System and method for candidate domain name generation

ABSTRACT

A system and method for the generation of candidate domain names are presented. The method includes receiving, by at least one server communicatively coupled to a network, a request to access or purchase access to a software application, the request being received from a user. Keywords associated with at least one of the user, a website of the user, and a business of the user are generated and a candidate domain name relevant to the keywords is generated. A user interface is displayed including the candidate domain name. The user interface enables the user to register the candidate domain name.

FIELD OF THE INVENTION

The present invention relates generally to the generation of candidate domain names and, more particularly, to systems and methods for providing users one or more candidate domain names based on information accumulated while a user processes a transaction.

BACKGROUND OF THE INVENTION

A network is a collection of links and nodes (e.g., multiple computers and/or other devices connected together) arranged so that information may be passed from one part of the network to another over multiple links and through various nodes. Examples of networks include the Internet, the public switched telephone network, the global Telex network, computer networks (e.g., an intranet, an extranet, a local-area network, or a wide-area network), wired networks, and wireless networks.

The Internet is a worldwide network of computers and computer networks arranged to allow the easy and robust exchange of information between computer users. Hundreds of millions of people around the world have access to computers connected to the Internet via Internet Service Providers (ISPs). Content providers place multimedia information (e.g., text, graphics, audio, video, animation, and other forms of data) at specific locations on the Internet referred to as web pages. Websites comprise a collection of connected, or otherwise related, web pages. The combination of all the websites and their corresponding web pages on the Internet is generally known as the World Wide Web (WWW) or simply the Web.

For Internet users and businesses alike, the Internet continues to be increasingly valuable. More people use the Web for everyday tasks, from social networking, shopping, banking, and paying bills to consuming media and entertainment. E-commerce is growing, with businesses delivering more services and content across the Internet, communicating and collaborating online, and inventing new ways to connect with each other.

Prevalent on the Web are multimedia websites, some of which may offer and sell goods and services to individuals and organizations. Websites may consist of a single webpage, but typically consist of multiple interconnected and related web pages. Websites, unless extremely large and complex or exposed to unusual traffic demands, typically reside on a single server and are prepared and maintained by a single individual or entity. Menus and links may be used to move between different web pages within the website or to move to a different website as is known in the art. The interconnectivity of web pages enabled by the Internet can make it difficult for Internet users to tell where one website ends and another begins.

Websites may be created using HyperText Markup Language (HTML) to generate a standard set of tags that define how the web pages for the website are to be displayed. Users of the Internet may access content providers' websites using software known as an Internet browser, such as MICROSOFT INTERNET EXPLORER or MOZILLA FIREFOX. After the browser has located the desired webpage, the browser requests and receives information from the webpage, typically in the form of an HTML document, and then displays the webpage content for the user. The user then may view other web pages at the same website or move to an entirely different website using the browser.

Some Internet users, typically those that are larger and more sophisticated, may provide their own hardware, software, and connections to the Internet. But many Internet users either do not have the resources available or do not want to create and maintain the infrastructure necessary to host their own websites. To assist such individuals (or entities), hosting companies exist that offer website hosting services. These hosting service providers typically provide the hardware, software, and electronic communication means necessary to connect multiple websites to the Internet. A single hosting service provider may literally host thousands of websites on one or more hosting servers.

Browsers are able to locate specific websites because each website, resource, and computer on the Internet has a unique Internet Protocol (IP) address. Presently, there are two standards for IP addresses. The older IP address standard, often called IP Version 4 (IPv4), is a 32-bit binary number, which is typically shown in dotted decimal notation, where four 8-bit bytes are separated by a dot from each other (e.g., 64.202.167.32). The notation is used to improve human readability. The newer IP address standard, often called IP Version 6 (IPv6) or Next Generation Internet Protocol (IPng), is a 128-bit binary number. The standard human readable notation for IPv6 addresses presents the address as eight 16-bit hexadecimal words, each separated by a colon (e.g., 2EDC:BA98:0332:0000:CF8A:000C:2154:7313).

IP addresses, however, even in human readable notation, are difficult for people to remember and use. A Uniform Resource Locator (URL) is much easier to remember and may be used to point to any computer, directory, or file on the Internet. A browser is able to access a website on the Internet through the use of a URL. The URL may include a Hypertext Transfer Protocol (HTTP) request combined with the website's Internet address, also known as the website's domain name. An example of a URL with a HTTP request and domain name is: http://www.companyname.com. In this example, the “http” identifies the URL as a HTTP request and the “companyname.com” is the domain name.

Domain names are easier to remember and use than their corresponding IP addresses. The Internet Corporation for Assigned Names and Numbers (ICANN) approves some Generic Top-Level Domains (gTLD) and delegates the responsibility to a particular organization (a “registry”) for maintaining an authoritative source for the registered domain names within a TLD and their corresponding IP addresses. For certain TLDs (e.g., .biz, info, .name, and .org) the registry is also the authoritative source for contact information related to the domain name and is referred to as a “thick” registry. For other TLDs (e.g., .com and .net) only the domain name, registrar identification, and name server information is stored within the registry, and a registrar is the authoritative source for the contact information related to the domain name. Such registries are referred to as “thin” registries. Most gTLDs are organized through a central domain name Shared Registration System (SRS) based on their TLD.

The process for registering a domain name with .com, .net, .org, and some other TLDs allows an Internet user to use an ICANN-accredited registrar to register their domain name. For example, if an Internet user, John Doe, wishes to register the domain name “mycompany.com,” John Doe may initially determine whether the desired domain name is available by contacting a domain name registrar. The Internet user may make this contact using the registrar's webpage and typing the desired domain name into a field on the registrar's webpage created for this purpose. Upon receiving the request from the Internet user, the registrar may ascertain whether “mycompany.com” has already been registered by checking the SRS database associated with the TLD of the domain name. The results of the search then may be displayed on the webpage to thereby notify the Internet user of the availability of the domain name. If the domain name is available, the Internet user may proceed with the registration process. If the domain name is not available for registration, the Internet user may keep selecting alternative domain names until an available domain name is found.

