NON-COMMITTAL VISITOR STITCHING
First Claim
1. A computer-implemented method comprising:
- receiving, by a processor, first unique visit interaction data representing interactions with a first entity by a first visitor and second unique visit interaction data representing interactions with a second entity by a second visitor;
aggregating, by the processor, the first unique visit interaction data with the second unique visit interaction data to produce first unified visit interaction data;
computing, by the processor using a first visitor stitching algorithm, a first unified visitor level of certainty that the first visitor and the second visitor are the same visitor; and
generating, by the processor, a report using;
the first unified visit interaction data while a user-specified level of certainty is less than or equal to the first unified visitor level of certainty; and
each of the first and second unique visit interaction data while the user-specified level of certainty is greater than the first unified visitor level of certainty.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques are provided for transforming information about unique visits to a website or interactions with a mobile application by a single individual on different devices into unified analytical data representing these visits. One or more visitor stitching models can be used to quantify unique visits as belonging to the same person with a certain level of confidence. In addition to maintaining separate records for each unique visit, a unified record is generated, which represents a combination of the unique visits by the same person. Various analytics can then be performed on the unique and unified records. The unified records are favored over the separate data records wherever the stitching model corresponding to the unified record provides a certainty that meets or exceeds a user-specified confidence level. The visitor stitching model used for the analytics is considered non-committal because different models can be employed or none at all, depending on user preferences.
32 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, by a processor, first unique visit interaction data representing interactions with a first entity by a first visitor and second unique visit interaction data representing interactions with a second entity by a second visitor; aggregating, by the processor, the first unique visit interaction data with the second unique visit interaction data to produce first unified visit interaction data; computing, by the processor using a first visitor stitching algorithm, a first unified visitor level of certainty that the first visitor and the second visitor are the same visitor; and generating, by the processor, a report using; the first unified visit interaction data while a user-specified level of certainty is less than or equal to the first unified visitor level of certainty; and each of the first and second unique visit interaction data while the user-specified level of certainty is greater than the first unified visitor level of certainty. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a storage; a processor operatively coupled to the storage, the processor configured to execute instructions stored in the storage that when executed cause the processor to carry out a process comprising; receiving first unique visit interaction data representing interactions with a first entity by a first visitor and second unique visit interaction data representing interactions with a second entity by a second visitor; aggregating the first unique visit interaction data with the second unique visit interaction data to produce first unified visit interaction data; computing, using a first visitor stitching algorithm, a first unified visitor level of certainty that the first visitor and the second visitor are the same visitor; and generating a report using; the first unified visit interaction data while a user-specified level of certainty is less than or equal to the first unified visitor level of certainty; and each of the first and second unique visit interaction data while the user-specified level of certainty is greater than the first unified visitor level of certainty. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transient computer program product having instructions encoded thereon that when executed by one or more processors cause a process to be carried out, the process comprising:
-
receiving first unique visit interaction data representing interactions with a first entity by a first visitor and second unique visit interaction data representing interactions with a second entity by a second visitor; aggregating the first unique visit interaction data with the second unique visit interaction data to produce first unified visit interaction data; computing, using a first visitor stitching algorithm, a first unified visitor level of certainty that the first visitor and the second visitor are the same visitor; and generating a report using; the first unified visit interaction data while a user-specified level of certainty is less than or equal to the first unified visitor level of certainty; and each of the first and second unique visit interaction data while the user-specified level of certainty is greater than the first unified visitor level of certainty. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification