may also direct the server computer to run another gateway program and return the result to the client computer 22.
  • the URL has two basic components, the protocol to be used and the object path name.
  • the URL "http://uspatentinfo.com” specifies a HTTP and a pathname of the server hosting http://uspatentinfo.com.
  • the server name is associated with a unique numeric value (TCP/IP address).
  • the "PATENT.INFO" home page includes links 180 which are typically underlined or highlighted to indicate the presence of a URL address link.
  • the user places cursor pointer 156 with a mouse 27 or other pointing device over the link 180 and activates the pointing device to access the linked page or document.
  • the hypertext links 180 are important because they facilitate access to web pages over the vast network of the World Wide Web.
  • HTML commands called "tags", mark text as headings, paragraphs, lists, quotations, emphasized, and other formatting information.
  • HTML also has tags for including images within the document being read to other documents, fill-in forms 70 (see FIG. 4) that accept user input, and hypertext links 136 connecting documents being read to other documents or Internet resources such as FTP sites, WAIS databases, USENET news, e-mail, gopher sites, or another HTML document. This feature allows the user to click on a string of highlighted text and access a new document, an image, or a sound file from a computer within the network anywhere in the world.
  • the element marking a hypertext link 180 in a HTML document is referred to as an "anchor” or “element” and the marked text is referred to as a "hypertext anchor” or “anchor tag”.
  • the anchor tag has a destination portion and a text portion. Furthermore, the anchor tag is delimited at the beginning by an " ⁇ A>" and at the end by an " ⁇ /A>” character sequence.
  • the destination portion contains an entry which indicates the location of the destination web page.
  • the text portion is the text which appears on the GUI 150 and is associated with the hypertext link 180. For example, consider a hypertext link 180 having the following HTML anchor tag:
  • the destination portion of this tag is "http://uspatentinfo.com” (shown in field 176 of FIG. 13).
  • the text "The Patent.Info Home Page” (shown in field 182 in FIG. 13) occupies the text portion of the HTML based link.
  • a web page contains a list of anchor tags which describe hypertext links in HTML.
  • the browsing method 60 of the present invention processes these anchor tags and displays co ⁇ esponding hypertext links 180 to the user on the display device 24.
  • An anchor tag can be modified such as to prevent access to an associated site, as described in U.S. Pat. No. 5,826,267.
  • Links 180 are typically displayed on a web page in color or with an underscore or both. In response to the user pointing and clicking on the link 180, the link is said to be "activated" to begin to download of the linked document or text.
  • FIG. 14A a flow chart of a submethod 190 of the method 60 is shown, the submethod runs during step 110 of the method.
  • the user is provided with a means of choosing this option, via a drop-down menu with a "set options" selection.
  • the submethod 190 modifies the method of the prior art of selecting hypertext in which pressing the left mouse button 28 while the cursor 156 is over a link 180 initiates the downloading of the linked document (i.e., by clicking on a hypertext anchor normally displayed as a hypertext link 180 within a hypertext document displayed on a client computer's display 24) and clicking on the right mouse button 29 provides the user with a menu of actions to choose from.
  • a first substep 192 the user places the cursor 156 over the hypertext 180 of interest, thereby activating the link.
  • a second step 194 the user decides whether to click on the left mouse button 28 or the right mouse button 29.
  • substep 196a if the user clicks once on the hypertext anchor using the left mouse button 28 (or analogous action), the submethod 190 reminds the user of the current project name 100 and solicits the user's confirmation that the research sortie or session, which the user indicated he wished to initiate by his clicking on the link 180, is to be associated with the current project name or a new project name 100' (i.e., window 200, shown in FIG. 13, is presented). Further, substep 196a of the submethod 190 solicits the user's comments or review of the contents of the currently downloaded page via a clearly marked input field 199 in the window 200' .
  • substep 196b if the user confirms association with the current research name 100, the submethod 190 continues research by retrieving the information and transmitting it to the client computer 22. The time TN is then stored in a buffer and the URL is stored in the navigation history file. Confirmation of the association may be solicited in a number of ways.
  • the submethod 190 activates and displays an input or secondary window 160 (shown in FIG. 13) which prompts the user to press an icon or other button using the mouse cursor 156 to confirm that the project name 100 is not to be changed. If the user confirms by, for example, clicking "yes", the research session is associated with the current project name 100, and as stated of substep 196b, the submethod 190 continues.
  • substep 196c if the user clicks "no", the submethod 190 queries the user to determine whether he wishes to create a TBM, thus allowing the user to temporarily save the URL for later access and continue with the current research project. If the user so desires, by responding in the affirmative, then the TBM is saved and the step goes directly to substep 196b and the research continues.
  • substep 196d alternatively or together with the TBM feature, the user may use the associated bookmark feature.
  • substep 196d if the user responds in the negative, the user is asked whether he wishes to save the URL in association with another project name 100' (as an "Associated Bookmark") and if so, the user inputs the project name 100', a description (optional), and the URL is stored in the URL Listing in association with the project name indicated, optionally highlighted or italicized (see Table 2, under Associated Bookmarks: "SEC FAQ") to indicate that that URL has not yet been accessed and permitting identification of the URL during a later research session.
  • the user's individual user name 90 may optionally be associated with this as well, to permit easy identification.
  • Associated Bookmark as indicated in the second column of the Associated Bookmark section of Table 2, permits temporary and editable storage of the bookmark to the potentially irrelevant site (with respect to the current project 100) in association with his "personal" or another project name 100. In this way, the user is provided with freedom to navigate to potentially irrelevant sites.
  • substep 196e if the user indicates "no" once again, a new research session 100' is initiated and associated with the new project name 100'. Thus, in this substep 196e, the user must input the new project name 100'. After the project name 100' is input, the system clock is read and the time TN is used to calculate the total time on the prior project name 100 and to initialize the clock to commence tracking the time on the new project name 100', using methods well known in the art.
  • the submethod 190 retrieves the requested information and transmits it to the client computer 22, where the HTML is compiled into a hypertext document and displayed.
  • the client computer 22 where the HTML is compiled into a hypertext document and displayed.
  • the user name 90 of the first user to access a site listed on the navigation history (the "pioneer user" indicated in Table 2) is associated with the navigation history, permanently stored in the URL listing in association with the project name.
  • the URLs in the navigation history cannot be deleted by the user—only the system administrator or guardian or other privileged user can do this.
  • substep 198a if the user clicks the right mouse button (or analogous input), an option window 200' (shown in FIG. 15) opens and the submethod 190 awaits user input. Note that the two windows 200 and 200' are not displayed at the same time—however, they are shown in the FIG. 13 together for the sake of thoroughness and to simplify the drawings.
  • substep 198b after input from user is received, the option window 200' is closed and the selected action is implemented. If the option selected was the creation of a TBM, the user has saved the URL for later access, without downloading it (and thus having it stored m association with the project name 100).
  • the URL is then stored in an editable, at least semi-p ⁇ vate format (i.e., not accessible by all, rather only by certain p ⁇ vileged users, if any) for later access.
  • the method 60 provides the user with an additional incentive not to access a page which is of pnvate interest and/or not relevant to the current project 100 (to avoid an improper association).
  • the user is likely to remain focused on the current project 100. This decreases the likelihood that irrelevant sites will be found on the navigation history associated with the project name 100.
  • the method 60 of the invention allows users to surf the sites of their choosing, while directing them to focus their research one project at a time.
  • the secondary or "target" window 200 may include comment buttons, check boxes, list boxes, drop-down list boxes. It is commonly known in the art that web authors can set up such a link so that when a user clicks on it, an input window such as window 200 appears.
  • the input window 200' used in association with the submethod 190, is shown to include other menu items such as those presented m the prior art when the nght mouse button 29 (or equivalent) is pressed. There are a variety of options to select from on this option window 200'.
  • the options listed in this option window 200' include, for example, “back”, “forward”, “open this link”, “open in a new window”, “view image”, “save image as”, “set as wallpaper”, “copy link location”, “copy image location”, “save as a TBM”, “add bookmark” (clicking this option adds bookmark to bookmark listing common to all projects), “save as Associated (with current or another project name) Bookmark”, “Internet shortcut”, “select all”, “add to favorites”, “view source”, “refresh”, and “properties”, among others.
  • the submethod 190 when the user clicks on the link 180, the submethod 190 first determines whether the web page selected is a subpage of the current page, is a jump link, or includes the same root URL as the current web page before presenting the user with the input window 200. This identification is performed using conventional methods known in the art. If the page selected is a subpage of the current page, a jump link, or is included under the same root URL, the substep 196a skips to substep 196f without a query being initiated. In this way, only those hypertext links leading to a web page that is likely to have different content are subject to confirmation that they are to be associated with the same project name 100.
  • submethod 190' an alternate embodiment of the submethod 190, shown in FIG. 14B, the option window 200' is not displayed and the substeps 196a through the 198a are replaced with a substeps 197a, 197b, and 199a and 199b.
  • the method 60 immediately accesses and transmits the requested information, just as with a left button click in the prior art.
  • substep 199a if the left mouse button is clicked, the option window 200' (as shown in FIG. 15) is displayed and the submethod 190' awaits user input.
  • the browser method 60 places an information "object" within each anchor tag of the page being formatted for display. This information object is saved to a separate file or cache within the client computer 22. Multiple information objects may be associated with a single link. Further, the information object need not be related to the link to which it is associated. Those skilled in the art will recognize that other HTML commands and tags, such as a tag dedicated to masking an information object withm the currently displayed page, may be used.
  • the input windows 200 and 200' represent examples of a type of information object.
  • the input windows 200 or 200' may be formatted and displayed upon activation of a link in a web page being displayed.
  • the input window 200 is displayed in this manner whenever a call to a web page is made by clicking on a hypertext link 180, such as when a search to a particular URL is initiated or when a previously stored URL is launched (such as from the TBM listing of Table 3, or associated bookmarks, navigation history and research summary of Table 2).
  • the input window 200 may be an HTML "fill-in" form (such as that shown in FIG.
  • the window 200 reminds the user of the current project name 100 and asks the user if he would like to continue with the same project or change the project name.
  • the user may change setting such that he can review a page in one of several different modes.
  • a first mode the user can review a web page without having to attribute it to a project name 100 until he has finished reviewing the page.
  • the fact that the user is ready to provide comments regarding a page is indicated by his having activated an anchor tag or URL pointing the browser to another web page which is not a subdomam of the current page, the latter restriction limiting the querying to quenes at the most relevant times, i.e., when the content viewed by the user is likely to change significantly.
  • the user may still be queried as to whether the URL associated with an activated anchor tag should be saved as a TBM, in lieu of downloading the selected data at the URL.
  • the user is not asked whether the downloaded data is to be associated with the current project name 100 or a new project name 100' until the user has had a chance to review the information downloaded.
  • the variations regarding clicking on the nght or left mouse button are available as a user moves away from an already reviewed site. Therefore, in an equivalent to the input window 200 or 200', another menu option, namely, "input keywords and/or comments" 199, is presented to the user, to provide the method 60 the opportunity to capture the user's contemporaneous comments, whether in text or a sound file, regarding the site just visited.
  • the substitute for substep 196a is identical except that when a user activates a link 180, he's indicating his desire to leave the cu ⁇ ently downloaded site and is asked to associate the site he's already visited with a project name 100. For example, if the user clicks once on the hypertext anchor using the left mouse button 28 (or analogous action), this alternate embodiment of the submethod 190 reminds the user of the current project name 100 and solicits the user's confirmation that the research sortie or session, which the user had previously initiated, is to be associated with the cunent project name or a new project name 100' (i.e., window 200, shown in FIG. 13, is presented).
  • This embodiment although less controlling of navigation, is more appropriate for simply tracking and soliciting, receiving and storing comments, such as key words, metatags, or descriptive terms regarding site content for use in identifying the site when the search feature presented in the dialog window 137 is used.
  • the user can change setting so that no dialog window is presented upon activating a link, but rather the window only appears when the user clicks on the nght mouse button.
  • the URLs of downloaded pages are automatically associated with the current project name 100.
  • a system administrator by evaluating the focus quotient Q across different users under diffenng conditions, may find that it is better, once a project name 100 is selected, to automatically associate all downloaded pages with this project name, without querying the user. If the user knows that, when he downloads a page, it will necessarily be saved in association with the current project name 100 until he otherwise logs out of the current project name, then, when the user sees something of personal interest, he will save it as a TBM or start a new research session under his PERSONAL project name However, this would not eliminate the need to have a dialog window 200, as the option of saving as a TBM and inputting keywords or comments with respect to the page just visited would be important.
  • a URL is saved as part of a navigational history data listing, together with a time tag
  • the submethod scans the time tags in the data listing and marks all URLs in the listing that are of a predetermined age
  • the submethod checks the comment field in the data structure of each marked URL.
  • the submethod deletes the marked URL.
  • the method 60 is ideally used to deliver specific content in the form of URLs that are selected, reviewed and indexed according to a hierarchical tree structure such as a directory/subdirectory structure.
  • a hierarchical tree structure such as a directory/subdirectory structure.
  • These trees are generally tailored to the needs of particular professions, such as lawyers, doctors, CPAs, engineers, CFOs, Venture Capitalists, etc.
  • the method 60 is tailored to the needs of the professional IP purchasing agent, then the tree would have structured links arranged according to project names 100 such as IP exchanges, IP valuation sites, Glossary sites, general IP content sites, sites of licensing professionals, patent searching sites, etc.
  • the method 60 provides a structured means of accessing and navigating the Internet.
  • the method 60 of the invention handles this as follows.
  • the submethod 210 recognizes this fact by analyzing the URL code/structure invoked and, consequently, identifies the site type as a "search engine” in column 2 of Table 3 of FIG. 11.
  • the submethod 210 analyzes the query structure and extracts the characters which occur after this word/expression and stores the same in the TBM listing (col. 3 of Table 3, above). Alternatively, the entire code from the location field 176 corresponding to the search engine search is stored in its URL form in order to permit easy re-execution of the search upon clicking on the URL.
  • the submethod 210 checks the query against a table of forbidden keywords. In substep 220a, if the words are forbidden, then the user authorization table is checked to see if the search is nonetheless authonzed (i.e., an indicator such as «no forbidden keywords» is not found m the authorization table).
  • substep 220b if the user or project does restrict access, then the submethod 210 denies access and displays a warning window informing the user that access is denied
  • substep 220c if the user and project have no restrictions, then the request is processed.
  • substep 222 if the words are not forbidden, then the request is processed.
  • step 224 the research is continued.
  • the first substep recognizes, in the following manner, when a search engine search term is entered.
  • the method 60 receives a character on a character based input device such as the keyboard 26, the method analyses the character and determines if the character received was an "enter" key.
  • the "enter” key represents any input signal which indicates that the user desires to transmit information to the server If the submethod 210 receives the "enter" key, the characters immediately before the enter key that were entered by the input device such as the keyboard 26 are identified to determine whether they represent a manually input URL or a search keyword or phrase.
  • the keyword or phrase typed by the input device just before the "enter" key was pressed together with any Boolean operators and the URL, are extracted and the keyboard-entered words or phase and URL are stored in the appropnate column of tables 2 and 3 (alternatively, as mentioned above, the URL in the location field may be stored in order to permit re-execution of the search dunng a later research session).
  • an input window 160 is presented as described above with respect to the submethod 190, for example, in order to provide the opportunity to query the user as to whether the new site to be visited should be associated with the same project name 100.
  • new browsing windows may be opened.
  • the user inputs a new project name 100'.
  • the termination time is stored for calculation of the actual time on the pnor project when the research session associated with that project name 100 is terminated
  • the noted time also marks the start time for the research associated with the new project name 100'.
  • the method 60 provides a system administrator module 260 which permits the system administrator 262 to manage participants (such as groups/categories and users), access, projects and sessions
  • the project names 100 which a user may research and the users who may have access to certain project names are managed via an access management window.
  • the system administrator module 260 facilitates the management of access, URL management (including deleting "marked for deletion" URLs), user performance evaluation, use of a focus quotient Q, setting access limitations, time limits, project name access restrictions, and issuing and changing passwords and user names.
  • the module 260 allows the system administrator 262 to compare the relative performance of each user using the focus quotient Q, a performance measure, (desc ⁇ bed in more detail below) by displaying a bar chart (now shown) showing the relative score calculated for each user over a specified period of time
  • the focus quotient Q takes into account certain research session statistics, such as H ave (the average number of hits per research session over the specified pe ⁇ od), T ave (the average time of a research session, expressed in terms of T totalois the total on-line time over the pe ⁇ od, divided by N totab the total number of project names researched over the specified period); N rs (the average number of research sessions executed per project over the specified period calculated by taking N tota , and divided by N legal, the total number of unique project names researched over the specified period); and T pers , the amount of time spent on the personal project name.
  • H ave the average number of hits per research session over the specified pe ⁇ od
  • T ave the average time of a research session, expressed in terms of T totalois the total on-line time over the pe ⁇ od, divided by N totab the total number of project names researched over the specified period
  • N rs the average number of research sessions executed per project over the specified period calculated by taking N tota
  • (T ⁇ , - T- ⁇ /T, ⁇ , is an adjustor for personal time.
  • Q can also be expressed as a Summation of Q x , the focus quotient for each project name, divided by ⁇ N total , multiplied by the adjuster for personal time, where:
  • a factor namely, the number of windows open by a single user at the same time, tends to indicate that the user is not focusing his research and could optionally be added to the quotient above in the denominator.
  • A, ⁇ , ⁇ , and ⁇ optional weighting factors, which may be constants or formulas, determined experimentally. These performance measures thus aid the user, system administrator, and/or management, to evaluate relative performance over time, which can then be presented in a simple histogram or a graph of Q over a time interval, alone in compa ⁇ son with prior performance of the same user (self or user evaluation) or in comparison with other employees (inter-user evaluation). The user's performance may also be evaluated with respect to a particular project.
  • a form shows one record in a specified format and allows the system administrator 262 to step through records one at a time.
  • a report shows selected records in a specified format, grouped into sections with different kinds of totals (including sum, minimum, maximum, average).
  • a flow diagram of the logout submethod 240 of the present method 60 is shown.
  • the user indicates, via a pull down menu or by clicking on a menu item presented when selecting a hypertext link or anchor tag, that he would like to end the current research session.
  • the submethod 240 presents the user with the listing of URLs created by the TBM feature of the invention, permitting the user to launch another research session associated with another project name 100', using one of the hypertext TBMs on the list.
  • the submethod 240 awaits user input.
  • the TBM listing includes menu options such as "logoff without saving TBM", "save TBM and logoff, "begin new research session".
  • a fourth substep 252 once the user input is received, the submethod 240 carnes out the task associated with the input received. For example, if the user clicks on a TBM in the TBM listing, then the submethod 240 returns to step 86 above and presents the user with input window 101. If "begin new research session" in input window 101 is selected, then the user is presented with the URL listing shown in Table 2 and/or a TBM listing associated with the input project name 100'.
  • the submethod 240 prompts the user for a file name and confirmation that the cunent TBM listing is to be saved in association with the cunent project name 100 or another project name.
  • the TBM is saved, the connection closes and the user logs off.
  • the TBM information stored in the URL listing and presented later allows the user to consolidate his research by providing a means for him to time-shift possibly melevant research, without having to permanently save the URLs in a traditional "favo ⁇ tes" list or "bookmark” list and to associate TBM listings with specific project names 100.
  • the user may place potentially irrelevant sites on the TBM listing without going to these sites (thus, they do not show up on the navigation history and are therefore not permanently saved).
