WO2002035384A2 - A system and method for providing functions to react to a notification - Google Patents
A system and method for providing functions to react to a notification Download PDFInfo
- Publication number
- WO2002035384A2 WO2002035384A2 PCT/EP2001/012362 EP0112362W WO0235384A2 WO 2002035384 A2 WO2002035384 A2 WO 2002035384A2 EP 0112362 W EP0112362 W EP 0112362W WO 0235384 A2 WO0235384 A2 WO 0235384A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- alert
- user
- access
- tools
- contactpoint
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
Definitions
- This invention relates to information propagation systems. More specifically, the invention relates to enabling reacting to alerts in information propagation systems, in particular by creating links to appropriate web sites and people.
- the Internet has turned out to be an important new medium of communication between businesses of all sorts and their customers, partners and employees.
- the Internet has turned out to be an important new medium of communication between businesses of all sorts and their customers, partners and employees.
- CRM Customer Relationship Management
- Alert systems based on the Internet are of great value as tools for CRM, as they allow marketers to easily provide information important for the customer's benefit.
- alert systems have been proposed as an alternate method to e-mail, preferable to e-mail, because the messages will be reachable from the desktop, thus more easily and directly.
- the messages can be drawn to the customer attention: - either in a less invasive form (for instance in the form of a small icon, or a button on the task bar) than e-mail would allow,
- alert systems may be enhanced or facilitated by using alert systems.
- the word alert refers to what is sent to end users, even if the content has no particular emergency, since the overall technology does not depend on signification.
- alert systems both allow to transmit the right amount of information at the right time, and, depending on the application, can either respect end user privacy or, to the contrary, call very explicitly to the end user's attention.
- Some alert system allow the users to respond to the server that creates and pushes the alert .
- Alert systems are part of what is called push technology, where one of the main arts is to provide content with minimal latency at the user's end, and minimal impact on the traffic on the network being used.
- Push technology for instance in the form taught in US Patent 6,123,737 to Sadowsky, has in particular been used to develop alert systems such as commercialized, in particular under the name of BackWeb, and serves as basis to various functions such as executive communication, call centers, direct sales, resellers communication, field service, supply chain management, and business to consumer communication (see BackWeb; A Cooperative Architecture for a Flexible "Push-Pull” Broadcasting Solution, Mar. 1997, USA, published on the World Wide Web and http : //www. backweb . com) .
- An alert system is a piece of middle ware which has both server side and client side components. Assume the overall system has been installed, and that the server S wants to alert clients Cl, C2 , ..., C3 , which have been chosen as target of the current alert by human or automatic means . According to the basic principles of push technology, to minimize the time the clients Ci will have to spend in front of their screens, some or all of the content of the alert will be pushed to the clients before they are notified of the alert. The alert then manifests itself by a pop out window of some appropriate size and shape appearing on the clients screens, or as a more discrete mark so that the alert window pops out only if prompted. The window immediately presents a short abstract of the alert content, and/or delivers some information that needs to be used, for instance in the context of using the system for supply chain management. As discussed previously, such a system may serve for several purposes.
- the purpose of the present invention is to present a new type of alert system, also using push technology, but furthermore enriched by also providing one or more necessary tools for a user to react to the alert. So it represents a combination of push, pull, and collaboration technologies.
- Some of the tools provided to the user may include collaboration enabling systems in particular with experts on the subject matter of the alert, definition of some virtual community whose members can help respond to the alert and become easy contacts at least during the time needed to respond to the alert, access to web page, computational tools, dictionary, search results, automatic translation tools, etc.
- the invention is used to reach customers or potential customers in a manner allowing enrichment of the contact if and when the customer or potential customer so requires.
- an enriched alert system build according to the present invention will be called Coi ⁇ tact-Poir- .
- Figure 1 represent a generic computer screen before a ContactPoint alert kicks in.
- Figure 2a represents the same generic computer screen as in Figure 1, after the ContactPoint windows pops out.
- Figures 2b-2c show a ContactPoint alert manifested by a blinking button.
- Figures 2d-2g show a ContactPoint alert manifested by a partitioned button that grows, where different parts of the button offer different options.
- Figure 2h is a flow diagram for how the client part of ContactPoint decides to alert the server that the end user does often open the alert messages.
- Figure 3 replicates Figure 2a, with a magnification of the ContactPoint window, where one can see examples of buttons allowing actions to be taken.
- Figure 4 illustrates one example of tool offered by ContactPoint: after clicking on a chosen button from the ContactPoint window, one is directly connected to a web page, which possibly would need complicated access procedure otherwise.
