Using Vacation Automatic Replies to Enhance Bulk Marketing Campaigns
Methods and systems may provide for identifying a first set of recipients associated with an away status. Additionally, the first set of recipients may be removed from a second set of recipients associated with a bulk communications campaign to obtain a third set of recipients, wherein a first message may be sent to the third set of recipients. In one example, it may be determined that the away status has ceased for one or more of the first set of recipients, wherein a second message may be sent to the one or more of the first set of recipients for which the away status has ceased. The second message may reference the away status. Methods and systems may also provide for a brokering system to enable the transfer of away status information between different collectors of away status information and senders of messages.
Latest IBM Patents:
- INTERACTIVE DATASET EXPLORATION AND PREPROCESSING
- NETWORK SECURITY ASSESSMENT BASED UPON IDENTIFICATION OF AN ADVERSARY
- NON-LINEAR APPROXIMATION ROBUST TO INPUT RANGE OF HOMOMORPHIC ENCRYPTION ANALYTICS
- Back-side memory element with local memory select transistor
- Injection molded solder head with improved sealing performance
The present application is a continuation of U.S. patent application Ser. No. 13/769,521 filed on Feb. 18, 2013.
BACKGROUNDEmbodiments of the present invention generally relate to bulk communications campaigns. More particularly, embodiments relate to the use of out-of-office and on-vacation information to enhance the effectiveness of bulk communications campaigns.
Bulk communications campaigns may involve accumulating large lists of target recipients and sending messages to the target recipients in an effort to spur economic activity with regard to a particular product or service. It is not uncommon, however, for many targeted recipients to be out of the office or on-vacation when delivery of the emails is attempted. For example, existing email marketing solutions may simply ignore out-of-office automatic replies and continue to send emails to recipients who are away. As a result, a significant number of marketing campaign emails may go unread until the targeted recipients return, wherein consumers who encounter many superfluous marketing emails upon returning from vacation may become annoyed and might even be motivated to opt out of future marketing campaigns. Moreover, the transmission of those unread emails may have a negative impact on the amount of time taken to fulfill/complete the campaign, resource utilization and network bandwidth (e.g., unnecessarily contributing to network congestion).
BRIEF SUMMARYEmbodiments may include a method involving the identification of a first set of recipients associated with an away status. The method may also provide for removing the first set of recipients from a second set of recipients associated with a bulk communications campaign to obtain a third set of recipients. A first message may be sent to the third set of recipients.
Embodiments may include a computer program product having a computer readable storage medium and computer usable code stored on the computer readable storage medium. If executed by a processor, the computer usable code may cause a computer to identify a first set of recipients associated with an away status and remove the first set of recipients from a second set of recipients associated with a bulk communications campaign to obtain a third set of recipients. The computer usable code, if executed, may also cause a computer to send a first message to the third set of recipients.
Embodiments may include a computer program product having a computer readable storage medium and computer usable code stored on the computer readable storage medium. If executed by a processor, the computer usable code may cause a computer to receive a first communication from a first collector of away status information, wherein the first communication is to include first cryptographic information and first away status information. The computer usable code may also cause a computer to populate a database with the first cryptographic information and the first away status information, and receive a second communication from a sender of messages, wherein the second communication is to include a request for away status information and second cryptographic information. In addition, the computer usable code may cause a computer to conduct a search of the database in response to the request, and transmit a response to the sender of messages based on the search.
The various advantages of the embodiments of the present invention will become apparent to one skilled in the art by reading the following specification and appended claims, and by referencing the following drawings, in which:
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
Referring now to
The original communications campaign 12 may involve advertising and/or offering a product/service via targeted messages such as, for example, emails, text messages, instant messages, social media posts, web ads, mobile ads, postal mailings, faxes, voice messages (e.g., “robo calls”), and so forth, wherein the welcome back communications campaign 14 might advertise/offer those same products/services along with a personalized acknowledgement of each recipient's away status. For example, a targeted message to a particular recipient in the welcome back campaign 14 may be delayed until a configurable time period after the return of the recipient and modified to include an acknowledgement of the recipient's former unavailability and/or recent return (e.g., a reference to the recipient's away status). Delaying the communications messages until the away recipients 10a return may increase the likelihood of the messages being read by the away recipients 10a, reduce the likelihood of the away recipients 10a becoming annoyed by excessive and/or superfluous messages, reduce campaign fulfillment time, optimize resource utilization and reduce unnecessary network congestion.
