Method and system for verifying websites and providing enhanced search engine services

ABSTRACT

The ownership or control of a website is verified. In one implementation this includes providing a verification identifier and determining whether the verification identifier appears in a first resource or a first location. Enhanced search engine services are provided after verifying ownership or control of the website. Examples of enhanced services includes providing analytics associated with the website; providing an electronic shopping cart or checkout mechanism associated with the website; providing a financial status indicator associated with the website; providing a custom search engine associated with the website; and providing a custom toolbar associated with the website.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 12/583,109, filed Aug. 14, 2009, which is a divisionalapplication of U.S. patent application Ser. No. 10/888,781, filed Jul.9, 2004, which issued Oct. 6, 2009, as U.S. Pat. No. 7,599,938, andwhich claimed the benefit of priority filing to U.S. Provisional PatentApplication No. 60/486,630, filed Jul. 11, 2003. Priority benefit of allof the above applications is claimed, and all of the above applicationsare hereby incorporated by reference in their entirety into the presentdisclosure.

A portion of the disclosure of this patent document contains materialwhich is subject to copyright protection. The copyright owner has noobjection to the facsimile reproduction by anyone of the patentdocuments or patent disclosure, as it appears in the patent trademarkoffice patent file or records, but otherwise reserves all rightswhatsoever.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH AND DEVELOPMENT

None.

REFERENCE TO SEQUENCE LISTING, A TABLE, OR A COMPUTER PROGRAM LISTINGAPPENDIX

None.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention relates to electronic informational and commercialtransactions and interactions, specifically, to facilitating suchtransactions and interactions through the use of computers and theInternet.

2. Description of Related Art

A. Related Art: The Need for a Universal Electronic Transaction System

Two of the most frequently used Internet and World Wide Web services are(I) electronic commerce services, particularly, the buying and sellingof goods and services wherein a portion of the transaction is conductedvia the World Wide Web, and (II) information search services,particularly, providing a customized list of websites and Web-accessibledocuments in response to an inquiry submitted by a user to a Web searchengine, whereby an index of Web pages is searched. While effectivetechnology for each of the aforementioned services exists, itsusefulness is severely limited by a number of technical factors asfollows.

B. Related Art: Internet Auction Systems

Under the related art, dynamically priced e-commerce transactions areoffered to Web users through the use of dynamically generated web pagesthat incorporate data drawn from the auctioneer's databases. Currentproviders of such services include eBay, Amazon, and Yahoo. Thisapproach is not ideal in that such “deep Web” data cannot be readilyindexed and catalogued by external search engine providers; thus,searching Internet auctions for a particular item requires that a uservisit each individual auction site and search through that givenwebsite's search interface or have an intermediary do so.

Moreover, auction site providers typically frown upon attempts to index,analyze, or otherwise make use of information in the auctioneer'sdatabases for purposes other than bidding, and these website providersmay use their control of the information therein to prevent competitionby other companies. Thus, obtaining accurate and complete market datapertaining to Internet auctions is more difficult than it would be in atransparent marketplace.

If an Internet user does not wish to list his or her auctions on a majorsite and pay the fees charged by the given Internet auctioneer, a usercan start his or her own auction site. This alternative is not ideal inthat it involves a great deal of time and expense and offers a lowchance of success: to launch a new Internet auction site, one mustpurchase (or write), install, run and maintain expensive auction sitesoftware on expensive computer hardware, incur all the other risks andexpenses associated with starting a business, and then come up with away to draw bidders and sellers away from the existing major companies'sites. Very few people are up to the task.

What is needed, therefore, is an Internet auction system and method thatallows (I) any person with a web page (II) to host an Internet auctionon that web page (III) without requiring this person to purchase anysoftware (IV) while yet allowing the person's auction to be searchablethrough any Web search engine and (V) also allowing data from all suchInternet auctions in the world to be easily and freely gathered,analyzed and disseminated by anyone who wishes to do so.

C. Related Art: Internet Search Systems and Methods

Web search engines under the related art allow users to input terms andoperators of their own choosing. Current providers of search enginesinclude Google, MSN, and Ask Jeeves. However, the search function itselfis still conducted according to the particular algorithmic approachestablished by the service provider. Such a “paternalistic” approachpresumes that computer engineers or business owners are better equippedto create a search algorithm than are the people doing the searching,e.g., users at large. These systems are not ideal in that such aone-size-fits-all service is unlikely to yield results that are betterthan—or even equal to—those that could be obtained through the use ofindividual algorithms that have been uniquely tailored to meet theindividual needs of a particular person with a particular search inquiryat a particular point in time.

What is needed, therefore, is a mechanism that allows Internet users toselect the search methodology used in a particular search term, tocombine the results of a search under one methodology with anothersearch under another methodology, to assign how much weight is allottedto each methodology, to set standards against which each indexed item(e.g., document or record) is measured, to set maximum levels ortolerances for variations from such standards, and to otherwise definethe way a search is performed rather than be reliant upon an a prioridefinition set by someone else.

D. Related Art: Internet Classified Ad Systems

Dynamically priced transaction vehicles (e.g., auctions) are not theonly type of Internet classified ad. Numerous websites devoted to agiven type of classified ad—personal ads, real estate ads, job listingads, vehicle ads, and others—have been developed to meet such demand.Current providers of such services include Craigslist, Zip Realty, andMatchmaker.com. Again, however, in order to allow user posting andediting of such classified ads, these sites also rely upondatabase-driven, dynamic web page generation. Thus, most of thelimitations described above in reference to Internet auctions apply tothese classified ad systems as well: indexing by third parties isdifficult and may cause legal battles with website providers who believethat user-provided content is their property; compilation and analysisof such data is difficult.

What is needed, therefore, is a new Internet classified ad system andmethod that allows all classified ads of a given type on the entireWorld Wide Web to be searchable through a single search engine withfield-by-field precision, that allows anyone with a web page toparticipate in this worldwide classified ad system without requiring anyspecial advertising or database software on the part of the participant,and for all the data in such classified ads to be accessible to anyonewith Web access for the purposes of information gathering and analysis.

E. Related Art: Internet Legal Vehicles

Under the related art, legal relationships between website providers andwebsite users are governed by individual terms of use agreements thatvary from website to website such that there are literally millions ofdifferent terms of use agreements in effect with respect to the millionsof different websites available at the time of this writing. Thisapproach is not ideal in that careful reading of each individualwebsite's terms of use agreement is prohibitively time-consuming for auser of multiple websites, and the duplicative legal work associatedwith the creation of each individual terms of use agreement is wasteful.Meanwhile, resolution of disputes arising under seemingly infinitevarieties of terms of use agreements leads to unpredictability in thecase law.

Uniform codes (e.g., Uniform Commercial Code or “UCC”) are known andhave been effective in reducing interjurisdictional uncertainty. Theseuniform codes suggest standards for lawmaking bodies, such as statelegislatures, to follow so that businesses operating in multiple statesdo not have to learn multiple legal systems. Unfortunately, theInternet, replete with millions of separately owned and operated privatewebsites, has no such uniformity. Each website is essentially its ownlittle fiefdom.

What is needed, therefore, is a system and method whereby uniformity interms of use agreements can be advanced so as to allow greaterefficiency and reliability for both website providers and website users.

Moreover, numerous contracts that are paper-based under the related artare extremely duplicative as well. Many common agreements, such aspurchase or rental agreements, contain large numbers of very similarterms which vary slightly from one agreement to another, which situationagain requires excessive legal review by the parties themselves as wellas third parties such as consumer advocacy groups and the courts, andagain thwarts predictability in the law. Meanwhile, millions of piecesof paper and millions of dollars are unnecessarily spent each year inthe creation, documentation, and storage of these terms in contractform.

What is needed, therefore, is a system and method whereby essentiallyduplicative portions of contracts can be standardized and recorded moreefficiently.

Even in situations where the law is well-settled, however, disputeresolution through the courts typically takes anywhere from severalmonths to several years, as backlogs continue to grow. Alternativedispute resolution methods, such as arbitration (e.g., AmericanArbitration Association), mediation, and religious courts such as theJewish Beis Din court system, are known and are preferred by manybusinesses, organizations, and individuals, since protracted legalbattles are expensive and time-consuming, and for many litigants theadage “justice delayed is justice denied” holds true. These alternativedispute resolution methods, however, are still only employed in afraction of cases, since arrangement for such proceedings is done on acase-by-case or contract-by-contract basis. Moreover, manyunsophisticated parties have little or no knowledge of the benefits andavailability of alternative dispute resolution methods.

What is needed, therefore, is a system and method whereby the benefitsof alternative dispute resolution may be made available to and morereadily accessed by a larger portion of the population.

F. Related Art: HTML, Order Forms, and Contact Forms

Under the related art, contacting the provider of a website through thewebsite itself relies upon a Web contact submission form (e.g., “<FORMACTION= . . . ”>) or purchase form. This approach is not ideal in that,since each website is designed completely differently from the next, aWeb visitor must learn to navigate through the peculiar layout of eachindividual website in order to find the given site's order form orcontact submission form.

Moreover, the Web order form concept itself is less than ideal in that,every time a user begins purchasing from a vendor through its website,the user must register with this vendor, providing credit cardinformation, e-mail account address, and other sensitive data. Each timethis data is circulated to a new party, the user's exposure to the riskof identity theft, fraud, and spam increases. Ideally, Internet userswould be able to purchase from website providing vendors without havingto register separately with each vendor and to fill out a separatepurchase order form for each individual vendor website.

What is needed therefore is a superior communication system and methodthat allows users to interact with and purchase from all websiteproviders through a single common interface, thus requiring no websitenavigation, no per-site registration, and no per-purchase order formsubmission.

Meanwhile, HTML itself is simply a language for defining the structureof a document, such as which part of the document is a title, which partis a paragraph, which part should be emphasized, and so on. HTML issilent about what the document actually says, i.e., HTML does nothing totell us about the content or subject matter of a given paragraph,sentence, or phrase. Given this reality, under the related art,elaborate content analysis software has been developed, such as that ofApplied Semantics, to “read” web pages in an attempt to ascertain thesubject matter thereof without human participation. Such an approach is,at best, approximate. Thus, World Wide Web search engines, relying uponhighly uncertain approximations, oftentimes return results that arehighly variable in terms of relevancy. Ideally, the World Wide Web wouldbe searchable with the field-by-field precision commonly seen inbookkeeping software applications or contact management software, inwhich programs users can easily search for a particular term, such as alast name, in a particular field, such as a last name field.

What is needed, therefore, is a method of constructing and parsing a webpage so that the exact meaning and content thereof can be immediatelyand reliability ascertained and so that a group of web pages can besearched with field-by-field granularity.

G. Related Art: Internet Search Engine Methodology

Also, under the related art, one commercially successful methodology forsearching and ranking the relevancy of web pages is that of citationranking, e.g., U.S. Pat. No. 6,285,999 to Page. This method ranks pagesin part according to the number and nature of other Web pages that linkto the given page. This method is not ideal in that it provides no meanswhatsoever for capturing the difference between a “positive” reference a“negative” reference. In other words, under this method, a link from anarticle that ridicules the linked document counts just as much as a linkfrom an article that praises the same document.

What is needed, therefore, is a ranking methodology based upon theactual opinions of the user community rather than upon hit-or-misssurrogates for these opinions.

H. Related Art: Internet Dictionary, Stylebook and Grammar BookTechnology

Dictionaries, literary stylebooks, and grammar books have heretoforebeen the province of elite editors and academicians at publishingcompanies and universities. Language, however, evolves faster than suchinstitutions. In order to speed up the pace at which such referencematerials are updated, some attempts have been made to createlimited-function, on-line dictionaries—such as dictionaries for computerterms—that allow user-submission of definitions, but these attempts arenot ideal in that these dictionaries must still be edited by someone sothat false or frivolous submissions do not get published. Such attempts,in the absence of a superior approach, would be even more futile in themore subtle areas of language, such as grammar and style.

One approach is that used in Wikipedia, an online “encyclopedia,” inwhich all the content is user-created and user-maintained. While theapparent democracy of such an approach seems attractive at first blush,the actual performance of such an approach is disappointing: a novice ina field can delete the work of an eminent scholar in the same field andreplace this work with nonsense. Endless retaliatory deletions,re-writings, and political squabbles ensue. Meanwhile, someone trying touse the Wikipedia as a reference tool does so at his or her own risk,since the content thereof may or may not be accurate at and any giventime and changes from day to day.

What is needed, therefore, is an effective and efficient means by whicha dictionary, stylebook, grammar book or other reference material can becreated, maintained, and used as an authoritative reference tool byanyone with Internet access without the need for content-editinginstitutions.

I. Related Art: Web Browser Toolbar Technology

Software commonly called “toolbars”, such as the NetZero, AOL, and YahooCompanion toolbars, whereby features are included in or added to a Webbrowser, such as Microsoft Internet Explorer, are known. These toolbarstypically feature advertisements or convenient access to a certainfunction, such as a Web search engine, that the given toolbar providerwishes to offer users.

One noteworthy variation on this theme is a toolbar feature used byGain.com, which displays advertisements based upon a user's browsinghabits, such as the websites he or she visits. This approach to thetoolbar is not ideal in that the toolbar essentially exists to generatead revenue for the toolbar maker at the expense of website providersthemselves. In fact, as alleged in a recent lawsuit, this toolbarmechanism may be used to display ads for competitors of the websiteprovider whose website is being browsed. Ideally, instead of workingagainst website providers, the toolbar would actively serve the purposesof both website providers and visitors—without requiring each individualwebsite provider to build and distribute its own toolbar.

What is needed, therefore, is an effective and efficient means throughwhich the toolbar serves to enable easy, direct interaction between thetoolbar user and virtually any provider of a website being browsed.

J. Related Art: Additional Technologies

Computers—which term is meant to include for purposes of this documentall manner of computer and telecommunication hardware and software,including CPUs, RAM, ROM, disk drives, removable data storage media,ports, cables, routers, switches, interface devices, keyboards,point-and-click devices, wireless transmission/reception hardware, audioand video display monitors, modems, cards, power supplies, networks,networking equipment, operating systems, etc.—are known. Softwarecomprising instructions stored on digital media whereby information isprocessed and steps are performed is known. Protocols for the storageand retrieval, both locally and remotely, of information usingelectronic devices are known. A URL (Uniform Resource Locator), a URI(Uniform Resource Identifier), a file name and a file path are known.

Markup languages (e.g., SGML, HTML, XML) and methods for accessing andmanipulating markup language documents (e.g., DOM, SAX) are known, asare methods for displaying information in such documents (e.g., Webbrowsers, CSS, XSLT) and identifying individual vocabularies usedtherein (e.g., Namespaces). Database management systems (e.g., Oracle,Sybase), database query languages (e.g., SQL) and means of dynamicallygenerating web pages which incorporate material drawn from a database(e.g., ASP, PHP) are also known. Techniques and software for mappingdata from one type of database to another are known. Internet bondingand instantaneous electronic payment systems (e.g., U.S. patentapplication Ser. No. 09/848, 639 by Harrison) are known.

Instant messaging services, such as AOL Instant Messenger, whereby areal-time or near real-time data connection is established between anInternet user and the service operator so that real-time delivery oftext exchanges between users can be affected, are known.

Public recordation of information such that said information isassigned, indexed, and can be retrieved by a unique alphanumericidentifier, such as copyright registration, is known. Techniques forencoding data on paper for machine retrieval, such as bar codes andhigh-density bar codes (2D), are known. Means for hosting an image fileand updating this image file each time the data in a database field ischanged (e.g., Web Page hit counters) are known.

Third-party-beneficiary contracts are known. A “third-party-beneficiarycontract” is “a contract between two or more parties, the performance ofwhich is intended to benefit directly a third party [“one not a party toan agreement”], thus giving the third party a right to file suit forbreach of contract by either of the original contract parties.” Black'sLaw Dictionary, 6th edition, page 1480 (West publishing Co., St. Paul,Minn., 1990).

BRIEF SUMMARY OF THE INVENTION

Disclosed are a Universal Electronic Transaction (UET) system, method,and device comprising several subsystems and submethods/subprocesses aswell as the physical apparatus of a computer network configured toexecute certain steps. An entity called the UET Company is assumed to bethe implementer of the UET system. Elements include:

The URLIT identifier. A “URLIT” identifier is a result of a processwhereby a given URL is registered and access privileges established. TheURLIT can be manipulated into multiple forms so as to serve multiplefunctions. It serves as a security measure to ensure that a registereduser to whom a URL is registered has access to the content of the webpage at the given URL, and that the party controlling the content of theweb page has access to the password-protected registered user account towhich the given URL is registered. The URLIT serves as a key code inrelating records between databases in a relational database complex. TheURLIT serves as a transaction identifier by which auctions and othertransactions can be tracked. The URLIT serves as part of file names thatidentify image files intended for display in association with theaforementioned web page.

UAML. The URLIT is a crucial part of a markup system called theUniversal Advertisement Markup Language or “UAML.” The UAML allows anInternet auction, classified ad, or other material for which indexingmight be useful, such as poems or songs, to be embedded in any staticweb page. The resulting “UAML-enabled” web page can be parsed,UAML-tagged data extracted and imported into the fields of a relationaldatabase record, and the resulting record searched so that UAML-enabledauctions, ads, and other listings across the entire World Wide Web canbe found, ranked, and analyzed with field-by-field precision.

UTU. The URLIT further enables a system and software program called a“Universal Toolbar Utility” (UTU). The UTU appears as a toolbar in a Webbrowser and serves to establish a data connection (push or pull) betweena client computer on which the UTU is being used and the UET Company. Acurrent URL being browsed is transmitted to the UET Company which inturn requests a file so identified. If the web page to which the URLpoints is properly UAML-enabled and the URL is properly registered, avariety of content can be transmitted for UTU display, including acontact or order form whereby interaction with or purchasing from awebsite provider directly through the UTU, processed by the UET Company,is made easy.

Userithm Search Engine. A “Userithm Search Engine” (USE) (from“user-defined” and “algorithm”) allows users to design their own uniquesearch algorithms. A “search component” is defined by a user's datainput. A given methodology for the search component is selected from amenu of different search methodologies. A weight is assigned to thesearch component for use in combining the results of the searchcomponent with another search component. A standard for data within afield is set, along with a tolerance for variation from the standard.Search results are combined according to user-assigned weights, and aresulting rank list is returned to the user, along with a performanceindicator for each search component so that the user can immediatelydiscern which search technique is most effective for the particularcase.

Lexivote search methodology. A “Lexivote” system provides a mechanismwhereby a user submits an opinion regarding which website is mostrelevant to a word or phrase. The opinion—essentially a vote—is thenused in a method of ranking search results.

Lexary. A “Lexary” is an electronic reference tool which provides accessto an entry that is created and maintained by a community of users atlarge. Specifically, the Lexary is an on-line dictionary, thesaurus,style book, and grammar book, wherein users can submit, edit, rate, andchallenge definitions of terms, grammar notes (punctuation, syntax,etc.), and style conventions for English or another language.

