Determining repeat website users via browser uniqueness tracking

ABSTRACT

An approach for determining repeat website users via browser uniqueness tracking includes receiving browser information from a server based on a browser accessing a website. The approach includes creating a browser identifier based on the browser information. The approach includes determining the browser is one of a new visitor and a repeat visitor to the website by comparing the browser identifier to other browser identifiers associated with the website. The approach includes transmitting a message to the server indicating the browser is one of a new visitor and a repeat visitor to the website based on the determining.

TECHNICAL FIELD

The present invention generally relates to managing website access and,more particularly, to methods and systems for determining repeat websiteusers via browser uniqueness tracking.

BACKGROUND

Internet websites routinely permit users to register with the websitefor a variety of reasons, such as email services, auction events, onlinepolling, and gaming. With the advent of so many services being providedvia the Internet, some users are employing computer programs (e.g.,bots, netbots, etc.) to automatically register plural times at a singlewebsite in order to commercially exploit and/or abuse the services. Forexample, software may be used to automatically register for thousands offree email accounts, which may be subsequently used in sending spamemail. As another example, software may be used to automaticallyregister at websites in order to post comments into blogs for thepurpose of inserting keywords into the website to artificially raisesearch engine rankings. As an even further example, software may be usedto automatically register over and over again at a website to submitthousands of votes in an online poll. Such automated, software-basedregistration is typically used for commercial promotion and/or otherpurposes, and often degrades the quality of service for legitimateusers.

A number of tools have been developed to combat automated registrationto avoid such abuse. The tools typically involve a challenge that iseasily answered by a human user but difficult for a computer to answer.One such tool is to ask random questions that must be answered to obtainaccess to the website. Another tool is referred to as a CAPTCHA(Completely Automated Public Turing test to tell Computers and HumansApart), which is a type of challenge-response test used in computing asan attempt to ensure that the response is generated by a person. TheCAPTCHA process usually involves one computer (a server) asking a userto complete a simple test which the computer is able to generate andgrade. Because other computers are assumed to be unable to solve theCAPTCHA, any user entering a correct solution is presumed to be human. Acommon type of CAPTCHA requires the user to type letters or digits froma distorted image that appears on the screen.

Tools such as CAPTCHA have slowed but not eliminated unwanted automatedregistration. This is because methods have been devised forcircumventing CAPTCHA-like tools. For example, software programs havebeen developed that can recognize and answer the earliest types ofCAPTCHA tests using, for example, computer-based segmentation andoptical character recognition techniques. Also, some CAPTCHAimplementations use only a small fixed pool of CAPTCHA images, andstoring matched sets of query and solution can be used to bypass thetool for small sets of queries. Lastly, low cost human operators can beused to answer plural website registration challenges on a massivescale.

Current technology thus does not adequately prevent or limit bots andhumans from repetitive registrations on a website. Although CAPTCHA,random question, and other tools slow automated registration, thesetools do not eliminate automated registration and do not detectfraudulent (e.g., plural) registrations by a single user.

SUMMARY

In a first aspect of the invention, a method implemented in a computerinfrastructure includes receiving browser information from a serverbased on a browser accessing a website. The method also includescreating a browser identifier based on the browser information. Themethod also includes determining the browser is one of a new visitor anda repeat visitor to the website by comparing the browser identifier toother browser identifiers associated with the website. The method alsoincludes transmitting a message to the server indicating the browser isone of a new visitor and a repeat visitor to the website based on thedetermining.

In another aspect of the invention, there is a system implemented inhardware and comprising a processor executing a browser tag tool thatoperates to receive browser information from a website server based on abrowser accessing a website hosted by the website server. The browsertag tool also operates to create a browser tag using values contained inthe browser information. The browser tag tool also operates to determinethe browser is one of a new visitor and a repeat visitor to the websiteby comparing the browser tag to other browser tags associated with thewebsite. The browser tag tool also operates to transmit a message to thewebsite server indicating the browser is one of a new visitor and arepeat visitor to the website based on the determining.

In an additional aspect of the invention, there is a computer programproduct comprising a computer usable tangible storage medium havingreadable program code embodied in the tangible storage medium. Thecomputer program product includes at least one component operable to:receive a request from a browser to register at a website; obtainbrowser information from the browser in association with the request;forward the browser information to a browser tag tool; and receive anindication from the browser tag tool that one of: the browser haspreviously registered with the website, and the browser has notpreviously registered with the website.