The type of communication used to determine the away status may be different from the type of communication used to conduct the campaign. Thus, the away status might be determined from one type of communication (e.g., email auto reply), whereas the recipients may be targeted via another type of communication (e.g., text message). The targeting may be implemented by excluding recipients from the original communications campaign 12 and/or including recipients in the welcome back campaign 14.
A bounce handler 24 may receive various inbound email messages including away automatic replies, wherein the bounce handler 24 may pass the email headers and the message body through format decoders (e.g., multipurpose Internet mail extension/MIME decoders) so that the headers and body can be passed through a classifier to determine how to handle the inbound message. A sub-component of the classifier may be an away detector 26 that applies various heuristic rules to determine if the message is an away message. In some cases, one or more of the mail servers 22 can embed specific headers that explicitly or implicitly designate a message as an away reply. If such a rule is matched, then the message may be marked as an away message and passed to a date extractor 28.
If the header checks do not trigger an away message detection, then the text of the body may also be examined. There are multiple approaches to determining whether a message is an away message based on the body of the message. These approaches include applying a set of regular expressions, using a Bayesian classifier, using a neural network classifier, and or other document classification techniques. Typically, these techniques may be supervised and trained on a corpus of emails that are known to be away messages along with a corpus of sample emails that are known to be bounce backs that are not away messages. The supervised classifiers may be effective when operating in multiple languages. Regular expressions may also be effective for multiple languages, but they may be more difficult to develop and maintain for broad language support. In one example, only the first N words are examined since the keywords that indicate an away reply may tend to appear at the beginning of a message.
For the regular expression approach, the regular expressions may be tuned to search for words that are typically used in away responses. This approach may include taking into consideration phrases in multiple languages, matching against the original language and foregoing translation since phrasing may tend to be highly idiomatic. The presence of month names, day names, and numeric date formats may also be included in the regular expressions to help determine if a message is an away message. Any message that is classified as an away message can be passed to the date extractor 28 for further processing. Some implementations may combine the away detector 26 and the date extractor 28.
The illustrated date extractor 28 finds and extracts dates that appear within the first N words of the message, wherein dates that are found may be converted into a normalized representation. If there are multiple dates, then the highest value may be chosen as the end date. Moreover, dates may be compared to the current date and ignored if not within a configurable time in the future. Dates can also be extracted using regular expressions for various date formats in various languages. Additionally, consideration may be applied to surrounding words that provide hints for which date is the return date. For example, applied rules may process the phrase “leaving on 12/20 and returning on January 4” and recognize that “ 12/20” is a start date to be ignored and “January 4” is an end date to be extracted as the relevant date. In this regard, confidence may be determined by the fact that January 4 is greater than 12/20, January 4 appears after 12/12, and January 4 is preceded by the word “returning”. Indeed, more sophisticated natural language processing (NLP) can also be applied.
For each message that is determined to be an away message, a record may be added to a database 30, indicating that the corresponding recipient is away. If an end date was extracted with sufficient confidence, then an end date can be added to the record. If no end date is determined, then that fact might be indicated in the record and an assumed return date may be constructed based on a configurable value (e.g., two weeks from the current date).
The recipient may be determined by multiple possible approaches. For example, the “From” address is one option. Additionally, some campaign management systems can embed recipient identification information in several places in the message header and body to help correlate the message with a particular recipient in the campaign management system's database 30. When the campaign management system 18 executes a subsequent communications campaign, it may invoke exclusion logic 32 to remove any recipients that are determined to be away (e.g., remove the set of away recipients from the total set of target recipients). The exclusion logic 32 may compare the specified launch date for the campaign against the end date in any matching records for each matching recipient. If a recipient match is found and the end date is greater than the launch date (with a configurable +/− margin), then the recipient can be excluded from the campaign.