- Figure 5 is a block diagram representing the overall architecture of ContactPoint, splitted in Fig. 5A and Fig. 5B.
- Figure 6 is a block diagram representing details from a part of the overall architecture represented in Figure 5.
- Figure 7 represent examples of various element constituting the content of alerts and response tools in the case of an alert system watching stock price.
- Figure 8 is a flow chart describing, in the context of Figure 7, how to compose alert and response tools messages for various customers depending on the event and the customer profile, and how to prepare the scheduling priority for the delivery of the message.
- Figure 9 is a block diagram representing the general simplified architecture for a reaction enabling system such as ContactPoint, and various players in the present invention.
- Figure 10A is a block diagram showing how access to extended services can be proxied through the ContactPoint Content Server .
- Figure 10B is a block diagram showing how access to extended services can be made available directly to the client without the use of special proxies .
- FIG. 1 is represented an arbitrary screen 100 the user is seeing on the PC, while at work or at play for instance.
- a ContactPoint alert window 105 appears on the screen.
- a small button 110 could blink or change color 115, and the alert window would pop out only when some button or icon is clicked on
- a button can grow 120 that offers several options (see Figures 2d-2g) .
- the notification modality is not limited to the visual and could also include other modalities such as auditory and tactile, and combinations thereof.
- the server part of ContactPoint encapsulates all information that may be relevant in providing a personalized service. This includes a description of each customer's account and contact information as well as tools that make it easier for the customer to evaluate his account portfolio (for instance in the case of financial services) , submit transactions, contact a customer service representative, receive timely updates, be aware of issues that are directly relevant to his ongoing relation with the business, etc.
- the client part of ContactPoint takes care of the user interface for alert display and reaction enablement, and of the communication with the server. Both the server and the clients part will be described in detail below.
- the same window where alerts will be displayed will also offer the clients the possibility to react to the alert by many means which depend on the alert. Further windows may easily be opened as well (without changing anything else in the overall system and method) instead or in concurrence to special function buttons as displayed in Figure 3.
- Examples of what can be offered to the clients to allow them to react to the alert comprise: Software made available which allows the user to evaluate the situation described by the alert. For instance: i. calculators ii. dictionaries, iii. automatic language translation tools, iv. any other special programs will be delivered to compare the merits of two loans offers, to compare different sources of information describing some event, etc. Pages of the World Wide Web (WWW) with protected access will be made available, by a single or a few clicks, possibly avoiding the client's need to register to these pages,
- WWW World Wide Web
- Phone connections can be established by a simple click, using for instance voice over IP technology; dual audio and video links can be invoked instead,
- Collaboration with machines and/or human agents from the server's organization or allies, as well as from the same pool of users and/or community if deemed appropriate (as for instance for some use in the health industry) can be establish by simple clicks.
- ContactPoint will enable a community of interest for each end user, that depends on who is the end user and what is the alert, such as creating a group of all doctors that are both subscribers and specialized in the same disease,
- Any service accessible through a computer link can be delivered to the customer such as a catalog or some order forms to enable procurement: the system will also preferably only deliver catalogs and order forms whose access is compatible with the clearances of the client.
- the system can similarly propagate Requests For Quotes, etc. Notice that single or few clicks as described above could indeed be all replaced by natural language interaction, which can be run from a keyboard, or using speech recognition technology, or a combination thereof.
- a button may grow (see Figures 2d-2g) from the size of a few pixels to some fixed (preferably) small size. For instance, clicking on the grown button 10 in different ways can:
- the number of alerts that have been accepted Ace is initialized at zero, as well as number Dec of alerts that are declined.
- the ContactPoint operator decides on a delay Del after which alerts are considered as declined if not opened, and a tolerance Tol on the difference Dec-Ace prompting to send a warning to the server (other trigger methods could as easily be implemented, such as monitoring only Dec) . If Del and Tol are changed, the new values will be sent to all end user Contact Point client parts .
- Figure 2h is a flow diagram for how the client part of ContactPoint decides to alert the server that the end user does often open the alert messages.
- a new alert reaches the client at 210 at time t.
- the user can click the button at 220.
- the click can send either at 231 (open) , 232 (decline) , or 233 (store and remind me later) .
- not clicking the button before some delay will be interpreted as clicking the "store and remind me later" option and send at 233.
- Dec-Ace is smaller than Tol at 291, no further action is taken. Otherwise, at 292, a message is sent to the server to warn on the low acceptance rate of the end user; for instance by Ace and Dec are sent .
