专利摘要:
Methods and system for creating rules for a tag management system. One or more embodiments for creating rules for a tag management system may include exploring (400) a page of a website. In addition, one or more embodiments identify (410) the configuration of each of the tags implemented in the page. In addition, one or more embodiments generate (420) one or more rules that allow a tag management system to recreate the configuration of one or more tags implemented in the page. In addition, one or more embodiments export (430) the generated rule (s) to a tag management system.
公开号:FR3018620A3
申请号:FR1551161
申请日:2015-02-12
公开日:2015-09-18
发明作者:Alan Martin Feuerlein;Matthew T Miller;John Pestana;Robert K Seolas
申请人:ObservePoint LLC;
IPC主号:
专利说明:

[0001] Technology Concerned The development of the Internet and the associated trade has meant that many website owners have tried to track various data on the people who visit their websites. In particular, website owners often want to collect all kinds of analytics data about visitors viewing their web page. In many cases, this analytics data can be used to determine a number of things such as advertisements to display to a visitor and royalties to pay to various external advertisers.
[0002] A typical method for generating analytics data on website visitors is to use tags. Under at least one conventional form, a tag is a hidden element within a web page that generates an action on a web page when it is triggered. In particular, according to at least one implementation, a tag is one that is placed inside a web page and that allows the owner of a web page to collect information about the visitors who download and execute the particular code. For example, a tag may include a transparent GIF or a spy pixel that is placed within the code of a web page. Said transparent GIF or spy pixel can be stored on a separate server of said web page. The tag is triggered when the browser requests the transparent GIF or the spy pixel from the separate server. When the separate server receives the browser request, the server may collect various analytics data on the requestor. Once executed, a tag can collect information such as the visitor's origin (for example, from the web page or the search engine), the keywords used to find the web page, whether a particular advertisement directed a visitor to the page, and other associated data. In many situations, a single web page may include multiple tags of various origins. For example, a particular web page may contain a Google Analytics tag, a Facebook tag, a page counter tag, a weather tag, and other similar tags. In order for the analytics data collected by tags to be complete, websites that have a large number of pages must have tags on each of the pages. If a page does not have a particular tag, then the analytic information associated with that particular tag will not be collected for the page. In addition, some tags may become obsolete or may be considered a security risk. In these cases, the tags must be removed from all individual pages of the website. The number of tags and the size of the websites have increased so that the management of the tags contained in a website has become a complicated task.
[0003] One way to solve tag control problems in websites is to implement tag management systems. The tag management systems operate by replacing the plurality of individual tags on a web page with a single reference tag. When a user loads the reference tag, the tag management system identifies, using a set of rules, the tag, among a plurality of individual tags, which must be allowed to run on the web page. The tag management system then allows the triggering of the identified tags. A properly implemented tag management system may have advantages such as requiring only the implementation of a single tag on each page of a website and that of providing a single interface for controlling all tags. However, in practice, it may be difficult to implement a tag management system in a web site in which pages have previously been tagged. In particular, it can be difficult to determine the rules to apply to each individual page of a website to ensure that a tag management system associates the right tags with each individual page.
[0004] In many cases, different web pages of the same website will contain different tags. In addition, some web pages may not have particular tags or may contain tags that are not needed. For a tag management system to work properly, it is necessary to create specific rules for each web page that determine exactly which tags to execute and the conditions for their execution.
[0005] Therefore, the technique has a number of issues that relate to creating rules for a label management system that can be addressed.
[0006] BRIEF SUMMARY OF THE INVENTION Embodiments of the present invention overcome one or more problems of the art using systems, methods, and apparatus configured to automatically generate rules for a tag management system by parsing a website and by identifying the configuration of tags within the website. In particular, at least one embodiment of the present invention scans a website and identifies the configuration of the tags within each page of the website. The identified configurations can then be used to generate rules for a tag management system. In addition, according to at least one embodiment, the present invention identifies patterns of the tags implemented in the web pages. Identified patterns can then be used to generate rules for the tag management system.
[0007] For example, a method according to at least one embodiment of creating rules for a tag management system may include browsing a page of a website. The method may include identifying the configuration of the tags implemented in the page. In addition, can include the generation of one or more allow a tag management system also each of the rules method that recreates the configuration of one or more tags implemented in the page. In addition, the method may include exporting the generated rule (s) to the tag management system.