To execute “welcome back” campaigns that are designed to arrive in the recipients' inboxes shortly after their return, the campaign management system 18 may run the same campaign logic periodically (e.g., daily) and construct a new list of applicable recipients each period. In this case, the campaign management system 18 may query the database 30 using selection logic 34 to find all recipients whose end date is within the configurable period of time from the planned launch date. The selection logic 34 can ensure that the end date is within the specified period of the launch date and not merely that the launch date is greater than the end date. Such an approach ensures that a new batch will be selected in each period and no recipients are selected twice (even if there is other logic to prevent selection in multiple waves). The selected list of recipients may be applied to further selection and segmentation logic (not shown) that is defined by the campaign itself. The final list may then be used for the welcome back campaign.
Turning now to
A collector 38 may be any organization or entity that in some fashion is able to determine the future “away” plans for a corresponding email address or other form of contact. The collector 38 may use the collected information locally (as already discussed), or it may transfer that information to a centralized broker 40 that can allow multiple senders 42 (42a-42c) to benefit from the information and respect the recipients' implied or explicit wishes. Such an approach may also benefit the recipients/users, since they can supply their information once, but all senders 42 that have subscribed to the broker service will respect their wishes. Accordingly, recipients may achieve less email clutter from all senders 42 to whom they subscribe and who also participate in the brokering service.
In order to protect the privacy of the recipients' contact information/identifiers (e.g., email addresses, phone numbers, fax numbers, social media names and login names), when it is sent to the broker, a cryptographic hash function may be applied to each contact identifier before being sent to the broker 40. A property of the cryptographic hash function may be that it is not feasible to recover the contact identifier from the encrypted string. A further property might be that for a given hash function and contact identifier, the resulting encrypted string will always be the same. The broker 40 may maintain a database of encrypted contact identifiers and metadata for each such as away status, return date, date recorded, and corresponding collector 38 (e.g., source). A sender 42 may function similar to the standalone sender 20 (
In order to determine whether a given contact identifier should be suppressed, the sender 42 may apply the cryptographic hash function to the contact identifier to obtain cryptographic information and provide that cryptographic information to the broker 40. The broker 40 may then look up the address in the broker's database using the hashed address as a key. Since the hash is consistent, the broker 40 is able to conduct the lookup without needing to know the actual contact identifier. If the broker 40 finds a match, it may return the matching cryptographic information and corresponding metadata for the supplied hashed address.
There are a number of variations for how a sender 42 can use the broker 40 to determine how to treat a contact identifier. For example, hashed addresses may be supplied singly or in batches to the broker 40, which may in turn look up the information and return the metadata for each supplied address. The return of the metadata could be done via a web services call, file transfer, HTTP POST operation, HTTP GET operation or various other means. It may also be possible for the broker 40 to make available the entire database so that the sender 42 could download the database locally and then perform its own lookups. Another variation may be for the sender 42 to provide an upload of all addresses in which it is interested in (e.g., with periodic incremental updates), then whenever the broker 40 receives an update from a collector 38 that matches a sender's subscriber list, the broker 40 can send a message to the sender 42 so that the sender 42 may update its local database. Alternatively, the broker 40 could simply maintain a list of updates and provide that list when a sender 42 makes a request for updates. The sender 42 in this case may again receive the updates and apply them to its local database.
The method 44 may also provide for determining that the away status has ceased for one or more of the recipients previously associated with an away status, and sending a second message to the recipients for which the away status has ceased. The second message may reference the away status or be otherwise tailored to inform the recipient that the sender is respecting the implied or express wishes of the recipient not to be contacted while out of the office or on-vacation.
A database may be populated with away status information at block 58 based on the communications from the collectors. In one example, the database is populated with the cryptographic information as well as any metadata describing the details of the away statuses (e.g., departure date information, return date information). An away status request may be received at block 60 from a sender of messages, wherein illustrated block 62 conducts a search of a database in response to the request. A response may be transmitted to the requesting sender based on the search at block 64.
Techniques described herein may therefore provide for detecting and then respecting a recipient's implied wishes by examining the content of their automatic email replies. When the sending mailing system receives an automatic reply, it may first examine the content of the reply to determine if the reply is an away reply. If so, the message may be further parsed to attempt to extract a return date for the recipient. This date may then be persisted in a database. When a subsequent campaign is created, the list of candidate recipients may be compared to the “away” database in conjunction with the planned launch date for the campaign. If the launch date is before the recipient's return date (with a configurable margin), then the recipient may be suppressed for the current campaign.
