Method and apparatus for dynamic information connection search engine

ABSTRACT

A method and apparatus are provided for a dynamic information connection engine. User actions are detected on at least one client system. In response, a determination is made whether the user is searching for supported information. When the user is searching for supported information, information is extracted electronically from third party web sites, direct supplier connections, and intermediate databases. Potential information suppliers are automatically selected in response to the detected user search. Queries are formulated from the user search and transferred to each selected supplier over a network coupling. The queries include a request for information. Responses are received from the suppliers, and the responses are used to generate a result list for the user. The result list includes information and query status information. Further, an electronic link may be provided to a web site of each supplier from which the information was derived.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.10/903,623, filed Jul. 30, 2004, which is a continuation of U.S.application Ser. No. 09/815,836, filed Mar. 22, 2001 which claims thebenefit of U.S. Provisional Application Ser. No. 60/191,346, filed Mar.22, 2000. Each of the aforementioned applications is incorporated hereinby reference in its entirely.

BACKGROUND

1. Field of the Invention

The present invention relates to systems used to find and presentinformation from multiple sources, and more particularly, to systemsthat find information on the Internet from suppliers or purchasers ofgoods, services, or commodities and present that information topotential purchasers or suppliers performing comparisons.

2. Description of Related Art

Since the conception of the Internet and extending through thedevelopment of Hypertext Transfer Protocol (HTTP) and the World Wide Web(web) to the present, one of the biggest barriers to people taking fulladvantage of the capabilities offered by the Internet is the difficultyin sifting through the available information to find the desiredinformation. Currently, there are many different search systemsavailable on the Internet. The broad categories of search systemsinclude systems that address very narrow collections of data, systemsthat operate by first building a local database that describes thecontents of the searched web sites, and systems that target a specifictype of data. There are a number of ways in which these systems differ,such as the range of information they attempt to search, the technicalmechanisms that they use to search, the user interface they provide forspecifying the desired data, the user communities to whom they areavailable, the way they are marketed, and the business models that theyare designed to support.

An example of search systems that address very narrow collections ofdata are the “captive” search systems that are built into/for individualweb sites, and allow users of the web site to find desired informationwithin the specific site. In general, there are useful implementationsof these systems available, often having user interfaces that can becustomized to reflect the contents of the site. However, these searchsystems are usually not helpful in performing comparisons becauseindividual web sites are typically maintained by individual companies,so the same search operation does not return comparable data.

A typical search engine that purports to search the entire web (that isto say, HTTP servers, which is a subset of the entire Internet) operatesby first building a local database that describes the contents of thesearched web sites, and then searches that database in response to userqueries. Search systems of this type differ primarily in the way theydetermine which pages of data from which sites are to be added to thedatabase, and in how the database is managed and condensed, as it isimpractical in most cases to keep an entire copy of the search range onthe search system. Systems of this type typically repeat the process ofgathering data from the Internet periodically in order to update thelocal database so that it accurately reflects the contents of thevarious web sites searched.

Search systems that target a specific type of data operate like thesystems that address very narrow collections of data and the systemsthat operate by building a local database in that they must gather datafrom the Internet before users can make requests of the search system.However, the data gathered is generally filtered to determine if it isthe desired type. This can either be done implicitly by the searchsystem operators manually creating a list of the web sites that shouldbe searched, or explicitly by an automated portion of the search system.Most existing comparison shopping search systems work in this way.

Another aspect of existing Internet search practice is the technique ofprocessing individual web pages using automated systems to extractdesired data, where the web pages typically include HTML source text andare intended to be presented to a human user. To an extent, thistechnique is used by the systems that operate by building a localdatabase and the systems that target a specific type of data becausethey have to differentiate HTML formatting directives from text contentthat is to be searched and from the URLs of other referenced Internetobjects that may be the target of subsequent database building.

However, the more detailed and specific process of analyzing a web pagefor a particular piece or type of data, often referred to as scraping,is not employed by most search systems. There are many systems, both forsearching and for other purposes, that employ scraping. However, manyscraping implementations have less-than-desirable performance and/orsearch characteristics and are unsatisfactory for applications in whichscraping would otherwise be a viable technique to employ.

Additionally, most existing systems that perform scraping are verylimited in the web site structures that they support. For example, someweb servers require that the accessor, typically a user, reach a page bypassing through a series of other pages. In this type of web site, thecontent of a page depends not only on its URL but also on prior history,the page location within a framed page, page content that is generateddynamically (such as by a client-interpreted embedded language likeJavaScript), and cookies set from the server. Most of these sites cannotbe accessed by traditional scraping systems because the systems cannotprocess a sequence of pages or fully emulate all of the browserfunctionality required by some pages.

Consequently, there is a need for a system that efficiently gathers andevaluates information from multiple electronic sources and presentsrelevant information to potential buyers, sellers, or traders. Thisinformation includes, but is not limited to, information regardinggoods, services, and commodities.

SUMMARY OF THE INVENTION

A method and apparatus are provided for a dynamic information connectionengine, wherein user actions are detected on at least one client system.In response, a determination is made whether the user is searching forsupported information. When the user is searching for supportedinformation, information is extracted electronically from third partyweb sites, direct supplier connections, and intermediate databases.Potential information suppliers are automatically selected in responseto the detected user search. Queries are formulated from the user searchand transferred to each selected supplier over a network coupling. Thequeries include a request for information. Responses are received fromthe suppliers, and the responses are used to generate a result list forthe user. The result list includes information and query statusinformation. Further, an electronic link may be provided to a web siteof each supplier from which the information was derived.

The descriptions provided herein are exemplary and explanatory and areintended to provide examples of the claimed invention.

BRIEF DESCRIPTION OF THE FIGURES

The accompanying figures illustrate embodiments of the claimedinvention. In the figures:

FIG. 1 is a block diagram of transaction system architecture of anembodiment.

FIG. 2 is a block diagram of a transaction system process flow of anembodiment.

FIG. 3 is a flow diagram of a dynamic information connection engine ofan embodiment.

FIG. 4 is a block diagram of the server organization of an embodiment.

FIG. 5 is a block diagram of a transaction process flow of anembodiment.

FIGS. 6A and 6B diagram user operation and information flow of a searchsystem of an embodiment.

FIG. 7 is a block diagram of a load balancing arrangement of anembodiment.

FIG. 8 shows a client system organization of an embodiment.

FIG. 9 diagrams a flow of supplier cookies of an embodiment.

FIG. 10 is a diagram of a Copilot Servlet organization of an embodiment.

FIG. 11 shows a data analysis adapter configuration of an embodiment ata data warehouse.

FIG. 12 shows a data analysis adapter configuration of an embodiment ata server site.

DETAILED DESCRIPTION OF THE INVENTION

The method and apparatus of an embodiment gathers, processes, anddelivers information relevant to implicit or explicit user queries. Anembodiment of the dynamic information connection engine, or searchsystem, specifically addresses, but is not limited to, systems where theuser queries are travel itineraries or descriptions associated with adesired trip, and where the information includes different traveloptions that fit the itinerary and which the user can purchase. Thesetravel options include, but are not limited to, airline, hotel, and carrental information. This system is easy and inexpensive to implement andmaintain, and provides lower distribution costs. Further, the system ofan embodiment promotes relationships with brand-loyal customers whilealso increasing awareness of other available suppliers through extensivecomparison capability. Moreover, the system supports the capture of dataon consumer and competitor behavior.

FIG. 1 is a block diagram of a transaction system architecture 100 of anembodiment. The system architecture 100 includes one or more systemservers 102 coupled among at least one client space 104 or client device110-116 and at least one participating product supplier andinformational web site 106 via at least one network 108. The clientdevices 110-116 include, but are not limited to, computers, personalcomputers, portable computing devices including hand-held computers,personal digital assistants, and cellular telephones. The client devices110-116 may host standard web browsers as well as custom applicationssoftware. The network 108 includes, but is not limited to, wirednetworks, wireless networks, and combined wired and wireless networks.The transaction system architecture 100 accommodates an optionalfirewall.

FIG. 2 is a block diagram of a transaction system process flow 200 of anembodiment. A user browses the Internet 201 using a client 202 or clientcomputer. The user accesses 210 a World Wide Web site 204, or web site,in order to shop for a prospective purchase. The client software tracksthe user's actions, reporting 212 a subset of these actions to thesystem server 206, or server. The server 206 collects this informationand retains it for future use. The server 206 also immediately analyzesthe user action and, in response, makes electronic requests 214, orshadow requests, to product and information suppliers 208, or suppliers,to obtain relevant data. The shadow request communicates the keyelements of the action being taken by the user. In response to theshadow requests, the server 206 receives responses 216 from the variousproduct and information suppliers 208 available online. The server 206evaluates the responses and formulates a response for the user. Theresponse is transmitted 218 to the client 202.

FIG. 3 is a flow diagram 300 of a dynamic information connection methodof an embodiment. User actions are detected on at least one clientsystem or access device 302. In response, a determination is madewhether the user is searching for a supported type of information 304.When the user is searching for product purchase information, informationis extracted from user actions 306. Potential suppliers areautomatically selected by a server in response to the productinformation 308. Queries are formulated using the product informationand transferred to each selected supplier over a network coupling 310.The queries include a request for product purchase information.Responses are received from the suppliers, and the responses are used togenerate a result list for presentation to the user 312. The result listincludes product purchase information and query status information.Further, an electronic link is provided to a web site of each supplierfrom which the product can be purchased.

FIG. 4 is a block diagram of the server organization 400 of anembodiment. Servlets including a Start Servlet 402, a Load BalancingServlet 404, a Copilot Servlet 406, and a Web Relay Proxy Servlet 408,along with a factory infrastructure 410 and server databases 412 supportthe bulk of the server processing, but the system is not so limited.

FIG. 5 is a block diagram of a transaction process flow 500 of anembodiment. The system supports couplings among numerous clients 502,third party systems 504, search-specific interfaces 506, provider websites 508, server sites 510, and data warehouse 512 or database sitesusing at least one network 514. The network 514 includes any of a numberof networks, for example, the Internet. The system of an embodimentincludes separate client and server portions, although this division isnot a necessary part of the invention. The different types ofcommunication between the client 502 and server 510 are orderedtop-to-bottom to match the sequence with which these types ofcommunication are performed by any particular client 502. At any onetime, there will typically be a large number of clients 502communicating with each server system 510 as represented by the stack ofclients 502.

In an embodiment, the user interacts with a client to input theitinerary and to view the results, while the gathering and processing ofthe information is performed on a central server. Alternate embodimentscould perform all of the processing in the system with which the userdirectly interacts, or the controlling decisions about what data shouldbe gathered and processed could be made by the central server but withthe actual gathering carried out by the client systems in order to alterthe over-all usage of network bandwidth required by the system.

The client system of an embodiment incorporates a standard World WideWeb (web) browser (HTTP-protocol client). This provides a simple,standardized mechanism for actually displaying results. The browser isalso used to view the web sites of travel suppliers when the userdecides to purchase one of the travel options presented.

As a matter of convenience, an embodiment uses the Hypertext TransferProtocol (HTTP) for communication between the client and server. Thisprotocol is well supported by a variety of off-the-shelf softwarecomponents, and is also used by the associated web browser.

The server portion of the system is composed of a set of servletsaccessed by the client making GET and POST HTTP transfer requests. Aservlet is an ongoing process that services some requests received by aweb server. In an embodiment, the servlets are written in Java, but arenot so limited.

In the interest of simplicity, only the interactions between a singleinstance of a client system and a single server are described herein.However, it is understood that in actuality each different clientproceeds through the possible sequences of operations independently andasynchronously of the others. In addition, an actual commercialimplementation can employ several different, parallel server systems atone or more different physical locations in order to supply thenecessary processing power and reliability.

The Start Servlet handles the initial communication with a client thatis just starting a session. Not only may the user's system that hoststhe client be turned on and off repeatedly, but the actual clientsubsystem may not be used each time the user starts his/her system.Therefore, the server portion of the invention is capable of handling anumber of separate start/initialization cycles of each different clientover the client's life span.

One key operation for which the Start Servlet is responsible is theassociation of a client-generated user identification number (UID) witheach unique client system, and for ensuring the existence of theappropriate user-specific entries in the server's databases. The UIDs,as well as session IDs (SIDs) and other identifier values used in thepreferred embodiment are 128-bit values created such that they should beabsolutely unique. They are created using the Windows Globally UniqueIdentifier (GUID) mechanism, which is in turn based on the Open SoftwareFoundations (OSF's) Universally Unique Identifier (UUID), a component ofthe OSF Distributed Computing Environment (DCE).

After the client has initiated communication with the server by making arequest to the Start Servlet, the client makes a subsequent request tothe Load-Balancing Servlet. The Load-Balancing Servlet determines whichof the potentially multiple server systems at a particular location isin the best position to serve future requests for information comingfrom the requesting client.

The Copilot Servlet is responsible for the fulfillment of most otherinformation requests from the client. The Copilot Servlet receivesrequests from the client any time the web browser with which the clientis integrated is navigating to a Uniform Resource Locator (URL), orinformation identifier, which the client determines (more on themechanism below) may be a request for travel information. The servletresponds to these requests in one of two ways, depending on the client'sHTTP request.

In one situation, when the client's request does not contain adequateinformation for the server to perform a search for purchasealternatives, the server informs the client of this and no additionalprocessing takes place. Note that, in an embodiment designed to find andpresent a category of information other than travel alternatives, thetype of URL/request screening performed by the client prior to making arequest of the Copilot Servlet could use different criteria, but thestep could still be performed.

The other situation is the one in which the URL/request does containitinerary information with which the server can search for and presentinformation. In this case, the server fulfils the request over a periodof time. The server sends back a flag indicating that more informationwill be following. The HTML and JavaScript template of the page thatwill be used to display the information found is also presented.Further, the related information is presented incrementally as it isfound.

It is noted that while current common practice is to identify individualblocks of data accessible on the Internet using a URL, and an embodimentis described in terms of using URLs, the search system is not solimited. For example, systems which access information suppliers thatare not typical web sites (e.g., which use an access protocol other thanHTTP v1.0 or v1.1) or which perform the accesses over a network otherthan the Internet may not use URLs to identify the source of aparticular set of information. Similarly, in the future new mechanisms(possibly not intended to be human-readable like URLs) may be created toidentify content available on a network. Modifications to embodiments ofthe present invention used to accommodate such changes in the underlyingnetwork technology used to connect among clients, servers, andinformation suppliers are implementation details unrelated to theinventive material herein. References to URLs in the description hereinare reflective of present implementation practice rather than ofconstraints on the search system.

In an embodiment, the client is implemented as a collection of ActiveXobjects which are designed specifically to operate with the MicrosoftInternet Explorer (IE) browser under operating systems that support theActiveX object technology, essentially only recent releases of MicrosoftWindows. In this environment, it is possible for the client to establisha very intimate connection with the web browser. It uses this connectionto obtain each URL which the browser is requesting as the requests aremade. It also uses this connection to establish a sub-window, on theleft-hand side of and within the main web browser window, which theclient uses to display its user interface and results. This sub-windowis referred to herein as a Bar.

In other embodiments, the Bar can be displayed on any portion of thebrowser window or in its own window and is, therefore, not limited tothe left side. The visible, on-screen area occupied by the Bar is filledwith a browser control. A browser control is similar to the activedisplay area of the IE web browser, stripped of all of the menus,toolbars, and other user-interface objects normally present when IE isrun as a stand-alone application. The Bar makes use of this control todisplay its user interface and content, and the implementation of theclient user interface is partitioned between the compiled software thatmakes up the Bar and other client ActiveX objects and the JavaScriptembedded within the HTML displayed in the browser control.

The client Bar can be opened either explicitly by the user orautomatically. It is opened automatically by the client when the clienthas made a request of the Copilot Servlet, and the Copilot Servlet hasresponded to the request with a flag indicating that more informationwill be sent. The HTML that makes up the balance of the Copilot Servletresponse is then displayed within the Bar.