In a further aspect of the invention, there is a computer system fordetermining repeat user visits to a website. The system comprises a CPU,a computer readable memory and a computer readable storage media.Additionally, the system comprises first program instructions to receivea request from a browser to register at a website, wherein the websiteoffers a service comprising at least one of: email, voting, auctioning,and gaming; second program instructions to obtain browser informationfrom the browser in association with the request; third programinstructions to forward the browser information to a browser tag tool;fourth program instructions to receive an indication from the browsertag tool that the browser has previously registered with the website,wherein the indication is based on a browser tag that is based on thebrowser information; fifth program instructions to receive the browsertag from the browser tag tool; sixth program instructions to grant thebrowser access to the service; and seventh program instructions to storea record comprising: an action taken by the browser during using theservice, the browser tag, and a time the action was taken. The first,second, third, fourth, fifth, sixth, and seventh program instructionsare stored on the computer readable storage media for execution by theCPU via the computer readable memory.

In another aspect of the invention, there is a method of deploying asystem for determining repeat user visits to a website. The methodincludes providing a computer infrastructure operable to: receive arequest from a browser to register at a website; obtain browserinformation from the browser in association with the request; create abrowser tag using values contained in the browser information; determinethe browser is one of a new visitor and a repeat visitor to the websiteby comparing the browser tag to other browser tags associated with thewebsite; store the browser tag with the other browser tags associatedwith the website; and maintain a record of the browser tag and actionsperformed by the browser at the website. The receiving, the obtaining,and the maintaining are performed by a website server hosting thewebsite. The creating, the determining, and the storing are performed bya browser tag tool. The website server and the browser tag tool are oneof: comprised in a same computing device, and comprised in separatecomputing devices that communicate with one another.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The present invention is described in the detailed description whichfollows, in reference to the noted plurality of drawings by way ofnon-limiting examples of exemplary embodiments of the present invention.

FIG. 1 shows an illustrative environment for implementing the steps inaccordance with aspects of the invention;

FIGS. 2-5 show exemplary data structures in accordance with aspects ofthe invention;

FIG. 6 shows an exemplary browser identifier in accordance with aspectsof the invention; and

FIG. 7 shows an exemplary block diagram in accordance with aspects ofthe invention.

DETAILED DESCRIPTION

The present invention generally relates to managing website access and,more particularly, to methods and systems for determining repeat websiteusers via browser uniqueness tracking. Methods and systems in accordancewith aspects of the invention provide a tool for generating and storinga unique browser identifier of a web browser when the browser is usedfor registering at a website. The browser identifier may be employed todetermine when a same browser is being used to register multiple timesat a website. In embodiments, the browser identifier comprises a tagcontaining information that is obtained from a browser when the browservisits a website. The information may include, for example, browser typeand version, cookies preferences, connection details, fonts, etc., whichis available to a website server when a browser accesses a websitehosted by the server. In this manner, implementations of the inventionadvantageously may be used to detect plural registrations at a websitefor the purpose of taking action upon such detection.

System Environment

As will be appreciated by one skilled in the art, aspects of the presentinvention may be embodied as a system, method or computer programproduct. Accordingly, aspects of the present invention may take the formof an entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.) or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as a “circuit,” “module” or “system.”Furthermore, aspects of the present invention may take the form of acomputer program product embodied in one or more computer readablemedium(s) having computer readable program code embodied thereon.

Any combination of one or more computer readable medium(s) may beutilized. The computer readable medium may be a computer readable signalmedium or a computer readable storage medium. A computer readablestorage medium may be, for example, but not limited to, an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system,apparatus, or device, or any suitable combination of the foregoing. Morespecific examples (a non-exhaustive list) of the computer readablestorage medium would include the following: an electrical connectionhaving one or more wires, a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), an optical fiber,a portable compact disc read-only memory (CD-ROM), an optical storagedevice, a magnetic storage device, or any suitable combination of theforegoing. In the context of this document, a computer readable storagemedium may be any tangible medium that can contain, or store a programfor use by or in connection with an instruction execution system,apparatus, or device.

A computer readable signal medium may include a propagated data signalwith computer readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof. Acomputer readable signal medium may be any computer readable medium thatis not a computer readable storage medium and that can communicate,propagate, or transport a program for use by or in connection with aninstruction execution system, apparatus, or device.

Program code embodied on a computer readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber cable, RF, etc., or any suitable combination ofthe foregoing.

Computer program code for carrying out operations for aspects of thepresent invention may be written in any combination of one or moreprogramming languages, including an object oriented programming languagesuch as Java, Smalltalk, C++ or the like and conventional proceduralprogramming languages, such as the “C” programming language or similarprogramming languages. The program code may execute entirely on theuser's computer, partly on the user's computer, as a stand-alonesoftware package, partly on the user's computer and partly on a remotecomputer or entirely on the remote computer or server. In the latterscenario, the remote computer may be connected to the user's computerthrough any type of network, including a local area network (LAN) or awide area network (WAN), or the connection may be made to an externalcomputer (for example, through the Internet using an Internet ServiceProvider).