[0008] According to an additional or alternative embodiment, a method of creating rules for a tag management system may include scanning each of the pages of a website. The method may also include identifying one or more tags implemented in each of the pages. In addition, the method may include identifying one or more patterns of the tags of the website. In addition, the implemented in the process pages may include generating one or more rules that are configured to allow a tag management system to recreate the identified pattern (s). In addition, the method may include exporting the generated rule (s). BRIEF DESCRIPTION OF THE DRAWINGS In order to describe how the aforementioned and other advantages and features of the invention can be obtained, a more specific description of the invention briefly described above will be presented with reference to specific embodiments thereof which are illustrated in the accompanying drawings. It should be noted that the figures are not to scale, and that similar structure or function elements are generally represented by like reference numerals for purposes of illustration in all the figures. It should be borne in mind that these drawings only illustrate typical embodiments of the invention and therefore should not be construed as limiting the scope thereof, the invention will be described and explained with specificity and features. further details using the accompanying drawings in which: Figure 1 illustrates a block diagram of the architecture of a rule creation system for a tag management system; Figure 2 is a representation of a web site comprising several web pages containing tags and the relationship between them; Figure 3 is another representation of a web site comprising several web pages containing tags and the relationship between them; Figure 4 illustrates a flowchart of a series of actions in a method according to an embodiment of the present invention for creating rules for a tag management system; and Figure 5 illustrates another flowchart of a series of actions in a method according to an embodiment of the present invention for creating rules for a tag management system. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Embodiments of the present invention extend to systems, methods, and apparatus configured to automatically generate rules for a tag management system by web site analysis and identification. the configuration of tags within the website. In particular, at least one embodiment of the present invention scans a website and identifies the configuration of tags within each page of the website. The identified configurations can then be used to generate rules for a tag management system. In addition, according to at least one embodiment, the present invention identifies patterns of the tags implemented in the web pages. Identified patterns can then be used to generate rules for the tag management system. For example, at least one embodiment of the present invention scans an entire website and generates a set of rules for a tag management system. In particular, the system, software, and methods of the present invention may scan each page of a website to identify the tags that are associated with each respective page. The present invention can then generate a set of rules that can be exported to a tag management system. According to at least one embodiment, the present invention can also determine whether a tag 30 is associated with one or more variables. After determining that a tag is associated with a variable, according to at least one embodiment, the present invention can automatically generate a rule to correctly process the variable. In contrast, according to at least one embodiment, the present invention may require a user of the additional information necessary to correctly generate a rule for the tag and the variable. In addition, the present invention may identify tags that are embedded in rich content or media content of a web page. In particular, the present invention can render a web page and enable multimedia content and enriched content integrated into the web page. When the web page is rendered, the present invention can identify the tags that are fired. For example, tags may be associated with a video file, so that tags will only fire at specific points when the video file is playing. This can allow a content provider to identify the parts of the video file that have been viewed. According to at least one embodiment, the present invention can play a video file and identify the tags that are triggered when the video is playing. The present invention can then generate rules that will allow a tag management system to correctly implement tags associated with the video file. When analyzing the tags of various web pages of a website, the present invention may identify patterns in the placement and implementation of the tags in the website. For example, the present invention can identify that a particular tag is present in every page of a website. A rule that follows can be simplified to state that the particular tag must be present in each page. Similarly, the present invention can identify that a particular tag is present only within the portion of the shopping cart of a website. The rule that follows can simply state that each time a shopping cart page is requested by a user, the particular tag must be present on the page. Therefore, it will be understood from the view of the specification and the claims of the present application that at least one embodiment of the present invention analyzes a website and automatically generates rules for a tag management system. Specifically, at least one embodiment of the present invention identifies the configuration of tags that are implemented in a web page and creates rules that will allow a tag management system to replicate the current tag configuration in the web site. . It will be understood that the automatic generation of tag rules for a tag management system allows for huge savings in time and money. Figure 1 illustrates a block diagram of the architecture of a rule creation system for a tag management system. In particular, Figure 1 shows an interface 101 of a site analyzer that is in communication with an analysis server 150. The analysis server 150 receives from the interface 110 of a site analyzer a URL 100 to analyze. The analysis server 150 comprises a site exploration module 140, an analysis module 160, a rule creation module 170 and a tag database 180. The analysis server 150 can access the analysis module 150. Provided URL 100 and communicate with the website 120 which is associated with the URL 100. As shown in Figure 1, the website 120 may include a web page memory 125, where the content of said web site is stored. . For example, a web page memory 125 may store the source code of each web page of a web site 120. In addition, a web page memory 125 may store multimedia content that is accessible via the web pages. In Figure 1 and throughout this application, the website 120 is shown and described as a unitary system. It will be understood, however, that a web site 120 may be composed of multiple servers and multiple web page memories 125. According to at least one embodiment, the analysis server 150 may access the web page memories 125 on each one. servers that is associated with a particular web page. Figure 1 shows that a user can enter a URL 100 in the interface 110 of a site analyzer.
[0009] The interface 110 of the site analyzer can then communicate the URL 100 to the analysis server 150. In this request, a URL 100 of "http://www.mywebsite.com" is used as an example , but it will be understood that any number of different URLs 100 may be entered in the interface 110 of the site analyzer. Once the analysis server 150 has received the URL 100, the site exploration module 140 sends communication packets 130a to the website 120 which is associated with the URL 100 and receives response communication packets. 130b from the website 120. In the case shown, the site exploration module 140 accesses http://www.mywebsite.com. Specifically, the site exploration module 140 accesses the web page memory 125 that is associated with the web site 120. In at least one embodiment, the site exploration module 140 can then explore, using methods which are known in the art, the entire web site 120 that is associated with the URL 100. According to at least one embodiment, the site exploration module 140 may include a rendering component 145. The rendering component 145 can restore the information contained in 130b packets that are received from the web page memory 125. For example, the rendering component 145 can restore a java or flash portion of a web page. Once rendered, the site exploration module 140 can explore the rendered portion of the web page and identify additional tags that otherwise were not visible.
[0010] In some cases, browsing a rendered web page may provide additional information over what would be available if only the source code was explored. In particular, a particular web page may contain multimedia content that contains interesting attributes that are only visible when the media content is enabled. According to at least one embodiment, the rendering component 145 can enable the site exploration module 140 to access these attributes of interest by restoring and activating at least part of the content that is integrated in a web page that is stored in the web page memory 125.
