专利摘要:
A method of auditing a video on the web includes receiving (400) validation information associated with one or more video files that are accessible on a web page. The validation information may include one or more time slots associated with at least one video file. In addition, the validation information may include tag data for a tag that is associated with the at least one video file. The method may also request (410) the at least one video file through a network connection. The method may then execute (420) the at least one video file. Running the at least one video file can trigger a tag. In addition, the method may validate (430) the beacon by determining whether or not the beacon conforms to the received beacon data.
公开号:FR3025909A3
申请号:FR1551311
申请日:2015-02-17
公开日:2016-03-18
发明作者:Robert K Seolas;John Pestana;Tyler Broadbent;Alan Martin Feuerlein
申请人:ObservePoint LLC;
IPC主号:
专利说明:

[0001] BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to systems, methods and software packages relating to web site analysis. 2. Context and technology involved The development of the Internet and the associated trade has the consequence that many website owners are constantly looking for various data on people who visit their websites. In particular, website owners often want to collect all kinds of analytics data about visitors viewing their web page. In many cases, this analytics data can be used to determine which advertisements to display to a visitor and to determine the fees payable to various external advertisers. A conventional method for generating analytics data and / or determining the advertisement to be provided to website visitors is to use tags. Under at least one conventional form, a tag is a hidden element within a web page that generates an action on a web page when it is triggered. In particular, according to at least one embodiment, a tag is a code that is placed inside a web page and allows a web page owner to collect information about the visitors downloading and executing the web page. particular code. For example, a tag may include a reference to a transparent GIF or a spy pixel, which is placed inside the code of a web page. Said transparent GIF or spy pixel may be stored on a separate server of said web page. When the client system executes the web page and falls on the code intended for the tag, the client system will then request the transparent GIF or the spy pixel (referenced inside the tag) to the separate server. When the browser 10 requests the transparent GIF or the spy pixel from the separate server, the server can collect various analytical data on the requestor. For example, once the beacon is executed, the server providing the GIF or the spy pixel, can collect information such as the origin of the visitor (for example, the web page or the search engine), the keywords used to find the web page, whether a particular advertisement directed a visitor to the page, 20 and other associated data. In many situations, a web page can include multiple tags of various origins. For example, a particular web page may contain a Google Analytics tag, a Facebook tag, a page counter tag, a weather tag, and other common tags. In at least one embodiment, a beacon can only include a particular call directed to an external advertisement server.
[0002] In addition to embedding tags in a web page, the tags may also be associated with a video file. For example, when playing a video file on a web page, the video player may trigger tags at specific points and request specific advertisements. In at least one embodiment, a video player executes tags according to the Video Ad Servicing Template (VAST).
[0003] As such, the tags associated with a video can ensure that the correct advertisements are displayed and can further inform a webmaster of the viewing time of a video by a particular website visitor.
[0004] As Internet speeds have increased and online entertainment is becoming more prevalent, a large number of Internet users are viewing Internet video in one form or another. As the number of people watching videos on the Internet has increased, content providers increasingly want to ensure that the various tags embedded in their video content work properly.
[0005] However, Internet video auditing presents several specific challenges. For example, an Internet video is not usually provided in the form of a source code that can be easily explored and analyzed. In addition, certain video contents are launched from timed events on a web page, so that it is difficult for an audit system to correctly identify and audit all the video available on a website. . Therefore, there are a number of problems in the art that relate to the creation of 30 rules for a tag management system that can be addressed. BRIEF SUMMARY OF THE INVENTION The embodiments of the present invention are directed to systems, methods, and software packages configured to audit tags located in video files on the Internet. According to at least one embodiment, an auditing system validates the execution of the tags at the right moment in a particular video file. In addition, according to at least one embodiment of the auditing system, the system validates the compliance of the tags with previously established vendor validation rules. Vendor validation rules validate compliance of tags with vendor limitations or requirements. After auditing a video, the audit system can generate a report to a particular user.
[0006] According to an exemplary embodiment, a method of auditing a video on the web according to the specifications received from a user includes receiving validation information associated with one or more video files that are accessible on a web page. The validation information may include one or more time slots associated with at least one or more video files. In addition, the validation information may include tag data for one or more tags that are associated with at least one or more video files. The method may also include requesting, through a network connection, at least one of the one or more video files. The method may further include executing at least one of the one or more video files. Running at least one or more video files may trigger at least one or more tags. In addition, the method may include validating the one or more tags by determining whether the one or more tags are compliant or not with the received tag data.
[0007] In a further exemplary embodiment, a system may include one or more processors, system memory, and one or more computer readable media on which computer executable instructions are stored. When executed by the processor (s), the computer executable instructions may instruct the computer system to implement a method for auditing a video on the web according to specifications received from a user. The method may include requesting information from a user. The requested information may include a location of a particular web object (e.g., a video file), an execution time that is associated with a length of the video file, and tag data relating to one or more tags that are associated with the video file. In addition, the method may include access to the particular web object. Access to the particular web object may include triggering the video file. In addition, during a period of time at least equal to the execution time, the system may validate the one or more tags using the tag data. Additional features and advantages of embodiments of the invention given by way of example will be set forth in the following description and will be apparent from the description, or may be taught by practicing such embodiments given in the following description. as an example. The features and advantages of such embodiments can be realized and obtained by means of the instruments and combinations indicated in particular in the appended claims. These and other features will become more clearly apparent from the following description and appended claims, or may be taught by practicing such exemplary embodiments as set forth below.