  • the user may later edit this TBM listing or initiate personal research in association with it.
  • secure access (to varying degrees) is provided to HTML documents posted on publicly accessible servers across the Internet or on an intranet.
  • a URL may be the following: http://uspatentinfo.com conf-docs/4024- 116-00181.html, which may be e-mailed, preferably in a secure manner, to other persons who are to have access to the document so posted. Unless a user knows the directory and file name extension to the address of the home page, he will not be able to find the document.
  • the method of posting these documents involves the following representative steps.
  • the user selects an option for the pull-down menu of his word-processing program which states "publish to intranet or Internet”.
  • the method converts the documents into HTML.
  • the method calls a web page publishing subroutine (such as that embedded in "FRONT PAGE EXPLORER"), opens the page and displays the document in HTML, for possible editing.
  • a fourth step after the user selects "publish" from a drop-down menu, the method opens an Internet connection, queries the user for the name and address of the site to which the document is to be published (the user name and password optionally being automatically provided).
  • a fifth step when these inputs are correctly provided, the method publishes the document.
  • the posting of documents at obscure URLs highlights the usefulness of having URL listings of Table 2, FIG. 10, URLs stored in retrievable form through the input of a password 92 , user name 90 and a project name 100 which point directly to these confidential documents. Further, this highlights the importance of the invention for preventing access to URL listings and navigational histones (such as those of FIG. 10) in association with project names 100, where the user seeking access is not authorized according to an authorization table such as that of FIG. 8.
  • the user selects "encrypt" from a drop-down menu, after which the user may be prompted for the project name 100 to be associated with the document.
  • the project name 100 is supplied without querying the user (because it has been stored after the user's input at the beginning of the research session) and the document is automatically encrypted such that the decryption key is the project name 100 (or some hashing thereof).
  • the project name 100 already input during step 134 or step 86 above (such as a client matter number or project code name) is automatically used to decrypt the encrypted page such that the project name is the decryption key.
  • This is accomplished by adding an identifier at the head of the encryption page, which identifies the page as encrypted once the download is initiated, thus executing a decryption program embedded in the method 60 into which the project name 100, stored in association with the research session, is input, for decryption during loading of the page.
  • Having the decryption program resident on the client is advantageous as this allows the information downloaded across the public Internet or intranet to remain encrypted.
  • the page to be downloaded can include the decryption program which extracts the project name 100 and, optionally, for further security, the IP address of the requestor (for checking against permissible IP addresses) upon initiation of the download and then transmits a decrypted page across the Internet.
  • a company using the method 60 of the invention across its various business units may encrypt all its documents (both on the intranet or published on the Internet) such that the decryption key is the project name 100, without the inconvenience of having to input a unique decryption key whenever such an encrypted document is downloaded to a client computer 22.
  • the decryption key is the project name 100
  • access to project documents is conveniently and seamlessly provided exclusively to those who know the client matter number/project name. This ensures (together with the matching table mentioned above) that the navigation history generated during a research or work session is associated with the co ⁇ ect project name 100.
  • the invention significantly enhances the ability of companies having offices at different geographical locations (or dealing with offices of other companies) to be able to access confidential information posted at various servers (of, for example, several companies, consultants or specialists working together on a common project) on the Internet in a secure manner yet in a manner which avoids having to remember separate access codes and passwords for getting beyond a firewall, for example.
  • the invention significantly enhances a user's ability to securely post information on publicly accessible servers, thus making such information available to team members located as several locations across the Internet.
  • Such a feature is particularly useful for consultants who must work with confidential documents of a company or client, but which do not have the established trust relationship with the company, at least not at a level which would warrant their being able to access the company intranet.
  • the method 60 is implemented on a server hosting a page with content specific to a particular profession or industry, and anyone using a prior art browser may then access this web site on the server, which will provide the graphics such as input windows 200 and 200', and bookmarks available for all to use.
  • the bookmarks resident on the server are pre-selected to aid in researching the Internet for foreseen purposes specific to the particular profession.
  • the method 60 includes a GUI 164' for presenting content (i.e., a downloaded HTML page, a document such as an e-mail, a Word document, a spreadsheet or a graphic) which includes a comment window 165 having a text field and controls opened by an icon 167 which controls the playback and recording of sound files, for users' comments on these contents.
  • content i.e., a downloaded HTML page, a document such as an e-mail, a Word document, a spreadsheet or a graphic
  • comment window 165 having a text field and controls opened by an icon 167 which controls the playback and recording of sound files, for users' comments on these contents.
  • This is accomplished via a right click mouse menu option which, if selected, opens an input window 199 (in FIG. 13) that allows comment, either as text or a sound file, after the user has had a chance to review the content.
  • the user may save the comment in association with the web page for presentation to others who follow after the commenting user
  • the user may comment on several web pages consistent with a chosen project name theme.
  • signpost-like back and forward icons 153a and 153b on the upper menu bar provide a convenient means for those who follow this "project trail”.
  • the traditional back and forward icons 155a and 155b continue to move the between websites that he has actually visited. Only when the user visits sites under the project name 100 in the project folder and does not deviate from the order of project sites under the project name 100 will the signpost-like icons and the standard icons appear to produce the same result if selected.
  • a submethod 300 executes the following steps.
  • the submethod 300 reads the format of the next or subsequent document in the project folder and compares this format with that currently open, including whether the comment is in the form of text or a sound file.
  • the submethod 300 checks the format of subsequent document.
  • the submethod 300 opens the document/sound file into the conesponding application.
  • the submethod 300 then presents the user with a confirmation window (not shown), querying the user as to whether he would like the previous document to be closed, or minimized.
  • a fifth step 310 the submethod 300 awaits user input and when received, executes the action requested.
  • the submethod 300 opens the application associated with the selected document, and displays the subsequent document.
  • the user may re-initiate the submethod 300 by clicking on the forward icon 153b.
  • the back signpost icon 153a is activated, essentially the same submethod 300 is executed, except that the submethod moves to the document which is listed prior to the current document in the project folder.
  • This embodiment advantageously creates a signposted trail through the Internet that others can follow.
  • a teacher/guide can create a trail, including comments on each site, to enable students to follow the trail, read the comments and the site's contents and learn in a directed manner.
  • this feature alone will become widespread as a tool to navigate the Internet using an experienced guide (i.e., the "scout" of the original trail).
  • this embodiment is combined with the integration of documents of other formats (described in more detail below), a powerful learning tool is created.
  • FIGs. 1 and 2 may vary for specific applications.
  • peripheral devices such as optical disk media, audio adapters, or chip-programming devices, such as PAL or EPROM programming devices well-known in the art of computer hardware, and the like may be utilized in addition to or in place of hardware already depicted.
  • a computer program product i.e., a control program
  • computer storage e.g., 30 or 32.
  • the method 60 of the present invention is capable of being distributed as a computer program encoded on a floppy disk, CD ROM, or other form of recordable media or via any type of signal bearing media or electronic transmission mechanism, such as a modem or a fiber optic connection to the Internet.
  • the functionality of the present invention is integrated into an HTML-compliant browser, such as "NETSCAPE NAVIGATOR X", “MOSAIC”, “MSN”, or “INTERNET EXPLORER X”. It should be understood, however, that the browser method 60 of the invention need not be inseparably integrated. Optionally, a separate program interfacing with the open structure of "NETSCAPE” or a plug-in, embodying the steps of the method 60 of the invention, may augment the functionality of an existing browser. Note that XML may substitute for HTML in the context of this disclosure. Further, the method 60 of the invention, integrated with a GUI comparable to that shown in FIG. 13, may call a third party external browser. For instance, "MAC OS X" may be used in a manner known in the art to communicate with an external browser m a manner that permits it to appear as part of the browser method 60, although
  • the "information object” or “information” output to the viewer during the link process should be broadly construed to cover calls to any and all forms of messages, notices, text, graphics, sound, video, tables, diagrams, Applets, and other content, and combinations of any of the above.
  • an audio query concerning the use of TBM or associated bookmarks, demanding an audio response may be used.
  • the techniques of the invention apply (as shown m FIGs. 3 and 4) whether or not the user accesses the World Wide Web via a direct Internet connection (using an Internet access provider 29) or indirectly through some on-line service provider 28 such as "COMPUSERVE”, "PRODIGY”, “AMERICA ONLINE", etc. Therefore, the computer "network" 25 in which the invention is implemented should be broadly construed to include any server-client model from which a client can link to a "remote" document, even if the document is on the same machine or on an intranet.
  • the method 60 cooperates with a co ⁇ esponding software resident on a server 54 such that the server-resident software scans and updates the bookmarks and other content on the browser when the server is accessed by a compatible browser.
  • This may be accomplished in the following submethod 350.
  • the browser is either pre-set to point to a download page on which is resident associated updating software or the URL of this server 54 is input into the URL field 176 of the browser.
  • a download step 354 the download of the page is ordered on the client-side, through the user's pressing the "go" button or hitting "return"
  • an identification step 356 the ordered URL or IP address (if performed on the client- side) or the incoming browser identifier (if performed on the server-side) is checked against a list of IP addresses or compatible browser identifiers, as the case may be, associated with downloadable updates for bookmarks.
  • a scanning step 360 if a matching IP address or browser identifier is found, then after the download of the page, the submethod 350 initiates a scanning of the browser to read an identification tag associated with the version of the bookmarks on the browser.
  • the submethod 350 compares the identification tag associated with the version of the bookmarks and other content on the browser with the latest version available on the server 54.
  • a querying step 364 if a version of bookmarks and other content is available on the server 54 that is more up-to-date than that on the browser, the user is queried as to whether or not he would like to have his pre-loaded bookmarks and related content updated.
  • an updating step 366 if the user responds in the affirmative, a download of the upgrade is initiated during which all URLs that have broken links are marked for deletion, new URLs and associated descnptions are added to the bookmarks and other content on the browser, and descnptions and keywords of existing bookmarks and other conent are updated, where appropriate.
  • the method 60 of the invention may be used in a server-based computing architecture that allows the method to run on a remote server 54 operated by a system administrator.
  • This is commonly known as running the application as an ASP (application service provider).
  • ASP application service provider
  • the model of the project-based, group browser functioning as an ASP is particularly timely, as the market place for ASPs is growing very quickly. It also provides scope for other client/server configurations as the general client market moves increasingly towards support of thin client devices such as Palms, Pocket PC's, WAP or HML enabled phones and other digital portable devices.
  • this embodiment allows users to avoid the up-front and continuing costs and technology complexities that might be associated with a client-side application, with the sacrifice of some flexibility because the user may have limited memory, and graphics display and keyboard resources in current thin client device technology.
  • the method can be more genenc by removing the prepackaged, client-side database of profession-centric, pre-indexed links and comments while taking full advantage of the basic features of the method 60 including bookmarking, tracking navigational history, and creating research summaries by project name, and pooling of project research data for multi-user access, etc.
  • This embodiment is more generic in that any group, including persons who do not share the same local network (i.e., Intranet) can share the project-oriented features of the method 60
  • groups might include friends, research teams in different universities, artists, private and public sector groups, church groups, etc.
  • the server-based computing architecture is used, thus further allowing the user to avoid the costs that might be associated with a client-side application and concentrate on their own research or other creative pursuits.
  • this service builds on and facilitates a feature of the Internet that has already garnered attention, the building of online communities which to a certain extent Internet portals currently try to achieve, and a server-based computing architecture.
  • the project-based, group browser is a technical mechanism that would allow users to share and discuss all forms of creative content as it is developed, while restricting access to this content to the group and enabling the technical documenting creation copyrights to be associated with any content generated.
  • These users have a communal mechanism for culling the results of research on the Net, all in one web-based interface.
  • the method 60 includes project management features which allows different format documents such as word, HTML, XML, and EXCEL, or graphics files to be stored together in association with a common project name 100, such as mentioned above in association with the project management module.
  • project management features which allows different format documents such as word, HTML, XML, and EXCEL, or graphics files to be stored together in association with a common project name 100, such as mentioned above in association with the project management module.
  • users can add URLs to web pages, cache web pages of interest, define links, and save documents, all within the project-based, group browsing application.
  • RPC remote procedure call
  • ActiveX and COM Common Object Model
  • the server imports, stores, arbitrates access and re-transmits documents and application data files (spreadsheets, CAD drawings etc) to clients for local editing and resubmission to the server.
  • chat facilities and optional text to speech (TTS) software can conduct real-time group chat.
  • the project-based, group browser provides, via an Internet connection (or alternatively via a simple TCP/IP network connection without the need for other web server software), a generic web interface, with functionalities already described in association with the project-based browsing method, enabling web surfing, providing web tracking history, bookmarking, establishing links, the creation of an HTML page or set of HTML pages, the posting of documents, pictures, database files and other media, as well as other features - all of which can be shared by the group.
  • any group participant can enhance the value of the collaboration by adding his or her own contributions (bookmarks, links, search results, new content, etc).
  • the group founder tailors the initial interface to indicate the name of the group, any relevant information, or group procedures or rules. Group members submit requests or suggestions to the group founder.
  • suggestions include attachments of documents of interest and research summanes on topics of interest, together with the researcher/group member's comments on each site in the ⁇ ng.
  • the group member can add the suggestion to the project tree structure at the appropriate point, such as under the member name or under a project folder that has to do with the particular topic.
  • the group founder creates a subdomain HTML page under the domain of the purveyor of the system. Similar to the Netscape Communicator or Internet Explorer, a participant can set his or her computer default home-page to this subdomain, the newly initiated project-based, group browser interface for the group.
  • the project-based, group browser is a secure application.
  • simple projects - such as friends wishing to share their interests, favonte web sites, family news, creating a wedding registry, etc.
  • a name and password would be sufficient to gain access to the full features of the project-based, group browser.
  • the name and password combination is the most prevalent access system on the Net today, used even by financial services such as E*Trade. If a higher level of security is required, digital signatures can be required of and issued to group participants. This would be an optional feature, like many others, that any group could itself choose to implement (either at the outset or as the project-based, group project evolves).
  • E*Trade application in which an individual account holder's data resides with E*Trade (unless downloaded for tax purposes, for example), all information that is generated through use of the project-based, group browser is accessed and processed remotely.
  • the purveyor of the system provides the technical infrastructure and services, including servers, dBs, firewall, hosting and web site services, etc.
  • a nghts management module is provided so that users can define and regulate several key aspects, such as: ( ⁇ ) who autho ⁇ zes adding or removing group members;
  • This control is provided through an access control matrix having tailored permission sets for each user or user types
  • the permission sets are determined by the group founder, meaning that a user with special privileges is able to define and determine the rights management structure for a project- based, group browsing project, using a flexible anay or options that would be provided through the browser software
  • the method 60 runs on servers 54 and systems provided by the purveyor of the system and managed by a system administrator.
  • the system administrator automatically upgrades the software for use by current project-based, group browser groups, so that the most up-to-date platform is always supplied.
  • technology advances e.g., broadband connectivity
  • new features video, audio, conferencing, etc.
  • none of the hardware or software that enables the project-based, group browser to run need be located at the client level.
  • individuals, such as the individual artists mentioned above need not concern themselves with technological complexities, capital expenditures and associated start-up issues.
  • the group better able to afford to use a highly evolved application, but they are free to devote themselves to the non- technology work and ideas in which they are interested
  • server-based embodiment is completely compatible with the client-side embodiment.
  • the project folders and research summanes created by the client-side application can be imported, synchronized and merged with the server-side application. In this manner, even when the server-side application is temporarily unavailable, inaccessible for some reason, or where the user has not subsc ⁇ bed to the server-side application, the user can continue to surf the Internet adding URL and commenting on their content.
  • the project-based, group browser operates as a subscription service, in which use of the browser is rented for a certain penod, subject to renewal. Rental fees are based on the number of participants in a browser group, with the ability to add or remove members (e.g., payment of a monthly rental fee). If a group member wishes to leave the browser group, they will simply cancel prior to the end of the subsc ⁇ ption period. Alternatively, a one-time start-up fee may be charged.
  • the method 60 encompasses, for a fee, other ASP applications that are automatically launched upon clicking on an icon of the particular element stored under the project name 100 of the group browsing method.
  • the method may be integrated to include management of e-mails, documents, and general files associated with a common project name 100.
  • This combined with the GUI 164' shown in FIG. 19 which includes a comment window 165, will enable navigation of the net, annotated with documents of other formats, to enhance the use of the net for instructional purposes.
  • users are directed to perform research on the Internet, one project at a time.
  • users are provided with tools needed to postpone possibly irrelevant research or research which should be directed to another project name, thus enabling them to perform research one project at a time.
  • a system administrator may monitor Internet usage on a user basis, granting or denying access to particular catego ⁇ es of sites, depending on the business goals of the enterprise.
  • the method demands the creation of an organized system of bookmarks and URL, organized in association with project names.
  • the method permits collaborative browsing in which the experience gained from one person's research can be shared (through notations and comments) with others within the orgamzation. Further, by e-maihng importable project summaries to clients or outside service providers, the expe ⁇ ence gained within an organization can be shared with those outside an organization.
  • the invention has a further technical effect m that the method causes the computer screen to present a user with control means which the user can use to more efficiently manage the downloading of information for viewing by the user on the computer screen.
  • the method 60 controls or directs an Internet research session, and discourages random downloads from the Internet.
  • the method upon access to a web page, permanently associates a URL associated with the web page with the user on a global navigation history associated with the project name accessible by other users. If the user merely activates the URL of the web page, the user may store the URL m a p ⁇ vate, user-editable presentation for later access, thus providing the user with a means of editably bookmarking interesting URLs while promoting focused research on the initial project, until the user has logged out of the project name. Still further, the method permits the storing for later access, and the p ⁇ ntmg of navigation history and research summary in association with a project name and user name. The resulting efficient acquisition of information is applicable industrially in every domain of technology.
  • the invention involves technical issues such as the ordering and control of the communication paths selected to access digital information on a network.
  • the figures illustrate one method for practicing the present invention.
  • the flow diagrams described herein broadly illustrate the logical flow of steps to perform one embodiment of the present invention. Accordingly, numerous steps may be added to, or taken away from the flow diagrams, irrespective of any occasional use of the term "optionally", without departing from the scope of the invention
  • the order of execution of the steps in the flow diagrams may be changed without departing from the scope of the invention. Additional considerations in implementing the method described by the flow diagrams may also dictate changes in the selection and order of the steps.