- a preferred embodiment of the ContactPoint system comprises the ContactPoint Client at 511, 512 and 571 and the ContactPoint Server (that may comprises the Collaboration/Messaging Server at 551, the Users Directory at 537, the Content Server at 561, the Alert Management Server at 535, the Alert Database at 531, and the Alert Distribution agent at 533) in addition to the System Administration interface at 520 that is mainly used for creating/managing users and alerts .
- the ContactPoint Server that may comprises the Collaboration/Messaging Server at 551, the Users Directory at 537, the Content Server at 561, the Alert Management Server at 535, the Alert Database at 531, and the Alert Distribution agent at 533) in addition to the System Administration interface at 520 that is mainly used for creating/managing users and alerts .
- the ContactPoint Server that may comprises the Collaboration/Messaging Server at 551, the Users Directory at 537, the Content Server at 561, the Alert Management Server at 535, the Alert Database at 531, and the Alert Distribution agent at 533) in addition to the System Administration interface at
- one or more teams of Support Staff and/or Domain Experts at 571 and/or facilitated contacts between customers/end users and 571 (see the dotted arrow between 511 and 571) , and/or facilitated contacts between customers/end users as part of a community (see the dotted arrow between 511 and 512) will be part of the overall organization to offer all advantages of the reaction-to-alert function. Notice that the dotted arrows represent interactions which indeed will generally be mediated by the Collaboration/Messaging Server at 551.
- the ContactPoint client (at 511, 512, and 571) is an application that runs on the end users device (for instance a PC or some wireless device) and manages all users' interactions with the system (Acknowledging/viewing alerts content, submitting queries, issuing transactions, etc.).
- the ContactPoint client in particular implements the following functions:
- the ContactPoint Server (at 501) includes:
- the Alerts Database (at 531) that contains the definitions of the different components for each alert : i) alert dependent Visual/Audio means to communicate that there is new content when the alert is first received by the user, ii) the alert priority relative to other alerts in the system, iii) possibly the URL to the actual alert document (this could be a document on the current server or a remote server on the web) , iv) and the list of users the alert is intended to with the status for each user such as "Pending",
- Alert Distribution Agent At 533 that manages the distribution of the alerts based on their priority and the user current status (connected or off-line) and possibly the user priority.
- the alert distribution agent will for instance always attempt to send the latest alert submitted first and reiterate on the older alerts only after the most recent one has been acknowledged by the user.
- Each alert will preferably be stamped with a deadline or freshness date that determines when the alert becomes obsolete and should be discarded if not transmitted by the given deadline.
- the alert distribution agent will preferably be able to detect when the user connects to the system and whether the alert was successfully transmitted before the user disconnects from the system. If some user fails to receive too many alerts, according to some predetermined tolerance, a message may be sent to the system administrator, who may then try to contact the end user, or take some other actions.
- the Alert Management Server (at 535) that implements a set of tools that the System Administrator (at 520) uses for managing user profiles and defining the alerts and the Alert Distribution Schedule.
- These tools include a web interface for adding users to the system, creating groups of users and assigning users to each group, defining user profiles that will subsequently be used to decide what alert or type of alert a given user or group of users should receive, defining the alert components such as the visual effect the client should produce when the alert is received, the full document of the alert, the alert expiration date, the subject expert assigned to the alert and the most appropriate communication medium (i.e. text chat, voice chat, e-mail, audio/video conferencing, etc.) That the alert recipient can use to start a collaborative session with the subject expert.
- a web interface for adding users to the system, creating groups of users and assigning users to each group, defining user profiles that will subsequently be used to decide what alert or type of alert a given user or group of users should receive, defining the alert components such as the visual effect the client should
- the Alert Management Server also allows for grouping of alerts so related alerts can be sent simultaneously to provide a more complete view of a particular event. It also provides the administrator with a global view of who receive any particular alert and when and means for defining alert priorities so the delivery of a more recent alert can follow or proceed a previously pending alert.
- the Content Server (at 561) is a repository of documents that include the main body of the alert and other related documents that need to be replicated to the alert recipient's local environment or local device used for receiving and viewing the alerts . These documents could include links to external documents that do not reside on the content server and therefore are no replicated to the alert recipient's local environment.
- the Users Directory (at 537) that lists all the users that can log in to the system and their identifiers (IDs) .
- IDs identifiers
- it preferably includes a user profile that defines the user interest for targeted information and possibly other parameters, such as priorities as defined by the price paid for services, and/or depending on the value of the customer for the ContactPoint operator.