For many users that wish to have an Internet presence, the selection of a particular domain name may be secondary consideration. Some users, for example, may desire to construct a website and may even have a vague understanding of the concept of a domain name, but may not understand that a domain name must be registered before the website can be hosted there. Other users may have already registered a domain name, but may not understand that a domain name must, in many cases, be selected in order optimize the search engine performance of the domain name and associated website. For example, a customer may wish to purchase advertising services for a website at a particular domain name, but may not understand that the domain name is a poor match for the desired advertising. In such a case, the user may observe better performance for the advertising if the user were to register a new, better suited, domain name and host the website on that domain name.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a possible embodiment of a system for generating a candidate domain name.

FIG. 2 is a flowchart illustrating a method for generating candidate domain names based on data received during purchase or use of a software application or service.

FIG. 3 is a flowchart illustrating a method for generating candidate domain names based on data related to a website builder application.

FIG. 4 is a flowchart illustrating a method for generating candidate domain names based on data received from a user and a third party data source.

FIG. 5 is a flowchart illustrating a method for generating candidate domain names based on data relating to advertising services.

FIG. 6 illustrates a possible embodiment of a system for generating the candidate domain name.

FIG. 7 illustrates a possible embodiment of a server included in the system of FIG. 6.

FIG. 8A is a screenshot showing an example user interface by which the requester can build a website using a website builder application.

FIG. 8B is a screenshot showing an example form the requester can complete to provide input data while using a website builder application.

FIG. 8C is a screenshot showing an example checkout page user interface including a candidate domain name.

FIG. 8D is a screenshot showing a website builder user interface including a candidate domain name.

FIG. 9A is a screenshot showing an example user interface by which the requester can link a user account to a third party data source.

FIG. 9B is a screenshot showing an example confirmation page by which the requester can confirm linkage of their user account to the third party data source.

FIG. 10 is a screenshot showing an example website information page by which the requester can complete a website information form to provide input data while using an advertising software application provided by the registrar.

FIG. 11 is a screenshot showing an example user interface providing a dashboard of an advertising campaign and including a candidate domain name.

DETAILED DESCRIPTION

The present invention relates generally to the generation of candidate domain names and, more particularly, to systems and methods for providing users one or more candidate domain names based on information accumulated while a user processes a transaction.

In one implementation, the present disclosure provides a method including receiving, by at least one server communicatively coupled to a network, a request to access or purchase access to a software application. The request is received from a user. The method includes identifying, by the at least one server, keywords associated with at least one of the user, a website of the user, and a business of the user and generating, by the at least one server, a candidate domain name relevant to the keywords. The method includes displaying, by the at least one server, a user interface including the candidate domain name, the user interface enabling the user to register the candidate domain name.

In another implementation the present disclosure provides a method including receiving, by at least one server communicatively coupled to a network, data relating to interactions of a user with a website, and generating keywords associated with at least one of the user, a website of the user, and a business of the user based on the interactions of the user. The method includes generating, by the at least one server, a candidate domain name relevant to the keywords, and returning, by the at least one server, the candidate domain name.

In another implementation, the present disclosure provides a system including at least one server computer in communication with a network. The at least one server computer includes a processor configured to receive a request to access or purchase access to a software application. The request is received from a user. The processor is configured to generate keywords associated with at least one of the user, a website of the user, and a business of the user, generate a candidate domain name relevant to the keywords, and display a user interface including the candidate domain name, the user interface enabling the user to register the candidate domain name.

A user operating hosted software applications (e.g., website builders, email, website hosting, storage, auctions, advertising, etc.) or browsing for and purchasing the same often provides a large amount of information, either personal or business related, to the host of those applications, such as a registrar. Many users, however, may not understand or want to take the steps necessary to search for and register a domain name while utilizing the client software applications or browsing for and purchasing the same. Therefore, the present system can monitor the user's activities and provide the user with a listing of relevant candidate domain names, as an automated process, based on the information provided by the user during interaction with the client software applications. If the user, upon reviewing one or more of the provided candidate domain names, wishes to register one of the candidate domain names, the user can select the desired domain name and undertake a registration procedure.

FIG. 1 is a system 100 for generating one or more candidate domain names for a user 102 accessing a website 106. The website 106 may, for example, include a website or web service hosted by a registrar or other entity. The website 106 may provide one or more software applications 108 (e.g., website builders, email, website hosting, storage, auctions, advertising, etc.) for purchase or with which the user 102 can interact. As the user 102 interacts with the plurality of client software applications 108, the user 102 provides input data (e.g., personal information or business information) that can be stored in a customer database 130 hosted on a server 110 hosting website 106. The server 110 hosting the website 106 can process the input data provided by the user 102 and analyze that input data to generate candidate domain names for purchase using a checkout feature 112. The website 106 can then provide those relevant candidate domain names to the user 102, for example, while the user 102 is purchasing or otherwise operating one of the plurality of client software applications 108 or is otherwise interacting with one or more software applications 108 hosted by server 110. Optionally, the server 110 may gather and process additional data and information about the user 102 from third party data sources 104 (e.g., FACEBOOK, LINKEDIN, YELP, TWITTER, State Bar, etc.) based on the input data provided by the user 102 in order to provide a more relevant candidate domain name to the user or the user's business.