[0008] BRIEF DESCRIPTION OF THE DRAWINGS In order to describe how the above-mentioned advantages and features of the invention as well as others can be obtained, a more specific description of the invention briefly described above will be given with reference to modes. specific embodiments thereof which are illustrated in the accompanying drawings. Bearing in mind that these drawings illustrate only typical embodiments of the invention and therefore should not be considered as limiting the scope thereof, the invention will be described and explained with additional specificity and features. further details with the aid of the accompanying drawings, in which: Figure 1 illustrates an overall block diagram of a system for use according to an embodiment of the present invention; Figure 2 illustrates an exemplary internet video and a representation of one or more associated tags that the system may trigger according to one embodiment of the present invention; Figure 3 illustrates an exemplary user interface for reporting an audit according to an embodiment of the present invention; Figure 4 illustrates a flow chart of an Internet video auditing method according to an embodiment of the present invention; and Figure 5 illustrates a flowchart of another Internet video audit method according to an embodiment of the present invention.
[0009] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Embodiments of the present invention extend to systems, methods, and software packages configured to audit tags within video files on the Internet. In at least one embodiment, an auditing system validates tagging at the right time within a particular video file. In addition, according to at least one embodiment of the auditing system, the system validates the compliance of the tags with previously established vendor validation rules. Vendor validation rules validate label compliance with vendor limitations or requirements. After auditing a video, the auditing system may generate a report to a concerned user. For example, an embodiment of an auditing system can explore an Internet video and determine, on the basis of tag signatures, which tags were triggered and when they were triggered. In addition, the audit system can compare this information to expected results received from an end user ("user validation rules"). The audit system can then generate a report based on this comparison. The report may include information describing the types of tags that were triggered, when they were triggered, whether the triggering occurred at the expected time, whether the markups were otherwise compliant with validation rules, and whether other similar information. We will now refer to the figures. Figure 1 illustrates an overall block diagram of a system for use according to an embodiment of the present invention. In particular, Figure 1 shows a client 100, an auditing system 120, and a web server 130. In at least one embodiment, the client 100 may transmit data packets 105 to the auditing system 120. The auditing system 120 may in turn communicate with the web server 130 via the data packets 125. Although they are represented as individual modules, according to at least one embodiment, the client 100 , the auditing system 120 and the web server 130 can all be integrated within a single computer system. Alternatively, according to at least one embodiment, one or more systems may further be divided into additional modules.
[0010] As shown in Figure 1, the client 100 may include a system that displays a user interface 110. Figure 1 further shows that the user interface 110 may, in turn, present to the user. various fields that allow the user to enter information about a tag audit. For example, the user interface 110 may request a target web address, various target video URLs, and various tag validation rules 150 (e.g., 150a-c), such as the execution / trigger times of the tag during video file playback. The web address can be directed to a particular website that a user wishes to audit. The various video URLs can be addressed to the target videos on each respective web page. In addition, the user validation rules 150 may include a variety of different tag attributes. For example, user validation rules can include trigger times, tag types, tag parameters, and other attributes associated with a tag. For example, a user may wish to audit only a portion of a large number of videos on a web page. Video URLs can provide an interface for the user to identify specific target videos. The various tag validation rules 150 may include the times at which the individual tags (150a, 150b, 150c, etc.) are provided to fire against a particular video, or even multiple videos. For example, a particular video may be associated with two beacons, where the expected trigger time of a first beacon (150a) may be 30 seconds in the video, and the expected time of release of a beacon. second beacon (150b) can be at a minute in the video. As shown in Figure 1, a user 5 can enter the expected trigger times in the validation rules portion 150 of the user interface 110. Based on these user validation rules 150, a system of audit 120 may be able to audit the requested internet video for proper execution of the tag (150). According to one embodiment, for example, if the web server 130 detects that the tags identified by the user have triggered at the time specified by the user, then the tags have been correctly executed.
[0011] After a user has inputted the particular video targeting information and the user validation rules 150, the client 100 may transmit the targeting information and the validation rules 150 to the auditing system 120 within. 105. As shown in FIG. 1, the auditing system 120 may comprise a reproduction module 122, a video module 124, a validation module 126 and a tag database 128. Similar to what has been mentioned above, it will be appreciated that the modules are used in this specification for the sake of clarity and illustration. However, according to various embodiments, the modules may be combined, divided, excluded, or otherwise described within the scope of the present invention. According to at least one embodiment, after receiving the target information and user validation rules 150 from the client 100, the auditing system 120 (via the rendering module 122) can access the client. web address 115 that has been provided by the user interface 110. Access to the web address 115 may include access to an external web server 130 and downloading information from a web page memory 132. On reception, the rendering module 122 can then restore the web page 115 that has been accessed. It will be appreciated that the auditing system 120 may render the web page 115 without necessarily displaying the web page on any particular display device; the system 120 rather simply prepares the restitution instructions dictated by the execution of the web page 115, and analyzes the restitution instructions.
