Patent
Combining measurements based on beacon data
العنوان: | Combining measurements based on beacon data |
---|---|
Patent Number: | 9,430,746 |
تاريخ النشر: | August 30, 2016 |
Appl. No: | 13/481474 |
Application Filed: | May 25, 2012 |
مستخلص: | Usage data representing the access of a set of resources on a network is accessed. The usage data is based at least in part on information received from client systems sent as a result of beacon instructions included with the set of resources. First and second sets of usage data representing access by client systems classified as a first type and a second type, respectively, are determined based on the accessed usage data. Counts of unique visitors accessing the network resources from each of the first and second types of client systems, based on the first and sets of usage data, respectively, are each determined. A total count of unique visitors accessing the network resources from the first and second types of client systems is determined based on data representing the usage overlap of devices of the first type with devices of the second type. |
Inventors: | Pecjak, Frank Eugene (Fairfax, VA, US); Pugh, Brian (Reston, VA, US); Nasr, Ramzi (Arlington, VA, US); Nair, Balakrishnan Vinayak (Herndon, VA, US); Johnson, Kris (Washington, DC, US) |
Assignees: | comScore, Inc. (Reston, VA, US) |
Claim: | 1. A computer-implemented method comprising: accessing usage data representing the access of a set of resources on a network, the usage data based at least in part on information received from client systems sent as a result of beacon instructions included with the set of resources; determining, based on the accessed usage data, a first set of usage data representing access by client systems classified as a first type; determining a count of unique visitors accessing the network resources from the first type of client systems based on the first set of usage data; determining, based on the accessed usage data, a second set of usage data representing access by client systems classified as a second type; determining a count of unique visitors accessing the network resources from the second type of client systems based on the second set of usage data, wherein determining the count of unique visitors accessing the network resources from the second type of client systems comprises: determining, based on the second set of usage data, a first subset of data representing information about accesses to the resources by the client systems classified as the second type associated with persistent beacon identifiers, wherein the persistent beacon identifiers are associated usage data collected over a duration that exceeds a persistence threshold, determining, based on the second set of usage data, a second subset of data representing information about accesses to the resources by the client systems classified as the second type with non-persistent beacon identifiers, wherein the non-persistent beacon identifiers are associated usage data collected over a duration that does not exceed a persistence threshold, determining one or more adjustment factors based on the first subset of data, and determining a count of unique visitors accessing the set of resources from the client systems classified as the second type based, at least in part, on a count of accesses by the client systems classified as the second type and associated with persistent identifiers, a count of accesses by the client systems classified as the second type and associated with non-persistent beacon identifiers, and the determined adjustment factors; and determining a total count of unique visitors accessing the network resources from the first and second types of client systems based on data representing a usage overlap of devices of the first type with devices of the second type. |
Claim: | 2. The method of claim 1 , wherein the first type of client system is a non-mobile, non-shared use personal computing device type. |
Claim: | 3. The method of claim 2 , wherein the second type of client system is a mobile computing device type. |
Claim: | 4. The method of claim 3 , further comprising: determining, based on the accessed usage data, a third set of usage data representing access by client systems classified as a third type; and determining a count of unique visitors accessing the network resources from the third type of client systems based on the third set of usage data; wherein determining the total count of unique visitors accessing the network resources comprises determining a total count of unique visitors accessing the network resources from the first, second, and third types of client systems based on data representing the usage overlap of devices of the first, second, and third types. |
Claim: | 5. The method of claim 4 , wherein the third type of client system is a shared use computing device type. |
Claim: | 6. The method of claim 2 , wherein the second type of client system is a shared use computing device type. |
Claim: | 7. The method of claim 1 , wherein: the first type of client system is a shared use computing device type, and determining a count of unique visitors accessing the network resources from the first type of client systems comprises: determining, based on the second set of usage data, a subset of shared use data representing access of the network resources by shared use devices sharing a common location; estimating a number of shared use devices and a number of persons at the common location based on the subset of shared use data; and determining a count of unique visitors to the network resources from shared use devices at the common location based on the estimated number of shared use devices and number of persons at the common location. |
Claim: | 8. The method of claim 1 , further comprising: accessing sample data representing the access of the network resources, the sample data including information about an overlap in use of client systems classified as the first type and client systems classified as the second type; and generating an overlap factor based on the accessed sample data, the overlap factor representing the overlap in use of client systems classified as the first type and client systems classified as the second type; wherein determining the total count comprises determining the total count of unique visitors accessing the network resources based on the generated overlap factor. |
Claim: | 9. The method of claim 8 , wherein the sample data represents survey data for users accessing one or more of the network resources, the survey data classifying each user's current client system used to access one or more of the network resources and further classifying one or more other client systems regularly used by the user. |