- the User Directory can be implemented on top of such directory standards as the Lightweight Directory Access Protocol (LDAP) or other directory services.
- LDAP Lightweight Directory Access Protocol
- the Collaboration/Messaging Server (at 551) that allows two or more users to engage in real-time, collaborative activities such as chat or document sharing. It also implements the messaging protocol since an alert can be viewed as a message sent from an automated user (the Alert Distribution Agent at 533) to the end users (511, 512 and 517), be they customers (like at 511 or 512) or part of the organization (like at 571) .
- the System Administrator (at 520) is responsible for creating and maintaining the user IDs and the Alerts Database at 531, using for instance a Web Browser as a System Administration Interface at 521.
- Databases and a variety of documents production tools can also be part of the tool kit at 520, or integrated with the Alert
- All of the logic for administering the system is preferably implemented as Java servlets running inside of WebSphere (as an example of server that can support
- ContactPoint WebSphere is a product of the IBM corporation), and includes the following functions:
- SA2 Creating the alert including the visual effect produced by the client as well as the alert content and priority, SA3) Associating subject expert at 571 with the particular alert, SA4) Specifying related link with additional information, and/or actions access and further tools the alert recipient can use to respond to the alert, SA5) Creating one or a plurality of virtual communities for some or all alerts, Function SAl) is an administrative function once proper verification that the user qualifies has been made. Such verification can be done in many ways and is rule dependent: for instance every user may qualify, or the user must give some credit card information, or the end user may need to be a regular customer, etc.
- alerts are created from analyzing news. Then a news feed will bring news from some sort at 585 to the Alert Management Server at 535.
- the type of news that should be isolated as events (which we defined as actual or potential alert contents or alert content components) may be identified automatically. Examples of events are provided by stock prices passing some preset barrier, showing some jumps above some fixed level on or under a preset interval of time.
- the alert content can be also determined by simultaneous data, or successions of events rather that single data points.
- the form of the alerts that will be sent can be very uniform, and consist of just the event displayed in some predetermined format, or some rule can be designed where the alerts are chosen depending on classes of events : for instance on the amplitude of a price differential in the case of market data can determine the color of the background of the message.
- a human agent can either have the means to overrule the automatic decisions, or fully be in charge, depending on the type of business.
- each alert may be completely composed by human agents which may spend lots of time and money to create content elements such as video-clips and other forms of multimedia content. - 1.
- Some or all of the functions SA3 ) and SA4) can be performed automatically, using natural language understanding to recognize how each alert should be handled: in the simplest form, the system would look for key words, and then check a database residing for instance at 520 to match proper responses to these key words.
- a numeric priority P(A) will also be attached to each alert A, so that if P(Al)>P(A2), the alert Al has higher priority than A2 : we will describe later how this different priorities are handled.
- the priority can be assigned according to a preset collection of rules. Again, a human agent can either have the means to overrule the automatic decisions, or fully be in charge, depending on the type of business.
- the events prompters associated to stock i, or information that determine there is an event may be defined for different stocks, and prompter can be defined by set of stocks
- prompter can be defined by set of stocks
- a message displaying (i,q(t) ,q(t0) ) will be prepared at 823 using some preset format adapted to medium emergency level alerts, and possibly depending on i. Otherwise, the answer is YES at 825, and a message displaying (i, q(t) , q( tO) ) will be prepared at 827 using some preset format adapted to medium emergency level alerts, and possibly depending on i.
- the integer part U of q(t) -q(t ⁇ ) is computed at 830.
- the tool set that j (Ev) will receive to react to the alert on event Ev is looked up at 850 in the User Directory 537.
- the message content and aspect composed at 823 or 827 as well as the tool kit for the triple (j (Ev) , i, U) coming from 850 are sent to Alert Descriptor Database at 601.
- the way the priorities are decided at 870 and 880 will be described below in the section on scheduling.
- j (Ev) is replaced by (j+1) (Ev) at 845. If j+1 is greater than the number of users interested in Ev, one goes back to 813 to consider the next stock treated. Otherwise, returning at 840, the next user concerned by event Ev begins being treated.
- Function SA5 can be fulfilled by looking up the User Directory at 537, or other sources of information, possibly dynamically updated, that the System Administrator may access, for instance from the WWW.
- the Alert Distribution Agent at 533 retrieves the list of alert recipients of the alert being considered and their respective tagged sets of response tools for the alert being considered from the Alert Database at 531 whenever the state of the system changes, for instance: a new user logs in, a new alert is submitted, - a previously delivered alert has been acknowledged by the client, etc ...
