Method and system for managing preferred web site links

ABSTRACT

A method and system for identifying, categorizing, and sharing web site links over a communications network via a web key tool includes receiving a request, including a website link, to incorporate information relating to the website into the web key tool. The method also includes associating the information and the link with a category, which includes viewing a list of categories and selecting the category from the list or defining a new category, as well as manually entering a uniform resource locator and description of the information or importing the information during a search from an active web site. The method also includes transmitting the information and link to a central storage location associated with the web key tool and processing the information, which includes approving the information and link for storage or either aborting the process or returning to the category selection option and repeating the selection process if the information is not approved.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation application of U.S. Ser. No.09/879,270, filed on Jun. 12, 2001, the disclosure of which isincorporated by reference herein in its entirety.

BACKGROUND

This invention relates generally to information processing in a networkenvironment, and more particularly, this invention relates to animproved web browser method and system for identifying, categorizing,and displaying preferred web site links over a network.

The World Wide Web (WWW), or “web”, has become a well-known andversatile feature of the Internet. The web comprises many files or pagesof information, distributed across many different servers. Each page isidentified by an individual address or “Universal Resource Locator(URL)” which, in turn, denotes both a server machine and a particularfile or page on that machine. There may be many pages or URLs residenton a single server.

Typically, to utilize the web, a user runs a computer program called aweb browser on a client computer system such as a personal computer.Examples of browser programs on the market include Microsoft InternetExplorer™ and Netscape Navigator™. The user interacts with the webbrowser to select a particular URL. The interaction causes the browserto send a request for the URL-identified page or file to theURL-identified server. Typically, the server responds to the request byretrieving the requested page and transmitting the data back to therequesting client utilizing hypertext transfer protocol (HTTP), a wellknown protocol in the art. The page received by the client is displayedto the user on the client machine. The client may also cause the serverto launch an application, such as a search engine, to search for webpages relating to particular topics.

Web pages are typically formatted in accordance with a computerprogramming language known as hypertext markup language (HTML). Thus, atypical web page includes text together with embedded formattingcommands, referred to as tags, that can be employed to control fontstyle, font size, layout features, etc. The web browser parses the HTMLscript in order to display the text in accordance with the specifiedformat. In addition, an HTML page may also contain a reference, in termsof another URL, to a portion of multimedia data such as an image, videosegment, or audio file. The web browser responds to such a reference byretrieving and displaying or playing the multimedia data. Alternatively,the multimedia data may reside on its own web page, without surroundHTML text.

Most web pages also contain one or more references to other web pages,which need not reside on the same server as the original page. Suchreferences may be activated by the user selecting particular locationson the screen, typically by clicking a mouse control button. Thesereferences or locations are known as hyperlinks, and are typicallyflagged by the web browser in a particular manner such as through theuse of color coding the text link. If a user selects the hyperlinkedtext, then the referenced page is retrieved and replaces the currentlydisplayed page.

Newer browser technology has extended the traditional client/servertechnology of requesting and receiving web pages to now include moreadvanced features. Information previously incapable of being displayedvia a browser can now usually be presented with the assistance of a plugin application that runs on top of the browser program. Other recentdevelopments in web technology include packaged suites of well-knownapplications software and groupware tools which provide “full service”web computing capabilities. These enhancements have already proventhemselves in the business community where business enterprises andtheir trading partners enjoy extensive collaboration and communicationcapabilities.

One drawback to web technology, however, relates to the growing numberof web sites and the correlated searching difficulties encountered byweb users. To access a desired web site, a user must remember either theweb site name as it is registered in the domain name registry (i.e.,exact spelling and punctuation), or remember the URL address to whichthe name belongs.

Another major drawback is the sometimes overwhelming sea of informationwhich an ill-planned web search can return. Conducting carefullyexecuted searches requires some boolean-based search knowledge,particularly for time-pressured web users, before meaningful andsubstantive information can be found. Search engines with their limited“keyword” and boolean operator approach can further aggravate aninexperienced web surfer. Thousands of documents and links containing aselected key word are flagged and displayed by the search engine, oftenresulting in slow information retrieval, too much information, or thewrong information. In fact, savvy web site proprietors have been knownto strategically and purposefully interpose popular keywords into theirweb pages in order to increase their site's visibility and web presenceby ensuring that their web sites will be picked up during a search.Thus, many searches lead to information which has no actual or logicalconnection to the keyword searched.

Because of the difficulties in web searching recited above, it is nowonder that commercial software developers incorporate ‘booklmarking’and ‘favorites’ tools into their products to assist the user in saving,and later retrieving, useful web sites. Bookmarks or favorites areshortcuts to pages found on the Internet. While surfing, a user caninstantly bookmark a site, linking its corresponding URL to a specifiedlocation on the user's PC.

