AU2007202189A1 - Method and Apparatus for Evaluating Visitors to a Web Server - Google Patents

Method and Apparatus for Evaluating Visitors to a Web Server Download PDF

Info

Publication number
AU2007202189A1
AU2007202189A1 AU2007202189A AU2007202189A AU2007202189A1 AU 2007202189 A1 AU2007202189 A1 AU 2007202189A1 AU 2007202189 A AU2007202189 A AU 2007202189A AU 2007202189 A AU2007202189 A AU 2007202189A AU 2007202189 A1 AU2007202189 A1 AU 2007202189A1
Authority
AU
Australia
Prior art keywords
visitor
value
session
banner
predetermined
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU2007202189A
Other versions
AU2007202189B2 (en
Inventor
William Glen Boyd
David S Montgomery
Elijahu Shapira
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Webtrends Inc
Original Assignee
Webtrends Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2004202222A external-priority patent/AU2004202222B2/en
Application filed by Webtrends Inc filed Critical Webtrends Inc
Priority to AU2007202189A priority Critical patent/AU2007202189B2/en
Publication of AU2007202189A1 publication Critical patent/AU2007202189A1/en
Application granted granted Critical
Publication of AU2007202189B2 publication Critical patent/AU2007202189B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Description

P/00/011 28/5/91 Regulation 3.2
AUSTRALIA
Patents Act 1990
ORIGINAL
COMPLETE SPECIFICATION STANDARD PATENT Name of Applicant: Actual Inventor Address for service is: WebTrends, Inc.
Elijahu Shapira William Glen Boyd David S Montgomery WRAY ASSOCIATES Level 4, The Quadrant 1 William Street Perth, WA 6000 Attorney code: WR Invention Title: Method and Apparatus for Evaluating Visitors to a Web Server The following statement is a full description of this invention, including the best method of performing it known to me:- -2- STitle t Method and Apparatus for Evaluating Visitors to a Web Server IN Field of the Invention The present invention relates generally to web-server traffic data analysis and 00 5 more particularly to a system and method for determining the value of visitors to (a web site.
C Background Art This specification refers to and describes content of the document, "WebTrends Installation and Visitor Guide", version 2.2, October 1996 and of US patent 6,112,238, filed 14 February 1997. However, neither the disclosure in that document nor that US patent application, nor the US patent issued on that US patent application, nor the description contained herein of content of that document or that US patent application is to be taken as forming part of the common general knowledge solely by virtue of the inclusion herein of the reference to and description of content of that document and that US patent application. Furthermore, this specification describes aspects of prior art web servers and web server traffic analysis. However, neither such aspects of prior art web servers and web server traffic analysis nor the description contained herein of such aspects of prior art web servers and web server traffic analysis is to be taken as forming part of the common general knowledge solely by virtue of the inclusion herein of reference to and description of such aspects of prior art web servers and web server traffic analysis.
The worldwide web (hereinafter "web") is rapidly becoming one of the most important publishing mediums today. The reason is simple: web servers interconnected via the Internet provide access to a potentially worldwide audience with a minimal investment in time and resources in building a web site.
The web server makes available for retrieval and posting a wide range of media in a variety of formats, including audio, video and traditional text and graphics.
And the ease of creating a web site makes reaching this worldwide audience a -3- Oreality for all types of visitors, from corporations, to start-up companies, to organizations and individuals.
This recent growth of the Internet over the past few years has opened new markets for business. Individuals use the Internet for everything from buying new cars to ordering a pizza to hiring a plumber. The ease with which people can use the Internet for such activities has spurred businesses to offer the 00 services and products people desire on the Internet.
Unlike other forms of media, a web site is interactive, and the web server can C passively gather access information about each visitor by observing and logging the traffic data exchanged between the web server and the visitor. Important facts about the visitors can be determined directly or inferentially by analysing the traffic data and the context of the "hit". Moreover, traffic data collected over a period of time can yield statistical information, such as the number of visitors visiting the site each day, what countries, states or cities the visitors connect from, and the most active day or hour of the week. Such statistical information is useful in tailoring marketing or managerial strategies to better match the apparent needs of the audience. Each hit is also encoded with the date and time of the access.
Visitors to a web site are not of uniform interest to the site operator. For example, a relatively low quality visitor might be one that merely reads the home page of the site and moves on. A higher quality visitor might be one that locates, e. a product description page, and an even higher quality visitor might be one who visits the price page. The highest quality visitor is, of course, one that orders and pays for goods or services offered by the web site.
Visitors may be induced to visit a web site via advertisements placed on remote web sites. One common way to advertise on the Internet is with banner ads. A banner ad shows a picture or statement of a business's products and services and allows a visitor to click on the ad to visit the web site hosted by the business. The visit may be to obtain more information, or, as is hoped by the business, to effect a purchase of a product or service via the web site.
-4- 6 The problem with Internet advertising is measuring its effectiveness. Internet advertising campaigns vary in price, depending on several factors such as where the ad is to be placed and the expected viewing population. One Iadvertising campaign might cost a business, for example, $1,000.00 to be on display for one month at one site, whereas the same ad might cost only $500.00 at another site. Further, it has been difficult to determine exactly how many 00 visitors an advertising campaign generated. In the above example, the $500.00 advertising campaign might have generated 10,000 visits in the month the ad was up, whereas the $1,000.00 advertising campaign might have generated only 7,000 visits a month. Finally, the value an advertising campaign generates is a function of what happens after the visitors visit the site. In the above example, although the $500.00 advertising campaign generated more hits, if none of those visitors made any purchase of the business's products or services, their collective value would be close to $0.00. On the other hand, although the $1,000.00 advertising campaign generated fewer hits, those visitors might all have purchased products or services, making their collective value at least several hundreds of thousands of dollars. It is this difficulty in gauging the effectiveness of advertising campaigns that makes their use a gamble. Accordingly, there remains a need for a way to analyse the effectiveness of advertising campaigns to determine their relative worth.
It would be desirable to analyse the information gathered by the web server to determine the quality of visitors to the web site.
It would also be desirable for the site operator to use the determined visitor quality to analyse the effectiveness of the operator's advertising.
Disclosure of the Invention Accordingly, the invention resides in a method for assigning a value to visitors of one or more web sites using traffic data, the method comprising: predetermining a first set of activity to be undertaken by a first visitor to one or more web sites and assigning a first value to the first set of activity; fpredetermining a second set of activity to be undertaken by a second (Ni N visitor to one or more web sites and assigning a second value to the second set of activity; IN analysing the traffic data of each visitor including performance of at least a first set of activities or a second set of activities; and associating the first or second value to the visitor based on whether the 00 visitor undertook the first or second sets of activity.
According to a preferred feature of the invention, the step of analysing the traffic data of each visitor comprises establishing a visitor session for each visitor to the one or more web sites and tracking the visitor's activity during the visitor session.
According to a preferred feature of the invention, the step of associating a first or second value to the visitor comprises associating a first or second value to the visitor for a first selected time period.
According to a preferred feature of the invention, the step of associating a first or second value to the visitor further comprises associating a first or second value to the visitor for a second selected time period.
According to a preferred feature of the invention, the first visitor and the second visitor are the same visitor being tracked through different visitor sessions.
According to a preferred feature of the invention, the first set and the second set comprise a list of uniform resource locators (URLs) to be visited by the first visitor and the second visitor.
According to a preferred embodiment, analysing the traffic data comprises determining if the visitor visited one of the URLs listed in the first set and the second set.