Uniform Terms of Use. A “Uniform Terms of Use” (UTOU) system provides amechanism whereby a “terms of use agreement” that governs use of anindividual website can be created, reviewed, maintained, and interpretedefficiently and predictably.

Universal Form Contract. A “Universal Form Contract” (UFC) system is anextension of the UTOU system into off-line settings, providing amechanism whereby a written contract document can be created, executed,stored, and interpreted efficiently and predictably.

Universal Arbitration. A “Universal Arbitration” (UArb) system providesa mechanism whereby a UET user can make alternative dispute resolutionarrangements efficiently.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 provides a flowchart of the method by which the UniversalElectronic Transaction (UET) technology is created, deployed, and used.

FIG. 2 provides a diagram of the UET system and its componentsubsystems.

FIG. 3 depicts a diagram of the physical apparatus of the UETtechnology.

FIG. 4 depicts a flowchart of a method by which the UAML subsystem iscreated and deployed.

FIG. 5 depicts a flowchart of the process by which users of the UAMLsubsystem are registered and their accounts created.

FIG. 6A depicts a flowchart of a process by which UAMLadvertisements/listings are made available.

FIG. 6B depicts a flowchart of a URL conflict resolution process.

FIG. 7A depicts a flowchart of a process by which a URLIT is assigned toa Web address, used in an image location, and otherwise used to enablethe UAML system.

FIG. 7B depicts an example URL and URLIT information associatedtherewith.

FIG. 8 depicts a flowchart of a process by which UAML-enabled web pagesare created.

FIG. 9 depicts an example UAML-enabled web page.

FIG. 10 depicts an example of an HTML submission form wherebyinformation can be submitted to a code generator program so that UAMLtags can be automatically generated to describe the submittedinformation.

FIG. 11 depicts an example of an excerpt from source code of theUAML-enabled web page.

FIG. 12A depicts a flowchart of a process whereby documents submittedfor use within the UAML subsystem are validated.

FIG. 12B depicts a flowchart of a UAML security check process.

FIG. 13 depicts a chart of sample data that could be described by aparticular UAML tag, a “UAML type” tag, so as to identify a particulardatabase.

FIG. 14 depicts a chart of some fields that could be contained in arecord within a relational database complex for use in the UET system.

FIG. 15 depicts a diagram of extracting PCDATA within a particularelement within the UAML-enabled document and inserting the data into arecord in the relational database complex.

FIG. 16 depicts a diagram of some databases and relationships in therelational database complex.

FIG. 17 depicts a diagram of an effect of having content of a listinghosted on two servers, one under control of the UET Company and theother under control of the user.

FIG. 18A depicts a flowchart of a process by which images hosted by theUET Company and appearing in listings are updated when databaseinformation changes.

FIG. 18B depicts a temporal diagram of an image at a first moment intime and an image at a second moment in time.

FIG. 19A depicts a flowchart of a process whereby continuing validity ofa listing is confirmed.

FIG. 19B depicts a chart of different scheduling options for executingthe process in FIG. 19A.

FIG. 20 depicts a flowchart of a process for invalidating a listing.

FIG. 21 depicts a flowchart of a process for cutting short an auction.

FIG. 22 depicts a flowchart of a process for delisting a listing.

FIG. 23 depicts a flowchart of an example usage scenario.

FIG. 24 depicts a flowchart of an auction bidding process.

FIG. 25 depicts a flowchart of an auction completion process.

FIG. 26 depicts an excerpt from an example “My Registered URLs” page.

FIG. 27 depicts an excerpt from an example auction review and bidsubmission page related to an auction listing.

FIG. 28A is a diagram of a relationship between UAML-enabled listingsunder control of users and related pages under control of the UETCompany, and a relationship between the listing pages and third partycompanies.

FIG. 28B is a diagram of an example UAML-enabled web page including alisting and various databases that include a record related to thislisting.

FIGS. 28C, 28D, and 28E depict excerpts from web pages displaying dataextracted from listings.

FIGS. 29 through 36 depict revenue models for the UAML subsystem.

FIG. 37 depicts an example of the Universal Toolbar Utility in use.

FIG. 38 is a flowchart of steps for using the UTU.

FIG. 39 depicts an example of the Universal Toolbar Utility in use, inexpanded form.

FIG. 40A is a flowchart of a process for creation of an inventory listor wish list for display through the UTU.

FIG. 40B depicts an excerpt from an example web page hosted by the UETCompany displaying lists of a given registered user's inventory listsand wish lists.

FIG. 40C depicts an excerpt from an example web submission form throughwhich a user can modify a given inventory list.

FIG. 41 is a flowchart of the process whereby a user uses the UTUuniversal shopping cart feature.

FIG. 42A and FIG. 42B are diagrams depicting a one-to-one relationshipbetween a URLIT and a UAML-enabled listing in contrast to a one-to-manyrelationship between a URLIT-stem and successive iterations of adocument at a particular URL when used strictly for UTU purposes.

FIG. 43 is a diagram depicting a web page and databases involved indisplaying information associated with the web page through the UTU.

FIG. 44 is a diagram depicting relationships between data in a shoppingcart record of a UTU user and inventory lists associated with web pagesunder the control of other users from whom the UTU user is purchasing.

FIGS. 45 and 46 depict an example of an alternative embodiment of theUTU, configured to facilitate automatic contributions to nonprofitorganizations.

FIG. 47 is a flowchart of the process through which the UTU is used todonate to nonprofit organizations.

FIG. 48 is a flowchart of the process through which the UTU is used tobenefit environmentally conscious website providers and hostingservices.

FIG. 49 depicts an example of the UTU in use displaying a “seal ofapproval” that indicates that a website provider or hosting service hasmet standards set by a user that has been found to be qualified toevaluate environmentally conscious business practices.

FIG. 50 is a flowchart of a process for user creation of a submissionform or auction that is to be accessible through the UTU.

FIG. 51 depicts an excerpt from an example web submission form used inthe creation of a UTU submission form.

FIG. 52 depicts an excerpt from an example web submission form used inthe creation of an auction to be displayed through the UTU.

FIG. 53 is a flowchart of a process through which users participate inuse an iTicker feature of the UTU.

FIG. 54 depicts an example of a UTU embodiment displaying scrollingiTicker headlines.

FIG. 55 depicts a chart of example UAML tags common to all listings.

FIG. 56 depicts a template for a subject-specific tag names used in thepresent disclosure.

FIG. 57A depicts a chart of example subject-specific tags, correspondingto the fields of the UET Company database record in a database, for usein UAML-enabled listings for collectible coins.

FIGS. 57B through FIG. 57H depict other subject-specific vocabularies.

FIG. 58 is a flowchart of a process through which variable data indynamically generated web pages can be tagged for use within the UAMLsystem.

FIG. 59A is a flowchart of a process through which automatic datacapture hardware, such as bar-code scanners and RFID readers, can beintegrated into the UAML subsystem such that listings throughout theWorld Wide Web can be searched for a UPC or EPC.

FIG. 59B is a flowchart of a process through which the UAML subsystemcan be used through a telephone.

FIG. 59C is a flowchart of a process through which a search query can becomposed and the UAML subsystem can be used through e-mail.

FIG. 59D depicts an example e-mail to be sent to the UET Company, whereit is parsed and a search performed according to search criteriaspecified in the e-mail.

FIG. 59E depicts an example e-mail sent by the UET Company to a user inresponse to a query such as that depicted in FIG. 59D.

FIG. 60 is a flowchart of a process through which the Userithm searchengine is used.

FIG. 61 depicts a template for web pages for use in submission of searchqueries under the Userithm search engine subsystem.

FIG. 62 is a flowchart of a process by which search components aredefined on-the-fly in real time by a user of the Userithm search enginesubsystem.

FIG. 63 is a flowchart of the Userithm search and ranking process.

FIG. 64 is a flowchart of the subcomponents search and ranking process.

FIG. 65 depicts an excerpt from a sample submission form through which auser submits a Userithm search query.

FIG. 66 depicts an excerpt from a sample search submission form withpredefined methodology which still allows entry of intercomponent userassigned weights.

FIG. 67 depicts a chart of different search methodologies that can beused within the Userithm search engine system.

FIG. 68A is a flowchart of the normalization process.

FIG. 68B depicts an equation whereby an overall score of a document isproduced by combining weighted scores of the document under varioussearch components.

FIGS. 69 through 71 are charts of scores of a group of hypothetical webpages.

FIG. 72 depicts a template for display of search results along withperformance gauges associated with each result.

FIGS. 73 and 74 depict excerpts from example results pages includingperformance gauges.

FIGS. 75 through 86 depict excerpts from alternative example submissionforms through which a user may submit a Userithm search query.

FIG. 87 is a flowchart of the process whereby search components aredefined in a subject specific database search.

FIG. 88 depicts an example e-mail in which a user submits Userithmsearch queries via e-mail.

FIG. 89 depicts an example e-mail wherein results of a Userithm searchquery submitted by e-mail are provided to a user.

FIG. 90 is a flowchart of a process whereby the USE subsystem isaccessed via e-mail.

FIG. 91 depicts an excerpt from an example submission form through whicha user can submit choices to the UET Company regarding a customizedsearch engine.

FIG. 92 is a flowchart of a process by which abuild-your-own-search-engine feature is used.

FIG. 93 depicts an excerpt from an example web page through whichword-votes are submitted for use in the Lexivote search system andmethodology.

FIG. 94 is a flowchart of a process through which word-votes can beobtained from users of a search engine.

FIG. 95 is a flowchart of an alternative process through whichword-votes can be obtained from users.

FIG. 96 depicts a chart of options for requiring users to submitword-votes.

FIG. 97 depicts a sample weighting schedule for weighting word-votes.

FIG. 98A depicts a flowchart of a Lexivote ranking process.

FIG. 98B depicts an equation used in the Lexivote ranking process.

FIG. 99 depicts an excerpt from a sample submission form through which auser can modify his or her word-votes.

FIG. 100 depicts an overview of databases and database relationshipsinvolved in the Lexivote and Lexary subsystems.

FIG. 101 depicts a flowchart of the process of creation, deployment anduse of the Lexary subsystem.

FIG. 102 depicts an excerpt from a sample submission form through whicha user can look up a definition in the Lexary.

FIG. 103 depicts an excerpt from a sample document in which approvedsenses of a given term are displayed.

FIG. 104 depicts an excerpt from a sample submission form through whicha user may submit a new sense for consideration for approval by the usercommunity for inclusion in the Lexary.

FIG. 105 depicts an excerpt from a sample document displaying pendingproposed senses.

FIG. 106 depicts an excerpt from a sample submission form through whicha user may submit a sense challenge.

FIG. 107 is a flowchart depicting a process by which an authority ratingof a user is calculated.

FIG. 108 is a flowchart depicting a process by which a given sense isflagged.

FIG. 109 is a flowchart depicting a process through which a choice isedited.

FIG. 110 is a flowchart depicting a process whereby a sense is approvedby the user community for inclusion in the Lexary.

FIG. 111 is a flowchart depicting a sense challenge process.

FIG. 112 is an excerpt from a sample submission form through which auser can submit a query to a Lexary-enabled USE system.

FIG. 113 is an excerpt from a sample secondary selections page for usein a Lexary-integrated USE.

FIG. 114A use a flowchart of a process whereby the Lexary-integrated USEis used.

FIG. 114B is a flowchart of a process whereby a thesaurus entry issubmitted for consideration for approval by the user community forinclusion in the Lexary.

FIG. 114C depicts an excerpt from a sample document in which approvedsenses of given term are displayed along with a link to a documentdisplaying thesaurus entries related to the given sense of the term.

FIG. 115 is a flowchart depicting a process whereby the UTOU system iscreated, deployed, and used.

FIG. 116 depicts an excerpt from an example document wherein a versionof a UTOU agreement is displayed.

FIG. 117 depicts an excerpt from an example document wherein aUTOU-conforming local terms of use agreement is displayed.

FIG. 118 is a diagram of a link relationships between the official UTOUAand various other documents.

FIG. 119 is a flowchart depicting a process by which a “RegisteredSubscriber” model of the UTOU system is integrated with the UAML and UTUsystems.

FIG. 120 depicts a sample UTU displaying that a website provider is asubscriber to the UTOU system.

FIG. 121 depicts a process whereby the UFC system is created, deployed,and used.

FIG. 122 depicts an excerpt from a sample UFC-enabled document.

FIG. 123 depicts a chart of benefits of the UFC system.

FIG. 124 is a flowchart depicting a process by which the UArb subsystemis created, deployed, and used.

FIG. 125 is a diagram depicting relationships between the UET Companyand two users of the UArb system.

FIG. 126 is a diagram depicting an alternative embodiment of the UArbsystem that includes an insurance company.

FIG. 127 is a chart of benefits of the UArb system.

FIG. 128 is an excerpt from an example web page that displays terms of aversion of a Universal Arbitration Agreement.

FIG. 129 depicts an excerpt from an example certificate certifying thata user is a participant in the UArb system.

FIG. 130 depicts an embodiment of the UTU configured to display that agiven website provider is a participant in the UArb system.

DETAILED DESCRIPTION OF THE INVENTION WITH REFERENCE TO THE DRAWINGS 1.Preface: The Present Disclosure

As is clear from the following detailed description, the disclosedinvention is a subtle and complex one, including both technicalinnovations and broad syntheses. Every attempt has been made to renderthe text highly readable, avoiding lengthy restatements of knownmaterial. Toward that end, many simple examples and specific detailshave been provided for the sole purpose of illustration. As will beapparent to anyone of ordinary skill in the art, the disclosed inventionlends itself to rich variation and alteration, yet such modificationremains within the scope of the invention. Therefore, the followingembodiments of the invention do not serve to limit the claimed inventionbut rather to teach its generality through the use of particulars.

For instance, several new markup language techniques are disclosedbelow. For the sake of simplicity of explanation, certain tag names areused in depicting embodiments of the invention. However, it should beclear to one of ordinary skill in the art that the disclosed techniquescan be used with other tag and field names being substituted for theparticular names used in this description, and that the invention can beimplemented so as to conform to one or more sets of standards asestablished by the World Wide Web Consortium or other standards-makingbodies. Since these standards change through time, this disclosure hasbeen drafted to explain the invention itself without limiting theinvention to any particular set of standards or currently popularconventions. Where possible, functional and descriptive names have beenused so that this document can be most easily understood by the readerand can be translated easily and effectively into other spokenlanguages.

2. Introduction: The Universal Electronic Transaction System

Disclosed is an invention called a “Universal Electronic Transaction”(UET) system, which is to be operated by a UET Company. The UET systemcomprises computer hardware and software configured to execute certainsteps of a disclosed UET method, which method includes bothcomputer-implemented and human-implemented steps.

The UET system makes possible a new way of using the Internet and WorldWide Web. Certain processes that were heretofore considered essential tothe World Wide Web are rendered largely unnecessary, and certaininefficiencies that were heretofore considered inherent are eliminated.

Each of the four major building blocks of the UET system—namely, (I) theURLIT/UAML/UTU subsystem, (II) the Userithm/Lexivote/Lexary subsystem,(III) the UTOU/UFC subsystem, and (IV) the UArb subsystem—are modular,i.e., each building block can be successfully implemented individuallywithout reference to the other building blocks. However, when combinedto form the complete UET system, the resulting whole enjoysmultiplicative advantages as the individual modules support, complement,and enhance each other.

3. URLIT/UAML/UTU Subsystem Overview

A central feature of the first subsystem is an innovation called a“URLIT” (a term derived from “URL” and “iteration”). The URLIT is a toolused by the UET Company and its customers (“users”) to establishidentity, security, and communication. Typically, a user requests aURLIT for use with respect to a specified URL, and this URLIT isembedded in a web page at the given URL. The URLIT, combined with thesystem within which it works, fundamentally alters the ways in which theWorld Wide Web can be used.

In order to be effective, the URLIT is described in markup language tagsembedded in a web document. These tags are part of a disclosed“Universal Advertisement Markup Language” (UAML).

The UET Company parses the user's web page, and if this page meetscertain requirements, it is accepted as a “listing.” The listing can bevirtually any type of advertisement—a personal ad, real estate ad, usedcar ad, want ad—and can even be an Internet auction listing.

When a listing is accepted, a record is created in the UET Company'srelational database complex, and fields of the record are populated withUAML-tagged data in the user's web page.

Once the record has been created and populated, the user's listing canbe easily found by other users. Other users can visit the UET Companywebsite and perform a search of the UET Company's databases, whichincludes the record associated with the given user's web page. Since therecord contains individual fields corresponding to individual UAML nodesin the user's web page, the record contains much more specificinformation about the given user's web page than could be extracted froman HTML page that was not UAML-enabled. Thus, a search through the UETCompany site is much more precise than a search through a conventionalWeb search engine.

One special type of listing deserves particular attention: the Internetauction. A UAML-enabled Internet auction listing displays real-timeinformation, such as the current high bid, even though the web pageitself is static. Display of this dynamically updated information ismade possible by reference to image files hosted by the UET Companywhich are specific to the given listing and are overwritten each timethe variables they represent change.

The URLIT also serves a crucial role in a disclosed “Universal ToolbarUtility” (UTU). The UTU is part of or works in conjunction with a Webbrowser such that, when a user is browsing a properly URLIT-enabled webpage, the UTU serves as a communication conduit whereby the browsinguser can view the web page provider's inventory and wish list, canpurchase from the website provider, or can submit information to thewebsite provider via a submission form—all through the toolbar known asthe UTU. In this way, the UTU renders Web submission forms and Webpurchase forms largely obsolete. It also makes possible a “universalshopping cart” such that purchases from many different websites can allbe added to a single shopping cart, making time-consuming registrationwith each different website provider unnecessary and navigation to thewebsite's purchase form or contact form unnecessary.

4. Userithm Search Engine/Lexivote/Lexary Subsystem Overview

The second subsystem provides users the power to define their own searchalgorithms. To achieve this effect, data input fields are grouped intoclusters called “search components.” In a basic embodiment, threedistinct pieces of data are input by a user for each search component:(I) the term or terms to be searched, (II) a search methodologyselection, and (III) a weight. Additional fields may also be included ina search component as discussed below.

When a user defines two or more search components, a separate search ofthe UET Company databases is performed for each component, and resultsof each search are scored according to the given search methodology.Then, the multiple results lists are combined into a single listaccording to the weights assigned to each component by the user, i.e.,the results of a search under a higher weighted component have a greatereffect on the final list ranking than do the results of a search under acomponent that has been assigned a lower weight by the user.

The Userithm search engine may also include additional fields for userinput of data. For instance, users may set their own standards for aparticular variable. This technique is most useful for Userithm searchengine embodiments that are geared for a particular subject matter, suchas real estate. For instance, in a Userithm search engine devoted toreal estate, a user may assign a value of “3” to set the standard forthe number of bedrooms. Units with three bedrooms score the maximumunder this criterion, while units with two bedrooms or four bedroomsscore lower, while units with one bedroom or five bedroom score evenlower.