If the user explicitly requests that the Bar be opened, the clientgenerates a special URL and request for the Copilot Servlet. Thisrequest always returns the correct HTML and JavaScript source for theclient user interface, so that the user may directly enter itineraryinformation for use in performing a travel search, rather than dependingon the pages of a third-party web site to provide the itinerary-entryuser interface.

In operation, the user accesses the search system of an embodiment usinga computer hosting a client system. In an embodiment, the client isimplemented as a collection of ActiveX objects. Users are providedaccess to the client by packaging the ActiveX objects into a DynamicLink Library (DLL). The DLL, along with associated control files,resides in a cabinet (CAB) file so that it can be downloadedautomatically from a web site. In implementations of the invention whichare not ActiveX-based and/or specific to Microsoft IE, the DLLs can bepackaged as plug-in modules for a web browser so they can be downloadedand installed from a web site.

The web site from which the client is downloaded includes, but is notlimited to scripting to detect the type of browser with which the useris accessing the site, so that they can be informed of the level ofsupport for their browser and/or so that they can automatically bedirected to the correct download file for their browser. The web sitealso includes a user interface to collect registration information fromthe user and pass it to the client for transmission to the server forinclusion in the user's database entry. Additionally, the web siteincludes a final URL that causes the Bar to automatically open.

Furthermore, in an embodiment, one of the ActiveX objects that make upthe client contains Automation Methods that can be called by JavaScriptsoftware within the web pages of the client-installation web site. Thesemethods can be used by the web site to find out configurationinformation about the user system that is not ordinarily available, sothat it can be used to give the user more customized information aboutthe client operation.

FIGS. 6A and 6B diagram user operation and information flow 600 of asearch system of an embodiment. The information is transferred among aBar sub-window 602 and a browser window 604 of a client computer, atleast one component of a server system 606, at least one third partyserver 608, and at least one supplier web site 610. At the highestlevel, the transaction system locates and presents information relevantto a user request. In an embodiment, user requests include theitineraries for a potential trip, and the information returned includesavailable, purchasable travel alternatives that meet the requirements ofthe itinerary.

In an embodiment, the general flow of processing for each request oritinerary begins when the user enters itinerary information through theclient user interface or through an itinerary-entry page of a web site.The itinerary information is transferred from the client to the server.The server reviews the itinerary information and determines thetravel-suppliers that are most likely to have relevant and availablepurchasable options. The server couples to the appropriate systems ofselected travel suppliers and makes queries about the available traveloptions matching the itinerary. The couplings to travel suppliers can bemade numerous ways including, but not limited to, requesting pages fromtheir web sites and extracting information from the pages returned asshown in FIGS. 6A and 6B, and using a proprietary connection intendedsolely for inquiries from the search system. When coupling through aproprietary connection, an intermediary can be used that also containsinformation about the travel supplier's inventory, for example a GlobalDistribution System (GDS) database.

The server returns boiler-plate data display and formatting informationto the client. As results are received from each queried travelsupplier, they are evaluated and processed for possible transmission tothe client along with search progress status information. When allresults have been received from the queried travel suppliers, final“search complete” status information is sent to the client.

The transaction system of an embodiment automatically detects andinterprets user requests for relevant types of information. In contrast,most existing information search systems require the user to explicitlyprovide their request to the system, typically by entering informationinto a web page. While this is also an option in the transaction system,the transaction system is also capable of detecting other user actionsand interpreting them as implicit requests for information.

When examining user actions to determine if a search operation can bestarted, information is accumulated from a sequence of actions upthrough a final trigger event. For example, if a user has enteredinformation on a web page, or in a sequence of successive web pages, thetriggering event might be the activation of a submit-type control on thefinal page. However, the system can use all of the entered informationto determine if the final user action (the submit) should be used tostart a search.

However, this example is neither the least nor most complicated instanceof monitoring user actions that might be used in the system. Otherexamples of user actions/input that might be used include, but are notlimited to: detection of the selection of a single control or sequenceof controls that indicate an interest in a supported type ofinformation; entry of information by the user in a control or sequenceof controls; entry of information through natural-language or N-gramtechniques; selection of a pre-existing set of information asidentifying the user's interest. It should also be noted that while mostcontemporary client systems are computer systems in which the userprovides input through typing and/or pointing devices, any means of userinput may be used with the search system including, but not limited to,handwriting recognition and voice recognition.

It is also noted that all methods for monitoring and evaluating userinput may be applied to both user actions performed with respect to athird-party web site as well as an interface of the client system or webpage maintained by the search system operator.

The monitoring of user activity, in an attempt to recognize actions thatindicate a desire for the type of information that the system has beenimplemented to collect and present, is accomplished hierarchically, butis not so limited. The client is primarily responsible for monitoringuser actions. The primary mechanism for this monitoring is capturing theuser web browser requests for new pages, although other mechanisms couldbe used to achieve the same result or slightly different results forimplementations designed to search for other types of information. Themonitoring is accomplished through a Component Object Model (COM)interface. This interface captures each URL, or navigate event, that thebrowser is about to fetch.

The first step in determining if the user is trying to find informationabout travel alternatives is to compare the root portion of the URL witha list of strings maintained by the client. This list is stored in theWindows registry, a system database of configuration information, andcan be updated by the server when it is out of date.

When a URL requested by the browser matches one of the partial URLstrings stored by the client, the client forwards it (and possibly theassociated data if the user's browser is making a POST request) to theCopilot Servlet portion of the server for further processing. The serverdetermines if a particular user request is a request for travelinformation and contains enough information to be considered an“itinerary” that can be used for a search. While the simple stringcomparison against the URL is adequate for the needs of thetravel-information searches, other embodiments may use a differentfirst-level analysis of user operations, as determined by the complexityof the information needed to perform the search.

The transaction system also accommodates a user providing their requestdirectly to the system with the entry of itinerary information into aweb page. With this entry method, the user enters itinerary informationdirectly into the HTML form that is part of the client user interface.This is possible either when the user has opened the Bar explicitly orafter it has automatically opened in response to a previous useraction/input.

In general, a session starts the first time after the client has stateda need to contact the server, and continues either until one of thesystems timeout periods expires or until the user takes an explicitaction that shuts down the client. The installation of an embodimentcomprises several operations that generally occur the first time theclient starts after it has been installed and/or the first time a newclient installation connects to the server. In particular, when firstinstalled on a system the client creates a GUID to serve as the client'spermanent ID number. It is noted that the User ID (UID) is actuallyspecific to a particular operating system installation rather than to anactual individual user.

The client attempts to make a connection to the server, starting alogical “session”, only after it reaches a point where it needsinformation from the server in order to continue. The two cases in whichthis occurs are: the user explicitly opens the Bar causing the client toneed the HTML/JavaScript source for the user interface to be displayed;and, the client detects the browser attempting to load from a URL thatis a candidate for containing an itinerary, in which case the URL (andpossibly associated POST data) must be sent to the server for furtheranalysis.

As an optimization, the software checks for the existence of aconnection from the client system to the Internet or other couplednetwork before attempting to communicate with the server. Since attemptsto communicate with the server would fail in this condition anyway, thischeck prevents wasted processing and error-recovery.

The UID is not required to be strictly permanent. In an embodiment, theUID is stored in the Windows registry (a system database ofconfiguration information) and therefore subject to accidental orintentional deletion. Each time the client starts execution, it checksfor a UID in the registry, and if one is not present it creates one. Itis this portion of the client that creates the UID after the initialinstallation so that installation is not actually handled as a specialcase. In the event that a client UID is destroyed and the clientallocates another one, the only aspects of the system that are impactedare: the ability to correlate user operations performed with the old UIDand those performed with the new UID; and, the ability to retrieve theuser's previously selected/specified personalization options.

In the preferred embodiment, if the user provides personal informationthrough the registration web page during the installation process, theclient forwards it to the Start Servlet when it initiates contact. Theserver database records keyed by the UID also contain user personalinformation. This information can be manipulated by the user through theuser interface presented in the Bar.

Personal information is used to control different aspects of the clientbehavior and of the server behavior toward a particular user. Forexample, the personal information controls whether a software clientwill be automatically updated if a newer client version is available. Itcan also be used to guide the information search performed by theserver. For example, in the preferred embodiment where searches areperformed for available airline tickets, the personal information cancontain things like suppliers the user wishes to avoid, preferred ticketclasses, senior citizen status, and other information that results inthe availability of lower-cost fares.

In coupling to the server, a client creates a session identifier (SID).This is another 128-bit, universally-unique identifier. The SID istransferred in all future transmissions from the client that are part ofthe same session. The SID allows the server to distinguishsemi-simultaneous requests made by different clients and betweenrequests originating from different browser windows on the same client.

The first exchange between the client and server in a session is whenthe client performs an HTTP POST transaction with a destination URL thatspecifies the Start Servlet. This POST transaction transmits dataincluding the UID, the SID, the personal information provided by theuser (if it has not been previously transmitted), and the client'scurrent version number.

In response to this POST, the Start Servlet returns several pieces ofinformation including the version number of the latest client release,the version number of the lists of partial-URL strings stored by theclient, and those items from the personal information associated withthe transmitted UID that affect client operation. If the version numberof the latest client release is larger (later) than the receiving clientversion number and the user has elected to receive client updates, theclient undertakes downloading and installing the latest client versionin parallel with subsequent primary operations. If the version number ofthe lists of partial-URL strings is larger (later) than the receivingclient version number, the client downloads new copies of the out ofdate lists. These lists are used by the client to determine which URLsare candidates for itineraries and are to be forwarded to the server,and which URLs indicate the completion of a purchase by the user.

The Start Servlet also performs several internal housekeeping functions.It verifies that the supplied UID already has a matching record in theserver database, and creates a record if it does not. It also creates a“Session Info” object which will persist on the server for as long asthe session remains active.

FIG. 7 is a block diagram of a load balancing arrangement 700 of anembodiment. The client system 702 is coupled to at least one server site704 using at least one network coupling 706, for example via theInternet. Load balancing is accomplished using a server site internalnetwork 708 or backplane, but is not so limited. Alternate embodimentscan use numerous types of couplings among the server components of thesearch system.

In order to ensure simultaneous availability to a large number of users,the server portion of the system is made failure-tolerant and is scaledto supply the processing power and network bandwidth necessary tosupport large numbers of simultaneous users. This is accomplished usinga number of separate, hierarchical mechanisms including, but not limitedto, DNSs, load balancers, round-robin techniques, and redundant backupmonitor systems.

The system uses a dynamic two-level form of load balancing, but is notso limited. The first level of load balancing is accomplished throughthe Internet DNS service and directs traffic to various data centersaround the world. Data centers are easily added or removed. The amountof traffic sent to each data center can be controlled to a level ofapproximately 1% of the total traffic.

The second level of load balancing balances the traffic within each datacenter (cluster) and uses a combination of typical load-balancingsystems and system-specific balancing methods. This technique usesinformation including CPU and memory usage, network bandwidth usage, andnumber of current users of the individual CPUs in performing loadbalancing. A triple level of redundancy is built into the second levelload balance.

Because the HTTP protocol is used for communication between the clientand server, the client uses a specific server name to which requests aredirected. For initial server contacts (exchanges with the Start Servletand Load-Balancing Servlet), a server name is constructed dynamically bythe client prior to making the first request of a session. The servername is created by concatenating a number of string fragments.

A first string fragment is a string constant representing the fixed“base” part of the server name. Any string that is a legal Internet hostname could be used. In an embodiment, the base string is “start”.

The next string fragment is a produced by the client. The clientgenerates a random integer in the range 0 to 99, inclusive. This integeris converted to a two-character string.

Another string fragment includes a string constant representing thenaming domain within which the server systems are located. In apreferred embodiment the domain is of the form “.somename.com”.

Assuming that the clients are implemented with a good random numbergenerator, if a large number of clients are operating simultaneously,there will be a roughly equal number that have generated each of the 100possible different server host names. There are several benefits tohaving effectively divided the set of active clients into a large numberof differentiable categories based on the host name which they haveconstructed.

Regarding these benefits, it is important to recognize the capabilitiesof the network of DNSs that underlie the Internet and provide thetranslation between textual host names and numerical Internet Protocol(IP) addresses. First, even though different servers within a domain arelogically related by the common parts of their domain name, there is norequirement that the corresponding IP addresses have any commonality orrelationship. This allows, for example, the server identified by thehost name “start00.somename.com” to be at an entirely different physicallocation from the one named “start01.somename.com”.

Furthermore, multiple different host names may also be mapped to thesame numeric IP address. This means that an entire block of hosts names,such as “start75.somename.com” through “start90.somename.com”, andtherefore a statistically-predicable portion of the total client trafficat any particular time, can be directed to a single serversystem/location.

Moreover, it is possible to modify the DNS mapping between host namesand IP addresses. This allows the flow of traffic from some portion ofthe clients to be changed from one server to another without having tonotify or directly communicate with the clients in any way. Further,because of the number of different host names that clients generate inan embodiment, the change from one server site/implementation to anothercan be performed gradually over time, with a resolution of approximately1% of the total client traffic.

Once the client has determined a server host name, and DNS look-up hasobtained the current matching IP address, the client attempts toestablish an HTTP connection with the server IP address. At this point,an embodiment uses a typical load-balancing system to distribute theHTTP requests coming into an IP address across multiple individualserver systems.

One aspect of an embodiment which is important in making it amenable tothe use of typical load balancers: client HTTP requests made of theStart Servlet and Load-Balancing Servlet do not depend on any statestored on the server. This is important because with simple loadbalancing systems, there is no way to ensure that subsequent requestsoriginating from the same client are directed to the same server withoutmulti-processor support linking the various server systems. Note thatwhile the SID is included in the data sent to these two servlets, theservlets do not make use of it for anything other than error-checking,because of the lack of session-to-server continuity present for thesetwo servlets.

Only requests for the Start Servlet and Load-Balancing Servlet use thehost name that is generated by the client and which is handled by theload-balancer. It is the responsibility of the Load-Balancing Servlet toprovide a server host name that the client can use for all requests thatdepend on server state, which are directed to the Copilot Servlet.

Each set of server systems serviced by a typical load balancer is alsoassociated with one or more monitor systems. It should be noted thatthis designation is logical rather than physical, and a single computersystem could serve both as a front end server and as a monitor, as wellas fulfilling other rolls, such as the database server. Monitor systemsare responsible for: accepting periodically-transmitted loadingstatistics from each of the front ends; determining which front endsystems have not reported statistics recently enough and which willtherefore be considered “dead”; and, maintaining a circular list of the“not dead” front end servers, and returning the next server name fromthe list each time a server executing the Load-Balancing Servletrequests a server name to return to a client.

The monitor system is not responsible for notifying the load balancer ofwhich servers are “alive” and “dead”. Instead, the load balancer usesits typical mechanism, such as making periodic checks of each server'snetwork responsiveness with “ping”.

When a client is in the process of establishing a session it makes a newHTTP POST request to the Load-Balancing Servlet once it has received aresponse from the Start Servlet. The data sent with this request is theUID/SID pair. The Load-Balancing Servlet services this request byrequesting the next available front-end server host name from themonitor system. It then returns the host name plus a set ofconfiguration parameters to the client. The configuration parametersinclude, but are not limited to: a flag instructing the client whetherto use clear (HTTP) or encrypted (HTTPS) communication with the serverfor subsequent transactions; the client timeout period for terminating asession due to user inactivity; and, the path from which a new versionof the client can be downloaded by an existing client, which is used ifthe “latest client” version number returned by the Start Servlet islarger than the requesting client's version number and the personalinformation returned from the server for the current UID allowsautomatic updating of the client to occur.

