A tag management system can include features to assist in developing a cross-vendor profile for individual visitors to content pages of a content site. The visitors to the content site can obtain universal identifiers usable by the content site to identify the visitors. The universal identifiers can be included in the content pages by the visitor end user systems so that browser tags that may not have native access to the universal identifier can access the universal identifiers. The universal identifiers may then be provided to tag vendor systems with associated visitor data, thereby enabling the tag vendor systems to provide processed or raw data that can be compared by individual universal identifiers. Using this processed data, the content site can prepare the cross-vendor profile of individual visitors and realize insights that may be unavailable using conventional systems and methods.
H04L 67/02 - Protocoles basés sur la technologie du Web, p.ex. protocole de transfert hypertexte [HTTP]
H04L 69/329 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU] dans la couche application [couche OSI 7]
H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
2.
SECURE HUMAN USER VERIFICATION FOR ELECTRONIC SYSTEMS
Systems and methods are provided for a secure human user verification procedure that involves physical manipulation of a user device with respect to its environment. A challenge prompt may be presented for a user to provide challenge response data. A subsystem of an application running on the user device may be configured (e.g., using a machine learning model) to evaluate the challenge response data and determine whether the challenge response data includes the subject of the challenge. To ensure that the user is not providing pre-existing data in response to the challenge prompt, data items associated with the challenge response data may be evaluated to validate the challenge response data as being provided by a human user rather than automatically generated.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
Embodiments of the systems described herein can implement one or more visitor tearing processes. Visitor tearing can include, among other things, one or more processes by which multiple visitors that may appear to be the same visitor may be separated into different visitor profiles due to the leveraging of one or more unique persistent identifiers.
Systems and methods described herein can take advantage of the caching abilities of the browser and the idle time of the user to prefetch tag libraries of one or more tags for execution in a subsequent content page. For example, these systems and methods can provide the ability to prefetch and not execute a tag library on a content page before it is required so the tag library is cached in the browser. When the browser hits the page that uses the tag library, the tag library can be quickly retrieved from memory and executed.
H04L 67/5681 - Pré-extraction ou pré-livraison de données en fonction des caractéristiques du réseau
H04L 41/50 - Gestion des services réseau, p.ex. en assurant une bonne réalisation du service conformément aux accords
H04L 67/02 - Protocoles basés sur la technologie du Web, p.ex. protocole de transfert hypertexte [HTTP]
G06F 16/172 - Mise en cache, pré-extraction ou accumulation de fichiers
G06F 16/957 - Optimisation de la navigation, p.ex. mise en cache ou distillation de contenus
G06F 16/958 - Organisation ou gestion de contenu de sites Web, p.ex. publication, conservation de pages ou liens automatiques
G06Q 30/0201 - Modélisation du marché; Analyse du marché; Collecte de données du marché
G06F 40/143 - Balisage, p.ex. utilisation du langage SGML ou de définitions de type de document
H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
In some embodiments, a system is disclosed for processing event data for an application and transmitting the event data via a computer network. The system can include a memory device and a hardware processor. The memory device can store an application. The hardware processor can execute the application, characterize a user engagement with the application as being a first level of engagement or a second level of engagement, generate event data responsive to user interactions with the application, and control the batch collection of the event data depending on whether the user engagement with the application is characterized as the first level of engagement or the second level of engagement.
A tag management system can implement a combined synchronous and asynchronous tag-loading scheme. In an embodiment of this scheme, a synchronous tag may be included at the top of or near the top of a content page. This synchronous tag can hide one or more page elements that are to be modified by a subsequent asynchronous personalization tag. Subsequently, the asynchronous personalization tag can update the page element and then cause the page element to be displayed. As a result, flicker between the old and new page elements can be reduced or avoided.
In some embodiments, an electronic device is disclosed for intelligently prefetching data via a computer network. The electronic device can include a device housing, a user interface, a memory device, and a hardware processor. The hardware processor can: communicate via a communication network; determine that the hardware processor is expected to be unable to communicate via the communication network; responsive to determining that the hardware processor is expected to be unable to communicate via the communication network, determine prefetch data to request prior to the hardware processor being unable to communicate via the communication network; request the prefetch data; receive and store the prefetch data prior to the hardware processor being unable to communicate via the communication network; and subsequent to the hardware processor being unable to communicate via the communication network, process the prefetch data with an application responsive to processing a first user input with the application.
H04L 67/5681 - Pré-extraction ou pré-livraison de données en fonction des caractéristiques du réseau
H04L 67/63 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises en acheminant une demande de service en fonction du contenu ou du contexte de la demande
H04W 12/64 - Sécurité dépendant du contexte dépendant de la proximité utilisant des zones géorepérées
G06F 1/26 - Alimentation en énergie électrique, p.ex. régulation à cet effet
H04W 4/021 - Services concernant des domaines particuliers, p.ex. services de points d’intérêt, services sur place ou géorepères
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
8.