[0012] In order to render the web page 115, the auditing system 120 may use one or more additional modules, such as a video module 124, to also activate one or more of the videos designated by the video URLs within. the user interface 110. According to at least one embodiment, for example, the auditing system 120 may comprise a video module 124, which the system then uses to activate the various target videos (for example, on the web page 115 ). It will be understood that the video module 124 may include the ability to audit a wide variety of different video formats. In addition, the video module 124 may also include specific functionality directed to the activation of particular videos. For example, a video (for example, 200, Figure 2) may require user input before activation. For example, the video may require that, before reading, a user selects a preferred language.
[0013] In at least one embodiment, the video module 124 is configured to correctly select the correct language. In further embodiments, the video module 124 may be configured to enter age checks, usernames, user passwords, financial information, and / or other credentials. similar identity for video activation.
[0014] In at least one embodiment, the auditing system 120 receives beacons from a web server 130. The web server 130 may be the same server that also includes the web page memory 132. A beacon may include a simple one. An HTTP format URL that requests the client 100 to communicate with an advertisement server 160 that is external to the client 100, or remote from it. Various types of tags may also collect information about the rendered web page and / or client 100. For example, the tag may include information about the subject of the rendered web page and / or the particular video. In addition, the tag may collect client information stored in cookies.
[0015] In at least one embodiment, when playing a video, a video player executes a tag that is associated with the video file. The tag may include a request for a data structure of the Video Ad Serving Template (VAST). The requested VAST data structure may specify which advertisements to read should be read, how advertisements should be read, and what tracking should be done during media playback.
[0016] Once a video has been triggered, the auditing system 120 may execute the validation module 126, which can determine whether the tags 150 associated with the video 200 5 or not conform to the user validation rules. 150. For example, the validation module 126 can determine whether the tags are triggering or not within a tag trigger threshold provided in the user interface 110. For example, a user validation rule may stipulate that it is expected that a first beacon will be triggered one minute after a video starts, and then a second beacon will be triggered two minutes after the video starts. The validation module 126 can determine whether the first and second beacons are triggered within a threshold of their respective beacon triggers. According to at least one embodiment, the threshold may comprise a static number (for example, plus or minus 15 seconds), or it may comprise a dynamic threshold based on the number of beacons expected and the length of the video. For example, in the case of a video with multiple tags (150a, 150b, etc.), the validation module 126 can dynamically adjust the threshold for each tag so that it is equal to half the time that separates an expected beacon 25 of the next respective expected beacon. Upon validation of the tags, according to at least one embodiment, the validation module 126 can identify tag signatures within the information communicated by the rendered web page. For example, various tags may include certain identifiable information based on the specific advertising tracking companies to which the respective tags are associated. For example, tags that communicate with a particular ad tracking company may all include a specific URL that communicates with servers associated with the ad tracking company. Therefore, according to at least one embodiment, the validation module 126 can analyze the links required by the rendering module 100 and determine if the linked request is associated with a particular tag. In particular, the validation module 126 can access a tag database 128 which includes tag signatures for a large number of tags identified. The tag signatures may include information specifying unique features that identify particular tags. Thus, the validation module 126 can rely on the tag signatures to determine if a particular link that is required during the playback of a video file is associated with a tag.
[0017] In addition, according to at least one embodiment, in cases where a source code is available, the validation module 126 can identify tag signatures within the source code. For example, the tag database 128 may include a library of various code selections from tags. Thus, the validation module 126 can identify tags by matching code selections from the tag database 128 with code selections in the source code. We now refer to an example of an Internet video with tags. Figure 2 illustrates exemplary internet video and associated beacons according to one embodiment of the present invention. In particular, Figure 2 shows an Internet video 200 on a cat. The Internet video 200 may include various commands and information, such as, in the illustrated case, a play / pause feature at the bottom of the video 200, and a video progress indicator 210. In addition, Figure 2 also shows beacon trigger times 220, 222, 224, 226 with respect to the video progress indicator 210. In practice, beacon initiation times 220, 222, 224, 226 may not be transmitted to a user, but are included in Figure 2 for the sake of clarity.
[0018] In at least one embodiment, to audit the Internet video 200 of Figure 2, a user may first enter a web address and / or an associated video URL in the user interface 100 of Figure 1.
[0019] The web address may be associated with a particular web page that hosts many videos, while the video URL is associated with the particular Internet video 200 on the chat of Figure 2. In addition to entering addresses, the user may enter user validation rules 150 that include tag trigger times that correspond to each tag location 220, 222, 224, 226 with respect to the length of the video 200. Therefore, when of the validation of the Internet video 200, the auditing system 120 can already know the trigger times expected of associated tags.
[0020] The validation module 126 may validate the Internet video 200 by detecting beacon signatures within a threshold time of the indicated beacon locations 220, 222, 224, 226. According to at least one embodiment, the validation module 126 may also detect tag signatures that do not correspond to one of the provided tag locations 220, 222, 224, 226. For example, a user may ignore a particular tag that is associated with an Internet video. 200.