Users may also set their own tolerance levels for variation fromstandards. Thus, the user may set, in the above example, a tolerance ofplus or minus one bedroom, such that units with two, three, or fourbedrooms are not filtered out of search results, but units with onebedroom or five bedrooms are.

Userithm search engines devoted to specific subject matter, such asstocks, mutual funds, vehicles, real estate, personal ads, etc., mayalso include intercomponent weighting fields in addition tointercomponent weighting fields.

While the Userithm system has been designed to accommodate multiplepre-existing search methodologies—as well as any methodologies developedafter the time of this writing—a particular novel search methodology,called a “Lexivote” method and system, is also disclosed. The Lexivotesystem provides a mechanism through which users can submit a word orphrase along with a website address that the user believes is a valuableresource pertaining to that word or phrase. Then, when another usersubmits a search query including that word or phrase, search results arescored according to such user preference submissions or “votes” suchthat websites receiving more votes with respect to a particular word orterm are ranked higher than websites receiving fewer votes or no voteswith respect to the searched word or phrase.

To take more advantage of the Lexivote system, the UET Company may alsouse a disclosed method and system called a “Lexary”. The Lexary is anonline reference tool—specifically, a combined dictionary, thesaurus,stylebook, and grammar book—in which entries and senses are submitted,maintained, and evaluated by the user community per disclosed processes.

5. Uniform Terms of Use/Universal Form Contract Subsystem Overview

The third subsystem streamlines UET participation while alsoestablishing a foundation for beneficial developments in Internet law.It should be noted, however, that it is beyond the power and scope ofthis document and this technology to alter statutory or case law in anyjurisdiction. Thus, deployment of technologies disclosed herein does notguarantee any particular judicial interpretation.

Under a disclosed “Uniform Terms of Use” system, the UET Company hosts aweb page that comprises a number of generic terms that have beenestablished collaboratively with the legal community and the usercommunity. A website provider can, in its own terms of use agreement,“subscribe” to the UTOU version displayed in that web page, therebyincorporating by reference the terms thereof. Having done so, thewebsite provider needs only to articulate a handful of terms that areunique to its specific website. Visitors to the subscribing website,once they have reviewed the UTOU version referenced, need only reviewthe site-specific terms of use. Over time, numerous beneficial effectsaccrue to the website provider and website user communities: legal feesare saved, time is saved, and the law governing Internet usage developsin a more cohesive, predictable fashion.

One extension of the UTOU system is a disclosed “Universal FormContract” method and system. Under the UFC system, paper contracts arewritten to incorporate by reference uniform terms that are hosted onlineby the UET Company, again creating savings in terms of legal expense,paper usage and storage, and efficient development of case law.

6. Universal Arbitration Subsystem Overview

The fourth subsystem streamlines UET participation by offering usersbroad and convenient access to the benefits of alternative disputeresolution. Users agree with the UET Company to submit disputes toalternative dispute resolution when these disputes arise with otherusers who have also so agreed. External parties, such as insurancecompanies, can also participate in the system by offering specialincentives to users who participate and thereby diminish the insurancecompanies' exposure to litigation costs.

7. Subsystem Interaction

When the four subsystems are deployed together, numerous beneficialsynergies arise: For instance, listings created under the UAML subsystemcan be searched under the Userithm search engine subsystem; Web pagescomprising these UAML-enabled listings can be provided by users whoparticipate in the UTOU and UArb subsystems such that disputes arisingout of UET usage can be handled reliably and efficiently.

8. General Introductory Drawings

The present invention may be more fully explained through reference tothe drawings.

FIG. 1 provides an overview of the current invention construed as amethod. Specifically, the present document discloses a four-stepprocess: creation and deployment of the Universal Advertisement MarkupLanguage (UAML) subsystem 101, including major parts such as the URLITmechanism and the Universal Toolbar Utility (UTU); creation anddeployment of the Userithm Search Engine (below) 102, including theLexivote search methodology subsystem and the Lexary subsystem; creationand deployment of the Uniform Terms of Use (UTOU) and Universal FormContract (UFC) subsystems 103; and creation and deployment of theUniversal Arbitration (UArb) subsystem 104. Each of these steps isdescribed in greater detail below.

FIG. 2 depicts an overview of the current invention construed as asystem, wherein interaction between subsystems serves to produce agreater whole.

FIG. 3 depicts an overview of the current invention construed as anapparatus.

9. Detailed Description of URLIT and UAML

FIG. 4 depicts the steps necessary for creation and deployment of theUAML subsystem. As will be clear to anyone of ordinary skill in the art,the depicted steps can be performed in an order that differs from thatdepicted. URLIT software for processing URL submissions and assigningURLITs is developed 401 so as to execute steps depicted in FIG. 7A andexemplified in FIG. 7B. UAML vocabularies and standards for well-formedUAML and valid UAML documents of different types (“UAML listing documenttype definitions” or “LTDs”) are established 402; example vocabulariesappear in FIGS. 55 through 57H. A complex of relational databases neededto manage information used in the UET system is created 403; majordatabases and relationships are depicted in FIG. 16. Next, a validatingUAML parser and related software for mapping data extracted fromUAML-enabled documents to appropriate fields in records in the UETCompany's relational databases as exemplified in FIG. 15 are created404.

Although it is not necessary for the UTU to be included in the UAMLsubsystem, the benefits of this feature are significant and desirable.If the UET Company chooses to include the UTU 407, then software forperforming functions such as those depicted in FIGS. 37 through 54 aredeveloped 406. An electronic payment and bonding system such as thatdisclosed in U.S. patent application Ser. No. 09/848,639 by Harrison(hereinafter, “Harrison bonded payment system”) is developed orintegrated with the remainder of the UET system 405.

Next, internal and external interfaces for UET Company staff and thegeneral public of users respectively are created 408, includingintegration with, inter alia, the Userithm Search Engine and the EQMLtechniques discussed below. Thereafter, the UAML subsystem is madeavailable to the public, and standards for the use of UAML andparticipation in the UET system in general are disseminated 409.Finally, the UAML subsystem is continually improved through experienceand suggestion 410.

Usage of the UET system by the public begins with a user registrationand account creation process depicted in FIG. 5. Visiting the UETCompany website 501, the user submits required information 502,including first and last name, address, e-mail address, password, andother contact or identification information, and, presuming thesubmission is complete, and a new record is created in the registereduser's database to establish the new user's account 503. If the userwishes to buy and/or sell through the UET system 504, he or she may alsobe required to submit financial information, such as credit cardnumbers, Social Security numbers, bank account information, electronicfunds transfer information, and credit references, and, for largertransaction volumes, purchase a bond through a mechanism such as theHarrison bonded payment system 505.

A process for listing an ad (e.g., an Internet auction, job listing,real estate listing, registered UTOU listing, or other listing) throughthe UET system is depicted in FIG. 6A. A user logs into his or heraccount with the UET Company 601. If the listing is to appear at a URLthat has not previously been registered to the user's UET account 602,the user submits the exact URL of the page where the listing is toappear 603. This URL is compared to all URLs currently registered in theUET system 604, and if a conflicting registration exists 605, a URLconflict resolution process is followed 606 as depicted in FIG. 6B. Ifthe URL submitted is not currently registered to someone else 605, thesubmitted URL is added to the user's account as a registered URL 607.

Next, a unique alphanumeric character string called a “URLIT-stem” isassigned to the newly registered Web address 608. The URLIT-stem may berandomly generated or can be the product of a predeterminedURL-conversion algorithm, but no two URLIT-stems should be identical toeach other.

When the user is ready to use the registered URL for a listing, the userrequests a URLIT for use in the new listing 609. The URLIT is producedby adding a serial number to the URLIT-stem 617, and the URLIT isprovided to the user 617. The serial number added to the URLIT-stem toproduce a URLIT must be unique with respect to that URLIT-stem but neednot be unique with respect to other URLIT-stems. Thus, the first serialnumber to be applied to the URLIT-stem can simply be a “1”. The secondtime a URLIT is requested for the same URLIT-stem, the serial numberapplied to the URLIT-stem can be simply “2”.

Equipped with the new and unique URLIT, the user creates a UAML-enabledWeb page (an HTML document) in which the URLIT is included per UAMLstandards 618. The user then uploads this page to his or her website619. The user then logs into his or her UET Company account and submitsthe listing for activation 620. An initial validation process, depictedin FIG. 12A, is followed to determine whether the listing is acceptedfor inclusion in the UET system 621. If accepted 610, a new record iscreated in a Central Listings Database 613, this record including fieldssuch as those depicted in FIG. 14. The UAML parser software thenextracts the UAML-tagged data and maps this data to corresponding fieldsin the Central Listings Database and a subject-specific database thatcorresponds to the particular type of listing 614, if any, specified inthe listing. The subject-specific database and the LTD applicable to thelisting are identified in a “UAML type” element, for which example dataappears in FIG. 13. Data in UAML elements are extracted and entered intothe corresponding fields in the UET Company database as exemplified inFIG. 15.

An identical copy of the page in which the new listing appears is storedin the snapshots database 615 for use in a later comparison, such as acomparison used in a process for confirming continued validity of thelisting, depicted in FIG. 19A.

Since the listing appears on the user's own website, the user is free topromote the web page and listing by whatever means he or she deemsappropriate, including submission of the given URL to search engines notaffiliated with the UET Company 616. In this way, the easy capturing ofa static web page is combined with the power of field-by-field searchingand the database-driven flexibility of dynamically generated content asdescribed below.

FIG. 6B depicts the steps of the URL conflict resolution process. First,the user who has submitted a URL already registered to another user isnotified of the conflict 631. If the submitting user indicates that heor she wishes to contest the prior registration 632, the priorregistrant is notified of the contest 633. Both parties may then submitevidence of their ownership rights in the URL 634 to the UET Company.The UET Company then renders its decision 635 based on the evidencesubmitted. If the loser accepts 636 the decision of the UET Company, theconflict has been resolved. If not, the UET Company refers the opposingparties to resolve the dispute by other means 637. Such disputes canoften be resolved by simply testing access: a person who is unable toaccess a given URL—by uploading a URLIT-enabled web page, forinstance—is not likely to be the rightful owner thereof, especially ifthe opposing user does have such access. However, it is possible thattwo conflicting parties could have access to the same URL, a situationwhich renders the “access test” unhelpful.

The URLIT formation and usage process is separately depicted in FIG. 7A.First, after the user has submitted the URL of the document in which alisting is to appear, a unique identifier is assigned to this location711. This unique identifier is the URLIT-stem. When the user wishes toactivate a listing at the URL, he or she requests a full URLIT for usein the listing; this full URLIT is created by adding a serial number tothe given URLIT-stem 712. The user then embeds the URLIT in UAML tagsper UAML standards so that his or her listing can be validated and madeactive 713. The URLIT also serves as a portion of the filename for anyimage files required for a valid document of the chosen type of listing713. For instance, typically five image files are required for anauction listing; the names of these five image files can simply be theURLIT plus a letter (e.g., a, b, c, d, and e). The URL of each image isused in the web page that includes the listing so that when this webpage is called, the image is also served 714. When the user decides toremove the listing and put a new listing up at the same Web address, heor she requests a new URLIT, which is created by replacing the priorserial number with the next incremental serial number 715.

FIG. 7B illustrates the process in FIG. 7A through example. Here, anexample URL has been submitted by a user 701. A unique identifier, theURLIT-stem, is then assigned to this URL 702. When the user requests aURLIT for use in a listing, a serial number is added to the URLIT-stemto produce a complete URLIT 703. This URLIT is then, in some cases, usedin the name of a unique, dynamically updated image file that resides onthe UET Company's servers 704 such that the user has no control over thecontent of this image. In such cases, when the user creates the web pagein which his or her listing is to appear, he or she includes an HTMLimage reference to this file 705 so that it can serve as a dynamicindicator of the current high bid, number of bids, or other variablecontent as described in more detail below in FIGS. 18A and 18B. When theuser subsequently decides to reuse the given URL for publishing adifferent listing, he or she requests a new URLIT, which is provided 706by replacing the serial number of the previous URLIT with the nextincremental serial number. The new URLIT serves to uniquely identify thenew listing.

Creation of a UAML-enabled web page can be handled in many ways, asdepicted in FIG. 8. If a user wishes to tag data by hand 801, he or shemay do so 808. Otherwise, the user may visit the UET Company website 802where he or she may choose 803 between downloading a UAML editor forstand-alone use on a local computer 805, such as a laptop or desktop, orsimply entering all data to be included in his or her listing into aform on the UET Company site and submitting it 804. An example of such asubmission form appears in FIG. 10. This Web-accessible UAML generatorreturns a UAML-enabled web page to the user 807 by whatever means ispreferred, either providing the marked up text on the Web or via e-mail.When properly submitted, UET Company software adds HTML and UAML tags tothe user-submitted information so as to produce a document such as thatwhich appears in FIG. 11. The stand-alone UAML editor serves as atypical HTML editor with the added functionality of generating UAML tagsso as to produce a UAML-enabled web page 806. It may also include anautomatic means of requesting URLITs, validating UAML documents, etc.

FIG. 9 depicts the end result of the process in FIG. 8: a basicUAML-enabled web page as displayed in a typical browser, such asNetscape or Internet Explorer. A link 901 to the UET Company throughwhich the UET system is made possible is provided, as well as a link 902to the UET Company web page that corresponds to the user's listing,e.g., FIG. 27 (a listing that is not an auction will be represented onthe UET site by a page that is similar to that depicted in FIG. 27 inthat it displays information drawn from the UET Company database recordspertaining to the given listing except that no data entry fields throughwhich a bid can be submitted appear in the page, being unnecessary to anon-auction listing). The listing user, identified by a registered userID 908, has specified that payment will be processed through the UETCompany 903. A link to the web page on the UET Company site throughwhich a bidder can place a bid is also provided; such a web page isdepicted in FIG. 27. Five URLIT enabled images—time remaining 910,sellers feedback rating and bond margin gauge 908, current high bidder907, current high bid 904, and number of bids 905—also appear in thelisting document, along with an item description and other information.An excerpt from the source code of the web page depicted in FIG. 9appears in FIG. 11; such a document 1101, as is plain, includes bothHTML tags and UAML tags. The disclosed UAML system takes advantage ofthe standard Web browser practice of ignoring unrecognized tags, so thatthe UAML functionality can be added to a web page without the appearanceof the page being affected.

Note that the UAML tags describe only parts of the data, namely, thatwhich is to be extracted for replication in the UET Company databases.Thus, much of the data in the document is “invisible” from a UAMLperspective, just as the UAML tags themselves are ignored by a Webbrowser when displaying this page as shown in FIG. 9. By design,however, the data that is described within UAML tags also appears insome form in the web page as displayed by browser. UAML-tagged text istext that is also displayed as text in the browser, and the UAML-taggedimage files are displayed as images in the Web browser. In other words,not all data that is relevant from an HTML perspective is relevant froma UAML perspective, but most if not all data that is relevant from aUAML perspective is also relevant from an HTML perspective in thisdocument. Such is the preferred relationship between UAML data and HTMLdata; preferably, UAML tags should not include attributes, for instance.Data to be captured by a UAML parser should be visible through the Webbrowser so as to minimize the likelihood of a discrepancy betweencrucial information seen by a website visitor and that “seen” by a UAMLparser. Thus, for instance, a validating UAML parser may be configuredto ignore any UAML tags appearing in HTML “comment” tags, since the datawithin such tags may be ignored by a Web browser in displaying thedocument.

Since the web page 900 is hosted on the user's website—either on acomputer owned and operated by the user or one which belongs to thewebsite hosting company from which the user rents Web space—andtherefore under control of the user, the user can modify the appearanceof the web page 900 to suit his or her business branding needs andpersonal aesthetic preferences so long as the UAML standards forvalidity of a document are not violated. Such complete user control ofthe appearance of an auction listing is not possible under the relatedart systems in which the appearance of auction listings is set by theauctioneer.

While the web page is static, the image files serve as dynamicallychanging indicators by virtue of the process depicted in FIG. 18A,producing the effect depicted in FIG. 17. When a listing is made active1801, the relevant fields of the database record in the auction listingsdatabase in the UET Company relational database complex are queried toretrieve the current values of the fields 1802. Specifically, thecurrent high bid field, the current high bidder field, and the otherfields which can change during the course of the auction are queried,and the current values of each of these fields is converted to an imagefile 1803. Each resulting image is named per the URLIT filename stepdescribed above and stored at the appropriate image location 1804 sothat when the user's auction listing web page is requested 1805, thesedynamically updated images are returned for display in the requestingbrowser 1806.

Whenever a new bid is submitted, data in the relevant fields changes1808. When the data in these fields changes, these fields are queried1802, and a new image is created displaying the new value of the data ineach of the relevant fields 1803. The old image is overwritten with thenew image 1804 using the same file name and location. The process isrepeated until the listing is no longer active 1807. For illustration,FIG. 18B depicts an image file 1813 (e.g., jpg or gif file) whichdisplays the value of the current high bid field at time 1. After ahigher bid has been submitted (time 2), the value of the current highbid field changes and a new image 1814 is created and replaces the oldimage 1813.

The net effect is that the features of a dynamically generated web pagecan be replicated through a static web page. As shown in FIG. 17, thestatic web page 1701 is hosted on the user's website host servers 1704,while each image 1702 serving as a variable real-time indicator ishosted on the UET Company's servers 1703. This image file is overwrittenwith a new image at the same file location each time the information itportrays changes as per the process depicted in FIG. 18A. Thus, eachtime the static web page is requested, the latest value represented bythe image is presented to the user. The user cannot control the contentof the image or delete the image 1702, since it is hosted on the UETCompany's servers 1703. Also, while the information appears in an imagefile 1702 in the web page itself 1701, the underlying data is stillstored as a value by the UET Company, a more searchable form.

FIG. 12A depicts the initial validation process used during the basiclisting process of FIG. 6A to determine whether the listing submissionis accepted or rejected 621. Specifically, UET Company software requeststhe file located at the submitted URL 1201. If the page is found 1202,then the document is parsed and compared to the standards forwell-formed UAML 1203, which includes syntactical requirements as wellas the requirement that a URLIT be present in the document and tagged assuch. If well-formed 1204, the document is then compared to the LTD forthe specified type of listing 1205. If the document is valid 1206 underthe given LTD, the security check process of FIG. 12B is performed 1207.If the security check passes 1208, then the registered user account ofthe submitting user is compared to the minimum standards for acceptanceof a listing 1212. For instance, if the submitting user currently has apast due balance owed to the Company or is otherwise delinquent in hisor her responsibilities to the UET Company or another registered user,his or her submission will be rejected 1209. If all facets of thevalidation process are passed, then the listing is accepted 1210.