Claim: | 10. The method of claim 8 , wherein the sample data is panel data. |
Claim: | 11. A computer readable storage medium storing instructions that, when executed by one or more processing devices, cause the one or more processing devices to perform operations comprising: accessing usage data representing the access of a set of resources on a network, the usage data based at least in part on information received from client systems sent as a result of beacon instructions included with the set of resources; determining, based on the accessed usage data, a first set of usage data representing access by client systems classified as a first type; determining a count of unique visitors accessing the network resources from the first type of client systems based on the first set of usage data; determining, based on the accessed usage data, a second set of usage data representing access by client systems classified as a second type; determining a count of unique visitors accessing the network resources from the second type of client systems based on the second set of usage data, wherein determining the count of unique visitors accessing the network resources from the second type of client systems comprises: determining, based on the second set of usage data, a first subset of data representing information about accesses to the resources by the client systems classified as the second type associated with persistent beacon identifiers, wherein the persistent beacon identifiers are associated usage data collected over a duration that exceeds a persistence threshold, determining, based on the second set of usage data, a second subset of data representing information about accesses to the resources by the client systems classified as the second type with non-persistent beacon identifiers, wherein the non-persistent beacon identifiers are associated usage data collected over a duration that does not exceed a persistence threshold, determining one or more adjustment factors based on the first subset of data, and determining a count of unique visitors accessing the set of resources from the client systems classified as the second type based, at least in part, on a count of accesses by the client systems classified as the second type and associated with persistent identifiers, a count of accesses by the client systems classified as the second type and associated with non-persistent beacon identifiers, and the determined adjustment factors; and determining a total count of unique visitors accessing the network resources from the first and second types of client systems based on data representing a usage overlap of devices of the first type with devices of the second type. |
Claim: | 12. The medium of claim 11 , wherein the first type of client system is a non-mobile, non-shared use personal computing device type. |
Claim: | 13. The medium of claim 12 , wherein the second type of client system is a mobile computing device type. |
Claim: | 14. The medium of claim 13 , wherein the instructions include instructions that, when executed, cause the one or more processing devices to perform the following operations: determining, based on the accessed usage data, a third set of usage data representing access by client systems classified as a third type; and determining a count of unique visitors accessing the network resources from the third type of client systems based on the third set of usage data; wherein determining the total count of unique visitors accessing the network resources comprises determining a total count of unique visitors accessing the network resources from the first, second, and third types of client systems based on data representing the usage overlap of devices of the first, second, and third types. |
Claim: | 15. The medium of claim 14 , wherein the third type of client system is a shared use computing device type. |
Claim: | 16. The medium of claim 12 , wherein the second type of client system is a shared use computing device type. |
Claim: | 17. The medium of claim 11 , wherein: the first type of client system is a shared use computing device type, and to determine a count of unique visitors accessing the network resources from the first type of client systems, the instructions include instructions that cause the one or more processing devices to perform the following operations: determining, based on the second set of usage data, a subset of shared use data representing access of the network resources by shared use devices sharing a common location; estimating a number of shared use devices and a number of persons at the common location based on the subset of shared use data; and determining a count of unique visitors to the network resources from shared use devices at the common location based on the estimated number of shared use devices and number of persons at the common location. |
Claim: | 18. The medium of claim 11 , wherein the instructions include instructions that cause the one or more processing devices to perform the following operations: accessing sample data representing the access of the network resources, the sample data including information about the overlap in use of client systems classified as the first type and client systems classified as the second type; and generating an overlap factor based on the accessed sample data, the overlap factor representing the usage overlap of devices of the first type with devices of the second type; wherein determining the total count comprises determining the total count of unique visitors accessing the network resources based on the generated overlap factor. |
Claim: | 19. The medium of claim 18 , wherein the sample data represents survey data for users accessing one or more of the network resources, the survey data classifying each user's current client system used to access one or more of the network resources and further classifying one or more other client systems regularly used by the user. |
Claim: | 20. The medium of claim 18 , wherein the sample data is panel data. |
Patent References Cited: | 7606897 October 2009 Izrailevsky et al. 2003/0046159 March 2003 Ebrahimi et al. 2008/0214154 September 2008 Ramer et al. 2008/0249905 October 2008 Wong et al. 2008/0250136 October 2008 Izrailevsky et al. 2010/0312702 December 2010 Bullock 2011/0004682 January 2011 Honnold et al. 2011/0246641 October 2011 Pugh et al. |
Other References: | International Search Report and the Written Opinion of the International Searching Authority, or the Declaration issued in PCT/US2012/039724 on May 25, 2012, 13 pages. cited by applicant |
Primary Examiner: | Choudhury, Azizul |
Attorney, Agent or Firm: | Fish & Richardson P.C. |
رقم الانضمام: | edspgr.09430746 |
قاعدة البيانات: | USPTO Patent Grants |
الوصف غير متاح. |