[0021] Thus, when the video is triggered, the tag may fire unexpectedly. In this case, the validation module 126 can detect the signature of the unexpected beacon and record that the tag has triggered.
[0022] In addition, according to at least one embodiment, the validation module 126 can verify that the detected tag signatures correspond to previously specified tag types. For example, a user may specify that it is expected that a first beacon 20 of a first type will be triggered at a first instant and that a second beacon of a second type will be triggered at a first time. second moment. The validation module 126 can verify that the first tag is actually triggered at the first moment and that the first tag is of the right type. Similarly, the validation module 126 can determine that the second beacon is triggering at the right time, but that the second beacon is not of the right type. Therefore, the auditing system 120 can trigger an Internet video 200 and validate this video 200. In particular, the auditing system 120 can validate that the right tags are triggered at the right times within the Internet video. 200. In addition, the audit system 120 may remain at a particular web page for an extended period of time based on timing information received from a user through the user interface. 110.
[0023] For example, a user may indicate that a particular tag is triggered for 15 minutes in an Internet video 200. Thus, in at least one embodiment, the auditing system 120 may remain at a particular web page. for at least 15 minutes plus a threshold to determine whether the particular beacon is triggering or not. Once the auditing system 120 has audited one or more Internet videos 200, the user interface 300 may display a results page. For example, Figure 3 illustrates an exemplary user interface for reporting an audit according to one embodiment of the present invention. As shown in the user interface 300, a variety of different validation results can be presented to a user. For example, the user interface 300 includes a website indication 310 which indicates that the website has been audited. In addition, the user interface 300 includes video indicators 320, 340 that indicate the particular videos and associated URLs that have been audited. For example, the video flag 320 displays a URL 322 and is associated with the Internet video 200 of Figure 2.
[0024] The video flag 320 also includes information summarizing tag auditing. For example, the video indicator 320 displays a total number of expected tags 324 and a total number of tags 3025909 18 detected 326. As shown in the user interface 300, it was expected that four tags would be associated with a #l video, but only three tags were actually detected.
[0025] Figure 3 also shows that, in addition to displaying a summary of the tag audit, the user interface 300 also displays individual tag indicators 330. In at least one embodiment, the individual tag indicators 330 display information about each individual tag. For example, in the user interface 300, the individual beacon indicators 330 display whether each respective beacon has been detected 332 or undetected 334. In further embodiments, the individual beacon indicators 330 may also include information such as the actual trigger time of the beacon, the type of beacon, the amount of information transferred, all variables associated with the beacon, the actual source code of the beacon, the signature of the beacon, the external web address accessed by the tag, and other similar information. Therefore, in at least one embodiment, the user interface 300 provides a user with both a summary of a video audit and detailed information about each video and each tag. Accordingly, Figures 1-3 and corresponding text illustrate or otherwise describe one or more components, modules and / or mechanisms for auditing Internet videos on web pages. In particular, according to at least one embodiment, the present invention can audit a particular internet video for proper beacon execution. For example, a particular Internet video can be associated with four different tags. According to at least one embodiment, the present invention can play an Internet video for a long enough time to give each beacon the time to trigger. It will be appreciated that the embodiments of the present invention may also be described in terms of flowcharts comprising one or more actions to achieve a particular result. For example, Figures 4 and 5 and corresponding text describe actions in a rule creation method for a tag management system. The actions of Figures 4 and 5 are described below with reference to the elements shown and described with respect to Figures 1-3. For example, Figure 4 illustrates that a method for auditing a video on the web according to specifications received from a user may include an action 400 for receiving validation information. Action 400 includes receiving validation information associated with one or more video files that are accessible on a web page. The validation information may include an execution time for each of the one or more video files and tag data for one or more tags that are associated with each of the one or more video files. For example, Figure 1 shows a user interface 110 that requests information about videos and tags associated with each video. The information entered in the user interface 110 is transmitted in a data packet 105 to the auditing system 120.
[0026] Figure 4 also shows that the method may include a request action 410 of one or more video files. Action 410 may include requesting the video file (s) through a network connection. The network connection may include an Internet connection, a LAN connection, or any other computer communication channel. For example, Figure 1 shows the auditing system 120 connecting to a web server 130 through a network 140. The web server 130 and the auditing system 120 communicate with each other. Also, Figure 4 shows that the method may comprise an action 420 of executing one or more video files. Action 420 includes executing the one or more video files, which may cause the triggering of the at least one of the one or more tags. For example, Figure 1 shows a rendering module 122 which can execute a video from the web page memory 132. A video execution may include playing the video, playing the video at an adjusted rate ( for example, double speed), video stream analysis, or otherwise video content analysis.
[0027] In addition, FIG. 4 shows that the method may comprise an action 430 for validating one or more tags. Action 430 includes validating the one or more tags by determining whether the tag (s) are or not conform to the received tag data. For example, in Figure 1, the validation module 126 can analyze a video file and validate tags that are triggered during the video. For example, Figure 2 shows an Internet video 200 and associated expected beacon locations 220, 222, 224, 226 (shown as an example). The validation module 126 can identify whether the right beacons are triggered at each expected beacon location 220, 222, 224, 226. Figure 5 illustrates an additional or alternative method of auditing a video on the web according to specifications. received from a user. In particular, Figure 5 shows that the method may include an information request action 500. Action 500 may include requesting information from a user. The requested information may include a location of a particular web object, a duration of execution, and tag data relating to one or more tags that are associated with the video file. The web object may comprise a video file, and the execution time may include a duration of execution of the video file.