A growing number of businesses today are setting up shop online andopting for the convenience that e-commerce and onlinebusiness-to-business (B2B) activities offer. Traditional communicationschannels such as telephone, facsimile, mail, and person-to-person arequickly being replaced by e-commerce and the corporate web site. As thenumber of web sites and online B2B transactions increase, it logicallyfollows that web searching activities will continue to increase as well.As indicated above, searching the web can result in employees having tosift through vast numbers of web sites. Larger companies withgeographically scattered offices may be especially affected whereredundancies in searches are likely, resulting in wasted time and humanresources. Bookmarking a useful web site may be beneficial to oneemployee who saves this web site link in a personalized file storagelocation. However, other employees who may have an interest in this website will have no knowledge of it and thus, will not benefit from it.Employees may forward or email these links back and forth to otheremployees, but this haphazard approach to sharing information isinefficient, as the data has no central storage location and is notorganized in any useful fashion.

A process is therefore required that improves access to useful web sitesby allowing users to share the information quickly via a desktop icon orsimple keyboard selection.

BRIEF SUMMARY

A method and system for identifying, categorizing, and sharing web sitelinks over a communications network via a web key tool includesreceiving a request, including a website link, to incorporateinformation relating to the website into the web key tool. The methodalso includes associating the information and the link with a category,which includes viewing a list of categories and selecting the categoryfrom the list or defining a new category, as well as manually entering auniform resource locator and description of the information or importingthe information during a search from an active web site. The method alsoincludes transmitting the information and link to a central storagelocation associated with the web key tool and processing theinformation, which includes approving the information and link forstorage or either aborting the process or returning to the categoryselection option and repeating the selection process if the informationis not approved.

BRIEF DESCRIPTION OF THE DRAWINGS

Referring now to the drawings wherein like elements are numbered alikein the several FIGURES:

FIG. 1 is a block diagram of a portion of the system that includes aplurality of client systems and servers on which the web key tool isimplemented;

FIG. 2 is a diagram illustrating the process of establishing a new weblink in the web key web page; and

FIG. 3 is a sample menu screen of the web key tool illustrating thevarious functions which can be performed utilizing the tool.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

In an exemplary embodiment, the web key application is implementedthrough a networked system such as that shown in FIG. 1. Although notnecessary to realize the advantages of the present invention, system 100may be part of a wide area network in which different geographicallocations are interconnected, either by high-speed data lines or byradio links, interconnecting hundreds of workstations at widelydisparate locations. In the simplified diagram of FIG. 1, system 100includes an organization 102 comprising a server 104 and data storagedevice 118 connected through a network 112 to client systems 114. Alsoincluded in system 100 is client system 116 which represents aworkstation operated by a system administrator for the web key tool. Thesystem administrator or web key administrator controls the content andaccess to the web key database. The term “organization” refers to thesystem implementing the web key application of the present invention.Network 112 may comprise a LAN, a WAN, a MAN, or other networkconfiguration known in the art. Further, network connections may includewireless technology, radio-based communications, telephony-basedcommunications, or a combination of the above. For purposes ofillustration, network 112 is an Intranet. Access restriction iscontrolled via firewall 122 which protects organization 102 and itsinternal devices and applications from unauthorized network access.

Organization 102 is running suitable multi-platform supported serversoftware for creating secure, interactive Internet and Intranetapplications, and which allows information in data storage device 118 tobe presented to end users or client systems. Organization 102 executesthe Web key tool, among other applications via server 104, clientsystems 114, or a combination of the above. Organization 102 is alsorunning a groupware application such as Lotus Notes™ which allows clientsystems to access information through its replication capabilities,provides e-mail services, and supports a secure Intranet/Extranetarchitecture.

Data storage device 118 resides within Intranet 112 and may comprise anyform of mass storage device configured to read and write database typedata maintained in a file store (e.g., a magnetic disk data storagedevice). Data storage device 118 is logically addressable as aconsolidated data source across a distributed environment such asnetwork system 100. The implementation of local and wide-area databasemanagement systems to achieve the functionality of data storage device118 will be readily understood by those skilled in the art. Informationstored in data storage device 118 is retrieved and manipulated viaserver 104. Server 104 is a Domino™ server which allows organization 102to maintain up-to-date preferred web site listings and URLs logicallyorganized by subject matter categories. Server 104 shares informationwith client systems, storing the most current data for access by usersystems.

The web key tool is an e-business application that provides a valueadded service to existing web browser programs. Authorized personnel oforganization 102 have access to the web key tool both in their officeand while traveling with a mobile communications device 130 by using areplica of the Lotus Notes™ databases from data storage device 118 ascan be seen generally in FIG. 1. Applications running on server 104 maybe programmed to systematically conduct scheduled replications, wherebydatabase replicas are temporarily stored in a queue awaiting replication(not shown). Replications may be scheduled by organization 102 asfrequently as desired in order to provide access to the most current,up-to-date information.