The search system of an embodiment uses two separate host names that areDNS-mapped to the same front-end server. Thus, the system maintains twoseparate names for each front end server and returns the matched pair ofnames to the client. This configuration helps avoid delays in systemresponsiveness associated with WININET.

Within a Windows system, most HTTP requests generated by softwarerunning on the system pass through a standard Windows library thatcontains common, low-level functions that implement large parts of HTTP.This library is called “WININET”. In typical web browsing, most pagesdisplayed actually cause a large number of discrete HTTP requests, onefor the HTML source of the page along with additional requests for eachembedded object. Because the client user interface displayed in the baris implemented as a heavily-scripted web page, changes to the bar'sdisplay generally also cause the bar's contained browser control togenerate a number of HTTP requests through WININET to the client'sassigned front-end server.

In order to optimize network bandwidth utilization, it is common fortypical systems to start multiple HTTP requests simultaneously. WININETis no different and is also capable of processing several requests inparallel. However, the details of its implementation cause it to place acap on the total number of requests that can be simultaneously active tothe same internet domain name. When software (IE, a browser control, ora client) issues a larger number of requests than this cap, WININETqueues all but the first requests and starts them sequentially asin-process requests complete. In normal web-browsing operation, thisleads to a relatively high-performance system.

However, HTTP requests generated by the client consist not only offetches for elements of the client's user interface but also exchangesof control data (candidate search requests, purchase requests,transactions for session opening, closing and “keep alive”, etc.). It ispossible for the bar to need to exchange control information with theserver while a user-interface update/reload is in progress. If thisoccurs, WININET may queue the control transactions behind the (typicallylarger and much less important) UI data fetches, causing a perceptiblepause in the system's responsiveness to the user.

A search system of an embodiment based on WININET overcomes this problemby having two separate server names for each physical server (IPaddress) within a server site. When this name pair is returned to theclient by the Load Balance Servlet, one name is subsequently used formost URLs used to update the HTML displayed by the bar and the other isused exclusively for control transactions (usually POSTs to the CopilotServlet). Even though both logical names evaluate to the same IP addresswhen a DNS lookup is performed, WININET's cap for the maximum number ofpending transactions is implemented in terms of the logical name only,so that it treats the two server names as entirely independent and eachhas its own cap, even though they are physically the same device. Thus,the client ensures that control transactions are never queued behinduser-interface updates.

Another benefit of establishing separate server names for the controland (static) data-fetching transactions is that the server sites couldbe reorganized, in the event that it provides a performance improvement,into a set of servers that serve only static data and another set thatrun the servlets but do not serve the static data. With the structuredescribed, such a reorganization could be performed in any combinationof server sites at any time and completely transparently to the clientsystems.

In a group of front end servers, provision is made for there to bemultiple monitor systems. Each front end has a list of all the availablemonitors. If the monitor at the top of the list stops responding to thetransmission of loading statistics or to requests for front end servernames from the Load-Balancing Servlet, then the front end server willmove on to the next monitor system on its list. In this way, if amonitor system fails, the associated front end servers will graduallychange over to using the next, or live backup, monitor system.

While an embodiment uses a round-robin scheme for allocating new clientsessions to the available pool of front end servers, a more complicatedalgorithm can also be employed. Each front end server sends a variety ofloading information to the monitor server approximately once per second.This information is collected to provide statistics on the system'sover-all operation, but could also be used as the input to a morecomplicated, dynamic algorithm for determining which front end servershould be assigned a particular client session.

For example, an alternate means for determining the server to which aparticular new session is to be allocated takes into account the totalnumber of active sessions on each server. The round-robin mechanism ismodified so that it allocates a session to a server only if that serveralready has fewer or the same number of active sessions as the serverwith the most active sessions.

In an embodiment, a typical Java Virtual Machine and executionenvironment known as “Tomcat” is used to execute the servlets on theserver systems. As part of Tomcat's initialization process following theboot-up of a server system, the server registers itself with the firstmonitor system on its list that will respond.

On each front end server is a process that periodically executes,collects performance and loading data, and transmits it to the currentmonitor system. This process executes at the rate of approximately onceper second so that the transmission of performance data acts as aregular heart beat from the front end server that can be anticipated bythe monitor system. The performance data packet transmitted by the frontend server heart beat includes information about the server CPU usage,the current free memory of the system, and the number of databasequeries that the front end has generated in the last second, but is notso limited.

It is noted that rather than having two separate servlets andtransactions to initiate the connection between the client and server,an alternate implementation combines the functions and responsibilitiesof the Start Servlet and the Load-Balancing Servlet into a singleservlet. This is possible because the client does not need any of theinformation returned from the Start Servlet in order to create its POSTto the Load-Balancing Servlet. This alternate embodiment, thus, couldprovide an improvement in overall system performance because only asingle client POST of information would be required and the servletcould return all of the necessary information in one response.

The client of an embodiment maintains numerous lists of strings that ituses to compare with the contents of different URLs. These lists can beupdated from the server. These lists are stored in the Windows registry,although any persistent client storage could be used as effectively.

As discussed herein, the search system automatically opens the Bar onthe client browser and displays information relevant to the user'scurrent activity. One of the string lists maintained by the clientcontains partial URLs that the client matches against the URLs fromwhich the user's browser attempts to load. When a URL matches, theclient forwards the user browser request to the server for furtherchecking. This hierarchy serves to reduce the amount of client/serverbandwidth that is consumed by monitoring URLs without unnecessarilycomplicating the operation of the client.

Another list of strings maintained by the client is used as part of themechanism for monitoring whether the user makes purchases from the websites of travel suppliers to which the system directs them, referred toas “buy tracking”. This list contains a pair of strings for each entry.The first string in the pair is the URL of a page on the travelsupplier's web site to which users are directed on the completion of apurchase, typically a “receipt” page.

The second string in the pair is an extraction specifier. The extractionspecifier can specify the extraction of multiple distinct portions of areceipt page, including specifying a particular region/string within thereceipt page that should be extracted and transmitted back to theserver. The extraction may occur over a sequence of pages if thenecessary purchase identification information is found in more than onepage. This string is typically a piece of data that uniquely identifiesthe purchase transaction. This can be used as proof to the travelsupplier that the purchase transaction originated from a referral by thesearch system. This can also be used as the basis for a paymentarrangement between travel suppliers, or other information suppliers,and the maintainer of the search system.

When the client makes a request to the Copilot Servlet it forwards a URLfrom the browser along with any associated POST data. The serverresponse is an HTTP response packet containing either: a single string“0”, indicating that a search cannot be performed based on the datatransmitted and that there will not be more data from this request; or,the string “1”, indicating that a search has been started based on thedata within the request. In this case where the search has been started,the “1” is followed by the HTML and JavaScript source for the display ofsearch results, followed by the results themselves.

The Copilot Servlet of an embodiment sends the processed search resultsto the client as they become available, along with status about theprogress of the search. The client receives the total number of travelsuppliers that are to be searched, the number that have returnedresponses to the server search requests, and the total number of dataitems that have been found, processed, and sent to the client. Thisstatus information is displayed for the user as it is received, in orderto give the user the sense that things are progressing rapidly. Thisalmost-immediate feedback to a search is a point of novelty in thesearch system.

An area within the Bar is used to display a vertically scrolling listthat presents summaries of the search items found. The items are placedinto this list based on a user-selected sort order. For example, thedisplay of airline flights for an itinerary can be sorted based on theticket price, the number of stops, departure time, arrival time, triptime, or supplier. Note that the particular criteria on which therecords can be sorted is less important than the fact that the recordscan be sorted based on a user-selected criteria and that the sort isperformed on the client so that the system responds quickly to the userchanging the sort selection for a progressing/completed search.

In order to ensure that user expectations are set correctly, and toprevent resources from being leaked, or allocated but not recovered forreuse, the client and server both track numerous types of time outperiods.

The JavaScript that executes within the client Bar of an embodimentstarts a time-out down counter each time a user action begins a newsearch. This counter is used to control the period of time in which thesearch results are considered valid, an important consideration whendealing with travel bookings, including airline tickets. As searchresults expire, any electronic links provided to the associated supplierover which the associated travel item or component could be reserved orpurchased can be deactivated, but the system is not so limited.

Since airline ticket pricing and availability fluctuate rapidly, it isimportant to prevent the user from deciding to purchase a ticket afterit becomes unavailable. To prevent this, the JavaScript waits for aperiod of several minutes after the START of the search. After thisperiod, it notifies the user that the results are no longer valid anddeactivates the purchasing controls associated with each resultdisplayed.

The time out period of an embodiment is approximately 10 minutes, but isnot so limited. However, this period must be closely related to theindividual times that the travel supplier systems will hold areservation for purchase after they respond to a query. Therefore, theperiod is likely to be radically different in systems designed to searchfor different types of information, as well as having to be updated fromtime to time within an embodiment. Because the timeout is within theJavaScript code, which is downloaded from the server each time the Baris opened, it can be easily changed independently of having to createand distribute new clients.

This time-out is not needed in a system configured to search forinformation that is not time sensitive. For example, a system thatsearches for purchasable goods with rapidly-varying inventory levelswould presumably use a time-out period to invalidate search resultsafter some reasonable period. Alternately, a system that searches forreference information or for purchasable goods that are made-to-order(and which therefore do not have finite inventories) would not have touse a search-results time out. In another alternate embodiment the sameuser action triggers simultaneous searches for all availablesub-categories (e.g., air, hotel, car) of the supported type ofinformation (e.g., travel reservations).

Separate searches can be performed by the user for airline reservations,rental car reservations, and hotel reservations. The user selects amongthese three sets of search results using tab controls displayed in theBar. The client-side JavaScript is capable of maintaining separate setsof search results for each category, and has a separate time-out counterfor each. It is therefore possible for the user to search for all threetypes of travel reservations, and for them to switch back and forthamong the different result displays without interfering with theseparate expiration counts on each set of search results.

Because sessions consume server-side resources, it is important toensure that they do not persist and remain open indefinitely, as idlesessions would eventually accumulate and clog the server systems. Assuch, there are three mechanisms for closing sessions and allowing theassociated server resources to be freed.

In one mechanism for closing sessions, the client may be explicitlyturned off by the user closing related instances of their web browser.When this happens, one of the shut down operations performed by theclient is to send a POST to the Copilot Servlet informing it of the endof the session. On receipt of this message, the servlet frees itssession-specific resources.

In another mechanism, the client monitors user actions. Each user actionperformed that is related to the client's operation is used to reset atime out down-counter. If the user does not perform any operationsbefore the time out expires, the client closes the session and notifiesthe server of the fact. In an embodiment, the timeout for this period isapproximately 30 minutes, although it could be adjusted substantiallywithout significantly compromising the system.

One other mechanism uses a server time out counter. This counter isreset by each transmission from the client. If the timeout periodelapses, the server assumes that something has happened to the client,such as an unanticipated loss of power, and frees the resourcesassociated with the current session ID (SID).

In the unlikely event that the server times-out a session which is stillactive on the client, subsequent client transactions with the timed-outSID will still be honored so as not to frustrate user actions. Insteadof rejecting the unexpected SID, a new server object is allocated forthe SID and, since the occurrence of this condition could indicate anunauthorized attempt to access the system, the fact that it occurred islogged.

Each item or purchasable travel reservation that is found and reportedto the user by the search system of an embodiment is displayed alongwith a “reserve” user-interface control or icon. When the user activatesthis control, the client directs the user's web browser to theparticular page of an associated supplier web site from which the usercan complete the purchase of the selected item.

The complexity of and mechanisms for performing this hand-off depend onhow the information was originally gathered from the supplier and on thestructure and features of the particular supplier system. There arethree general categories into which the different interfaces between thesystem and the suppliers can be grouped.

One system gathers information using a special-purpose interface betweenthe system and the supplier servers. Another system gathers informationby accessing a third-party database which contains information about thesupplier. Still other systems gather information from suppliers througha web site designed primarily for direct interaction with individualsusing web browsers.

When a special-purpose interface is used between the search system andthe suppliers, part of the interface design includes the creation of amapping between the information returned and a point (URL) within thesupplier's web site. Thus, the majority of the burden of ensuring thatthe supplier web sites can easily produce a “purchase” page for eachitem that may be returned by the supplier servers over thespecial-purpose interface is assumed by the supplier.

When a third-party database is used, the system should be capable ofcausing the supplier web sites to generate a purchase page correspondingto the user selection. In the simplest case, this entails creating a URLwithin the supplier web sites that contains information identifying theuser selection. If the supplier web sites are not structured to use URLsthat can be composed directly, then the system will have to generate asequence of accesses to the supplier sites on the user's behalf in orderto reach a point at which an appropriate purchase page is available.

This process is performed by a server component that is designedspecifically to interface with a single supplier web site. In general, asystem component that is designed to manage the interface to a singleexternal system will be referred to as an adapter. The system of anembodiment uses several different types of adapters in order tonormalize different types of interfaces to external systems as discussedherein. Search adapter is used herein to indicate a server componentthat gathers information about a supplier's offerings. Reserve adapteris used herein to indicate adapters that generate queries to a supplierweb site in order to ensure the existence of a purchase pagecorresponding to a user selection.

It is possible that, in the cases where a search adapter interfaces witha system other than a supplier web site, that the supplier actually doesnot have a web site that can be accessed by the user to make purchases.In this case, an alternative means for performing the purchase if theuser selects an item returned by that supplier must be available. Thepreferred arrangement is for the owner of the search system to have aparallel and related travel-agency web site that can be used to purchasereservations for those suppliers that cannot support their ownpurchases.

The most potentially-complicated case is the one in which information isgathered by a search adapter making direct requests from a supplier'sweb site/server which is designed to provide a human-usable interface.It should also be noted that many of the considerations for this casealso apply to the operation of reserve adapters, as both reserveadapters and search adapters (that access a web site) can generate aunique state within the supplier web server to which the user's webbrowser must be given access.

In one case, the supplier web site is designed such that all of theinformation that the supplier server requires in order to generate apurchase page is encoded within the purchase page URL. When this is thecase, the user's web browser can be directed to the correct purchasepage simply by the client instructing it to navigate to (load from) thatURL. In the system of an embodiment, the URLs for each purchase page ofthis type are transferred from the server to the client along with eachsearch result item, so that the client can provide the “reserve”control's functionality completely without further client/serverinteraction.

In another case, some or all of the information required by the supplierweb server to generate the desired purchase page is stored in cookiesthat are set when a previous page of the search sequence is returned bythe web server. For example, when a search adapter interfaces to asupplier web site, it is common that, because of the supplier web sitedesign, the adapter has to access several pages of the supplier web sitein sequence, possibly emulating the operations of a human user fillingout a data-entry form at one or more steps of the sequence. Along withthe source for each web page returned to the search adapter by the website there may be one or more cookies. Because the adapter isinteracting with the web server as if it were a web browser, it storeseach cookie returned by the web server and transmits it back with thenext request. However, since the web server depends on the values storedin the cookies in order to generate the correct pages, the cookies haveto be transferred from the server to the user's browser when the“reserve” control is activated.

In an embodiment, all of the cookies set by all of the web servers fromwhich items were found are transferred to the client along with eachdata item. They are stored in the client and then, if the user selects adata item with associated cookies, the cookies are set in the user'sbrowser prior to it being navigated to the associated URL. In addition,if the purchase page of the supplier web site is accessed using a POSTtransaction instead of a GET, the client is also supplied with a copy ofthe POST data created by the server for accessing the correct page.Thus, the client can execute the hand-off to a supplier web site on itsown, without further interaction with the system servers.