[0028] In addition, Figure 5 shows that the method may include an action 510 of accessing a web object. Action 510 may include access to the particular web object by starting the video file. For example, Figure 1 shows that the rendering module 122 can access a video file from a web server 130 through a network connection 140. Figure 1 also shows that the web server 130 may include a web page memory 132, which stores video files, labels, source code, and other information associated with a web page.
[0029] In addition, FIG. 5 shows that the method may comprise an action 520 for validating one or more tags. Action 520 may include, for a duration at least 3025909 equal to the execution time, the validation of the one or more tags using the tag data. For example, in FIG. 1, the validation module 126 can validate one or more tags in a video file, while the rendering module 122 renders an associated web page and / or video file and allows it to be used. running the video for at least runtime. The validation module 126 can validate beacons and expected beacon locations 220, 222, 224, 226 (Figure 10 2), while the rendering module 122 allows the execution of the Internet video 200 for at least the duration of time. 'execution. In at least one embodiment, the system or user can add a runtime threshold.
[0030] Therefore, it will be understood from the view of the specification and claims in this application that the embodiments of the present invention allow a user to validate that beacons associated with a video are properly configured. In addition, according to at least one embodiment, a user is able to specify the length of a particular interesting Internet video, and the expected trigger times of associated tags. In addition, the embodiments of the present invention may identify unexpected tags that are triggered during the playback of an Internet video. Thus, the embodiments described above provide tag validation methods and systems within a web page, which can enhance the ability of website owners to audit efficiency and performance. ads. In particular, conventional tag auditing methods within web pages fail to properly audit tags that are embedded within a video on the Internet. While the aim is to provide Internet content through video, conventional auditing methods fail to accurately account for tags within the video. It will be understood that failure to audit beacons can lead to loss of advertising revenue, missed ad campaigns, over-perceived ad, or other similar problems. Accordingly, embodiments of the present invention provide a website owner with important tools for managing tags within a web page. Although the object has been described in a language specific to structural features and / or methodological actions, it must be borne in mind that the object defined in the appended claims is not necessarily limited to features or actions described above, or the order of actions described above. The features and actions described are rather disclosed in the form of exemplary embodiments of the claims. Embodiments of the present invention may include or utilize a dedicated or universal computer system that includes computer hardware, such as, for example, one or more processors and a system memory, as discussed in greater detail hereinafter. -Dessous. Embodiments within the scope of the present invention also include physical or other computer readable media which are intended to convey or store computer executable instructions and / or data structures. Such computer readable media may be any available media that is accessible by a universal or dedicated computer system. Computer readable media that stores computer executable instructions and / or data structures are computer storage media. Computer readable media that convey computer executable instructions and / or data structures are transmission media. Thus, by way of non-limiting example, the embodiments of the invention may comprise at least two kinds of different computer readable media: computer storage media and transmission media. Computer storage media are physical storage media that store computer-executable instructions and / or data structures. Physical storage media include computer hardware, such as RAM, ROM, EEPROM, solid state disks ("SSDs"), flash memory, phase change memory ("PCM"), and the like. an optical disk storage device, a magnetic disk storage device or other magnetic storage device, or any other hardware storage device that can be used to store program code in the form of instructions or structures computer-executable data which is accessible and can be executed by a universal or specialized computer system for implementing the functionality disclosed by the invention.
[0031] The transmission media may comprise a network and / or data links that may be used to carry program code in the form of computer executable instructions or data structures that are accessible by a system. universal or specialized computing. A "network" is defined as one or more data links that allow the transport of electronic data between computer systems and / or modules and / or other electronic devices. When the information is transferred or delivered over a network or other communication connection (wired, wireless, or a combination of wired or wireless connections) to a computer system, the computer system may view it as a transmission medium. Combinations of the aforementioned elements must also be included in the field of computer readable media.
[0032] Further, when it reaches various components of the computer system, program code in the form of computer executable instructions or data structures can be automatically transferred from the transmission media to the computer storage media ( or vice versa). For example, computer-executable instructions or data structures received via a network or data link may be stored temporarily in a RAM located in a network interface module (for example, a controller). network interface "NIC"), then possibly be transferred to a RAM of the computer system and / or to less volatile computer storage media of a computer system.
[0033] Thus, it must be borne in mind that computer storage media may be included in computer system components that also use (or even primarily) transmission media.