-6- O According to a preferred embodiment, associating the first or second value comprises: associating the first value to the visitor if the visitor visited each of the URLs IN listed in the first set; and associating the second value to the visitor if the visitor visited each of the URLs listed in the second set.
00 (N According to a preferred embodiment, associating the first or second value comprises only associating the second value to the visitor if the visitor visited each of the URLs listed in the first set and the second set.
According to a further aspect, the invention resides in a method for assigning value to visitors of one or more web sites using traffic data, the method comprising: determining an address for a visitor to one or more web pages associated with the web server; searching a visitor session database for the visitor's address; updating the visitor session database with a hit corresponding to information from the visitor's visit; analysing the visitor session database to determine the value of the visitor; and assigning a value to the visitor based on the visitor session database.
According to a preferred feature of the invention, the method further comprises creating a visitor session for the visitor in the visitor session database if the visitor's address is not found in the visitor session database.
According to a preferred feature of the invention, the method further comprises opening an existing visitor session for the visitor if the visitor's address is found in the visitor session database.
-7f According to a preferred feature of the invention, the method further comprises
(N
closing the visitor session if a predetermined amount of time passes without a subsequent hit by the visitor.
According to a preferred feature of the invention, the step of analysing the visitor session database to determine the value of the visitor comprises comparing an 0_ activity log for the visitor to a predetermined first set of activity and a (predetermined second set of activity.
According to a preferred feature of the invention, each of the predetermined first set and the predetermined second set comprises a list of uniform resource locators (URLs).
According to a preferred embodiment, the step of assigning a value to the visitor comprises assigning a first value to the visitor if the activity log comprises all of the URLs in the list of the predetermined first set.
According to a preferred embodiment, the step of assigning a value to the visitor comprises assigning a second value to the visitor if the activity log comprises all of the URLs in the list of the predetermined second set.
According to a preferred embodiment, the step of assigning a value to the visitor comprises only assigning the second value to the visitor if the activity log comprises all of the URLs in the list of both of the predetermined first set and the predetermined second set.
According to a preferred embodiment, the predetermined first set and the predetermined second set each comprise an elapsed time requirement.
According to a preferred embodiment, the predetermined first set and the predetermined second set each comprise an information list required to be submitted by a visitor on a form.
-8f Objects, features, and advantages of the present invention will become more
(N
readily apparent from the following detailed description of preferred embodiments that proceeds with reference to the drawings.
IND
Brief Description of the Drawings The present invention will now be described, by way of example, with 0_ reference to the accompanying drawings, in which: C)Fig. 1 shows the communication between a remote visitor, a first web site, and a second web site, where the second web site refers to the visitor in Sthe first web site, according to a prior art system.
Figure 2 shows a prior art format used in recording a "hit" of traffic data received by the server of Fig. 1.
Fig.3 and 4 illustrate hits memorialized in the log file of the server in Fig.1.
Figure 5 and 6 show an embodiment for data structures that store qualification profiles and advertising campaigns.
Fig.7 shows a flow diagram for processing records of traffic data hits and calculating the return on investment for advertising campaigns in a first embodiment of the invention.
Fig.8 shows a flow diagram fro assigning a traffic data hit to a visitor session in the first embodiment.
Fig.9 shows a flow diagram for assigning visitor sessions to qualification profiles based on the visitors activity in the first embodiment.
Fig.lO is a second embodiment that shows a flow diagram for processing traffic records offline from a data source, such as a log file, evaluating the traffic, and correlating the value to any corresponding ad campaigns.
Fig.1 1 shows a flow diagram for closing an accumulating visitor session in the second embodiment.
-9- Detailed Description of Preferred Embodiments Fig. 1 is a functional block diagram of a prior art system for analysing traffic data in a distributed computing environment 9. It is more fully described in I"WebTrends Installation and Visitor Guide", version 2.2, October 1996, and in U. S. Patent 6,112,238, filed on 14 February 1997, the disclosures of which are Sincorporated herein by reference for all purposes.
00 CA first server 10 provides web site and related services to remote visitors. By way of example, the remote visitors can access the server 10 from a remote C computer system 12 interconnected with the server 10 over a network connection 13, such as the Internet or an intranet, a dial up (or point-to-point) connection 14 or a direct (dedicated) connection 17.
Other types of remote access connections are also possible.
Each request by a remote visitor to the server 10-and the reply theretocomprises a "hit" of raw traffic data 11. The format used in recording each traffic data hit 11 and an example of a traffic data hit 11 are described below with reference to Figs. 2 4. The server 10 preferably stores each traffic data hit 11 in a log file 15, although a database 16 or other storage structure can be used.
The present invention can be implemented using any source of traffic data hits.
The present embodiment of the invention is implemented in part via a computer program run on server 10. It should be appreciated, however, that the invention could be implemented as well by a program operating on a different computer, such as a work station connected to server 10 or a computer connected to server 10 via an intranet or other network.
As will shortly be seen, the computer implementing the invention need not even be connected to the server; it is necessary only that the traffic data hits generated by the server be accessible by the computer implementing the invention. For example, the computer implementing the invention could monitor and process the traffic directly with network connection 13.
SFive sources of traffic data hits 11 (remote system or visitor 12, dial-up connection 14, log file 15, database 16 and direct connection 17) are shown.
Other sources are also possible. The traffic data hits 11 can originate from any IN single source or from a combination of these sources. The program examines each traffic data hit 11 and analyses the access information obtained from the traffic data in a manner later described in more detail.
00 In the described embodiment, the server 10 is typically an Intel Pentium-based cor comparable computer system equipped with a processor, memory, input/output interfaces, a network interface, a secondary storage device and a S 10 user interface, preferably such as a keyboard and display. The server typically operates under the control of one of the Microsoft Windows NT or derivatives such as Microsoft Windows XP or Microsoft Windows Vista or Unix or Linux operating systems and executes either Microsoft Internet Information Server or NetScape Communications Server software. Pentium, Microsoft, Windows, Windows NT, Unix, Netscape and Netscape Communications Server are trademarks of their respective owners. However, other server configurations varying in hardware, such as DOS- compatible, Apple Macintosh, Sun Workstation and other platforms, in operating systems, such as MS-DOS, Unix and others, and in web software are also possible. Apple, Macintosh, Sun and MS-DOS are trademarks of their respective owners.
A second server 8 also provides web site and related services to remote visitors such as visitor 12. It is constructed and operates in substantially the same manner as first server 10 and can be accessed in the same fashion.
The present invention is preferably implemented as a computer program executed by the server 10 and embodied in a storage medium comprising computer-readable code. In the described embodiment, the program is written in the C programming language, although other programming languages are equally suitable. It operates in a Microsoft Windows environment and can analyse Common Log File, Combined Log File and proprietary log file formats from industry standard web servers, such as those licensed by NetScape, -11- NCSA, O'Reilly WebSite, Quarterdeck, C-Builder, Microsoft, Oracle, EMWAC, and other Windows 3.x, Windows NT 95, Unix and Macintosh Web servers.
Fig. 2 shows a format used in storing a "hit" of raw traffic data 11 received by the server of Fig. 1. A raw traffic data hit 11 is not in the format shown in Fig. 2.
Rather, the contents of each field in the format is determined from the data exchanged between the server 10 and the source of the traffic data hit 11 and the information pulled from the data is stored into a data hit using the format of Fig. 2 prior to being stored in the log file 15 (shown in Fig. 1) or processed.
Each traffic data hit 11 is a formatted string of ASCII data. The format is based on the standard log file format developed by the National Centre for Supercomputing Applications (NCSA), the standard logging format used by most web servers. The format consists of seven fields as follows: Field Name Visitor Address (30): RFC931 (31): Visitor Authentication (32): Description Internet protocol (IP) address or domain name of the visitor accessing the site.