In general, the present system allows for the monitoring of the actions of a user while that user interacts with a website. The interactions may involve the user shopping for (e.g., searching for information describing) and purchasing goods or services or utilizing one or more hosted software application provided by the website. As the user interacts with the website, the user is providing information to the website, either explicitly or implicitly. For example, the user may explicitly provide information during a user account creation process or product research and product purchase and checkout process. Similarly, the user may input information into one or more software application, such as a website builder or advertising service. Alternatively, the user may implicitly provide information, such as the user's location, products that were searched for and reviewed by the user, but not purchased, and the like. As described below, this information can be collected and analyzed to generate a set of candidate domain names that may be displayed to the user for purchase, where the candidate domain names are relevant to the user, or, for example, the user's business.

FIG. 2 is a flowchart illustrating a method by which candidate domain names can be generated for the user 102 based on data received from the user 102 during an acquisition of a software application or service. The method may be useful, for example, to assist users that are shopping for and purchasing Internet services that typically require the user to also have a domain name to select and register an appropriate domain name. A user, for example, may be shopping for hosting services, but not realize that the hosted content would typically be accessed through a domain name. In that case, the method illustrated in FIG. 2 may be utilized to provide the user with a listing of candidate domain names of which they may wish to purchase one in combination with their hosting services. In other cases, users may be browsing available services and not even realize that they would like to register a domain name. In that case, while the user browses the available services, they can also be provided with a listing of domain names that are relevant to them for selection and registration.

The user 102 begins by accessing the website 106. The user 102 may be any Internet user, for example, who may wish to establish an online presence and may subsequently access the website 106, such as GODADDY.COM's website, to purchase one or more online services. In step 200, the user 102 is authenticated as either an existing user or a new user. If the user 102 is an existing user, the website 106 provides the user 102 with product and service options for purchase at step 206 once the user 102 has logged in with their credentials (i.e., username and password). If the user 102 is a new user, a new user account may be generated at step 202. Once the user account is generated, the website 106 provides the user 102 with a listing of the plurality of client software applications or services 208 for purchase at step 206. In other implementations, the process may be reversed with the user first browsing available product and service options and, after selecting one or more for purchase, authenticating to the website 106 or creating a new user account. The plurality of client software applications and services 208, as a non-limiting example, may include a website builder, website hosting services, search engine visibility (i.e., advertising) services, online storage and/or email applications.

At step 210, once the user has selected one of the software applications or services 208 for purchase, one or more order forms, as will be discussed in further detail below, is displayed to the user 102 on a user interface. The form may vary depending on which of the plurality of client software applications 208 the user 102 has requested. Generally, the form prompts the user 102 to provide any additional information, if necessary, for the requested services to be provided to the user 102. For example, the form may be a user information form, a business information form, a user contact information form, a website information form or order form requesting specific user 102 information and providing blanks for the user 102 to enter personal and/or business related data through the user interface. As the user 102 completes the form, the information provided by the user 102 is captured. For example, the form may request that the user 102 provide input data 214 that includes, but is not limited to, a title (e.g., a business name), a location (e.g., home and/or business address, city, state, zip code, etc.), a phone number, features relevant to the user's 102 products and services that may be offered by the user's business, email address, text, and metadata such as images provided by the user 102 to the website 106 at step 212. In some implementations, some or all of the data requested by the order form may be populated with information retrieved from the user's account information. In that case, a fellable order form may not be displayed for the user. Instead, the form may be automatically created and the user may simply be provided with a user interface allowing the user to confirm that they wish to purchase the selected software application.

As the user 102 is providing the input data 214, the system 100 may be configured to acquire additional data about the user 102 from third party data sources 204 at step 216. For example, if the user 102 provides their first and last name on the form (or that information can be retrieved from the user's account), the system 100 may run a search on the third party data sources 204 using the user's 102 first and last name to gather additional information about the user 102. The third party data sources 204 may include, but are not limited to, LINKEDIN, FACEBOOK, YELP, TWITTER, and a State Bar directory.

As a non-limiting example, the system 100 may run a search on Facebook.com using the first and last name provided by the user 102. The system 100 may gather information from Facebook.com, such as where the user 102 is from (i.e., city and state), where they are employed, what college they attended, etc.

In step 218, the system 100 combines the data collected about the user in steps 212 and 216 into a collection of keywords, referred to herein as a keyword collection. These keywords (in combination with any other data collected about the user 102) will be used to generate one or more candidate domain names for the user 102, as will be discussed in further detail below. In some implementations, additional sources of information may be used to collect information about the user 102 that may be utilized to make candidate domain name recommendations. Example additional sources include those that include the product search history of the user, the user's purchase history, a listing of other products or services that have already been purchased by the user, the user's customer information, and the like.

After the collection of keywords has been generated, the system 100 can use that collection of keywords to generate one or more candidate domain names for the user 102 that the user 102 may wish to purchase. In some cases, this will involve analyzing, in addition to the collection of keywords, websites of third parties that are relevant to the user or the user's business. In that case, the content of those third party websites can be analyzed to potentially generate additional keywords from which the candidate domain names can be generated or to determine the quality of one or more of the candidate domain names. In some implementations, the system 100 will also determine whether the generated candidate domain names are actually available to be registered. If, for example, a particular candidate domain name has already been registered, that candidate domain name will not be displayed to the user for purchase.

For example, if the user 102 provided input data 214 at step 212 that included words such as “menu” or “food”, the system 100 may include these words in the keyword collection at step 218. The words “menu” and “food” from the keyword collection can then be compared to other related websites, such as other restaurant websites, in order to generate one or more candidate domain names relevant to the user's 102 input data 214 at step 222. The candidate domain names provided at step 222 are, therefore, domain names that are relevant to the user 102 and are provided to the user 102 who may not have otherwise been searching for a domain name. Alternatively, if the user 102 was searching for a domain name on the domain name registration website 106, the system 100 may provide the user 102 a link (not shown) to buy more or similar domain names based on the input data 214 and additional data acquired from the third party data sources 204.