Server 140 represents a typical communications resource queried byorganization 102 for information. For example, a user on client system114 conducts a search via the web which causes server 104 to contactserver 140 upon which the desired information is located. Server 140 mayhouse the data directly within its system or may contact a second server(not shown) for the information requested. If the information is foundby server 140, it transmits the information, such as documents 150, toorganization 102.

The goal of the web key tool is to provide access to the most complete,up-to-date information regarding preferred or useful web sites,facilitating and streamlining the key business processes.

This flow of information is systematically integrated and organized viathe web key tool as shown generally in FIG. 2.

An employee at one of client systems 114 or 130 of organization 102discovers a useful web site he/she believes would benefit coworkers atstep 202. The employee transfers the link information to a systemadministrator or web key administrator via client system 116 at step204. This can be done via email or any convenient means ofcommunication. Alternatively, in smaller organizations or organizationsin which the user who discovered the site has high level access to theweb key tool, this step may be eliminated. In this case, flow proceedsto step 206 whereby the user at one of client systems 114 or 130launches the web key tool either by selecting a desktop icon or bykeyboard selection. Once launched, the main menu screen 300 of FIG. 3 ispresented to the user. Alternatively, the web key features can bepresented in tool bar form on the users computer screen (not shown).

The user/administrator at client system 116 selects “ADD” 304 at step208 which causes the web key application to display pop up window 306displaying further options at step 210. The user may either enter acategory in field 308 or may select “VIEW ALL” 310 which causes the webkey tool to display pop up window 312. Window 312 lists the availablecategories for selection. The user/administrator chooses a category fromthe list at step 212 by double clicking on one of category titles 313 inpop up window 312. If no suitable category is available, the web keytool may be configured to allow the system administrator at clientsystem 116 to add a new category, providing added flexibility andcustomization to the tool. If no suitable category can be found, theadministrator selects “CREATE NEW” 314 at step 214 which causes pop upwindow 316 to appear listing further options for the user. The user mayeither type in a category name 318 at step 216 or, as a standardizedalternative, may choose from a drop down menu 320 at step 218. Once acategory has been selected, the user enters the information relating tothe link at step 220. This can be imported during a search from acurrently active web site, or may be manually entered by URL and briefdescription. Once entered, the user selects “submit” (not shown) at step222 and the web key tool checks the web key database in data storagedevice 118 to ensure that the information is complete, not redundant(i.e., not already stored in the database), and that the user has properauthorization at step 224. If approval is not granted, the user mayeither abort the process at step 226, or may return to the categoryselection option at step 212 and repeat the selection process. Onceapproved, the information is saved into the web key database andautomatically updated for access by employees at step 228.

While preferred embodiments have been shown and described, variousmodifications and substitutions may be made thereto without departingfrom the spirit and scope of the invention. Accordingly, it is to beunderstood that the present invention has been described by way ofillustration and not limitation.

As described above, the present invention can be embodied in the form ofcomputer-implemented processes and apparatuses for practicing thoseprocesses. The present invention can also be embodied in the form ofcomputer program code containing instructions embodied in tangiblemedia, such as floppy diskettes, CD-ROMs, hard drives, or any othercomputer-readable storage medium, wherein, when the computer programcode is loaded into and executed by a computer, the computer becomes anapparatus for practicing the invention. The present invention can alsobe embodied in the form of computer program code, for example, whetherstored in a storage medium, loaded into and/or executed by a computer,or transmitted over some transmission medium, such as over electricalwiring or cabling, through fiber optics, or via electromagneticradiation, wherein, when the computer program code is loaded into andexecuted by a computer, the computer becomes an apparatus for practicingthe invention. When implemented on a general-purpose microprocessor, thecomputer program code segments configure the microprocessor to createspecific logic circuits.