Obsolete field usually left blank, but increasingly used by many web servers to store the host domain name for multi-homed log files.
Exchanges the visitor name if required for access to the web site.
Date and time of the access and the time offset from GMT.
Either GET (a page request) or POST (a form submission) command.
Return status of the request which specifies whether the transfer was successful.
Number of bytes transferred for the file request, that is, the file size.
Date/Time (33): Request (34): Return Code (35): Transfer Size (36): -12- In addition, three optional fields can be employed as follows: (Ni Field Name Description SReferring URL URL used to obtain web site information for performing the "hit".
Agent Browser version, including make, model or version oo _number and operating system.
(Ni Cookie Unique identifier permissively used to identify a (Ni particular visitor.
Other formats of traffic data hits 11 are also possible, including proprietary formats containing additional fields, such as time to transmit, type of service operation and others.
Moreover, modifications and additions to the formats of raw traffic data hits 11 are constantly occurring and the extensions required by the present invention to handle such variations of the formats would be known to one skilled in the art.
In operation, remote visitor 12, whose Internet address might be visitor.sample.org, clicks on a link to request a web page from the second web server 8, whose Internet address might be www.portal.com. (Another name for a web page address in Internet parlance is Universal Resource Locator, or URL.) This click generates a traffic data hit consisting of a reply. In this case, the traffic data hit is a request for the second web server 8 to provide to the remote visitor 12 the web page http://www.portal.com/somepage.htm. Since the remote visitor 12 generated the request, the traffic data hit is a "GET" command. Upon receiving the traffic data hit, the second web server 8 sends a reply back to the remote visitor 12 consisting of an "OK" message and the requested web page.
The computer of visitor 12 then displays the requested web page http://www.portal.com/somepage.htm on the remote visitor's 12 browser.
Somewhere on the provided web page might be an advertisement for the first web server, whose Internet address is www.example.com. This advertisement is -13- 0 an advertising campaign run by the first web server 10. If the remote visitor is interested in finding out more about the products or services advertised, she might then click on the advertisement, which includes a link that redirects the IN visitor to the first web server 10. This generates a second request for a web page. This request is directed to the first web server 10. By clicking on the advertisement, the visitor requests the first web server 10 to provide the web 00 page http://www.example.com/portal_ad.htm via a second traffic data hit 11a, N shown in Fig. 3. It should be clear that the requested web page http://www.example.com/portalad.htm in traffic data hit 11 a is on the first web server 10, and not on the second web server 8. Upon receiving the traffic data hit 11a requesting web page http://www.example.com/portal_ad.htm, the first web server 10 sends data back to the remote visitor 12 containing an "OK" message and the requested web page. The first web server also writes an entry in its log file memorializing the request for web page http://www.example.com/portal_ad.htm. This entry 1 la stores several important pieces of information. Entry 11a stores the remote visitor's Internet address (visitor.sample.org), the time and date of the request ([12/Jan/1996:20:37:55 +0000], or 12 January, 1996, at 8:37:55 PM, Greenwich Mean Time), the request issued by the remote visitor 12 ("GET /portal_ad.htm HTTP/1.0"), and the referring URL (http://www.portal.com/somepage.htm). (Note that, although it is not shown, the second web server 8 can also create its own log file entries similar to those of log file After being referred to server 10 as described above, remote visitor 12 visits several pages on server 10. In Fig. 4, hits are depicted that represent visits by the remote visitor, whose Internet address is visitor.sample.org, to these pages on server 10. The remote visitor 12 first generates a traffic data hit 11b, requesting the web page default.htm. When the web server 10 receives the traffic data hit 11b, the web server replies by sending data containing a response message, along with the requested web page default.htm. The web server also writes entry 11b into its log file 15. The log file entry 11b indicates remote visitor's 12 request for the web page default.htm.
-14- A little while later, the remote visitor 12 requests web page products.htm in traffic data hit live. The web server 10 receives the traffic data hit 11 c and sends back data containing a response message and the requested web page IN products.htm. The web server 10 also writes another entry 11 c into the log file 15. This log file entry 1 lc indicates the remote visitor's request for the web page products.htm.
00oO SFig. 5 shows an embodiment for the qualification profiles. Generally speaking, a Squalification profile comprises predetermined activity at a web site. It is used to correlate a pattern of activity with a value. The pattern of activity could indicate a c 10 level of interest in a product or service offered at the web site. In Fig. 5, the qualification profile data structure 300 is shown holding two qualification profiles 305 and 310; however, the invention can be implemented with any number of qualification profiles. The names for the qualification profiles are assigned by the site operator, and may be more meaningful than the arbitrary names Qualification profile 1 and Qualification profile 2 used here. For example, they might be the names of different products or classes of products offered for sale by the operator of the site on server 10. Qualification profile 305 includes three qualification levels 315, 320, and 325; qualification profile 310 includes two qualification levels 330 and 335. Each qualification level represents a different level of interest in the product or service represented by the qualification profile.
Although the preferred embodiment has three qualification levels -fully qualified, moderately qualified, and minimally qualified-the invention may be implemented with any number, and as shown in Fig. 5, different qualification profiles can have different numbers of qualification levels.
As each qualification level includes the same type of information, only qualification level 315 will be discussed in greater detail, although Fig. 5 shows the detail for the other qualification levels 320, 325, 330, and 335. Qualification level 315 includes two elements: a set of requirements 340 (or entry criteria) a visitor must meet to qualify for the qualification level in that qualification profile, and a quantitative value 345 to assign to each visitor who qualifies for that qualification level. It should be appreciated that the value associated with a f qualification level need not be quantitative: it may simply be inherent in the
CN
requirements of the qualification level.
The set of requirements 340 a visitor must meet to qualify for that qualification level in that qualification profile are very flexible. First, in the preferred embodiment, the sets of requirements 340 do not have to be related in any way.
For example, it is not required that the set of requirements for qualification level 00 c315 be a proper subset of the set of requirements for qualification level 325.
In the preferred embodiment, the sets of requirements 340 can be tied to web Spages (or URLs) a visitor must visit. Requirements 340 could also be tied to the elapsed time the visitor spends at the site or on a particular page or group of pages, or to information submitted by a visitor in a form located on one of the web pages. Another example of requirements 340 includes visiting a content group, which is simply a collection of pages or a class of URLs. In addition, one of requirements 340 could be a return visit by a visitor. It should be appreciated that the site operator provides such information as the name of the qualification profiles 305 and 310, the chosen qualification levels 315, 320, 325, 330, and 335, the sets of requirements 340, and the qualitative value 345 to assign to each visitor who qualifies for the qualification level in that qualification profile.
Not shown in Fig. 5 is the nonqualified visitor value that is assigned to each visitor who does not qualify for any qualification profile.
Fig. 6 shows a data structure for the advertising campaigns. In Fig. 6, the advertising campaign data structure 375 is shown holding three advertising campaigns 377, 378, and 379; however, there is no requirement that there be any particular number of advertising campaigns. The names for the advertising campaigns are assigned by the site operator, and may be more meaningful than the arbitrary names Advertising Campaign 1, Advertising Campaign 2, and Advertising Campaign 3 used here. For example, in the case of tracking banner advertisements that refer visitors from other web sites, the name of the referring site might be used. As each advertising campaign includes the same type of information, only advertising campaign 377 will be discussed in greater detail, -16although Fig. 6 shows the detail for the other advertising campaigns 378 and 379. Advertising campaign 377 includes five elements: an entry page 380 (an entry page is the first hit in a visitor session: in Fig. 1, the web page http://www.