[0034] Computer-executable instructions include, for example, instructions and data which, when executed by one or more processors, instructs a universal computer system, a dedicated computer system, or a specialized processing device to perform a certain function or group of functions. The computer executable instructions may be, for example, binary instructions, intermediate format instructions such as assembly language, or even source code. Those skilled in the art will have in mind that the invention can be practiced in networked computer environments with many types of computer system configurations, including personal computers, desktops, laptops , message processors, portable devices, multiprocessor systems, programmable or microprocessor-based consumer electronic products, network PCs, minicomputers, mainframes, mobile phones, PDAs (PDAs) personal computers), tablets, pagers, routers, switches, and the like. The invention may also be practiced in distributed systems environments where the local and remote computer systems, which are connected (by wired data links, wireless data links, or a combination of data links) wired hard and wireless) through a network, both perform tasks. Thus, in a distributed systems environment, a computer system 5 may consist of a plurality of computer systems. In a distributed systems environment, the program modules can be located in both local and remote memory storage devices.
[0035] Those skilled in the art will also be aware that the invention can be practiced in a cloud computing environment. Cloud computing environments may be distributed, although this is not required. When distributed, cloud computing environments can be distributed internationally within an organization and / or have components owned by multiple organizations. In this specification and the following claims, the term "cloud computing" is defined as a model for on-demand network access to a shared set of configurable computing resources (e.g., networks, servers, a device). storage, applications and services). The definition of "cloud computing" is not limited to any of the many other benefits that can be obtained from such a model when properly deployed.
[0036] A cloud computing model can be composed of various features, such as on-demand self-service, wide network access, resource pooling, fast elasticity, measured service, and the like. A cloud computing model can also be in the form of various service models such as, for example, Software as a Service ("SaaS"), 5 Platform as a Service ("PaaS"), and Infrastructure as a Service. than Service ("IaaS"). The cloud computing model can also be deployed using different deployment models such as a private cloud, a community cloud, a public cloud, a hybrid cloud, and so on. Some embodiments, such as a cloud computing environment, may include a system that includes one or more hosts that are each capable of running one or more virtual machines. During the operation, the virtual machines emulate a functional computer system, supporting an operating system and perhaps also one or more other applications. In some embodiments, each host includes a hypervisor that emulates virtual resources for the virtual machines using physical resources that are abstract from the point of view of the virtual machines. The hypervisor also provides appropriate isolation between the virtual machines. Thus, from the point of view of any given virtual machine, the hypervisor gives the illusion that the virtual machine is interfacing with a physical resource, even if the virtual machine only interfaces with the appearance (by example, a virtual resource) of a physical resource. Examples of physical resources include processing capacity, memory, disk space, network bandwidth, media drives, and so on.
[0037] The present invention may be embodied in other specific forms, without departing from its spirit or essential characteristics. The described embodiments should be considered in all respects only as illustrative and non-restrictive modes. The scope of the invention is thus taught by the appended claims rather than by the foregoing description. All changes considered as falling within the scope of the claims and as being equivalent thereto fall within their scope.
权利要求:
Claims (8)
[0001]
CLAIMS1 -A method used by a web video auditing system according to specifications received from a user in a computerized environment comprising an audit system and a website having one or more web pages, the method comprising the actions of: receiving (400) validation information associated with one or more video files that are accessible on a web page, the validation information comprising: one or more time slots associated with at least one of or a plurality of video files, and tag data relating to one or more tags that are associated with at least one or more video files; requesting (410) at least one of the one or more video files over a network connection; executing (420) at least one of the one or more video files, the execution of at least one or more video files causing at least one of the one or more tags to be triggered; and validating (430) the one or more tags by determining whether or the tags are or not conform to the received tag data. 30
[0002]
2 - Method according to claim 1, further comprising the report results of the validation.
[0003]
3 - The method of claim 2, wherein the report action comprises generating a summary report of the video file (s) having a corresponding tag whose validation has failed.
[0004]
4 - A method according to any one of claims 1 to 3, further comprising: receiving one or more validation rules created by the user; and determining that at least one of one or more tags is conforming to a user-created validation rule.
[0005]
The method of any one of claims 1 to 4, wherein the tag data further comprises specific times relating to the execution time during which each respective tag of the one or more tags is fired.
[0006]
The method of claim 5, wherein executing at least one of the one or more video files comprises: loading a particular web page, the particular web page including a first video file of the one or more files video ; and waiting on the particular web page for a period of time which is at least equal to an execution time associated with the first video file.