Abstract

A browsing method is provided which enables concentrated web browsing by requiring that a user concentrates on one project (100) at a time. The method creates a graphical user interface ('GUI') (164) having a project search capability and, during browsing, input fields which demand certain user responses and which enable the user to postpone executing a potentially unrelated line of research until such time as the project at hand is terminated. Thus, the method allows the time (154) shifting of less directed research sessions and by quantifying and allocating wasteful online time to the responsible parties. In this fashion, a user may be able to take advantage of interesting targeted banner promotions or to follow potentially interesting hypertext links at a time convenient to the project at hand and attributable to the project for which the potentially interesting research may yield a benefit.

Description

BROWSING METHOD FOR FOCUSING RESEARCH
BROWSING METHOD FOR FOCUSING RESEARCH
Technical Field
This invention relates to a method and system of viewing resources on a network and, more particularly, to a browsing method and system for inputting navigational instructions in a multi-server computer environment such as the "Internet".
Background of the Invention
The use of the Internet has seen rapid growth over the last few years, fueled in significant part by availability and use of web browsing software that permits access, via a graphical user interface ("GUI") to network servers which are part of the World Wide Web. These servers provide access to documents known as "web pages" or "web sites" using a Hypertext Transfer Protocol ("HTTP"). HTTP is an application protocol that provides user access to these web pages having vanous formats including text, graphics, images, sound, and dynamic features. Hypertext Markup Language ("HTML") is the standard page description language used with HTTP and provides basts document formatting. HTML allows a web page developer to specify these hypertext links to other servers and to other files. A user using an HTML-compliant browser may specify a link via a Uniform Resource Locator ("URL"). When the user does so, the client browser makes a transmission control protocol/Interface protocol ("TCP/IP") request to the server associated with the link and consequently receives the corresponding web page formatted according to HTML. Note that XML is a substitute for HTML.
The developers of prior art web browsers such as "MOSAIC", "NETSCAPE NAVIGATOR", and "MICROSOFT INTERNET EXPLORER" have focused their efforts on providing a rapid and efficient means for a user to access web pages having sophisticated graphical capabilities. Such web pages typically offer a wide vaπety of attention-generating features which include sound, animated graphics, banner advertisements, and continuously updated dynamic content, often tailored to a user's personal interests, side by side with lexically unordered hypertext links. These features, for the most part, improve the sensual expeπence a user has when researching the Internet and often distract the user away from their initial research goal. This distraction causes significant losses in productivity, as suggested by a widely known University of Michigan study which determined that an employee accomplishes almost twice as much by working on a single task for an hour than he does by working on that same task in 12, separate five minute intervals (cited for example in J. Harris Morgan, Can We Manage Time?, Texas Bar Journal, Vol 62, No. 7, 668 (July 1999)).
Intelhseek, Inc. of Cincinnati, Ohio, offers a method, known as "BULLSEYE" which uses automated agents to filter and find information which a user deems relevant to their search (see product information, available at http://www.mtelhseek.com). Further, search results may optionally be saved under a particular file name for later retrieval. Still further, a "tracking" feature permits a user to program an agent tracker to automatically retrieve information of interest to the user when the user is logged on to the Internet. However, the search itself is not attributed to any particular project name or file during the research. No features are provided to enable the user to re-access the saved research based on a key word search of such saved projects.
Another firm, WebKeys Incorporated of California, provides a method, known as "PROWLER" (information available at http://www.webkeys.com/aboutwk.htm) that requires that individual users log on to the Internet using an individual user name and password. Access to certain categoπes of websites (i.e., "All age", "Under 14, "Teenagers", "Adult content", and "Explicit violence/sexual content") is granted or denied based on privileges that are determined by a system administrator. Further, a navigation history, associated with the user, is saved for administrative censoring purposes.
Other web resources such as "WESTLAW" and "LEXIS-NEXIS" provide Internet portals or web pages that require login by ID and password (i.e., subscriber sites) in order to gain access. Further, prior to beginning research in these secure subscriber sites, a client matter number may be input, which, optionally, is checked against a database of the user's client matter numbers, to confirm accuracy. However, because these are not browser-based, the user may leave these subscriber sites and do other task/research on the Internet that is not attributed to the client matter number. Thus, little improvement over prior art systems or methods of performing Internet research is offered
Thus, no tools are available on the market that aid in directing or managing a user's Internet research such that one is able to concentrate on one project at a time. The lack of such tools is consistent with the name given the process of performing research on the World Wide Web, namely "surfing" or "browsing", terms which imply a rather undirected and undisciplined approach to doing research and the lack of a predetermined business goal. Consequently, as has been the expeπence with many businesses that are using the web for project research, much time is wasted as the users, distracted by the attention- generating features, spend employer or client time researching subjects of personal interest or of interest to another project. Such distracting features thus make focused research using the prior art browsing methods almost impossible.
Further, no secure and convenient means has been provided which allows access to documents posted on a publicly accessible server or intranet which does not require the manual input a decryption key, Further no means is available whereby, solely information input at the time of accessing the Internet or intranet, optionally together with an IP address, decrypts such information.
Still, further, no performance measures have been developed to enable Internet searchers to access their performance with respect to their level of focus.
Therefore, what is needed is a method and system which provides a graphical interface with which a user may interact which hinders random movement of a download request on the Internet from one server to another server, measures user performance, and helps ensure directed movement of a download request, relevant to a given project goal, thus better allocating human resources, minimizing online time and facilitating and promoting concentrated research directed to one particular project at a time. In particular, a browsing method is needed which minimizes the number of unnecessary or irrelevant research sessions, these sessions often representing unproductive diversions from project or business objectives and which permits secure posting of information on publicly accessible servers on the Internet or on an intranet.
Summary of the Invention
A browsing method and system are provided which solve the problems identified above by enabling concentrated web browsing through encouraging or directing the user's concentration to one project at a time. The browsing method is encoded on a computer readable and executable medium on a computer, such as a PC, a diskette, a server on the Internet, or the Internet itself. The software uses a custom Graphical User Interface ("GUI") having input fields that demand certain user responses and which enable and encourage the user to postpone executing a potentially unrelated line of research until such time as the project at hand is terminated. In this fashion, a user may be able to take advantage of interesting targeted banner promotions or follow potentially interesting hypertext links at a time convenient to the project at hand and attributable to the project for which the potentially interesting research may yield a benefit.
In addition, the system stores bookmarks and navigation history in association with project names, thus presenting users with navigation tools customized to the project at hand. Further, the system provides the option of printing reports of search sessions, thus permitting the navigation history information and time online to be maintained as a record in project files for later reference or for billing purposes. Therefore, an object of the invention is to dramatically improve the management and efficiency of web browsing as a tool to reach predetermined business goals. This is accomplished by attributing online time to a project name, focusing research on the project at hand, allowing the time-shifting of less directed research sessions and quantifying and allocating wasteful online time to the responsible parties.
In another feature of the invention, the method and system provide a convenient means to post and access information on publicly accessible servers on the Internet (or an intranet) in a secure manner
Brief Description of the Drawings
FIG. 1 is a block diagram of a system of the invention.
FIG. 2 is a block diagram of an alternate system of the invention.
FIG. 3 is a block diagram of a client/server architecture of the present invention.
FIG. 4 is a detailed diagram of a client server architecture of the present invention.
FIG. 5 is a relational UML class diagram of the method.
FIG. 6 is a flow chart of the method of the invention.
FIG. 7 is a plan view of a login window used in the invention.
FIG. 8 is an authorization table used in the invention
FIG. 9 is a log-off window of the invention.
FIG. 10 is a table showing the URL listings associated with the project names of the invention.
FIG. 11 is a table of Temporary Bookmark Listings of the invention. FIG. 12 is a flow chart of an off-line URL organization step of the invention.
FIG. 13 is a Graphical User Interface ("GUI") of the invention
FIG. 14A is a flow chart of a submethod of the invention which executes upon activation of a link.
FIG. 14B is a flow chart of an alternate submethod to that shown in FIG. 14A.
FIG. 15 is a secondary window of the invention.
FIG. 16 is a UML class diagram of a system administration module of the invention
FIG. 17 is a flow diagram of a submethod of the invention.
FIG. 18 is a flow diagram of a logout submethod of the invention.
FIG. 19 is a diagram of the layout of a GUI of the invention which enables a user to sequentially follow a navigation history created by another.
FIG. 20 is a flowchart of a submethod of the invention for activating forward and back icons which navigate sequentially between content saved under a project name.
FIG. 21 is a flowchart of a submethod of the invention operating on a server that scans and updates the bookmarks and other content on a browser when the server is accessed.
Detailed Description of the Preferred Embodiment
Referring to FIG. 1 which is a block diagram of a typical system 20 for practicing the vaπous embodiments of the present invention, the client browsing method 60 of the present invention is encoded on a computer-readable medium and manages access by users using a computer system 20 to a network of servers 54 and 54'(shown in FIG. 2) such as the Internet. Such a computer system 20 typically includes a computer 22, a display device 24, an input device 26 such as a keyboard, a primary storage device 30, a secondary storage device 32 and a plurality of resources 23. Each resource 23 is operatively coupled to at least one of the computers 22. Resources 23 include, but are not limited to, printers, databases, special-purpose servers, secuπty devices, modems, etc.
After loading of software encoded with the method 60 of the invention, the display device 24 displays a graphical user interface ("GUI") 34 for facilitating the display of text and graphics for the user. Display devices 24 include pπnters and computer display screens such as a CRT, LED displays, and LCDs. Input devices 26 are numerous and include keyboards and pointing devices such as a mouse 27 having a left mouse button 28 and a right mouse button 29, a trackball, hghtpens, thumbwheels, digitizing tablets, microphones using voice recognition software, and touch screens and pads.
The computer 22 includes a CPU 36 as well as other components with which all who are skilled in the art are familiar. For a detailed discussion of these components and their interaction, see U.S Pat. No. 5,787,254, the content of which is incorporated by reference. The secondary storage 32 supports the browsing method 60, preferably HTTP-compliant, as well as a number of Internet access tools The secondary storage 32 may also support other Internet services including mail transfer protocol (SMTP), e- mail, file transfer protocol ("FTP"), network transfer protocol ("NNTP") or "usenet" and remote terminal access (Telnet) The CPU 36 fetches computer instructions from primary storage 30 through an interface 40 such as an input output subsystem connected to a bus 42. A relational database 53a in which data and relations which are shared by users, is stored in primary storage 30 and be accessed via file-server protocol. The computer 22 can be, but is not limited to , an "IBM APTIVA" computer, a product of International Business Machines Corporation of Armonk, New York, or any computer compatible with the IBM PC computer systems based on the X86 or Pentιum(TM) series processor of Intel Corporation or compatible processors, or any of the "SPARC" station or "ULTRA" workstation computer systems available from Sun Microsystems, Inc. of Mountain View, California, any "MACINTOSH" computer systems based on a "POWERPC" processor and available from Apple Computer, Inc. of Cupertino, California. The CPU 36 utilizes an operating system which, depending on the hardware used, may be DOS, "WINDOWS 3.X", "WINDOWS 95", "NT", "OS/2", "AIX", "LINUX", or any other suitable operating system. The CPU 36 executes these fetched computer instructions. Executing these instructions enables the CPU 36 to retrieve data or write data to the primary storage 30, display information on one or more display devices 24, receive command signals from one or more input devices 26, or transfer data to secondary storage 32 or even other computer systems which collectively form a computer network 25 (shown in FIG. 2). Those skilled in the art understand that primary storage 30 and secondary storage 32 can include any type of computer storage including RAM, ROM, application specific integrated circuits ("ASIC") and storage devices which include magnetic and optical storage media such as a CD-ROM.
The primary storage 30 stores a number of items including the method 60 and a runtime environment 46. The runtime environment 46 typically is an operating system which manages computer resources, such as memory, disk or processor time, required for the method of the invention to run. The runtime environment 46 may also be a message passing system, a microkernel, dynamic loadable linkable module(s), or any other system which manages computer resources
Referring now to FIG. 2, an alternate system 21 implementing the method 60 of the present invention is shown. The system 21 includes client computers 22 arranged in a network 25 and a firewall 27 which interfaces with an online service provider 28 such as CompuServe, America Online, a subscπption resource (such as "WESTLAW") and/or an Internet access provider 29. The online service provider 28 and Internet access provider 29 connect to a network 31 of servers 54 which comprise a portion of the Internet.
FIG. 3 illustrates a block diagram of a client/server architecture which can be utilized in accordance with the method 60 of the present invention. User requests 50 for information are sent by a client application program 52 to a server 54. The server 54 can be a remote computer system accessible over the Internet or other communications medium. Client application program 52 may be utilized with computer 22 of FIG. 1. Server 54 performs scanning and searching of raw (e.g., unprocessed) information sources (e.g., newswire feeds or newsgroups) and, based upon these user requests, presents the filtered electronic information as server responses 56 to the client process.
FIG 4 illustrates a detailed block diagram of a client/server architecture which can be utilized in accordance with the method 60 of the present invention. Although the client 52 and server 54 are processes which are operative within two computer systems, these processes being generated from a high-level programming language (e.g. PERL), which is interpreted and executed in a computer system 20 at runtime (e.g., a workstation), it can be appreciated by one skilled in the art that they may be implemented in a variety of hardware devices, either programmed or dedicated. Client 52 and server 54 communicate using the functionality provided by an HTTP connection 72. The World Wide Web includes all the servers adhering to this standard which are accessible to clients via Uniform Resource Locators ("URLs"). Active within the client 52 is the browser method 60 of the present invention, which establishes the connections with the server 54 and presents information to the user. Server 54 executes the corresponding server software which presents information to the client in the form of HTTP server responses 62. The HTTP responses 62 correspond with web pages represented using HTML or other data which is generated by the server. A web page contains data and a layout language which describes how data should be displayed. The layout language used within each web page is predominantly HTML, but may also include "JAVA", "JAVASCRIPT", VRML, or any other language which supports hypertext functionality 64. The user views a web page (e.g., 152 of FIG. 13) from the World Wide Web using the browsing method 60 of the present invention. The browsing method 60 accepts the data and the layout language and in response, produces a graphical image containing hypertext links along with text, graphics, and various other types of multimedia. The tools needed to implement the browsing method 60 are known in the pπor art (e.g., see background section). In addition to the HTML functionality 64 provided by server 54 (i.e., display and retneval of certain textual and other data based upon hypertext views and selection of items), a Common Gateway Interface ("CGI") 66 is provided which allows the client program to direct server 54 to commence execution of a specified program contained within server 54. This may include a search engine which scans received information in the server for presentation to the user controlling the client. Using this interface and the HTTP responses 62, the server 54 may notify the client 52 of the results of that execution upon completion of the program steps.
Further, because HTTP is a stateless protocol, every user request 50 for information from the server 54 is treated independently, with the server having no memory of previous connections. This statelessness results in the rapid and efficient transmission of hypertext documents (e.g., the web page 152 of FIG. 13).
There are four states to a HTTP connection 72. First, the connection 72 is opened. This means that contact is made between the client computer 52 and server 54 at the Internet address and port number specified by the URL. Second, the client 52 sends a message to the server 54, requesting service. This user request 50 is made up of HTTP request headers that define the "method" requested for the transaction and provide information about the capabilities of the client 52, followed by the sending of the data to the server 54. Typical HTTP methods are GET, for getting an object from a server 54, or POST, for posting data to an object on the server. Third, the server 54 sends a response to the client 52. This consists of response headers describing the state of the transaction, followed by the actual data. Fourth, the connection 72 is closed. This procedure means that a connection 72 can download only a single document or process a single transaction while the stateless nature of the transaction means that each connection knows nothing about the previous connection. Referring again to FIG. 2, where the method 60 operates on an intranet 25, the relational database 53 is a client-server type 53b The advantage of use of a client-server database 53b and access system is that processing on the database server 54'does not affect processing on the client 52. Either type of database 53a or 53b may be defined and managed by "PARADOX" software, by Borland International, Inc., of Scotts Valley, CA.. PARADOX for DOS is a relational database that has features required for storing, viewing, printing, changing, sorting and finding data in tables such as Table 7. PARADOX has a character user interface (CUI), supports a mouse and WINDOWS in that environment, and, together with its query by example (QBE) facility, provides all the tools which a person of ordinary skill will require in order to develop the relations and tables of the method
Where WINDOWS NT is the operating system, Microsoft Development Tools for Rapid Application Development can be used to define the database 53 to interchange data in a manner required in the method 60. Shared data, such as project summaries, project descriptions, etc., is shared in the form of a "virtual desktop" whereby computer systems connected in a network may be operated peer-to-peer with resources shared over the net Further, time may be aggregated from all "virtual" and "LAN" desktops working on a given project.
Alternatively, a Microsoft "ACCESS" relational database, running under Microsoft "WINDOWS", may be used. An "ACCESS" database is a relational database in which data is stored as a number of tables. Each table consists of a number of "records" (e.g. for different project names 100) and each record contains a number of "fields", such as "group/category", "temporary bookmarks", "global bookmarks", or "research session". Where fields in two different tables take values from the same set, they are referred to as being shared fields. Shared fields have the same value and may therefore be shared between two or more tables. These fields are interrelated via a "join" operation which joins related records in the two tables. Often, but not always, these shared fields will have the same name across related tables. Further, ACCESS permits the filtering of records according to certain criteria and the searching for particular field values.