IND example.com/portal_ad.htm is the entry page), a referrer 383 (a referrer is a web page that links a visitor to the advertised web site: in Fig. 1, the web page http://www.portal.com/somepage.htm is the referrer), a start date 386 for the 00 advertising campaign, an end date 389 for the advertising campaign, and a cost N 392 for the advertising campaign during the period from the start date 386 to the N end date 389. The entry page 380 and the referrer 383 help the program associate each visitor with an advertising campaign.
To make it possible to distinguish between advertising campaigns, entry pages 380 and referrers 383 should be unique. Although not required, in the preferred embodiment the entry page 380 and the referrer 383 are mutually exclusive elements: the operator can assign only one of the two, and the other remains blank.
Fig. 7 illustrates a first embodiment of the invention. In Fig. 7, at step 700, a data source, such as a log file, is opened for reading. At step 705, the program checks to see if there are any hits left in the log file for processing. If there are, the next hit is read from the log file at step 710. At step 715, the current hit is assigned to a visitor session, described with reference to Fig. 8.
Turning to Fig. 8, in step 500, the hit is analysed to determine the address of the visitor who generated the hit. This information is easily determined, as the structure of the hit is well documented, as described above and depicted in Figs.
2-4.
Still looking at Fig. 8, once the current hit's visitor address has been determined, at step 505 the program scans the visitor session database. A visitor session is a sequence of hits received from a single visitor. The sequence extends between the first hit until a predetermined time after the most recent hit has lapsed without further hits. Although the term visitor was used to describe the qualification profiles and ad campaigns with reference to Figs. 5 and 6, the -17- Cprogram in fact tracks visitor sessions. Each visitor session, of course, is associated with a single visitor. All visitor sessions are maintained in a database. At step 510 the program checks to see if the visitor address exists in IN the visitor session database. If the visitor address is new to the visitor session database, then at step 515 a new entry to the visitor session database is created, using the information from the hit (which includes what, if any, 0 advertising campaign the visitor followed, discussed below). If the visitor (address already existed at step 510, then at step 520 the date and time of the icurrent hit are determined. At step 525 the program checks to see how long it has been since the visitor's last activity, i. since the last hit was received from that visitor. If it has been longer than the predetermined session time, then the session for that visitor is concluded. When the same visitor revisits the site after their session was concluded, then step 515 is performed and a new visitor record in the visitor database is created. But if the visitor session is still active, i.e. the predetermined time from the last hit has not lapsed when the next hit arrives, step 530 is performed and the visitor database is updated according to the current hit. This includes updating the visitor's last date and time of activity and updating the list of actions the visitor has performed.
After completion of the routine of Fig. 8, control then returns to step 705 in Fig. 7 to process additional hits as described above. If, however, there are no hits left in the log file for processing at step 705, control moves to step 720, where the program checks to see if there are any visitor sessions that need to be assigned to qualification profiles. If there are visitor sessions left to process, then step 725 reads the history for one of the remaining visitor sessions. Step 730, in a routine depicted in Fig. 9, then assigns the current visitor session to all qualification profiles for which it qualifies.
Referring to Fig. 9, at step 600, the complete history of the visitor session to which the current hit was assigned is read.
There are currently two ways that the program can identify which particular advertising campaign a visitor followed to the site. One is by referrer. A referrer is the web page that held the link the visitor followed to reach the web site. For -18example, referring back to Figs. 1-4, the referrer is the web page http://www.
portal.com/somepage.html, which referred the remote visitor 12 to the first web site 10, www.example.com.
The second way the program can identify which particular advertising campaign a visitor followed to the site is by the entry page. The entry page is the first web opage on server 10 visited; in the case of advertising campaigns, each 00 Sadvertising campaign can have a different entry page (all of which differ from the N entry page used by visitors who are not following an advertising campaign). For 0example, referring to Fig. 3, the entry page on server 10 is the web page c 10 http://www. example, com/portal_ad.htm.
Regardless of the method the advertising campaign uses to determine what advertisement a visitor followed, if any, that information is available from the first hit a visitor generates at the web site. Referring back to Fig. 3, entry 1 la shows both the requested page ("GET/portal_ad.htm HTTP/1.0") and the referring site ("http://www. portal.com/somepage.htm"). Thus, the program uses the first hit a visitor generates to determine what advertising campaign they followed. The entry page and referrer is assigned in step 601, and-based on this data-the ad campaign is assigned in step 603.
At step 605 the first qualification profile is read. Again, there is no concern of trying to read a non-existent obj ect: if no qualification profiles exist, the program will not be used, since no analysis is needed. At step 610 the visitor session history (read at step 600) is compared with the requirements of the qualification levels of the current qualification profile (read at step 605). At step 615, the program checks to see if the visitor session has met all the requirements for any of the qualification levels of the current qualification profile. If it has, then at step 620 the visitor session is added to the appropriate qualification levels of the current qualification profile. Note that, in the preferred embodiment, within each qualification profile, the qualification levels are ranked, and a visitor session is added to the highest-ranking qualification level of each qualification profile for which the visitor session meets the requirements, but this limitation is not always necessary. (The preferred embodiment also ranks qualification levels: the visitor -19is added to the highest ranked qualification level-within each qualification profile- -for which the visitor qualifies.) At step 625, whether or not the visitor session met the requirements for any of the qualification levels of the current IND qualification profile, the program checks to see if there are any more qualification profiles defined. If there are, then at step 630 the next qualification profile is read and control returns to step 610. Otherwise, the processing of the 00 current hit is finished, and control reverts to step 720 in Fig. 7.
SIf there are remaining visitor sessions to process, the Fig. 7 routine does so in steps 725 and 730 as described above. Conversely, if there are no remaining S 10 visitor sessions left to process at step 720, control is transferred to step 735, where the return-on-investment (ROI) analysis is performed.
Before describing the ROI analysis consideration will first be given to the raw data and its format that exists after the routines of Figs. 7-9 are run as described above. For each ad campaign, the number of visitor sessions that met each level of each qualification profile is stored in tables, as depicted in the Table A example: QP1 QP2 LI L2 L3 LI L2 NQ ADC1 4 6 7 3 5 ADC2 5 9 12 6 11 63 ADC3 1 0 2 3 4 NADC 21 35 46 28 39 211 QPn Qualification Profile n ADCn Ad Campaign n NQ Not qualified for any QP NADC No Ad Campaign Ln Qualification Level n Table A Those visitor sessions that do not result from an ad campaign that is being monitored are classified in the No-Ad-Campaign category. Those visitor sessions that do not meet the criteria of any of the Qualification Profiles are categorized in the NQ column. For each referrer, the number of visitor sessions that met each qualification profile is stored in tables, as depicted in the Table B example: QP1 QP2 (Ni LI L2 L3 LI L2 NQ R1 2 7 4 2 6 R2 4 2 16 2 11 83 5 R3 2 3 7 0 0
\D
NR 31 32 43 22 31 124 Rn Referrer NR No Referrer 00oo 10 Table B (Ni Those visitor sessions that have no referrer are classified in the No-Referrer category. One instance in which a visitor session has no referrer arises when a N visitor types in the monitored web-site address (typically a home page URL) and goes directly to the web site. All visitor sessions that do have a referrer are associated with the referrer. In other words, all referrers are tracked. When a new referrer is encountered, a new entry in the table is made.
The ROI analysis uses the following raw data: Tables A and B; the period of the report, which is the time of the first to the last records processed; the qualification profiles (Fig. the ad campaigns (Fig. and the nonqualified visitor value assigned to the visitor sessions that wind up in the NQ category.
Tables 1-9 below show sample output tables that can be generated by ROI analysis. These tables cross-correlate information from the raw data in various ways. For example, Table 1 shows the number of visitors referred to the web server from six different referring URLs, along with the value of the visitors referred. For each referrer, the number of visitor sessions is shown, as well as the total visitor sessions for all referrers. For each referrer, the value of the visitor sessions for each qualification level is calculated by multiplying the value from that level (Fig. 5) times the visitor sessions meeting the criteria for the qualification profile. Total value of the visitor sessions for all referrers is the sum of these products.