Configuration of content site user interaction monitoring in data networks
A collection configuration management system can be used to manage one or more monitoring objects, such as tags, included in one or more content objects. The collection configuration management system can compartmentalize monitoring object configurations into a monitoring object bundle that may be executed as a result of loading the one or more content objects. The monitoring object bundle can be generated to include one or more monitoring objects, as well as monitoring object management loader functionality.
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie
G06Q 30/0201 - Modélisation du marché; Analyse du marché; Collecte de données du marché
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
H04L 67/00 - Dispositions ou protocoles de réseau pour la prise en charge de services ou d'applications réseau
H04L 67/02 - Protocoles basés sur la technologie du Web, p.ex. protocole de transfert hypertexte [HTTP]
9.
CONFIGURATION OF CONTENT SITE USER INTERACTION MONITORING IN DATA NETWORKS
Style instructions, which may be coded in a style language and not include application logic, can be used to both control presentation of content of a web page by a web browser and control monitoring of interactions with the web page. Selectors in the style instructions, for example, can be used to identify elements of the web page and define styles for the elements. As a result of implementing such style instructions, individuals tasked with design of a web page can more easily and quickly configure monitoring of interactions with the web page.
Embodiments of the systems described herein can implement one or more visitor stitching processes. Visitor stitching can include, among other things, one or more processes by which multiple visitors that may appear distinctly independent may be merged into a new single united visitor profile due to the leveraging of one or more unique persistent identifiers.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
G06F 16/335 - Filtrage basé sur des données supplémentaires, p.ex. sur des profils d’utilisateurs ou de groupes
Embodiments of the systems described herein can implement one or more processes remotely delivering customized code to a host application and/or computing device. The host application may be configured as an Application Programming Interface with a customized code processing library that may configure the host application to receive further instructions remotely. The host application may be further configured to execute host code and/or third-party code. The host application may be configured to receive remote application logic, after the host application has been installed on a computing device, and to execute the received application logic to alter the behavior of the host application, such as selectively tracking end user interactions.
Systems and methods are provided for analysis and selection of attributes used to segment data entities. The attributes used to segment data entities may be analyzed to identify segments of data entities (e.g., distinct audiences of visitors) that share values for a given subset of attributes. By intelligently selecting attributes for use in the segmentation process based on the values that they may take (e.g., the cardinality of the attributes), the selected attributes can be used to generate a reasonable or otherwise desirable number of data entity segments. Other attributes can be excluded from the segmentation process.
An improved approach to tracking media playback includes tracking logic that is based on abandonment indicators. An abandonment indicator is detected during media playback, such as a user interaction with a computing device that is detected prior to ceasing playback of the media content. Tracking messages are reduced, suppressed, or suspended until an abandonment indicator is detected. After an abandonment indicator is detected, the system quickens, releases, or restart sending tracking messages to a collection system.
H04N 21/2387 - Traitement de flux en réponse à une requête de reproduction par un utilisateur final, p.ex. pour la lecture à vitesse variable ("trick play")
H04N 21/442 - Surveillance de procédés ou de ressources, p.ex. détection de la défaillance d'un dispositif d'enregistrement, surveillance de la bande passante sur la voie descendante, du nombre de visualisations d'un film, de l'espace de stockage disponible dans l
H04L 65/612 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p.ex. radio sur Internet pour monodiffusion [unicast]
H04L 43/10 - Surveillance active, p.ex. battement de cœur, utilitaire Ping ou trace-route
H04N 21/235 - Traitement de données additionnelles, p.ex. brouillage de données additionnelles ou traitement de descripteurs de contenu
A tag management system can include features to assist in developing a cross-vendor profile for individual visitors to content pages of a content site. The visitors to the content site can obtain universal identifiers usable by the content site to identify the visitors. The universal identifiers can be included in the content pages by the visitor end user systems so that browser tags that may not have native access to the universal identifier can access the universal identifiers. The universal identifiers may then be provided to tag vendor systems with associated visitor data, thereby enabling the tag vendor systems to provide processed or raw data that can be compared by individual universal identifiers. Using this processed data, the content site can prepare the cross-vendor profile of individual visitors and realize insights that may be unavailable using conventional systems and methods.
H04L 67/02 - Protocoles basés sur la technologie du Web, p.ex. protocole de transfert hypertexte [HTTP]
H04L 69/329 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU] dans la couche application [couche OSI 7]
H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
A collection configuration management system can be used to manage one or more monitoring objects, such as tags, included in one or more content objects. The collection configuration management system can compartmentalize monitoring object configurations into a monitoring object bundle that may be executed as a result of loading the one or more content objects. The monitoring object bundle can be generated to include one or more monitoring objects, as well as monitoring object management loader functionality.