There are some supplier web servers that are sensitive to the specificclient (via testing the IP address or other mechanisms) from which theyare accessed. Because of this, it is not possible for the client webbrowser to access the same supplier web pages that are searched by theadapter. To provide users access to purchase pages provided by this typeof server, the system server includes a proxy capability, referred to asweb relay. When the user selects a “reserve” control associated with adata item returned by such a server, the user's browser is navigated toa special URL handled by the system web server. The relay servers thenfetch the matching pages from the supplier sites and present them to theclients. In order to provide a seamless navigation experience for endusers, all subsequent navigation is routed through the relay serversbecause the user's session information related to a particular supplieris possessed by the servers rather than the user's client (browser).

For performance reasons, every navigation event is not routed throughsystem relay servers because this generates too high a volume of trafficon the servers. Therefore, the system limits relay to only those URLswithin the same supplier domain. But, if needed, every navigation can berouted through the relay servers for the entire Internet.

A simple implementation of web relay/proxy could be created in which alloperations are performed by the relay server and it operates only byidentifying URLs contained in web pages and replacing them with URLspointing to the relay server. However, given the complexity of modernweb pages, especially dynamically generated pages, it is very difficultto fully anticipate where all of the URLs might appear within the pages.For instance, some URLs will likely be within well known HTML tags, butothers can be within quotes as part of a string inside of scripts, wherethe string can be referenced later in different parts of the page.

In order to correctly handle web pages in which the URLs identifyingnavigation destinations are difficult to statically detect or arecreated dynamically within the page, the system of an embodiment usesboth the server and the client to detect URLs that should be reroutedthrough the web relay. The client can capture all of the navigationevents created by user actions in the main browser window before thebrowser actually begins to fetch data from the target URL. The clientcan then modify the URL to route the navigation to the relay serverbefore allowing the main browser window to fetch data. By modifying theURLs in this manner, the client also lightens the server load andimproves system performance by requiring less extensive web pageprocessing when the relay server forwards pages from the supplier website to the client. Another important feature of this system is thatwithout the client side being present, the server is fully capable ofrouting the navigation on its own; in this case, it becomes aconventional relay server.

The system server/client web relay architecture consists of server-sidepreprocessing of web pages served and client-side real-time processingof navigation destination URLs. After a user selects a specific“reserve” user-interface control, the server will try to determinewhether the client side is prepared to route navigation events throughthe relay server. If the server detects that client web relay ispossible, the server hands off the responsibility for routing navigationthrough web relay to the client, and merely fetches (proxies) requestedpages. If the server does not detect that the client can modifynavigation URLs, the server scans each fetched page and processes all ofthe URLs in the page (as best it can) before serving it to the client.

The client portion of web relay relies on the web browser forwardingnavigation events to the client, and the client's capability ofcapturing these events before they actually cause data to be read fromthe Internet. After capturing these events, the client redirects thebrowser navigation to the system relay servers with all of the necessarydata. Then the relay servers fetch the correct pages from the supplierweb site and send them back to the client. The main advantages of usingthe client to modify/redirect URLs are that the client is theoreticallyable to catch all destination URLs used, regardless of how they arestored in a web page or when and where they are actually generated, andthat distributing the processing required for redirecting URLs greatlyrelieves the processing load on the relay servers.

An embodiment of the relay client is implemented specifically forMicrosoft Windows operating systems and the IE web browser. It uses theCOM ActiveX interface provided by IE to intercept and modify navigationevents generated by user actions in the main browser window. In general,any environment that provides a mechanism to capture and modify usernavigation events could be used.

All of the functionality of the relay client is realized in an ActiveXbrowser helper object (BHO). The BHOs run in the same memory context asthe browser and can detect any operation on the available windows andmodules. In an implementation, the relay client functionality isintegrated into the same client BHO that contains the other portions ofthe client. However, the client functionality related to web relay canalso be implemented in a separate BHO. The events that the BHO handlesfor the client portion of web relay include, but are not limited to,BeforeNavigate, NewWindow, and Document Complete.

In the BeforeNavigate event, the client captures the navigation events,checks whether the browser destination URL is already rewritten to pointto the relay server. If not, and the URL does indicate the relayedsupplier web site, the client rewrites the URL, cancels the currentnavigation, and initiates a new navigation event with the rewritten URL.Care should be maintained with the cancellation method used and, in sodoing, the client maintains the original URL of the currently displayeddocument so that the client can anticipate and correct the problems.

Special care is also used with supplier web pages that employ frames. Aframe-organized display in a web browser is accomplished using one pagethat contains a frameset definition and URLs indicating the initialcontent for each frame of the frame set, and the separate pagesidentified by these URLs. Handling of framed displays is accomplished byhaving the client ignore the BeforeNavigate event and letting the pagecontaining the frameset load, unmodified, from its original URL on thesupplier web site. All of the subsequent navigation (loads) to theindividual pages displayed in the different frames of the frameset arethen processed by the relay functions of the client BHO.

An alternate method for handling relay of the pages that make up aframe-organized display is for the relay server to modify the URLs,contained in the page with the frameset definition, for the individualpages that fill the display frames. This would ensure that, from thebrowser's point of view, all of the page components reside in the sameInternet domain (that of the relay server). This prevents the security“sand box” restrictions imposed on JavaScript executed within the pagesby the browser's interpreter from interfering with the page having thesame operation as it does when not relayed.

The NewWindow event has the client capturing the IEs new window creationevent. When a user clicks a link in the displayed page that results inthe creation of a new browser window, the client creates the new windowitself so that it has full control of the new window, and will receivesubsequent events generated from that window as well. These windowsgenerally are invoked by JavaScript URLs (or URLs expressed in otherscripting languages supported by browsers). Therefore, in manysituations, the URLs of the page intended to be displayed in the newwindow are not generated correctly due to the relayed location in theaddress Bar.

The client handles these cases by passing the parent page/windowunmodified URL to the new browser window in order to recover(regenerate) the original (unmodified) URL of the new window, andsubsequently issue a new navigation from the new window. Again, specialcare is necessary due to the differences in the various version of IE.For some older versions of the IE browser, the client cannot issue a newnavigation during the event handling of BeforeNavigate for the newwindow. In order for the new window to be functional, the client allowsthe first navigation event to be fetched unmodified to avoid having thebrowser hang. This is done even if the URL for the navigation is wrong.Once the new window is open, the client can issue a new navigation withthe correct URL after the previous navigation is complete.

The DocumentComplete event involves the client capturing this event tomonitor the end of document loading in a browser window. If the clientdetects that this event occurs after the first document has loaded in anew browser window, the client verifies whether the loaded URL is thecorrect (relayed) URL or not. If the URL is incorrect, the client usesthe current location (URL) of the parent (creating) window toreconstruct a valid, relayed URL. In an embodiment, the client andserver are designed not to relay URLs used to load images and otherembedded objects in the requested web page through the relay servers.These objects are instead loaded directly from the supplier web site.This is purely a performance optimization, and not a requirement for thesystem's operation. However, by avoiding routing of these objectsthrough the relay servers, it is possible that the relay server may notobtain all of the necessary session information (usually stored incookies) sent from the supplier web servers along with one or more ofthese objects (and not the pages forwarded to the client). Therefore,the client will check the cookie store in the user browser to make sureit finds and forwards back to the relay server all of the relatedsession information.

An embodiment of the web relay server is implemented using Java Servlettechnology like the other server portions of the system. And, like theother servlets, the implementation of this system is not limited to anyparticular programming language or even to a software implementation.The selection of Java is to conform to the rest of the system. Anyserver technology should be able to fulfill this task. When a requestcomes into a web relay server, the server first fetches the SessionInfoobject (the same as used by the Copilot Servlet) stored in the systembased on the specific UID and SID. This Sessioninfo object containsinformation related to the particular user session, including contextinformation generated by search adapters accessing supplier web sites.The relay server then retrieves the information from the Sessioninfoobject related specifically to this request, for instance, the cookieswith the same domain as the requested web site. Also, the relay serverhandles session information sent with the request from the client, ifany.

The relay server then makes a request, on behalf of the user browser, tothe supplier web site. After the server fetches the requested page, itchecks to see if this page is originated from the same locationspecified in the request or if the request was redirected to a differentlocation. The redirection can happen in three different cases,individually or in combination: the redirected location is at adifferent security level, for example, from http to https or vice versa;the redirected location is at a different domain; and, the redirectedlocation is at the same domain but at a different path.

In the first case, the relay server has to reopen the connection withthe user browser using the correct (new) protocol to avoid introducing asecurity hole in the client/supplier communication link. In the othercases, the returned page can have relative URLs that need to be resolvedbased on the redirected location rather than the original location, sothe client responds by sending a redirection to the user browser to makesure that all objects in the page are loaded correctly and that thesubsequent navigations from this page have correct URLs.

For performance considerations, if any or all of the above cases occur,the relay server caches the fetched page so that when the clientsubsequently issues a new request based on the redirection, the servercan forward this page immediately without fetching the page from thesupplier web server again.

After completing these steps, the server is ready to process therequested page. The relay server first checks whether the client isactively modifying relayed URLs. The relay client informs the server ofits presence/activity by turning on the relay start switch in the pagerequests to the server. If the client is relaying, the server skipsscanning and modifying the URLs in the page. Otherwise, the relay serverprocesses the page contents received from the supplier web server, triesto find all the URLs possible in the page source, and modifies them sothat they all point to the relay server.

While there are a number of business models supported by the system ofan embodiment, and several different revenue streams that it couldprovide, the system is financially supported by payments received foreach user purchase of travel reservations that occur as the result ofthe system referring a user to a travel supplier web site. Therefore,the system generates reliable records of user purchases supported withinformation that the travel suppliers will acknowledge as proof ofpurchases.

The portion of the system operations involved with detecting and logginguser purchases is referred to herein as buy tracking. As discussedherein, the client stores a list of strings, periodically updated fromthe server, that are used to determine which user actions are considereduser purchases. This list contains two strings per entry. One string isthe URL of a supplier web page to which users are directed following asuccessful purchase. The other string is an extraction specifiercontaining instructions to the client as to the data that should beextracted from the page with the URL and POSTed to the Copilot Servlet.

In operation, a user purchase transaction begins with the user beingpresented with a list of different travel options that the system foundfrom a number of suppliers. The user selects one of the presentedoptions with the “reserve” control presented in the client Bar. Theclient navigates the web browser to a purchase page on the selectedsupplier web site. In an embodiment, the user directly interacts withpages of the supplier web site, sometimes providing personal and/orpayment information. Upon completion of the purchase, a supplier website may deposit the user on a “receipt” page that contains some type ofpurchase tracking information, such as a confirmation number or ordernumber, but is not so limited.

The client receives each URL that the browser attempts to fetch from thenetwork. These URLs are compared against both of the URL lists that theclient maintains. When the browser has navigated to a receipt page of asupplier web site, the page URL matches the buy-tracking list of URLs.In response to this match, the client interprets the extractionspecifier string associated with the URL, and uses it to extract astring from the web page content received by the browser from thesupplier web site. The extraction specifier of an embodiment is createdsuch that this string will contain the confirmation number (orequivalent) for the purchase. The client POSTs the UID/SID, the URLwithin the supplier web site, and the extracted string back to theserver where it is logged and used to create an invoice for thesupplier.

It is noted that the actual URL strings maintained by the client neednot be exact/explicit URLs, but instead can be templates or regularexpressions that match a family of actual URLs. This is convenientbecause some web sites incorporate user-specific or transaction-specificinformation in the URL which is not significant to identifying the pagesthat are receipt pages.

A significant aspect of the system's design is that, even though theclient is integrated with the web browser, the system does not depend onthe web browser to store state in cookies. Note that this is differentfrom the cookies that the system places with the web browser on behalfof a supplier web site. Ignoring this type of cookie, which is used onlyfor those particular suppliers whose web sites require it, the systemdoes not need to set any cookies.

Instead, the state used in system operation is stored in a number oflocations, but is not so limited. One location where state informationis stored is in the server, in the data-structure allocated for eachSID. Further, state information is stored implicitly in the web pages(HTML and JavaScript) displayed within the Bar. Each time the server(Copilot Servlet) returns content (such as user-interface information orsearch results) to the client for display in the Bar, the Bar retainsthat information. Thus, any information that is filled in to the pagecontent sent to a specific client is implicitly stored in the client andis not required to be retained on the server.

In operation, the client/server system of an embodiment generates asignificant amount of information, about the behavior of both users andsuppliers. This information is reliably retained so that the correctoperation of the system can be verified, the system can be furthertuned/improved, and because comprehensive data about buying and sellinghabits is an asset of significant value.

At the most basic level, a significant amount of data is logged simplyby the HTTP server (httpd) processes running on each of the serversystems. Because HTTP protocol is used for the communication between theclient and server, the httpd is responsible for determining whether eachincoming request should be routed to one of the servlets, whether it isfor a static piece of data (such as a graphic used by the client userinterface displayed in the Bar), or for a page proxied from a supplierweb site through a web relay. Thus, each request from a client passesthrough an individual server system httpd and is logged, including someperformance information and the response code the server returns to theclient. In addition to the logging of transactions as they go througheach server, the Copilot Servlet also logs each request that isgenerated to a supplier, and all of the responses to that request.

For the server internal couplings between the servlets and the databaseservers, the search system uses a form of database connection poolingfor all database connections. Opening and closing connections to adatabase is an expensive operation. In order to improve performance,connections are created once and inserted into a pool. When the systemrequests a connection it is delivered from the pool. When the connectionis released or no longer needed by the system, it is returned to thepool.

FIG. 8 shows a client system organization 800 of an embodiment. Theclient is implemented for Microsoft Windows operating systems and theMicrosoft IE web browser, using the ActiveX and Component Object Model(COM) architectures/technologies, but is not so limited. As such, thereare many other system environments in which the client could beimplemented. The selection of the Microsoft-oriented environment for theclient implementation is just a matter of economy and popularity(market-share), and does not implicate technological issues.

As discussed herein, the client is implemented as a set of COM objectsthat are packaged together in a single Windows DLL 802 for installationand use. There are three primary COM objects (objects that are assignedCOM GUIDs and registered in the Windows registry 810) that make up theclient: the Browser Helper Object (BHO) 804; the Bar object 806; and,the installation object 808. The division of the client into theseprimary objects 804-808 and the different minor (non-COM) objects is anartifact of restrictions imposed by the architectures of IE, COM, andActiveX and has nothing to do with the underlying architecture orfunctions of the client.

The BHO is created to extend IE. When IE first initializes, IE searchesa known area of the Windows registry for the GUIDs of registered BHOs.Internet Explorer creates an instance of each BHO that it finds, whichincludes the search system client BHO. When the BHO is created itcouples to different portions of IE's COM interfaces so that it isnotified of the user actions that must be monitored to determine if theBar should automatically be opened.

After this initialization, the BHO monitors user actions until IE isterminated and the BHO is destroyed. Unless the BHO observes a matchbetween a URL being requested by IE and one of the entries on the URLlist no other actions are taken.

Another task of the BHO is to manipulate the Bar object based onfeedback from requests submitted to the server. For example, if the BHOobserves a match between a URL the IE is requesting and the URL list, itopens a new session (if not previously accomplished) and forwards therequested URL to the Copilot Servlet for further checking. If theCopilot Servlet returns a “1” string, indicating that it has started asearch, the BHO creates a Bar object and opens the Bar sub-window on thescreen if it is not already visible. Further, alternate embodiments canimplement other return codes or strings that result in other types ofactions.

After this, the BHO receives a URL that references the clients assigned(via load balancing) front-end server. The BHO uses the COM interfacewith the Bar to cause the Bar to load from the specified URL, whichgives the Copilot Servlet the opportunity to transmit the HTML andJavaScript that form the client user interface. Subsequently, each timea new set of content must be sent asynchronously from the server (e.g.,not at the request of the user or the JavaScript executing within theBar) the BHO will again cause the Bar to navigate to the new,server-supplied URL.