Various additional variables can be calculated using the raw data, and displayed in tables, additional tables, like Tables 2-9 below. Although each calculation is not described, the manner of using the raw data to generate each of the -21calculated variables in the tables can be easily inferred from the name of the variable in view of the following brief description of the table.
Table 2 shows the number of visitors in each qualification profile (in this instance IN downloading of specified products Product 1, Product 2, and Product 3), arranged by qualification level and referring URL. Table 3 shows the number of visitors from each of six advertising campaigns, broken down into qualified and 00oO non-qualified visitors, and the values the visitors generate. Although not shown, it should be noted that all untracked visitors, i. those not associated with a tracked ad campaign, can be summarized in the same categories as those 0 10 shown in Table 3 for tracked visitors. Table 4 shows the number of visitors referred from each advertising campaign, sorted by qualification profile and qualification level. Table 5 shows visitors assigned to each qualification profile and the value they generate sorted by advertising campaign. Table 6 shows visitors for each qualification profile and the value they generated, sorted by qualification level and advertising campaign. Table 7 shows the cost of each of the six advertising campaigns and the cost per visitor for each visitor referred from the respective advertising campaigns. Table 8 shows the return on investment from each advertising campaign, where the return on investment is based on the value of the visitors referred from the respective advertising campaigns less the cost of each campaign. Finally, Table 9 shows the daily return on investment shown in Table 8.
Table 1 Summary of Results by Referrer Value of Visitor a lu e of Referrer Visior Visitors Referred I http://www.yahoo.com/ 1303 $3,229.50 2 http://www.excite.com/ 980 $2,238.00 3 http://www.builder.com/ 900 $2,511.50 4 http://www.intergreat.com/ 605 $1,540.50 http://www.lycos.comn 443 $1,194.00 6 http://www.hotwired.com/ 257 $652.50 Total 4488 $11,366.00 22 Table 2 C0 00 Top Referring Sites By Qualification Profile and Qualification Level Qualification Qualification Referrer Visitor of Profile Level Sessions Total Product 1 Fully Qualified http://www.yahoo.com/ 24 34.29% http://www.builder.com 21 30.00% http:/www.excite.com/ 9 12.86% http:lwww.intergreat.com/ 8 11.43% http:llwww.lycos.com 6 8.57% http://www.hotwired.coff 2 2.86% Subtotal 70 100.00% Moderately http'//www.builder.com/ 53 34.64% Qualified http://www.yahoo.com/ 41 26.80% http://www.excite.com/ 20 13.07% http://www.lycos.com/ .18 11.76% http://www.intergreat.com/ 12 7.84% http://www.hotwired.coni 9 5.88% Subtotal 153 100.00% Minimally http:l/www.builder.com 72 30.90% Qualified http://www.yahoo.com/ 60 25.75% http://www.intergratcoM/ 32 13.73% http://www.excite.com 30 12.88% http://www.lycos.con' 22 9.44% http://www.hotwired.corr/ 17 7.30% Subtotal 233 100.00% Group Subtotal 456 100.00% 2 Product 2 Fully Qualified http://www.yahoo.com/ 13 34.21% http://www.builder.com/ 8 21.05% http://www.intergreat.com/ 6 15.79% http://www.excite.con/ 5 13.16% http://www.lycos.com/ 4 10.53% http://www.hotwired.conV 2 5.26% Subtotal 38 100.00% Moderately http://www.lycos.com/ 23 31.51% Qualified http://www.builder.com/ 15 20.55% http://www.intergreaLcom/ 14 19.18% http://wwvw.yahoo.com/ 12 16.44% http.//www.excite.com/ 9 12.33% htlp://www.hotwircd.com/ 0 0.000/0 Subtotal 73 100.00% Minimally http://www.yahoo.conV 32 28.57% Qualified http://www.builder.com/ 23 20.54% http://www.intergreat.com/ 26 23.21% http://www.lycos.con 15 13.39% http://www.excite.com/ 10 8.93% http://www.hotwired.con/ 6 5.36% Subtotal 112 100.00% Group Subtotal 1 223 100.00% Product 3 Fully Qualified lhttp'//www.builder.cor 12 33.33% http://www.lycos.com 9 25.00% http://www.intergreaLcom/ 7 19.44% http://www.yahoo.com' 4 11.11% http://www.hotwired.corV 3 8.33% http'./www.excite.coni/ I 2.78% -23- Subtotal 100.00% Moderately http://www.intergreatcom/ 19 29.69% Qualified http://www.buijlder.corm/ 15 23.44% http://www.lycos.cotW 13 20.31% http://www.hotwird.coml 11 17.19%/ http://www.yahoo.corre 6 9.38% http://www.excite.conV 0 0.00%/ 64 100.00% Minimally http://www.buildr.comte 28 26.42% Qualified http://www.intcrgreaLCOnV 22 20.75% http://www.lycos.corrV 21 19.81% http://www.hotwired.corrV 16 15.09% http://www.yahoo.com/ 13 12.26% ,http://www.excite.conii 6 5.660/ 106 100.00% 00 Group Subtotal 100.00% Gru Sbotal 88 100.00% Table 3 Summarrof Result by Ad Campaign_____ Non- Non- ute Qualified QualifiedToa Vitr Ad Campaign Qaiid Qaiid VstVisitor Visitors Visitor Average Voaluesio Visitor Visitor Sessions Average Total Value Sessions Value Vau Sessions Value Value I_ Yahoo! Banner 1098 S2,196.00 205 $5.04 31,033.50 1303 S2.48 $3,229.50 2 Buildercomn Banner 653 S1,306.00 247 S4.88 $1,205.50 900 S2.79 S2,51 1.50 3 Excite Banner 890 S 1,780.00 90 $5.09 S458.00 980 S2.28 $2,238.00 4 Intcrgreat Banncr 459 3918.00 146 54.26 S622.50 605 S2.55 S1,540.50 Lycos Banner 312 S624.00 131 S4.35 S570.00 443 S2.70 31,194.00 6 HotWired WebMonkey 193 1386.00 64 14.16 S266.50 257 S2.54 3652.50 Banner___ Total 3605 $7,210.00 1 883 154.71 34160 48 S2.53 1S11,360 24 Table 4 Results by Ad Campaign, Qualification Profile and Qualification Level Ad ampign Qualification Qualification Visitor Visiorf au A Capin Profle Level Sessions Sessitors Value__ IYahoo! Banner Product I Fully Qualified 24 1.84% S192.00 Moderately Qualified 41 3.15% 1246.00 Minimally Qualified 60 4.60% 1300.00 Product 2 Fully Qualified 13 1.00% $78.00 Moderately Qualified 12 0.92% S48.00 Minimally Qualified 32 2.46% $96.00 Product 3 Fully Qualified 4 0.3 1% S20.00 Moderately Qualified 6 0.46% $21.00 Minimally Qualified 13 1.000/0 S32.50 Non-Qualified 1098 84.27% S2,196.00 Subtotal 1303 100.00% 13,229.50 2 Excite Banner Product I Fully Qualified 9 0.92% $72.00 Moderately Qualified 20 2.04% 1120.00 Minimally Qualified 30 3.06% $150.00 Product 2 Fully Qualified 5 0.5 1% S30.00 Moderately Qualified 9 0.92% 136.00 Minimally Qualified 10 1.02% 130.00 Product 3 Fully Qualified 1 0.100% S5.00 Moderately Qualified 0 0.000/0 10.00 ________Minimally Qualified 6 0.61% S15.00 Non-Qualified 890 90.82% S1,780.00 980 100.00% $2.2.38.00 3 Buildercom Banner Product I Fully Qualified 21 2.33% $168.00 Moderately Qualified 53 5.89% 1318.00 _________Minimally Qualified 72 8.00% 1360.00 Product 2 Fully Qualified 8 0.890/0 148.00 Moderately Qualified 15 1.67% S60.00 _________Minimally Qualified 23 2.56% S69.00 Product 3 Fully Qualified 12 1.33% $60.00 Moderately Qualified 15 1.67% $52.50 _________Minimally Qualified 28 3.11% $70.00 Non-Qualitied 653 72.56% 11,306.00 900 100.00% $2,511.50 4 Intergreat Banner Product I Fully Qualified *8 1.32% W64.0 Moderately Qualified 12 1.98% 172.00 Qualified 32 5.29%/ 1160.00 Product 2 Fully Qualified 6 0.99% S36.00 Moderately Qualified 14 2.31% 156.00 Minimally Qualified 26 4.30% 178.00 Product3 Fully Qualified 7 1.16% 135.00 Moderately Qualified 19 3.14% 166.50 _________Minimally Qualified 22 3.64% $55.00 Non-Qualified 459 75.87% 1918.00 605 100.0O% $1,540.50 Lycos Banner Product I Fully Qualified 1.3 5% $48.00 Moderately Qualifiedi I18 4.06% $108.00 Minimally Qualified 1 22 4.97% $110.00 1 t t 4 rroouct 2 Fully Qualified 0.90% 124.00 Product 2 Fully Qualified 0.90% $24.00 Moderately Qualified!1 23 1 5.19%h 1 S92.00 Minimally Qualified 1 15 3.390/a S45.00 Product 3 Fully Qualified 9 2.03% $45.00 Moderately Qualified 13 2.93% S45.50 Qualified 21 4.74% j $52.50 Non-Qualified 312 70.43% S624.00 Subtotal 100.00% $1,194.00 6 Hot Wired WebMonkey Product I Fully Qualified 2 0.78% $16.00 Banner Moderately Qualified 9 3.50%/ $54.00 _________Minimally Qualified 17 6.6 1% $85.00 Product 2 Fully Qualified 0 0.00/0 $0.00 Moderately Qualified 0 0.000/0 $0.00 _________Minimally Qualified 6 2.33% $18.00 Product 3 Fully Qualified 3 1.17% $15.00 Moderately Qualified 11 4.28% $38.50 M inimnally Qualified 16 6.23% $40.00 Non-Qualified 193 j75.10% $386.00 Subtotal 257 100.00% S652.50 Total 14488 100.00% $S11,366.00 Table Results by Oualification Profile Qualification Qualified of of Profile Ad Campaign Visitor Visitor Value Value Sessions Sessions IProduct I Builder.comn Banner 146 32.02% $846.00 32.01% Yahoo! Banner 125 27.41% $738.00 27.92%/ Excite Banner 59 12.94% $342.00 12.94% Intergrcat Banner 52 11.40% $296.00 11.20% Lycos Banner 46 10.09% $266.00 10.06% HotWired WebMonkey Banner- 28 6.14% $155.00 5.86% Subtotal 456 100.00% S2,643.00 100.00% 2 Product 2 Yahoo! Banner 57 25.79% $222.00 26.30% Builder.comn Banner 46 20.8 1% $177.00 20.97% Intergreat Banner 46* 20.81% $170.00 20.14% Lycos Banner 42 19.00% $161.00 19.08% Excite Banner 24 10-86% $96.00 11.37% HotWired WebMonkey Banner 6 2.71% $18.00 2.13% __Subtotal 221 100.00% $844.00 100.00% 3 Product 3 Builder.com Banner 55 26.70% $182.50 27.28% lntergreat Banner 48 23.30% $156.50 23.39% Lycos Banner 43 20.87% $143.00 21.38% HotWired WebMonkey Banner 30 14.56% S93.50 13.98% Yahoo! Banner 23 11.17% $73.50 10.99% Banner 7 3.40% $20.00 2.9W/% [Subtotal 206 100.00% $669.00 100.00% 26 00 Table 6 Results by Qualification Profile and QualificationLevel_________ Qualification Qualification Visitor of Visitor of Profile Level Ad Campaign Ssion Visitor Vle Visitor ValueVau I Product I Fully Quaiified YahoolI Banner 24 34.29%h $192.00 34.29% Buildercomn Banner 21 30.00% $168.00 30.00% Excite Banner 9 12.86% $72.00 12.86% lntergreat Banner 8 11.43% $64.00 11.43% Lycos Banner 6 