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
H04L 67/00 - Dispositions ou protocoles de réseau pour la prise en charge de services ou d'applications réseau
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie
G06Q 30/0201 - Modélisation du marché; Analyse du marché; Collecte de données du marché
16.
DEPLOYABLE TAG MANAGEMENT IN COMPUTER DATA NETWORKS
A tag management system in a computer data network can be used to manage one or more tag configurations with templates. A template may enable efficient tag configuration by causing presentation of an improved user interface that facilitates user-specified mappings between a custom content site and predefined tag management attributes. By completing a template, which may depend on other templates or have templates that depend on it, the tag management system can automatically deploy complex tag management configurations to track end user interactions over a data network.
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
The systems and methods described herein use a tag for collecting data associated with a content object of a content page. The tag may be a universal tag which can provide a single point of data collection and thereby reduce the number of network requests due to piggyback tags. The data collected from the content page may be communicated to a stream management system which can process the data and split the data into multiple data streams to be fed to a downstream system. The downstream system can further process the data and communicate to another downstream system. In some embodiments, the stream management system can access the repositories of its downstream system and veto the data flows created by the downstream system.
Embodiments of the systems described herein can implement one or more visitor tearing processes. Visitor tearing can include, among other things, one or more processes by which multiple visitors that may appear to be the same visitor may be separated into different visitor profiles due to the leveraging of one or more unique persistent identifiers.
In some embodiments, a system is disclosed for processing event data for an application and transmitting the event data via a computer network. The system can include a memory device and a hardware processor. The memory device can store an application. The hardware processor can execute the application, characterize a user engagement with the application as being a first level of engagement or a second level of engagement, generate event data responsive to user interactions with the application, and control the batch collection of the event data depending on whether the user engagement with the application is characterized as the first level of engagement or the second level of engagement.
In some embodiments, an electronic device is disclosed for intelligently prefetching data via a computer network. The electronic device can include a device housing, a user interface, a memory device, and a hardware processor. The hardware processor can: communicate via a communication network; determine that the hardware processor is expected to be unable to communicate via the communication network; responsive to determining that the hardware processor is expected to be unable to communicate via the communication network, determine prefetch data to request prior to the hardware processor being unable to communicate via the communication network; request the prefetch data; receive and store the prefetch data prior to the hardware processor being unable to communicate via the communication network; and subsequent to the hardware processor being unable to communicate via the communication network, process the prefetch data with an application responsive to processing a first user input with the application.
H04L 67/5681 - Pré-extraction ou pré-livraison de données en fonction des caractéristiques du réseau
H04L 67/63 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises en acheminant une demande de service en fonction du contenu ou du contexte de la demande
H04W 4/021 - Services concernant des domaines particuliers, p.ex. services de points d’intérêt, services sur place ou géorepères
G06F 1/26 - Alimentation en énergie électrique, p.ex. régulation à cet effet
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
H04W 12/64 - Sécurité dépendant du contexte dépendant de la proximité utilisant des zones géorepérées
An improved approach to tracking media playback includes tracking logic that is based on abandonment indicators. An abandonment indicator is detected during media playback, such as a user interaction with a computing device that is detected prior to ceasing playback of the media content. Tracking messages are reduced, suppressed, or suspended until an abandonment indicator is detected. After an abandonment indicator is detected, the system quickens, releases, or restart sending tracking messages to a collection system.
H04N 21/2387 - Traitement de flux en réponse à une requête de reproduction par un utilisateur final, p.ex. pour la lecture à vitesse variable ("trick play")
H04L 43/10 - Surveillance active, p.ex. battement de cœur, utilitaire Ping ou trace-route
H04L 65/612 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p.ex. radio sur Internet pour monodiffusion [unicast]
H04N 21/442 - Surveillance de procédés ou de ressources, p.ex. détection de la défaillance d'un dispositif d'enregistrement, surveillance de la bande passante sur la voie descendante, du nombre de visualisations d'un film, de l'espace de stockage disponible dans l
H04N 21/235 - Traitement de données additionnelles, p.ex. brouillage de données additionnelles ou traitement de descripteurs de contenu
Embodiments of the systems described herein can implement one or more processes remotely delivering customized code to a host application and/or computing device. The host application may be configured as an Application Programming Interface with a customized code processing library that may configure the host application to receive further instructions remotely. The host application may be further configured to execute host code and/or third-party code. The host application may be configured to receive remote application logic, after the host application has been installed on a computing device, and to execute the received application logic to alter the behavior of the host application, such as selectively tracking end user interactions.
Style instructions, which may be coded in a style language and not include application logic, can be used to both control presentation of content of a web page by a web browser and control monitoring of interactions with the web page. Selectors in the style instructions, for example, can be used to identify elements of the web page and define styles for the elements. As a result of implementing such style instructions, individuals tasked with design of a web page can more easily and quickly configure monitoring of interactions with the web page.
