COMBINING MEASUREMENTS BASED ON BEACON DATA
First Claim
1. A computer-implemented method comprising:
- accessing usage data representing the access of a set of resources on a network, the usage data based at least in part on information received from client systems sent as a result of beacon instructions included with the set of resources;
determining, based on the accessed usage data, a first set of usage data representing access by client systems classified as a first type;
determining a count of unique visitors accessing the network resources from the first type of client systems based on the first set of usage data;
determining, based on the accessed usage data, a second set of usage data representing access by client systems classified as a second type;
determining a count of unique visitors accessing the network resources from the second type of client systems based on the second set of usage data; and
determining a total count of unique visitors accessing the network resources from the first and second types of client systems based on data representing the usage overlap of devices of the first type with devices of the second type.
7 Assignments
0 Petitions
Accused Products
Abstract
Usage data representing the access of a set of resources on a network is accessed. The usage data is based at least in part on information received from client systems sent as a result of beacon instructions included with the set of resources. First and second sets of usage data representing access by client systems classified as a first type and a second type, respectively, are determined based on the accessed usage data. Counts of unique visitors accessing the network resources from each of the first and second types of client systems, based on the first and sets of usage data, respectively, are each determined. A total count of unique visitors accessing the network resources from the first and second types of client systems is determined based on data representing the usage overlap of devices of the first type with devices of the second type.
-
Citations
25 Claims
-
1. A computer-implemented method comprising:
-
accessing usage data representing the access of a set of resources on a network, the usage data based at least in part on information received from client systems sent as a result of beacon instructions included with the set of resources; determining, based on the accessed usage data, a first set of usage data representing access by client systems classified as a first type; determining a count of unique visitors accessing the network resources from the first type of client systems based on the first set of usage data; determining, based on the accessed usage data, a second set of usage data representing access by client systems classified as a second type; determining a count of unique visitors accessing the network resources from the second type of client systems based on the second set of usage data; and determining a total count of unique visitors accessing the network resources from the first and second types of client systems based on data representing the usage overlap of devices of the first type with devices of the second type. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer readable storage medium storing instructions that, when executed by one or more processing devices, cause the one or more processing devices to perform the following operations:
-
accessing usage data representing the access of a set of resources on a network, the usage data based at least in part on information received from client systems sent as a result of beacon instructions included with the set of resources; determining, based on the accessed usage data, a first set of usage data representing access by client systems classified as a first type; determining a count of unique visitors accessing the network resources from the first type of client systems based on the first set of usage data; determining, based on the accessed usage data, a second set of usage data representing access by client systems classified as a second type; determining a count of unique visitors accessing the network resources from the second type of client systems based on the second set of usage data; and determining a total count of unique visitors accessing the network resources from the first and second types of client systems based on data representing the usage overlap of devices of the first type with devices of the second type. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer-implemented method, comprising:
-
accessing mobile usage data representing the access of one or more resources on a network by client devices classified as mobile devices, the mobile usage data including information received from client devices sent as a result of beacon instructions included with the set of resources; determining, based on the accessed mobile usage data, a first set of data representing information about accesses to the resources by mobile devices with persistent beacon cookies, wherein the persistent beacon cookies were present for a duration that meets a persistence threshold; determining, based on the accessed mobile usage data, a second set of data representing information about accesses to the resources by mobile devices with non-persistent beacon cookies, wherein the non-persistent beacon cookies were present for a duration that does not meet the persistence threshold; determining one or more adjustment factors based on the first set of data; determining a count of unique visitors accessing the set of resources from mobile devices based, at least in part, on a count of accesses by mobile devices with persistent beacon cookies and a count of accesses by mobile devices with non-persistent beacon cookies adjusted by the adjustment factors.
-
-
24. A computer-implemented method, comprising:
-
accessing mobile usage data representing the access of a set of resources on a network by client devices classified as mobile devices, the mobile usage data including information received from client systems sent as a result of beacon instructions included with the set of resources; identifying a set of cookie usage data representing access by mobile devices with beacon cookies associated with the beacon instructions; identifying a set of non-cookie usage data representing access by mobile devices without the beacon cookies; determining a cookie count of unique visitors based on the cookie usage data; determining a non-cookie count of unique visitors based on the non-cookie usage data and the cookie usage data; and aggregating the cookie count and the non-cookie count to determine a total count of unique visitors for mobile devices.
-
-
25. A computer-implemented method, comprising:
-
accessing usage data representing the access of a set of resources on a network by client devices, the usage data including information received from client systems sent as a result of beacon instructions included with the set of resources; determining, based on the accessed usage data, a set of shared use data representing access of the network resources by client devices classified as shared use devices; determining, based on the set of shared use data, a first set of shared use data representing access of the network resources by shared use devices sharing a first common location; determining, based on the set of shared use data, a second set of shared use data representing access of the network resources by shared use devices sharing a second common location; estimating a number of shared use devices and a number of persons at the first common location based on the first set of shared use data; determining a first count of unique visitors to the network resources from shared use devices at the first common location based on the estimated number of shared use devices and number of persons at the first common location; estimating a number of shared use devices and a number of persons at the second common location based on the second set of shared use data; determining a second count of unique visitors to the network resources from shared use devices at the second common location based on the estimated number of shared use devices and number of persons at the second common location; and determining a count of unique visitors accessing the network resources by shared use devices based, at least in part, on the aggregation of the first and second counts.
-
Specification