Aspects of the present invention are described below with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems) and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a machine, such that the instructions, which execute via theprocessor of the computer or other programmable data processingapparatus, create means for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in a computerreadable medium that can direct a computer, other programmable dataprocessing apparatus, or other devices to function in a particularmanner, such that the instructions stored in the computer readablemedium produce an article of manufacture including instructions whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer,other programmable data processing apparatus, or other devices to causea series of operational steps to be performed on the computer, otherprogrammable apparatus or other devices to produce a computerimplemented process such that the instructions which execute on thecomputer or other programmable apparatus provide processes forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks.

FIG. 1 shows an illustrative environment 10 for managing the processesin accordance with the invention. To this extent, the environment 10includes a server or other computer infrastructure 12 that can performthe processes described herein. In particular, the computerinfrastructure 12 includes a computing device 14. The computing device14 can be resident on a network infrastructure or computing device of athird party service provider (any of which is generally represented inFIG. 1).

The computing device 14 also includes a processor 20, memory 22A, an I/Ointerface 24, and a bus 26. The memory 22A can include local memoryemployed during actual execution of program code, bulk storage, andcache memories which provide temporary storage of at least some programcode in order to reduce the number of times code must be retrieved frombulk storage during execution. In addition, the computing deviceincludes random access memory (RAM), a read-only memory (ROM), and anoperating system (O/S). The memory (e.g., 22A) may store businessintelligence, data mining, regression analysis and/or modeling andsimulation tools for execution by the processor 20.

The computing device 14 is in communication with the external I/Odevice/resource 28 and the storage system 22B. For example, the I/Odevice 28 can comprise any device that enables an individual to interactwith the computing device 14 (e.g., user interface) or any device thatenables the computing device 14 to communicate with one or more othercomputing devices using any type of communications link. The externalI/O device/resource 28 may be for example, a handheld device, PDA,handset, keyboard etc.

In general, the processor 20 executes computer program code (e.g.,program control 44), which can be stored in the memory 22A and/orstorage system 22B. Moreover, in accordance with aspects of theinvention, the program control 44 controls a browser tag tool 60 thatperforms, e.g., the processes described herein. The browser tag tool 60can be implemented as one or more program code in the program control 44stored in memory 22A as separate or combined modules. Additionally, thebrowser tag tool 60 may be implemented as separate dedicated processorsor a single or several processors to provide the function of thesetools. While executing the computer program code, the processor 20 canread and/or write data to/from memory 22A, storage system 22B, and/orI/O interface 24. The program code executes the processes of theinvention. The bus 26 provides a communications link between each of thecomponents in the computing device 14.

In accordance with aspects of the invention, the browser tag tool 60 isoperatively connected to and in communication with a website server 70.The website server 70 may host a website that is accessible by acomputing device 80 comprising a browser 90. The browser 90 may be anysuitable web browser, such as a software application for retrieving,presenting, and traversing information resources on the World Wide Web.The computing device 80 may be any suitable computing device capable ofexecuting the browser 90, including but not limited to a personalcomputer, workstation, laptop computer, personal digital assistant,tablet computer, notebook computer, netbook computer, smartphone, etc.In embodiments, the browser tag tool 60 is configured to perform one ormore of the processes described herein including, but not limited to:receive browser information from the website server 70, create a browsertag for the browser 90 using the browser information, compare thebrowser tag to stored browser tags, save the browser tag, andcommunicate results of the comparison to the website server 70. In thismanner, the browser tag tool 60 may be used to detect when a samebrowser is being used to attempt plural registrations at a website.

In accordance with aspects of the invention, the browser tag tool 60 andthe website server 70 may be associated with a single computing deviceor different computing devices. For example, the browser tag tool 60 maybe a software program running on a first computing device 14, and thewebsite server 70 may be a second computing device that is separate frombut in communication with the first computing device 14. Alternatively,the website server 70 may comprise or be comprised in the same computingdevice 14 as the browser tag tool 60.

The computing device 14 can comprise any general purpose computingarticle of manufacture capable of executing computer program codeinstalled thereon (e.g., a personal computer, server, etc.). However, itis understood that the computing device 14 is only representative ofvarious possible equivalent-computing devices that may perform theprocesses described herein. To this extent, in embodiments, thefunctionality provided by the computing device 14 can be implemented bya computing article of manufacture that includes any combination ofgeneral and/or specific purpose hardware and/or computer program code.In each embodiment, the program code and hardware can be created usingstandard programming and engineering techniques, respectively.

Similarly, the computer infrastructure 12 is only illustrative ofvarious types of computer infrastructures for implementing theinvention. For example, in embodiments, the computer infrastructure 12comprises two or more computing devices (e.g., a server cluster) thatcommunicate over any type of communications link, such as a network, ashared memory, or the like, to perform the process described herein.Further, while performing the processes described herein, one or morecomputing devices on the computer infrastructure 12 can communicate withone or more other computing devices external to the computerinfrastructure 12 using any type of communications link. Thecommunications link can comprise any combination of wired and/orwireless links; any combination of one or more types of networks (e.g.,the Internet, a wide area network, a local area network, a virtualprivate network, etc.); and/or utilize any combination of transmissiontechniques and protocols.