Systems and methods described herein can take advantage of the caching abilities of the browser and the idle time of the user to prefetch tag libraries of one or more tags for execution in a subsequent content page. For example, these systems and methods can provide the ability to prefetch and not execute a tag library on a content page before it is required so the tag library is cached in the browser. When the browser hits the page that uses the tag library, the tag library can be quickly retrieved from memory and executed.
H04L 67/5681 - Pré-extraction ou pré-livraison de données en fonction des caractéristiques du réseau
H04L 41/50 - Gestion des services réseau, p.ex. en assurant une bonne réalisation du service conformément aux accords
H04L 67/02 - Protocoles basés sur la technologie du Web, p.ex. protocole de transfert hypertexte [HTTP]
G06F 16/172 - Mise en cache, pré-extraction ou accumulation de fichiers
G06F 16/957 - Optimisation de la navigation, p.ex. mise en cache ou distillation de contenus
G06F 16/958 - Organisation ou gestion de contenu de sites Web, p.ex. publication, conservation de pages ou liens automatiques
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
G06F 40/143 - Balisage, p.ex. utilisation du langage SGML ou de définitions de type de document
H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
In some embodiments, an electronic device is disclosed for intelligently prefetching data via a computer network. The electronic device can include a device housing, a user interface, a memory device, and a hardware processor. The hardware processor can: communicate via a communication network; determine that the hardware processor is expected to be unable to communicate via the communication network; responsive to determining that the hardware processor is expected to be unable to communicate via the communication network, determine prefetch data to request prior to the hardware processor being unable to communicate via the communication network; request the prefetch data; receive and store the prefetch data prior to the hardware processor being unable to communicate via the communication network; and subsequent to the hardware processor being unable to communicate via the communication network, process the prefetch data with an application responsive to processing a first user input with the application.
A collection configuration management system can be used to manage one or more monitoring objects, such as tags, included in one or more content objects. The collection configuration management system can compartmentalize monitoring object configurations into a monitoring object bundle that may be executed as a result of loading the one or more content objects. The monitoring object bundle can be generated to include one or more monitoring objects, as well as monitoring object management loader functionality.
H04L 67/00 - Dispositions ou protocoles de réseau pour la prise en charge de services ou d'applications réseau
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
A tag management system can include features to assist in developing a cross-vendor profile for individual visitors to content pages of a content site. The visitors to the content site can obtain universal identifiers usable by the content site to identify the visitors. The universal identifiers can be included in the content pages by the visitor end user systems so that browser tags that may not have native access to the universal identifier can access the universal identifiers. The universal identifiers may then be provided to tag vendor systems with associated visitor data, thereby enabling the tag vendor systems to provide processed or raw data that can be compared by individual universal identifiers. Using this processed data, the content site can prepare the cross-vendor profile of individual visitors and realize insights that may be unavailable using conventional systems and methods.
H04L 29/02 - Commande de la communication; Traitement de la communication
G06F 16/957 - Optimisation de la navigation, p.ex. mise en cache ou distillation de contenus
H04L 69/329 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU] dans la couche application [couche OSI 7]
H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
Embodiments of the systems described herein can implement one or more visitor stitching processes. Visitor stitching can include, among other things, one or more processes by which multiple visitors that may appear distinctly independent may be merged into a new single united visitor profile due to the leveraging of one or more unique persistent identifiers.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
G06F 16/335 - Filtrage basé sur des données supplémentaires, p.ex. sur des profils d’utilisateurs ou de groupes
A tag management system can implement a combined synchronous and asynchronous tag-loading scheme. In an embodiment of this scheme, a synchronous tag may be included at the top of or near the top of a content page. This synchronous tag can hide one or more page elements that are to be modified by a subsequent asynchronous personalization tag. Subsequently, the asynchronous personalization tag can update the page element and then cause the page element to be displayed. As a result, flicker between the old and new page elements can be reduced or avoided.
A tag management system in a computer data network can be used to manage one or more tag configurations with templates. A template may enable efficient tag configuration by causing presentation of an improved user interface that facilitates user-specified mappings between a custom content site and predefined tag management attributes. By completing a template, which may depend on other templates or have templates that depend on it, the tag management system can automatically deploy complex tag management configurations to track end user interactions over a data network.
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
31.
Configuration of event data communication in computer networks
In some embodiments, a system is disclosed for processing event data for an application and transmitting the event data via a computer network. The system can include a memory device and a hardware processor. The memory device can store an application. The hardware processor can execute the application, characterize a user engagement with the application as being a first level of engagement or a second level of engagement, generate event data responsive to user interactions with the application, and control the batch collection of the event data depending on whether the user engagement with the application is characterized as the first level of engagement or the second level of engagement.