In some implementations, the system 100 checks to see if the user already has a registered domain name. If so, the identification of such other domain names can be used to prevent the system 100 from suggesting candidate domain names that are too similar to domain names already registered by the user 102.

In one embodiment of the present invention, the system 100 may be configured to only provide the candidate domain name or alternative domain name at step 222 if a minimum data requirement is met. For example, a new user may utilize one of the client software applications 208 provided by the website 106 and only provide input data 214 that includes their name and email address, for example, at step 212. The minimum data requirement provided by the system 100 may require a minimum of three pieces of information relevant to the user 102. As a non-limiting example, the minimum data requirements may be a name, email address and a location provided by the user 102, either implicitly or explicitly, in order for the system 100 to suggest the candidate or alternate domain name at step 222. Therefore, if the user 102 only provides two pieces of information at step 212, the system may not generate a candidate or alternate domain name at step 222. This minimum data requirement provided by the system 100 may ensure that the candidate and alternate domain names generated at step 222 are in fact relevant to the user 102 based on the keyword collection generated at step 218. Alternatively, a relevance score may be internally generated by the system 100 for the candidate or alternate domain name at step 222 based on the keyword collection currently available. If the relevance score is greater than a predefined threshold, for example, the candidate or alternate domain name would be displayed to the user 102.

Once a candidate domain name or an alternate domain name is generated based on the keyword collection at step 222, the system 100 may provide the user 102 an option to add the domain name to their shopping cart at step 224 for purchase. Step 224 may occur, for example, as the user is going through a checkout process 112 for purchase of the client software application 208. At step 226, the user 102 may checkout and purchase the client software application 208 and, optionally, the domain name generated at step 222.

To illustrate, FIG. 8C is a screenshot showing an example checkout page user interface including a candidate domain name. As shown in FIG. 8C, candidate domain name 834 may be displayed to the user 102 on the website 106. For example, the candidate domain name 834 may be ‘mikesrestaurant.com’ based on the keywords generated at step 218 of the method of FIG. 2. The candidate domain name 834 may be displayed while the user 102 is going through a checkout process 112 for a website builder application 808, for example. Alternatively, the candidate domain name 834 may be displayed while the user 102 is going through a checkout process 112 for an alternative product or service, such as those provided at step 206 of FIG. 2. The user 102 may choose to add the candidate domain name 834 to their shopping cart by selecting an ‘Add’ button 836. The user 102 may select a ‘checkout’ button 838 to complete their purchase of the website builder application 808 and, optionally, the domain name 834 generated at step 222.

Turning now to FIG. 3, a flowchart illustrating a method by which candidate domain names can be generated for the user 102 based on data received by the user 102 while utilizing a software application or service, such as a website builder 808, shown in FIG. 8A, is shown. Although the present flowchart and method is described in terms of a user utilizing a specific type of software application (i.e., a website builder), the methods illustrated in FIG. 3 and described herein may be utilized in conjunction with a user utilizing any software application that involves the user supplying information, either explicitly or implicitly, to a software application. For example, the method may be utilized to provide a user with a listing of candidate domain names for purchase while the user is interacting with email software, web hosting management software, accounting software, and the like.

Similarly to the flowchart illustrated in FIG. 2, the user 102 begins by accessing the website 106. In step 300, the user 102 is authenticated as either an existing user or a new user. If the user 102 is an existing user, the website 106 provides the user 102 access to the website builder application 808 at step 306 once the user 102 has logged in with their credentials (i.e., username and password). If the user 102 is a new user, a new user account may be generated at step 302. Once the user account is generated, the website 106 provides the user 102 the website builder application 808 at step 306.

As a new user, the website builder application 808 will provide the user 102 a plurality of website templates (not shown) to begin building their website. The website templates are pre-designed and may be related to categories such as business and services, music, entertainment, online shop, restaurant and hospitality, photography, design, retail and fashion, personal, etc. Once a template is selected, the user 102 can begin building a website using the website builder application 808. As such, the user 102 is provided with a user interface 810, such as that shown in FIG. 8A. Within the interface, menu options 812 may be provided on the user interface 810 to assist the user 102 in building their website. Beginning with a home page, as shown in FIG. 8A, the user 102 may add a content block 814 to the website, for example, that gives a brief description of the website being built. The user 102 simply drags a content block icon 816 to the desired location on the user interface 810 and the user 102 can type directly into the content block 814.

Additionally, the user 102 may add an image 818 (e.g., a company logo) to the home page of the website by simply dragging the image icon 820 to the desired location on the user interface 810. The image 818 may be provided by the user 102 or may be a stock image provided by the website builder application 808. Similarly, the user has the option to add image galleries or video, for example, to their website by simply dragging an image gallery icon 822 or a video icon 824 to the desired location on the user interface 810. The user 102 further has the option to add additional pages to their website by selecting the pages 826 menu option. Other pages 826, may include, but are not limited to, a site gallery page, an about us page, a contact information page, an online store page, a site map, a forum page, etc. The user 102 also has the option to provide a link to their social web pages (e.g., LINKEDIN, TWITTER, FACEBOOK, etc.) by selecting a social menu option 828, as will be discussed in further detail below.