1. A method for identifying, categorizing, and sharing web site linksover a communications network via a web key tool, comprising: receivinga request at a first user client system to incorporate informationrelating to a web site into the web key tool, wherein the requestincludes a link to the web site; launching the web key tool at a seconduser client system in response to the second user client systemreceiving the request from the first user client system; selecting anoption on a menu screen's list of options provided by the web key tool,wherein the option relates to the request to incorporate theinformation; associating the information and the link with a category,comprising: viewing a list of categories provided by a drown down menuof a user interface of the web key tool; performing one of: selectingthe category from the list; and defining a new category; and performingone of: manually entering a uniform resource locator and description ofthe information; and importing the information during a search from acurrently active web site; transmitting the information and the link toa central storage location associated with the web key tool; processingthe information and the link the processing determining whether or notthe information and the link are approved for storage in the centralstorage location; if the information and the link are approved asdetermined by the processing, then saving the approved information andthe approved link in the central storage location; updating relateddatabase files with respect to the approved information and the approvedlink; and providing authorized system users with access to the approvedinformation and the approved link in the central storage location via aninput option at the first user client system; and if approval is notgranted, the user either aborts the process or returns to the categoryselection option and repeats the selection process.
 2. The method ofclaim 1, wherein the link to the web site includes: a universal resourcelocator for the web site; a web address of the web site; and a hypertexttransfer protocol link.
 3. The method of claim 1, wherein processing theinformation includes: checking to ensure that the information and thelink are complete; checking to ensure that the information and the linkare not a duplicate of information submitted by authorized system users;and verifying that a user at the first user client system is authorizedto submit the request.
 4. The method of claim 1, wherein the approvedinformation is accessible to the authorized system users via a web page.5. A storage medium encoded with machine-readable program code foridentifying, categorizing, and sharing web site links over acommunications network via a web key tool, the storage medium includinginstructions for causing the a computer to implement a method,comprising: receiving a request at a first user client system toincorporate information relating to a web site into the web key tool,wherein the request includes a link to the web site; launching the webkey tool at a second user client system in response to the second userclient system receiving the request from the first user client system;selecting an option on a menu screen's list of options provided by theweb key tool, wherein the option relates to the request to incorporatethe information; associating the information and the link with acategory, comprising: viewing a list of categories provided by a drowndown menu of a user interface of the web key tool; performing one of:selecting the category from the list; and defining a new category; andperforming one of: manually entering a uniform resource locator anddescription of the information; and importing the information during asearch from a currently active web site; transmitting the informationand the link to a central storage location associated with the web keytool; processing the information and the link, the processingdetermining whether or not the information and the link are approved forstorage in the central storage location; if the information and the linkare approved as determined by the processing, then saving the approvedinformation and the approved link in the central storage location;updating related database files with respect to the approved informationand the approved link; and providing authorized system users with accessto the approved information and the approved link in the central storagelocation via an input option at the first user client system; and ifapproval is not granted, the user either aborts the process or returnsto the category selection option and repeats the selection process. 6.The storage medium of claim 5, wherein the link to the web siteincludes: a universal resource locator for the web site; a web addressof the web site; and a hypertext transfer protocol link.
 7. The storagemedium of claim 5, wherein processing the information includes: checkingto ensure that the information and the link are complete; checking toensure that the information and the link are not a duplicate ofinformation submitted by authorized system users; and verifying that auser at the first user client system is authorized to submit therequest.
 8. The storage medium of claim 5, wherein the approvedinformation is accessible to the authorized system users via a web page.9. A system for identifying, categorizing, and sharing web site linksover a communications network via a web key tool, comprising: anorganization, comprising: a first user client system capable ofreceiving a request for incorporating information relating to a web siteinto the web key tool, wherein the request includes a link to the website; a data storage device for providing a centralized storage locationfor the link; a second user client system for controlling access to thedata storage device and managing operations provided by the web keytool; a network link for allowing the first user client system, thesecond user client system, and the data storage device to communicatewith each other; and wherein the web key tool is launched at the seconduser client system in response to the second user client systemreceiving a request for incorporating information relating to the website from the first user client system, the web key tool performing:receiving a request at a first user client system to incorporateinformation relating to a web site into the web key tool, wherein therequest includes a link to the web site; launching the web key tool at asecond user client system in response to the second user client systemreceiving the request from the first user client system; selecting anoption on a menu screen's list of options provided by the web key tool,wherein the option relates to the request to incorporate theinformation; associating the information and the link with a category,comprising: viewing a list of categories provided by a drown down menuof a user interface of the web key tool; performing one of: selectingthe category from the list; and defining a new category; and performingone of: manually entering a uniform resource locator and description ofthe information; and importing the information during a search from acurrently active web site; transmitting the information and the link toa central storage location associated with the web key tool; processingthe information and the link the processing determining whether or notthe information and the link are approved for storage in the centralstorage location; if the information and the link are approved asdetermined by the processing, then saving the approved information andthe approved link in the central storage location; updating relateddatabase files with respect to the approved information and the approvedlink; and providing authorized system users with access to the approvedinformation and the approved link in the central storage location via aninput option at the first user client system; and if approval is notgranted, the user either aborts the process or returns to the categoryselection option and repeats the selection process.
 10. The system ofclaim 9, wherein the link to the web site includes: a universal resourcelocator for the web site; a web address of the web site; and a hypertexttransfer protocol link.
 11. The system of claim 9, wherein processingthe information includes: checking to ensure that the information andthe link are complete; checking to ensure that the information and thelink are not a duplicate of information submitted by authorized systemusers; and verifying that a user at the first user client system isauthorized to submit the request.
 12. The system of claim 9, wherein theapproved information is accessible to the authorized system users via aweb page.