The systems and methods described herein use a tag for collecting data associated with a content object of a content page. The tag may be a universal tag which can provide a single point of data collection and thereby reduce the number of network requests due to piggyback tags. The data collected from the content page may be communicated to a stream management system which can process the data and split the data into multiple data streams to be fed to a downstream system. The downstream system can further process the data and communicate to another downstream system. In some embodiments, the stream management system can access the repositories of its downstream system and veto the data flows created by the downstream system.
Systems and methods described herein can take advantage of the caching abilities of the browser and the idle time of the user to prefetch tag libraries of one or more tags for execution in a subsequent content page. For example, these systems and methods can provide the ability to prefetch and not execute a tag library on a content page before it is required so the tag library is cached in the browser. When the browser hits the page that uses the tag library, the tag library can be quickly retrieved from memory and executed.
A collection configuration management system can be used to manage one or more monitoring objects, such as tags, included in one or more content objects. The collection configuration management system can compartmentalize monitoring object configurations into a monitoring object bundle that may be executed as a result of loading the one or more content objects. The monitoring object bundle can be generated to include one or more monitoring objects, as well as monitoring object management loader functionality.
Embodiments of the systems described herein can implement one or more processes remotely delivering customized code to a host application and/or computing device. The host application may be configured as an Application Programming Interface with a customized code processing library that may configure the host application to receive further instructions remotely. The host application may be further configured to execute host code and/or third-party code. The host application may be configured to receive remote application logic, after the host application has been installed on a computing device, and to execute the received application logic to alter the behavior of the host application, such as selectively tracking end user interactions.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
An improved approach to tracking media playback includes tracking logic that is based on abandonment indicators. An abandonment indicator is detected during media playback, such as a user interaction with a computing device that is detected prior to ceasing playback of the media content. Tracking messages are reduced, suppressed, or suspended until an abandonment indicator is detected. After an abandonment indicator is detected, the system quickens, releases, or restart sending tracking messages to a collection system.
H04N 21/2387 - Traitement de flux en réponse à une requête de reproduction par un utilisateur final, p.ex. pour la lecture à vitesse variable ("trick play")
H04L 12/26 - Dispositions de surveillance; Dispositions de test
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04N 21/442 - Surveillance de procédés ou de ressources, p.ex. détection de la défaillance d'un dispositif d'enregistrement, surveillance de la bande passante sur la voie descendante, du nombre de visualisations d'un film, de l'espace de stockage disponible dans l
H04N 21/235 - Traitement de données additionnelles, p.ex. brouillage de données additionnelles ou traitement de descripteurs de contenu
37.
System and method for separating content site visitor profiles
Embodiments of the systems described herein can implement one or more visitor tearing processes. Visitor tearing can include, among other things, one or more processes by which multiple visitors that may appear to be the same visitor may be separated into different visitor profiles due to the leveraging of one or more unique persistent identifiers.
Style instructions, which may be coded in a style language and not include application logic, can be used to both control presentation of content of a web page by a web browser and control monitoring of interactions with the web page. Selectors in the style instructions, for example, can be used to identify elements of the web page and define styles for the elements. As a result of implementing such style instructions, individuals tasked with design of a web page can more easily and quickly configure monitoring of interactions with the web page.
G06F 16/957 - Optimisation de la navigation, p.ex. mise en cache ou distillation de contenus
G06F 3/0483 - Interaction avec des environnements structurés en pages, p.ex. métaphore livresque
G06F 8/38 - Création ou génération de code source pour la mise en œuvre d'interfaces utilisateur
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 40/103 - Mise en forme, c. à d. modification de l’apparence des documents
G06F 40/154 - Transformation en arborescence pour documents en configuration arborescente ou balisés, p.ex. langages XSLT, XSL-FO ou feuilles de style
A tag management system can implement a combined synchronous and asynchronous tag-loading scheme. In an embodiment of this scheme, a synchronous tag may be included at the top of or near the top of a content page. This synchronous tag can hide one or more page elements that are to be modified by a subsequent asynchronous personalization tag. Subsequently, the asynchronous personalization tag can update the page element and then cause the page element to be displayed. As a result, flicker between the old and new page elements can be reduced or avoided.
A tag management system can include features to assist in developing a cross-vendor profile for individual visitors to content pages of a content site. The visitors to the content site can obtain universal identifiers usable by the content site to identify the visitors. The universal identifiers can be included in the content pages by the visitor end user systems so that browser tags that may not have native access to the universal identifier can access the universal identifiers. The universal identifiers may then be provided to tag vendor systems with associated visitor data, thereby enabling the tag vendor systems to provide processed or raw data that can be compared by individual universal identifiers. Using this processed data, the content site can prepare the cross-vendor profile of individual visitors and realize insights that may be unavailable using conventional systems and methods.