Returning to the flowchart illustrated in FIG. 3, the user 102 may navigate, edit, and update their website using the website builder application 808 as described above and provided at step 306. At step 310, while the user 102 edits their website using the website builder application 808, various forms, such as user information forms, business information forms, user contact forms, website information forms, etc., may be provided to the user 102 for the user 102 to complete. For example, when the user 102 adds a content block 814 to the website, adds images 818, image galleries, videos or updates a contact information page 830, as shown in FIG. 8B, each action may involve the user completing forms other otherwise providing information to the website builder application 808. The forms may vary depending on which menu option 814 the user 102 is utilizing. In some cases, the forms include explicit user input devices (e.g., textboxes, check boxes, radio buttons, and the like) into which the user provides input. Alternatively, the forms may be incorporated into other user interfaces allowing the user to added content to or revise content within the user's website. For example, the interface through which the user adds images to their website is considered a form, as is the mechanism by which the user adds video. Regardless of the menu options 812 being used, the server 110 shown in FIG. 1 acquires data from the user 102 as the user manipulates their website using the website builder application 808.

For example, the user 102 may fill out a user contact information form 832 while creating or editing the contact information page 830 of their website, as shown in FIG. 8B. The user contact information form 832 may enable the user 102 to provide input data 314 such as a first name, last name, address, city, state, zip code, phone number, etc. Returning to FIG. 2, after capturing the input data 314, the system 100 may be configured to acquire additional data about the user 102 or the user's business from third party data sources 304 at step 316. For example, if the user 102 provides their first and last name on the user contact information form 832, the system 100 may run a search on the third party data sources 304 using the user's 102 first and last name to gather additional information about the user 102. The third party data sources 304 may include, but are not limited to, LINKEDIN, FACEBOOK, YELP, TWITTER and a State Bar directory. As a non-limiting example, the system 100 may run a search on Facebook.com using the first and last name provided by the user 102. The system 100 may gather information from Facebook.com, such as where the user 102 is from (i.e., city and state), where they are employed, what college they attended, etc.

The system 100 provides an integration module (not shown) to generate a keyword collection at step 318 by running a content analysis (e.g., crawl) on the website being built by the user 102 that identifies keywords throughout the pages of the website. The keyword collection may contain, for example, keywords related to the user 102 acquired at steps 312 and 316, keywords selected from title text on the user's website, and information collected from third party sources about the user or the user's business. A cache storage database 319 may be provided by the system 100 to store the input data 314 provided by the user 102 at step 312 and to store data related to the user 102 acquired from the third party data sources 304 at step 316. The keywords generated at step 318 will be used to generate a candidate domain name for the user 102, as will be discussed in further detail below.

After the collection of keywords has been generated, the system 100 can use that collection of keywords to generate one or more candidate domain names for the user 102 that the user 102 may wish to purchase. In some cases, this will involve analyzing, in addition to the collection of keywords, websites of third parties that are relevant to the user or the user's business. In that case, the content of those third party website's can be analyzed to potentially generate additional keywords from which the candidate domain names can be generated.

In some implementations, the system 100 checks to see if the user already has a registered domain name. If so, the identification of these other domain names can be used to prevent the system 100 from suggesting candidate domain names that are too close to domain names already registered by the user 102.

Once a candidate domain name or an alternate domain name is generated based on the keyword collection at step 322, the system 100 may provide the user 102 an option to add the domain name to their shopping cart at step 324 for purchase as part of the website builder interface. For example, FIG. 8D shows a web site builder user interface 808 (e.g., the user interface of FIG. 8A), modified to incorporate or display candidate domain name 834 that may be offered for purchase by the user. Candidate domain name 834 may be displayed on each user interface screen presented by the web site builder interface until, for example, candidate domain name 834 is either dismissed by the user, or the user decides to purchase or register the candidate domain name. Candidate domain name 834 may only be displayed in the user interface once sufficient keywords have been collected to generate a candidate domain name with sufficient confidence. With reference to FIG. 8D, the user can choose to add the candidate domain name 834 to their shopping cart by selecting an ‘Add’ button 836. The user will then be given an opportunity to purchase or register the domain name.

Returning to FIG. 3, at step 325, the user 102 may choose to add the candidate domain name 834 to their shopping cart by selecting an ‘Add’ button 836. At step 326, the user 102 may select a ‘checkout’ button 838 to complete their purchase of the website builder application 808 and, optionally, the domain name 834 generated at step 322.

As indicated by step 325, if the user 102 does not elect to purchase one of the candidate domain names, the method repeats and the system 100 continues providing the website builder application to the user and monitoring the user's actions. As such, additional revisions or changes to the user's website can be captured, in which case a new listing of candidate domain names may be generated and displayed for purchase by the user 102. Accordingly, if the user 102 does not elect to purchase one of the candidate domain names, the system 100 returns to step 306 to again provide the website builder application to the user and monitor whether the user 102 is updating or adding data 314 to their website. During this process, the system 100 provides the cache storage 319 in order to store the recently updated and added data 314, as well as the data acquired from third party data sources 304. In this sense, the system 100 may access the cache storage 319 to quickly generate either the candidate or alternate domain name at step 322 and provide the user 102 the option to add the domain name to their shopping cart at step 324.

In various implementations, the method illustrated in FIG. 3 may be continually executed as the user interacts with and utilizes the website builder application (or other software application). As such, the listing of candidate domain names can be continually updated as the user interacts with the software, providing new information and/or revising existing information. As such, while the user utilizes the software application, the listing of candidate domain names will continuously be refreshed and will always represent a list of potential domain names that are closely relevant to the content being supplied by the user into the software application.

Turning now to FIG. 4, a flowchart illustrating a method by which candidate domain names can be generated for the user 102 based on data acquired from third party data sources 404 is shown. The user 102 in this case may be an existing user and may begin by accessing the website 106. In step 400, the user 102 is authenticated as an existing user. Once authenticated, the user may begin using one or more software applications made available by the website 106 or may access the user's account information. While interacting with the website 106, the user 102 determines that he or she wishes to link their account to an external third party account. Accordingly, while interacting with the website 106 the user 102 may activate a user interface enabling the user to begin the process of linking their account with a third party account. The process of linking the user's 102 account with a third party account may be accomplished at a user account level.