8.57% $48.00 8.57% Hot Wired WebMonkey Banner 2 2.86% $16.00 2.86% Subtotal 70 100.00% $560.00 100.00% Moderately Buildercomn Banner 53 34.64% S318.00 34.64% Qualified YahoolI Banner 41 26.800/ S246.00 26.80% Excite Banner 20 13.07% $120.00 13.07% Lycos Banner 18 11.76% $108.00 11.76% lntergreat Banner 12 7.84% $72.00 7.84% HotWired WebMonkey Banner 9 5.88% $54.00 5.88% ______Subtotal 153 100.00% $918.00 100.00% Minimnally Buildcr.com Banner 72 30.90% $360.00 30.90% Qualified Yahoo! Banner 60 25.75% $300.00 25.75% Intergreat Banner 32 13.73% $160.00 13.73% Excite Banner 30 12.88% $150.00 12.88% Lycos Banner 22 9.44% $110.00 9.44% Hotfired WebMonkey Banner 17 7.30% $85.00 7.30% Subtotal 233 100.00% $1,165.00 100.00% 456 S2,643.00 2 Product2 Fully Qualified Yahoo! Banner 13 36.11% $78.00 36.11% Builder.comn Banner 8 22.22% $48.00 22.22% lntergreat Banner 6 16.67% $36.00 16.67% Excite Banner 5 13.89% S30.00 13.890/c Lycos Banner 4 11.11% $24.00 11.11% HotWired WebMonkey Banner 0 0.00% $0.00 0.00% Subtotal 36 100.00% $216.00 100.00% Moderately Lycos Banner 23 31.51% $92.00 31.51% Qualified Buildercomn Banner 15 20.55% $60.00 20.55% lntergreat Banner 14 19.18% $56.00 19.18% Yahoo! Banner 12 16.44% $48.00 16.44% Excite Banner 9 12.33% $36.00 12.33% HotWired WebMonkey Banner 0 0.00% $0.00 0.000/0 Subtotal 73 100.00% $292.00 100.00% Minimlly Yahoo! Banner 32 28.57% $96.00 28.57% Qualified lntergreat Banner 26 23.21% $78.00 23.21% Buildercomn Banner 23 20.54% $69.00 20.54% Excite Banner 10 8.93% $30.00 8.93% Lycos Banner 15 13.39%/ $45.00 13.39% HotWired WebMonkey Banner 6 5.36% $18.00 5.36% Subtotal 112 100.00% S336.00 100.00% Total 221 S 844.00 Product 3 Fully Qualified I Builder.com Banner 12 I 33.33% $60.00 I 33.33% Lycos Banner 9 250% $45.00 lntrgratBaner251.00% $35.00 251.00% I ntergreat Banner 7 1 19.44% S35-00 1 19.44% 27 Yahoo! Banner 4 11.11% $20.00 1 11.11% HotWired WebMankey Banner 3 8.33% j $15.00 8.33% Excite Banner 1 2.78% $5.00 2. 78% Subtotal Sutoal36 100.00% I 1 80 uso I0.00% Moderately Lntergreat Banner 19 29.690/. $66.50 29.69% Qualified Builder.comn Banner 15 23.44% $52.50 23.44% Lycos Banner 13 20.31% $45.50 20.31% HotWired WebMonkey Banner 11 17.19%/ S38.50 17.190/, Yahoo! Banner 6 9.38% $21.00 9.38%o Excite Banner 0 0.00%/ $0.00 0.00%/ 77 Subtotal 64 100.00% S224.00 100.00% 00 [IniauIy Qualified Builder.corn Banner Huide~cm aner28 I2642%4 7000l 262 Intergreat Banner 22 20.75% $55.00 20.75% Lycos Banner 21 19.81% $52.50 19.81% HotWired WebMonkey Banner 16 15.09% $40.00 15.09% Yahoo! Banner 13 12.26% $32.50 12.26% Excite Banner 6 5.66% $15.00 1 5.66% Subtotal Sutoal106 1 100.00% 1 S265.00 1 100.00%'/ II 206 -I S669.00 Table 7 Ad Campaign Costs____ Cost This Total Cost Per Qualified Cost Per Ad Campaign Peid VstVisitor Visitor Qualified Periodn Vi Ito Sessions Visitor I Yahoo! Banner $1,250.00 1303 $0.96 205 $6.10 2 Excite Banner $433.00 980 $0.44 90 $4.81 3 Builder.comn Banner $1,250.00 900 $1.39 247 $5.06 4 [ntergreat Banner $200.00 605 $0.33 146 $1.37 Lycos Banner $2,000.00 443 $4.51 131 $15.27 6 HotWired WebMonkey Banner $1,250.00 257 $4.861 64 1$19.53 Total $6,383.00 4488 $1.42 883 S7.23 Table 8 Ad Campaign Return on Investment ACapin# Days Cost of Total Visitor ROIThs %O ACapin Active This Campaign Value Peid This Period This Period Generated Perio Prid I Yahoo! Banner 7 $1,250.00 $3,229.50 $1,979.50 158.36% 2 Excite Banner 16 $433.00 $2,238.00 $1,805.00 416.86% 3 lntergreat Banner 5 $200.00 $1,540.50 $1,340.50 670.25% 4 Buidercomn Banner 7 $1,250.00 $2,511.50 $1,261.50 100.92% HotWired WebMonkey Banner 9 $1,250.00 $652.50 ($597.50) -47.80% 6 Lycos Banner 12 $2,000.00 $1,194.00 ($806.00) 40.30% Total I $6,383.00 1$11,366.00 1$4,983.00 78.07 28 Table 9 Ad Campaign Daily Return on Investment Days Visitor Days Cost Per Visitor ROI Per Ad Campaign Active This oster Value Per R er Period Da Day Day 1 Yahoo! Banner 7 $178.57 $461.36 $282.79 2 Intergreat Banner 5 $40.00 $308.10 $268.10 SBuilder.com Banner 7 $178.57 $358.79 $180.21 4 Excite Banner 16 $27.06 $139.88 $112.81 HotWired WebMonkey Banner 9 $138.89 $72.50 ($66.39) 6 Lycos Banner 12 $166.67 $99.50 ($67.17) STotal $563.09 $1,340.62 $777.52 Turning now to Figs. 10 and 11, illustrated therein is a flow chart, indicated generally as program 800, depicting steps in a computer program constructed in accordance with the present invention. As is the case with the previously described programs, program 800 operates on server 10 in the present embodiment of the invention, although this is not required.
Program 800 is advantageous in that it tracks only criteria of interest for each active visitor session and--at the conclusion of each session--determines whether the visitor whose session was monitored meets the criteria for each qualification profile. And if so, the program assigns the visitor accordingly. This naturally requires less processing and memory resources than program 700.
Turning now to Fig. 10, in step 801, the program checks to see if there are more hits in the log file. If so, in step 805, the program reads the next hit generated by interaction of a remote visitor with server 10. If it is a hit from a new visitor, i. e., there is no visitor session active for the particular visitor who produced the current hit, a new visitor session is created in step 815. At the same time, the visitor session is assigned to an entry page and referrer and to an ad campaign in steps 817,819, respectively, as described above. Thereafter, a checklist is assigned to the new visitor session in 820. The checklist is merely a list of all of the requirements for each qualification level in each qualification profile. In the case where criteria for each of the requirements are selected web pages -29f identified by URLs on the site, the checklist assigned to each visitor session in
(N
step 820 is merely a list of all of those URLs.
Returning again to step 810, if there is a visitor session active for the particular visitor who produced the current hit, that visitor's session is updated. When a visitor session is updated responsive to a current hit from that visitor, the information in the hit is examined to determine whether or not any of the URLs 00 on the checklist were visited and, if so, that URL is flagged. In the present embodiment of the invention, the same checklist is assigned to each visitor asession.
(.i This process begins in step 824 when the hit is examined to determine whether or not the page is on the checklist. If so, that page on the list is flagged in step 825, and a session timing clock, which is unique to each visitor session, is reset and started in step 830. If not, the program moves from step 824 to step 830 to reset and start the clock associated with that visitor session. In other words, every hit from the visitor resets and starts the clock in step 830 whether the visitor views a page on the checklist or not. After resetting and starting the clock, the program-in step 835-checks each open visitor session. For each session, in step 840, the program determines whether the clock associated with that visitor session has timed out. Put differently, it determines whether the predetermined time used to define each visitor session has lapsed without another hit from that visitor. If not, the program leaves the visitor session open and returns control to step 835 to check the next visitor session. If the session has lapsed, the program closes that session in accordance with Fig. 11, which is described shortly, and returns control to step 835 to check the next session. After all current sessions are checked using the routine in steps 835,840, and Fig. 11, control is transferred again to step 801 to check for more hits, as described above.
When there are no more hits in the log file, control transfers to decision box 837, which checks all remaining open visitor sessions and closes each in accordance with Fig. 11.
6 Each time a session is closed, control again returns to step 837 to close the next visitor session until all are closed by the Fig. 11 routine. Control then goes to step 839, wherein the ROI analysis is performed in the same manner as Idescribed in connection with the embodiment of Figs. 7-9.
Turning now to Fig. 11, consideration will be given to the manner in which a visitor session is closed. With reference to Fig. 10, this occurs after step 840, 00 when each session expires, and after step 801, when there are no more hits to process and all remaining visitor sessions are consequently closed. In steps S845,850, the session is closed, and the checklist associated with the session is S 10 examined to determine which pages the visitor viewed during the visitor session.
In step 855 the flagged pages are compared with the pages designated in each qualification level within each qualification profile. In step 860, the visitor is assigned to the highest qualification level, like qualification level 315 in Fig. 5, in each qualification profile, like qualification profile 305 in Fig. 5, for which she qualifies. This is accomplished in the same manner as described in connection with Fig. 9. Next, in step 865, Tables A and B are updated accordingly. It is from these tables that data are extracted, as described above, to produce tables like those shown in Tables 1-9 above.
Having illustrated and described the principles of our invention in a preferred embodiment thereof, it should be readily apparent to those skilled in the art that the invention can be modified in arrangement and detail without departing from such principles. We claim all modifications coming within the spirit and scope of the accompanying claims.
Throughout the specification and claims, unless the context requires otherwise, the word "comprise" or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated integer or group of integers but not the exclusion of any other integer or group of integers.