FIG. 2 shows an example of browser information 100 that may be obtainedby a website server (e.g., website server 70) from a browser (e.g.,browser 90) when the browser accesses a website hosted by the websiteserver. Browser information may be obtained by the website server usingconventional methodologies that access and analyze information stored oncomputing device (e.g., computing device 80) associated with the browserwhen the browser accesses the website, e.g., via an Internet connection.

As depicted in FIG. 2, the browser information 100 may includecategories of information relating to, for example, System, Browser Typeand Version, Cookies, Security, Connection, Display and Layout, Plugins,Scripting, Java® (Java is a registered trademark of Oracle America,Inc.), Wireless Devices, Locale, etc. Other categories are alsocontemplated by the present invention. Each category may include one ormore parameters. For example, in the browser information shown in FIG.2, the “System” category includes four parameters (e.g., Platform,Operating System, Win16, and WinInstallerMinVer), and the “Browser Typeand Version” category includes five parameters (e.g., Browser type,Browser version, ServicePack, Build, and Crawler). Each parameter may,in turn, have a value selected from one or more possible values. Forexample, in the browser information shown in FIG. 2, the OperatingSystem parameter has the value “OS.type.7” and the Browser typeparameter has the value “browser.type.m”.

FIGS. 3-5 show data structures in accordance with aspects of theinvention, which comprise exemplary values for particular parameters ofthe browser information from FIG. 2. More specifically, FIG. 3 showstwelve possible values for the Operating System parameter, which maycorrespond to twelve different types of operating systems that may berunning on the computing device associated with the browser (e.g.,computing device 80). FIG. 4 shows sixteen possible values for theBrowser type parameter, which may correspond to sixteen different typesof browsers (e.g., browser 90). Similarly, FIG. 5 shows two possiblevalues for the Session cookie parameter. Other categories are alsocontemplated by the present invention.

In accordance with aspects of the invention, each value in a list ofpossible values of a parameter is associated with a code. The code maybe numeric, alphabetical, alpha-numeric, or any other suitable code. Forexample, codes 00, 01, 02, . . . , 12 are associated with the twelvevalues of the Operating System parameter shown in FIG. 3, with referencenumber 155 representing the code “07” that is associated with the value“OS.type.7”. Similarly, codes 00, 01, 02, . . . , 16 are associated withthe sixteen values of the Browser type parameter shown in FIG. 4, withreference number 156 representing the code “13” that is associated withthe value “browser.type.m”. In a similar manner, codes 00 and 01 areassociated with the two values of the Session cookie parameter shown inFIG. 5, with reference number 157 representing the code “01” that isassociated with the value “Enabled”.

In accordance with aspects of the invention, the browser tag tool (e.g.,browser tag tool 60) stores data structures, such as those shown inFIGS. 3-5, that define the possible values and associated codes for eachparameter included in the browser information 100. In embodiments, thebrowser tag tool receives the browser information from the websiteserver, uses the data structures to look up the code associated witheach value contained in the browser information, and creates a browsertag (e.g., a unique identifier) using the looked-up codes. The browsertag may be used as an identifier for the browser (e.g., browser 90)useful in determining whether the browser has previously visited thewebsite. In this manner, the browser tag may be regarded as a uniquesignature or fingerprint of a particular browser.

The looked-up codes (e.g., the codes corresponding to the valuescontained in the browser information) may be combined, modified, and/oroperated on in any suitable manner to create the browser tag. Forexample, in one embodiment depicted in FIG. 6, the looked-up codes 155,156, and 157 are concatenated to form the browser tag “071301”. However,the present invention is not limited to this single example of browsertag creation, and other more complex techniques (such as applying a hashfunction) may be used within the scope of the invention to create abrowser tag from the browser information.

Any desired number of parameters/values of browser information may beused to create a browser tag in accordance with aspects of theinvention. For example, the browser information 100 shown in FIG. 2contains seventy-six values corresponding to seventy-six parameters, anda browser tag may be created from any combination of two or more valuesof these seventy-six parameters. The browser tag depicted in FIG. 6, forexample, is created from three values of the seventy-six parameters.

In embodiments, each individual website server (e.g., website server 70)designates which parameters to use in creating a browser tag. In thismanner, each individual website administrator has the ability tocustomize its level of uniqueness of browser tags, since using a greaternumber of parameters in creating browser tags provides more uniquebrowser tags, e.g., compared to using a lesser number of parameters increating the browser tags which provides less unique browser tags.