[0011] Since the site exploration module 140 searches a website 120, the data 130b that is received from the web page memory 125 can be sent to the analysis module 160. According to at least one embodiment, the module Site Browser 140 communicates the received 130b data to the analysis module 160 web page per web page. Similarly, in at least one embodiment, the site exploration module 140 communicates the data 130b to the analysis module 160 as the data is received. According to another embodiment, the site exploration module 140 communicates the data 130b to the analysis module 160 after having explored the entire website.
[0012] In addition, the analysis module 160 and the site exploration module 140 may have the ability to analyze multiple parallel. For example, multiple browsing module to parse However, to avoid can be data flow or web pages the analysis module 160 and site 140 can include in the processors, each of them being able or to explore independently a web page. according to at least one embodiment, to overload the servers of a website 120, it is desirable to limit the speed at which the site exploration module 140 explores the website. For this purpose, the exploration module 140 can be configurable in order to access a website 120 only at specific time intervals so as not to have a negative impact on the servers of the website 120. Once the analysis module 160 received the 130b data from the site exploration module 140, the analysis module 160 analyzes the content 120 of the web page to identify tags that are associated with each web page of the website. In addition, according to at least one embodiment, the analysis module 160 can determine the tag configurations identified. For example, according to at least one embodiment, the analysis module 160 can determine that specific variables are associated with a particular tag.
[0013] In addition, according to at least one embodiment, the analysis module 160 receives information returned from the rendering component of the site exploration module 140. The analysis module 160 can analyze the information returned and identify tags that are associated with a particular web page. In particular, according to at least one embodiment, the analysis module 160 can identify a beacon at the time of execution of the beacon. For example, the analysis module 160 may identify that a particular code requests information from either an unidentified server or a server that is known to be associated with products containing tags. Additionally, in at least one embodiment, the analysis module 160 may identify tags that are associated with rich content or multimedia content. For example, in some media files, tags are configured to fire at particular points in the media file, which allows the media provider to identify which portion of a media file has been viewed. According to at least one embodiment, the analysis module 160 can analyze the entire multimedia file and identify the tags and tag configurations that are associated with the multimedia file. In addition, according to at least one embodiment, when analyzing a website 120, the analysis module 160 can also identify patterns in the tags that are associated with particular web pages. For example, in an example given case, the analysis module 160 can identify that a particular tag is associated with all the web pages of a shopping cart of a website 120. In a similar manner in another exemplary case, the analysis module 160 can identify that a particular tag is present in each web page, except for pages that contain secure data. According to at least one embodiment, the analysis module 160 identifies the tags that are associated with each web page by reference of a tag database 180. In particular, the analysis module 160 can compare the source code from a particular website 120 to all known tags of the database database 180. For example, the analysis module 160 can analyze a particular web page that contains a Facebook tag. The analysis module 160 may compare the source code of the particular web page with known tags that are contained in the tag database 180. The tag database 180 may contain a signature of the Facebook tag. By using the signature of the Facebook tag that is stored in the tag database 180, the parser 160 can identify that the particular web page contains a Facebook tag.
[0014] In at least one embodiment, the signatures in the tag database 180 can be exact copies of the known tags. According to another embodiment, the signatures may be based on specific attributes of tags, so that the analysis module identifies a tag by identifying the specific attributes found in a portion of the data 130b communicated by the module. site exploration 140.
[0015] In at least one embodiment, the tag database 180 is frequently updated to reflect the most recent tags that are available. In addition, according to at least one embodiment, custom tags may be added to the tag database 180. For example, a webmaster may wish to have his web site scanned according to a method of the present invention. However, the administrator may be aware that a custom tag appears on at least one page of the website 120. According to at least one embodiment, the administrator can provide sufficient information for the custom tag to be added to the website. tag database 180. Once added to the data base 180, the site exploration module 140 and the analysis module 160 can proceed as described above and identify the links associated with the page. 120 website, including the custom tag.
[0016] In addition, according to at least one embodiment, the tag database 180 may also contain features that are associated with each tag.
[0017] For example, the tag database may contain information about variables, if any, that are commonly associated with specific tags. In addition, the tag database 180 may also contain information about an earlier version of tags, so that the analysis module 160 can identify whether a particular tag is up to date. Furthermore, according to at least one embodiment, the tag database 180 may contain information that enables the analysis module 160 to identify undesirable tags (for example, tags that are considered unsecure, tags that steal user information, etc.). After identifying at least one tag, the analysis module 160 can communicate with the rule creation module 170. Specifically, according to at least one embodiment, the analysis module 160 communicates with the rule creation module 170. identity of the tag, the configuration and the associated web page. For example, the analysis module 160 can communicate to the rule creation module 170 that a Google Analytics tag is present on the web page "http://www.mywebsite.com/pagel". In addition, the analysis module 160 can communicate to the module for creating rules 170 all variables that are associated with the tag. In some embodiments, tags associated with variables provide additional functionality over tags that are not associated with variables. For example, a tag associated with a variable may have the functionality to trigger only on the first page of a particular user session. Similarly, a tag associated with a variable may be able to determine whether a website visitor is from a particular ad campaign. In at least one embodiment, the variable to which a tag is associated may include a browser cookie. It will be understood that associating variables with a tag can provide a website administrator with valuable data collection tools.
[0018] According to at least one embodiment, the rule creation module 170 may not be able to create rules that completely characterize a particular tag. For example, a particular tag may depend on variables that are external to the website 120 (for example, a cookie). In this case, according to at least one embodiment, the rule creation module 170 can create an incomplete rule by placing the appropriate tag on the web page but not completely characterizing the tag. It may be that a user 25 has to manually review the rules and finish characterizing the tag. In another embodiment, the rule creation module 170 may notify a user that additional information is required to fully characterize a particular tag. An interface may be provided to a user to request the user to provide the additional information.