FIG. 12B depicts the UAML security check process used 1207 in theinitial validation process of FIG. 12A. First, the URLIT appearing inthe submitted web page is compared to the active URLITs in the UETCompany databases 1221. If the URLIT in the submitted page is existentand active (e.g., not expired) 1222, the URLIT is compared to registeredURL information in the UET Company databases 1223. If the web page inwhich the URLIT is being used appears at the same URL for which thegiven URLIT was issued 1224, then the user ID specified as that of thelister in the listing is compared to the user ID associated with theregistered user account to which the URL is registered 1225. If thelister matches 1226, then the image names and locations in the web pageare compared to the image names and locations associated with the givenURLIT 1229 if applicable. If any security comparison fails, the securitycheck fails 1227. If all succeed, the security check passes 1230.

FIG. 13 depicts a chart of sample data choices which may be appropriatefor designation of a given type of listing in the “UAML type” element.Each of these choices typically specifies a different database withinthe UET Company database complex, a different LTD, and sometimes adifferent vocabulary that is used by valid documents of the givenlisting type.

FIG. 14 depicts some of the fields occurring in records of a specificdatabase within the UET Company's relational database complex, thecentral listings database. These fields include the URLIT, the listingtype, the user ID of the lister, etc. UAML-tagged data in a document isextracted by UET Company parsing software and input into thecorresponding field in the appropriate database within the UET Companydatabase complex as illustrated in abstract form in FIG. 15. The URLITfield may be used as the “key” field whereby records of the centrallistings database are related to records in other databases; the listinguser field may serve as the key in other relationships.

FIG. 16 depicts the UET Company relational database complex such thatprimary databases and important relationships between certain databasesare represented. As is plain to one skilled in the art, additionaldatabases may and should be used to supplement those depicted in orderto effectively serve the purposes of a given implementation of thedisclosed UET system. Moreover, a limited deployment of the currentsystem could be effectively implemented without reference to some of thedepicted databases. For instance, the UET Company may not wish to serveuser demand for personal ads and would therefore have no needs for apersonal ads database.

FIG. 19A depicts the process by which the continued validity of alisting is confirmed. At predetermined times, such as those suggested inFIG. 19B, the URL associated with an active listing is requested 1901.If the page is found 1903, the page currently appearing at the URL iscompared with the document stored in the snapshots database associatedwith this listing 1905. If the page cannot be found, is no longerwell-formed and valid 1910, or one or more prohibited alterations havebeen made 1912, then the listing invalidation process depicted in FIG.20 is followed 1911. Also, if a page is temporarily unavailable andlater found but the temporary absence is considered unacceptable for thetype of listing (e.g., an auction listing was unavailable during thehour prior to close) 1907, the listing invalidation process in FIG. 20is also followed 1911. If the listing has expired (e.g., the auction hasclosed) 1909, then the delisting process depicted in FIG. 22 is followed1906.

When an auction that is currently running is found to be invalid,special measures must be taken, since the contractual obligationsundertaken by seller and any bidders were premised on a particularclosing time, one which will not be reached when the auction is cutshort. Thus FIG. 21 presents the process used in cutting short anauction. After the listing invalidation process depicted in FIG. 20 hasbeen followed, bidders are also notified that the auction has been cutshort 2101. All URLIT-enabled image files associated with the listingare overwritten with “auction cut short” notices so that any subsequentviewers can be so informed 2102. Business rules established by the givenUET Company are applied regarding whether the auction can be restarted,etc. 2103.

All listings, whether delisted by the user's choice or by the UETCompany for some reason, eventually go through the delisting processdepicted in FIG. 22. Records pertaining to listings being delisted aremarked as inactive so that they are no longer included in the recordssearched through user submitted search queries 2201. The lister'sexperience rating, such as that used in the Harrison bonded paymentsystem, is updated to reflect any events that may have caused thedelisting or may otherwise affect the registered user's experiencerating 2202. The listing then enters a period of expiration during whichperiod any image files, such as those used in an auction listing,display information indicating that the listing has closed but alsodisplaying the final values (i.e., the winning bid) so that the partiesto the auction can still refer to the images 2203. Finally, when theexpiration period has ended, the listing is officially expired and theimages, if any, are replaced with their final form, which can bewhatever the UET Company chooses, such as a UET Company banner ad 2204.The relevant database records are deleted and archived or otherwisehandled as the UET Company wishes 2204.

FIG. 23 depicts the steps that may occur in a given usage case. Forexample, considering the lister to be a first user, a second user wishesto search the Web 2301. The second user chooses to perform a Web searchthrough the UET Company 2310, or the user may search through a thirdparty website 2303. In either case, search results are returned to thesecond user 2308 who then clicks through to view the lister's web pageincluding the listing 2311 which includes UAML-tagged data, although theUAML will not be visible to a visitor unless he or she examines theactual source text of the given web page. If the second user wishes toverify the authenticity of the listing or find out more about the lister2313, the second user clicks the appropriate link appearing in the webpage 2316 and thereby visit the UET Company website, specifically, thedynamically generated web page associated with the given listing 2317and incorporating certain information as stored in the UET Companydatabases. Thereafter, the second user interacts with the lister via theweb page, by following the auction bidding process depicted in FIG. 24,for instance, or via the UTU, e-mail, or other mechanism or process2320. Some actions, such as bidding, may require registration andpurchasing of a bond 2321.

FIG. 24 depicts an auction bidding process for use in the UET system.After having visited the listing page 2401, a potential bidder clicksthrough to the UET Company site 2403 where he or she views a dynamicallygenerated web page, such as the example depicted in FIG. 27, whichpresents auction information as stored in the UET Company databases.Here the user reviews the auction information, and if he or she wishesto bid, the buyer registers if necessary 2405 and logs into his or herUET Company account 2409. Presuming that the buyer is in good standing2408, the buyer then may submit his or her bid via a bid submission formsuch as that depicted in FIG. 27, which depicts an excerpt from thedynamically generated web page that displays content from a databaserecord associated with the listing 2701; clearly, this web pageresembles conventional Internet auction listings, since it, unlike aUAML-enabled static web page, is a dynamically generated page. Uponsubmission of a bid, the database record pertaining to the given auctionlisting is updated 2406 and images are replaced 2411 per the processdepicted in FIG. 18A. Bid confirmation notices, outbid notices, etc.,and other optional processes are followed 2412.

When the auction ends, the auction completion process in FIG. 25 isfollowed 2413.

To summarize, the basic information flow for usage of a URLIT includesthe steps:

The first user submits a URL to the UET Company

The UET Company assigns a URLIT-stem to the URL

The first user requests a URLIT

The Company adds a serial number to the URLIT-stem to produce a URLIT

The UET Company provides the first user the URLIT

The first user embeds the URLIT using UAML tags in a UAML-enabled HTMLdocument

The first user uploads the document such that it appears at the URLassociated with the URLIT

The first user notifies the UET Company that the listing is ready

The UET Company requests the document at the URL

The UET Company parses, validates, and authenticates the document

The UET Company inputs data extracted from UAML-tagged elements in thedocument into corresponding fields of database records

the UET Company notifies the first user that the listing is active

A second user performs a search through the UET Company

Search results are returned to the second user

The second user requests the document containing the first user'slisting

The document (hosted by the first user's hosting service) is served tothe second user, along with any URLIT-enabled images (hosted by the UETCompany), as in the case of a UAML auction

If the second user is using a UTU and the first user has created a wishlist, inventory list or other UTU content, this content is madeavailable to the second user through the UTU (see below)

If the listing is a UAML auction and the second user wishes to bid, thesecond user requests the UET Company site page associated with the givenlisting, reviews the information therein, and submits his or her bid

The URLIT-enabled images are updated to reflect the new high bid, numberof bids, etc.

When the auction closes, the first and second users are notified thatthe transaction identified by the particular URLIT has been consummated

If the first and second user are bonded and electronic funds transferinformation is correct, payment is wired from the second user's accountto the first user's account instantaneously upon the close of theauction

If a dispute arises, the aggrieved user visits the UET Company site andopens a dispute claim specifying the transaction by URLIT

If the first user wishes to reuse the URL for another listing, he or sherequests a new URLIT for use with the URL and process begins again

Note that this overview is meant to cover the highlights of a URLIT'slifespan. Various peripheral steps are not explicitly mentioned, such asthe periodic revalidation of the UAML-enabled web page containing theuser's listing, periodically updating the “time remaining” image file,etc. Additional URLIT-related processes and criteria can be established,such as automatic expiration of a URLIT after a predetermined period oftime has elapsed.

Management of a user's listings is handled through the “My RegisteredURLs” page associated with the given user's account as depicted in FIG.26. Information may be displayed as shown in columns, including a URLcolumn 2601 where each item is linked to the given URL itself; aURLIT-stem column 2602; an active URLIT column 2603, where each item islinked to the record in the given UET Company central listings databaseassociated with the given URLIT; and various columns associated with theUTU described below, including the inventory list column 2604, whichdisplays which inventory list is assigned to the given URL; the wishlist column 2605; the UTU contact form column 2606; and the UTU auctioncolumn 2607.

FIG. 28A depicts a diagram of the relationship between user-hostedUAML-enabled web pages containing listings and corresponding pagesdynamically generated by the UET Company in response to browserrequests. Depicted are a group of UAML-enabled pages 2803, each of whichcontains an active listing. These pages 2803 have been parsed andvalidated by the UET Company's computers 2802, and a record has beencreated in the UET Company's databases for each listing. The UETCompany's databases can be searched through the UET Company's searchpage 2808.

For each listing 2803 a corresponding dynamically generated page 2801can be requested through the UET Company site. For instance, supposethat a particular web page 2803 a is an auction listing, similar to thatdepicted in FIG. 9. If a visitor wishes to bid, he or she requests thecorresponding page 2801 a on the UET Company site, which appears similarto the page depicted in FIG. 27.

Notice that other companies can also collect data from the UAML-enabledpages 2803, since the markup tags can be parsed by anyone. Thus, forexample, Company A may collect and store some data on its computers 2805from some UAML-enabled pages, while Company B catalogs other pages onits computers 2806. Each of these companies may in turn publish datapertaining to or links to these pages through its own Company websitepage 2804, 2807. Examples of the types of web pages that could beeffectively produced by third parties using information derived fromUAML listings appear in FIGS. 28C through 28E.

FIG. 28B presents a more detailed view of information relationshipsunderlying FIG. 28A. A given user's web page 2803 b is hosted by aCompany C's Web server 2811. Included in this user's web page 2803 b area number of UAML tags 2812 describing the data in the web page (most ofthe HTML within which these UAML tags are embedded is not shown for thesake of simplicity of this example; see FIG. 11 for fuller context). TheUET Company computers 2802 request the web page 2803 b and parse theUAML data 2812. Security check is made with reference to the registeredURLs database record 2813 pertaining to the URL of the given web page2803 b and the given registered users database record 2814 pertaining tothe registered user to whom the URL is registered. When the listing isapproved, a record is created in the central listings database 2815, acopy of the web page is stored in the snapshot database 2816, and arecord is created in the subject-matter-specific database 2817 (the coinlisting database in the depicted example) and related to the centrallistings database record 2815 by the URLIT field. When requested, theUET Company computers 2802 serve a dynamically generated web page 2818that incorporates the data stored in the company databases, e.g., FIG.27.

FIG. 28C depicts an excerpt from a web page created by a third party,not the UET Company, that has parsed the UAML-tagged data out of variouslistings of a particular type, in this case, poems, that have beenpublished by users through UAML-enabled web pages on their own websites.FIG. 28D depicts an excerpt from another third-party-published web page,in which data has been extracted and analyzed and then published instatistical form.

Although a third party would not have the full control and securitybenefits of the URLIT system, it is nonetheless fully possible for athird party to parse UAML-enabled pages, index them, publish its ownsite and provide its own high-precision search engine. FIG. 28E depictsan excerpt from a web page through which visitors can submit a query forsuch a search. Such transparency provides a significant advance over the“proprietary data” model used in the related art.

10. Revenue Models for Use with the UAML System

Several different revenue models are possible: FIG. 29 depicts a modelin which listings are required to carry banner ads for which advertiserspay the UET Company 2903. FIG. 30 depicts a model in which users pay afee for payment processing 3003. FIG. 31 depicts a model in which userspay a fee to search listings through the UET Company, paying either on asearch-by-search basis or on a subscription basis 3102. FIG. 32 depictsa model in which users pay a fee to list a listing either on aper-listing basis or a subscription basis 3202. FIG. 33 depicts a modelin which data gained about listings and users through the UET system issold to third parties for research or marketing purposes 3303. FIG. 34depicts a model in which revenues are generated through advertisingrelated to the search engine, either through paid advertisementsthereon, payments to be included in search results, or other methods3404. FIG. 35 depicts a model in which sellers and/or bidders mustpurchase a bond through the UET Company before being allowed to placelistings offering something for sale 3503. FIG. 36 depicts a model inwhich access to certain UET services is contingent upon user agreementto participate in opt-in marketing campaigns (e.g., to receive e-mailadvertisements), for which advertisers pay the UET Company 3601.

11. The Universal Toolbar Utility (UTU) Subsystem

FIG. 37 depicts a “screenshot” of an embodiment of the Universal ToolbarUtility (UTU). The UTU can be integrated into a Web browser or operatedin conjunction with a Web browser. The UTU leverages the URLIT system toprovide a large number of services directly through the toolbar thathave conventionally been provided only through web pages.

The UTU 3701 depicted in FIG. 37 shows the URL of a web page in theaddress field 3702 as in a typical Web browser. Additionally, however,the user name of the site provider 3703, the bond margin gauge 3704corresponding to the site provider's UET Company account, and the siteprovider's feedback or credibility rating 3705 also appear. A link 3706to display the given site provider's inventory list and wish list and alink 3707 to display a contact form through which the site provider canbe contacted are also supplied.

In this way, several pieces of information that may or may not beavailable in the particular web page being browsed at a given time arenonetheless readily available through the toolbar.

FIG. 38 depicts steps whereby the UTU serves its function. A UTU useracquires and installs the UTU 3801. As in some common forms of toolbaror instant messenger software, the UTU establishes a live dataconnection to the UET Company computers when the UTU user is online3802. The UTU transmits the URL of a web page currently being browsed bythe UTU user 3803. If the given URL is registered in the UET companydatabases 3804, the document at the URL is requested, parsed, andchecked for continued validity 3805. Note that, as described below, apage need not include a listing in order to be valid for UTU purposes.

If the page is valid for UTU purposes 3806, the additional informationsuch as that depicted in FIG. 37 is transmitted from the UET Companycomputers to the UTU installed on the UTU user's computer 3807. The userof the UTU can ignore the additional information in the toolbar andcontinue Web browsing as usual, or can click on one or more of theadditional information links, so as to expand the toolbar 3809 and viewthe inventory list, wish list, submission form or other in-toolbarcontent associated with the given URL 3812. An example of the expandedUTU appears in FIG. 39. If the UTU user wishes to interact with thewebsite provider 3811, he or she follows the appropriate process forcontacting, purchasing from, or bidding on the auction of the websiteprovider through the UTU 3810.

FIG. 39 depicts the UTU in expanded form. As shown, the inventory thatthe given website provider has associated with the given URL through theinventory/wish list creation process depicted in FIG. 40A appears,allowing the UTU user to check those items which he or she wishes to buyand add the checked items to the UTU “universal shopping cart” throughthe process depicted in FIG. 41. The total value of items currently inthe UTU user's cart—items which have been added to his or her cart fromother vendors'inventory lists that he or she has viewed earlier in thegiven browsing session—is also shown, and he or she can click theappropriate link to display the other items in his or her cart.

Also visible is a wish list that the given website provider hasassociated with the URL in the UET Company's databases. If the UTU userwishes to respond to the website provider's wish list, letting thewebsite provider know that the UTU user has something that the websiteprovider wants, the UTU user simply clicks the “offer your item” link todisplay the website provider's contact form.

FIG. 40A depicts a process whereby a given website provider createsinventory and wish lists and associates these lists with registered URLsin the UET company database complex. The website provider logs into hisor her account at the UET Company website 4001. The website providervisits the “My Inventory and Wish Lists” page 4002, an example of whichis depicted in FIG. 40B. If the website provider wishes to create aninventory list 4003, he or she clicks the “create new inventory list”link to create a new record 4004 in the inventory list database andbrowse the “Create and Modify Inventory List” page, such as the exampledepicted in FIG. 40C. From this page, the website provider submits itemsto be included in the particular inventory list record 4005, and/orremoves any items that he or she no longer wishes to sell. If thewebsite provider wishes to create additional inventory lists 4006, theprocess for creating an inventory list is repeated.

If the website provider wishes to create a wish list 4007, a similarprocess is followed: a new record is created 4008 and items that thewebsite provider would like to acquire are added to the wish list 4009.The process is repeated 4010 as necessary. If the website providerwishes to edit an existing list 4011, he or she can also do so 4012.

Once at least one wish list or inventory list has been created, thewebsite provider can choose to assign the list to a URL that has beenregistered with the Company 4013. This is done through the “MyRegistered URLs” page 4014, where assignments of lists to URLs are made4015 by clicking on the name of the list currently assigned to the givenURL (or “add” if no list is assigned) to visit another submission form(not depicted) through which he or she can choose from a list ofavailable lists.

FIG. 41 depicts a process by which the UTU user uses the universalshopping cart utility function of the UTU. The website providerregisters with the UET Company, gets bonded per the Harrison bondedpayment system, and provides electronic funds transfer information for areceiving account into which funds collected from buyers will bedeposited 4101. The UTU user registers, gets bonded and provides paymentaccount information, such as a credit card account, bank account, orother account from which funds to pay for purchases made through the UTUare to be drawn 4102. The website provider creates an inventory list4103 per the process in FIG. 40A. The UTU user logs into his or heraccount through the UTU and uses the UTU 4104 per the process in FIG.38. If the UTU user wishes to purchase something in the websiteprovider's inventory 4105, the UTU user checks the checkbox next to theitem or items and clicks the “add to cart” button 4107. The selecteditems are then marked as “reserved” in the UET company database recordpertaining to the given inventory list. When an item is reserved, it nolonger is displayed when the given inventory list is displayed in theUTU but appears in the shopping cart of the UTU user who has reservedit.

If the UTU user wishes 4110, he or she can visit other websites and addmore items to his or her shopping cart 4111 from other vendors unrelatedto the aforementioned website provider. Thus, instead of filling outmultiple purchase forms and registering with multiple web vendors, theUTU user can buy from any number of vendors through a single interface:the UTU.

When the UTU user is ready to checkout 4112 and confirm the purchases inhis or her cart, he or she clicks the “checkout” button 4113, reviews alist of the items in his or her cart (not depicted), and clicks “confirmpurchases”. The UTU user's confirmation can be processed directlythrough the UTU, or, alternately, this last step of the process can behandled through a Web form on the UET Company website. Once the UTU userconfirms the purchases, the amount due is charged to the payment accountpreviously provided 4114. If the payment is not successful 4115, e.g., acredit card is declined, the UTU user is notified and instructed tocontact the Company 4116. Otherwise, funds are then wired to the websiteprovider's receiving account previously provided 4118, minus anyprocessing fees charged by the UET Company, etc. If the electronic fundstransfer is impossible for some reason 4119, the website provider'sfunds are held by the UET Company and the website provider is notifiedand requested to provide a valid receiving account 4120. In any case,once funds have been collected from the UTU user, the purchased item ismarked “sold” and is no longer visible through the UTU nor available forpurchase 4121. The website provider is then instructed to deliver theitem immediately 4122. If the UTU user does not confirm his or herpurchases before ending the UTU session during which they were reserved,these items are removed from reserved status so that other users maypurchase them.