In further embodiments, a website server may change the parameters usedin creating a browser tag for a website after a period of time. Forexample, a website server may designate that a first set of parametersare used for browser tag creation for a first time period. Then, at alater date, the website server may designate that a different second setof browser parameters are used for browser tag creation. This strategymay be used to defend against hackers who might have determined how tocircumvent browser tags based on a given set of parameters.

Moreover, parameters other than those described herein may be usedwithin the scope of the invention. For example, the browser informationfor a particular browser (e.g., browser 90) may contain more or lessthan seventy-six parameters as shown in FIG. 2. Additionally oralternatively, the browser information for a particular browser maycontain different specific parameters and/or different categories ofparameters than those shown in FIG. 2. Accordingly, the browser tag toolmay store a large number (e.g., hundreds) of data structures, such asthose shown in FIGS. 3-5, corresponding to an expected total number ofpossible parameters.

Additionally, values other than those described herein may be usedwithin the scope of the invention. For example, the browser informationmay contain more or less than the twelve values of the Operating Systemparameter shown in FIG. 3. Additionally or alternatively, the browserinformation may contain different values than those shown in FIG. 3,e.g., corresponding to different types of operating systems not includedin FIG. 3.

In embodiments, the browser tag tool (e.g., browser tag tool 60)populates and maintains the values and codes in data structures, such aslook-up tables shown in FIGS. 3-5, stored in data storage (e.g., memory22A and/or storage system 22B). Each data structure corresponding to abrowser parameter may comprise data defining possible values for thatparameter and respective codes associated with the possible values. Thedata structures may be pre-defined in data stored by the browser tagtool. Additionally or alternatively, the browser tag tool mayperiodically poll trusted sources (e.g., service providers) forobtaining updates (e.g., at least one of changes, omissions, oradditions) to the values in each data structure. Similarly, the browsertag tool may add new data structures (e.g., corresponding to new browserparameters) including new possible values based such polling of trustedsources.

In embodiments, the browser tag tool does not add new values and/orparameters upon receipt of such new values and/or parameters as part ofbrowser information from a website server. This is because a spambrowser or spam server could add illegitimate values and/or parametersto the browser information in an attempt to obtain a unique browser tag.Accordingly, in embodiments, only known values and parameters fromtrusted sources are used in creating the browser tags.

In accordance with aspects of the invention, browser tags that arecreated by the browser tag tool are stored in persistent data storage,such as storage system 22B of FIG. 1. A single browser tag tool may beused with a plurality of websites, in which case the browser tag toolsaves each browser tag in association with a particular one of theplurality of websites. In this manner, when a new browser tag is created(e.g., for a browser currently attempting to register at a particularwebsite), the browser tag tool compares the new browser tag to a storedlist of existing browser tags for this particular website to determinewhether the browser currently registering with the website haspreviously registered with the website (e.g., whether the browser is anew visitor or a repeat visitor at the website). When the new browsertag matches a browser tag that already exists for this website, it isconcluded that the browser currently attempting to register at the website has been used to register at this website in the past. On the otherhand, when the new browser tag does not match a browser tag that alreadyexists for this website, it is concluded that the browser currentlyattempting to register at the website has not registered at this websitein the past. In this manner, the browser tag tool may be used to detectwhen a particular browser attempts plural registrations at a particularwebsite.

According to further aspects of the invention, the browser tag tooldeletes a browser tag from the persistent data storage after the browsertag has been saved for a predetermined amount of time. There are afinite number of unique tags that can be created for any combination ofparameters and values of browser information. Periodically deletingolder browser tags reduces the possibility of detecting identicalbrowser tags for two different legitimate users for a same website.

Flow Diagrams

FIG. 7 shows an exemplary flow diagram for performing aspects of thepresent invention. The steps of FIG. 7 may be implemented in theenvironment of FIG. 1 and using the techniques described with respect toFIGS. 2-6, for example.

The flowcharts, block diagrams, and/or swim lane diagrams shown anddescribed herein illustrate the architecture, functionality, andoperation of possible implementations of systems, methods and computerprogram products according to various embodiments of the presentinvention. In this regard, each block in the flowchart or block diagramsmay represent a module, segment, or portion of code, which comprises oneor more executable instructions for implementing the specified logicalfunction(s). It should also be noted that, in some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts, or combinations of special purpose hardware andcomputer instructions.

Furthermore, the invention can take the form of a computer programproduct accessible from a computer-usable or computer-readable mediumproviding program code for use by or in connection with a computer orany instruction execution system. The software and/or computer programproduct can be implemented in the environment of FIG. 1. For thepurposes of this description, a computer-usable or computer readablemedium can be any apparatus that can contain, store, communicate,propagate, or transport the program for use by or in connection with theinstruction execution system, apparatus, or device. The medium can be anelectronic, magnetic, optical, electromagnetic, infrared, orsemiconductor system (or apparatus or device) or a propagation medium.Examples of a computer-readable storage medium include a semiconductoror solid state memory, magnetic tape, a removable computer diskette, arandom access memory (RAM), a read-only memory (ROM), a rigid magneticdisk and an optical disk. Current examples of optical disks includecompact disk—read only memory (CD-ROM), compact disc—read/write (CD-R/W)and DVD.