[0007]
The method of claim 6, further comprising waiting on the particular web page for a period of time which is at least equal to an execution time associated with the first video file plus a first threshold. 3025909 32
[0008]
The method of claim 6 or 7, further comprising: identifying a first specific time at which a first tag associated with the first video is expected to be triggered; determining that the first tag has not triggered at the first specific time identified plus a first threshold; recording that the first tag did not trigger at the first specific time identified plus the first threshold; and waiting for the triggering of a second tag that is associated with a second specific instant, the second tag being also associated with the first video. The method of any of claims 6 to 8, further comprising: detecting the triggering of a particular beacon; Determining that the triggering of the particular beacon has occurred at the specific time plus a respective threshold; and recording the triggering of the particular tag. Computer system, comprising: one or more processors; a system memory; and one or more computer readable media storing computer executable instructions which, when executed by the one or more processors, instruct the computer system to implement a method of auditing a video on the web according to Specifications received from a user, the method comprising: requesting information from a user, the requested information comprising: a location of a particular web object, the web object comprising a video file; an execution time, the execution time being associated with a length of the video file; tag data for one or more tags that are associated with the video file; access to the particular web object, access the particular web object including triggering the video file; and during a period of time at least equal to the execution time, the validation of the one or more tags using the tag data. The system of claim 10, wherein the beacon data comprises: a first expected trigger time of a first beacon; and a second expected trigger time of a second beacon. The system of claim 11, wherein the first expected trigger timing and the expected second trigger timing are both related to the execution time. The system of claim 11 or 12, wherein validating the tag (s) using the tag data includes: determining whether or not the first tag is triggered at a threshold value of the first instant expected; and determining whether the second beacon is triggering or not at a threshold value of the second expected instant. The system of any one of claims 11 to 13, wherein validating the one or more tags with the tag data comprises: determining that the first tag has not triggered at a threshold value the first moment expected; recording because the first beacon 15 has not triggered at a threshold value of the first expected instant; and determining whether or not the second beacon is triggering at a threshold value of the second expected instant. The system of any of claims 11 to 14, wherein validating the one or more tags using the tag data comprises detecting one or more tag signatures. The system of claim 15, wherein detecting one or more tag signatures comprises: analyzing a URL that is called at a threshold value of the execution time; and determining that the URL includes a portion of text that is associated with a particular tag. The system of any one of claims 10 to 16, wherein the particular web object comprises at least one web page, which at least one web page further comprises the video file. The system of claim 17, wherein accessing the particular web object further comprises: accessing the at least one web page; and providing one or more required entries to the at least one web page to trigger the video file. The system of claim 18, wherein the information requested from the user comprises the one or more inputs. A software package comprising one or more computer storage media on which computer executable instructions are stored which, when executed by a processor, instruct the computer system to implement a method of auditing a video on the computer. web according to specifications received from a user, the method comprising: receiving validation information associated with one or more video files that is accessible on a web page, the validation information comprising: one or more associated time slots at least one of the one or more video files, and tag data relating to one or more tags that are associated with at least one or more video files; The request of at least one of the one or more video files via a network connection; performing at least one of the one or more video files, executing at least one or more video files causing at least one or more tags to be triggered; and validating the label (s) by determining that the one or more tags are or are not in compliance with the received tag data.
类似技术:
公开号 | 公开日 | 专利标题
FR3025909A3|2016-03-18|VIDEO AUDIT ON THE WEB
WO2016070689A1|2016-05-12|Method and system for sharing application, and application service platform
US9154388B2|2015-10-06|Data delivery
US9954746B2|2018-04-24|Automatically generating service documentation based on actual usage
US9936330B2|2018-04-03|Methods for exchanging data amongst mobile applications using superlinks
US9547626B2|2017-01-17|Systems, methods, and media for managing ambient adaptability of web applications and web services
US10360133B2|2019-07-23|Analyzing analytic element network traffic
FR3018620A3|2015-09-18|CREATING RULES FOR USE IN THIRD PARTY MANAGEMENT SYSTEMS
FR3025964A3|2016-03-18|AUDIT OF MOBILE APPLICATIONS
US9361168B1|2016-06-07|Accessing resources across a network boundary
US20160071144A1|2016-03-10|User activity attribution
US10182046B1|2019-01-15|Detecting a network crawler
US9972043B2|2018-05-15|Credibility enhancement for online comments and recommendations
US10715864B2|2020-07-14|System and method for universal, player-independent measurement of consumer-online-video consumption behaviors
US20200311177A1|2020-10-01|Using embedded elements for online content verification