FIGS. 42A and 42B illustrate the difference between usage of a URLIT forUAML listings and usage of a URLIT-stem for UTU purposes. In the contextof UAML listings, the URLIT serves both a security/authenticationpurpose and a transaction identification purpose. Thus, a given URLITcan only be used for one UAML listing. If a URL is reused for anotherUAML listing, a new URLIT must be used; usage of a URLIT that hasalready been used for a previous listing will result in rejection underthe validation process depicted in FIG. 12A.

Meanwhile, however, transactions that take place through the UTU do notrely upon the URLIT as a transaction identifier. In this case,therefore, a one-to-many relationship is possible. Thus, within thecontext of the UTU system, a URLIT-stem can be reused for multipleiterations of a web page at the particular URL for which that URLIT-stemwas generated and assigned, provided that this URLIT-stem is correctlytagged as such in the UAML embedded in the web page.

FIG. 43 depicts data relationships underlying the UTU system. Thewebsite provider's web page 4301 hosted by the website provider'scomputers 4304 includes embedded UAML tags identifying a URLIT-stem4302. The UTU 4303 transmits the URL being browsed by the UTU user tothe UET Company's computers 4305. This URL is compared to the registeredURLs in the registered URLs database, and provided that there is a matchand that the URLIT-stem in the website provider's web page is theURLIT-stem assigned to the registered URL in the registered URL databaserecord 4306, the inventory list or wish list from the inventory databaseor wish list database associated with the given URL is retrieved fromthe inventory and wish list database record 4307 and transmitted to theUTU 4303. The UTU user clicks to expand it and thereby view theinventory and/or wish list(s) that the website provider has associatedwith the URL.

FIG. 44 depicts the data relationships between the various inventorylists that various website providers have assigned to registered URLsand the shopping cart that the UTU user uses to purchase from thesewebsite providers all through the same shopping cart vehicle hosted bythe UET Company. The UTU universal shopping cart feature eliminates theneed to register with individual website providers, to go through adifferent checkout process with each website provider, or otherwiseundergo redundant steps. Avoidance of such redundancy not only savestime and makes online shopping easier, but, in reducing the number ofseparate site registrations and purchase transactions, minimizes therisk of improper usage of users' personal information, such as identitytheft.

The UTU user visits a first website and through the UTU views theassociated inventory list 4401, adding an item to his shopping cart 4402as per the process depicted in FIG. 41. Then the user visits a secondwebsite and adds another item to his shopping cart 4402 from theinventory list 4403 associated with the second site. The user thenvisits a third website, views the inventory list 4404 associated withthe given URL in the UET company database complex, and adds another itemto his or her shopping cart 4402. Since both the inventory lists andshopping cart are hosted on the UET Company's computers 4405, when it istime to checkout, the UTU user can simply checkout but a single time andpurchase thereby multiple items from multiple vendors.

FIG. 45 depicts an alternative embodiment of the UTU. This toolbar,geared toward the promotion and financial support of nonprofitinstitutions, provides both a “Site Provider Supports” field 4501 and an“I Support” field 4502. Participation in this mechanism is accomplishedon the part of the website provider by way of a process depicted in FIG.47. The UTU user, meanwhile, selects the organization that he or shesupports directly from the UTU itself, which displays a pop-up menu 4601for the “I Support” field as depicted in FIG. 46. The options availablein the “I support” field are the names of the organizations that havesuccessfully activated a record in the donees database through theprocess depicted in FIG. 47. The UTU user can select his or herpreferred donee from the pop-up menu, and a portion of the proceeds fromhis or her purchases through the UTU goes to whichever donee is theselected donee at the time the given user checks out.

FIG. 47 depicts a process by which a donee database record is createdand activated, the website provider designates a donee for UTU sales,and the UTU user designates a donee for UTU purchases. A nonprofitorganization logs into its account at the UET Company 4701 and providesevidence of its nonprofit status, qualification as a 501(c)(3)corporation, etc. If the UET Company staff determines that the nonprofitorganization is qualified 4703, a new record is created in the doneesdatabase 4704, the nonprofit organization is notified, and the nonprofitorganization is requested to provide additional information as requiredin the new record 4705, such as electronic funds transfer information.If all required information is submitted 4706, the nonprofitorganization's record in the donee database is made active 4707.

The website provider logs into his or her UET Company account, and if heor she wishes to have a portion of the proceeds of sales conductedthrough the UTU donated to a qualified nonprofit, selects a donee fromthe active donees 4708. As discussed in reference to FIG. 46, the UTUuser can also select a donee from the active donees 4709. Thereafter, aportion of proceeds from sales and/or purchases conducted through theUTU are donated to the registered nonprofit user or users designated bythe website provider, UTU user, or both 4710. Business rules establishedby the UET Company can fix the percentage of the transaction valuedonated, or the registered user account of a given donor can provide afield wherein a percentage is set by the donor correctly.

Business rules established by the UET Company can also provide thatdonors are charged for donations or an alternate scheme can beestablished, such as absorption of some or all of the cost of thedonation by the UET Company, or matching of donations by the UET Companyor by a third party 4711. The tax deduction is treated according toapplicable law.

FIG. 48 depicts a process whereby a “seal of approval” can be displayedby the UTU when environmentally friendly websites are being viewed. An“eco-user” who wishes to be approved as an “eco-operative” logs into itsUET Company account 4801 and applies to be an eco-operative 4802. Thisapplication includes demonstration that the eco-user, such as anonprofit or governmental agency, is competent to determine whether awebsite provider adheres to particular environmentally friendlystandards. If the UET Company staff determines that the eco-user isqualified 4803, a new record is created in the eco-operatives database4804, and the fields of the record are populated with informationpertaining to the eco-user.

Thereafter, a website provider logs into its UET Company account andapplies for a seal of approval from the eco-user 4805. The eco-user theninvestigates the relevant practices of the website provider or the hostof the website provider's website 4806. If the provider or its websitehosting service meets the requirements for the given eco-user's seal ofapproval, the relevant URL or URLs are added to the given eco-user'sapproved list 4807. Then, when a UTU user visits the approved webpage(s), the UTU displays the eco-user's seal of approval 4808 asdemonstrated in FIG. 49.

FIG. 49 depicts a UTU embodiment that includes the eco-operative seal ofapproval feature. As shown, a “Solar-Powered” icon appears in thetoolbar, indicating that the given URL is controlled by a websiteprovider or hosted by a website hosting service that has been approvedby the eco-user who offers the “Solar-Powered” seal of approval.

As demonstrated above, a wish list or inventory list can be created fordisplay through the UTU when a given URL is being browsed by a UTU user.FIG. 50 depicts a process by which contacts form or auction canalternately be created for display in the UTU. The website provider logsinto his or her account at the UET Company 5001 and visits an“In-toolbar options” page 5002, where he or she can choose to create anin-toolbar submission form 5003 or in-toolbar auction 5004. If thewebsite provider chooses to create a submission form, a new record iscreated in the in-toolbar submission forms database 5005 and the websiteprovider specifies fields to be included in the submission form 5006through a submission form such as that depicted in the example in FIG.51. If the website provider chooses to create an in-toolbar auction5004, a new record is created in the in-toolbar auctions database 5007and the website provider provides information pertaining to the auction5008 through a Web submission form, depicted in the example in FIG. 52.Finally, as with wish lists and inventory lists, the website providerthen visits the “My Registered URLs” page and designates which URLs willallow display of the auction 5009. The contact form, however, willdisplay through the UTU any time the “e-mail [user name of websiteprovider]” link is clicked in the UTU. Alternately, this link can be aconventional “mail to” link, of which the e-mail address is that whichthe website provider designates, or a link to a Web submission formhosted on the UET Company site. If an in-toolbar contact form is used,the submission is processed through the UET Company servers andforwarded to the website providing user at the e-mail address associatedwith the website provider's registered user account.

FIG. 53 depicts a process by which another optional feature is used. The“iTicker” is a UTU function to which UTU users can subscribe so as to bepresented with scrolling headlines that are provided by a chosen source.These headlines can be provided by any approved iTicker provider, andare especially well-suited for distribution of information to members oflong-standing group affiliations, such as school alumni, club members,church members, and enthusiasts (sports team fans, etc.).

An iTicker provider logs into his or her account at the UET Company 5301and applies for iTicker provider status 5302. This application mayrequire demonstration of affiliation with the particular group to whichthe proposed iTicker headlines and content will be directed, i.e., if aniTicker provider wishes to provide headlines for alumni of a particularschool, the UET Company may require the iTicker provider to demonstrateits official capacity to represent that school. If the iTicker provideris approved for iTicker provider status 5303, a new record is created inthe iTicker provider's database 5304 and the iTicker provider inputsheadlines and URLs to be associated with these headlines into theiTicker provider record 5305, which can be maintained and updated asoften as the iTicker provider wishes so as to keep the content fresh.Although not necessary, the UET Company may wish to require that the URLassociated with a given headline be the address of a web page that isproperly UAML-enabled so as to be a valid “news” UAML listing 5306.

After the iTicker subscription has been made available 5307, the UTUuser can subscribe to the given iTicker provider's iTicker 5309 suchthat when the UTU is in use, the iTicker headlines provided by theiTicker provider are displayed in the UTU in scrolling form and can beclicked if the UTU user wishes to view the article associated therewith5310. FIG. 54 depicts a UTU embodiment with iTicker function 5401.

FIG. 55 depicts a chart of example UAML tags or elements common tovirtually all listings, including one element identifying the UAMLmarkup language (or namespace, if XML is to be used to implement theinvention); an element declaring the LTD/type of listing; one describingthe URLIT; one identifying the UET Co. through which the listing is tobe processed (more than one UET Co. may exist), inc. a child elementlink (in HTML) to the UET Co.; and one describing the lister's user ID.Some elements are to contain only PCDATA; others should contain bothprescribed data (e.g., “Seller:”) and one or more child elements,including HTML elements to be captured for validation purposes, e.g., toverify that the lister ID links to UET Co. page associated with lister'sUET account or that a proper image reference to URLIT-enabled imageexists. Such validation of HTML elements (to appear in UAML “phrase”elements) is crucial to insure that listings display in browsers per UETstandards. These common elements can only appear once in a valid UAMLlisting document, and omission or deviation from mandatory content(URLIT, link, etc.) is fatal to listing approval.

FIG. 56 depicts an abstract template of nomenclature used in figurespertaining to subject-specific vocabularies. Specifically, for thisdisclosure, each tag begins with “UAML” to denote that the tag elementpertains to the present invention; a different name may be used in agiven implementation. Each tag then names a subject-specific databasewhich, in addition to the central listings database, is to storeinformation extracted from UAML-described elements. For instance, a coinlisting involves a record in the central listings database and a recordin the coin listings database, the subject-specific database. Finally,each subject-specific tag includes the field name into which datadescribed by that tag is to be entered.

FIG. 57A depicts a chart of an example subject-specific tag vocabularyfor use with collectible coin listings. FIG. 57B depicts such avocabulary for car listings. FIG. 57C depicts such a vocabulary for realestate listings. FIG. 57D depicts such a vocabulary for job listings.FIG. 57E depicts such a vocabulary for personal ads. FIG. 57F depictssuch a vocabulary for book listings, which, preferably, rely primarilyupon the ISBN of the given book for easy and reliable grouping andindexing, since book names and other identifiers may be oftenmisspelled; notice that the database in these tags is called “ISBNlistings” so as to distinguish from “ISBN reviews”, a database andlisting type for book reviews. FIG. 57G depicts two separatevocabularies, one for product listings which rely primarily upon the EPCof the given product, another for product listings which rely primarilyupon the UPC of the given product for easy and reliable grouping andindexing, since product names and other identifiers may be oftenmisspelled.

FIG. 57H depicts such a vocabulary for use in a listing for a lendinginstitution. This vocabulary includes a special tag for use with webpages that include dynamically generated, variable content, the tag thatincludes the “Dyn” letters. Data described by this tag is not stored bythe UET Company. Rather, when a search is done on this field, the datais looked up from the listing page itself in real time. In this way, theUAML technology, designed to enhance the functionality and searchabilityof static web pages, can also be used to search dynamically changingpages more effectively than the related art allows. This approach allowsdata that changes rapidly, such as interest rates offered by a lender,to be looked up for current values each time such is necessary.

FIG. 58 depicts the process of using UAML in dynamically generatedpages.

Search results can also be obtained using nontraditional means ofsubmitting search queries. FIG. 59A depicts the process through whichautomatic data capture hardware, such as a bar-code scanner or RFIDreader, can be used to perform a search of UAML enabled listingsthroughout the entire World Wide Web. First, the automatic data capturemechanism, coupled to a computer including a computer monitor, is usedto scan a product for its RFID tag or bar-code number, a UPC or EPCnumber 5901. This information is submitted to the UET Company, and asearch is then performed in the appropriate field of the appropriatedatabase 5902 on the given identification number. These results are thenreturned to the user 5904 in the form of a hypertext document thatincludes links to listings for the given identified product.

The barcode reader can also be used in an alternative embodiment (notshown) optimized for real estate. A URLIT can be encoded in barcodeform, placed on a “For Sale” sign that is installed at a property, andthen scanned by an interested party. The listing associated with theURLIT is then looked up for more information on the property.

FIG. 59B depicts the process through which a telephone can be used toperform a search of UAML-enabled listings throughout the entire WorldWide Web. A user calls a telephone number dedicated to this purpose and,when prompted, enters the ISBN number of a book for which he or shewishes to search 5911. Menu options the UET Company wishes to offer,such as sorting preferences, can also be selected 5911. A search is thenperformed in the ISBN listings database and the results are rankedaccording to the user selected preferences, if any 5912; default rankingis by price in ascending order. Text-to-speech technology is then usedto read the nine top results to the user, each result (book title,price, seller ID) being identified by a digit 5913. If the user wishesto purchase 5914, he or she enters the digit corresponding to theresults desired. The user then enters his or her user ID and personalidentification number, etc., and confirms the purchase 5915. The sale isprocessed as other sales, with funds being drawn from the buyer'spayment account and funds being wired to the seller's receiving account,the seller being notified by e-mail of the sale, etc. 5916.

FIG. 59C depicts the process through which an e-mail can be used toperform a search of UAML-enabled listings throughout the entire WorldWide Web. First, the e-mail, using the disclosed markup language called“EQML”, is written per the process depicted in step box 5921. The e-mailis then e-mailed to the UET Company at an e-mail address dedicated tothis purpose 5922. The EQML text in the e-mail is then parsed and asearch performed according to the criteria specified in the UAML-enablede-mail 5923. The results for each search query defined in the user'se-mail are then e-mailed back to the user 5924. An example of anEQML-enabled e-mail 5931 appears in FIG. 59D. Note the structure of anEQML document: the EQML language (or root element, or namespace, whereapplicable) is specified, and then each separate query is defined in aseparate element. Each query element includes child elements such as: anID number element that identifies one query as opposed to other separatequeries in the same document; a database element; an element specifyingthe field to be searched and the search string; an element specifyingthe field by which results should be sorted; an element specifying thesort order; an element specifying the number of results desired.Additional or alternative tags can be used; some elements can be omittedand default values used.

FIG. 59E depicts an e-mail from the UET Company to the UET user in whichthe results of the queries submitted by the e-mail depicted in FIG. 59Dare provided to the submitting user.

12. Userithm Search Engine (USE) Subsystem

The Userithm search engine (USE) system allows a user to design his orher own search algorithm in real time, on-the-fly. Although the USEsystem can be used with a wide variety of databases and databasecontent, including databases of articles, court cases, statutory law,patents, dictionary or thesaurus entries, business records, etc., theillustrative case of the World Wide Web is used herein to demonstratethe function and benefits of the USE system. Specifically, the USEsystem disclosed herein represents a superior technique for locatingrelevant documents in response to a search query by a user attempting tofind information on the World Wide Web.

FIG. 60 depicts an overview of the process through which the user usesthe Userithm search engine. The UET Company provides a search pagethrough which clusters of information, called “search components,” canbe input by the user and transmitted to the UET Company. The useraccesses the search function by visiting the search page on the UETCompany website 6001. The user then defines one or more searchcomponents per the search component definition process 6002 and submitshis query 6003. A search, including a separate search for each searchcomponent as described below, is performed and results are rankedaccording to the search and ranking process 6004. Results of the searchare provided to the user 6005 along with gauges of the performance ofeach result under the individual search components 6006. The user canthen view the search results and performance gauges and refine his orher search as necessary. A wide variety of additional steps can also beperformed as described below.

FIG. 61 depicts an excerpt from a web page including a Web submissionform whereby the user search query can be submitted. Included are three“search components” 6105 a, 6105 b, and 6105 c. Each search componentincludes a weight field, a search term field, and a search methodologyfield. For instance, in search component A 6105 a, a field is providedwherein a user can enter a weight 6102, a word or group of words to besearched 6103, and a selection 6104 from radio buttons provided in thedepicted search methodology menu.

The process for defining search components through an interface such asthe various example submission forms disclosed herein is depicted inFIG. 62. Provided that a search methodology selection is available 6201,the user selects the methodology from the given search methodology menu6202 for the given search component. Provided that usage of a searchterm is applicable 6203, the user provides a search term or terms forthe given search component 6204. Provided that intracomponent weightassignments are applicable 6205, the user provides intracomponentweights for subcomponents of search components 6206. Provided thatintercomponent weights are applicable 6207, the user sets a weight forthe given search component 6208. If ideal-setting is allowed 6209 as inthe search interface depicted in FIG. 80, the user inputs an ideal 6210pertaining to the given variable. Provided that the given searchcomponent allows user input of tolerances 6211, the user inputs atolerance pertaining to the given ideal 6212. If the user wishes todefine more search component 6213, the process is repeated 6214 for eachsearch component. Once all search components have been defined 6215, thesearch is ready for submission.

FIG. 63 depicts an overview of the search and ranking process. If agiven search component is “compound”—meaning that it containssubcomponents 6301, which are individual searches to be performed andthen combined to establish the score of a document under the compoundcomponent—then the subcomponents search and ranking process is performedfirst 6302 and for each other compound search component 6303. If thesearch contains a simple component 6304, then a separate search isperformed for each simple component 6305 under the algorithm describedby the user-input criteria of that search component, i.e., the selectedmethodology, terms, etc. Each separate search component therefore yieldsa separate raw score list 6305. Each individual raw score is thennormalized 6306 to a single scale, such as 0 to 100, where 0 representsthe lowest performing page and 100 represents the highest performingpage under the given search component, thereby producing a normalizedscore for each document for each search component. Normalization isaccomplished through a process depicted in FIG. 68A. Each normalizedscore is then multiplied by the user-assigned weight for the givensearch component 6309, and the weighted values assigned to each pageunder each search component are combined to yield a single overall score6309. Results are then ranked according to their scores.