FIG. 7 depicts an exemplary swim lane diagram for a process of browseridentification in accordance with aspects of the invention. The swimlane diagram includes three actors: lane 705 represents functionsperformed at/by the browser (e.g., browser 90), lane 710 representsfunctions performed at/by the website server (e.g., website server 70),and lane 715 represents functions performed at/by the browser tag tool(e.g., browser tag tool 60). At step 720, a user employs a browser(e.g., browser 90) to submit a request at a website. The request may be,for example, an attempted registration at the website for email,polling, gaming, etc. Step 720 may comprise, for example, the useraccessing the website, entering information requested by the websiteusing an I/O device, and pressing or clicking a submit or enter button.The requested information may comprise any desired information asdefined by the website, including but not limited to: name, username,password, mailing address, email address, telephone number, CAPTCHAresponse, etc.

At step 725, the browser processes the request. This may comprise thebrowser formatting the request as data and transmitting the data to thewebsite server (e.g., website server 70). Step 725 may also comprise thebrowser transmitting the browser information (e.g., similar to browserinformation 100) to the website server.

At step 730, the website server determines whether the request is valid.For example, the website server determines whether the user correctlyprovided all of the requested information at step 720, e.g., in aconventional manner. As but one example, the website server maydetermine validity by determining whether the user filled out all of therequired fields of the requested information. As another example, if therequested information includes a CAPTCHA response, step 730 may comprisedetermining whether the user correctly answered the CAPTCHA, which maybe performed in a conventional manner.

When the website server determines at step 730 that the request isinvalid (e.g., the user did not correctly provide all of the requestedinformation), then at step 735 the website server processes the invalidrequest in a conventional manner. This may comprise, for example, thewebsite server sending a failure message to the browser and denying thebrowser access to the requested service and/or website.

On the other hand, when the website server determines at step 730 thatthe request is valid (e.g., the user correctly provided all of therequested information), then at step 740 the website server communicatesthe browser information to the browser tag tool. This may comprise, forexample, the website server calling a computing device (e.g., computingdevice 14) running the browser tag tool and transmitting the browserinformation to the computing device. Step 740 may also comprise thewebsite server transmitting data to the browser tag tool indicatingwhich parameters/values of the browser information are to be used increating the browser tag, either by sending only those parameters/valuesto the browser tag tool or by sending all of the browser information anda list of the parameters to be used. In this manner, the website serverdictates which parameters to use in creating browser tags for aparticular website.

At step 745, the browser tag tool (e.g., browser tag tool 60) creates abrowser tag based on the browser information. In embodiments, this isperformed in a manner similar to that described with respect to FIGS.2-6. For example, the browser tag tool receives the browser informationincluding parameters and values of parameters. The browser tag tool maythen compare the parameters and values of parameters to stored datastructures to determine (e.g., look up) a code associated with eachvalue. The browser tag tool may then create a browser tag based on thedetermined codes, e.g., by concatenating the codes, to form the browsertag for this particular browser for this particular website.

At step 750, the browser tag tool compares the new browser tag from step745 to other browser tags for this website. In embodiments, the otherbrowser tags are stored in a persistent data store, and the browser tagtool accesses the data store and compares the new browser tag to theexisting browser tags. The comparing may be performed using conventionaldata comparison techniques, such as a diff process, etc.

When the browser tag does not already exist, e.g., the new browser tagis not the same as a stored browser tag for this website, the processproceeds to step 755. At step 755, the browser tag tool saves the newbrowser tag in the persistent data storage for this website. In thismanner, the browser tag from step 745 may be used in future comparisonsto other browser tags during subsequent requests to access this website.

At step 760, the browser tag tool informs the website server that thebrowser is a new browser (e.g., new visitor or new user) for thiswebsite, i.e., the browser is not a repeat user. This may comprise thebrowser tag tool transmitting appropriate data, including the browsertag, to the website server.

At step 765, the website server processes the request in any desiredmanner suitable for new users. For example, step 765 may comprise thewebsite server generating and transmitting a response to the browserthat the request to access the website is successful.

Step 765 may also comprise, for example, the website server granting thebrowser access to one or more services provided by the website, such asemail, polling, gaming, etc.

At step 770, the browser processes the response from the website server.This may include, for example, at step 773, displaying a responsemessage to the user that the request for access to the website has beengranted.