Referring now to FIG. 5, a schematic, Unified Modeling Language ("UML") class diagram is shown which defines the basic relations across fields of tables stored in the relational database 53. Definitions of UML Class notation are available on the Internet at http://www.rational.com uml. For example, according to the given notation, any one ("1") user in a user field 226 is joined to any number (".") of GlobalMarks in a GlobalMark field 228 (where the user is the pioneer user), any number of Temporary Bookmarks ("TBMs") in a temporary bookmark field 230, any number of groups in a group/category field 232 (and vice versa), and any number of research sessions in a session field 234, the user being generally associated with a participator field 236. Further, any name of a project folder (i.e., a project name 100) in the project field 238 is associated with any number of sessions in the session field 240, any number of GlobalMarks in the GlobalMark field 228, and a defined number of AccessTokens in the AccessToken field 242. A VisitMark field 244 indicates which URLs have been marked for deletion A location field 246 associates each URL with a description A SearchLocation field 248 associates keywords with each URL. The Project field 238 associates a project description with a project name 100. A ProjecfBookmark field 250 associates URLs with project names 100.
Referring now to FIG. 6, a flow chart of the browsing method 60 of the present invention is shown. The method 60 is implementable on the Intranet 25 or a standalone PC 22. Where, m an intranet context, «other users» refers to either other users of the standalone PC 22 or other users of the intranet who use the method for collaborative browsing, and the term «network administrator)) is interchangeable herein with the term «guardιan» (a supervisor such as a manager or a parent in the event that the system is used at least m part for censorship purposes), as the case may be.
The browsing method 60 is encoded on a computer-readable medium. The method 60 is implemented in software which instructs a microprocessor to manage system components, inputs and outputs in a manner which controls access to the Internet. The method 60 includes an access control matrix having at least the parameter of project name 100 which must be input in order for access to the Internet to be permitted. When a data string associated with this parameter is received, the data stπng is classified and filtered against the access control matnx. If the data stπng includes a stnng identified as a project name 100, access is permitted; otherwise, access is limited (e.g., only a limited number of preapproved web pages may be accessed, such as a page providing instructions on how to use the method) or denied altogether. It is also beneficial to include as required parameters a user name 90 and a password 92, in order to be able to measure and compare user performance in Internet research.
In a first step 80, by clicking on an icon for example on the user's desktop, the browsing method 60, operating on the system 20 of the invention, is loaded into the working directory of the computer 22
In a second step 82, the method then presents an input window (similar to that shown in FIG. 7) in which the user inputs an individual user name 90 and an individual user password 92 (if the system is configured for multi-user access, this may be omitted if only one user is permitted to access the PC). If this information is correctly input, the user then logged on to a PC -resident HTML page. This page includes links to subpages and to other pages on the Internet, preferably on a subject related to the target market of the software (for example, legal links would be provided if the software is customized for the legal market).
In a third step 84, upon clicking on a drop-down menu item entitled "begin new project", the method 60, using the display device 24 of the computer 22, then presents the user with a selectable presentation of frequently used bookmarks or URLs. Optionally, entire contents of web pages may be saved in memory, to aid in off-line research. If another drop-down menu item, entitled "Begin Session" is selected, the method 60 goes to step 86.
Referring now to FIG. 7, optionally, the method 60 presents a single input window 101 in which the individual user name 90, the individual user password 92, the project name 100, and, optionally, subproject name 103 (e.g., for project name "TELEPHONE", the subproject name might be "LONG DISTANCE PROVIDERS") are input. If all required fields are completed correctly, then the method jumps to step 102. Further, finding aids such as a browse project name button 105 may be added, should the user not know the name. Clicking on the "browse project name" button 105 calls up a listing of project names 100, possibly alphabetically listed, from which the user, using the cursor 156, may activate and choose by clicking, or to compare his project name 100 with, to determine whether he made an error in recording the project name. Research results associated with any subproject names 103 are stored m association with their root project name 100. Further, a begin new project button 107 returns the program to third step 84, above.
In this manner, access to the ordinary user is permitted only upon identification of the user and the project with which the research is associated, thus defining a current research project. More importantly, the ensuing online activity, whether on a proprietary server or on the public Internet, is attributable to this individual user name 90 and project name 100.
In the fourth step 86, if one of these links is selected or if this URL listing is bypassed (by, for example, declining its use via a check box or other input device and directly inputting a URL into the location field 176) and if the user did not already create a new project name 100' by searching and merging URLs (in which case, the project name 100' is input automatically as the project name 100), the method 60 presents the user with an input window (such as window 101 of FIG. 7) in which the user must input an individual project name 100, such as PERSONAL or CLIENT 082361. After the user transmits the entered information, the method 60 compares the input name 100 with each name in an approved project name table stored in computer memory. If the input project name 100 does not match a previously saved project name, the user is prompted to verify that this is a new project and to input a descπption of the project (optional) to be used, for example, in providing a basis for key word search associated with a modified third step 84, descπbed in detail below. To further insure that a new project name 100 is not entered incorrectly and/or to ensure that any research project be attπbuted to a preapproved research subject (such as PERSONAL, or TELEPHONE, or BUSINESS RESEARCH), the method declines access to the Internet unless the input project name matches an existing listing of preapproved project names including such geneπc project names mentioned above which are stored in a relational database management system running a relational database 53.
In a fifth step 94, after the user has input the required information, he is then presented with any associated (with the project name 100 and the user name 90) TBM Listings (in HTML format and described in detail below in association with FIG. 11) from which he can initiate a new search. Optionally, the user clicks on button 101 which e-mails the TBM listing to an e-mail address designated by the user (such as his personal address), for later use. The clicking opens an e-mail addressed to a preselected address, and includes the URLs of the TBM Listing, either as an attachment or in the body of the e-mail. It should be noted that the research summary or global navigational history shown in FIG. 10 can also be saved as an attachment in an importable form and e-mailed to a third party. If the third party has a compatible browser, the third party may import this data and use it to launch their own research.
Now referring to FIG. 8, in a sixth step 102, particularly where multi-user access is permitted on a standalone PC or an intranet, the individual user name 90 and project name 100 are checked against permissions or AccessTokens in an authorization table (Table 1 of FIG. 8) stored in the relational database 53, to determine whether or not that particular user is permitted to work on the named project 100 and if so, whether the restπctions on use apply (a guardian or system administrator determines the limitations which apply to a given user or project: only he may change these restrictions, as directed by company management for example) If there are no applicable restrictions indicated in the authorization table, the user is permitted to continue. If there are, the user receives an error message informing him that he is not authorized, is given the opportunity to end the session, begin another project, or browse project names 100. Such a means of limiting access to research results will be particularly important in a litigation firm context, where a Chinese wall has been set up between one litigator and another, due to a potential conflict of interest and in the context of posting and accessing confidential documents on a publicly available server 54 (described in more detail below) If there are no applicable restrictions indicated in the authorization table, the user is permitted to continue. Further, users themselves may restrict access (in so far as the system administrator permits them to do so by for example, responding to an e-mail request to modify the user authorization table) to project names which they themselves created
Further, the user (or the system administrator) can limit access to such projects (over which they have control) to categories/groups of other users, such as management, staff, secretaπal, attorneys, paralegals, etc. For example, the user accomplishes this by checking off a dialog box when the user logs off the current project name 100 as shown in FIG. 9. A log off window (not shown) is presented to the user when the user activates a log off feature (such as a pull-down menu, an icon, or answering appropπately to a dialog window presented, asking if the user wishes to continue or terminate the current research project). An optional window 157 is then presented, which includes, for example, the text "permit access to the following categoπes: [ ] all: [ ] administration, [ ] lawyers, [ ] staff Checking off any box will limit access to the extent of the user category. In other words, the user will generally have the authority to limit access to anyone in the same category, or of a category which plays a support role in relation to the user. However, certain categoπes of users ("pπvileged users") will always have access to research results, such as the system administrator or the responsible attorney in charge of a particular client, or the employee's direct supervisor. When a pπvileged user seeks access to a particular research result associated with the project name 100, the method 60 accesses the database 53 (described in detail above in connection with FIG. 5) and checks the user authorization table to determine whether the pnvileged user is the supervisor of the user who performed the research, or whether he is categoπzed in a privileged level with respect to the user whose research results are sought. If so, the user is granted access, unless otherwise denied by the system administrator (such as in the case of a Chinese wall).
Refernng now to Table 2 of FIG. 10, in a seventh step 104, if a previously saved URL Listing, Navigation History or Research Summary exists in association with the project name 100, the user is presented with the associated URL Listing, including all URLs saved in association with the project name 100, or SessionMarks created m a research summary/navigation history associated with the project name (again, see Table 2 and FIG. 5). This summary shown in FIG. 10 may be recalled and brought to top of the user's screen at any time during the research session by simply clicking on, for example, a special icon on the field 154 of the GUI 34 (shown m FIG. 13). In an eighth step 106, upon the input of a user command ordeπng the downloading of information located on the Internet (such as by clicking on a hypertext link), the log on to the Internet is made (wherein the user name and password for access to the ISP is input), an HTTP connection 72 to a desired server 54 is established, a time Tl is read from the system clock and stored in RAM, a buffer memory or a cache, and the URL is checked against the global navigation history, including the GlobalMarks 228 associated with the project name 100 to see whether the URL is being accessed for the first time. If so, the URL is added to the listing and the user name 90 is listed in Col. 6 of Table 2 as the pioneer user associated with the URL link. The number "1" is attributed to the counter associated with this URL. Otherwise, the counter associated with this URL is incremented and the number stored in Col. 5 of Table 2. In a ninth step 110, the user is provided with the opportunity and means to perform his research. In a tenth step 112, concurrently with the research, the navigation path of the research is tracked and stored by any number of suitable methods, such as that descπbed in U.S. Pat. Nos. 5,717,860 and 5,712,979, the contents of which are incorporated herein by reference. The system clock is read at each change in URL and the time TN of the change noted, in order that a time TURL [=(TN - T(N.,,)] may be associated with each URL, indicating the amount of time the user spent at that URL, which is then recorded in Col. 5 of the «Research Summary)) of Table 2 of FIG. 10. Further, routinely, all URLs are checked against those in the global navigation history associated with the project name 100 and when accessed for the first time, the user name 90 is added to Col. 6 of the «Global Navigation Hιstory» in Table 2, m association with the URL, and the counter initialized. If the URL is not accessed for the first time, the associated counter is incremented.
In a special feature, the downloading of web pages is indicated by a light icon (not shown) which flashes by changing color between red and green duπng downloading. Each web page associated with the project name 100 may have keywords or comments stored in association with it. These comments or keywords are input by a user upon the creation of a new project and are stored in a corresponding relational database field in association with the project name 100. A scan submethod scans the text of each downloaded page for words which match these keywords or comments. If a match is found, the submethod changes the color of the light icon from red to green and stops its flashing. Thus the user can quickly see whether the downloaded page is not relevant to the project name 100 while at the same time receiving an indication that online activity is underway.
In an eleventh step 114, the user ends his research session. The total time Tτ, spent on researching the project name 100 is calculated using conventional methods and is recorded in the research summary section of Table 2. Here, the user may close the connection or indicate that a new research session should begin. If the user chooses to end the research, this begins the logout process 116 which includes a twelfth optional step 120 and a thirteenth step 122. At this point, optionally, the user may display the research summary, and edit the bookmarks which he added duπng the session. He may also mark any sites which are attributable to him (as the pioneer user) either in the global navigation history or the research summary, for deletion, but he may not delete them himself (unless he is the system administrator). The marking tags these records in the file in which is then stored in memory, for easy retrieval by the system administrator or guardian upon scanning the memory for such marked records. Further, such marking for deletion moves the bookmarks or URLs off of the Research Summary and/or the Project Global Navigation History (see Table 2) page and onto a page which is hypertext linked (via a link entitled "Marked for Deletion" for example) to the page on which the summary and navigation history are listed. In this manner, when the Research summary or report as laid out in Table 2 is printed, any links which are marked for deletion are not printed, thus permitting the placement of the summary in a client's file without including any potentially embaπassing or unprofessional information thereon (a "marked for deletion" notation on the print out makes sense because the deletion of sites which are not of interest to a client is an administrative task). Further, the system administrator (or guardian) may then delete these marked records, and adjust the user authorization table appropriately (e.g., if the system administrator finds that a user has marked for deletion a series of sites that fit a particular category to which the system administer may block access in the user authorization table, he may so adjust the user authorization table in order to prevent this content from being accessible to the user.
In the twelfth step 120, the research summary of the session (Table 2, Section 3) is saved in the database 53 for common access and for presentation upon the user's or another privileged user's next login under that project name 100. The research summary includes the individual user name 90, project name 100 and navigation path or history 124 (shown in FIG. 10) of the last research session.
In the thirteenth step 122, the method 60 presents the user with the opportunity to print out the research summary, project navigation history, and/or associated bookmarks, for placing in an associated file for later reference. The printout may simply be that of Table 2 of FIG. 10. For example, the user is presented with an input screen which queries the user as to whether he would like the individual user name 90, project name 100 and navigation history 124 printed out. If the user answers affirmatively, the summary is submitted to a printing cache of a connected printer for printing.
In a fourteenth step 126, the user is queried as to whether he would like to begin another research session and if so, the method 60 returns to step three 84 above, the input window 101 of FIG. 7 (wherein the user name 90 and password 92 are automatically input into the windows, or, if the TBMs were created during the research session, the method returns to step 86 above and the TBM listing is presented, carried over to the next research session. If not, the connection closes, the user is asked whether he wishes to save any TBMs created during the research session. If the user responds in the negative, any unsaved TBMs are automatically deleted and the method 60 ends. If the user responds in the positive, the TBMs are saved in association with the project name 100 for presentation, in a selectable form in chronological order with other TBM listings, next time that step 94 is executed.
In an alternative embodiment to the method 60, the second step 82 and third step 84 may be reversed. Further, referring again to FIG. 6, the third step 84 of presenting frequently used URLs is performed in the following manner. In a first substep 130 of the fourth step 86, the method 60 provides a pull-down menu or a dialog window 137 (such as that shown in FIG. 13), which permits the user to perform a key word search of all descriptions of project names 100 previously searched by others, including any associated or unassociated (i.e., all) bookmarks (by name and by associated description of the bookmark). In a second substep 132, after input is received from the user, any descriptions, project or bookmark names matching the search criteria are presented to the user in a selectable format such as a URL and description listing in the form of a research summary such as that shown in FIG. 10.
Further, to economize display screen space and computer memory, the research summary may include shortcuts to folders of links common to a particular type of research, thus not requiring duplication in each related project research summary and providing easy access to frequently referenced links. These shortcuts may be dragged and dropped into the URL listing in the research summary using, e.g., a project management subroutine controlled by a sub-interface. For example, it is convenient for each project name 100 having to do with patents to have a "patent search" folder of URLs. This folder is actually a hypertext-type link to a single global folder such as that shown in the upper portion of FIG. 10, which might have links of particular interest to patent related projects
Depending on global system administrator settings, the project names 100 presented may be limited to those which the user is authorized to view and/use, using the user authoπzation table 1 of FIG 8. Pπor to display, the search results are scanned to identify and automatically delete any duplicate URLs from the project global navigation history or bookmarks. Further, the user may edit the presented listing for saving in association with a project. Alternatively, the user may begin his search using the bookmarks which he has saved for general use, as is the case in the prior art. In a third substep 134, after any editing, the method prompts the user for a project name 100 (and subproject name 101, as the case may be) with which to associate the edited URL listing.
In a fourth substep 136, if a project name is input, the selectable listing is saved in association with project name 100 for later access and the user is prompted to input a project descnption (to permit key- word searching by project name). Then, when the user inputs a project name 100, the method saves the selectable presentation of matches as the bookmark listing associated with the input new project name 100' and the new individual user name 90. This is done off-line. Then, the submethod returns to the method 60, the fourth step 86. Thus a user who has little knowledge as to how to begin the research session will be able to take advantage of the navigation history and associated bookmarks that others have created on similar projects before accessing the Internet. This saves the user a substantial amount of time by enabling him to benefit from prior similar research performed by others who may have more experience than himself. This saves money as well, as on-line time is minimized. The method 60 further provides the user with an option enabling the user to focus the key word search on only those projects which he has previously worked on, by scanning saved URL listings for his individual user name and presenting only those navigation histories and/or bookmarks associated with these project names 100
In a modification of the above embodiment, in the first substep 130, the user may search by his or another's user name, and receive all URL listing which he or another user (to the extent of his authorization to receive such information from the other user) in listing form. The method then returns to the third substep 134.