Claims (19)

1. A method for assigning a value to visitors of one or more web sites using traffic data, the method comprising: INO predetermining a first set of activity to be undertaken by a first visitor to one or more web sites and assigning a first value to the first set of activity; 00oO predetermining a second set of activity to be undertaken by a second C visitor to one or more web sites and assigning a second value to the second set c of activity; Sanalyzing the traffic data of each visitor including performance of at least c 10 a first set of activities or a second set of activities; and associating the first or second value to the visitor based on whether the visitor undertook the first or second sets of activity.
2. The method of claim 1 wherein analyzing the traffic data of each visitor comprises establishing a visitor session for each visitor to the one or more web sites and tracking the visitor's activity during the visitor session.
3. The method of claim 2 wherein associating a first or second value to the visitor comprises associating a first or second value to the visitor for a first selected time period.
4. The method of claim 3 further comprising associating a first or second value to the visitor for a second selected time period.
5. The method of claim 2 wherein the first visitor and the second visitor are the same visitor being tracked through different visitor sessions.
6. The method of claim 1, wherein the first set and the second set comprise a list of uniform resource locators (URLs) to be visited by the first visitor and the second visitor. 32
7. The method of claim 6, wherein analyzing the traffic data comprises determining if the visitor visited one of the URLs listed in the first set and the second set. IND
8. The method of claim 7, wherein associating the first or second value comprises: oo associating the first value to the visitor if the visitor visited each of the SURLs listed in the first set; and associating the second value to the visitor if the visitor visited each of the URLs listed in the second set.
9. The method of 8, wherein associating the first or second value comprises only associating the second value to the visitor if the visitor visited each of the URLs listed in the first set and the second set.
A method for assigning value to visitors of one or more web sites using traffic data, the method comprising: determining an address for a visitor to one or more web pages associated with the web server; searching a visitor session database for the visitor's address; updating the visitor session database with a hit corresponding to information from the visitor's visit; analyzing the visitor session database to determine the value of the visitor; and assigning a value to the visitor based on the visitor session database.
11. The method of claim 10, further comprising creating a visitor session for the visitor in the visitor session database if the visitor's address is not found in the visitor session database.
12. The method of claim 10, further comprising opening an existing visitor session for the visitor if the visitor's address is found in the visitor session database. -33-
13. The method of any of claims 11 and 12, further comprising closing the visitor session if a predetermined amount of time passes without a Isubsequent hit by the visitor.
14. The method of claim 10, wherein analyzing the visitor session 00 database to determine the value of the visitor comprises comparing an activity (log for the visitor to a predetermined first set of activity and a predetermined (second set of activity.
The method of claim 14, wherein each of the predetermined first set and the predetermined second set comprises a list of uniform resource locators (URLs).
16. The method of claim 15, wherein assigning a value to the visitor comprises assigning a first value to the visitor if the activity log comprises all of the URLs in the list of the predetermined first set.
17. The method of claim 16, wherein assigning a value to the visitor comprises assigning a second value to the visitor if the activity log comprises all of the URLs in the list of the predetermined second set.
18. The method of 17, wherein assigning a value to the visitor comprises only assigning the second value to the visitor if the activity log comprises all of the URLs in the list of both of the predetermined first set and the predetermined second set.
19. The method of claim 14, wherein the predetermined first set and the predetermined second set each comprise an elapsed time requirement. The method of claim 14, wherein the predetermined first set and the predetermined second set each comprise an information list required to be submitted by a visitor on a form.
AU2007202189A 1999-01-29 2007-05-16 Method and Apparatus for Evaluating Visitors to a Web Server Ceased AU2007202189B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2007202189A AU2007202189B2 (en) 1999-01-29 2007-05-16 Method and Apparatus for Evaluating Visitors to a Web Server