Referring back to step 750, when the browser tag tool determines thatthe new browser tag created at step 745 already exists, e.g., the newbrowser tag is the same as a stored browser tag for this website, thenat step 775 the browser tag tool transmits to the website server anindication that this is a repeat user (e.g., repeat visitor) for thiswebsite. This may comprise the browser tag tool transmitting appropriatedata, including the browser tag, to the website server.

At step 780, the website server processes the indication of a repeatuser according to the business rules of the website. For example, thewebsite server may deny the browser access to the requested websiteand/or services provided by the website.

Alternatively to denying the repeat user access, the website server maygrant the repeat user access to the requested website and/or service andmaintain a record of the repeated access by this browser. The record maycomprise stored data associated with the browser tag indicating thatactions taken at the website using this browser are potentiallyfraudulent. This record may be used at a later time and in conjunctionwith other data, such date and time of registering with the website, todetermine how frequently the browser is registering with the websiteand/or how frequently the browser is utilizing the services provided bythe website.

For example, in a polling (e.g., online voting) website embodiment, thewebsite server may permit the user of the browser to vote in the polleven after determining that this is a repeat user. In such a pollingembodiment, the website server may save a browser tag with each votecast without taking any action in real time, e.g., during voting, todeal with repeat users. At a later time, the website server may analyzethe votes and associated browser tags, and any other information such asa date and time saved with each vote, to determine whether a particularbrowser violated the rules of the voting, e.g., voted more than apredefined number of times within a specified time period. In thismanner, the website server may avoid expending resources unnecessarily,and has the option of analyzing votes and associated browser tags in apost processing action should the need arise.

Step 780 may further comprise the website server transmitting a responseto the browser regarding the browser's request to access the website.The response may be an indication that the browser is being deniedaccess based on being a repeat user. Alternatively, the response may bean indication that the browser is being granted access. Optionally, whenthe repeat user is granted access, the response from the website serverto the browser may include an indication that the website server isaware that this is a repeat visit by this browser.

Following step 780, the process proceeds to step 770 where the browserprocesses the response from the website server. This may include, forexample, at step 773, displaying a response message to the user that therequest for access to the website has been denied or granted.

As described herein, the browser tag may be used as an additional layerof website security, e.g., in addition to a CAPTCHA test.Implementations of the invention curtail human users from repeatedlyavailing themselves of services provided by websites, since a repeatuser would have to change their browser configuration each time theywanted to perform a subsequent registration. Implementations of theinvention non-human users, e.g., automated computer programs, fromrepeatedly availing themselves of services provided by websites bycreating the browser tag from known parameters from trusted sources, andoptionally by periodically changing the parameters used to create abrowser tag for a particular website.

Additionally, implementations of the invention have browser, platform,and operating system independence. For example, implementations of theinvention may be used with all types of browsers, platforms, andoperating systems provided that the browser information has standardparameters used in creating the browser tag.

In embodiments, a service provider, such as a Solution Integrator, couldoffer to perform the processes described herein. In this case, theservice provider can create, maintain, deploy, support, etc., thecomputer infrastructure that performs the process steps of the inventionfor one or more customers. These customers may be, for example, anybusiness that uses technology. In return, the service provider canreceive payment from the customer(s) under a subscription and/or feeagreement and/or the service provider can receive payment from the saleof advertising content to one or more third parties.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, elements,components, and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims, if applicable, areintended to include any structure, material, or act for performing thefunction in combination with other claimed elements as specificallyclaimed. Moreover, while the invention has been described in terms ofembodiments, those of ordinary skill in the art will recognize that theinvention can be practiced with modifications and in the spirit andscope of the appended claims.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the describedembodiments. The terminology used herein was chosen to best explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers of ordinary skill in the art to understand the embodimentsdisclosed herein