In another embodiment of the method 60, the third step 84 provides the search input field 137 (shown in FIG. 13) and search engine (such as that descπbed in U.S. Pat. No. 5,864,863 to Bunows, U.S Pat. No. 5,933,822 to Braden-Harder et al. and U.S. Pat. No. 5,924,090 to Krellerstein, the contents of which are incorporated herein by reference) together with canned, pre-organized listing of bookmarks which are pre-loaded in the method, after learning of or estimating/projecting the likely needs or requests of the user. The search engine searches the bookmarks using keyword inputs of the user. For instance, if it is determined that the method 60 is to be sold to a litigation firm, bookmarks and sample searchable projects associated with a project name and potentially relevant URLs are added in order to provide the user with an initial off-line listing of research tasks which are commonly performed among such users In the case of users working in litigation firms, research tasks such as seeking paralegal service providers, sources of information regarding local or national courts, SEC filing information, private investigation services, corporate address information and officer biographies, telephone or Internet services, computer support services, web page development services, etc., including URLs addressing websites having listings of FAQs and sources of other helpful background information of the user are provided. The prepackaged bookmark or URL listings are associated with a readily recognizable generic, descriptive project name 100 and project descnption and generated by experts in the field who have actually performed a typical search. This navigation history generated by these expert searches is pre-packaged in association with generic project names 100. Because bookmarks are saved in association with user name, the user can execute a keyword search constrained to a project name 100 as well as a particular user name 90. This would be particularly useful in large organizations with multiple departments.
In another modification of the method 60 of the invention, using a suitable method such as that described in U.S. Pat. No. 5,826,267, the content of which is incorporated herein by reference, after step 106 of method 60 above, wherein a user using a client computer 22 initiates a request for information and the request for information is interpreted and retneved, the URL is filtered against a listing of unapproved URLs and, if unapproved, the download is terminated prior to the document being transmitted to the client computer and displayed. Optionally, identifying code of banner advertisements are detected and such advertisements are stnpped from the HTML code prior to the CGI reassembling the page for presentation to the user by the browser.
FIG. 12 illustrates a GUI layout 150 in which a sample World Wide Web page 152 is displayed in accordance with the method 60 of the present invention. A GUI is a type of display format that enables a user to choose commands, start programs, and see lists of files and other options by pointing to pictoπal representations, called "icons", and menu bars and/or buttons 154 allowing the selection of menu items from pull-down lists on the display device. Choices can generally be activated by either a keyboard 26 or a mouse cursor 156 The size and position of elevator 160 within scroll bar 162 corresponds to the size and position of the current viewable page m relation to the document displayed within window 164 In the example window 164 depicted, because sample web page 152 includes too many pages to view simultaneously, the user can position the mouse cursor 156 over the arrow section 166 or arrow section 170 of scroll bar 162 and click a pointing device (e.g., the mouse 27) to scroll the document upward or downward, as appropπate. Scrolling in this manner permits viewing of any desired portion of the document. Arrow sections 172 and 174 allow a user to scroll respectively left or right. Window 174 is a location field indicating the cwrent URL address. The location can be changed by manually entering a URL into field 174 or selecting a URL from a pull-down navigation history 124 as m the prior art. A hypertext link 180 permits navigation between the current page 152 and the page referenced by a URL address associated with the link, discussed in more detail below. Window 182 includes the description of the page 152, taken from the corresponding tag of the page itself. A window 154 indicates the current amount of time on-line for the current project 100. Optionally, the GUI 150 may have a banner display field 184 where display advertisements may be presented, preferably screened or filtered by a suitable method such as described in U.S. Pat. No. 5,826,267 so as to present only approved advertising banners which may be selected based on their relevance to the research goals of the project.
The links 180 point to Internet services which are typically accessed by specifying a unique address or URL which is associated with the link. URLs can point to numerous resources on the Internet, including HTML documents, pictures, sound files, movie files, or database search engines including specific search queries. URLs can point to resources located on the client computer 22, or anywhere on the Internet. They can be accessed either through an HTTP server or another Internet server running on top of TCP/IP. The URL may also direct the server computer to run another gateway program and return the result to the client computer 22.
The URL has two basic components, the protocol to be used and the object path name. For example, the URL "http://uspatentinfo.com" specifies a HTTP and a pathname of the server hosting http://uspatentinfo.com. The server name is associated with a unique numeric value (TCP/IP address). In the example depicted in FIG. 13, the "PATENT.INFO" home page includes links 180 which are typically underlined or highlighted to indicate the presence of a URL address link. Using a prior art browser, if a user wishes to go to the linked page, the user places cursor pointer 156 with a mouse 27 or other pointing device over the link 180 and activates the pointing device to access the linked page or document.
The hypertext links 180 are important because they facilitate access to web pages over the vast network of the World Wide Web. HTML commands, called "tags", mark text as headings, paragraphs, lists, quotations, emphasized, and other formatting information. HTML also has tags for including images within the document being read to other documents, fill-in forms 70 (see FIG. 4) that accept user input, and hypertext links 136 connecting documents being read to other documents or Internet resources such as FTP sites, WAIS databases, USENET news, e-mail, gopher sites, or another HTML document. This feature allows the user to click on a string of highlighted text and access a new document, an image, or a sound file from a computer within the network anywhere in the world. The element marking a hypertext link 180 in a HTML document is referred to as an "anchor" or "element" and the marked text is referred to as a "hypertext anchor" or "anchor tag". The anchor tag has a destination portion and a text portion. Furthermore, the anchor tag is delimited at the beginning by an "<A>" and at the end by an "</A>" character sequence. The destination portion contains an entry which indicates the location of the destination web page. The text portion is the text which appears on the GUI 150 and is associated with the hypertext link 180. For example, consider a hypertext link 180 having the following HTML anchor tag:
<A HREF=http://uspatentinfo.com> The Patent.Info Home Page</A>.
The destination portion of this tag is "http://uspatentinfo.com" (shown in field 176 of FIG. 13). The text "The Patent.Info Home Page" (shown in field 182 in FIG. 13) occupies the text portion of the HTML based link. A web page contains a list of anchor tags which describe hypertext links in HTML. The browsing method 60 of the present invention processes these anchor tags and displays coπesponding hypertext links 180 to the user on the display device 24. An anchor tag can be modified such as to prevent access to an associated site, as described in U.S. Pat. No. 5,826,267.
In addition, there are numerous links tags in HTML to enable the viewer of the document to jump to another place in the same document, to jump to the top of another document, to jump to a specific place in another document, or to create an jump to a remote link (i.e., via a URL) to another server. Links 180 are typically displayed on a web page in color or with an underscore or both. In response to the user pointing and clicking on the link 180, the link is said to be "activated" to begin to download of the linked document or text.
Refeπing now to FIG. 14A in which a flow chart of a submethod 190 of the method 60 is shown, the submethod runs during step 110 of the method. The user is provided with a means of choosing this option, via a drop-down menu with a "set options" selection. The submethod 190 modifies the method of the prior art of selecting hypertext in which pressing the left mouse button 28 while the cursor 156 is over a link 180 initiates the downloading of the linked document (i.e., by clicking on a hypertext anchor normally displayed as a hypertext link 180 within a hypertext document displayed on a client computer's display 24) and clicking on the right mouse button 29 provides the user with a menu of actions to choose from.
In a first substep 192, the user places the cursor 156 over the hypertext 180 of interest, thereby activating the link.
In a second step 194, the user decides whether to click on the left mouse button 28 or the right mouse button 29.
In another substep 196a, if the user clicks once on the hypertext anchor using the left mouse button 28 (or analogous action), the submethod 190 reminds the user of the current project name 100 and solicits the user's confirmation that the research sortie or session, which the user indicated he wished to initiate by his clicking on the link 180, is to be associated with the current project name or a new project name 100' (i.e., window 200, shown in FIG. 13, is presented). Further, substep 196a of the submethod 190 solicits the user's comments or review of the contents of the currently downloaded page via a clearly marked input field 199 in the window 200' . These comments, whether they be text or a sound file (such as a .wav file), are saved in a designated search field for a search routine that enables searching by key word or for reference to aid in determining whether the associated web site may be of interest to the user.
In substep 196b, if the user confirms association with the current research name 100, the submethod 190 continues research by retrieving the information and transmitting it to the client computer 22. The time TN is then stored in a buffer and the URL is stored in the navigation history file. Confirmation of the association may be solicited in a number of ways. In one embodiment, the submethod 190 activates and displays an input or secondary window 160 (shown in FIG. 13) which prompts the user to press an icon or other button using the mouse cursor 156 to confirm that the project name 100 is not to be changed. If the user confirms by, for example, clicking "yes", the research session is associated with the current project name 100, and as stated of substep 196b, the submethod 190 continues. In substep 196c, if the user clicks "no", the submethod 190 queries the user to determine whether he wishes to create a TBM, thus allowing the user to temporarily save the URL for later access and continue with the current research project. If the user so desires, by responding in the affirmative, then the TBM is saved and the step goes directly to substep 196b and the research continues.
In substep 196d, alternatively or together with the TBM feature, the user may use the associated bookmark feature.
Thus, in substep 196d, if the user responds in the negative, the user is asked whether he wishes to save the URL in association with another project name 100' (as an "Associated Bookmark") and if so, the user inputs the project name 100', a description (optional), and the URL is stored in the URL Listing in association with the project name indicated, optionally highlighted or italicized (see Table 2, under Associated Bookmarks: "SEC FAQ") to indicate that that URL has not yet been accessed and permitting identification of the URL during a later research session. The user's individual user name 90 may optionally be associated with this as well, to permit easy identification. Provided that the user was the first to create this Associated Bookmark (as indicated in the second column of the Associated Bookmark section of Table 2), permits temporary and editable storage of the bookmark to the potentially irrelevant site (with respect to the current project 100) in association with his "personal" or another project name 100. In this way, the user is provided with freedom to navigate to potentially irrelevant sites.
In substep 196e, if the user indicates "no" once again, a new research session 100' is initiated and associated with the new project name 100'. Thus, in this substep 196e, the user must input the new project name 100'. After the project name 100' is input, the system clock is read and the time TN is used to calculate the total time on the prior project name 100 and to initialize the clock to commence tracking the time on the new project name 100', using methods well known in the art.
Then, in substep 196f, the submethod 190 retrieves the requested information and transmits it to the client computer 22, where the HTML is compiled into a hypertext document and displayed. When a new URL is used and the associated site is accessed, the user name 90 of the first user to access a site listed on the navigation history (the "pioneer user" indicated in Table 2) is associated with the navigation history, permanently stored in the URL listing in association with the project name. The URLs in the navigation history cannot be deleted by the user—only the system administrator or guardian or other privileged user can do this. Then, if the user/employee actually visits a site unrelated to the current project name 100, he must reflect upon the fact that his individual user name 90 will be associated with the URL on the permanent navigation history listing which is either available for presentation to all who perform research under this project name 100 in the future, a supervisor, or at least the system administrator (as determined by the system administrator). If the irrelevant URL is to be erased, the user must request this of the System administrator or guardian. This feature, in and of itself, acting as a deterrent to inelevant research.
In substep 198a, if the user clicks the right mouse button (or analogous input), an option window 200' (shown in FIG. 15) opens and the submethod 190 awaits user input. Note that the two windows 200 and 200' are not displayed at the same time—however, they are shown in the FIG. 13 together for the sake of thoroughness and to simplify the drawings. In substep 198b, after input from user is received, the option window 200' is closed and the selected action is implemented. If the option selected was the creation of a TBM, the user has saved the URL for later access, without downloading it (and thus having it stored m association with the project name 100). The URL is then stored in an editable, at least semi-pπvate format (i.e., not accessible by all, rather only by certain pπvileged users, if any) for later access. Thus, the method 60 provides the user with an additional incentive not to access a page which is of pnvate interest and/or not relevant to the current project 100 (to avoid an improper association). By providing a user with this way to store URLs which are irrelevant to the project at hand or of personal interest by postponing access and properly associating such access with the correct project name 100, the user is likely to remain focused on the current project 100. This decreases the likelihood that irrelevant sites will be found on the navigation history associated with the project name 100. Thus, the method 60 of the invention allows users to surf the sites of their choosing, while directing them to focus their research one project at a time.
In a Java-based web browser, such as is the present invention, the secondary or "target" window 200 may include comment buttons, check boxes, list boxes, drop-down list boxes. It is commonly known in the art that web authors can set up such a link so that when a user clicks on it, an input window such as window 200 appears.
Referπng now to FIGs. 13 and 15, the input window 200', used in association with the submethod 190, is shown to include other menu items such as those presented m the prior art when the nght mouse button 29 (or equivalent) is pressed. There are a variety of options to select from on this option window 200'. The options listed in this option window 200' include, for example, "back", "forward", "open this link", "open in a new window", "view image", "save image as", "set as wallpaper", "copy link location", "copy image location", "save as a TBM", "add bookmark" (clicking this option adds bookmark to bookmark listing common to all projects), "save as Associated (with current or another project name) Bookmark", "Internet shortcut", "select all", "add to favorites", "view source", "refresh", and "properties", among others.
In a modification of the first substep 196a (shown in FIG. 14A), when the user clicks on the link 180, the submethod 190 first determines whether the web page selected is a subpage of the current page, is a jump link, or includes the same root URL as the current web page before presenting the user with the input window 200. This identification is performed using conventional methods known in the art. If the page selected is a subpage of the current page, a jump link, or is included under the same root URL, the substep 196a skips to substep 196f without a query being initiated. In this way, only those hypertext links leading to a web page that is likely to have different content are subject to confirmation that they are to be associated with the same project name 100.
In submethod 190', an alternate embodiment of the submethod 190, shown in FIG. 14B, the option window 200' is not displayed and the substeps 196a through the 198a are replaced with a substeps 197a, 197b, and 199a and 199b.
In the substep 197a, when the right mouse button is clicked, the method 60 immediately accesses and transmits the requested information, just as with a left button click in the prior art. The use of the opposite mouse button of that used in the pnor art and therefore nonordmary, a conscious deviation from the expected, thus acknowledges that the research is to be attributed to the same project name 100.
In substep 197b, the research is continued.
In this embodiment, in substep 199a, if the left mouse button is clicked, the option window 200' (as shown in FIG. 15) is displayed and the submethod 190' awaits user input.
In substep 1 9b, when the user input is received, the option window 200' is closed and the selected action is executed.
By changing the means of activating anchor tags from that to which most users have become accustomed, in order to bypass the input window 200 (requiring confirmation that the same research session is to be continued), the user is reminded of the need to correctly associate the research session with the project name 100. Thus, upon selection of a link preferably by doing so in an non-ordinary fashion (or otherwise by answering a query), the user indicates his consent that the research session initiated will be associated with the same project name 100, and permanently saved in the global navigation history (see Table 2) associated with the project name 100. This permits the user to go directly to the page selected.
In another embodiment of the submethod 190, it is possible to obtain the same visual result seen by the user by several alternate means. For example, after reception and duπng the compiling of a HTML document, the browser method 60 places an information "object" within each anchor tag of the page being formatted for display. This information object is saved to a separate file or cache within the client computer 22. Multiple information objects may be associated with a single link. Further, the information object need not be related to the link to which it is associated. Those skilled in the art will recognize that other HTML commands and tags, such as a tag dedicated to masking an information object withm the currently displayed page, may be used The input windows 200 and 200' represent examples of a type of information object. In this manner, the input windows 200 or 200' may be formatted and displayed upon activation of a link in a web page being displayed. Thus the input window 200 is displayed in this manner whenever a call to a web page is made by clicking on a hypertext link 180, such as when a search to a particular URL is initiated or when a previously stored URL is launched (such as from the TBM listing of Table 3, or associated bookmarks, navigation history and research summary of Table 2). Further, the input window 200 may be an HTML "fill-in" form (such as that shown in FIG. 7) that is retained on the display screen and may be filled with information that the browser can then deliver back to a network administrator (where access to the Internet is made via a firewall of an local area network) or guardian (a supervisory user where, for example, the computer is standalone) after the research session is completed. Note that the window 200 reminds the user of the current project name 100 and asks the user if he would like to continue with the same project or change the project name.
In an alternate embodiment of the submethod 190, preferably configurable by the user by making menu selections from a drop down "settings" menu, the user may change setting such that he can review a page in one of several different modes. In a first mode, the user can review a web page without having to attribute it to a project name 100 until he has finished reviewing the page. The fact that the user is ready to provide comments regarding a page is indicated by his having activated an anchor tag or URL pointing the browser to another web page which is not a subdomam of the current page, the latter restriction limiting the querying to quenes at the most relevant times, i.e., when the content viewed by the user is likely to change significantly. In this mode, the user may still be queried as to whether the URL associated with an activated anchor tag should be saved as a TBM, in lieu of downloading the selected data at the URL. However, the user is not asked whether the downloaded data is to be associated with the current project name 100 or a new project name 100' until the user has had a chance to review the information downloaded. Further, in this embodiment, the variations regarding clicking on the nght or left mouse button are available as a user moves away from an already reviewed site. Therefore, in an equivalent to the input window 200 or 200', another menu option, namely, "input keywords and/or comments" 199, is presented to the user, to provide the method 60 the opportunity to capture the user's contemporaneous comments, whether in text or a sound file, regarding the site just visited.