[0019] After receiving the tag information from the analysis module 160, the rule creation module 170 may generate a rule that allows a tag management system to replicate the configuration of the tags of the web site 120. Continuing with the As above, rule creation module 170 can create a rule that associates the Google Analytics tag with "http://www.mywebsite.com/pagel".
[0020] According to at least one embodiment, the rule creation module 170 creates rules page by page. For example, the Rule Builder 170 can create the following rule to show that a particular web page includes three tags, including the Google Analytics tag: "http://www.mywebsite.com/pagel includes a Google tag Analytics, tag # 2, tag # 3. It will be understood, however, that the rule provided above is given by way of example only and that a number of different rule formats may be used and still remain within the scope of the present invention. In particular, according to at least one embodiment, the rule creation module 170 may be configured to export a rule file 130c in a format that is readable by a particular tag management system. For example, in at least one embodiment, a user can configure the rule creation module 170 to export a rules file in a format that is readable by the Google TM tag management system. Similarly, according to at least one embodiment, the rule creation module 170 is configurable to export the rule file 130c in a variety of formats that correspond to different commercial tag management systems. In contrast, according to at least one embodiment, the rule creation module 170 generates only rule files 130c in a unique proprietary format proper to the present invention. In this embodiment, the various tag management systems may need to be configured to read the proprietary format. In either embodiment, the rule creation module 170 is capable of generating a rule file 130c based on information received from the analysis module 160. FIG. web site 120 having multiple web pages 220, 222, 224, 230, 240, 242 containing tags 212, 214, 216, 218. The illustration of the website in Figure 2 represents the URL 100 of each individual web page. 120, 220, 222, 224, 230, 240, 242, as well as the association of the web pages to each other. In addition, each web page is represented as containing one or more tags 212, 214, 216, 218. As shown in FIG. 2, the tags 212, 214, 216, 218 are represented in the form of boxes 25. broken lines. It will be understood, however, that the boxes are represented for the sake of clarity and that the actual tags are integrated into the source code of each web page 120, 220, 222, 224, 230, 240, 242. 30 If we refer again In the present invention, a user can enter the URL of the website 100, "www.mywebsite.com", in the interface 110 of the site analyzer. After receiving the URL, the site exploration module 140 can begin to explore the website 120 and identify each of the web pages 120, 220, 222, 224, 230, 240, 242 (note that the site web 120 "www.mywebsite.com" is associated with both the website 120 5 and the home page of the website 120) which are part of the website 120. As mentioned above, the module The site browser 140 may be configured to only access the web site 120 at certain intervals to avoid overloading the web site 120. As the site discovery module 160 identifies the individual web pages 120, 220, 222 , 224, 230, 240, 242 and communicates these to the analysis module 160, the analysis module 160 can begin to identify the tags 212, 214, 216, 218 and the configuration of the tags which are associated with each web page 120, 220, 222, 224, 230, 240, 242. As mentioned above, the information regarding the identity and the Beacon features 212, 216, and 218 may be stored in the beacon database 180, so that the analysis module 160 may identify each beacon 212, 214, 216, 218 based on the information in memory. For example, the analysis module 160 may identify that a tag 212 is associated with each web page 120, 220, 222, 224, 230, 240, 242 of the web site 120. In addition, the analysis module 160 can identify that a tag 214 is associated with the home page of the website and web pages 240 and 242. In addition, the analysis module 160 can identify that the tag 216 is associated with the web pages 220, 222 and 224. In addition, the analysis module can identify that a tag 218 is only associated with the web page 242.
[0021] After the analysis module 160 has identified the tags 212, 214, 216, 218 associated with each web page 120, 220, 222, 224, 230, 240, 242, the rule creation module 170 can generate rules for a tag management system. In at least one embodiment, the rule creation module 170 may create a set of rules that defines the features and associations of the tag 212, 214, 216, 218 page by page. For example, the rule creation module 170 can create the following rule for the web page 120: "http://www.mywebsite.com includes the tag 212, the tag 214". Similarly, the rule creation module 170 can create the following rule for the web page 220: "http://www.mywebsite.com/A includes the tag 212, the tag 216". This method can continue until each individual page of a website has an individual rule.
[0022] In contrast, according to at least one embodiment, the rule creation module 170 can create rules based on patterns that are identified by the analysis module 160. For example, the analysis module 170 can identify that a tag 212 is present on each web page 120, 220, 222, 224, 230, 240, 242 of the website 120. In this situation, the rule creation module 170 can generate the following rule: "http: / /www.mywebsite.com propagates a 212 "tag. This rule would instruct the tag management system to include a tag 212 on the web page 120 and each web page 220, 222, 224, 230, 240, 242 which is hierarchically inferior to the web page 120.