Embodiments of the systems described herein can implement one or more visitor stitching processes. Visitor stitching can include, among other things, one or more processes by which multiple visitors that may appear distinctly independent may be merged into a new single united visitor profile due to the leveraging of one or more unique persistent identifiers.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 16/335 - Filtrage basé sur des données supplémentaires, p.ex. sur des profils d’utilisateurs ou de groupes
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
42.
Deployable tag management in computer data networks
A tag management system in a computer data network can be used to manage one or more tag configurations with templates. A template may enable efficient tag configuration by causing presentation of an improved user interface that facilitates user-specified mappings between a custom content site and predefined tag management attributes. By completing a template, which may depend on other templates or have templates that depend on it, the tag management system can automatically deploy complex tag management configurations to track end user interactions over a data network.
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
43.
Configuration of content site user interaction monitoring in data networks
A collection configuration management system can be used to manage one or more monitoring objects, such as tags, included in one or more content objects. The collection configuration management system can compartmentalize monitoring object configurations into a monitoring object bundle that may be executed as a result of loading the one or more content objects. The monitoring object bundle can be generated to include one or more monitoring objects, as well as monitoring object management loader functionality.
The systems and methods described herein use a tag for collecting data associated with a content object of a content page. The tag may be a universal tag which can provide a single point of data collection and thereby reduce the number of network requests due to piggyback tags. The data collected from the content page may be communicated to a stream management system which can process the data and split the data into multiple data streams to be fed to a downstream system. The downstream system can further process the data and communicate to another downstream system. In some embodiments, the stream management system can access the repositories of its downstream system and veto the data flows created by the downstream system.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
G06F 16/958 - Organisation ou gestion de contenu de sites Web, p.ex. publication, conservation de pages ou liens automatiques
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 16/957 - Optimisation de la navigation, p.ex. mise en cache ou distillation de contenus
An improved approach to tracking media playback includes tracking logic that is based on abandonment indicators. An abandonment indicator is detected during media playback, such as a user interaction with a computing device that is detected prior to ceasing playback of the media content. Tracking messages are reduced, suppressed, or suspended until an abandonment indicator is detected. After an abandonment indicator is detected, the system quickens, releases, or restart sending tracking messages to a collection system.
H04L 12/26 - Dispositions de surveillance; Dispositions de test
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04N 21/235 - Traitement de données additionnelles, p.ex. brouillage de données additionnelles ou traitement de descripteurs de contenu
H04N 21/2387 - Traitement de flux en réponse à une requête de reproduction par un utilisateur final, p.ex. pour la lecture à vitesse variable ("trick play")
Embodiments of the systems described herein can implement one or more processes remotely delivering customized code to a host application and/or computing device. The host application may be configured as an Application Programming Interface with a customized code processing library that may configure the host application to receive further instructions remotely. The host application may be further configured to execute host code and/or third-party code. The host application may be configured to receive remote application logic, after the host application has been installed on a computing device, and to execute the received application logic to alter the behavior of the host application, such as selectively tracking end user interactions.
Style instructions, which may be coded in a style language and not include application logic, can be used to both control presentation of content of a web page by a web browser and control monitoring of interactions with the web page. Selectors in the style instructions, for example, can be used to identify elements of the web page and define styles for the elements. As a result of implementing such style instructions, individuals tasked with design of a web page can more easily and quickly configure monitoring of interactions with the web page.
G06F 8/38 - Création ou génération de code source pour la mise en œuvre d'interfaces utilisateur
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
Embodiments of the systems described herein can implement one or more visitor stitching processes. Visitor stitching can include, among other things, one or more processes by which multiple visitors that may appear distinctly independent may be merged into a new single united visitor profile due to the leveraging of one or more unique persistent identifiers.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
The systems and methods described herein use a tag for collecting data associated with a content object of a content page. The tag may be a universal tag which can provide a single point of data collection and thereby reduce the number of network requests due to piggyback tags. The data collected from the content page may be communicated to a stream management system which can process the data and split the data into multiple data streams to be fed to a downstream system. The downstream system can further process the data and communicate to another downstream system. In some embodiments, the stream management system can access the repositories of its downstream system and veto the data flows created by the downstream system.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
50.
Deployable tag management in computer data networks
A tag management system in a computer data network can be used to manage one or more tag configurations with templates. A template may enable efficient tag configuration by causing presentation of an improved user interface that facilitates user-specified mappings between a custom content site and predefined tag management attributes. By completing a template, which may depend on other templates or have templates that depend on it, the tag management system can automatically deploy complex tag management configurations to track end user interactions over a data network.
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G06F 17/20 - Manipulation de données en langage naturel
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
51.
Configuration of content site user interaction monitoring in data networks
A collection configuration management system can be used to manage one or more monitoring objects, such as tags, included in one or more content objects. The collection configuration management system can compartmentalize monitoring object configurations into a monitoring object bundle that may be executed as a result of loading the one or more content objects. The monitoring object bundle can be generated to include one or more monitoring objects, as well as monitoring object management loader functionality.