In another mode, a specific campaign can be constructed to target recipients within a configurable amount of time from their recorded return date. Such a campaign may typically be run daily, selecting the recipients who returned the previous day (with a configurable offset). The content of the message of such a campaign could reference the fact that the system acknowledged the recipient's implied desire not to receive email during their time away.
A variation on this approach may be to allow each recipient to explicitly control their preference to not be contacted during a period of time. Therefore, instead of solely relying on reacting to automatic email replies, the system could use a web form to allow a recipient to indicate a mail hold period. This form could be part of a “preference center” or a part of an unsubscribe form. As part of the later, the existence of this option may be enough for some recipients to simply stop being contacted for a period of time instead of unsubscribing altogether.
Another variation may involve using one or more organizations to collect away information and then with the recipients' permission, to syndicate this information to bulk mailers who subscribe to the syndication feed. Example collector organizations might be the United States Postal Service (USPS), corporate mail systems, third-party mail systems, airlines, hotels, and online travel agencies. A syndication service may be the intermediary to securely collect the preferences (via a cryptographic hash function) and to then provide the service to mailers to indicate if an address (again provided by a cryptographic hash function) should be suppressed. The collectors may provide such a service as an added value feature.
Accordingly, fewer recipients may unsubscribe as a result of receiving messages after indicating that they are away. Further, the risk of brand and relationship impairment may be reduced. Implementing such an approach can also reduce the extra resource costs for sending messages that will be ignored and may reduce the data skew that results from contacting recipients that are not making an active decision to open a message. For example, email open rates may be calculated based only on messages that have been exposed to a person, under the techniques described herein. The ability to back off, create email silence (during the away period) and then contact a recipient with a personalized message may demonstrate a respect for the recipient's implied wishes and can help to build brand reputation, strengthen the dialog, and gain a greater impact from the “welcome back” message compared to the standard steady-state stream of contacts.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. In addition, the terms “first”, “second”, etc. may be used herein only to facilitate discussion, and carry no particular temporal or chronological significance unless otherwise indicated.
Those skilled in the art will appreciate from the foregoing description that the broad techniques of the embodiments of the present invention can be implemented in a variety of forms. Therefore, while the embodiments of this invention have been described in connection with particular examples thereof, the true scope of the embodiments of the invention should not be so limited since other modifications will become apparent to the skilled practitioner upon a study of the drawings, specification, and following claims.
Claims
1-5. (canceled)
6. A method comprising:
- identifying a first set of recipients associated with an away status;
- removing the first set of recipients from a second set of recipients associated with a bulk communications campaign to obtain a third set of recipients; and
- sending a first message to the third set of recipients.
7. The method of claim 6, further including:
- determining that the away status has ceased for one or more of the first set of recipients; and
- sending a second message to the one or more of the first set of recipients for which the away status has ceased.
8. The method of claim 7, wherein the second message references the away status.
9. The method of claim 6, further including accessing a brokering system to identify the first set of recipients.
10. The method of claim 9, further including:
- applying a cryptographic hash function to contact information corresponding to the second set of recipients to obtain first cryptographic information;
- submitting the first cryptographic information to the brokering system; and
- receiving a response from the brokering system, wherein the response includes away status information, and wherein the first set of recipients are identified based on the away status information.
11. The method of claim 10, wherein the contact information includes one or more of email addresses, phone numbers, fax numbers, social media names and login names.
12. The method of claim 9, further including:
- receiving a database from the brokering system; and
- obtaining the first set of recipients from the database.
13. The method of claim 6, further including processing one or more user communications to identify the first set of recipients.
14. The method of claim 13, further including:
- applying a cryptographic hash function to contact information corresponding to the first set of recipients to obtain third cryptographic information; and
- sending the third cryptographic information and corresponding away status information to a brokering system.
15. The method of claim 6, wherein the away status is one or more of an out-of-office status and an on-vacation status.
16-23. (canceled)
Type: Application
Filed: Nov 15, 2013
Publication Date: Aug 21, 2014
Applicant: International Business Machines Corporation (Armonk, NY)
Inventor: Kenneth L. Robbins (Sudbury, MA)
Application Number: 14/081,898
International Classification: G06F 17/30 (20060101);