What is claimed is:
 1. A method implemented in a computerinfrastructure, comprising: receiving browser information from a serverbased on a browser accessing a website; creating a browser identifierbased on the browser information; determining the browser is one of anew visitor and a repeat visitor to the website by comparing the browseridentifier to other browser identifiers associated with the website; andtransmitting a message to the server indicating the browser is one of anew visitor and a repeat visitor to the website based on thedetermining.
 2. The method of claim 1, wherein the browser informationcomprises: a plurality of parameters; and a respective value for eachone of the plurality of parameters.
 3. The method of claim 2, whereinthe creating comprises accessing a plurality of data structures, eachone of the plurality of data structures corresponding to a respectiveone of the plurality of parameters.
 4. The method of claim 3, whereineach respective one of the plurality of data structures comprises: aplurality of possible values associated with the correspondingrespective one of the plurality of parameters; and a plurality of codesassociated with the plurality of possible values.
 5. The method of claim4, wherein the creating comprises: using the plurality of datastructures to determine a particular code from the plurality of codesfor each respective value for each one of the plurality of parameters;and combining the determined particular codes into the browseridentifier.
 6. The method of claim 5, wherein the combining thedetermined particular codes comprises concatenating the determinedparticular codes.
 7. The method of claim 1, wherein the transmittingcomprises transmitting the browser identifier to the server.
 8. Themethod of claim 1, wherein the server comprises a website server thathosts the website.
 9. The method of claim 8, wherein the website offersa service comprising at least one of: email, voting, auctioning, andgaming.
 10. The method of claim 9, wherein the receiving is based on thebrowser registering at the website to gain access to the service. 11.The method of claim 1, wherein the receiving browser informationcomprises receiving an indication of a subset of parameters of thebrowser information.
 12. The method of claim 11, wherein the creatingthe browser identifier comprises using values associated with the subsetof parameters of the browser information.
 13. The method of claim 1,further comprising storing the browser identifier with the other browseridentifiers associated with the website.
 14. The method of claim 1,wherein a service provider at least one of creates, maintains, deploysand supports the computer infrastructure.
 15. The method of claim 1,wherein steps of claim 1 are provided by a service provider on asubscription, advertising, and/or fee basis.
 16. A system implemented inhardware, comprising: a processor executing a browser tag tool thatoperates to: receive browser information from a website server based ona browser accessing a website hosted by the website server; create abrowser tag using values contained in the browser information; determinethe browser is one of a new visitor and a repeat visitor to the websiteby comparing the browser tag to other browser tags associated with thewebsite; and transmit a message to the website server indicating thebrowser is one of a new visitor and a repeat visitor to the websitebased on the determining.
 17. The system of claim 16, wherein thecreating the browser tag comprises: looking up respective codescorresponding to the values contained in the browser information; andcombining the respective codes into a string of characters to form thebrowser tag.
 18. The system of claim 16, further comprising:transmitting the browser tag to the website server; and saving thebrowser tag with the other browser tags in persistent storage.
 19. Acomputer program product comprising a computer usable tangible storagemedium having readable program code embodied in the tangible storagemedium, the computer program product includes at least one componentoperable to: receive a request from a browser to register at a website;obtain browser information from the browser in association with therequest; forward the browser information to a browser tag tool; andreceive an indication from the browser tag tool that one of: the browserhas previously registered with the website, and the browser has notpreviously registered with the website.
 20. The computer program productof claim 19, wherein the indication is based on a browser tag that isbased on the browser information.
 21. The computer program product ofclaim 19, wherein the receiving the indication comprises receiving anindication that the browser has previously registered with the website,and the at least one component is further operable to deny theregistration to the website based on the indication that the browser haspreviously registered with the website.
 22. The computer program productof claim 19, wherein the receiving the indication comprises receiving anindication that the browser has previously registered with the website,and the at least one component is further operable to: grant theregistration to the website; and maintain a record of the indicationthat the browser has previously registered with the website.
 23. Thecomputer program product of claim 19, wherein: the indication is basedon a browser tag that is based on the browser information; the websitecomprises an online vote; the receiving the indication comprisesreceiving an indication that the browser has previously registered withthe website; and the at least one component is further operable to:receive the browser tag form the browser tag tool; grant the browseraccess to the online vote; and store a record comprising: a vote made bythe browser in the online vote, the browser tag, and a time the vote wasmade.
 24. A computer system for determining repeat user visits to awebsite, the system comprising: a CPU, a computer readable memory, and acomputer readable storage media; first program instructions to receive arequest from a browser to register at a website, wherein the websiteoffers a service comprising at least one of: email, voting, auctioning,and gaming; second program instructions to obtain browser informationfrom the browser in association with the request; third programinstructions to forward the browser information to a browser tag tool;fourth program instructions to receive an indication from the browsertag tool that the browser has previously registered with the website,wherein the indication is based on a browser tag that is based on thebrowser information; fifth program instructions to receive the browsertag from the browser tag tool; sixth program instructions to grant thebrowser access to the service; and seventh program instructions to storea record comprising: an action taken by the browser during using theservice, the browser tag, and a time the action was taken; wherein thefirst, second, third, fourth, fifth, sixth, and seventh programinstructions are stored on the computer readable storage media forexecution by the CPU via the computer readable memory.
 25. A method ofdeploying a system for determining repeat user visits to a website,comprising: providing a computer infrastructure operable to: receive arequest from a browser to register at a website; obtain browserinformation from the browser in association with the request; create abrowser tag using values contained in the browser information; determinethe browser is one of a new visitor and a repeat visitor to the websiteby comparing the browser tag to other browser tags associated with thewebsite; store the browser tag with the other browser tags associatedwith the website; and maintain a record of the browser tag and actionsperformed by the browser at the website, wherein the receiving, theobtaining, and the maintaining are performed by a website server hostingthe website; the creating, the determining, and the storing areperformed by a browser tag tool; and the website server and the browsertag tool are one of: comprised in a same computing device, and comprisedin separate computing devices that communicate with one another.