Systems and methods described herein can take advantage of the caching abilities of the browser and the idle time of the user to prefetch tag libraries of one or more tags for execution in a subsequent content page. For example, these systems and methods can provide the ability to prefetch and not execute a tag library on a content page before it is required so the tag library is cached in the browser. When the browser hits the page that uses the tag library, the tag library can be quickly retrieved from memory and executed.
A tag management system can include features to assist in developing a cross-vendor profile for individual visitors to content pages of a content site. The visitors to the content site can obtain universal identifiers usable by the content site to identify the visitors. The universal identifiers can be included in the content pages by the visitor end user systems so that browser tags that may not have native access to the universal identifier can access the universal identifiers. The universal identifiers may then be provided to tag vendor systems with associated visitor data, thereby enabling the tag vendor systems to provide processed or raw data that can be compared by individual universal identifiers. Using this processed data, the content site can prepare the cross-vendor profile of individual visitors and realize insights that may be unavailable using conventional systems and methods.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
G06F 16/957 - Optimisation de la navigation, p.ex. mise en cache ou distillation de contenus
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
Embodiments of the systems described herein can implement one or more processes remotely delivering customized code to a host application and/or computing device. The host application may be configured as an Application Programming Interface with a customized code processing library that may configure the host application to receive further instructions remotely. The host application may be further configured to execute host code and/or third-party code. The host application may be configured to receive remote application logic, after the host application has been installed on a computing device, and to execute the received application logic to alter the behavior of the host application, such as selectively tracking end user interactions.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
A collection configuration management system can be used to manage one or more monitoring objects, such as tags, included in one or more content objects. The collection configuration management system can compartmentalize monitoring object configurations into a monitoring object bundle that may be executed as a result of loading the one or more content objects. The monitoring object bundle can be generated to include one or more monitoring objects, as well as monitoring object management loader functionality.
A tag management system in a computer data network can be used to manage one or more tag configurations with templates. A template may enable efficient tag configuration by causing presentation of an improved user interface that facilitates user-specified mappings between a custom content site and predefined tag management attributes. By completing a template, which may depend on other templates or have templates that depend on it, the tag management system can automatically deploy complex tag management configurations to track end user interactions over a data network.
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
57.
System and method for separating content site visitor profiles
Embodiments of the systems described herein can implement one or more visitor tearing processes. Visitor tearing can include, among other things, one or more processes by which multiple visitors that may appear to be the same visitor may be separated into different visitor profiles due to the leveraging of one or more unique persistent identifiers.
Systems and methods described herein can take advantage of the caching abilities of the browser and the idle time of the user to prefetch tag libraries of one or more tags for execution in a subsequent content page. For example, these systems and methods can provide the ability to prefetch and not execute a tag library on a content page before it is required so the tag library is cached in the browser. When the browser hits the page that uses the tag library, the tag library can be quickly retrieved from memory and executed.
Embodiments of the systems described herein can implement one or more processes remotely delivering customized code to a host application and/or computing device. The host application may be configured as an Application Programming Interface with a customized code processing library that may configure the host application to receive further instructions remotely. The host application may be further configured to execute host code and/or third-party code. The host application may be configured to receive remote application logic, after the host application has been installed on a computing device, and to execute the received application logic to alter the behavior of the host application, such as selectively tracking end user interactions.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
Embodiments of the systems described herein can implement one or more visitor stitching processes. Visitor stitching can include, among other things, one or more processes by which multiple visitors that may appear distinctly independent may be merged into a new single united visitor profile due to the leveraging of one or more unique persistent identifiers.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
61.
System and method for separating content site visitor profiles
Embodiments of the systems described herein can implement one or more visitor tearing processes. Visitor tearing can include, among other things, one or more processes by which multiple visitors that may appear to be the same visitor may be separated into different visitor profiles due to the leveraging of one or more unique persistent identifiers.
Embodiments of the systems described herein can implement one or more processes remotely delivering customized code to a host application and/or computing device. The host application may be configured as an Application Programming Interface with a customized code processing library that may configure the host application to receive further instructions remotely. The host application may be further configured to execute host code and/or third-party code. The host application may be configured to receive remote application logic, after the host application has been installed on a computing device, and to execute the received application logic to alter the behavior of the host application, such as selectively tracking end user interactions.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
Embodiments of the systems described herein can implement one or more visitor stitching processes. Visitor stitching can include, among other things, one or more processes by which multiple visitors that may appear distinctly independent may be merged into a new single united visitor profile due to the leveraging of one or more unique persistent identifiers.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
Systems and methods described herein can take advantage of the caching abilities of the browser and the idle time of the user to prefetch tag libraries of one or more tags for execution in a subsequent content page. For example, these systems and methods can provide the ability to prefetch and not execute a tag library on a content page before it is required so the tag library is cached in the browser. When the browser hits the page that uses the tag library, the tag library can be quickly retrieved from memory and executed.