- the messaging system is responsible for notifying the alert distribution agent if a particular recipient is online or deferring this notification until the recipient logs in to the system.
- the ContactPoint client determines if it has a network connection. If a network connection is not available at startup, the client suspends itself and wakes up periodically to query the system until it determines that a network connection is available. It then automatically initiates the log-in procedure to the Collaboratio/Messaging Sever at 551.
- the alert distribution system retrieves all the alert descriptors at 601 for the alert including: visual effect (one can for instance use alternating images (e.g., gifs) to produce flashing on the screen) , alert document URL (we prefer to support HTML as well as videos) , related URLs and other resource the alert recipient can access including a list of subject experts that the alert recipient can contact via telephone, chat, data conferencing, e-mail, video-conferencing, analytic tools, dictionaries, translation machines, etc.
- visual effect one can for instance use alternating images (e.g., gifs) to produce flashing on the screen
- alert document URL we prefer to support HTML as well as videos
- related URLs and other resource the alert recipient can access including a list of subject experts that the alert recipient can contact via telephone, chat, data conferencing, e-mail, video-conferencing, analytic tools, dictionaries, translation machines, etc.
- the alerts contents and parameters, as well as the response enabling tools parameters are then packaged in one message and sent to the recipient ContactPoint client at 511, 512, and 571 via the Collaboration/Messaging Server at 551.
- the client retrieves all related documents to the local PC, or other computing device being used (whenever required for off-line browsing) before flashing the alert on the recipient's screen. It then sends an acknowledgment to the Alert Distribution Agent at 533 in the form of a reply message indicating successful (or unsuccessful) reception of the alert .
- the client could also send an acknowledgment to the server when the user actually clicks oh the flashing alert, to the extent this is compatible to the privacy rules and/or standards used by the ContactPoint owner.
- the proper application for handling the content of the alert (web browser, media player, etc.) is invoked to display the alert.
- the client displays the list of users or subject experts in a separate window inviting the user to click on one of the names and start a collaboration session with the particular expert.
- the end user can also or instead be offered buttons to prompt a variety of responses to the alert, as was discussed previously with reference to Figure 3.
- the alert content or related URLs may reside on web servers across the Internet that may or may not require user authentication. If user authentication is required for some or all accesses, the ContactPoint client handles any authentication in a manner that is transparent to the user, according to what we describe below (see “Identity and entitlement manager for electronic commerce applications"). This is possible by adding the necessary credentials for accessing this information to the user's profile in the ContactPoint users directory server. These credentials are retrieved on-demand by the ContactPoint client and presented to the hosting server when needed. This allows quasi-anonymous access to secure (nonpublic) information as long as the proper authorization are obtained from the hosting organization by the organization offering ContactPoint services.
- the overall security can also be enhanced by requiring some access methods to be used on the ContactPoint window, such as a password, or some smart card.
- some access methods such as a password, or some smart card.
- scheduling In some cases, there will be too much data to be transmitted in one alert to allow all customers to be addressed at the same time, because of the network limited capacity (for instance, when the alert comprises a video clip) . This issue will be addressed by proper scheduling, as we next describe.
- the clients being grouped in classes Wl, W2 , ..., Wn with priorities 1, 2, ..., n, where the highest number corresponds to the highest priority, one will first serve the customers with priority n. If Wn has a small enough number of members to accommodate network on a given message, they will all be served at once, together with some members of groups with lower priority. Otherwise, one will pick a subset of Wn for the first round, and proceed in similar manner in subsequent rounds . The choice of the subset can be made at random for each new message and at each round.
- the same method will be used when dealing with lower priority classes.
- the delivery will either be prompted simply, automatically and transparently for the client, by the opening the message. Alternatively, the client will have to choose to receive or not the message.
- the request of the requester R will then arrive to the server with the priority P(R) of the requester and the time T(R) when this request is sent (alternatively, T(R) may be chosen as the time when the request reaches the server).
- the two parameters P(R) and T(R) can then be used to order the sending of the heavy contents to the requesters.
- each request keeps the priority P(R) defined by who is the requester R, and the priority supersedes time ordering, so that high priority customers can only be preceded by same or higher priority customers, except if some lower priority customer could put his/her order at a time the file was small and the order could be fulfilled.
- the priority of a request can increase with time, according to a formula deemed adapted to the weights one wishes to give to priority.
- the priority at time T(R)+Dt(R) can be set to P (R) + [Dt (R) ] , where [X] stands for the integer part of the number X, and the elapsed time Dt(R) since T(R) is measured using some unit, which may depend on the performances of the network at the time of operation, or be fixed, say to one second or one minute.