FIG. 64 depicts the subcomponents search and ranking process. Anindividual search is performed according to the specified or defaultmethodology for each subcomponent 6401, yielding a raw score for eachdocument for that subcomponent. Results for each subcomponent are thennormalized 6402. The normalized results under each subcomponent aremultiplied by the weight assigned to the given individual subcomponent6403. The process is repeated for each other subcomponent 6404. Theresulting weighted values are combined to form a single overall scorefor each document 6405. The overall scores for each document are thennormalized again 6406 and then multiplied by the weight assigned to thewhole compound component by the user 6407.

FIG. 65 depicts an example of a primary USE submission page, where“primary” means that the depicted interface provides only the fieldsnecessary for simple search component definition; no compound componentsappear in this particular search definition interface. In the depictedexample, the user has assigned a weight of “50” to the first searchcomponent, a weight of “10” to the second search component, and a weightof “10” to the third search component. The user-provided search term ofthe first search component is the word “guitar.” The search methodologyselected by the user for this first component is “pay-for-placement,” asearch methodology under which pages are ranked according to the amountbid by an advertiser, e.g., U.S. Pat. No. 6,269,361 to Davis.

The user has also input the term “guitar” as the search term for thesecond search component, but has selected the “links to” methodology forthis search component. The links to methodology ranks pages according tothe number of link citations to the given page, as per the methodologydepicted in U.S. Pat. No. 6,285,999 to Page, or a similarinterconnectedness-based ranking methodology.

The step of selecting a methodology can be broken out such that a userfirst selects a methodology and then inputs search terms and weights;FIG. 66 depicts a submission form for use in such an embodiment.

FIG. 67 depicts a chart of example search methodologies that can beoffered as options in the search methodology menu available to eachsearch component. This list is not intended to be exhaustive but simplyillustrative.

FIG. 68A depicts the process of normalizing the scores of items beingranked to a single scale (0 to 100 in this case). Normalization isnecessary so that scores from separate searches can be combined in ameaningful way.

The score of a page A according to the present invention can be defined,as depicted in FIG. 68B, asr1(A)=w1(r2(A))+ . . . +wn−1(rn(A))where r₁(A) is the overall score of page A; r₂(A), . . . , r_(n)(A) arethe normalized scores of A under each individual search component; andw₁, . . . , w_(n-1) are the weights individually assigned to each searchcomponent by the user.

This formula is applied in the examples depicted in FIGS. 69 through 71.FIG. 69 provides an example of a normalized score list and a resultingweighted score list of a hypothetical set of ten pages under ahypothetical first search component with a user assigned weight of “50”,such as the first search component depicted in FIG. 65. FIG. 70 depictsan example of a normalized score list and a resulting weighted scorelist of the hypothetical set of 10 pages under a hypothetical secondsearch component with the user assigned weight of 10, such as the secondsearch component depicted in FIG. 65. FIG. 71 depicts a final ranking ofthese ten pages, wherein the weighted value of each page under the firstsearch component is combined with the weighted value of that page underthe second search component to produce a final value, the score of thegiven document. Documents are ranked according to their scores asdepicted in the overall rank list in FIG. 71.

In order to maximize the utility of allowing users to define their ownsearch algorithms, users may also be provided with immediate feedback onthe performance of the search components they have designed. FIG. 72provides a template for such a feedback mechanism. In this abstractsearch results page, a first column from the left displays the URLs ofranked documents in order of their overall rank. A next column displaysdocument scores under the first search component's search criteria.Another column displays document scores under the second searchcomponent's search criteria. Another column displays document scoresunder the third search component's search criteria, and so on.

FIGS. 73 and 74 depict the search component gauge in an example usage.Referring to FIG. 73, a URL 7301 of a document is displayed in the firstcolumn; the rank of the document under the first search component isdisplayed in the second column 7302; and the rank of the document underthe second search component is displayed in the third column 7303.Referring to FIG. 74, an example results page geared specifically forsearching auctions, gauges of the performance of each document undercertain subcomponent searches are displayed. For instance, in a searchwhere the user has allotted some weight to longevity and feedback scoresof sellers, ranks of the sellers of the searched items under thesecriteria are provided, specifically, the longevity ranking 7401 and thefeedback ranking 7402 (different from a feedback rating) of a givenseller.

FIG. 75 depicts an excerpt from an example web page containing a Websubmission form through which an advanced USE search can be performed,“advanced” referring to a USE embodiment which provides one or morecompound search components. The embodiment in FIG. 75, optimized for usewith an Internet auction system, provides two simple search componentsas well as a group of subcomponents that together form a third“compound” search component, “compound” signifying that a searchcomponent is enabled for processing that occurs at the intracomponentlevel—between subcomponents—prior to processing at the intercomponentlevel. Specifically, as depicted, a number of fields are provided intowhich a user can put a weight on a particular attribute associated witha seller or item in an auction environment, such that the weight is usedto place relative importance upon one subcomponent as opposed to anothersubcomponent. Thus, for instance, in the depicted example, the user hasinput a weight of 10 into a “bonded or insured” field 7501, a weight of5 in a “feedback total” field 7502, and a weight of 10 in a “feedbackratio” field 7503, thereby establishing the relative importance ofsearch results obtained under searches performed for these threesubcomponents relative to each other.

FIG. 76 depicts an example of a compound search component that includessubcomponents optimized for searching stocks. As depicted, this advancedUSE allows user entry of an individual weight for each subcomponent.Thus, a user can assign the relative emphasis to be placed upon theresults of each search under one subcomponent relative to the resultsunder other subcomponents. Note that a user does not have the option ofselecting a search methodology for each subcomponent; the searchperformed under each subcomponent is performed according to a defaultmethodology that is specific to that subcomponent, e.g., a “book value”subcomponent searches records pertaining to stocks and scores themaccording to book value; a “P/E ratio” searches stock records and scoresthem according to price-earnings ratio. The user simply defines whichvariable is more important to him or her.

FIG. 77 depicts an alternative embodiment of a compound search componentoptimized for searching bonds, including subcomponents with defaultmethodologies for ranking bonds by grade, interest rate, etc.

FIG. 78 depicts an alternative embodiment USE optimized for searchingmutual funds, including subcomponents with default methodologies forranking mutual funds according to their performance over different timeperiods.

FIG. 79 depicts another alternative embodiment USE optimized forsearching mutual funds, including subcomponents with default searchmethodologies for ranking mutual funds according to the types of assetsin which the given mutual invests.

FIG. 80 depicts a “level 2” advanced USE. In a level 2 advanced USE, thesubcomponents can be assigned not only a weight but also an ideal, i.e.,a value that sets the standard against which other values are measuredwithin the given subcomponent's search results. For instance, a user mayassign a value of “3” to set the standard for the number of bedrooms.Given this value as the standard, units with three bedrooms score themaximum under this subcomponent, while units with two bedrooms or fourbedrooms score lower, while units with one bedroom or five bedroomsscore even lower. Meanwhile, emphasis on search results from thissubcomponent relative to those from other subcomponents is establishedby user-assigned weight.

FIG. 81 depicts a level 2 advanced USE embodiment optimized forsearching job listings. Here, the user sets his or her ideal value fornumbers of hours of work per week, for instance, and available positionsare ranked under a “hours per week” subcomponent according to how closeeach listed position comes to the user's ideal. Intracomponent weightingis again performed according to weights input by the user.

FIG. 82 depicts a level 2 advanced USE optimized for searching anautomobile ad database, again providing data entry fields through whicha user can assign an ideal and a weight to a given subcomponent. In thisparticular example, a field is also included whereby a user can submitan e-mail address where search results can be sent.

FIG. 83 depicts a variation of the level 2 advanced USE embodiment thatprovides two search components having subcomponents, optimized forsearching a personal ads database. In this example, the results fromeach of two depicted compound components can be weighted relative toeach other. Specifically, a given record is ranked according to eachsubcomponent in a “physical traits” compound component and these resultsare weighted and combined to produce a single score for that compoundcomponent. The same is done for a “personal traits” compound component.Then the result of the physical traits component is combined with theresult of the personal traits component according to the user assignedweights of each compound component so as to produce a single overallscore for the given record.

FIG. 84 depicts a level 3 advanced USE. In a level 3 advanced USE, notonly can a weight and an ideal be assigned to a subcomponent, but also atolerance level with respect to variation from the ideal can beassigned. The tolerance level essentially serves as a filter mechanismas opposed to a scoring mechanism. In other words, records fallingoutside of an acceptable level of variation get no score under thesearch component. Alternately, at the choice of the given UET Company,records that exceed the tolerance set by the user can be excluded fromsearch results altogether.

In either case, the syntax a user uses to enter a tolerance level thatcan be properly processed can take whatever form the UET Company choosesto support. For instance, the tolerance level can be specified using apercentage accompanied by a plus (+) or minus sign (−); an integer thatsimply indicates how many units away from the ideal threshold an itemcan fall before exclusion; a greater than/less than relationship; or anyother relative or absolute indicator that will serve to establish ameaningful boundary for acceptable variation.

Thus, in FIG. 84, a search algorithm input form is depicted thatincludes two simple search components, A and B, and one compound searchcomponent, C. The compound search component provides subcomponentswhereby searches on language, length, author rating, publication rating,and freshness of an article can be defined. Each subcomponent provides adata entry field for ideal, weight, and tolerance assigning for thegiven subcomponent. As shown, for the length subcomponent, the user hasinput “+50%/−5%” to indicate a willingness to accept articles that areup to 50 percent longer than the user-established ideal length (400words in the depicted example) and down to 5 percent shorter than thisideal length. The user has entered a “0” in the tolerance field forauthor rating to indicate that no variation from the ideal is acceptablein this subcomponent. The user has entered a “+” in the tolerance fieldfor the publication rating to indicate that variation of any magnitudeis acceptable provided that this variation is positive, i.e., valuesgreater than the user-established ideal are acceptable and values lessthan the ideal are not.

FIG. 85 depicts a variation of the level 2 advanced USE in which onesearch component, labeled “must have”, serves as a filter, while thesecond component, labeled “prefer to have”, serves to rank results thathave passed through the filter. The particular example is a USEoptimized for searching airline flights.

FIG. 86 depicts a primary USE with but a single field. This particularembodiment, of course, is attractive for its simplicity. Rather thanhaving separate fields for selection of a search methodology and inputof user-assigned weights and search terms, all three characteristics ofa simple search component are input using operators that are parsed bythe UET Company computers after submission by the user.

Thus, in the depicted example, the first search component is defined viatwo main parts: (I) a search term (“finger-picking”) and (II) someinformation in parentheses. The information in parentheses identifies asearch methodology to be used in the search under the given searchcomponent and a weight to be assigned to results of the given searchcomponent relative to other search components. Specifically, a numberappears first and then is separated by a comma from a methodologyselection. Thus, following the first search term in the depicted exampleis the information “(25, linksto)”. This information puts anintercomponent weight of “25” on the first search component and selects“linksto” as the search methodology for the first search component. Twomore search components as input by the user are included in the depictedexample.

13. USE Subsystem: EQML Integration

FIG. 88 depicts an example of an e-mail through which a USE query can besubmitted to the UET Company, thereby providing the same power andflexibility afforded by the submission form embodiments depicted abovewhile using e-mail as the submission medium. As depicted, EQML tags areused to denote a database to be searched, a search methodology for eachcomponent, an intercomponent weight for each component, a search termfor each component, and so on.

FIG. 89 depicts an example of an e-mail returned to the UET user by theUET Company in response to a search query submission submitted by ane-mail such as that depicted in FIG. 88. Results are returned to theuser, including the Web address of each result and performance gaugeinformation pertaining to each result.

FIG. 90 depicts the process by which e-mail is used to tap the USEsubsystem.

14. USE Subsystem: The “Build-Your-Own Search Engine” Feature

FIG. 91 introduces an extension of the USE concept: the “Build Your OwnSearch Engine” system. FIG. 91 depicts an excerpt from a sample web pagethat includes a Web submission form through which a user can selectfeatures to be included in a search engine interface that the user canthen embed in his or her own website. The search itself is stillconducted through the UET Company computers, but the user can pick andchoose what features will be included in the particular search engineinterface.

Specifically, the user follows the process in FIG. 92: First, the userchooses which UET Company databases are to be searched 9201. Next theuser selects the number of simple search components that are to beoffered 9202. The user then selects which search methodologies are to beavailable for use with each simple search component 9203. The user thenchooses how many, if any, compound components are to be offered 9205.The user then chooses which subcomponents are to be included in eachcompound component 9206. The user then specifies whether intercomponentweighting 9207 is to be offered (if not, then each search component isequally weighted), and, if compound components are used, whetherintracomponent weighting 9208 is to be offered. If compound componentsare being used, the user indicates whether ideal setting is to beoffered 9209 and whether tolerance setting is to be offered 9210. Theuser then specifies whether results are to include search componentperformance gauges 9211. Once the form has been submitted, the HTML tobe included in the web page where the user is to host his or hersubmission form is e-mailed or otherwise provided to the user 9212.Queries submitted through the user's submission form are then processedby the UET Company as normal 9213.

15. USE Subsystem: Lexivote Ranking Methodology

Allowing users to design their own algorithms and manipulate the powerof multiple search methodologies, as demonstrated above, is a powerfultool. However, the power of the USE can be even more fully realized whencombined with a more powerful relevancy ranking methodology than therelated art provides.

The Lexivote ranking methodology essentially allows a search engine userto interview millions of other users to find documents most relevant tohis or her query. Specifically, a database of “word-votes” is created,then populated over time through user input, and then searched inresponse to a search query so as to provide the most relevant documentspertaining to the term or terms searched.

A word-vote, in its simplest form, is a pairing of two data: (I) a worddatum and (II) a URL datum. Thus, a given word-vote could be a groupsuch as “music” and “http://www.performer.org”. A word-vote databaserecord, in its simplest form, has two corresponding fields: the worddatum field and the URL datum field.

Word-votes are cast one at a time by individual users. Specifically, theuser inputs a word and inputs a URL that he or she believes to be theURL of the best resource pertaining to that word.

A query for use in the Lexivote system is, in its simplest form, a word.When a query consisting of a word is submitted for a search under theLexivote methodology, the word-vote database is searched for matchingword-votes. A matching word-vote is a word-vote record in which the worddatum in the word-vote vote matches the query word.

Results of the search are ranked using matching word-votes. In itssimplest form, the score of a document A under a Lexivote searchaccording to the present invention isr(A)=mwhere r(A) is the score of the document A and m is the number ofmatching word-votes in which the URL is the same as the URL of documentA.

Thus, for instance, assume that users have cast exactly 1000 word-votesin which “music” is the word, and, of these 1000 word-votes, exactly 7of them contain “http://www.performer.org” as the URL. When a query onthe word “music” is submitted, there are 1000 matching word-votes, andthe score of the document appearing at the URL http://www.performer.orgunder the submitted query is 7.

Complexity and subtlety can be added to the process quickly. Forinstance, the word datum in a word-vote can be a phrase or almost anycharacter string rather than just a single word. A word-vote can includemore than one URL-datum field, such that there can be a one-to-manyrelationship between the word/phrase datum and the URLs associated withthis datum in a single word-vote database record.

In such a one-to-many word-vote, the URL data fields can be weightedsuch that a user puts his or her favorite URL in first, his or hersecond favorite URL in second, and so on. Then, instead of the score ofthe document being simply the number of matching votes that include theURL of the document, such matching votes are weighted according to thepriority of the given URL in each matching vote. Greater weight isassigned to the first URL than to the second URL, and greater weight isassigned to the second URL than the third URL. A formula for scoringunder such an approach appears in FIG. 98B.

Additionally, word-vote derivatives can be included. A word-votederivative is an additional datum derived from a word-vote. Forinstance, every word-vote database record can include an additionalfield that is automatically populated with simply the domain nameappearing in the URL datum. This domain name field can then be used in asecondary ranking methodology: when the basic Lexivote rankingmethodology yields rankings that are very close together, the domainname field is used in a sort of “tiebreaker” methodology; a URL thatincludes a more popular domain name ranks higher than the URL thatincludes a less popular domain name.

The Lexivote system is further explained in reference to the figures.FIG. 93 depicts an example of an excerpt from a web page 9301 thatprovides a search query submission form. Also included are the fieldsnecessary for submission of a word-vote to a Lexivote system operated bythe UET Company. Specifically, the user chooses a word or phrase toenter in the word datum submission field 9302 and then enters into theURL datum submission field 9303 a a URL that identifies the web pagethat he or she believes to be the most relevant page associated with thegiven word or phrase. If the user wishes to submit more than one URL tobe associated with the chosen word, he or she can enter them in theadditional “Favorite Website . . . ” fields provided 9303 b, 9303 c. Theuser then submits both his search query and his word-vote by clickingthe “search” button.

While FIG. 94 depicts a process by which the Lexivote system can beimplemented without the use of registered user accounts, this approachis particularly vulnerable to abuse. The preferred embodiment thereforeis that depicted in FIG. 95, which is based upon registered useraccounts. Through this approach, several quality control measures can beimplemented. For instance, by allowing only registered users to castword-votes and preventing any registered user account from including aduplicate word-vote, i.e., a word-vote in which the word datum isidentical to that of another word-vote, the given user account can belimited to one word-vote for any given term. This measure will help toreduce the likelihood of attempts to “stuff the ballot box.” (Note thatthe presence of multiple word-votes cast by the same user and includingidentical URLs as the URL data is not problematic; certainly, the samewebsite can be a user's favorite website pertaining to a variety ofdifferent words.)

Thus, in the preferred embodiment, the user logs into his or her UETCompany account 9501 and uses the UET search engine 9502. Atpredetermined times, intervals, or events, the user is asked to cast aword-vote 9503; the UET Company can choose to follow some suggestedtiming criteria depicted in FIG. 96 for requesting users to submitword-votes or adhere to a schedule of its own design.

Over time, as more and more users participate in the Lexivote system andcast more and more word-votes, the word-vote database grows richer andthe Lexivote ranking methodology more effective.

FIG. 97 depicts an example weighting scheme for use in an embodiment inwhich one-to-many relationships are possible in word-votes.

FIG. 98A depicts a process through which pages are ranked according toword-votes. First, registered users cast their word-votes 9801. For eachword-vote, a new record is created in the word-votes database andrelated to the user account of the user casting the vote 9802. Asdiscussed above, each word-vote includes a word/phrase datum and a URLdatum (or more than one URL datum in certain embodiments).

When the user submits a query 9803, results are ranked according tomatching votes 9804, or, in some embodiments, weighted matching votes.