A tag management system can implement a combined synchronous and asynchronous tag-loading scheme. In an embodiment of this scheme, a synchronous tag may be included at the top of or near the top of a content page. This synchronous tag can hide one or more page elements that are to be modified by a subsequent asynchronous personalization tag. Subsequently, the asynchronous personalization tag can update the page element and then cause the page element to be displayed. As a result, flicker between the old and new page elements can be reduced or avoided.
A tag management system can include features to assist in developing a cross-vendor profile for individual visitors to content pages of a content site. The visitors to the content site can obtain universal identifiers usable by the content site to identify the visitors. The universal identifiers can be included in the content pages by the visitor end user systems so that browser tags that may not have native access to the universal identifier can access the universal identifiers. The universal identifiers may then be provided to tag vendor systems with associated visitor data, thereby enabling the tag vendor systems to provide processed or raw data that can be compared by individual universal identifiers. Using this processed data, the content site can prepare the cross-vendor profile of individual visitors and realize insights that may be unavailable using conventional systems and methods.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
67.
Activation of dormant features in native applications
A native application can be deployed that obtains configuration information for the native application at run-time. Digital marketing users or other marketing users can view or control the behavior of the native application by displaying or setting the configuration information of the native application. The native application can report tracked end user interactions and events with the native application according to the configuration information to tag management systems for data compilation by the tag management systems. In addition, the native application can enable digital marketing users or other marketing users to view or control the behavior of the native application from within the native application using an integrated configuration utility. The configuration utility can be activated using a two-stage activation process or an activation and authorization process to prevent an end user from accidentally encountering the configuration utility during routine use of the native application.
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
H04W 4/20 - Signalisation de services; Signalisation de données auxiliaires, c. à d. transmission de données par un canal non destiné au trafic
H04L 12/24 - Dispositions pour la maintenance ou la gestion
H04W 4/02 - Services utilisant des informations de localisation
68.
System and method for combining content site visitor profiles
Embodiments of the systems described herein can implement one or more visitor stitching processes. Visitor stitching can include, among other things, one or more processes by which multiple visitors that may appear distinctly independent may be merged into a new single united visitor profile due to the leveraging of one or more unique persistent identifiers.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
Systems and methods described herein can take advantage of the caching abilities of the browser and the idle time of the user to prefetch tag libraries of one or more tags for execution in a subsequent content page. For example, these systems and methods can provide the ability to prefetch and not execute a tag library on a content page before it is required so the tag library is cached in the browser. When the browser hits the page that uses the tag library, the tag library can be quickly retrieved from memory and executed.
A tag management system can include features to assist in developing a cross-vendor profile for individual visitors to content pages of a content site. The visitors to the content site can obtain universal identifiers usable by the content site to identify the visitors. The universal identifiers can be included in the content pages by the visitor end user systems so that browser tags that may not have native access to the universal identifier can access the universal identifiers. The universal identifiers may then be provided to tag vendor systems with associated visitor data, thereby enabling the tag vendor systems to provide processed or raw data that can be compared by individual universal identifiers. Using this processed data, the content site can prepare the cross-vendor profile of individual visitors and realize insights that may be unavailable using conventional systems and methods.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
71.
Combined synchronous and asynchronous tag deployment
A tag management system can implement a combined synchronous and asynchronous tag-loading scheme. In an embodiment of this scheme, a synchronous tag may be included at the top of or near the top of a content page. This synchronous tag can hide one or more page elements that are to be modified by a subsequent asynchronous personalization tag. Subsequently, the asynchronous personalization tag can update the page element and then cause the page element to be displayed. As a result, flicker between the old and new page elements can be reduced or avoided.
Embodiments of the systems described herein can implement one or more visitor stitching processes. Visitor stitching can include, among other things, one or more processes by which multiple visitors that may appear distinctly independent may be merged into a new single united visitor profile due to the leveraging of one or more unique persistent identifiers.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p.ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
73.
Activation of dormant features in native applications
A native application can be deployed that obtains configuration information for the native application at run-time. Digital marketing users or other marketing users can view or control the behavior of the native application by displaying or setting the configuration information of the native application. The native application can report tracked end user interactions and events with the native application according to the configuration information to tag management systems for data compilation by the tag management systems. In addition, the native application can enable digital marketing users or other marketing users to view or control the behavior of the native application from within the native application using an integrated configuration utility. The configuration utility can be activated using a two-stage activation process or an activation and authorization process to prevent an end user from accidentally encountering the configuration utility during routine use of the native application.
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
H04W 4/20 - Signalisation de services; Signalisation de données auxiliaires, c. à d. transmission de données par un canal non destiné au trafic
H04W 4/02 - Services utilisant des informations de localisation