Additionally, with the help of the Bar, the BHO is responsible forimplementing the client-side session time out counter. The BHO maintainsthe counter, resets it when it detects relevant user activity (based onIE's navigating to new URLs at user requests), transmits theend-of-session message to the server when the counter expires, andreceives “reset counter” messages from the Bar when the Bar detects useractivity (such as manipulating controls within the HTML user interfacedisplayed by the Bar) of which the BHO is not directly informed.

As part of managing the session time out, the BHO also periodicallyprovides messages to the Copilot Servlet informing it that the sessionis still in active use by the user. This prevents the server from timingout the session in the case where the user is performing actions thatare entirely local to the client or that involve only a third-party orsupplier web site and which, therefore, do not cause the client to sendrequests to the system server.

Like BHOs, Bar COM objects are treated as a special type of extension byIE. A Bar object can be listed in the Windows registry in such a waythat IE automatically creates toolbar buttons and menu entries thatcorrespond to the Bar. When the user selects one of these Bar-specificcontrols, IE automatically loads and initializes the Bar COM object, sothat the Bar appears as a sub-window in the left hand side of the IEwindow.

In an embodiment, the Bar object is capable of detecting whether the BHOobject has already been created and initialized, or not, and of creatingthe BHO object if it does not already exist. While this should not benecessary, there are some cases where the BHO does not get createdcorrectly when IE starts. Therefore, the Bar's ability to create the BHOensures a working system at least from the point in time where the userexplicitly attempts to open the Bar.

The Bar is responsible for the user-visible and user-interface aspectsof the client. However, there is actually very little software involvedin this aspect of the client because the Bar object takes advantage ofthe browser control COM object that IE makes available. Essentially,instead of actually drawing and managing a user interface itself, theBar object takes the area of the display screen for which it isresponsible and fills it completely with a browser control. The browsercontrol behaves exactly like a web browser application, interpretingHTML, JavaScript, and all other data types supported by the IEinstallation, except that the browser control takes commands from theBar software instead of having a user interface for them. This structureallows the user interface of the client to be rapidly implemented,easily modified, and easily updated because the complete user interfaceis fetched from the server on a regular basis, just like any other webpage viewed.

Just as the BHO receives notification of user events that occur as theresult of user actions in the IE main window, the Bar object receivesnotification of user actions that occur within the Bar browser control.With most of the appearance and behavior of the user interfaceencapsulated in the “softest” portions of the client (theserver-supplied HTML and JavaScript), the Bar object must perform onlythose portions of the client operations that require access to theoperating system or an IE software interface that does not have aJavaScript-equivalent. Primary in this category are operations in whichinformation or control is shared with the BHO, as there is no object inthe JavaScript object model equivalent to either the generic,Microsoft-defined BHO interface or the BHO interfaces that are specificto the client implementation.

FIG. 9 diagrams a flow of supplier cookies 900 of an embodiment amongsuppliers 902, system servers 904, and the client/BHO 906 and webbrowser 908 of user systems 910. It is noted that this flow diagramwould be different for operational cases that do not use auto-open, thatrequire web-relay for reserve/purchase, or that search a source otherthan a supplier web site. Another key function performed by the clientBar is the handling of several types of cookies, including: cookiesoriginally provided to the system server (search adapter) by a supplierweb site that was searched; cookies sent to the client from the serveralong with data items that originated on the cookie-generating supplierweb site; and, cookies set in the browser if the user selects the“reserve” control for a data item with associated cookies. This is anon-trivial process because the normal behavior of a web browser is tonote the Internet domain from which a cookie was originally sent andsend the data for that cookie along with only those HTTP requests(GET/POST/etc.) directed to the same internet domain. In fact, IE willnot accept cookies that are to be sent to a different domain than theone from which they are set. Unfortunately, when the server sets cookiesby sending them along with HTTP responses to the browser control in theclient Bar object, the browser control associates these cookies with theinternet domain containing the search system server and not the domainof the supplier web server that originated the cookies. Because of this,if no other action is taken by the client, the cookie values will not besent along with the HTTP request for a “purchase” page from a supplierweb site.

In order to ensure that the cookie values originally set by a supplierweb server to the search server (a search adapter executing as part ofthe Copilot Servlet) are sent back to the supplier web server when theweb browser attempts to access it, the client manipulates the browsercookie storage directly. To make this possible, when the server sendscookies from a supplier to the client, it modifies the name of thecookie first, so that the revised cookie name contains the original nameplus the text string identifying the supplier internet domain.

When they are received by the browser control, the cookies from thesupplier sites are stored as if they originated from the search systemdomain. When a “reserve” (purchase) control in the client user interfaceis selected by the user, the client retrieves all of the cookies storedregardless of their original domains. The client then processes thecookie names to remove the originating-domain information (originallyadded by the search server before transfer to the client). An alternateembodiment has the client check each cookie to identify all cookies,based on their names, that should be set in the browser for the selectedsupplier web server.

In either embodiment, once the client has all cookies to be set, itprocesses the names to remove the domain information, and then calls aninternal IE interface to set the cookies using the supplier web sitedomain as the domain to which the cookies should be sent. It is notedthat the client does not “clean up” cookies that are stored on behalf ofsupplier web sites. Instead, if the user performs several searches, thecookies stored as the result of each later search replace the same-namedcookies from earlier searches, so that the relevant cookie values arealways current when they are needed.

An advantage of the cookie handling methods of an embodiment is itssimplicity. By sending all of the cookies by the supplier web sites tothe client along with their corresponding data items, in most cases theclient can handle the user selection of a “reserve” control entirely onits own, without making a new request of the server. This means that inmost cases the server can, after logging, discard all information anddata structures related to a particular user search as soon as thatsearch is completed, without having to coordinate with the clientJavaScript's time out counter. The exception to this case is supplierweb sites that are accessed from the web browser by web relay throughthe system server. For these types of sites, the server maintainssupplier-specific information in order to perform the relay and fetchpages from the supplier web site.

An alternate embodiment of the system handles cookies by maintaining thelist of cookies that match each search result on the server. The clientthen makes a separate request to the Copilot Servlet to retrieve thecookies when and if the user activates a “reserve” control.

Another alternate embodiment stores the cookies in the client in adifferent manner. For example, in the HTML that is sent from the servercontaining each data item found during searching is placed a block ofJavaScript or HTML that includes the name/value pairs for all of thecookies associated with that data item. When the “reserve” control isactivated, the JavaScript code executing within the Bar unpacks thislist and provides it to the Bar object to be set within the browser.This method is preferred to having the JavaScript code set the cookies,as it avoids any difficulties with setting cookies so that they appearto have originated from a domain other than the one that originated thepage setting the cookies.

There are numerous other objects used within the client that are notexposed to the operating system and IE via COM. The design of andpartitioning between most of these objects is the result of simpleimplementation choices and has no bearing on the behavior of the systemor client described herein.

One internal object, however, is of significance, although it would beunnecessary in an implementation of the client that did not use multipleCOM objects. While it is possible for IE to create any of the COMobjects that make up the client, and it is possible for the COM objectsto create each other, it is very difficult to establish links betweenthe COM objects that make up the client if IE creates more than one ofthem.

For example, in the most typical operating sequence, IE starts first, itthen creates the BHO, and the Bar object is created later either by theBHO or by IE depending on whether it is opened automatically orexplicitly by the user, respectively. Unfortunately, IE does not providea mechanism by which BHO objects can find already-created Bar objects orvice-versa. As a result, the BHO has no way of knowing if IE has alreadycreated a Bar before the BHO needs to open it automatically.Additionally, if for some reason the BHO is not created automatically,the Bar has no way to determine this so that it can create the BHOitself. Finally, with neither the BHO nor the Bar object being able tofind the other through IE, it is difficult to establish thecommunication between the two objects that is necessary for theoperation of the client without compromising the object-oriented natureof the COM architecture.

Therefore, the client uses a small and well controlled work around ofthe typical COM communication paths: the client contains a link objectwhich, due to its design and implementation, both the BHO and Bar COMobjects can find and which they use as an intermediary to communicatewith each other. The details of the link object implementation dependboth on COM and on the fact that the preferred embodiment is implementedin C++. In C++ nomenclature, the link object class contains a number ofglobal methods (which, unlike normal methods, may be called by softwarethat does not already have a pointer to a link object instance). Thesemethods are used by BHO and Bar objects to place pointers to themselvesonto lists maintained within the (single) link object instance, and toretrieve pointers to the other type of object (BHO pointers for a Bar,or vice versa) from the link.

At this point it is noted that because of the way IE is implemented andhow it handles the case in which the user opens multiple IE windowssimultaneously, it is possible for multiple client BHO and Bar objectsto be created on the same user system, and for some of them to be in thesame address space while others are in different address spaces. Due tothe implementation of the link object, there will only be one linkobject in a particular process address space, regardless of how many IEwindows, BHOs or Bars IE creates within that address space. Eachinstance of a client BHO or Bar object registers itself with the singlelink object in an address space and can therefore access all of theother client objects. Multiple, independent process address spaces havetheir own link objects and client COM objects in them are unaware ofeach other. However, since the goal of the link object is to allow theclient BHO and Bar objects associated with one IE window to communicatewith each other (and that these will always be in the same addressspace), the ambiguity about the total number of link objects on a usersystem is unimportant.

FIG. 10 is a diagram of a Copilot Servlet organization 1000 of anembodiment. This organization shows the information flow among theCopilot Servlet 1002, the factory infrastructure 1004, the system serverdatabases 1006, the clients (not shown), and the supplier servers (notshown), but is not so limited. For each search request received from aclient, the Copilot Servlet 1002 processes it by creating lists ofsuppliers to search, pruning the search list, searching via adapters,post search pruning/filtering, and presentation.

When the request is first received, the Copilot Servlet examines it todetermine if it contains enough information to start a search. Thisprocess is performed by an input adapter module that is specific to theweb page in which the user entered information, whether it was part ofthe client user interface or a third-party web site. If the request doesnot contain enough information or is not actually a search request, a “0is returned to the client and processing terminates. If it does, a “1”is returned and processing continues with the next step. Further,alternate embodiments can implement other return codes or strings thatresult in other types of actions.

The Copilot Servlet determines a set of supplier systems to search in anattempt to find items that best satisfy the received itinerary. Thedetermination is made using information including, but not limited to,the contents of the information received in the request, the user'spersonal information, the user's current selections in the client userinterface (if the Bar is open), the recent history of searches and theamount of bandwidth the searches have recently used on each suppliersystem, and the history of prior searches of similar types by similarusers.

The Copilot Servlet acquires a set of search adapter objects from aninternal resource pool, and tasks one to search each of the selectedsuppliers. Each search adapter performs its search independently andasynchronously from the others, so that the subsequent steps in theCopilot Servlet processing sequence can handle incremental searchresults.

The server performs post-processing on the search results received.Post-processing is used to reduce the number of results that arepresented to the user below the number of raw results found from thevarious suppliers. This is done in order to reduce the amount of datathat the user has to sift through by providing only those results thatare most likely to be selected.

This determination can be based on many criteria. For example, in therealm of air travel fares, many carriers quote fares much higher(3.times.or more) than their competition on some routes. Since it isvery unlikely that a user would select these particular travel optionsin the face of the competition, the server is best serving the needs ofthe user by not cluttering the list of results with this type of item.In addition, the server can take into account factors including, but notlimited to: the user's explicit preferences, as indicated by thepersonal information entered; the user's implicit prioritization, asindicated by the current sort-order selection in the client Bar; theparticular user's past purchasing decisions when presented with similaroptions; and, the past purchasing decisions of aggregate groups of userspresented with similar options.

The complexity of making pruning/filtering decisions on the data itemsfound is increased by the results being received from differentsuppliers at different times, and being forwarded to the client forincremental display as quickly as possible. In order to provideincremental results to the client, the server applies filteringdecisions to individual search results without certain data about theresults that may or may not be subsequently received from supplier'sthat have not yet responded to the search request. There are a number ofpossible mechanisms that the server could employ to accomplish thisdecision making.

The simplest method is to generate a numeric score (applying the desiredcriteria) for each individual data item. Items achieving a score above acertain threshold are sent on immediately, items falling bellow a lowerthreshold are discarded, and those between the two thresholds areretained for further consideration. The system then adopts a targetnumber of results to return from any search (or possibly a differenttarget number for each category of search, such as the air travel, hoteland rental care reservation categories). Since the number of suppliersbeing searched is known at the outset of a search (although an alternateembodiment can add the ability to start new searches of differentsuppliers incrementally if the initially-received results were judgedinadequate), the threshold for deciding which results should beforwarded to a client can be adjusted up or down after each supplier'sresults are received and it can be determined whether the average numberof results per supplier so far sent to the client is above or below thetarget average number of displayed results per supplier.

In addition to implementations in which the processing from anindividual user action through the delivery of information is performedinteractively and as quickly as possible, it is possible for otherembodiments of the system to have relatively long latencies, either dueto processing requirements or intentionally introduced, betweendifferent steps. For example, an embodiment can gather information fromvery slowly-responding suppliers. In this case, a mechanism could beintroduced in which result information was delivered to the userseparately from their (possibly implicit) request, such as by sendingthem an email instead of immediately displaying the results in theclient. In this case, it may be advantageous to detect multiple useractions as triggering search operations without requiring that oneoperation complete or be aborted before the next is detected. Similarly,when information delivery is delayed it may be advantageous toaccumulate all of the search results together for a single deliveryinstead of delivering them incrementally. If this is done, differentmethods may be used for post-search filtering which take advantage ofthe fact that all results can be filtered simultaneously when the systemis in complete possession of all of the relevant information, ratherthan with partial (incremental) information as described herein.

There are many cases in which delays may be intentionally introduced inthe system's operation. For example, the search system could provide a“notification” feature, whereby a particular (possibly implicit) userquery is repeatedly processed over a period of time, and the useprovided result information only when that information meets aparticular criteria. Another possibility is that the system performsboth immediate data delivery as well as subsequent, non-interactivedelivery. For example, in an embodiment the system could consider thefinal purchase of an airline ticket (as detected by the buy trackingmechanism described herein) as the triggering event for a new search.The system could perform this search repeatedly over a period of timeand filter the results using criteria based on the actual ticketpurchased by the user. The system would then asynchronously notify theuser if one of the periodic repeated searches finds a ticket that isbetter than the one the user purchased. In the arena of airline tickets,better might be constrained to be only a lower price for exactly thesame ticket as business considerations might limit the user fromexchanging the already purchased ticket for any other alternative.However, embodiments designed to handle different types of informationmight not need to be so limited.

In cases where the search system is used to search for informationrelating to purchasable items that have time-limited availability, suchas airline tickets, the system may incorporate special features in orderfor delayed information return to be helpful. For example, if the systemperforms a search for a purchasable airline reservations delayed fromthe triggering user action, it is possible (if not likely) that the userwill not be interacting with the client at the time results areobtained. Because of the fleeting validity of airline reservationinformation, the system could use a method for immediately notifying theuser so that a purchase transaction could be completed. Such a methodcould include the use of a paging system or an asynchronous message to awireless client, but is not so limited.

An alternative to being able to reliably notify the user of an available(desired) purchasable item is to have pre-authorization from the user tomake the purchase on their behalf. This would require that the usersupply, either previously or as part of their (possibly implicit)search-triggering action, payment information, a purchase authorization,and adequate selection criteria so that the user is satisfied withpurchases that are automatically made.

Following search result processing, the individual result items areforwarded to the client. When forwarding results, each data item isinserted into an HTML/JavaScript display template, combined with thecookies set by the supplier web site (if any), and transmitted to theclient.

The different server servlets of an embodiment are implemented using theobject-oriented Java programming language. Given this, a keyimplementation detail is how the system creates the different componentobjects that make up each servlet. A “factory” system is used wherein asingle, central piece of software, the factory, is called by all otherportions of the software with requests to create new objects.