At step 409, the system 100 prompts the user 102 to link their existing user account to a third party account 404. As a non-limiting example, the third party account 404 may include the user's 102 LINKEDIN, FACEBOOK, YELP, State Bar or TWITTER account. At step 410, a user information form 932, as shown in FIG. 9A, is provided to the user 102. The user information form 932 may include, for example, a login window 940 that enables the user 102 to log into their third party account 404 and grant the system 100 permission to access the third party account 404. In order to link the third party account 404 (e.g., a social network account), the system 100 may use standard connection protocols provided by the third party data sources such as, FACEBOOK connect, FACEBOOK pages or LINKEDIN Company page. Alternatively, the system 100 may request that the user 102 provide their public URL to third party data sources (e.g., TWITTER handle, YELP URL). Once linked, a verification screen 942, as shown in FIG. 9B, may appear on the website of the user's 102 third party data source confirming that their user account is now linked and has access to the information provided by the third party data source. The system 100 may then acquire data about the user 102 from the newly linked third party data sources 404 at step 416. For example, the system 100 may run a search on the third party data sources 404 using the user's 102 first and last name to gather additional information about the user 102. The third party data sources 404 may include, but are not limited to, LINKEDIN, FACEBOOK, YELP, TWITTER and a State Bar directory. The system 100 may gather information from Facebook.com, for example, such as where the user 102 is from (i.e., city and state), where they are employed, what college they attended, etc.

The system 100 provides an integration module (not shown) to generate a keyword collection at step 418. The keyword collection may contain, for example, keywords related to the user 102 acquired at step 416. These keywords will be used to generate a candidate domain name for the user 102, as will be discussed in further detail below.

After the collection of keywords has been generated, the system 100 can use that collection of keywords to generate one or more candidate domain names for the user 102 that the user 102 may wish to purchase. In some cases, this will involve analyzing, in addition to the collection of keywords, websites of third parties that are relevant to the user or the user's business. In that case, the content of those third party website's can be analyzed to potentially generate additional keywords from which the candidate domain names can be generated.

In some implementations, the system 100 checks to see if the user already has a registered domain name. If so, the identification of these other domain names can be used to prevent the system 100 from suggesting candidate domain names that are too close to domain names already registered by the user 102.

Once a candidate domain name or an alternate domain name is generated based on the keyword collection at step 422, the system 100 may provide the user 102 an option to add the domain name to their shopping cart at step 424 for purchase. Step 424 may occur, for example, as the user is going through a checkout process 112 for a client software application 408 or is otherwise navigating website 106, as previously discussed. At step 426, the user 102 may checkout and purchase the domain name generated at step 422.

Turning now to FIG. 5, a flowchart illustrating a method by which candidate domain names can be generated for the user 102 based on input data 514 related to an advertising software application 508 or other advertising services is shown. The method shown in FIG. 5 may be useful, for example, to assist a user that already has a website, but wishes to add advertising to the website. However, the user may be unaware that the domain name that they have selected for their existing website is not particularly suited to the type of advertising that will be displayed thereon. In that case, the present method may be useful to make recommendations of improved domain names for the user that the user may wish to register at the same time the advertising services are purchased.

The user 102 in this case may be an existing user and may begin by accessing the website 106. The user 102 may be any Internet user, for example, who may wish to incorporate advertising into an existing website hosted at a particular domain name. As such, the user accesses the website 106 to execute advertising software application 508, which is configured to assist the user 102 in incorporating advertising into the user's website.

In step 500, the user 102 is authenticated as a user having an existing website. At step 506, the website 106 provides the user 102 the advertising software application 508, which allows the user 102 to add advertising features to their existing website.

At step 510, a website information form 1032, as shown in FIG. 10, can be provided to the user 102 on a website information page 1034 requesting that the user provide information useful for the incorporation of advertising content into the user's website. The website information form 1032 may enable the user 102 to provide input data 514 that includes, but is not limited to, a title (e.g., a business name), a location (e.g., home and/or business address, city, state, zip code, etc.), a phone number, features relevant to the user's 102 products and services, email address, business website, business tagline, business category, text, and metadata such as images provided by the user 102 or the website 106 at step 512. The server 110 shown in FIG. 1 acquires data from the user 102 as the business information form 1032 is filled out. At this point, the system 100 also knows the domain name of the user's existing website and can thereby access the user's existing website to collect one or more keywords therefrom. Accordingly, at step 512, the system 100 may automatically scrape the user's 102 existing website using web scraping software capable of scraping all the pages on the user's 102 existing website to gather data including, but not limited to page titles, business location data, product features and services, metadata from images and pages, etc. to generate the keyword collection. Additionally, if an advertising campaign has been in place for some time for the web site, the collection of keywords may include keywords that are determined to have performed well in the advertising campaign.

As the user 102 is providing the input data 514, the system 100 may be configured to acquire additional data about the user 102 from third party data sources 504 at step 516. For example, if the user 102 provides their first and last name on the business information form, the system 100 may run a search on the third party data sources 504 using the user's 102 first and last name to gather additional information about the user 102. The third party data sources 504 may include, but are not limited to, LINKEDIN, FACEBOOK, YELP, TWITTER and a State Bar directory. As a non-limiting example, the system 100 may run a search on Facebook.com using the first and last name provided by the user 102. The system 100 may gather information from Facebook.com, such as where the user 102 is from (i.e., city and state), where they are employed, what college they attended, etc.