- [X] stands for the integer part of the number X
- Dt(R) since T(R) is measured using some unit, which may depend on the performances of the network at the time of operation, or be fixed, say to one second or one minute.
- a variety of alternate scheduling methods can be used, as well known in the art of queuing theory: see for instance Leonard Kleinrock: Queuing Systems Volume I : Theory (John Wiley and Sons, New York, 1975), Volume II: Computer applications (John Wiley and Sons, New York, 1976) (see in particular Volume II, Chap. 3, Priority Queuing, pp.106-155).
- the priority P(j(Ev),Ev) of the pair (j(Ev),Ev) is calculated out of the priorities of j (Ev) and of Ev.
- P(j(Ev),Ev) can be chosen as the sum of the priorities of the user j (Ev) and of the event Ev.
- the way the priority P(j(Ev),Ev) is handled can be chosen as has been described previously for requests priorities.
- the present invention will disclose how ContactPoint, as an example of a reaction enabling system extends the digital certificate to include entitlement of some of its selected users .
- the user of the web site who requests access to a site as invited to by the reaction enabling system, does not have to disclose who he/she, pay fee, or other inconveniences.
- the company that owns the web site and is providing the service does no have to be the issuer of the certificate.
- the issuer may be the company that operates the reaction enabling system server or another company that had forged some sort of partnership with the owner of the web site to provide a specific service for the customer of a reaction enabling system.
- a Mutual Fund Firm A may offer its customers a special service to help them prepare their income taxes early in the year.
- the tax service will most likely be offered by a Tax Preparation Firm B with whom Firm A had negotiated a special contract.
- Such contract may specify that the offer is only available for the first 4 month of the year and free of charge to Firm A customers.
- a Firm A customer does not have to sign-up for a new account with Firm B.
- the simple fact that he is a user of ContactPoint allows him to receive the tax preparation service ' until such time as his entitlement to the service is revoked by Company A.
- the provider OccEntProv of occasional entitlement to the use of some site will negotiate means to reach the site for a collection of potential user, and then provide the means of reaching the site as reaction to some prompt delivered by some company that may be OccEntProv or some other company OC that uses some reaction enabling system such as ContactPoint.
- some company may be OccEntProv or some other company OC that uses some reaction enabling system such as ContactPoint.
- OccEntProv and OC uses some reaction enabling system such as ContactPoint.
- the access to a secure site may either seem easy to the end customer, who may not notice the site is restricted, or the end customer will knowingly using (possibly) temporary entitlement, depending of the choice of preferred embodiment.
- the present invention may also be used to control access to special functions on a site whose access with limited function access is easily accessible.
- the site may serve both to advertise products and allow some users to order some products.
- Authorization and description of the type of orders an end user is entitled to can be distributed according to the present invention to facilitate the use of the order functions of the site.
- reaction enabling system 901 has links to the end users 511 and 512, and with OccEntProv at 910. OccEntProv also has relation with some secured site S at 920.
- the reaction enabling system 901, using its contract with 910, will give access to 920 to (some of) its end customers.
- the provider OccEntProv of occasional entitlement to the use of site S will contact the site owner SO and negotiate occasional access for some potentially set of customers in several ways described, as follows.
- OccEntProv will obtain (at some price, and/or for of contract) from SO that customers be given access rights, in the form of what we call an access codes , which may consists of passwords, and/or encryption software such as a digital signature. Any such access code AC will be recognizable by S as having (possibly) temporary use, and the contractual authorization will be preferably checked at any attempt to access S. S will preferably be able to detect from AC who is OccEntProv. This will allow one form of payment amount computation for the transaction between OccEntProv and SO. This will also allow SO to keep some statistics to verify the size of the contracts, and may give indication of some form of fraud.
- an access codes which may consists of passwords, and/or encryption software such as a digital signature.
- Any such access code AC will be recognizable by S as having (possibly) temporary use, and the contractual authorization will be preferably checked at any attempt to access S.
- S will preferably be able to detect from AC who is OccEntProv. This
- OC will distribute a version of AC to each end user EU through the reaction enabling system it owns, with the proper set of instruction on how to use AC. EU will then establish directly a connection with the site S.
- OC will comprise an AC number which can be used only once .
- OC will be the intermediary of all connections between EU and S. Then OC keep the AC of EU in its database, associated to EU's other data as much as laws on confidentiality allow in the country where the invention is used, for use when EU wants to connect with S, and easily controls, not only the access of EU (and the fact it is compatible with all relevant contracts) , but also the precise nature of its entitlements.