The larger components in the system are not created/referenced in atraditional way, but rather through component factories. The softwaremodules using a component never actually know which implementation ofthe component is returned by a factory for their use. Rather, theyalways communicate through an interface (an API definition for thecomponent). When the module using an object returned from a factory hasto get a handle to an implementation of the interface, they request thehandle from the factory. This allows the factory to create the componentat that point, or to retrieve it from a temporary storage place, or toretrieve it from a database. The factory is the only system componentaware of how the object instances are created and managed, and this canbe changed without the awareness of any of the other software componentscommunicating with or using the component.

Use of factories also allows the implementation of the component to bechanged without any of its users being aware that a change has takenplace. The actual class instantiated by the factory is determined by aproperty file, and can thus be changed without changing a single line ofcode. This mechanism allows rapid prototyping of new components,creating a so-called default implementation of the component (animplementation that returns valid results without implementing any ofthe real behavior of the component), and creates a complete systemalmost instantly. Individual developers can then work independently tocreate the actual components one by one, and replace the defaultcomponents when the real components become available. The completesystem works at any time, and can be run and tested with the newlydeveloped component by simply changing a property.

In order to optimize the database accesses beyond the connection poolingmechanism described herein, an embodiment includes a generic objectcaching mechanism. The object cache caches the data obtained fromdatabase accesses, and keeps the object instance containing it availablethere for a future reference to the same data. After a certain period ofnon-use of the data, it is automatically removed from the object cache.A next access of the data will again obtain it from the database. Theobject caches rely on the principle of locality of time reference toreduce the actual requests that need to be made to the database. Byimplementing a generic base class that provides this functionality, itis easy to use object caching throughout the server.

Use of a factory abstracts the implementation of object creation fromthe rest of the software. In particular, this mechanism allows differentobjects that implement the same interface to be freely substituted foreach other as the system implementation evolves. The particular objectimplementation that is used to serve each object-creation request thatthe factory receives is controlled by a server configuration data filereferred to as the properties file. Additionally, the factory can managecaches and pools of previously-created or pre-allocated objects, tooptimize the management of memory and/or processing effort.

The central module of the Copilot Servlet is referred to herein as thebusiness logic. The business logic includes a relatively small portionof the servlet that is responsible for sequencing the operation of theremainder of the servlet. Any system changes necessary to accommodatecoupling with fundamentally different types of client systems areaccomplished with the business logic. For example, a client that is astand-alone piece of software that is not integrated into a web browser(as might be appropriate on a hand held processing device), would notneed to exchange information with the server concerning whether the Barshould be automatically opened. This type of change can be incorporatedin the server with changes in the business logic.

The sequence of object creation and use that the business logic useswhen servicing a client request includes, but is not limited to:creating a UserInfo object based on the UID in the request; creating aSessioninfo object based on the UserInfo and the SID; and, creating aTravelRequest object. The UserInfo object is created to hold informationkeyed from the UID. The UserInfo object is initialized with data for aparticular UID only while a session for that UID is open, but the datait contains is not session specific. When there is not one or moreactive session for a particular user (UID), the contents of the UserInfoobject is stored in the server database until needed again.

When the UserInfo object is created by the factory, the factory firstchecks a cache of previously-created UserInfo objects and returns anobject from the cache if present. This minimizes both object creationsand accesses to the database, because multiple requests from the sameUID are likely to occur together. If a User Info object for the desiredUID is not present in the cache, a new User Info object is created andthe factory attempts to populate it with data from the database.

New UID database entries are created only when the Start Servlet (whichshares much of the underlying infrastructure with the Copilot Servlet,including the User Info object and the object factory) requests aUserInfo object from the factory and the desired UID is not alreadypresent in the database. If other servlets request UserInfo objects fornon-existent UIDs, matching objects are created (or located within thecache), but the exception is logged as being potentially indicative ofan attempt at unauthorized access to the system.

Just as the UserInfo object is created to hold UID-specific informationwhile processing a request, the Sessioninfo object holds SID-specificinformation. Like the UserInfo object, SessionInfo objects are cachedwithin the factory so that multiple, rapid uses of the same SID do notrequire corresponding Sessioninfo objects to be created from scratch toserve each request.

Unlike the UserInfo object, the contents of SessionInfo objects are notstored by the server database, but the system is not so limited.Instead, SID-specific information is maintained as long as the sessionis active and then discarded when the session terminates (except for thedata logged by transactions while the session was active, which isconsidered to be different from the randomly-accessible databaserecords).

TravelRequest objects hold information that is specific to each uniqueinformation request that is sent from the client. The creation of theTravelRequest object accomplishes several critical parts of the CopilotServlet function.

First, in the process of creating a TravelRequest object, the source ofthe information in the request is identified. In general, a request caneither originate from the itinerary-entry controls in the client userinterface or in the equivalent data entry portions of a third-party webpage. In either case, there is a source-specific input adapter modulethat is used to process the content of requests that the client createsfrom user interaction with supported sources.

If the source of a request is not supported (for example, the requestcomes from a third-party web site that is included in the client list ofURLs that should be forwarded to the server, but the actual browsernavigation event that the client forwarded is from or to a page of thesite that does not perform itinerary entry), or if the input adapterdetermines that the request was incomplete and did not contain enoughinformation to start a search, then the TravelRequest object is createdwith a special value indicating that it is a non-valid request. Thisresult causes the Copilot Servlet to respond to an incoming clientrequest with a “0” string to inform the client that no additional datawill be coming and that the Bar should not be automatically opened. Ifthe Bar is already open, such a response does not result in Bar closure.

Assuming that enough information can be extracted from the clientrequest to start a travel search, the TravelRequest object is populatedwith the extracted information. Thus, the combination of the inputadapters, which extract the information, and the TravelRequest object,which serves as a receptacle for the information, serves to normalizethe information needed to perform a search of suppliers into a commonformat for use by the rest of the Copilot Servlet components, regardlessof the original source and format of the information.

Further, normalization of travel requests includes identifying theairports that are associated with the departure and arrival locationsidentified in the request. This is an important step because there are anumber of roughly-equivalent ways in which users might specify thelocations in their requests.

After the TravelRequest object is created, the business logic processesit through one or more pre-search filtering or pruning operations. Priorto these operations, the TravelRequest object has information thatidentifies the broadest possible set of travel suppliers that can besearched to fill the requested itinerary. For example, in searching foravailable airline reservations, the preferred embodiment builds a listof all the airlines (suppliers) supported by search adapters for whichat least one departure and arrival airport (as there may be more thanone possible alternate at each end) are listed as being served by theairline in the server database.

Another technique for determining whether a travel supplier should besearched based on the origin and destination of the trip uses a datatable based on the actual flights that a supplier actually provides, andincorporating service rules in its construction. The system of anembodiment uses such a table, which incorporates not only actualsupplier flights but also a numeric preference value with each airportpair in the table. The preference value is used during pruning, both bythe explicit pruning mechanism and by the per-supplier pruning decisionsmade within search adapters, as a way to control the likelihood that aparticular supplier will be searched for a given route, in light ofother factors effecting search pruning.

Filtering and pruning are important optimizing steps for many reasons,although the exact set of optimization criteria are likely to bespecific to a particular information domain searched. To continue withthe air travel example, there are many idiosyncrasies in the way airtravel is routed that could result in there not actually being anyflights between two airports that are both served by the same airline.For example, if the airports are too close together, there may only beflights between them on commuter air carriers; larger carriers thatserve both airports may either not have flights or have flights that areprohibitively priced. As another example, a single airline might servetwo disparate regions, and even though one contains the arrival airportand the other contains the departure airport, the airline does notactually have flights between the two regions. Further, a particularsupplier might be optimized out of the list to be searched based on userpreferences and predictions made concerning the likelihood of a relevantresult being returned from the search based on prior system experience.

Another criteria used to prune an air travel supplier out of the list ofpotential search targets is the home country of the supplier. Forexample, even though British Airways files to/from many United Statescities, it may only be searched if one of origin and/or destinationairports is in Britain.

There are three key system resources whose use can be improved byintelligently optimizing (reducing) the list of suppliers to besearched. One resource is network bandwidth between the server and theinternet backbone. Because of practical constraints, each individualserver of the system will have a finite amount of network bandwidth thatcan be employed to perform searches. By predicting which suppliers thatmight be searched are most likely to return relevant (to the particularcurrent user) results, the amount of search server bandwidth consumed byeach search can be minimized, resulting in greater system efficiency andlower cost.

Note that another, unrelated method of minimizing bandwidth is to useproprietary search connections with as many suppliers as possibleinstead of connections to human-oriented web sites. Web sites withhuman-friendly user interfaces typically transfer a significant amountof formatting and presentation information above and beyond theinformation actually of interest to the search server, wasting asignificant fraction of the total bandwidth used to return results.

The second key resource is the network bandwidth of the supplier serversystems. Assuming a generally high market acceptance of the system, itwill be capable of generating significantly more total queries ofsupplier systems than the consumers using it would be able to generateon their own by accessing the same supplier web sites. As such, thesystem should not overwhelm the bandwidth (network and processing)capabilities of those supplier web servers that are accessed by searchadapters. The pre-search filtering step gives the server the opportunityto remove a supplier from the list of suppliers to search based on thenumber of searches of that supplier that have been recently performed orare expected in the near future.

The third resource that can be optimized by reducing the number ofsuppliers to be searched, thereby improving the expected relevance ofthe results from each supplier, is the real time required for the searchat all. The more rapidly the system can respond to an individual userrequest for information, the more satisfied the user is likely to be.Even if there were no bandwidth and processing limitations, the searchwould complete sooner the fewer suppliers that are searched. Inaddition, by searching suppliers that are more likely to return relevantresults, an implicit reduction is made in the total number of resultsthat will be displayed to the user. The shorter and more concise thelist the user has to review, the more they perceive that the searchoccurred rapidly, even if it actually took the same amount of real time.At the conclusion of the filtering/pruning operations, the TravelRequestobject contains information identifying the specific set of suppliersthat the system will attempt to search with the user's request.

The TravelQuery object manages the actual search process. It managesclass-global pools of idle processing threads and pre-created searchadapter objects. When a new TravelQuery object is instantiated with aTravelRequest object, it obtains one thread and one search adapter foreach supplier that the TravelRequest identifies as a search target. Ifthe pools do not contain enough items to execute a particular query,more items are created. The TravelQuery assigns one supplier to eachthread/search adapter pair and starts the search operations.

The server system performs numerous tasks in parallel. In order toachieve this parallelism, a large number of independent threads arecreated. Once the task has been completed the thread can be discarded.Since many of the tasks are of a similar nature, the system uses athread pool. This saves the overhead of constant thread creation anddestruction, and makes optimal use of the thread resources. When a taskneeds to be accomplished a thread is allocated from the pool andassociated with the task. The thread then executes the task untilcompletion after which the thread is returned to the pool. When nothread is available in the pool a new thread is automatically created,and returned to the pool after task execution. In order to protectagainst possible errors or memory leaks, a thread is re-cycled after ithas executed a certain number of tasks. At this point the thread isdestroyed instead of being returned to the pool. This mechanism willalso automatically maintain the pool size at an appropriate level.

When each supplier search completes, the search results are provided tothe request's Presentation object and the processing thread and searchadapter objects are returned to the pools. Both pooled threads andadapters have their life spans monitored and are destroyed after theyhave been used 100 times, but are not so limited. This is done asinsurance against the possibility of memory leaks or other potentialmild-impact bugs in the servlets or the server operating system thatcould accumulate if the objects were allowed to persist indefinitely.

It is possible for a user to abandon a search while it is still inprogress. This can occur due to a number of different user actions,ranging from abruptly closing the Bar or the entire web browser, tomanipulating a client user interface control so that the search resultsare no longer displayed, or even by selecting the “reserve” controlassociated with an already-received data item. When this occurs, thesearch adapters are not explicitly notified. All of the Copilot Servletobjects involved in a particular search are allowed to complete thesearch. This prevents the connections between individual search adaptersand supplier systems from being abruptly terminated, which might haveundesirable side effects for the suppliers.

Instead, the TravelQuery object contains a flag indicating thatprocessing should continue on the current query. If the user abandons asearch, this flag is cleared. Each time an active search adapter reachesa point in the sequence of transactions with its supplier where thesupplier system is in a stable state, the adapter checks the flag and,if it has been cleared, stops its operations.

There is a different search adapter module (object class) for eachsupplier system that is supported for searching and for each differentsearch procedure that may be applied to a particular supplier. It isimportant that the search adapters be easy to create and modify as theyare often customized to the design and content of a supplier'shuman-accessible web site. When this is the case, the search system hasto constantly be monitored to ensure that changes to supplier web sitesthat stop the adapters from functioning do not occur.

Within each search adapter, there may be logic that appliessupplier-specific algorithms to perform further pruning, to determine ifthe search of the supplier is actually appropriate for the currentquery. For example, there are air travel suppliers that may not acceptbookings for very near-term flights (e.g., departing less than five daysfrom the day of purchase). In this example, it is the responsibility ofthe individual adapter to determine if the current request is or is notlikely to produce useful results if carried out for the adapter'ssupplier. By placing the responsibility for detailed supplier-specificdecisions in the search adapters, it reduces the need to makedescriptive/predictive information available to the higher-levelpre-search pruning logic.

Another aspect of supplier-specific decision making carried out by theindividual search adapter is regulation of the amount of bandwidthconsumed by searches conducted on the adapter's supplier. This isaccomplished through a combination of supplier-specific code and data(such as the desired maximum amount of bandwidth to consume from thesupplier) plus code that is part of the search adapter base class andimplements the bandwidth-tuning algorithm. In an embodiment, the mostbasic algorithm is a digital phase-locked loop (PLL). In order to allowthe high-level pre-search pruning logic to take advantage of thedecisions made by individual search adapters, each search adapterreturns status information to the TravelQuery indicating whether or notit has started a requested search. This allows the pre-search pruning tostart additional adapters if any of its first choice of adapters decidesthat performing the search is not actually appropriate. Similarly, whenthe high-level pre-search pruning logic requests that a search adapterstart a search, it provides a numeric preference value, indicating thedegree to which the pruning logic wants the adapter to perform thesearch. Each search adapter is free to interpret the preference valuerelative to supplier-specific criteria.

It is not only possible, but actually desirable in some cases to havemultiple search adapters for the same supplier installed in the searchserver. In general, the decision making in different adapters for thesame supplier should be complementary, so that only one of the adapters(if any) will actually perform a search for the same request. Thisensures that the user will not be presented with multiple duplicatesearch results.

Real time searching of the Internet is by nature a very dynamic process.Updates to the search adapters have to be made on a regular basis. Inorder to minimally disrupt the system availability, a system embodimentincludes a dynamic class loader, which allows for updating the searchadapter objects while the system is running. The system itself detectsthat a new version of a class has been made available, removes all oldversions of the class and starts using the new version of the class fromthat point on. Because this embodiment is implemented in Java, thedetails of this mechanism depend significantly on the structure of theJava programming language and execution environment, although thefundamental structure of the system is language-independent.

Java software is compiled from source code into an intermediate binaryform (byte code), which is then interpreted at run time by a JavaVirtual Machine (JVM). The management of loading new byte code files forexecution by the JVM is handled, along with many other common and systemfunctions, by parts of the Java runtime environment that are themselveswritten in Java and interpreted by the JVM, as opposed to beinghard-coded parts of the JVM itself. For the purpose of loading newclasses in a running Java system, the important parts of the Javaruntime environment are the class loader classes and objects.

The class loader is the component of the runtime environment that isinvoked by the Java new operator when a new object (instance of a class)has to be dynamically created. The default (system) class loaderoperates based on the name of the class for which an instance is to becreated, and uses system configuration information and standardizedconventions to locate and read the bytecode file that contains theimplementation of the desired class. The class loader maintains a cacheof the contents of the bytecode files for objects which have alreadybeen instantiated, so that multiple instantiations of the same object donot all incur the performance penalty of reading bytecode files.