The system 100 provides an integration module (not shown) to generate a keyword collection at step 518. The keyword collection may contain, for example, keywords related to the user 102 acquired at steps 512 and 516 and generated by analysis of the user's existing website. These keywords will be used to generate a candidate domain name for the user 102, as will be discussed in further detail below.

At step 526, the system 100 generates a number of candidate domain names for the user using the keyword collection and the information collected in steps 512 and 516. In one implementation, before performing step 526, the system 100 may first determine a quality rating for the user's existing website. For example, the system may determine a search engine visibility rating, for example, of the user's 102 existing domain name based on the input data 514. The search engine visibility rating, may be a numerical rating, for example, that indicates whether the user's existing domain name is highly visible or not when other users perform queries on search engines such as, BING, YAHOO, GOOGLE, AOL, etc. If the search engine visibility rating for the user's existing domain name is sufficiently low (e.g., below a pre-determined threshold), the system 100 may generate the candidate domain names for the user 102 based on their existing search engine visibility rating and the keyword collection generated at step 518. The candidate domain names displayed will therefore be relevant to the user 102 and, specifically, the user's website. The use of any one of the domain names generated at step 526 may increase the website's traffic, and consequently, sales if the user's 102 website hosts an online store, for example.

Once the candidate domain names are generated based on the keyword collection at step 526, the system 100 may provide the user 102 an option to add one or more of the candidate domain names to their shopping cart at step 528 for purchase. Step 528 may occur, for example, as the user is going through a checkout process 112 for the advertising software application 508, as previously discussed with respect to FIG. 8C. At step 538, the user 102 may checkout and purchase the advertising services and, optionally, the domain name generated at step 526.

In some cases, the candidate domain names will be displayed on a user interface utilized by a user to monitor their advertising campaign. For example, FIG. 11 depicts user interface 1100. User interface 1100 provides a dashboard enabling a user to review the status of their current advertising or marketing campaign and provides information such as the number of impressions and clicks the web page has received, as well as a budget status of the advertising campaign. As the campaign proceeds, and certain keywords in the campaign are identified as generating increased traffic, candidate domain names can be generated based upon those successful keywords. Once generated, those candidate domain names can be provided to the user for potential purchase or registration. As such, user interface 1100 includes candidate domain name 1134. The user 102 may choose to add the candidate domain name 1134 to their shopping cart by selecting an ‘Add’ button 1136. The user will then be given an opportunity to purchase or register the domain name.

Several different environments may be used to accomplish the steps of embodiments disclosed herein. FIGS. 6 and 7 demonstrate a streamlined example of such an environment and illustrate a non-limiting example of a system and/or structure that may be used to accomplish the methods and embodiments disclosed and described herein. Such methods may be performed by any central processing unit (CPU) in any computing system, such as a microprocessor running on at least one server 610 and/or client 620, and executing instructions stored (perhaps as scripts and/or software, possibly as software modules) in computer-readable media accessible to the CPU, such as a hard disk drive on a server 610 and/or client 620.

The example embodiments herein place no limitations on whom or what may comprise users. Thus, as non-limiting examples, users may comprise any individual, entity, business, corporation, partnership, organization, governmental entity, and/or educational institution.

The example embodiments shown and described herein exist within the framework of a network 600 and should not limit possible network configuration or connectivity. Such a network 600 may comprise, as non-limiting examples, any combination of the Internet, the public switched telephone network, the global Telex network, computer networks (e.g., an intranet, an extranet, a local-area network, or a wide-area network), a wired network, a wireless network, a telephone network, a corporate network backbone or any other combination of known or later developed networks.

At least one server 610 and at least one client 620 may be communicatively coupled to the network 600 via any method of network connection known in the art or developed in the future including, but not limited to wired, wireless, modem, dial-up, satellite, cable modem, Digital Subscriber Line (DSL), Asymmetric Digital Subscribers Line (ASDL), Virtual Private Network (VPN), Integrated Services Digital Network (ISDN), X.25, Ethernet, token ring, Fiber Distributed Data Interface (FDDI), IP over Asynchronous Transfer Mode (ATM), Infrared Data Association (IrDA), wireless, WAN technologies (T1, Frame Relay), Point-to-Point Protocol over Ethernet (PPPoE), and/or any combination thereof.

The server(s) 610 and client(s) 620 (along with software modules and the data storage 630 disclosed herein) may be communicatively coupled to the network 600 and to each other in such a way as to allow the exchange of information required to accomplish the method steps disclosed herein, including, but not limited to receiving the information from a user interface on one or more clients 620, and one or more servers 610 receiving the information.

The client 620 may be any computer or program that provides services to other computers, programs, or users either in the same computer or over a computer network 600. As non-limiting examples, the client 620 may be an application, communication, mail, database, proxy, fax, file, media, web, peer-to-peer, or standalone computer, cell phone, “smart” phone, personal digital assistant (PDA), etc. which may contain an operating system, a full file system, a plurality of other necessary utilities or applications or any combination thereof on the client 620. Non limiting example programming environments for client applications may include JavaScript/AJAX (client side automation), ASP, JSP, Ruby on Rails, Python's Django, PHP, HTML pages or rich media like Flash, Flex, Silverlight, any programming environments for mobile “apps,” or any combination thereof.

The client computer(s) 620 which may be operated by one or more users and may be used to connect to the network 600 to accomplish the illustrated embodiments may include, but are not limited to, a desktop computer, a laptop computer, a hand held computer, a terminal, a television, a television set top box, a cellular phone, a wireless phone, a wireless hand held device, a “smart” phone, an Internet access device, a rich client, thin client, or any other client functional with a client/server computing architecture. Client software may be used for authenticated remote access to one more hosting computers or servers, described below. These may be, but are not limited to being accessed by a remote desktop program and/or a web browser, as are known in the art.