- OccEntProv will preferably negotiate with SO that OC has to reveal its own identity each time it creates an access to S for one of its own end customers, so that OccEntProv understands better how to charge OC .
- OC gets from the negotiation between OccEntProv and OS, the right to host a replica of the data and services provided by S that the end customers of OC may use.
- OC can clearly be OccEntProv itself, either for some or for all of the sites it wishes to make accessible to its end customers.
- Figure 10A shows how the first embodiment can be implemented by giving the ContactPoint Client 512, a (possibly) temporary copy of the entitlement contract, preferably in most cases with a specific expiration date, that the client needs to present to the Extended Services Controller 1000 (the machine, human, or combination of them that controls all accesses to Site S at 920), at Site S 920 to receive the services he is entitled to.
- the Extended Services Controller 1000 the machine, human, or combination of them that controls all accesses to Site S at 920
- Figure 8B shows how the second embodiment and third embodiment can be implemented by having the Content Server 561, of ContactPoint Server proxy all request from the client to the Extended Services Controller 1000.
- ContactPoint Client 512 needs to access a specific service, he sends the request Content Server 561, who will forward it to the Extended Services Controller 1000, on behalf of the ContactPoint client 512.
- Some example applications/uses of the ContactPoint invention will now be presented that will illustrate the improvements of the invention over the prior art. These applications are not meant to be exhaustive, but should only be taken as illustration of the supplementary power offered by the new functionalities offered by ContactPoint.
- the access of the end customer to his/her account and to his/her personalized set of offered transactions can be through buttons on the ContactPoint window, which at the same time will announce new products, preferably chosen according to the profile of the customer.
- the marketing function is secondary, from the end user perspective, as coming as a decoration to a window useful for its functionality.
- the alert system will allow to inform the customer of important stock moves, or any news about any instrument or mutual fund known to be of interest to the customer, as in any alert system.
- ContactPoint will furthermore offer means to access more complete information, allow to evaluate positions and strategies by pushing proper tools and accesses, and facilitate interaction with a broker or a financial analyst.
- alerts can be propagated between, for instance a manager and his/her team of traders.
- the collaboration functions can then be used to organize very quickly a conference or video conference to discuss the issues and how to react to them.
- Some or all traders on a floor will be allowed to play the role of the System Administrator when needed, in a manner controlled by access control as regulated for instance by public key encryption and passwords. Different individuals authorized to the System Administrator function may have different priorities which will be handled as has been described previously for alerts and customers .
- the ContactPoint window can provide permanently means to report claims, at the same time as it will carry any CRM/Marketing function such as describing new products, wishing a happy birthday, or offering a bill presentment and payment function, either only for insurance bills, or in a more general context as presently several insurance companies want to become preferred overall financial partners .
- buttons on the ContactPoint window will for instance give access to selected catalogues.
- the catalogs may contain order forms or these can be invoked independently, for instance to renew some regular order.
- the Marketing and pure alert functions may appear as secondary to the end user, even if they are essential in the ContactPoint server owner's strategy.
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- Operations Research (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Quality & Reliability (AREA)
- Marketing (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2002219061A AU2002219061A1 (en) | 2000-10-27 | 2001-10-25 | A system and method for providing functions to react to a notification |
| KR10-2003-7005523A KR20030048443A (en) | 2000-10-27 | 2001-10-25 | A system and method for providing one or more functions to react to an alert and reach appropriate sites or people |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US69842400A | 2000-10-27 | 2000-10-27 | |
| US09/698,424 | 2000-10-27 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2002035384A2 true WO2002035384A2 (en) | 2002-05-02 |
| WO2002035384A3 WO2002035384A3 (en) | 2002-08-22 |
Family
ID=24805180
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2001/012362 WO2002035384A2 (en) | 2000-10-27 | 2001-10-25 | A system and method for providing functions to react to a notification |
Country Status (3)
| Country | Link |
|---|---|