[0023] Similarly, the analysis module 160 can identify that a tag 216 is present on the website 220 and 222. According to at least one embodiment, the rule creation module 170 can create the following rule: http://www.mywebsite.com/A propagates a 216 tag. Note, however, that the web page 224 is hierarchically inferior to the web page 220, but the web page 224 does not include the tag 216. In order to prevent the tag 216 from propagating incorrectly to the web page 224, the rule creation module can create the following rule: "http://www.mywebsite.com/A/1/a blocks tag 216". This rule can prevent the tag 216 from being associated with the web page 224. Moreover, according to at least one embodiment, this rule can prevent the tag 216 from propagating beyond the web page 224. It will be understood that that the analysis module 160 may depend on logical instructions to determine under what circumstances a rule should be propagated, blocked, or individually included. In addition, it will be understood that the rules that are generated by the rule creation module 170 can be influenced by the output format that is desired. For example, some output formats may not allow rules that propagate the tags. Similarly, it will be understood that the above example rules are for illustrative purposes only, and that the actual rules may take another form. Figure 3 is a representation of the website of Figure 2 after implementation of a tag management system. The web pages 120, 220, 222, 224, 230, 240, 242 no longer include a plurality of tags, but instead include a single reference tag 310 associated with each of the web pages 120, 220, 222, 224, 230 , 240, 242. A tag management system may use the reference tag 310 and the rules generated by the rule creation module 170 to reproduce the appropriate tags 212, 214, 216, 218 on each specific web page 120, 220, 222, 224, 230, 240, 242. For example, when a user accesses a web page 220, the tag management system can access, for example, the aforementioned rules that were created by the authoring module. 170. Specifically, according to at least one embodiment, a rule "http://www.mywebsite.com/A includes tag 212, tag 216" instructs the tag management system to trigger tags. 212 and 216 on the web page 220. It will be understood that reducing the plurality and diversity of beacons 212, 214, 216, 218 shown in FIG. 2 to a single common reference beacon 310 shown in FIG. 3 can result in significant efficiency requirements. Further, in at least one embodiment, the system shown in Figure 3 may allow a user to use a single interface (i.e., the tag management system) to handle all 120. For example, a website administrator may use the tag management system to prevent the execution of an unsecured or obsolete tag without having to manually delete the tag of each web page. individual 120, 220, 222, 224, 230, 240, 242.
[0024] Accordingly, Figures 1-3 and corresponding text illustrate or otherwise describe one or more components, modules and / or automatic rule creation mechanisms for a tag management system. In particular, according to at least one embodiment, the present invention can analyze a website and generate a set of rules that allow a tag management system to replicate the configuration of the tags of the web page. It will be understood that the embodiments of the present invention may also be described in terms of flowcharts comprising one or more actions aimed at a particular result. For example, Figures 4 and 5 and corresponding text describe actions in a rule creation method for a tag management system. The actions of Figures 4 and 5 are described below. For example, Figure 4 shows that a rule creation method for a tag management system may include a crawling action 400 of a web page 120, 220, 222, 224, 230, 240, 242 Action 400 includes crawling a page of a website 120. For example, Figure 2 shows a web page 120 that the site exploration module 140 can explore. Figure 4 also shows that the method may comprise a tag identification action 410, 214, 216, 218. The action 410 includes identifying the configuration of each of the tags implemented in the page. For example, Figure 1, and the accompanying description, describe a method of using an analysis module 160 for identifying the tag identity and configuration 212, 214, 216, 218.
[0025] In addition, Figure 4 shows that the method may comprise a rule generation action 420. Specifically, action 420 may include generating one or more rules that allow a tag management system to recreate the configuration of one or more tags 212, 214, 216, 218 implemented in the page. For example, Figure 2, and the accompanying description, describe a method for generating rules that may allow a tag management system to recreate the tag configuration of the web site shown in Figure 2. In addition, Figure 4 shows that the method may include a rule exporting action 430. Action 430 may include exporting the generated rule (s) to the tag management system. For example, Figure 3, and the accompanying description, describe a method for exporting rules to tag management. In addition, Figure 5 shows that a rule-creating method for a tag management system may include a crawling action 500 of a web site 120. The action 500 includes crawling each of the web pages. 120, 220, 222, 224, 230, 240, 242 of a website 120. For example, Figure 2 shows a website 120 that the site exploration module 140 can explore.
[0026] Figure 5 also shows that the method may include a tag identification action 510, 214, 216, 218. The action 510 includes identifying the one or more tags implemented in each of the pages. For example, Figure 1, and the accompanying description, describe a method of using an analysis module 160 for identifying the tag identity and configuration 212, 214, 216, 218. further, Figure 5 shows that the method may comprise a pattern identification action 520. Specifically, action 520 includes identifying one or more patterns of tags 212, 214, 216, 218 implemented in web pages 120, 220, 222, 224, 230, 240, 242 of website 120. For example, Figure 2, and the accompanying description, describe a method of identifying patterns within tags 212, 214, 216, 218 associated with various web pages 120, 220, 222, 224. , 230, 240, 242 of a website 120. In addition, Figure 5 shows that the method may comprise a rule generation action 530. Specifically, the action 530 may include generating one or more rules that are configured to allow a tag management system to recreate the identified pattern (s). For example, Figures 2 and 3, and the accompanying description, describe a method for generating rules that may allow a tag management system to recreate the identified pattern (s). In addition, Figure 5 shows that the method may include a rule exporting action. Action 30540 may include exporting the generated rule (s) to the tag management system. For example, Figure 3, and the accompanying description, describe a method of exporting rules to tag management. Accordingly, Figures 1-5 provide a number of components, schemes, and mechanisms for automatically creating rules for a tag management system. In addition, one or more embodiments may automatically parse a website and generate rules that may allow a tag management system to replicate the tag configuration of the web page. In addition, the present invention can identify unwanted tags that are currently implemented in a website. It will be appreciated that the components and mechanisms described herein can greatly simplify the creation of rules for a tag management system. For example, the components and mechanisms described here create tag rules for a tag management system without requiring manual analysis of each individual web page.