The substitute for substep 196a is identical except that when a user activates a link 180, he's indicating his desire to leave the cuπently downloaded site and is asked to associate the site he's already visited with a project name 100. For example, if the user clicks once on the hypertext anchor using the left mouse button 28 (or analogous action), this alternate embodiment of the submethod 190 reminds the user of the current project name 100 and solicits the user's confirmation that the research sortie or session, which the user had previously initiated, is to be associated with the cunent project name or a new project name 100' (i.e., window 200, shown in FIG. 13, is presented). This embodiment, although less controlling of navigation, is more appropriate for simply tracking and soliciting, receiving and storing comments, such as key words, metatags, or descriptive terms regarding site content for use in identifying the site when the search feature presented in the dialog window 137 is used.
In another mode, the user can change setting so that no dialog window is presented upon activating a link, but rather the window only appears when the user clicks on the nght mouse button. In this mode, the URLs of downloaded pages are automatically associated with the current project name 100.
A system administrator, by evaluating the focus quotient Q across different users under diffenng conditions, may find that it is better, once a project name 100 is selected, to automatically associate all downloaded pages with this project name, without querying the user. If the user knows that, when he downloads a page, it will necessarily be saved in association with the current project name 100 until he otherwise logs out of the current project name, then, when the user sees something of personal interest, he will save it as a TBM or start a new research session under his PERSONAL project name However, this would not eliminate the need to have a dialog window 200, as the option of saving as a TBM and inputting keywords or comments with respect to the page just visited would be important.
It should be noted that as users navigate the web, there will be potentially hundreds of URL saved in association with a project name 100. Many of these URLs will have little value, primarily taking up disk space. Therefore, in an optional submethod, after a predetermined time period, all URLs associated with a project name 100 are automatically deleted (1) when they are not pre-packaged URLs (i.e., pre- stored in the database with which the method is provided when purchased) or otherwise useful across projects, and (2) the user has made no comment or input no keyword regarding the site, i.e., where there is no comment or keyword saved in association with the project name 100. In order to accomplish the foregoing, the submethod therefore performs the following steps. In a first substep, a URL is saved as part of a navigational history data listing, together with a time tag In a second substep, the submethod scans the time tags in the data listing and marks all URLs in the listing that are of a predetermined age In a third substep, the submethod checks the comment field in the data structure of each marked URL. In a fourth substep, if this field is empty, the submethod deletes the marked URL.
Having this automatic deletion feature will enable the method 60 to automatically record URLs for each domain or subdomain visited dunng a research session, without concern that this information will overly tax the memory resources of the computer 22, or annoy the user or the system administrator by requiring too much of their time in identifying and responding to "mark for deletion" requests.
It should be further noted that the method 60 is ideally used to deliver specific content in the form of URLs that are selected, reviewed and indexed according to a hierarchical tree structure such as a directory/subdirectory structure. These trees are generally tailored to the needs of particular professions, such as lawyers, doctors, CPAs, engineers, CFOs, Venture Capitalists, etc. For example, if the method 60 is tailored to the needs of the professional IP purchasing agent, then the tree would have structured links arranged according to project names 100 such as IP exchanges, IP valuation sites, Glossary sites, general IP content sites, sites of licensing professionals, patent searching sites, etc. Dunng the course of a user's research, he will add custom content through his visiting and commenting on sites of interest to a particular project such as subdomains of IP exchanges presenting particular new technologies for sale, etc. Therefore, the method 60 provides a structured means of accessing and navigating the Internet.
Referring now to FIG. 17 showing a flow chart for a submethod 210, when a search engine such as "EXCITE", "LYCOS", "INFOSEEK", "HOTBOT" or "SWISS SEARCH" is accessed, the method 60 of the invention handles this as follows. In a first substep 212, the submethod 210 recognizes this fact by analyzing the URL code/structure invoked and, consequently, identifies the site type as a "search engine" in column 2 of Table 3 of FIG. 11. For example, the method 60 may simply check for the word/expression "search- 1 and/or "=" in the URL stnng/query, the presence of which indicates that a search engine is being used. In a second substep 214, the submethod 210 analyzes the query structure and extracts the characters which occur after this word/expression and stores the same in the TBM listing (col. 3 of Table 3, above). Alternatively, the entire code from the location field 176 corresponding to the search engine search is stored in its URL form in order to permit easy re-execution of the search upon clicking on the URL. In substep 216, optionally, the submethod 210 checks the query against a table of forbidden keywords. In substep 220a, if the words are forbidden, then the user authorization table is checked to see if the search is nonetheless authonzed (i.e., an indicator such as «no forbidden keywords» is not found m the authorization table). In substep 220b, if the user or project does restrict access, then the submethod 210 denies access and displays a warning window informing the user that access is denied In substep 220c, if the user and project have no restrictions, then the request is processed. In substep 222, if the words are not forbidden, then the request is processed. In step 224, the research is continued.
In an alternate embodiment of the submethod 210, the first substep recognizes, in the following manner, when a search engine search term is entered. After the method 60 receives a character on a character based input device such as the keyboard 26, the method analyses the character and determines if the character received was an "enter" key. In general, the "enter" key represents any input signal which indicates that the user desires to transmit information to the server If the submethod 210 receives the "enter" key, the characters immediately before the enter key that were entered by the input device such as the keyboard 26 are identified to determine whether they represent a manually input URL or a search keyword or phrase. If it is determined that a search was initiated, then the keyword or phrase typed by the input device just before the "enter" key was pressed, together with any Boolean operators and the URL, are extracted and the keyboard-entered words or phase and URL are stored in the appropnate column of tables 2 and 3 (alternatively, as mentioned above, the URL in the location field may be stored in order to permit re-execution of the search dunng a later research session). If it is determined that another URL address has been manually entered (by, for example, analyzing the text immediately before the entry of the return key and/or detecting a download command, prior to the download being initiated), then an input window 160 is presented as described above with respect to the submethod 190, for example, in order to provide the opportunity to query the user as to whether the new site to be visited should be associated with the same project name 100.
In another feature of the method 60, new browsing windows may be opened. When a new browsing window is opened, the user inputs a new project name 100'. Upon the initiation of a new project name 100' in a new window, the termination time is stored for calculation of the actual time on the pnor project when the research session associated with that project name 100 is terminated The noted time also marks the start time for the research associated with the new project name 100'. When the user wishes to terminate the overall browsing session, he must exit out of all open browsing windows, where he is asked whether he wishes to store the TBM listing generated during the session (which will be presented to the user upon his next login under his user name 90), begin a new session associated with a new project name 100' or terminate.
Referring now to FIG. 16, presented in UML diagram form, in another feature, the method 60 provides a system administrator module 260 which permits the system administrator 262 to manage participants (such as groups/categories and users), access, projects and sessions The project names 100 which a user may research and the users who may have access to certain project names are managed via an access management window. The system administrator module 260 facilitates the management of access, URL management (including deleting "marked for deletion" URLs), user performance evaluation, use of a focus quotient Q, setting access limitations, time limits, project name access restrictions, and issuing and changing passwords and user names. The module 260 allows the system administrator 262 to compare the relative performance of each user using the focus quotient Q, a performance measure, (descπbed in more detail below) by displaying a bar chart (now shown) showing the relative score calculated for each user over a specified period of time
The focus quotient Q takes into account certain research session statistics, such as Have (the average number of hits per research session over the specified peπod), Tave(the average time of a research session, expressed in terms of Ttota„ the total on-line time over the peπod, divided by Ntotab the total number of project names researched over the specified period); Nrs (the average number of research sessions executed per project over the specified period calculated by taking Ntota, and divided by N„, the total number of unique project names researched over the specified period); and Tpers, the amount of time spent on the personal project name. The focus quotient, expressed in mathematical form, is as follows:
Q = {α(Have)β(Tavc)}/{Ω(Nrs)( σ Ntolal)} multiplied by {Ttotal - Tpers}/Tteta,
Where (T^, - T-^ /T,^, is an adjustor for personal time. Q can also be expressed as a Summation of Qx, the focus quotient for each project name, divided by σ Ntotal, multiplied by the adjuster for personal time, where:
Qx = {α(Hx lve)β(Tx ave)}/{Ω(Nx rs)}.
Another factor, namely, the number of windows open by a single user at the same time, tends to indicate that the user is not focusing his research and could optionally be added to the quotient above in the denominator. A, β, Ω, and σ optional weighting factors, which may be constants or formulas, determined experimentally. These performance measures thus aid the user, system administrator, and/or management, to evaluate relative performance over time, which can then be presented in a simple histogram or a graph of Q over a time interval, alone in compaπson with prior performance of the same user (self or user evaluation) or in comparison with other employees (inter-user evaluation). The user's performance may also be evaluated with respect to a particular project.
Where a Microsoft "ACCESS" relational database is used, "forms" and "reports" such as these are easily created and presented. A form shows one record in a specified format and allows the system administrator 262 to step through records one at a time. A report shows selected records in a specified format, grouped into sections with different kinds of totals (including sum, minimum, maximum, average).
Refernng now to FIG. 18, a flow diagram of the logout submethod 240 of the present method 60 is shown. In a first substep 242, the user indicates, via a pull down menu or by clicking on a menu item presented when selecting a hypertext link or anchor tag, that he would like to end the current research session. In a second substep 246, the submethod 240 presents the user with the listing of URLs created by the TBM feature of the invention, permitting the user to launch another research session associated with another project name 100', using one of the hypertext TBMs on the list. In a third substep 250, the submethod 240 awaits user input. The TBM listing includes menu options such as "logoff without saving TBM", "save TBM and logoff, "begin new research session".
In a fourth substep 252, once the user input is received, the submethod 240 carnes out the task associated with the input received. For example, if the user clicks on a TBM in the TBM listing, then the submethod 240 returns to step 86 above and presents the user with input window 101. If "begin new research session" in input window 101 is selected, then the user is presented with the URL listing shown in Table 2 and/or a TBM listing associated with the input project name 100'. If the user selects "log off without saving TBM", then the connection closes and the user logs off without saving the TBMs If the user selects "Save TBM and logoff, then the submethod 240 prompts the user for a file name and confirmation that the cunent TBM listing is to be saved in association with the cunent project name 100 or another project name. The TBM is saved, the connection closes and the user logs off In this manner, the TBM information stored in the URL listing and presented later allows the user to consolidate his research by providing a means for him to time-shift possibly melevant research, without having to permanently save the URLs in a traditional "favoπtes" list or "bookmark" list and to associate TBM listings with specific project names 100. Further, the user may place potentially irrelevant sites on the TBM listing without going to these sites (thus, they do not show up on the navigation history and are therefore not permanently saved). The user may later edit this TBM listing or initiate personal research in association with it.
In still another embodiment of method and system of the invention, secure access (to varying degrees) is provided to HTML documents posted on publicly accessible servers across the Internet or on an intranet. In a first level of secunty, the confidentiality of the URL address themselves ensures that only those who have the URL address will have access to the page For example, a URL may be the following: http://uspatentinfo.com conf-docs/4024- 116-00181.html, which may be e-mailed, preferably in a secure manner, to other persons who are to have access to the document so posted. Unless a user knows the directory and file name extension to the address of the home page, he will not be able to find the document.
The method of posting these documents involves the following representative steps. In a first step, the user selects an option for the pull-down menu of his word-processing program which states "publish to intranet or Internet". In a second step (activated by the first step), the method converts the documents into HTML. In a third step, the method calls a web page publishing subroutine (such as that embedded in "FRONT PAGE EXPLORER"), opens the page and displays the document in HTML, for possible editing. In a fourth step, after the user selects "publish" from a drop-down menu, the method opens an Internet connection, queries the user for the name and address of the site to which the document is to be published (the user name and password optionally being automatically provided). In a fifth step, when these inputs are correctly provided, the method publishes the document. The posting of documents at obscure URLs highlights the usefulness of having URL listings of Table 2, FIG. 10, URLs stored in retrievable form through the input of a password 92 , user name 90 and a project name 100 which point directly to these confidential documents. Further, this highlights the importance of the invention for preventing access to URL listings and navigational histones (such as those of FIG. 10) in association with project names 100, where the user seeking access is not authorized according to an authorization table such as that of FIG. 8.
In another, more secure level of secunty, between the third and fourth step above, the user selects "encrypt" from a drop-down menu, after which the user may be prompted for the project name 100 to be associated with the document. Optionally, where the user is using the method 60 of the invention, the project name 100 is supplied without querying the user (because it has been stored after the user's input at the beginning of the research session) and the document is automatically encrypted such that the decryption key is the project name 100 (or some hashing thereof). Thus, when the method 60 and system 20 of the invention downloads these documents, the project name 100 already input during step 134 or step 86 above (such as a client matter number or project code name) is automatically used to decrypt the encrypted page such that the project name is the decryption key. This is accomplished by adding an identifier at the head of the encryption page, which identifies the page as encrypted once the download is initiated, thus executing a decryption program embedded in the method 60 into which the project name 100, stored in association with the research session, is input, for decryption during loading of the page. Having the decryption program resident on the client is advantageous as this allows the information downloaded across the public Internet or intranet to remain encrypted. However, through a standardized protocol, the page to be downloaded can include the decryption program which extracts the project name 100 and, optionally, for further security, the IP address of the requestor (for checking against permissible IP addresses) upon initiation of the download and then transmits a decrypted page across the Internet.
It should be noted that, optionally, a company using the method 60 of the invention across its various business units may encrypt all its documents (both on the intranet or published on the Internet) such that the decryption key is the project name 100, without the inconvenience of having to input a unique decryption key whenever such an encrypted document is downloaded to a client computer 22. In this way, access to project documents is conveniently and seamlessly provided exclusively to those who know the client matter number/project name. This ensures (together with the matching table mentioned above) that the navigation history generated during a research or work session is associated with the coπect project name 100.
Note that by storing the documents in encrypted form, there will be no keywords with which a spider of an ordinary search engine will be able to identify or classify the page. Therefore, the URL location of the encrypted site will be unknown to such search engines, and thus, such site locations will remain unknown to all who attempt to locate the site by keywords.
Thus, it can be clearly seen that the invention significantly enhances the ability of companies having offices at different geographical locations (or dealing with offices of other companies) to be able to access confidential information posted at various servers (of, for example, several companies, consultants or specialists working together on a common project) on the Internet in a secure manner yet in a manner which avoids having to remember separate access codes and passwords for getting beyond a firewall, for example. Further, the invention significantly enhances a user's ability to securely post information on publicly accessible servers, thus making such information available to team members located as several locations across the Internet. Such a feature is particularly useful for consultants who must work with confidential documents of a company or client, but which do not have the established trust relationship with the company, at least not at a level which would warrant their being able to access the company intranet.
In another embodiment, the method 60 is implemented on a server hosting a page with content specific to a particular profession or industry, and anyone using a prior art browser may then access this web site on the server, which will provide the graphics such as input windows 200 and 200', and bookmarks available for all to use. The bookmarks resident on the server are pre-selected to aid in researching the Internet for foreseen purposes specific to the particular profession. In this alternate embodiment, it is preferred that the browsers be configured to load this page as their opening page to the Internet.
Refemng now to FIG. 19, in still another embodiment, the method 60 includes a GUI 164' for presenting content (i.e., a downloaded HTML page, a document such as an e-mail, a Word document, a spreadsheet or a graphic) which includes a comment window 165 having a text field and controls opened by an icon 167 which controls the playback and recording of sound files, for users' comments on these contents. This is accomplished via a right click mouse menu option which, if selected, opens an input window 199 (in FIG. 13) that allows comment, either as text or a sound file, after the user has had a chance to review the content. When the user inputs his comments, the user may save the comment in association with the web page for presentation to others who follow after the commenting user The user may comment on several web pages consistent with a chosen project name theme. To aid others in following this project name theme from one web site to another, signpost-like back and forward icons 153a and 153b on the upper menu bar provide a convenient means for those who follow this "project trail". The traditional back and forward icons 155a and 155b continue to move the between websites that he has actually visited. Only when the user visits sites under the project name 100 in the project folder and does not deviate from the order of project sites under the project name 100 will the signpost-like icons and the standard icons appear to produce the same result if selected.
Refernng now to FIG. 20, when the forward signpost icon 153b is activated, a submethod 300 executes the following steps. In a first step 302, the submethod 300 reads the format of the next or subsequent document in the project folder and compares this format with that currently open, including whether the comment is in the form of text or a sound file. In a second step 304, the submethod 300 checks the format of subsequent document. In a third step 306a, if the formats are the same, the submethod 300 opens the document/sound file into the conesponding application. In a fourth step 308, the submethod 300 then presents the user with a confirmation window (not shown), querying the user as to whether he would like the previous document to be closed, or minimized. In a fifth step 310, the submethod 300 awaits user input and when received, executes the action requested. In an alternate third step 306a, if the formats of the documents are different, the submethod 300 opens the application associated with the selected document, and displays the subsequent document. In a sixth step 312, the user may re-initiate the submethod 300 by clicking on the forward icon 153b. When the back signpost icon 153a is activated, essentially the same submethod 300 is executed, except that the submethod moves to the document which is listed prior to the current document in the project folder.