In addition, the Java runtime environment makes provisions for thecreation of custom class loaders, that may or may not be child classesof the system class loader. In particular, there is a standardizedmethod, newInstance, that is used to invoke the class loader withexplicit parameters concerning the class and bytecode files to load,rather than relying on the implicit locating of the bytecode fileimplemented by the system class loader. In the system of an embodiment,the determination as to which objects are instantiated by the systemclass loader and which use the system's special class loader is madeexplicitly in the source code based on whether new or newInstance isused to create object instances. In addition, an embodiment uses acommercial set of infrastructure libraries known as “Tomcat” in additionto the basic Java execution environment. Tomcat implements its owncustom class loader on top of the Java system class loader, and thesearch system's class loader is built on top of the Tomcat class loader.In an embodiment, the custom class loader is used to create instances ofall of the different types adapters, not just search adapters.

In order to support dynamic adapter updating without having to restartthe entire server system, it is necessary to be able to remove the oldversion of an adapter from the class loader cache, and then cause newinstances of the adapter to be instantiated from the new bytecode file.Unfortunately, the Java system class loader does not contain a method tounload classes. The commonly known work-around for this lack is todestroy the entire existing class loader object and instantiate a newone. Unfortunately, this causes the entire cache of loaded bytecodefiles to be lost, which is an unacceptable performance penalty. It is toovercome this problem that the system of an embodiment uses its customclass loader.

Each time an adapter is to be used (fetched from the pool), theTravelQuery object checks the time stamp of the adapter's bytecode fileto determine if it has been updated since the last time it was loaded.If the adapter's bytecode has been updated, the TravelQuery objectinstructs the custom class loader to reload the class' bytecode file.The system's custom class loader includes a reinstantiate method that:removes the target class from the class loader's bytecode cache;instantiates a new class loader; passes the complete existing cache tothe new class loader instance; and, destroys the old class loaderinstance.

At the conclusion of this operation, the new class loader instance canbe used in the normal way (via newInstance) to instantiate the desiredadapter, which will cause the new bytecode file to be loaded into thecache. Note that an alternate implementation could check the time stampsof all adapter bytecode files periodically instead of on-demand. Such animplementation would trade off the precision of the adapter updatesversus the amount of processing consumed by checking adapter timestamps.

In addition to determining when an adapter's cached bytecode should beupdated based on the presence and time stamps of files in the system'sadapter bytecode directory, an embodiment of the system also uses thepresence of different types of adapter files to determine the set ofoptions available to the system. For example, the server maintains acopy of the URL lists stored on the client at all times. Note that oneURL list directly corresponds to the available set of input adapterswhile the other URL list corresponds to the set of buy adapters. Eachtime the system detects a change in the set of available adapters, itupdates its internal URL lists and the associated revision number.Subsequently, when new client sessions are established, the clientsreceive the new revision number and therefore download the updated URLlist.

The revision number for each URL list consists of three numbers. Thefirst two numbers come from the properties file while the third numberis automatically incremented by the server in response to detectingchanges in the available set of adapters. In a similar, internal manner,the list of suppliers that is used to create the original list ofcandidate suppliers to search for a request is based on the set ofsearch adapter objects that are currently available. Note that it ispossible for an adapter to be added or removed to the bytecode directoryas well as being replaced, and the system reflects these changes in theavailable set of options as well. This is accomplished by a serverprocess that periodically examines the bytecode file directory for theaddition or removal of new adapters.

As discussed herein, the server uses at least one set of configurationdata stored in the properties file. It is possible to implement thecreation of search adapter objects based on a list of suppliers to besearched contained in the property files. However, a more efficientimplementation is to determine the set of available adapters based onthe Java bytecode files currently located in the search adapterexecutables directory on the system servers.

The implementation of the search adapters particularly benefits from anobject-oriented programming language and design style. In the system ofan embodiment, search adapters are created as child classes from a largesearch-adapter base class that provides common behaviors, interfaces,and services to ease the development of individual search adapters. Inparticular, the base class implements all of the adapter interfaces tothe other server components. Similarly, the base class for searchadapters implements a selection of primitive and/or common tool routinesthat specific search adapters can use to parse and extract data from webpages returned from requests the adapter makes to supplier web servers.

Another function of search adapters implemented in the base class is thedetection and tracking of errors. Because search adapters interact withother unrelated systems across the coupled network or Internet, there isalways the possibility that their operation will fail. The search systemis, however, very tolerant of individual search failures because thereare so many potential travel alternatives that can be presented fromother suppliers. However, the search adapters track the number offailures from a particular supplier. A significant number of failuresfrom the same supplier can be indicative of a change in the supplier website that will require a change in the search adapter in order to allowit to work again. In the preferred embodiment, there is a mechanism tocause the detection of groups of search failures to automaticallytrigger the paging of an operator.

Moreover, as the search adapters are constructed using a common baseclass and implement identical interfaces, it is easier to use the searchadapters in contexts other than the complete search system and theCopilot Servlet. For example, during the development of search adapters,a separate piece of test harness software is used to task individualadapters with specific searches under the control of the developer,circumventing the rest of the intelligence in the Copilot Servlet, whichmight serve to make testing of individual adapters more difficult.

The Copilot Servlet makes on-the-fly decisions for each set of searchresults provided by a search adapter regarding which of the result itemsare appropriate to forward on for display in the client. This decision,like the processing performed on the TravelRequest object to prune theset of suppliers to search, is accomplished by a series of processingoperations performed on the search results once they are received.

The final object in the chain of the Copilot Servlet processing for aparticular client request is the Presentation object. This objectreceives the different travel search results, asynchronously, afterfiltering, from the TravelQuery. The Presentation object is responsiblefor encapsulating the raw search results into HTML that is appropriateto the HTML already sent to the browser control in the client Bar.

In general, there is a single Presentation object associated with aSessionInfo object. The Presentation object retains the result data fromthe most recent of each different type of data search performed by theuser. In an embodiment, this includes up to three sets of data: one eachfor air travel, hotel reservations, and rental car reservations. Eachtime a new TravelQuery is created/started for a user session, it isgiven a pointer to the SessionInfo object's Presentation object. BecauseTravelQuery objects are not immediately destroyed if the user abandons asearch, it is possible for the Presentation object to receiveinterleaved results from multiple TravelQuery objects simultaneously. Inorder to allow the Presentation object to retain the information fromthe most recent search and discard the rest, each TravelQuery object isassigned a different search ID number, and the Presentation objectdiscards search results marked with any search ID other than the mostrecent (of a particular type).

Regarding databases and database content, there are a number oflogically-separate databases used by the server system. A collection ofserver systems shares one or more common, redundant database systems.One set of data stored in the server database includes copies ofcommercially available flight tables. This table lists all of theavailable commercial airline flights by supported suppliers. Not only isthis table accessed directly, but it also contains the raw data fromwhich the short list of suppliers that service listed airports is takenin construction of the first-order list of possible suppliers to searchfor a particular request.

A key capability of the system of an embodiment, because it is capableof directly accessing suppliers web sites, is that it can find and makeavailable to users the so-called web specials of travel suppliers. A webspecial is a discounted price on an otherwise-available ticket that isoffered only to people purchasing the ticket through the supplier's website.

In order to optimize the list of suppliers that should be searched for aparticular request, the system has to have information about whichsuppliers are likely to have which web specials available at anyparticular time. Unlike the information on regularly scheduled flights,which is essentially static, the set of web specials is highly fluid.Therefore, the database contains a cache of the web specials availablefrom each supplier that performs this type of marketing. The cache isperiodically refreshed by a pseudo-search request generated within theserver.

While the primary means of searching employed by an embodiment issearching in direct response to a user action, it is noted that thesearch system of an embodiment also employs automatic searchingperformed asynchronously to user actions. Automatic searching may beused to facilitate any stage of the system's operation. For example,automatic searching may be performed to pre-fill data bases used as partof the filtering process before and after a search adapter operates. Theresults of automatic searching may also be incorporated into theinformation that is returned to a user as the result of a query.Additionally, nothing in the embodiments described herein should beinterpreted to limit the search system to returning the informationretrieved by search adapters to the user. For example, the results ofqueries to information suppliers could be used to filter the delivery ofother data (possibly constant data or the results of automaticsearching) to the user instead of the reverse.

As discussed herein, the UID-associated information is stored in thedatabase. It is updated when the user invokes the client user-interfacefor editing their preference information, and fetched into a UserInfoobject each time a new client/server session is created.

The interface between the search system and the various supplier systemsis implemented by a search adapter. As detailed herein, there are threedifferent categories of interfaces between an adapter and a supplier:through the supplier's commercial/consumer web site, through a GDSsystem, or through a custom, search system-specific interface.

In addition to searching supplier web sites and handing off users to thepurchase pages of a supplier web site, the system is capable ofperforming the purchase hand-off by providing a travel agent number,otherwise known as an ARC number or IATA number, to the supplier. Thus,the owner of the ARC number is able to collect a travel agencycommission on the sale.

In addition to the database that is a component of each separate serversite of the system, a data warehouse is maintained in an embodiment.Recorded/created data is securely forwarded from the server databases tothe data warehouse on a regular basis. The warehouse is used for bothbackup and long-term storage purposes. When data is forwarded to thewarehouse, it is removed from the individual server sites. This ensuresthat the vast majority of data collected is not present on the servers,reducing their attractiveness to hackers as targets.

In addition, data processing and reduction is carried out at thewarehouse in support of several functions. First, on a regular basisprocesses are executed to collect information on client purchases intoinvoices for individual suppliers with whom the service owner has acontractual relationship. Second, the accumulated data about userpurchasing, combined with known, industry-specific trends, is used forforecasting both technical (future server load and bandwidthrequirements) and business (revenue) trends.

In addition, the logs of user activity and travel component or airlinepricing behavior accumulated by the system during its operation form asignificant resource. This resource can be used for further exploitationand refinement of the system as well as a business asset that can beexploited to the degree that it can be made available to otherbusinesses without compromising the service owner's position withsuppliers or the privacy of the individual users who have transactedthrough the system.

Exploitation of the database for the service owner's benefit can beconducted through data mining and other types of analysis. In order toallow third-parties to make use of the data without violating user orsupplier privacy, an application programming interface (API) andsoftware architecture is established that allows components, or dataanalysis adapters, to be created and provided to the search system ownerby third parties who want access to the data. The advantage of thisarrangement, versus directly providing data sets to third parties, isthat the API can be used to restrict the types and amounts of data thatthe analysis adapter can output to ensure that privacy is maintained.

There are several ways in which this method for providing third partiesaccess to the system data can be incorporated into the system. For thirdparties who simply wish to perform data mining, the analysis adapterthey provide can be run at the data warehouse, and output resultsprovided for transmission back to the third party. FIG. 11 shows a dataanalysis adapter configuration 1100 of an embodiment at a datawarehouse. This configuration 1100 supports information flow among atleast one database 1102, at least one data analysis adapter 1104, anoutput interface module 1106, and temporary storage devices 1108 in theprovision of digested data formulated to third parties 1110. Thissituation provides the analysis adapter 1104 the greatest freedom andaccess to data, but also presents the most significant risk of the thirdparty attempting to exploit the access and circumvent the restrictionson data output imposed by the system API.

Another significant application of third party data analysis adapters iswithin the processing of individual user travel requests. The analysisadapters 1104 support a supplier offering dynamic and/or adaptive offersbased on any of the data to which the system has access, including thespecific user's prior purchasing behavior and the other bookings thatthe system has found from other suppliers. In this case, the analysisadapter 1104 has to be judged by the system owner as reliable enough tobe distributed to and run on the server systems. In addition, the dataneeded by the analysis adapter 1104 must be available at the differentserver sites.

FIG. 12 shows a data analysis adapter configuration 1200 of anembodiment at a 1 5 server site. This configuration 1200 supports dataflow among Copilot Servlets 1202, supplier systems 1204, supplier dataanalysis adapters 1206, and data warehouses 1208 via the Internet 1210,but is not so limited. Data is made available to server-residentanalysis adapters in one of two ways, depending on the data needs of theadapters. First, processes can be run at the data warehouse to producedigests of the complete database. Assuming that the digest processprovides summaries that are appropriate for the algorithms in theanalysis adapter, the digests can be securely transferred to the serversites from the data warehouse withoutjeopardizing the entire databaseand provide as much benefit to third parties as would access to the fulldatabase.

Another alternative is to establish a secure, real-time link between theserver sites and the data warehouse (possibly creating duplicate datawarehouses to provide reliability and adequate bandwidth). This link canbe used either to allow analysis adapters running at the server sites toquery the full data set or to allow the adapters to execute within thedata warehouses but to be queried themselves by the server sites.

There is a significant business and user-experience impact resultingfrom the exact point in time at which the client Bar auto opens andpresents information to the user. In an embodiment, the client auto-openfunctionality essentially provides alternate information to that whichis/will be provided by the data source that the user explicitly queried.Different perceived effects can be produced by altering the point in theuser's primary sequence of operations at which the auto-open isperformed and the type of information that is presented.

For example, auto-opening earlier (as soon as the user first goes to apage in a web site that would trigger a query-based auto open) gives theuser the opportunity to use the inventive search system instead of theweb site that they explicitly selected, but makes it appear less like ahead-to-head competition either to present results or on price or otheruser-relevant criteria. Alternately, moving the point of auto-open laterin time, so that auto-open does not occur until the user has evaluatedthe offers made by the site they originally chose, and has perhapschosen one to purchase, gives the search system significantly moreinformation on which to base its search. In addition to the itineraryinformation originally entered by the user, the system also has accessto the travel options which the “other” web site presented and canattempt to infer the user's preferences and the price that they'rewilling to pay. In this case, the auto-open will appear to the user moreas a counter-offer to the choice that they have already made than as anunbiased presentation of alternatives.

The combination of third-party data analysis adapters with an auto-openoperation that occurs later in time than the “nominal” described hereinis particularly powerful. Such an environment forms the foundation for asystem in which (potentially) multiple suppliers have access to dataregarding the specific user making a request and competing supplieroffers, all without violating the privacy of any of the parties (via the“proxy” of the analysis adapter). This allows suppliers who can craft asufficiently sophisticated analysis adapter the ability to make the bestpossible dynamic pricing and revenue-optimization choices, taking intoaccount not only gross factors like seat availability but strategicconsiderations regarding routes or customer-loyalty optimization.

In an embodiment, search adapters are provided to access web pagesbecause it is common practice for information suppliers to makeinformation available through web (e.g., HTTP) servers. However, thisshould not be considered a limitation of the system. Anynetwork-accessible information source, whether it is intended to providehuman-readable or machine-readable information, may be used in place ofa web server without altering the fundamental operation of the searchsystem of an embodiment.

Similarly, data from web servers is typically broken into discreteblocks that are individually formatted for viewing by a user, referredto as web pages. However, this is an artificial division grown out ofthe general focus on using HTTP and HTML for a specific type ofuser-viewable information presentation, and should not be considered alimitation of the search system itself. One of the advantages of anembodiment using discrete search adapters is that it is relatively easyto modify the system to support different means of gathering andextracting information. For example, an information provider may use asystem that does not return information in discrete “page” blocks.Additionally, adapters may process information based on the reception ormonitoring of the data stream carrying the information, rather thanwaiting for the reception of complete “pages” of information beforeprocessing.

The description herein of various embodiments of the invention has beenpresented for purpose of illustration and description. It is notintended to limit the invention to the precise forms disclosed. Manymodifications and equivalent arrangements will be apparent.