US10290022B1|2019-05-14|Targeting content based on user characteristics
US10795791B2|2020-10-06|State-tracked testing across network boundaries
US10291684B1|2019-05-14|Enforcing publisher content item block requests
US10803486B1|2020-10-13|Item recommendations based on media content
US20180241738A1|2018-08-23|Using a proxy server to intercept and analyze content
US9454565B1|2016-09-27|Identifying relationships between applications
TWI680657B|2019-12-21|WeChat H5 propagation monitoring analysis method and related equipment
US11138367B2|2021-10-05|Dynamic interaction behavior commentary
US20210049649A1|2021-02-18|Dynamically streaming social media live content and displaying advertisements on a public display
US20210029395A1|2021-01-28|Content restriction system
同族专利:
公开号 | 公开日
GB201705936D0|2017-05-31|
WO2016039783A1|2016-03-17|
US9842133B2|2017-12-12|
FR3025909B3|2016-10-14|
GB2549614A|2017-10-25|
US20160078078A1|2016-03-17|
GB2549614B|2021-02-10|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US6792458B1|1999-10-04|2004-09-14|Urchin Software Corporation|System and method for monitoring and analyzing internet traffic|
US7610289B2|2000-10-04|2009-10-27|Google Inc.|System and method for monitoring and analyzing internet traffic|
US20030208594A1|2002-05-06|2003-11-06|Urchin Software Corporation.|System and method for tracking unique visitors to a website|
JP2007065928A|2005-08-30|2007-03-15|Toshiba Corp|Information storage medium, information processing method, information transfer method, information reproduction method, information reproduction device, information recording method, information recording device, and program|
WO2008052059A2|2006-10-25|2008-05-02|Gomez, Inc.|Methods and apparatus for real user monitoring|
US20080256434A1|2007-04-10|2008-10-16|Morris Robert P|Methods, Systems, And Computer Program Products For Associating User-Provided Annotation Data With Markup Content Of A Resource|
US8429243B1|2007-12-13|2013-04-23|Google Inc.|Web analytics event tracking system|
US20090287713A1|2008-05-16|2009-11-19|Tealium, Inc.|Systems and methods for measuring online public relation and social media metrics using link scanning technology|
US8996986B2|2010-01-11|2015-03-31|Ensighten, Inc.|Enhanced delivery of content and program instructions|
US20130290480A1|2010-01-11|2013-10-31|Ensighten, Inc.|Use of Method Overrides for Dynamically Changing Visible Page Content|
US20110178932A1|2010-01-15|2011-07-21|Anthony Kevin Johnson|Artistic work download transaction |
US9003552B2|2010-12-30|2015-04-07|Ensighten, Inc.|Online privacy management|
WO2012092487A1|2010-12-30|2012-07-05|Ensighten, Inc.|Online privacy management|
US9165308B2|2011-09-20|2015-10-20|TagMan Inc.|System and method for loading of web page assets|
US20130080218A1|2011-09-23|2013-03-28|Reapso, Llc|Customized content delivery system|
US8438595B1|2011-11-04|2013-05-07|General Instrument Corporation|Method and apparatus for temporal correlation of content-specific metadata with content obtained from disparate sources|
CA2865267A1|2012-02-21|2013-08-29|Ensighten, Inc.|Graphical overlay related to data mining and analytics|
US20130297778A1|2012-05-02|2013-11-07|Google Inc.|System for centralized analytics tracking via server-side sessionization|
US9203905B1|2012-08-27|2015-12-01|Google Inc.|Sessionization of visitor activity|
US9317490B2|2012-09-19|2016-04-19|TagMan Inc.|Systems and methods for 3-tier tag container architecture|
WO2014116542A1|2013-01-22|2014-07-31|Tealium Inc.|Activation of dormant features in native applications|
US9148675B2|2013-06-05|2015-09-29|Tveyes Inc.|System for social media tag extraction|
US9824352B2|2013-07-11|2017-11-21|Visa International Service Association|Augmented smart tag security apparatuses, methods and systems|
US20150066587A1|2013-08-30|2015-03-05|Tealium Inc.|Content site visitor processing system|
US8805946B1|2013-08-30|2014-08-12|Tealium Inc.|System and method for combining content site visitor profiles|
US9081789B2|2013-10-28|2015-07-14|Tealium Inc.|System for prefetching digital tags|
WO2015069659A1|2013-11-05|2015-05-14|Tealium Inc.|Universal visitor identification system|
US9288256B2|2014-04-11|2016-03-15|Ensighten, Inc.|URL prefetching|
US8997081B1|2014-09-18|2015-03-31|Ensighten, Inc.|Analytics for mobile applications|
US9219787B1|2014-11-26|2015-12-22|Ensighten, Inc.|Stateless cookie operations server|US9361631B2|2010-01-06|2016-06-07|Ghostery, Inc.|Managing and monitoring digital advertising|
US10291492B2|2012-08-15|2019-05-14|Evidon, Inc.|Systems and methods for discovering sources of online content|
AU2016249910A1|2015-04-11|2017-10-26|Evidon, Inc.|Methods, apparatus, and systems for providing notice of digital tracking technologies in mobile apps on mobile devices, and for recording user consent in connection with same|
US10977597B2|2015-07-27|2021-04-13|Innovian Corporation|System and method for validating data|
WO2017078705A1|2015-11-04|2017-05-11|Observepoint, Inc.|Automatic execution of objects in a user interface|
US20170192984A1|2015-12-31|2017-07-06|Mezzobit Inc.|System and method for optimizing audience data and tracking|
US10360133B2|2016-02-04|2019-07-23|Observepoint Inc.|Analyzing analytic element network traffic|
US10826802B2|2016-02-09|2020-11-03|Observepoint, Inc.|Managing network communication protocols|
CN109656810A|2018-11-07|2019-04-19|深圳市维海德技术股份有限公司|A kind of adjustment method of image algorithm, debugging system and terminal device|
法律状态:
2016-01-08| PLFP| Fee payment|Year of fee payment: 2 |
2016-06-24| TP| Transmission of property|Owner name: OBSERVEPOINT, INC., US Effective date: 20160524 |
2016-07-12| PLFP| Fee payment|Year of fee payment: 3 |
2017-01-12| PLFP| Fee payment|Year of fee payment: 3 |
2018-01-11| PLFP| Fee payment|Year of fee payment: 4 |
2020-02-25| PLFP| Fee payment|Year of fee payment: 6 |
2021-02-23| PLFP| Fee payment|Year of fee payment: 7 |
2022-02-23| PLFP| Fee payment|Year of fee payment: 8 |
优先权:
申请号 | 申请日 | 专利标题
US14/485,520|US9842133B2|2014-09-12|2014-09-12|Auditing of web-based video|
[返回顶部]