This embodiment advantageously creates a signposted trail through the Internet that others can follow. Thus, a teacher/guide can create a trail, including comments on each site, to enable students to follow the trail, read the comments and the site's contents and learn in a directed manner. Thus, it is envisioned that this feature alone will become widespread as a tool to navigate the Internet using an experienced guide (i.e., the "scout" of the original trail). When this embodiment is combined with the integration of documents of other formats (described in more detail below), a powerful learning tool is created.
Those skilled in the art will appreciate that the hardware depicted in FIGs. 1 and 2 may vary for specific applications. For example, other peripheral devices such as optical disk media, audio adapters, or chip-programming devices, such as PAL or EPROM programming devices well-known in the art of computer hardware, and the like may be utilized in addition to or in place of hardware already depicted. For example, a computer program product (i.e., a control program) can reside in computer storage (e.g., 30 or 32). However, it is important that while the present invention has been, and will continue to be, descnbed in a context of a fully functional computer system, those skilled in the art will appreciate that the method 60 of the present invention is capable of being distributed as a computer program encoded on a floppy disk, CD ROM, or other form of recordable media or via any type of signal bearing media or electronic transmission mechanism, such as a modem or a fiber optic connection to the Internet.
The functionality of the present invention is integrated into an HTML-compliant browser, such as "NETSCAPE NAVIGATOR X", "MOSAIC", "MSN", or "INTERNET EXPLORER X". It should be understood, however, that the browser method 60 of the invention need not be inseparably integrated. Optionally, a separate program interfacing with the open structure of "NETSCAPE" or a plug-in, embodying the steps of the method 60 of the invention, may augment the functionality of an existing browser. Note that XML may substitute for HTML in the context of this disclosure. Further, the method 60 of the invention, integrated with a GUI comparable to that shown in FIG. 13, may call a third party external browser. For instance, "MAC OS X" may be used in a manner known in the art to communicate with an external browser m a manner that permits it to appear as part of the browser method 60, although
As used herein, the "information object" or "information" output to the viewer during the link process should be broadly construed to cover calls to any and all forms of messages, notices, text, graphics, sound, video, tables, diagrams, Applets, and other content, and combinations of any of the above. Thus as an example, in lieu of the option window 200 or 200', an audio query concerning the use of TBM or associated bookmarks, demanding an audio response, may be used.
While the preferred embodiment has been descnbed in the context of an Internet browser, the techniques of the invention apply (as shown m FIGs. 3 and 4) whether or not the user accesses the World Wide Web via a direct Internet connection (using an Internet access provider 29) or indirectly through some on-line service provider 28 such as "COMPUSERVE", "PRODIGY", "AMERICA ONLINE", etc. Therefore, the computer "network" 25 in which the invention is implemented should be broadly construed to include any server-client model from which a client can link to a "remote" document, even if the document is on the same machine or on an intranet.
Referring now to FIG. 21, in another embodiment, the method 60 cooperates with a coπesponding software resident on a server 54 such that the server-resident software scans and updates the bookmarks and other content on the browser when the server is accessed by a compatible browser. This may be accomplished in the following submethod 350. In an initialization step 352 on the client side, the browser is either pre-set to point to a download page on which is resident associated updating software or the URL of this server 54 is input into the URL field 176 of the browser. In a download step 354, the download of the page is ordered on the client-side, through the user's pressing the "go" button or hitting "return" In an identification step 356, the ordered URL or IP address (if performed on the client- side) or the incoming browser identifier (if performed on the server-side) is checked against a list of IP addresses or compatible browser identifiers, as the case may be, associated with downloadable updates for bookmarks. In a scanning step 360, if a matching IP address or browser identifier is found, then after the download of the page, the submethod 350 initiates a scanning of the browser to read an identification tag associated with the version of the bookmarks on the browser. In a companson step 362, the submethod 350 compares the identification tag associated with the version of the bookmarks and other content on the browser with the latest version available on the server 54. In a querying step 364, if a version of bookmarks and other content is available on the server 54 that is more up-to-date than that on the browser, the user is queried as to whether or not he would like to have his pre-loaded bookmarks and related content updated. In an updating step 366, if the user responds in the affirmative, a download of the upgrade is initiated during which all URLs that have broken links are marked for deletion, new URLs and associated descnptions are added to the bookmarks and other content on the browser, and descnptions and keywords of existing bookmarks and other conent are updated, where appropriate.
In another embodiment, the method 60 of the invention may be used in a server-based computing architecture that allows the method to run on a remote server 54 operated by a system administrator. This is commonly known as running the application as an ASP (application service provider). The model of the project-based, group browser functioning as an ASP is particularly timely, as the market place for ASPs is growing very quickly. It also provides scope for other client/server configurations as the general client market moves increasingly towards support of thin client devices such as Palms, Pocket PC's, WAP or HML enabled phones and other digital portable devices. These devices run on remote, server- based applications, pulling the application processing back to the server from the PC or laptop, in order to avoid the computing power and memory requirements that are built in to most PCs, while minimizing the amount of dedicated bandwidth required (for further info, see www.allaboutasp.org and www.esoft- global.com). The system administrator provides the required software, hardware and updates; an Internet connection to the user's PC or other digital device; management of access nghts for group members; and management of the intellectual property rights associated with the content that is generated. In a first advantage, this embodiment allows users to avoid the up-front and continuing costs and technology complexities that might be associated with a client-side application, with the sacrifice of some flexibility because the user may have limited memory, and graphics display and keyboard resources in current thin client device technology.
Focusing on the server-side architecture, the method can be more genenc by removing the prepackaged, client-side database of profession-centric, pre-indexed links and comments while taking full advantage of the basic features of the method 60 including bookmarking, tracking navigational history, and creating research summaries by project name, and pooling of project research data for multi-user access, etc. This embodiment is more generic in that any group, including persons who do not share the same local network (i.e., Intranet) can share the project-oriented features of the method 60 These groups might include friends, research teams in different universities, artists, private and public sector groups, church groups, etc. As in the above embodiment , the server-based computing architecture is used, thus further allowing the user to avoid the costs that might be associated with a client-side application and concentrate on their own research or other creative pursuits. In short, this service builds on and facilitates a feature of the Internet that has already garnered attention, the building of online communities which to a certain extent Internet portals currently try to achieve, and a server-based computing architecture.
The above server-based embodiments are significant because with the advent of the Internet and other communications systems, persons around the globe are collaborating in ways that few would have imagined just a decade ago. The new mentality for these types of associations among friends or professionals already exists. Internet chat groups provide a ready example of this type of phenomenon. However, the availability of technical mechanisms for participating in joint, multifunctional associations and communications remains limited. The project-based, group browser provides a new and unique tool that will give these groups the power to take these cooperative initiatives to the next level.
By way of a working example, suppose a group of artists, each with his or her own studio and located in a different part of the world, would wish to collaborate on ideas, techniques, new forms of expression, information, etc. In fact, during the height of impressionist period, many painters who later became world famous did just that, moving to be in close proximity (environs of Pans, France) in order to achieve this peer review and stimulation. Today, artists would not expect to travel to, or live in, a single location (although a number of modern art artists are attracted to the New York area.). Project- based, group browser enables a new dimension for these artists. Rather than exchanging emails (enclosing URLs), or setting up their own web pages with links to other sites, these users can create a joint project, a portal and web site using the project-based, group browser. The project-based, group browser is a technical mechanism that would allow users to share and discuss all forms of creative content as it is developed, while restricting access to this content to the group and enabling the technical documenting creation copyrights to be associated with any content generated. These users have a communal mechanism for culling the results of research on the Net, all in one web-based interface. In a modification of this embodiment, the method 60 includes project management features which allows different format documents such as word, HTML, XML, and EXCEL, or graphics files to be stored together in association with a common project name 100, such as mentioned above in association with the project management module. Using this functionality, users can add URLs to web pages, cache web pages of interest, define links, and save documents, all within the project-based, group browsing application. By utilizing remote procedure call (RPC), ActiveX and COM (Common Object Model) technology in conjunction with popular office applications software installed on client PCs and devices, the server imports, stores, arbitrates access and re-transmits documents and application data files (spreadsheets, CAD drawings etc) to clients for local editing and resubmission to the server. Further, through the integration of chat facilities and optional text to speech (TTS) software users can conduct real-time group chat.
Thus, the project-based, group browser provides, via an Internet connection (or alternatively via a simple TCP/IP network connection without the need for other web server software), a generic web interface, with functionalities already described in association with the project-based browsing method, enabling web surfing, providing web tracking history, bookmarking, establishing links, the creation of an HTML page or set of HTML pages, the posting of documents, pictures, database files and other media, as well as other features - all of which can be shared by the group. Thus, any group participant can enhance the value of the collaboration by adding his or her own contributions (bookmarks, links, search results, new content, etc). The group founder tailors the initial interface to indicate the name of the group, any relevant information, or group procedures or rules. Group members submit requests or suggestions to the group founder. These suggestions include attachments of documents of interest and research summanes on topics of interest, together with the researcher/group member's comments on each site in the πng. After review of the suggestion, the group member can add the suggestion to the project tree structure at the appropriate point, such as under the member name or under a project folder that has to do with the particular topic. The group founder creates a subdomain HTML page under the domain of the purveyor of the system. Similar to the Netscape Communicator or Internet Explorer, a participant can set his or her computer default home-page to this subdomain, the newly initiated project-based, group browser interface for the group.
Further, the project-based, group browser is a secure application. For simple projects - such as friends wishing to share their interests, favonte web sites, family news, creating a wedding registry, etc. - a name and password would be sufficient to gain access to the full features of the project-based, group browser. The name and password combination is the most prevalent access system on the Net today, used even by financial services such as E*Trade. If a higher level of security is required, digital signatures can be required of and issued to group participants. This would be an optional feature, like many others, that any group could itself choose to implement (either at the outset or as the project-based, group project evolves).
All data developed through the use of the project-based, group browser, including bookmarks, web pages, associated documents and files, would remain on the servers of the purveyor of the system. As with the E*Trade application, in which an individual account holder's data resides with E*Trade (unless downloaded for tax purposes, for example), all information that is generated through use of the project-based, group browser is accessed and processed remotely. The purveyor of the system provides the technical infrastructure and services, including servers, dBs, firewall, hosting and web site services, etc.
In a refinement of this embodiment, a nghts management module is provided so that users can define and regulate several key aspects, such as: (ι) who authoπzes adding or removing group members;
(n) who can add or delete information and data, including bookmarks, web pages, documents, content, etc.;
(in) who is able to download any information to their local machine, and when can this occur
(e.g., during the project-based, group browsing project, or only at the end); (iv) who is able to terminate a project-based, group browsing project; and (v) who has rights to any information and data that is generated during the project-based, group browsing project
This control is provided through an access control matrix having tailored permission sets for each user or user types Preferably, the permission sets are determined by the group founder, meaning that a user with special privileges is able to define and determine the rights management structure for a project- based, group browsing project, using a flexible anay or options that would be provided through the browser software
In an optimum configuration, the method 60 runs on servers 54 and systems provided by the purveyor of the system and managed by a system administrator. The system administrator automatically upgrades the software for use by current project-based, group browser groups, so that the most up-to-date platform is always supplied. As technology advances (e.g., broadband connectivity), new features (video, audio, conferencing, etc.) would be available from the purveyor. In this manner, none of the hardware or software that enables the project-based, group browser to run need be located at the client level. Thus, individuals, such as the individual artists mentioned above, need not concern themselves with technological complexities, capital expenditures and associated start-up issues. Not only is the group better able to afford to use a highly evolved application, but they are free to devote themselves to the non- technology work and ideas in which they are interested
Where there is ample computing power to run a client-side project-based browser of the preferred embodiment, additional advantages are gained in that the server-based embodiment is completely compatible with the client-side embodiment. The project folders and research summanes created by the client-side application can be imported, synchronized and merged with the server-side application. In this manner, even when the server-side application is temporarily unavailable, inaccessible for some reason, or where the user has not subscπbed to the server-side application, the user can continue to surf the Internet adding URL and commenting on their content.
In a payment feature, the project-based, group browser operates as a subscription service, in which use of the browser is rented for a certain penod, subject to renewal. Rental fees are based on the number of participants in a browser group, with the ability to add or remove members (e.g., payment of a monthly rental fee). If a group member wishes to leave the browser group, they will simply cancel prior to the end of the subscπption period. Alternatively, a one-time start-up fee may be charged. The method 60 encompasses, for a fee, other ASP applications that are automatically launched upon clicking on an icon of the particular element stored under the project name 100 of the group browsing method.
Several options would exist (based on the rights management, above) as to the content that is generated upon completion of a project-based group browsing project. Examples of such options are to. (l) delete all material resulting from the project-based, group browser group,
(n) maintain an archive of the matenal, for a fee;
(in) provide the content in a form which is directly usable by a project-based browser, thus permitting continued use and enhancement of the group browsing project content on the client-side, possible where the client is running project-based browsing software, (iv) allow, for a fee, a complete download of the content from the project-based, group browsing project to those members of the group with the right to do so; or make the content available in CD-ROM (or other digital earner) format, for a fee.
As described above, the method may be integrated to include management of e-mails, documents, and general files associated with a common project name 100. This, combined with the GUI 164' shown in FIG. 19 which includes a comment window 165, will enable navigation of the net, annotated with documents of other formats, to enhance the use of the net for instructional purposes.
In a first advantage of the present invention, users are directed to perform research on the Internet, one project at a time.
In a second advantage of the invention, users are provided with tools needed to postpone possibly irrelevant research or research which should be directed to another project name, thus enabling them to perform research one project at a time.
In another advantage, a system administrator may monitor Internet usage on a user basis, granting or denying access to particular categoπes of sites, depending on the business goals of the enterprise.
In another advantage, the method demands the creation of an organized system of bookmarks and URL, organized in association with project names.
In another advantage, the method permits collaborative browsing in which the experience gained from one person's research can be shared (through notations and comments) with others within the orgamzation. Further, by e-maihng importable project summaries to clients or outside service providers, the expeπence gained within an organization can be shared with those outside an organization.
The invention has a further technical effect m that the method causes the computer screen to present a user with control means which the user can use to more efficiently manage the downloading of information for viewing by the user on the computer screen. Thus, the method 60 controls or directs an Internet research session, and discourages random downloads from the Internet. Further, the method, upon access to a web page, permanently associates a URL associated with the web page with the user on a global navigation history associated with the project name accessible by other users. If the user merely activates the URL of the web page, the user may store the URL m a pπvate, user-editable presentation for later access, thus providing the user with a means of editably bookmarking interesting URLs while promoting focused research on the initial project, until the user has logged out of the project name. Still further, the method permits the storing for later access, and the pπntmg of navigation history and research summary in association with a project name and user name. The resulting efficient acquisition of information is applicable industrially in every domain of technology.
The invention involves technical issues such as the ordering and control of the communication paths selected to access digital information on a network.
The figures illustrate one method for practicing the present invention. The flow diagrams described herein broadly illustrate the logical flow of steps to perform one embodiment of the present invention. Accordingly, numerous steps may be added to, or taken away from the flow diagrams, irrespective of any occasional use of the term "optionally", without departing from the scope of the invention Furthermore, the order of execution of the steps in the flow diagrams may be changed without departing from the scope of the invention. Additional considerations in implementing the method described by the flow diagrams may also dictate changes in the selection and order of the steps.
Multiple variations and modifications are possible in the embodiments of the invention described here. Although certain illustrative embodiments of the invention have been shown and described here, a wide range of modifications, changes, and substitutions is contemplated in the foregoing disclosure. In some instances, some features of the present invention may be employed without a conesponding use of the other features. Accordingly, it is appropriate that the foregoing description be construed broadly and understood as being given by way of illustration and example only, the spirit and scope of the invention being limited only by the appended claims.