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09/240208 1999-01-29
AU2004202222A AU2004202222B2 (en) 1999-01-29 2004-05-25 Method and Apparatus for Evaluating Visitors to a Web Server
AU2007202189A AU2007202189B2 (en) 1999-01-29 2007-05-16 Method and Apparatus for Evaluating Visitors to a Web Server

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
AU2004202222A Division AU2004202222B2 (en) 1999-01-29 2004-05-25 Method and Apparatus for Evaluating Visitors to a Web Server

Publications (2)

Publication Number Publication Date
AU2007202189A1 true AU2007202189A1 (en) 2007-06-07
AU2007202189B2 AU2007202189B2 (en) 2010-09-30

Family

ID=38157622

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2007202189A Ceased AU2007202189B2 (en) 1999-01-29 2007-05-16 Method and Apparatus for Evaluating Visitors to a Web Server

Country Status (1)

Country Link
AU (1) AU2007202189B2 (en)

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5996007A (en) * 1997-06-16 1999-11-30 John Klug Method for providing selected content during waiting time of an internet session
US6018619A (en) * 1996-05-24 2000-01-25 Microsoft Corporation Method, system and apparatus for client-side usage tracking of information server systems

Also Published As

Publication number Publication date
AU2007202189B2 (en) 2010-09-30

Similar Documents

Publication Publication Date Title
AU2004202222B2 (en) Method and Apparatus for Evaluating Visitors to a Web Server
US6321209B1 (en) System and method for providing a dynamic advertising content window within a window based content manifestation environment provided in a browser
JP5072160B2 (en) System and method for estimating the spread of digital content on the World Wide Web
Burton et al. The value of web log data in use-based design and testing
US20030046149A1 (en) Method, an apparatus, and a computer program for effectively reaching a target audience and significantly increasing the efficiency of internet banner advertisement
US20050278590A1 (en) Method of remotely monitoring an internet Web site
US20060229942A1 (en) Method and automated system for creating and tracking on-line embedded search event records and generating leads
US20130041765A1 (en) Method and system for optimum placement of advertisements on a webpage
US8000999B2 (en) Method and system for creating, serving and tracking advertisements
US20070129995A1 (en) Performance-based marketing system and method
US20020184041A1 (en) Automated customer survey using the web
KR20000064105A (en) Advertisement network system involving community service system on internet and method thereof
KR102174041B1 (en) System for advertisement platform based big data
AU2007202189B2 (en) Method and Apparatus for Evaluating Visitors to a Web Server
JP2000215136A (en) Internet advertisement management system, internet advertisement management method which uses the same system and record medium where the method is recorded
Hofacker et al. Using server log files and online experiments to enhance internet marketing
US20220122119A1 (en) Electronic advertising campaign tracking
KR20000049823A (en) Use Webbrouser firstpage to advertise and that use to marketing plan.
Cheyne Best Practice: Tracking customers at Teletext
BG2977U1 (en) Platform for integration of system for research, analysis and control of data in the internet and a system for internet marketing, sales and payments for agricultural production, and other goods and services
KR20040015510A (en) Banner display method for internet advertisement
WO2001090966A1 (en) Monitoring system
Hofacker et al. J amie M urphy
Longfellow et al. Affiliate Programs
RELA Gartner Group CRM Summit 2000

Legal Events

Date Code Title Description
NB Applications allowed - extensions of time section 223(2)

Free format text: THE TIME IN WHICH TO MAKE A FURTHER APPLICATION FOR A DIVISIONAL PATENT HAS BEEN EXTENDED TO 15 JUN 2007.

FGA Letters patent sealed or granted (standard patent)
MK14 Patent ceased section 143(a) (annual fees not paid) or expired