[0027] Embodiments of the present invention may include a dedicated or universal computer comprising various computer hardware components, as discussed in more detail below. Embodiments within the scope of the present invention also include computer readable media for carrying or carrying computer executable instructions or data structures in memory thereon. Such computer readable media may be any available media accessible by a universal or dedicated computer.
[0028] By way of non-limiting example, such computer readable media may comprise a RAM, a ROM, an EEPROM, a CD-ROM or other optical disk storage system, another magnetic disk storage system, or the like. other magnetic storage devices, or any other medium that can be used to transport or store desired program codes in the form of computer executable instructions or data structures that are accessible by a universal or dedicated computer. When information is transferred or delivered over a network or other communication connection (wired, wireless or in combination wired or wireless) to a computer, the computer correctly sees the connection as a computer-readable medium. Thus, such a connection is properly called a computer readable medium. Combinations of the aforementioned elements should also be understood as falling within the scope of computer readable media.
[0029] The computer executable instructions include, for example, instructions and data that cause a universal computer, a specialized computer, or a specialized processing device to perform a certain function or group of functions. Although the object has been described in a language specific to structural features and / or methodological actions, it must be borne in mind that the object defined in the attached claims is not necessarily limited to specific features or actions described above. The specific features and actions described above are rather disclosed as exemplary embodiments of the claims. The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments should be considered in all respects only as illustrative and non-restrictive modes. The scope of the invention is thus taught by the appended claims rather than by the foregoing description. Any changes considered as falling within the scope of the claims and as being equivalent to them fall within their scope. 15
权利要求:
Claims (20)
[0001]
CLAIMS1 - A method implemented in a computer for creating rules for a tag management system and executed in an online web page in which web page content is loaded into a memory and processed in a central processing unit, the method comprising: exploring (400) a page of a website; identifying (410) the configuration of each of the tags implemented in the page; generating (420) one or more rules for the page that allow a tag management system to recreate the identified configuration of the tag (s) implemented in the page; and exporting (430) the generated rule (s) to the tag management system.
[0002]
2. The method of claim 1, further comprising: identifying one or more tag patterns on a plurality of pages within a website; and generating one or more rules that allow a tag management system to recreate the identified tag pattern (s).
[0003]
The method of claim 1, further comprising: accessing a tag signature database; and identifying the configuration of each of the tags implemented in the page using the information stored in the tag signature database.
[0004]
4 - The method of claim 1, further comprising: identifying that the configuration of at least one tag implemented in the page comprises at least one variable.
[0005]
The method of claim 4, further comprising: determining potential values for the at least one variable; and generating one or more rules that allow the tag management system to recreate the configuration of the at least one tag implemented in the page.
[0006]
The method of claim 4, further comprising: notifying the at least one identified tag and the at least one identified variable to a user; and receiving, from a user, an entry concerning at least a portion of the rule or rules that allow the tag management system to recreate the configuration of the at least one tag implemented in the page. 30
[0007]
7 - The method of claim 1, further comprising: the return of the website page; andidentifying the configuration of each tag on the page when the page is rendered.
[0008]
8 - Process according to claim 7, further comprising: the execution of a multimedia file which is integrated into the page of the website; and identifying at least one tag that is associated with the media file.
[0009]
The method of claim 1, further comprising: identifying at least one tag that is adapted to execute a specific code portion only on a first page of a particular session; and generating one or more rules that allow a tag management system to recreate the configuration of the at least one tag. 20
[0010]
The method of claim 1, further comprising: receiving from a user an indication of a specific format in which the generated rule (s) are to be exported to the tag management system.
[0011]
A method implemented in a computer for creating rules for a tag management system and executed in an online web page in which web page content is loaded into a memory and processed in a central processing unit; method comprising: indexing each of the one or more pages of a website; identifying one or more tags implemented in each of the one or more pages; the identification of one or more reasons for the tags implemented in the page or pages of the website; generating one or more rules that are configured to allow a tag management system to recreate the identified pattern (s); and exporting the generated rule (s).
[0012]
The method of claim 11, further comprising: accessing a tag signature database; and identifying a configuration of each of the tags implemented in the page using the information stored in the tag signature database.
[0013]
The method of claim 11, further comprising: identifying that the configuration of at least one tag implemented in a page of the web site comprises at least one variable.
[0014]
The method of claim 13, further comprising: determining potential values for the at least one variable; and generating one or more rules that allow the tag management system to recreate the configuration of the at least one tag implemented in the page.
[0015]
The method of claim 14, further comprising: notifying the at least one identified tag and the at least one identified variable to a user; and receiving, from a user, an entry relating to at least a portion of the one or more rules that allow the tag management system to recreate the configuration of the at least one tag implemented in the page.
[0016]
The method of claim 11, further comprising: rendering the page of the website; and identifying the configuration of each tag on the page when the page is rendered.
[0017]
17 - The method of claim 16, further comprising: the execution of a multimedia file which is integrated within the page of the website; and identifying at least one tag that is associated with the media file.
[0018]
The method of claim 11, further comprising: identifying at least one tag that is designed to execute a specific code portion only on a first page of a particular session; andgenerating one or more rules that allow a tag management system to recreate the configuration of the at least one tag.