Claims

What is claimed is:
1. A browsing method encoded on a computer-readable medium, for managing Internet research in a research session, wherein navigation on the Internet by a user using a browser, including the storing of URLs visited, is automatically associated with a project name, thus defining a cunent research project and creating an associated research summary.
2. The method of claim 1, wherein on-line activity is attπbuted to the project name in the associated research summary.
3. The method of claim 1, wherein the method cooperates with an updating method resident on a server such that the server-resident updating method scans and updates bookmarks on the browser when the server is accessed
4. The method of claim 3, wherein the server-resident software includes confirmation means to confirm that the user wishes to update the bookmarks prior to uploading the bookmarks on the browser
5. The method of claim 1, wherein the URLs associated with the research summary are saved m a global navigational history accessible to other users through an intranet.
6. The method of claim 1 wherein, in addition to the project name, an individual user name is associated with the research summary.
7. The method of claim 2, wherein a performance measure means is provided which analyses user statistics in a manner which measures the tendency of a user to remain focused on one project at a time, taking into account certain research session statistics including at least online time, a total number of project names researched online and time spent on the user's personal project name.
8. The browsing method of claim 1 wherein the research summary is a record of the activity attributed to the user name and project name which is stored m a format which may be printed or electronically filed, for later access.
9. The method of claim 1 wherein, after the user accesses a web page, a URL associated with the web page is automatically and at least semi-permanently associated with the user on a global navigation history which is accessible by other users, and whereas, if the user merely activates the URL of the web page, the user may store the URL in an at least semi-private format for later access, thereby providing the user with an incentive not to access a page which is of pnvate interest and not relevant to the cunent project
10. The client browsing method of claim 1, wherein the project name is automatically extracted and used as the decryption key to decrypt encrypted documents posted on a computer network, prior to the documents display on the user's computer.
11. The client browsing method of claim 9 wherein the research summary is stored in a format which may be printed or electronically filed, for later access.
12. The method of claim 1, wherein, after the user has accessed a web page, defined as the cunent page having a URL address, upon activation of a link which addresses, via another URL address, another web page and thus, potentially initiating a new research session, the user is queried as to how to attribute the URL addresses, and depending on the results of the query, the another web page is downloaded, steps terminating the cunent research project and initiating a search associated with a new project name, or a creating a temporary bookmark, are executed.
13. The method of claim 12, wherein the attribution is made with respect to the cunent page.
14. The method of claim 12, wherein the attribution is made with the another web page.
15. The method of claim 12, wherein, when the results of the query indicate that the download is to be associated with a new research project, the method provides the user with a choice as to whether to postpone initiating a research session by stonng the address for use in association with a later project name after termination of the cunent project, or to terminate the cunent project and, thereafter, initiate the new research project in association with a new project name, and depending on the results of the query, the addressed web page is downloaded and presented to the user or steps initiating a search associated with a new project name are executed.
16. The method of claim 15, wherein if the user chooses to postpone initiating the session, the address is stored together with any other addresses so stored and presented to the user in editable form upon logging out of the cunent research session or project name
17. The method of claim 16, wherein the addresses so stored are automatically deleted upon logging onto another project name, unless the user takes an action to save the addresses for later access.
18. The method of claim 1, wherein, after the user has accessed a web page, defined as the cunent page having a URL address, including a root URL, then upon activation, in an ordinary fashion, of a link addressing, via another URL address including another root URL, another web page and thus, potentially initiating a new research session, the user is first queried to determine how to attribute the URLs, and depending on the results of the query, the addressed web page is downloaded and presented to the user or steps initiating a search associated with a new project name are executed.
19. The method of claim 18, wherein the attribution is made with respect to the cunent page.
20. The method of claim 18, wherein the attribution is made with the another web page.
21. The method of claim 18, wherein, prior to the querying, the root URL of the activated page is compared to the root URL of the cunent page, and if the root URLs match, no query is initiated.
22. The method of claim 1, wherein, after the user has accessed a web page, defined as the cunent page, then, upon selection, in an nonordinary fashion so as to indicate the user's desire to go directly to the web page addressed by the link, the web page so addressed is immediately transmitted to the user.
22. The method of claim 1 wherein, if the user decides not to initiate a new research session associated with a new project, a URL associated with the link is stored for later access wherein, after the user indicates his desire to terminate research associated with the cunent project, defined as the current research session, the user is presented with a URL listing comprising URLs which were stored at the initiation of the user during the cunent research session, whereupon, the user may select a URL on the URL listing to initiate a new research session associated with a new project name.
23. A method which permits time-shifting of the downloading of web pages to a client computer, the method comprising the steps of (1) presenting a user with the option of temporarily storing a URL of an activated link in a file in which such URL may be stored and listed in conjunction with other URLs stored in a similar manner, thus creating a URL listing, wherein, when the user indicates a desire to logoff, the URL listing is presented to the user for use in launching another research session, at the user's choosing; thereafter, when the user logs off, the URL listing is deleted, unless the user takes affirmative action to save the URL listing.
24. A computer system encoded with a method which, when executed, permits time-shifting of the downloading of web pages to a client computer, the method comprising the steps of (1) presenting a user with the option of temporarily storing a URL of an activated link in a file in which such URL may be stored and listed in conjunction with other URLs stored in a similar manner, thus creating a URL listing, wherein, when the user indicates a desire to logoff, the URL listing is presented to the user for use in launching another research session, at the user's choosing; thereafter, when the user logs off, the URL listing is deleted, unless the user takes affirmative action to save the URL listing.
25. The system of claim 24 wherein the URLs presented are organized by project name, where such an association exists.
26. A browsing method wherein descriptions of web sites saved in association with project names are saved and searchable by keyword, and wherein any matching terms in the descriptions cause URLs for these web sites to be presented in a form which may be selected by a user in order to launch a research session.
27. The browsing method of claim 26 wherein the URLs presented are organized by project name.
28. A system for performing research, the system comprising a computer and storage media encoded with a method which, when researching the Internet, and upon the input of a project name, associates contiguous online time with the particular project name, wherein the URLs of web sites which the user downloads for viewing will be recorded in a record in association with the project name.
29. The system of claim 28, wherein the user is provided with means to temporarily save URLs to sites which are potentially melevant to a cunent project name, for access after completion of the cunent research under the cunent project name
30. The system of claim 29, wherein the user may save any temporarily saved URLs in association with a special project name such as PERSONAL to which there is limited or no access by others
31. A browsing method which associates online research to a project name, the method utilizing a search engine and searchable research summanes including URLs and associated descriptions which are available for key-word searching when the user is not connected to the Internet, the method creating a preliminary listing of URLs which the user may later save in association with the project name.
32. A computer system encoded with a browsing method for managing a research session on the Internet in which information is requested from a downloaded page, called the cunent downloaded page, by activating and clicking a hypertext link on the cunent downloaded page, wherein, after a user activates the link, input reception means is presented to the user, said means providing for the input of alphanumeric characters identifying a project to which at least the navigation history of the research session is to be associated, or for confirmation of association with alphanumeric characters already input, and when such characters are received or the association with the already input characters is confirmed, the method downloads the requested information in association with the alphanumenc characters.
33. The system of claim 32 wherein, after the alphanumeric characters are received and the research session is commenced, when a link is activated that is associated with a different root URL as compared to the cunent downloaded page, thus indicating the likelihood of different content, at least one input window is presented to the user which queries the user whether the new to-be-downloaded page will be associated with the cunent project name or a new project name or is to be saved as a TBM and the cunent research continued
33. A browsing method encoded on a computer-readable medium, for managing Internet research, characterized in that an ordinary user is required to input a project name for association with the user's research, and if such research is of a personal nature, an access control matrix limits access to the Internet for such research to substantially non-work hours.
34. The method of claim 1, wherein, to economize display screen space and computer memory, the research summary includes shortcuts to folders of global links common to a particular type of research, thus not requiring duplication of these common links in each project research summary yet providing easy access to common links
35. The method of claim 34, wherein the shortcuts may be dragged and dropped into the URL listing using a project management subroutine controlled by a sub-interface.
36. The method of claim 35, wherein a shortcut is hypertext-type link to a single folder having links of particular interest to the cunent project.
37. The method of claim 1 wherein the method operates on a computer system generally having a mouse with a nght and a left mouse button, and wherein, if a user clicks once on a hypertext anchor of a web page using the left mouse button or analogous action, the method reminds the user of the project name and solicits the user's confirmation that the download, which the user indicated he wished to initiate by his clicking on the link, is to be associated with the cunent project name or a new project name.
38. The method of claim 37, wherein the method, having downloaded the web page having content, solicits the user's comments concerning the content of the downloaded page, the solicitation being made via an input field in an input window, these comments being available for key word searching and to indicate to a user the content of the web page.
39. The method of claim 1 wherein a user may review a cunent web page without being queried to attribute the web page to a project name until the user has finished reviewing the cunent page, indicated by his having activated an anchor tag or URL pointing the browser to another web page.
40. The method of claim 39, wherein the querying is not made when the pomted-to page is a subdomain of the cunent page.
41. The method of claim 39, wherein the user is queried as to whether the URL associated with an activated anchor tag should be saved as a Temporary Bookmark, prior to downloading the selected data at the URL.
42. The method of claim 39, wherein, after review of the cunent page, the user is quened as to whether the downloaded data is to be associated with the cunent project name or a new project name.
43. The method of claim 39, wherein, after review of the cunent page, an input field is presented to the user permitting the user to input keywords and/or comments regarding the cunent page, thus providing the user the opportunity to contemporaneously comment on the cunent page before downloading the pomted-to page.
44. The method of claim 1 wherein the method operates on a computer system generally having a mouse with a right and a left mouse button, and wherein, if a user clicks once on a hypertext anchor of a web page using the left mouse button or analogous action, the method reminds the user of the project name and solicits the user's confirmation that the cunent downloaded page, which the user had previously initiated, is to be associated with the cunent project name or a new project name, thus permitting tracking and soliciting, receiving and stonng comments, such as key words, metatags, or descriptive terms regarding site content for use in identifying the site.
45. The method of claim 44, wherein the method provides a menu option by which a user can change setting to suppress the dialog window which otherwise would be presented upon activating a link, and after having been so suppressed, no dialog window is presented upon activating a link, the window only appeanng when the user clicks on the right mouse button, the method automatically associating the URL of a downloaded page with the cunent project name.
46. The method of claim 1, wherein URLs that are saved in association with a project name are automatically deleted after a predetermined penod of time, given that the following conditions are met:
(a) the to-be-deleted URLs are not pre-packaged URLs or otherwise useful across projects, and
(b) the user has made no comment or input no keyword regarding the site,
47. The method of claim 46, wherein the following steps are performed: a. a URL is saved as part of a data listing including other URLs, together with an associated
Figure imgf000041_0001
b. the time tags are scanned in the data listing and all URLs in the listing that are of a predetermined age are marked; c. the comment field in the data structure of each marked URL are checked and if the comment field is empty, the marked URL is deleted.
47. The method according to claim 1 having an archiving feature wherein links m the research summary that haven't been activated for a predetermined period of time are deleted to an archiving file such as a dedicated archive or a waste basket which permits a user to restore the link at a later time.
48. The method of claim 1, wherein comments may be saved in association with a document, such as an HTML document, for display to users who download this content
49. The method of claim 48 wherein navigation icons are provided to enable a user to navigate from one site to another according to an sequence created by a prior user or users.
50. A browsing method of claim 1 , wherein the method:
(a) interacts with a browser operating on a client terminal;
(b) operates on a server which uploads a geneπc interface to the client terminal;
(c) queries the user for a project name and a user name;
(d) creates, upon input of the project name and the user name, a folder in association with this project name and tracks online activity in association with the project folder;
(e) optionally allows the creation of subfolders under the project name folder, m a tree-like structure; and
(f) includes means for saving files such as text documents, graphics, and speadsheet documents under the project name folder or subfolder.
51. The method of claim 50 wherein the online activity associated with multiple users is merged according to the tree structure wherein folders with matching subproject names are merged.
52. The method of the above claim wherein a nghts management module manages copyright in content produced.
PCT/US2000/017409 1999-06-30 2000-06-24 Browsing method for focusing research WO2001001275A1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
CA002377303A CA2377303A1 (en) 1999-06-30 2000-06-24 Browsing method for focusing research
IL14723900A IL147239A0 (en) 1999-06-30 2000-06-24 Browsing method for focusing research
AU63376/00A AU780165B2 (en) 1999-06-30 2000-06-24 Browsing method for focusing research
EP00950248A EP1208451A4 (en) 1999-06-30 2000-06-24 Browsing method for focusing research
US09/951,572 US7249315B2 (en) 1999-11-23 2001-09-13 System and method of creating and following URL tours
US10/032,405 US20020091836A1 (en) 2000-06-24 2001-12-21 Browsing method for focusing research
US10/631,713 US20040030575A1 (en) 2000-06-24 2003-08-01 Research cost recovery and auditing system and method

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
US14125199P 1999-06-30 1999-06-30
US60/141,251 1999-06-30
US14739299P 1999-08-06 1999-08-06
US60/147,392 1999-08-06
US15287199P 1999-09-08 1999-09-08
US60/152,871 1999-09-08
US44729399A 1999-11-23 1999-11-23
US09/447,293 1999-11-23

Related Child Applications (3)

Application Number Title Priority Date Filing Date
US44729399A Continuation-In-Part 1999-06-30 1999-11-23
US09/951,572 Continuation-In-Part US7249315B2 (en) 1999-11-23 2001-09-13 System and method of creating and following URL tours
US10/032,405 Continuation US20020091836A1 (en) 2000-06-24 2001-12-21 Browsing method for focusing research

Publications (1)

Publication Number Publication Date
WO2001001275A1 true WO2001001275A1 (en) 2001-01-04

Family

ID=27495463

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/017409 WO2001001275A1 (en) 1999-06-30 2000-06-24 Browsing method for focusing research

Country Status (5)

Country Link
EP (1) EP1208451A4 (en)
AU (1) AU780165B2 (en)
CA (1) CA2377303A1 (en)
IL (1) IL147239A0 (en)
WO (1) WO2001001275A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7469222B1 (en) * 1999-04-08 2008-12-23 Zap.Com Corporation System and method of consistent internet web site banners that provide portal-like functionality

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5933827A (en) * 1996-09-25 1999-08-03 International Business Machines Corporation System for identifying new web pages of interest to a user
US6055538A (en) * 1997-12-22 2000-04-25 Hewlett Packard Company Methods and system for using web browser to search large collections of documents
US6073135A (en) * 1998-03-10 2000-06-06 Alta Vista Company Connectivity server for locating linkage information between Web pages

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5809250A (en) * 1996-10-23 1998-09-15 Intel Corporation Methods for creating and sharing replayable modules representive of Web browsing session

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5933827A (en) * 1996-09-25 1999-08-03 International Business Machines Corporation System for identifying new web pages of interest to a user
US6055538A (en) * 1997-12-22 2000-04-25 Hewlett Packard Company Methods and system for using web browser to search large collections of documents
US6073135A (en) * 1998-03-10 2000-06-06 Alta Vista Company Connectivity server for locating linkage information between Web pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1208451A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7469222B1 (en) * 1999-04-08 2008-12-23 Zap.Com Corporation System and method of consistent internet web site banners that provide portal-like functionality
US9369534B2 (en) 1999-04-08 2016-06-14 Zap.Com Corporation System and method of consistent internet web site banners that provide portal-like functionality

Also Published As

Publication number Publication date
EP1208451A1 (en) 2002-05-29
EP1208451A4 (en) 2006-09-06
AU780165B2 (en) 2005-03-03
AU6337600A (en) 2001-01-31
IL147239A0 (en) 2002-08-14
CA2377303A1 (en) 2001-01-04

Similar Documents

Publication Publication Date Title
US7249315B2 (en) System and method of creating and following URL tours
US20020091836A1 (en) Browsing method for focusing research
US20080148193A1 (en) System and method of efficient web browsing
Dochartaigh The internet research handbook: A practical guide for students and researchers in the social sciences
US8805814B2 (en) Methods and systems for searching databases and displaying search results
US8095875B2 (en) Method and apparatus for consolidating network information
US20020165856A1 (en) Collaborative research systems
US20050227218A1 (en) Learning system based on metadata framework and indexed, distributed and fragmented content
US20090210391A1 (en) Method and system for automated search for, and retrieval and distribution of, information
US20080028025A1 (en) Method and system for managing preferred web site links
EP2047377A2 (en) Method and system for sharing and accessing resources
US20060074843A1 (en) World wide web directory for providing live links
Bhatnagar Web-based library services
US20120005186A1 (en) System and method for aggregating and interactive ranking of search engine results
AU780165B2 (en) Browsing method for focusing research
De Bra et al. Searching for arbitrary information in the world-wide web: the fish-search for mosaic
Wiggins The University of Minnesota's Internet Gopher System: A tool for accessing network-based electronic information
Sharma et al. Search engine: a backbone for information extraction in ICT scenario
Arora Web-based digital resources and services: trends and innovations
Brack et al. Collection level description-the riding and agora experience
Ma et al. Genesis of an electronic database expert system
Boss Library portals
Kelly et al. Running a World-Wide Web Service
Pandian et al. Emerging technologies for knowledge resource management
Das Subject gateways: the clever way to information

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2377303

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 63376/00

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: IN/PCT/2002/00048/DE

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2000950248

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2000 9146

Country of ref document: AT

Date of ref document: 20010222

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 20009146

Country of ref document: AT

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 2000950248

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

WWG Wipo information: grant in national office

Ref document number: 63376/00

Country of ref document: AU

WWW Wipo information: withdrawn in national office

Ref document number: 2000950248

Country of ref document: EP