One benefit of the account-based approach is that users can change theirvotes as their tastes change and as the World Wide Web evolves. FIG. 99depicts an excerpt from an example web page through which the user canview and alter his or her word-votes in an account-based Lexivotesystem. This feature can be used to further enhance the functionality ofthe Lexivote system by assuring “freshness” of word-votes; users can beperiodically required to confirm previously cast word-votes or otherwiseupdate them if the user's preferences have changed or a URL is no longervalid.

16. USE Subsystem: Lexary Reference Tool

A Lexary is provided to further enhance the functionality of theLexivote subsystem and USE subsystem.

The Lexary is an electronic reference tool that includes two basicreference features, entries and senses. The Lexary serves the combinedfunctions of a dictionary, thesaurus, grammar book, and stylebook. Anentry is a word, phrase, punctuation mark, or other datum that may beincluded in such reference materials. A sense is a definition, synonym,antonym, usage note, or other descriptive content that explains theentry with which the sense is associated. Thus, a sense can be adictionary sense (e.g., a definition of a word entry), a thesaurus sense(e.g., a synonym or antonym of a word entry), a grammar sense (e.g., ausage note pertaining to a punctuation mark entry), or a style sense(e.g., a usage note pertaining to an editorial convention entry, such asidiomatic usage of a phrase or proper citation of a source).

The Lexary provides a mechanism through which users can submit entriesand senses. Additionally, so that the Lexary can serve as anauthoritative source of information, the Lexary also provides a numberof quality control mechanisms. Without such mechanisms, the anarchy andmisinformation that characterizes many user-generated-content siteswould almost certainly overtake the Lexary also.

When a new sense is submitted, whether in association with an existingentry or a new entry, the new sense is marked “proposed.” In order forthe sense to move beyond proposed status to “approved” status, it mustreceive a predetermined threshold number of “subscriptions,” asubscription being an indication of approval of the sense by aregistered user. Once approved, the sense becomes published as part ofthe Lexary such that a search on the given entry will return the givensense as an authoritative statement.

Over time, as the number of Lexary users increases, users with unusuallyhigh levels of linguistic understanding will periodically encountersenses that have been approved but are not completely accurate. TheLexary therefore provides a “challenge” mechanism through which the usercan call an existing approved sense into question and seek to supplantit with an improved version of the sense. The challenge is denied orupheld through a special voting procedure that involves only a smallportion of the whole user community, namely, the users who have alreadydemonstrated an outstanding track record with respect to contribution ofmaterial to the Lexary. This track record is represented by the user'sauthority rating.

A general method of creation, deployment and use of the Lexary systemappears in flowchart form in FIG. 101. First, a group of databasesnecessary for use in the Lexary system, such as those depicted in FIG.100, are created 10101, as are a group of interfaces through which userscan submit, review, search, subscribe to, challenge, flag, and editentries and senses 10102.

Once the Lexary has been made available to the public, a user logs intohis or her UET Company account 10103 and, if the user so desires 10104,the user enters a term search through the Lexary search interface 10105.Search results are returned to the user 10106, including an entry orentries matching the search term and a sense or senses associatedtherewith.

If the user wishes to add a new entry 10107, the user enters informationpertaining to the new entry through a new entry submission form 10108,and if the entry does not already exist 10109, the entry is added as anew entry record in the entries database 10111.

An entry is not searchable through the official published Lexary untilat least one sense associated with the given entry has been approved. Ifa user wishes to add a new sense 10112 to be associated with an entry,the user enters the new sense through a new sense submission form 10113and a new record is created in the senses database and related to thegiven entry record in the entry database 10114. The new sense is marked“proposed” at this point.

If the user wishes to review proposed senses 10115, he or she submits asearch on the term to be reviewed 10116 and results are returned to theuser 10117. If there are some pending proposed senses associated withthe search term 10118, the user clicks through to a sense review page10119. If the user wishes to subscribe to a sense 10112, he or sheclicks the “I subscribe” link and a new record is created in the sensesubscription database 10121 noting the subscription of the user to thegiven sense 10122.

Occasionally, users will propose inappropriate senses in an attempt tobe funny or offensive. If the user wishes to flag such a sense 10123,the flagging process depicted in FIG. 108 is followed 10124. If the userwishes to challenge an approved sense 10125, the sense challenge processdepicted in FIG. 111 is followed 10126. If the user wishes to alter achoice he or she has formerly made—such as a sense or subscription he orshe previously submitted—, the choice editing process depicted in FIG.109 is followed 10128.

Any time a choice made by a user affects a calculation used in theLexary system, the process of performing this calculation is restarted10129. For instance, sense approvals are based on the number of usersubscriptions; thus, when a user submits a new subscription, a senseselection process, depicted in FIG. 110, must be followed again; runningof the process need not occur immediately but rather can be conducted atregularly scheduled intervals at the choice of the UET Company.Similarly, since a user's authority rating is based upon approvedsenses, an authority rating process, depicted in FIG. 107, should befollowed when a sense authored by a user has become approved.

For the sake of simplicity, the following figures depict excerpts fromsample web pages for a limited scope deployment of the Lexary,specifically, one that serves only as a dictionary. It should beunderstood that one of ordinary skill in the art can easily modify thedepicted pages so as to allow the searching, submitting, and editing ofnon-dictionary entries and senses, such as grammar and style entries andsenses. It should also be noted that the same basic processes disclosedherein can be used for management of longer entries, such asencyclopedia entries, although the Lexary is primarily aimed at servingthe purposes described above.

FIG. 102 depicts a Web submission form 10201 through which a term can belooked up in the Lexary. FIG. 103 depicts an excerpt from a sampleresults page 10301 generated and returned to the user in response to aLexary search query.

The results page 10301 displays all approved senses associated with theterm searched. Additionally, the number 10302 of subscriptions to eachsense is displayed to the right of that sense. The user ID 10303 of theuser who submitted the given sense is also displayed, as is theauthority rating 10304 of this sense author.

A link 10305 to a page that displays pending proposed senses associatedwith the entry, such as the page depicted in FIG. 105, is displayed. Alink 10306 to a page including a Web submission form through which a newsense for the entry can be submitted, such as the “Submit New Sense”page depicted in FIG. 104, is also displayed. An advertisement 10307also appears. An advertiser pays the UET Company to serve theadvertisement 10307 each time certain terms are searched in the Lexary.

When a user wishes to submit a new sense, he or she does so through aWeb submission form such as the form 10401 in FIG. 104. For a dictionarysense (as depicted), the submission form includes fields for a part ofspeech, a qualifier (such as transitive or intransitive in the case ofverbs), a definition, an etymology, and a usage note. Clearly,additional fields can be used and different fields should be used fordifferent types of entries, e.g., grammar or style.

If a user wishes to subscribe to a pending proposed sense, he or shedoes so by clicking an “I subscribe” button 10502 appearing in thereview proposed senses page 10501 depicted in FIG. 105. If a user wishesto flag a proposed sense, he or she clicks a “flag” link 10503 toinitiate the flagging process depicted in FIG. 108. Inappropriate use ofthe Lexary can result in demerits which subtract from a given user'sauthority rating; enough demerits can result in a negative authorityrating 10504.

FIG. 106 depicts an excerpt from an example “Sense Challenge Submission”form 10601. Through such a form, a user may submit a challenge to acurrently approved sense. Such a challenge may be necessary when anapproved sense is good enough to have received enough subscriptions tobe approved but nonetheless is, in the eyes of the challenger,incomplete or otherwise imperfect. Fields to be included in a sensechallenge page should include an “explanation for the challenge” fieldand a “proposed alternative” field.

An embodiment of the authority rating process is depicted in FIG. 107.In the depicted embodiment, a user's authority rating equals the totalnumber of “qualifying subscriptions,” where qualifying subscriptions aredefined as subscriptions by other users to approved senses that wereauthored by the user being rated, minus any demerits. Certainly, otherformulae for producing an authority rating can be used. For instance, arecursive definition, using one or more known techniques for handlingrecursive equations, can be used. Such a definition might define a firstuser's authority rating in terms of authority ratings of other users whohave subscribed to senses authored by the first user.

The flagging process is depicted in FIG. 108. After a flag has beensubmitted by a user 10801, UET Company staff reviews the flagged sense10208. If the staff determines that the flagged sense was not submittedin good faith 10803, the sense record pertaining to the flagged sense isdeleted 10804 and a negative history note is entered in relation to theuser account of the submitter of the flagged sense 10805. Such anegative history note may result in demerits per UET Company businessrules. If the violation is sufficiently egregious or part of a patternof misconduct, additional action may be taken 10806, such as suspensionof the offending user account.

Occasionally, users will find that they no longer agree with senses theythemselves have submitted or with senses to which they have previouslysubscribed. In such a case, the user can follow the choice editingprocess depicted in FIG. 109. The user browses the “My Lexary Choices”page 10901, from which he or she can review previously submittedsubscriptions and senses 10902. If the user wishes to alter such achoice 10903, the user selects the choice to be modified 10904 and makesthe appropriate change 10905. If the user alters a sense 10906, thealtered sense is treated as a new sense submission 10907: all previoussubscriptions to that sense are voided and the modified sense enters“proposed” status. This measure is necessary so that approved senses arenot subsequently altered into a form that would not have received suchapproval from the community.

Senses are approved through a sense selection process such as thatdepicted in FIG. 110. The UET Company can choose 11002 to weightsubscriptions with reference to the authority rating of the subscribinguser 11004 and 11005, or to simply count all subscriptions equally11003. Whichever methodology is chosen, the score of a sense is comparedto a predetermined threshold 11006, and if the score meets or exceedsthis threshold, the sense is approved 11007.

Senses are challenged through a sense challenge process depicted in FIG.111. If a user wishes to submit a challenge, he or she does so throughthe submission of a form such as that depicted in FIG. 106, and a newrecord is created in the sense challenges database 11101. Provided thatthe submission meets minimum requirements for completeness 11102, theauthor of the challenged sense is notified and given the opportunity tosubmit a rebuttal to the challenge 11103. After this rebuttal has beenreceived or a certain period of time has elapsed, a panel of users whoare considered “top members” are notified of the challenge. Top membersare users with the highest authority ratings, and the top member panelmay consist of approximately 300 to 500 top members.

Panel members must cast a vote agreeing or disagreeing with thechallenger's case within a certain period of time 11005, each vote beinga record in the sense challenges votes database. If not enough votes arereceived to reach a quorum 11106, the challenge fails. But if a quorumis reached and enough votes for the challenger are received to meet orexceed a predetermined threshold 11107, the challenge is upheld and thechallenger sense replaces the challenged sense 11108. The UET Companycan choose whether a successful challenger sense inherits all thesubscriptions of the challenged sense it replaces or simply is awarded aminimum number of subscriptions to become approved. The UET Company canalso choose what happens to the replaced sense.

The viability of the sense challenge process relies upon theparticipation of top members. A top member who repeatedly fails torespond when asked to vote on challenges may be removed from the topmembers panel and replaced by another top member 11109.

The Lexary can be integrated with the Userithm search engine system toproduce an even more effective search mechanism. FIG. 112 depicts anexcerpt from a web page including a USE search submission form 11201;this particular USE embodiment provides two simple search components.

When a search query submitted through this form 11201 contains searchterms that appear in the Lexary as entries with more than one associatedsense per entry, the user is presented with a secondary selections pagesuch as that 11301 depicted in FIG. 113. This page provides an inputfield 11302 next to each available sense so that a user can eliminateambiguity by selecting the particular sense of the word that he or sheintends.

For instance, if a user submits a search query that includes the words“rubber” and “stamp” as depicted in the example in FIG. 112, he or shemay be presented with a secondary selection page such as that 11301depicted in FIG. 113. This page 11301 displays two approved sensesassociated with the word “rubber” in the Lexary. This page also displaystwo approved senses associated with the word “stamp” in the Lexary. Theuser can either bypass the use of secondary selections by clicking a“bypass this step” button, or he or she can check a checkbox next to thesense in which he or she intends the word, thereby indicating his or hersecondary selection, and then click the “search according to myselections above” button to submit the search query.

This process is summarized in the flowchart depicted in FIG. 114. When auser submits a query 11401 and the chosen search methodology relies inpart upon the meaning of the given word 11402 (as opposed to a searchsimply for the appearance of a word in a domain name, for instance), thesubmitted search term or terms are looked up in the Lexary 11403. If anyof the search terms appear as entries in the Lexary with more than oneassociated sense 11404, a secondary selections page such as thatdepicted in FIG. 113 is presented to the user 11405. If the user choosesto refine his or her search through the use of a secondary selection11406, the search is performed with reference to the particular sense orsenses selected by the user 11407. Otherwise, the search is performed asusual without reference to secondary selections 11408.

Searches performed using secondary selections can be enhanced byreference to the thesaurus-like functionality of the Lexary.Specifically, the usage of synonyms of a particular sense of a word in adocument helps to indicate that the word is being used in the intendedsense in the document. Thus, while the process of submitting a thesaurusentry is essentially similar to the process of submitting any other typeof entry, a thesaurus entry submission process is depicted in FIG. 114B.In the depicted embodiment, while viewing senses associated with anentry, a user locates the particular dictionary sense for which he orshe wishes to submit a synonym 11411. The user then clicks through,using a link such as that 11421 depicted in FIG. 114C, to view thethesaurus entry related to the given sense 11412. The user can then viewthesaurus senses associated with the particular dictionary sense of theword, and, if desired, the user can click through to a Web submissionform whereby he or she can submit the new thesaurus sense 11413. The newthesaurus sense then enters “proposed” status as usual 11414, allowingother users to submit subscriptions 11415, and the sense approvalprocess is followed as usual 11416.

17. UTOU Subsystem

A Uniform Terms of Use (UTOU) subsystem is provided to furtherfacilitate informational and commercial transactions and interactionsbetween users of the UAML and USE subsystems.

The UTOU subsystem allows a website provider to “subscribe” to aparticular version of a Uniform Terms of Use Agreement (UTOUA) byproperly referencing the UTOUA in “local” terms of use agreementgoverning a relationship between the website provider and a websiteuser.

In so doing, the UTOU subsystem enables significant savings in terms oftime and expense for both website providers and website users while alsocausing numerous beneficial side effects, such as laying a foundationfor uniformity in Internet-related law.

A process of creation, deployment and use of the UTOU subsystem isdepicted in flowchart form in FIG. 115. The embodiment depicted in FIG.115 is an “open subscription” model, meaning, that any website providercan participate in this model without registering with the UET Company.A “Registered Subscriber” model is provided, in contrast, in FIG. 119.There are advantages and disadvantages to both models: under the opensubscription model, the convenience of participating may encourage moreparticipants; under the registered subscriber model, quality assurancemechanisms can be implemented and UTU integration is possible.

Under the open subscription model, a promulgator—an entity such as theUET Company, a nonprofit organization, or a governmentalagency—assembles a UTOU drafting team that includes representatives ofthe legal community, consumer advocacy groups, and other interestedparties 11501. The team produces a preliminary draft of a first (or, inlater iterations, a next) version of the UTOUA 11502. The promulgatorpublishes the preliminary draft on its website together with a mechanismthrough which citizens-at-large can comment on the preliminary draft11503 for a predetermined period of time. After the comment period ends,the drafting team incorporates knowledge gained through the publiccomment procedure into the draft 11505. If, after these revisions, theteam approves the draft as final 11506, it is published as the officialfinal draft of the given version of the UTOUA 11507. Otherwise, anotherpreliminary draft is produced 11504 and the public comment procedure isrepeated 11503.

Related information, such as standards for proper usage of the UTOUA isalso published 11507. Older versions of the UTOUA, if any, remain at theURL where they were originally published so that any citations to themremain valid.

The official draft of the latest UTOUA version is registered in agovernmental copyright office 11508, and a unique copyright number isadded to the official draft 11509; in this way, a dispute about theactual language appearing in the draft can be resolved by reference tothe copy of the draft at the copyright office.

If a website provider wishes to subscribe to the UTOUA 11510, thewebsite provider drafts its own local terms of use agreement so that itconforms to the standards set forth on the promulgator website (and inthe UTOUA itself) 11512. A conforming local terms of use agreementincludes a valid reference and link to the UTOUA version to which thewebsite provider subscribes as well as a group of terms that arespecific to the website provider's local terms of use agreement. Thesesite-specific terms, called “ILO” provisions, identify the websiteprovider, indicate which jurisdictional laws apply, and provide allterms that differ from or add to the terms of the UTOUA version to whichthe website provider subscribes 11512.

When a visitor visits the website provider's website, he or she can seethat the website provider subscribes to the UTOUA by viewing the localterms of use agreement 11513. If the visitor is already familiar withthe version of the UTOUA to which the website provider subscribes 11514,the visitor need only read the ILO provisions 11515 in order to beinformed about the contractual provisions to which he or she is agreeingin using the website.

In allowing website visitors to focus strictly on these site-specificprovisions applicable to the given website, the UTOU subsystem savesvisitors a great deal of time and encourages them to read the localterms of use agreement.

Any time the visitor wishes to refresh his or her knowledge of theUTOUA, the visitor can simply click through from the local terms of useagreement to the UTOUA 11517. Whenever a website provider misuses ordeviates from the standards for conforming usage of the UTOUA,misconduct can be reported to the promulgator 11518.

If a dispute arises between the website provider and the visitor 11519,the provisions of both the local terms of use agreement and the UTOUA,provided the latter has been properly incorporated by reference by theformer, apply to the dispute, with the site-specific ILO provisionstrumping any conflicting terms in the UTOUA 11520. As the terms of theUTOUA are interpreted during the resolution of disputes, the body ofcase law pertaining to the UTOU develops into a richer and more uniformbody of law than is possible in the absence of such a system 11521.

As decisions interpreting the UTOUA provisions are handed down, adocument linking system, such as that depicted in FIG. 118, is deployedto further facilitate easy researching of legal issues pertaining to theUTOUA and development of a settled body of Internet law 11522.

FIG. 116 depicts an excerpt from an example web page 11601 hosted on thepromulgator website. This page 11601 displays a version of the UniformTerms of Use Agreement, including terms that describe how a conformingsubscription can be made effective as well as the actual terms that willbe legally active and applicable when a conforming subscription is ineffect.

FIG. 117 depicts an excerpt from an example web page 11701 hosted on thewebsite provider's website. This page 11701 displays the local terms ofuse agreement, which has been made effective in conformance with theUTOU standards for subscription. Thus, the UTOUA version indicated inthe document is incorporated by reference so as to be legally active.ILO provisions are also included, serving to identify the websiteprovider, the website, the jurisdiction whose laws will apply toconflicts arising out of the agreement, and the site-specific opt-outprovisions.

FIG. 118 depicts document-linking relationships underlying the UTOUsubsystem. Depicted is a first version 11801 of the UTOUA and a secondversion 11804 of the UTOUA. Multiple local terms of use agreements 11808a and 11808 b link to the first version 11801 and multiple local termsof use agreements 11809 a and 11809 b link to the second version 11804.One terms of use agreement 11808 c is depicted at two different momentsin time: at one time, this local terms of use agreement 11808 cincorporates by reference the first version of the UTOUA 11801; at alater date, this document 11808 c has been modified by the websiteprovider so as to incorporate the second version of the UTOUA 11804 byreference.