[0019]
The method of claim 11, further comprising: receiving from a user an indication of a specific format in which the generated rule (s) are to be exported to the tag management system (10).
[0020]
A software package for use on a computer system, the software package for implementing a rule creation method for a tag management system, the software package comprising one or more computer storage media on which are stored computer executable instructions which, when executed at a processor level, cause the computer system to implement the method, including the steps of: browsing a page of a web site; identifying the configuration of each of the tags implemented in the page; generating one or more rules for the page that allow a tag management system to recreate the identified configuration of the one or more tags implemented in the page; and exporting the generated rule (s) to the tag management system.
类似技术:
公开号 | 公开日 | 专利标题
FR3018620A3|2015-09-18|CREATING RULES FOR USE IN THIRD PARTY MANAGEMENT SYSTEMS
US9990431B2|2018-06-05|Rich web page generation
US10360133B2|2019-07-23|Analyzing analytic element network traffic
FR3025909A3|2016-03-18|VIDEO AUDIT ON THE WEB
CN102663060B|2014-11-19|Method and device for identifying tampered webpage
US20120173441A1|2012-07-05|Ownership Resolution System
US11256853B2|2022-02-22|Parameterizing network communication paths
US9904662B2|2018-02-27|Real-time agreement analysis
Mehta et al.2020|A comparative study of various approaches to adaptive web scraping
Van Goethem et al.2019|Purchased Fame: Exploring the Ecosystem of Private Blog Networks
Koide et al.2020|To get lost is to learn the way: Automatically collecting multi-step social engineering attacks on the web
Koide et al.2021|To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web
Allison et al.2020|Building a wide reach corpus for secure parser development
US20210029395A1|2021-01-28|Content restriction system
BenRhouma et al.2021|To sell, or not to sell: social media data-breach in second-hand Android devices
EP3032423B1|2017-03-22|Method and system for validating performance test scenarios
Vo et al.2019|Adremover: the improved machine learning approach for blocking ads
EP2880558A1|2015-06-10|Data-processing method for situational analysis
Abe2012|Data mining in the age of curation
US9436686B1|2016-09-06|Claim evaluation system
WO2018015515A1|2018-01-25|Methods for opinion sharing, computer programs and hardware for implementing methods
RO135285A2|2021-10-29|Limitation of provision and display of redundant digital components on a client device
WO2016207540A1|2016-12-29|Method for the accelerated download of a web page to a communication terminal
FR2994297A1|2014-02-07|METHOD OF PROCESSING CONNECTION DATA OF A PLATFORM OF AN INTERNET SITE
WO2014020122A1|2014-02-06|System for processing data for connecting to a platform of an internet site
同族专利:
公开号 | 公开日
US10394902B2|2019-08-27|
GB2527966A|2016-01-06|
GB201516370D0|2015-10-28|
US9418170B2|2016-08-16|
FR3018620B3|2016-05-20|
US20160357867A1|2016-12-08|
US20140280012A1|2014-09-18|
WO2014159735A1|2014-10-02|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US6792458B1|1999-10-04|2004-09-14|Urchin Software Corporation|System and method for monitoring and analyzing internet traffic|
US7610289B2|2000-10-04|2009-10-27|Google Inc.|System and method for monitoring and analyzing internet traffic|
US20030208594A1|2002-05-06|2003-11-06|Urchin Software Corporation.|System and method for tracking unique visitors to a website|
KR100563449B1|2005-12-30|2006-03-22|경북환경|Apparatus for treatmenting of sewage using semi-batch and method thereof|
US20080040473A1|2006-08-14|2008-02-14|Microsoft Corporation|Enabling web analytics for interactive web applications|
US20080071774A1|2006-09-20|2008-03-20|John Nicholas Gross|Web Page Link Recommender|
WO2008052059A2|2006-10-25|2008-05-02|Gomez, Inc.|Methods and apparatus for real user monitoring|
US8572065B2|2007-11-09|2013-10-29|Microsoft Corporation|Link discovery from web scripts|
US8429243B1|2007-12-13|2013-04-23|Google Inc.|Web analytics event tracking system|
US8140963B2|2007-12-19|2012-03-20|Yahoo! Inc.|Tag aggregator|
US20090287713A1|2008-05-16|2009-11-19|Tealium, Inc.|Systems and methods for measuring online public relation and social media metrics using link scanning technology|
US8200617B2|2009-04-15|2012-06-12|Evri, Inc.|Automatic mapping of a location identifier pattern of an object to a semantic type using object metadata|
WO2011041465A1|2009-09-30|2011-04-07|Tracking.Net|Enhanced website tracking system and method|
US20130290480A1|2010-01-11|2013-10-31|Ensighten, Inc.|Use of Method Overrides for Dynamically Changing Visible Page Content|
US9268547B2|2010-01-11|2016-02-23|Ensighten, Inc.|Conditional logic for delivering computer-executable program instructions and content|
US8996986B2|2010-01-11|2015-03-31|Ensighten, Inc.|Enhanced delivery of content and program instructions|
EP2556449A1|2010-04-07|2013-02-13|Liveperson Inc.|System and method for dynamically enabling customized web content and applications|