| KR (1) | KR20030048443A (en) |
| AU (1) | AU2002219061A1 (en) |
| WO (1) | WO2002035384A2 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR100465045B1 (en) * | 2002-10-01 | 2005-01-13 | 윤용열 | System and method for transferring urgent message |
| WO2006118928A1 (en) * | 2005-05-03 | 2006-11-09 | Cisco Technology, Inc. | Communicating multimedia information to respondent endpoints |
| US11741546B1 (en) * | 2021-01-22 | 2023-08-29 | Wells Fargo Bank N.A. | Data capture and integration architecture for a quantamental computer system |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6123737A (en) * | 1997-05-21 | 2000-09-26 | Symantec Corporation | Push deployment of software packages using notification transports |
| GB2336697A (en) * | 1998-04-24 | 1999-10-27 | Dialog Corp Plc The | Alerting user-processing sites as to the availability of information |
| US6886030B1 (en) * | 1998-08-18 | 2005-04-26 | United Video Properties, Inc. | Electronic mail system employing a low bandwidth link for e-mail notifications |
| EP1188134A2 (en) * | 1999-02-11 | 2002-03-20 | Ezlogin.com.Inc. | Personalized access to web sites |
| GB2349244A (en) * | 1999-04-22 | 2000-10-25 | Visage Developments Limited | Providing network access to restricted resources |
-
2001
- 2001-10-25 WO PCT/EP2001/012362 patent/WO2002035384A2/en active Application Filing
- 2001-10-25 KR KR10-2003-7005523A patent/KR20030048443A/en not_active Ceased
- 2001-10-25 AU AU2002219061A patent/AU2002219061A1/en not_active Abandoned
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR100465045B1 (en) * | 2002-10-01 | 2005-01-13 | 윤용열 | System and method for transferring urgent message |
| WO2006118928A1 (en) * | 2005-05-03 | 2006-11-09 | Cisco Technology, Inc. | Communicating multimedia information to respondent endpoints |
| US8402089B2 (en) | 2005-05-03 | 2013-03-19 | Cisco Technology, Inc. | Communicating multimedia information to respondent endpoints |
| US11741546B1 (en) * | 2021-01-22 | 2023-08-29 | Wells Fargo Bank N.A. | Data capture and integration architecture for a quantamental computer system |
| US12039606B2 (en) | 2021-01-22 | 2024-07-16 | Wells Fargo Bank, N.A. | Data capture and integration architecture for a quantamental computer system |
| US12380505B2 (en) | 2021-01-22 | 2025-08-05 | Wells Fargo Bank, N.A. | Data capture and integration architecture for a quantamental computer system |
Also Published As
| Publication number | Publication date |
|---|---|
| KR20030048443A (en) | 2003-06-19 |
| WO2002035384A3 (en) | 2002-08-22 |
| AU2002219061A1 (en) | 2002-05-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20040153453A1 (en) | Business method for providing one or more functions to react to an alert and reach appropriate sites or people | |
| US6691153B1 (en) | Method and system for process interaction among a group | |
| US8688531B2 (en) | System for associating requests with potential respondents to said requests | |
| US8176122B2 (en) | Web-based groupware system | |
| US6493722B1 (en) | Billing system for distributing third party messages to form a community of subscribers to negotiate a group purchase from the third party | |
| US9213988B2 (en) | Electronic commerce infrastructure system | |
| WO2006022917A2 (en) | A system, method, service method, and program product for managing entitlement with identity and privacy applications for electronic commerce | |
| US10521853B2 (en) | Electronic sales system | |
| US8745046B2 (en) | Method and system for selecting content items to be presented to a viewer | |
| US20040024639A1 (en) | Direct marketing management on behalf of subscribers and marketers | |
| US20050198124A1 (en) | System and method for embedded instant messaging collaboration | |
| US20050144279A1 (en) | Transactional white-listing for electronic communications | |
| US20090018945A1 (en) | Systems and methods for facilitating electronic securities transactions | |
| US20030110047A1 (en) | Automatic auction bid cancellation method and system | |
| US20020087506A1 (en) | Method and system for interactively enabling venture financing for entrepreneurs | |
| US20140222707A1 (en) | Distributed commerce system | |
| JP2000076307A (en) | Communicating method and communication network | |
| US20080168370A1 (en) | Method and System for Providing Alerts to Clients Engaging in Security or Commodity Trading | |
| TW200414735A (en) | Privacy service | |
| EP1442435A2 (en) | Electronic subpoena service | |
| US20100082449A1 (en) | Electronic commerce privacy proxy | |
| WO2006004668A2 (en) | Inferred endorsement system and method | |
| US20140229559A1 (en) | Targeted invitation delivery | |
| US20130167042A1 (en) | Web-based groupware system | |
| EP2056248A1 (en) | Electronic commerce system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 1020037005523 Country of ref document: KR |
|
| WWP | Wipo information: published in national office |
Ref document number: 1020037005523 Country of ref document: KR |
|
| REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
| 122 | Ep: pct application non-entry in european phase | ||
| NENP | Non-entry into the national phase |
Ref country code: JP |