Each version of the UTOUA links to a marked-up, exact copy of the samedocument. Thus, for instance, the first version of the UTOUA appears in“clean” form 11801 and links to a “marked-up” document 11802 thatincludes the same version of the UTOUA. Each clause or provision of themarked-up UTOUA 11802 is an individual hyperlink to another page 11803.The latter page 11803, continually updated by the promulgator, providesa list of cases in which the individual UTOUA provision linking to thelatter page 11803 has been interpreted.

This document linking system allows anyone to visit the marked upversion of the UTOUA and click on an individual contractual provision soas to view cases relating to that provision. Researching the legalsignificance of any given provision in the UTOUA is thereby made mucheasier.

The registered subscriber model includes all the steps of the opensubscription model but involves the additional steps shown in theflowchart in FIG. 119. The website provider tags his or her local termsof use agreement with UAML tags, specifically, using the UTOU tagvocabulary (not depicted), and lists the local terms of use web page asany other UAML-enabled listing per the process depicted in FIG. 6A.Thereafter, when a UTU user visits the web page including the UTOUlisting 11902, the UTU displays an icon indicating that the givenwebsite provider is a registered UTOU subscriber 11903. Such an icon12002 appears in the UTU embodiment 12001 depicted in FIG. 120.

Registering UTOU subscribers through the UAML listing method allowscertain benefits: the local terms of use agreement can be validated,like other UAML listings, by comparison to standards for conformingsubscriptions, while the presence of a URLIT enables UTU integration asdescribed above.

18. UTOU Subsystem: UFC Subsystem

The basic approach of the UTOU subsystem can be extended into aUniversal Form Contract (UFC) subsystem.

The UFC subsystem allows two or more users to establish a writtencontract between each other that “subscribes” to a particular UniversalForm Contract by properly referencing the UFC in the written contract;the terms of the UFC referenced in the written contract are stored inmultiple locations for easy retrieval.

In so doing, the UFC subsystem enables significant savings in terms oftime and expense for users while also causing numerous beneficial sideeffects, such as reducing the use of paper by potentially millions ofpages annually and laying a foundation for uniformity in contract law.

A method of creating, deploying and using an embodiment of the UFCsubsystem appears in flowchart form in FIG. 121. A drafting team isformed 12101 to create a preliminary draft for each type of UniversalForm Contract 12102. Types of UFCs may include: a UFC apartment rentalagreement; a UFC personal property purchase agreement; a UFCnondisclosure agreement; a UFC will; and other such legal instruments.The UET Company then publishes the draft of each UFC 12103 for publiccomment. Once the public comment period ends, the drafting team modifieseach UFC so as to accommodate useful public comments 12104. When thedraft is finally approved by the team 12105, each UFC is individuallyregistered in the copyright office 12107 and the copyright registrationnumber is added to the official draft so that parties can verify theofficial terms through an independent source 12108.

Each UFC is published individually on the website of the UET Companysite so that only one UFC appears per URL 12109. Each UFC is thenencoded in high-density bar-code form 12110, which bar-code is thenprinted along with human readable text on an official “UFC-enabled”paper page 12111 such as the example page 12201 depicted in FIG. 122.

Users wishing to record an agreement in written form acquire aUFC-enabled page that references the appropriate UFC type, fill out theILO provisions by hand or machine print, and then execute the agreementwith signatures 12112.

In this way, most written contracts can be reduced from several pages toone page 12113 while still containing the same amount of contractualprovisions.

If a user wishes to create a back up copy of the executed UFC-enabledcontract document 12114, he or she can fax or e-mail an electronic copyof the UFC-enabled contract document to the UET Company for storage as adigital file related to the user's UET Company account 12115. Whenever auser or third party needs to look up the UFC terms incorporated into thewritten document, three different ways are readily available: visit theURL identified in the written document, scan and decode the bar-code onthe document, or retrieve the copy of the document deposited at thecopyright office 12116. These and other benefits are described in thechart depicted in FIG. 123. Most importantly, the UFC subsystem offers asignificant opportunity to reduce the waste of paper and other resourcesused in making paper.

19. Universal Arbitration Subsystem

A Universal Arbitration Subsystem is also provided to further facilitateinformational and commercial transactions and interactions between usersof the UAML and USE subsystems.

The UArb subsystem allows users to form a community by contracting withan intermediary such that members of the UArb community are bound tosubmit their disputes to alternative dispute resolution.

A method of creation, deployment, and use of the UArb subsystem appearsin flowchart form in FIG. 124. First, a drafting team, includingrepresentatives from the legal profession, insurance industry, consumeradvocacy groups, and other interested parties, is formed 12401 to createa preliminary draft of the Universal Arbitration Agreement (UAA) 12402.The UET Company then publishes the preliminary draft for public comment12403. After the public comment period ends, the drafting teamincorporates these comments 12404. When the drafting team approves thefinal draft 12405, the final official draft is registered at thecopyright office and the copyright registration number is added to theofficial draft for the reasons discussed in reference to the UTOUsubsystem above 12406. The official draft is then published on the UETCompany website 12407.

The UET Company optionally arranges any agreements with insurancecompanies or other parties who may wish to offer incentives to encourageusers to participate in the UArb subsystem 12408. The UArb system isthen made available 12409 so that a user can register by agreeing to theUniversal Arbitration Agreement 12410. Such agreement establishesprivity of contract between the agreeing user and the UET Company, whichserves as an intermediary in the UArb subsystem as described below.Other users also agree to the UAA 12411, and a new record is created inthe UAA participants database for each participant.

Thereafter, if a third party, such as an insurance company, needs toverify that the agreeing user has agreed to the UAA, the UET Company canprovide a certificate indicating the agreeing user's party status andthe expiration date of the current UAA agreement between the agreeinguser and the UET Company 12412.

In the event that a dispute later arises between two users who have bothagreed to the UAA during the effective term of both parties' agreements12413, both agreeing users are obligated to submit that dispute tobinding arbitration 12414. If one of the agreeing users so obligatedrefuses arbitration 12415, enforcement of the arbitration duty can bepursued by the other agreeing user or by the UET Company directly, orthe cause of action can be assigned to someone else for enforcement12416. Otherwise, the dispute is settled through arbitration per the UAA12417, and the parties thereby enjoy considerable savings in terms oftime and money in avoiding litigation through the court system.Additional benefits are described in the chart in FIG. 127.

FIG. 125 depicts the party relationships described above. Specifically,a first agreeing user 12502 forms a binding UAA contract with the UETCompany 12501. A second agreeing user 12503 also forms a binding UAAcontract with the UET Company 12501. The terms of the UAA provide thatany agreeing user agrees to submit disputes with third parties tobinding arbitration when said third parties have also agreed to the UAA.These terms create a mutual “third party beneficiary” relationshipbetween one agreeing user and another agreeing user.

FIG. 126 depicts the party relationships described above so as toinclude an insurer 12604. The insurer 12604, in order to incentivizeusers to participate in the UArb subsystem, may offer premium discountsto users who agree to the UAA. A separate agreement, establishingprivity of contract between the insurer 12604 and an agreeing user12602, may thereby be formed. The insurer 12604 may wish to make such anoffer to users so as to reduce its exposure to litigation costs.

FIG. 128 depicts an excerpt from an example web page, hosted by the UETCompany, which contains an embodiment of a version of the UniversalArbitration Agreement.

FIG. 129 depicts an excerpt from an example certificate through whichthe UET Company certifies that an agreeing user has agreed to the UAA.

The UAML/UTU subsystem and UArb subsystem can be integrated to enhancethe functionality of each other. Specifically, when a UTU user visits aUAML-enabled listing of a website provider who has agreed to the UAA,information can be transmitted from the UET Company to the UTUindicating that the website provider is a UArb subsystem participant.The UTU can then display an icon informing the UTU user of the websiteprovider's UArb status.

FIG. 130 depicts an embodiment of the UTU 13001 displaying such an icon13002.

20. Ramifications

As shown, the disclosed URLIT and UAML system offers users opportunity,flexibility, economy, and precision. UAML listings, including Internetauctions, can be hosted on any website, and the appearance of suchlistings is determined by the user. Indexing and searching such listingsis easy, and the precision and accuracy of such searches are muchgreater than conventional HTML pages and Web search engines allow. Thispower can even be tapped by e-mail, telephone, or other nontraditionalsearch input media. Meanwhile, the subject matter of UAML listings isalmost limitless: auctions, jobs, personals, automobiles, real estate,and all manner of other classified ads.

The disclosed UTU reduces or eliminates the need for traditional Websubmission forms and purchase forms, thereby saving user's time andreducing the risk of identity theft. The universal shopping cart featureallows purchasing from multiple vendors through a single interface. Theinventory and wish list features give website providers an additionalvehicle for maximizing the value of their websites.

The disclosed Userithm Search Engine gives users tremendous leeway incustomizing search algorithms to meet their individual needs for aunique search in real-time, on-the-fly. Performance feedback is providedimmediately so that users can improve their own techniques over time.The Userithm Search Engine method can be applied to a wide variety ofsubject matter, including auctions, personal ads, real estate,investment vehicles and more.

The disclosed Lexivote search methodology offers direct access to thecollective intelligence of the World Wide Web user community. Lexivotesearch results are essentially the product of countless individualinterviews, making for highly dependable levels of relevancy.

The disclosed Lexary reference materials method provides both thecurrency of a user-maintained resource and the authority of extensivelyreviewed content, while avoiding the pitfalls of anarchy.

The disclosed UTOU subsystem brings order and commonality to thedisjointed, unpredictable landscape of relationships between websiteproviders and website users. In so doing, high priority, uniquecontractual terms are brought into focus while common terms need not beread over and over. Meanwhile, the UTOU establishes a platform uponwhich rich and settled case law can develop rapidly.

The disclosed UFC subsystem offers the advantages of the UTOU subsystemwhile also reducing paper usage and storage requirements while makingthe transmission and backup of important legal documents easier.

The disclosed UArb subsystem allows the formation of intentionalcommunities via the Internet, whereby the efficiencies of alternativedispute resolution are made conveniently available to citizens at large.

21. Scope

Although the description above contains many specificities, these shouldnot be construed as limiting the scope of the invention but as merelyproviding illustrations of some of the presently preferred embodimentsof this invention. Accordingly, the scope of the invention should bedetermined by the appended claims and their legal equivalents, ratherthan by the examples given. For instance, it will be understood thatfeatures of one embodiment may be combined with features of otherembodiments while other features may be omitted or replaced as beingnonessential to the practice of the invention. As is plain to oneskilled in the art, the disclosed invention can be deployed usingentirely different tag names as long as the purposes for which thesetags exist are served. Following disclosed tagging conventions may beuseful, but one skilled in the art will see that the invention can useother conventions or be modified to meet external standards, e.g., XML.

Licensing information may be obtained throughhttp://www.inventerprise.com.

What is claimed is:
 1. A search engine method, said search engine method comprising: verifying, by a computer, ownership or control of a website, said verifying ownership or control of said website comprising (i) providing a first verification identifier and (ii) determining whether said first verification identifier appears in a first resource or at a first location, said determining comprising accessing a first computer system from a second computer system by way of a first computer network; and providing access to at least one search engine enhancement service after verifying ownership or control of said website, wherein the at least one search engine enhancement service is selected from the group consisting of: (i) providing analytics associated with said website; (ii) providing an electronic shopping cart or checkout mechanism associated with said website; (iii) providing a financial status indicator associated with said website; (iv) providing a custom search engine associated with said website; and (v) providing a custom toolbar associated with said website.
 2. The search engine method in claim 1 wherein: said first verification identifier appears in at least one of (i) a file name or (ii) a tag in said first resource.
 3. The search engine method in claim 1 wherein: the at least one search engine enhancement service that is selected comprises providing an electronic shopping cart or checkout mechanism associated with said website.
 4. The search engine method in claim 1 wherein: the at least one search engine enhancement service that is selected comprises providing a financial status indicator associated with said website.
 5. The search engine method in claim 1 wherein: the at least one search engine enhancement service that is selected comprises providing a custom search engine associated with said website.
 6. The search engine method in claim 1 wherein: the at least one search engine enhancement service that is selected comprises providing a custom toolbar associated with said website.
 7. The search engine method in claim 1 wherein: the at least one search engine enhancement service that is selected comprises providing analytics associated with said website.
 8. The method in claim 7 wherein said analytics comprise a first quantity, said first quantity indicating performance of said website according to a first gauge of performance.
 9. The method in claim 5 additionally comprising: receiving a custom search engine specification, parameter, or criterion.
 10. The method in claim 6 additionally comprising: causing, by way of said custom toolbar, display of information specific to said website.
 11. The method in claim 6 wherein said custom toolbar comprises first quantity indicia, said first quantity indicia indicating a first quantity, said first quantity being based at least in part on a plurality of user submissions.
 12. The method in claim 1 additionally comprising: receiving a query by way of a first input mode, said first input mode being selected from the group consisting of: (i) barcode scanner input; (ii) RFID reader input; (iii) mobile telephone input; and (iii) input by way of a first markup language.
 13. The method in claim 1 additionally comprising: receiving a query; and providing, in response to said query, a query disambiguation button or link, said query disambiguation button or link pertaining to at least one alternate meaning for said query.
 14. The method in claim 1 additionally comprising: receiving a query; and providing, in response to said query, access to an entry in a community-edited reference resource, said community-edited reference resource being selected from the group consisting of (i) a dictionary, (ii) a thesaurus, (iii) an encyclopedia, (iv) a grammar resource, and (v) a stylebook resource.
 15. The method in claim 1 wherein search engine results are determined at least in part according to a relevance method, said relevance method being selected from the group consisting of (i) a citation- or link-based method, (ii) a vote-based method, and (iii) a bid-based method.
 16. The method in claim 1 additionally comprising: receiving a query, said query comprising a product identification code or bookseller number; and processing a first purchase transaction via a first mobile phone or first mobile scanner.
 17. A search engine method, said search engine method comprising: providing a search engine service, said providing said search engine service comprising providing a plurality of results in response to a first query, said first query being received at a first computer system via a first computer network; verifying, by a computer, ownership or control of at least one website, said verifying ownership or control comprising (i) generating a first identifier, (ii) requesting a first resource, and (iii) determining whether said first identifier appears in said first resource; and providing at least one auxiliary service for verified websites; wherein said auxiliary service is selected from the group consisting of: (i) providing website analytic data; (ii) providing an electronic shopping cart or checkout mechanism; (iii) causing display of financial status indicia; (iv) providing a customizable search engine; (v) causing display of a customizable toolbar; (vi) causing display of an advertisement that is relevant to a first term; (vii) providing search query disambiguation; (viii) sharing with a first entity proceeds from a first transaction; and (ix) causing display of real-time quantity indicia.
 18. The search engine method in claim 17 wherein: said first identifier appears in at least one of (i) first content of said first resource or (ii) a first file name.
 19. The search engine method in claim 17 wherein: said providing said plurality of results is performed at least partly according to a first relevance-ranking methodology, said first relevance-ranking methodology being selected from the group consisting of (i) a link-based methodology, (ii) a payment-based methodology, (iii) a vote-based methodology, and (iv) a freshness-based methodology.
 20. The search engine method in claim 19 wherein: said first relevance-ranking methodology is said link-based methodology, said link-based methodology pertaining to hyperlinks to a first URL.
 21. The search engine method in claim 19 wherein: said first relevance-ranking methodology is said payment-based methodology, said payment-based methodology pertaining to a first bid, said first bid pertaining to inclusion of a first URL in said plurality of results.
 22. The search engine method in claim 19 wherein: said first relevance-ranking methodology is said payment-based methodology, said payment-based methodology pertaining to a first advertisement, said first advertisement being associated with a first term.
 23. The search engine method in claim 19 wherein: said website analytic data comprises at least a measure of performance, said measure of performance pertaining to a first URL.
 24. A search engine system, said search engine system comprising: a first computer system, said first computer system communicatively coupled to a second computer system by way of a first computer network; a search engine component, said search engine component configured to provide a plurality of results in response to a first query; a verification component, said verification component configured to generate a first identifier and to determine whether said first identifier is available by way of a first URL; and a search engine enhancement component, said search engine enhancement component being selected from the group consisting of: (i) a component configured for providing analytical data pertaining to a first plurality of websites; (ii) a component configured for providing, through said first computer network, access to a shopping cart or checkout mechanism; (iii) a component configured for causing real-time display of at least one of (a) a dollar amount or (b) a financial status badge or icon; (iv) a component configured for providing a custom search engine; (v) a component configured for providing a dynamic toolbar; (vi) a component configured for causing display of an ad in association with a word; (vii) a component configured for causing display of at least one option, said at least one option pertaining to disambiguating a search query; and (viii) a component configured for sharing proceeds from a first transaction.
 25. The search engine system in claim 24 wherein: said analytical data comprises at least a first measure of performance, said first measure of performance pertaining to at least a first website, said first plurality of websites being registered to a first registered user and comprising said first website.
 26. The search engine system in claim 24 wherein: said search engine component is configured to provide said plurality of results in accordance with a first relevance-determination methodology, said first relevance-determination methodology being selected from the group consisting of (i) a link-based methodology and (ii) a payment-based methodology.
 27. The search engine system in claim 24 wherein: said dynamic toolbar comprises the component configured for causing real-time display of said at least one of (a) said dollar amount or (b) said financial status badge or icon.
 28. The search engine system of claim 24 further comprising: a component for integrating communication technology with said search engine component, said component for integrating communication technology with said search engine component being selected from the group consisting of: (i) a component for integrating speech technology with said search engine component; (ii) a component for integrating barcode or RFID technology with said search engine component; (iii) a component for integrating mobile telephone technology with said search engine component; and (iv) a component for receiving and parsing a first XML submission, said first XML submission comprising an identification of at least one database.
 29. A method comprising: operating a website on a first computer system, said first computer system being communicatively coupled to a computer network; submitting a first URL to a second computer system via said computer network; receiving a first verification identifier after said submitting said first URL; including said first verification identifier in at least a first resource, said website comprising said first resource; and accessing at least one search engine enhancement service for the website after said including said first verification identifier, wherein the at least one search engine enhancement service is selected from the group consisting of: (i) accessing analytics associated with said website, said analytics comprising information about said website; (ii) accessing an electronic shopping cart or checkout mechanism associated with said website; (iii) at least partly causing display of a real-time financial status indicator associated with said website; (iv) submitting at least one criterion or parameter to customize a search engine; and (v) submitting at least one criterion or parameter to customize a toolbar.
 30. The method in claim 29 wherein: said including said first verification identifier in at least said first resource comprises including said first verification identifier in a first name of said first resource or in first content of said first resource; and said search engine is configured to provide a plurality of results in accordance with a first relevance-determination methodology, said first relevance-determination methodology being selected from the group consisting of (i) a link-based methodology and (ii) a payment-based methodology. 