US8949315B2|2010-06-30|2015-02-03|Nbcuniversal Media, Llc|System and method for generating web analytic reports|
US20120078874A1|2010-09-27|2012-03-29|International Business Machine Corporation|Search Engine Indexing|
US9003552B2|2010-12-30|2015-04-07|Ensighten, Inc.|Online privacy management|
WO2012092487A1|2010-12-30|2012-07-05|Ensighten, Inc.|Online privacy management|
US9165308B2|2011-09-20|2015-10-20|TagMan Inc.|System and method for loading of web page assets|
CA2865267A1|2012-02-21|2013-08-29|Ensighten, Inc.|Graphical overlay related to data mining and analytics|
US20130297778A1|2012-05-02|2013-11-07|Google Inc.|System for centralized analytics tracking via server-side sessionization|
US20130332817A1|2012-06-12|2013-12-12|Sitecore A/S|Method and a system for managing third party objects for a website|
US9203905B1|2012-08-27|2015-12-01|Google Inc.|Sessionization of visitor activity|
US9317490B2|2012-09-19|2016-04-19|TagMan Inc.|Systems and methods for 3-tier tag container architecture|
US9189552B2|2012-11-02|2015-11-17|Swiftype, Inc.|Modifying a custom search engine for a web site based on custom tags|
WO2014116542A1|2013-01-22|2014-07-31|Tealium Inc.|Activation of dormant features in native applications|
US20140207911A1|2013-01-22|2014-07-24|James Kosmach|System and method for embedding multimedia controls and indications in a webpage|
US9412115B2|2013-03-14|2016-08-09|Observepoint, Inc.|Configuring tags to monitor other webpage tags in a tag management system|
US9418170B2|2013-03-14|2016-08-16|Observepoint, Inc.|Creating rules for use in third-party tag management systems|
US8805946B1|2013-08-30|2014-08-12|Tealium Inc.|System and method for combining content site visitor profiles|
US20150066587A1|2013-08-30|2015-03-05|Tealium Inc.|Content site visitor processing system|
US9081789B2|2013-10-28|2015-07-14|Tealium Inc.|System for prefetching digital tags|
WO2015069659A1|2013-11-05|2015-05-14|Tealium Inc.|Universal visitor identification system|
US9288256B2|2014-04-11|2016-03-15|Ensighten, Inc.|URL prefetching|
US8997081B1|2014-09-18|2015-03-31|Ensighten, Inc.|Analytics for mobile applications|
US9219787B1|2014-11-26|2015-12-22|Ensighten, Inc.|Stateless cookie operations server|US9361631B2|2010-01-06|2016-06-07|Ghostery, Inc.|Managing and monitoring digital advertising|
US10291492B2|2012-08-15|2019-05-14|Evidon, Inc.|Systems and methods for discovering sources of online content|
US9418170B2|2013-03-14|2016-08-16|Observepoint, Inc.|Creating rules for use in third-party tag management systems|
US9081789B2|2013-10-28|2015-07-14|Tealium Inc.|System for prefetching digital tags|
US9904704B2|2014-04-22|2018-02-27|Openx Software Limited|System and method for controlling audience data and tracking|
US9672541B2|2014-07-16|2017-06-06|Turn Inc.|Visual tag editor|
US9900371B2|2014-08-18|2018-02-20|InfoTrust, LLC|Systems and methods for tag inspection|
AU2016249910A1|2015-04-11|2017-10-26|Evidon, Inc.|Methods, apparatus, and systems for providing notice of digital tracking technologies in mobile apps on mobile devices, and for recording user consent in connection with same|
US10977597B2|2015-07-27|2021-04-13|Innovian Corporation|System and method for validating data|
WO2017078705A1|2015-11-04|2017-05-11|Observepoint, Inc.|Automatic execution of objects in a user interface|
US20170192984A1|2015-12-31|2017-07-06|Mezzobit Inc.|System and method for optimizing audience data and tracking|
US10360133B2|2016-02-04|2019-07-23|Observepoint Inc.|Analyzing analytic element network traffic|
US10826802B2|2016-02-09|2020-11-03|Observepoint, Inc.|Managing network communication protocols|
US10135936B1|2017-10-13|2018-11-20|Capital One Services, Llc|Systems and methods for web analytics testing and web development|
US10713328B2|2017-12-21|2020-07-14|Mastercard International Incorporated|Automated tagging application for maintaining up-to-date web analytics|
CN110020369B|2017-12-22|2021-05-11|中国移动通信集团广东有限公司|Webpage clipping method and system|
US10936373B2|2018-02-24|2021-03-02|Vmware, Inc.|Tag-based control of hosted compute resources|
US11146656B2|2019-12-20|2021-10-12|Tealium Inc.|Feature activation control and data prefetching with network-connected mobile devices|
US11228632B1|2020-09-23|2022-01-18|Td Ameritrade Ip Company, Inc.|Facilitating inter-system data transfer by leveraging first-party cookie handling|
法律状态:
2016-01-08| PLFP| Fee payment|Year of fee payment: 2 |
2016-05-13| TP| Transmission of property|Owner name: OBSERVEPOINT LLC, US Effective date: 20160413 |
2017-01-12| PLFP| Fee payment|Year of fee payment: 3 |
2018-01-11| PLFP| Fee payment|Year of fee payment: 4 |
2020-02-25| PLFP| Fee payment|Year of fee payment: 6 |
2021-02-23| PLFP| Fee payment|Year of fee payment: 7 |
2022-02-23| PLFP| Fee payment|Year of fee payment: 8 |
优先权:
申请号 | 申请日 | 专利标题
US201361785385P| true| 2013-03-14|2013-03-14|
PCT/US2014/024931|WO2014159735A1|2013-03-14|2014-03-12|Creating rules for use in third-party tag management systems|
[返回顶部]