1. A method for a dynamic information connection engine, comprising:detecting at least one user action on at least one client computer and,in response, determining at least one user is searching for supportedinformation; extracting query information from the at least one useraction, wherein the query information includes at least one category ofthe supported information; automatically selecting at least one supplierof the supported information using at least one server in response tothe query information; transferring at least one query including thequery information among the selected at least one supplier via at leastone network; and generating at least one result list in response to atleast one query response, wherein the at least one result list includesresponse information generated from the at least one query response andquery status information.
 2. The method of claim 1, further comprisingproviding the at least one result list to the at least one user.
 3. Themethod of claim 1, wherein the at least one result list further includesat least one electronic link to the selected at least one supplier. 4.The method of claim 1, wherein detecting further comprises: monitoringthe at least one user action by capturing Uniform Resource Locators(URLs) from a browser of the at least one client computer; comparing aroot portion of the captured URL with at least one list of stringsstored by the at least one client computer; and forwarding aroot-matching URL to the at least one server, wherein determinations aremade whether the at least one user action is a request for travelinformation and whether the at least one user action contains enoughinformation to be the at least one itinerary component.
 5. The method ofclaim 1, further comprising establishing at least one coupling to theselected at least one supplier via the at least one network, whereinestablishing includes at least one method selected from a groupconsisting of requesting at least one web page from at least one website of the at least one supplier, and using at least one proprietarycoupling among the at least one supplier and at least one intermediarydatabase, wherein the at least one intermediary database comprisesinformation on available inventory of the at least one supplier.
 6. Themethod of claim 1, further comprising establishing at least one couplingbetween the at least one client computer and the at least one server,wherein the at least one client computer dynamically constructs a nameof the at least one server by concatenating string fragments including astring constant representing a fixed base part of a name of the at leastone server, at least one random number converted into at least onecharacter string, and a string constant representing at least one domainin which the at least one server is located.
 7. The method of claim 1,further comprising: tracking a purchase of at least one itinerarycomponent; and maintaining proof of the purchase.
 8. The method of claim7, wherein the tracking and the maintaining comprise maintaining atleast one buy-tracking list of string pairs on the at least one clientcomputer, wherein a first string pair element includes a URL of areceipt web page of the at least one supplier, wherein a second stringpair element includes an extraction specifier that specifies a purchasetransaction identification string within the receipt web page, andwherein the purchase transaction identification string is used as proofof purchase transaction origination.
 9. The method of claim 1, whereinautomatically selecting at least one supplier comprises performing atleast one evaluation using at least one search factor selected from agroup consisting of information from the at least one itinerarycomponent, preferences of the at least one user, personal information onthe at least one user, at least one previous search history of the atleast one supplier, and at least one search history of at least onesearch of a similar type and by a similar user.
 10. The method of claim1, further comprising filtering the at least one query response usingcriteria selected from a group consisting of relative item pricing,preferences of the at least one user, personal information on the atleast one user, sort criteria of the at least one user, past purchasingdecisions of the at least one user, and past purchasing decisions of atleast one aggregate group of users.
 11. A method for locating andscheduling travel itinerary components in real time, comprising:detecting at least one user action on at least one client computer and,in response, determining at least one user is searching for travelinformation; extracting at least one itinerary component from the atleast one user action; automatically selecting at least one supplier ofthe at least one itinerary component using at least one server;transferring at least one query among the selected at least one suppliervia at least one network, wherein the at least one query is a requestfor purchase information on the at least one itinerary component; andpresenting the at least one user with at least one result list inresponse to at least one query response, wherein the at least one resultlist includes the purchase information, at least one electronic link tothe at least one supplier, and query status information.
 12. The methodof claim 11, wherein the at least one itinerary component comprises atleast one component selected from a group consisting of airlinereservations, lodging reservations, and ground transportationreservations.
 13. The method of claim 11, wherein detecting at least oneuser action further comprises: monitoring the at least one user actionby capturing Uniform Resource Locators (URLs) from a browser of the atleast one client computer; comparing a root portion of the captured URLwith at least one list of strings stored by the at least one clientcomputer; and forwarding a root-matching URL to the at least one server,wherein determinations are made whether the at least one user action isa request for travel information and whether the at least one useraction contains enough information to be the at least one itinerarycomponent.
 14. The method of claim 13, further comprising determiningwhether the at least one user action contains enough information to bethe at least one itinerary component.
 15. The method of claim 14,further comprising opening at least one sub-window on the browser whenthe at least one user action includes enough information to be the atleast one itinerary, wherein the sub-window accepts entry of the atleast one itinerary.
 16. The method of claim 14, further comprisingcapturing information from the at least one user action when it isdetermined that the at least one user action contains enough informationto be the at least one itinerary component.
 17. The method of claim 14,further comprising capturing information from a third party web sitewhen it is determined that the at least one user action contains enoughinformation to be the at least one itinerary component.
 18. The methodof claim 13, further comprising updating the at least one list ofstrings, wherein updating includes transferring at least one updatedlist of strings from the at least one server.
 19. The method of claim11, wherein the at least one itinerary component is received from atleast one location selected from a group consisting of the at least oneclient computer.
 20. The method of claim 1, further comprisingestablishing at least one coupling to the selected at least one suppliervia the at least one network, wherein establishing includes at least onemethod selected from a group consisting of requesting at least one webpage from at least one web site of the at least one supplier, and usingat least one proprietary coupling among the at least one supplier and atleast one intermediary database, wherein the at least one intermediarydatabase comprises information on available inventory of the at leastone supplier.
 21. The method of claim 11, further comprisingestablishing at least one coupling between the at least one clientcomputer and the at least one server, wherein the at least one clientcomputer dynamically constructs a name of the at least one server byconcatenating string fragments including a string constant representinga fixed base part of a name of the at least one server, at least onerandom number converted into at least one character string, and a stringconstant representing at least one domain in which the at least oneserver is located.
 22. The method of claim 11, further comprisingproviding at least one coupling among the at least one client computerand at least one electronic site from which the at least one user canpurchase at least one selected itinerary component.
 23. The method ofclaim 22, wherein the at least one electronic site is selected from agroup consisting of at least one supplier web site, at least one captivepurchase web site, and at least one third party web site.
 24. The methodof claim 11, further comprising: tracking a purchase of the at least oneitinerary component; and maintaining proof of the purchase.
 25. Themethod of claim 24, wherein the tracking and the maintaining comprisemaintaining at least one buy-tracking list of string pairs on the atleast one client computer, wherein a first string pair element includesa URL of a receipt web page of the at least one supplier, wherein asecond string pair element includes an extraction specifier thatspecifies a purchase transaction identification string within thereceipt web page, and wherein the purchase transaction identificationstring is used as proof of purchase transaction origination.
 26. Themethod of claim 11, wherein automatically selecting at least onesupplier comprises performing at least one evaluation using at least onesearch factor selected from a group consisting of information from theat least one itinerary component, preferences of the at least one user,personal information on the at least one user, at least one previoussearch history of the at least one supplier, and at least one searchhistory of at least one search of a similar type and by a similar user.27. The method of claim 11, further comprising filtering the at leastone query response using criteria selected from a group consisting ofrelative item pricing, preferences of the at least one user, personalinformation on the at least one user, sort criteria of the at least oneuser, past purchasing decisions of the at least one user, and pastpurchasing decisions of at least one aggregate group of users.
 28. Themethod of claim 11, further comprising sorting the at least one listusing at least one sorting criteria from the at least one user.
 29. Themethod of claim 28, wherein the sorting is performed on the at least oneclient computer.
 30. The method of claim 11, further comprising:generating at least one travel request object in response to theextracted at least one itinerary component, wherein the at least onetravel request object contains information on the at least one itinerarycomponent and identifying information for the selected at least onesupplier; and optimizing the at least one travel request object.
 31. Themethod of claim 11, further comprising tracking at least one time periodselected from a group consisting of session periods, itinerary searchtime periods, result expiration time periods, and at least one travelcategory search result time period.
 32. The method of claim 11, furthercomprising providing at least one user identification number and atleast one session identification number to the at least one server. 33.The method of claim 11, further comprising maintaining at least onetravel-special inventory for the at least one supplier, wherein the atleast one travel-special inventory is a current inventory of specialdeals on travel.
 34. The method of claim 11, wherein the query statusinformation comprises a total number of travel suppliers to which the atleast one query is transferred, a total number of travel supplierresponses received, a total number of data items found, a total numberof data items processed, and a total number of data items presented tothe at least one user.
 35. The method of claim 11, further comprisingpresenting the at least one user with at least one electronic linkcorresponding to each item of the at least one result list, wherein theat least one electronic link directs the at least one client computer toat least one page of a web site from which the item can be purchased.36. The method of claim 35, wherein the web site is a supplier web site.37. The method of claim 35, wherein the web site is affiliated with theat least one server.
 38. The method of claim 11, wherein the at leastone client computer comprises at least one processing device selectedfrom a group consisting of personal computers, personal digitalassistants, hand-held computers, cellular telephones, communicationdevices, and vehicle telematic systems.
 39. The method of claim 11,wherein the at least one network comprises the Internet.
 40. A systemfor locating and scheduling travel itinerary components in real time,comprising: at least one client computer that detects at least one useraction and determines whether at least one user is searching for travelinformation; at least one server coupled to the at least one clientcomputer, wherein at least one itinerary component is extracted from theat least one user action, wherein at least one supplier of the at leastone itinerary component is automatically selected, wherein at least onequery is transferred among the selected at least one supplier via atleast one network, wherein the at least one query is a request forpurchase information on the at least one itinerary component, whereinthe at least one user is presented with at least one result list inresponse to at least one query response, wherein the at least one resultlist includes the purchase information, query status information, and atleast one electronic link that supports purchase of the at least oneitinerary component.
 41. The system of claim 40, wherein the at leastone travel component comprises at least one component selected from agroup consisting of airline reservations, lodging reservations, andground transportation reservations.
 42. The system of claim 40, whereindetecting at least one user action further comprises: monitoring the atleast one user action by capturing Uniform Resource Locators (URLs) froma browser of the at least one client computer; comparing a root portionof the captured URL with at least one list of strings stored by the atleast one client computer; and forwarding a root-matching URL to the atleast one server, wherein determinations are made whether the at leastone user action is a request for travel information and whether the atleast one user action contains enough information to be the at least oneitinerary component.
 43. The system of claim 42, wherein the at leastone client computer comprises at least one browser sub-window that isopened when the at least one user action includes enough information tobe the at least one itinerary, wherein the sub-window accepts entry ofthe at least one itinerary component.
 44. The system of claim 42,wherein information is captured from the at least one user action, andit is determined that the at least one user action contains enoughinformation to be the at least one itinerary component.
 45. The systemof claim 40, wherein the at least one itinerary component is receivedfrom at least one location selected from a group consisting of the atleast one client computer.
 46. The system of claim 40, wherein at leastone coupling is established to the selected at least one supplier viathe at least one network, wherein the establishment includes at leastone method selected from a group consisting of requesting at least oneweb page from at least one web site of the at least one supplier, andusing at least one proprietary coupling among the at least one supplierand at least one intermediary database, wherein the at least oneintermediary database comprises information on available inventory ofthe at least one supplier.
 47. The system of claim 40, wherein the atleast one client computer couples to the at least one server bydynamically constructing a name of the at least one server byconcatenating string fragments including a string constant representinga fixed base part of a name of the at least one server, at least onerandom number converted into at least one character string, and a stringconstant representing at least one domain in which the at least oneserver is located.
 48. The system of claim 40, wherein a factory logicsection of the at least one server creates and populates at least oneobject in response to at least one request from at least one other logicsection, wherein the at least one object is used in at least one sessionof the at least one user.
 49. The system of claim 48, wherein the atleast one object comprises at least one user information object based oninformation of the at least one user, wherein the at least one userinformation object is stored in at least one database upon completion ofthe at least one session, wherein the factory logic searches the atleast one database for the at least one user information object uponinitiation of at least one subsequent session.
 50. The system of claim48, wherein the at least one object comprises at least one sessioninformation object based on information of the at least one session. 51.The system of claim 48, wherein the at least one object comprises atleast one travel request object based on information of the at least oneitinerary component, wherein the at least one travel request objectincludes information identifying the at least one supplier.
 52. Thesystem of claim 51, wherein the at least one object comprises at leastone travel query object that is instantiated with the at least onetravel request object, wherein upon instantiation the at least onetravel query object obtains at least one thread and at least one searchadapter for each of the at least one suppliers, wherein the at least onethread and the at least one search adapter control the transfer of theat least one query.
 53. The system of claim 40, wherein at least onecoupling is provided among the at least one client computer and at leastone electronic site from which the at least one user can purchase atleast one selected itinerary component, wherein the at least oneelectronic site is selected from a group consisting of at least onesupplier web site, at least one third party web site, at least oneinterface among the at least one server and the at least one supplier,and at least one database.
 54. The system of claim 40, wherein apurchase of the at least one travel component is tracked and a proof ofthe purchase is maintained.
 55. The system of claim 54, wherein thetracking and the maintaining comprise maintaining at least onebuy-tracking list of strings on the at least one client computer,wherein a first string includes a URL of a receipt web page of the atleast one supplier, wherein a second string includes an extractionspecifier that specifies a purchase transaction identification stringwithin the receipt web page, wherein the purchase transactionidentification string is used as proof of a purchase transactionorigination.
 56. The system of claim 40, wherein the at least oneresponse is filtered using criteria selected from a group consisting ofrelative item pricing, preferences of the at least one user, personalinformation on the at least one user, sort criteria of the at least oneuser, past purchasing decisions of the at least one user, and pastpurchasing decisions of at least one aggregate group of users.
 57. Thesystem of claim 40, wherein at least one travel-special inventory ismaintained for the at least one supplier, wherein the at least onetravel-special inventory is a current inventory of special deals ontravel.
 58. The system of claim 40, wherein the status informationcomprises a total number of travel suppliers to which the at least onequery is transferred, a total number of travel supplier responsesreceived, a total number of data items found, a total number of dataitems processed, and a total number of data items presented to the atleast one user.
 59. The system of claim 40, wherein the at least oneuser is presented with at least one electronic link corresponding toeach item of the at least one result list, wherein the at least oneelectronic link directs the at least one client computer to at least onepage of the corresponding supplier web site from which the item can bepurchased.
 60. A computer readable medium containing executableinstructions which, when executed in a processing system, provides adynamic information connection engine comprising: detecting at least oneuser action on at least one client computer and, in response,determining at least one user is searching for supported information;extracting query information from the at least one user action, whereinthe query information includes at least one category of the supportedinformation; automatically selecting at least one supplier of thesupported information using at least one server in response to the queryinformation; transferring at least one query including the queryinformation among the selected at least one supplier via at least onenetwork; and generating at least one result list in response to at leastone query response, wherein the at least one result list includesresponse information generated from the at least one query response andquery status information.
 61. An electromagnetic medium containingexecutable instructions which, when executed in a processing system,provides a dynamic information connection engine comprising: detectingat least one user action on at least one client computer and, inresponse, determining at least one user is searching for supportedinformation; extracting query information from the at least one useraction, wherein the query information includes at least one category ofthe supported information; automatically selecting at least one supplierof the supported information using at least one server in response tothe query information; transferring at least one query including thequery information among the selected at least one supplier via at leastone network; and generating at least one result list in response to atleast one query response, wherein the at least one result list includesresponse information generated from the at least one query response andquery status information.
 62. A method for locating and schedulingtravel itinerary components in real time, comprising: detecting at leastone user action on at least one client computer and, in response,determining at least one user is searching for travel information;extracting at least one itinerary component from the at least one useraction; automatically selecting at least one supplier of the at leastone itinerary component using at least one server; transferring at leastone query among the selected at least one supplier via at least onenetwork, wherein the at least one query is a request for purchaseinformation on the at least one itinerary component; presenting the atleast one user with at least one result list in response to at least onequery response, wherein the at least one result list includes thepurchase information, at least one electronic link to the at least onesupplier, and query status information; and facilitating at least onepurchase transaction comprising the at least one user purchasing atleast one itinerary component chosen from the at least one result list.