The user interface displayed on the client(s) 620 or the server(s) 610 may be any graphical, textual, scanned and/or auditory information a computer program presents to the user, and the control sequences such as keystrokes, movements of the computer mouse, selections with a touch screen, scanned information etc. used to control the program. Examples of such interfaces include any known or later developed combination of Graphical User Interfaces (GUI) or Web-based user interfaces as seen in and after FIG. 8A, including Touch interfaces, Conversational Interface Agents, Live User Interfaces (LUI), Command line interfaces, Non-command user interfaces, Object-oriented User Interfaces (OOUI) or Voice user interfaces. Any information generated by the user, or any other information, may be accepted using any field, widget and/or control used in such interfaces, including but not limited to a text-box, text field, button, hyper-link, list, drop-down list, check-box, radio button, data grid, icon, graphical image, embedded link, etc.

The software modules used in the context of the current invention may be stored in the memory of—and run on—at least one server 610 and/or client 620. The software modules may comprise software and/or scripts containing instructions that, when executed by a microprocessor on a server 610 and/or client 620, cause the microprocessor to accomplish the purpose of the module or the methods disclosed herein.

The software modules may interact and/or exchange information via an Application Programming Interface or API. An API may be a software-to-software interface that specifies the protocol defining how independent computer programs interact or communicate with each other. The API may allow a requesting party's software to communicate and interact with the software application and/or its provider-perhaps over a network-through a series of function calls (requests for services). It may comprise an interface provided by the software application and/or its provider to support function calls made of the software application by other computer programs, perhaps those utilized by the requesting party to provide information for publishing or posting domain name and hosted website information.

The API may comprise any API type known in the art or developed in the future including, but not limited to, request-style, Berkeley Sockets, Transport Layer Interface (TLI), Representational State Transfer (REST), SOAP, Remote Procedure Calls (RPC), Standard Query Language (SQL), file transfer, message delivery, and/or any combination thereof.

The software modules may also include mobile applications, possibly on a client computer and/or mobile device. These mobile applications, or “apps” may comprise computer software designed to help people perform an activity and designed to help the user to perform singular or multiple related specific tasks. It helps to solve problems in the real world by manipulating text, numbers, graphics, or a combination of these elements.

The server(s) utilized within the disclosed system 610 may comprise any computer or program that provides services to other computers, programs, or users either in the same computer or over a computer network 600. As non-limiting examples, the server 610 may comprise application, communication, mail, database, proxy, fax, file, media, web, peer-to-peer, standalone, software, or hardware servers (i.e., server computers) and may use any server format known in the art or developed in the future (possibly a shared hosting server, a virtual dedicated hosting server, a dedicated hosting server, a cloud hosting solution, a grid hosting solution, or any combination thereof).

The server 610 may exist within a server cluster, as illustrated. These clusters may include a group of tightly coupled computers that work together so that in many respects they can be viewed as though they are a single computer. The components may be connected to each other through fast local area networks which may improve performance and/or availability over that provided by a single computer.

The server(s) 610 or software modules within the server(s) 610 may use query languages such as MSSQL or MySQL to retrieve the content from data storage 630. Server-side scripting languages such as ASP, PHP, CGI/Perl, proprietary scripting software/modules/components etc. may be used to process the retrieved data. The retrieved data may be analyzed in order to determine information recognized by the scripting language, information to be matched to those found in data storage, availability of requested information, comparisons to information displayed and input/selected from the user interface or any other content retrieval within the method steps disclosed herein.

The server 610 and/or client 620 may be communicatively coupled to data storage 630 to retrieve any information requested. The data storage 630 may be any computer components, devices, and/or recording media that may retain digital data used for computing for some interval of time. The storage may be capable of retaining stored content for any data requested, on a single machine or in a cluster of computers over the network 600, in separate memory areas of the same machine such as different hard drives, or in separate partitions within the same hard drive, such as a database partition.

Non-limiting examples of the data storage 630 may include, but are not limited to, a Network Area Storage, (“NAS”), which may be a self-contained file level computer data storage connected to and supplying a computer network with file-based data storage services. The storage subsystem may also be a Storage Area Network (“SAN”—an architecture to attach remote computer storage devices to servers in such a way that the devices appear as locally attached), an NAS-SAN hybrid, any other means of central/shared storage now known or later developed or any combination thereof.

Structurally, the data storage 630 may comprise any collection of data. As non-limiting examples, the data storage 630 may comprise a local database, online database, desktop database, server-side database, relational database, hierarchical database, network database, object database, object-relational database, associative database, concept-oriented database, entity-attribute-value database, multi-dimensional database, semi-structured database, star schema database, XML database, file, collection of files, spreadsheet, and/or other means of data storage such as a magnetic media, hard drive, other disk drive, volatile memory (e.g., RAM), non-volatile memory (e.g., ROM or flash), and/or any combination thereof.

As seen in FIG. 6, the server(s) 610 and data storage 630 may exist and/or be hosted in one or more data centers (640, 650). These data centers 640/650 may provide hosting services for websites, services or software relating to stored information, or any related hosted website including, but not limited to hosting one or more computers or servers in a data center 640/650 as well as providing the general infrastructure necessary to offer hosting services to Internet users including hardware, software, Internet web sites, hosting servers, and electronic communication means necessary to connect multiple computers and/or servers to the Internet or any other network 600. These data centers 640/650 or the related clients 620 may accept messages from text messages, SMS, web, mobile web, instant message, third party API projects or other third party applications.

As users access and/or input information, this information may be redirected and distributed between and among the data centers (640, 650) via commands from any combination of software modules hosted on the server(s) 610 and executed via processors on the server(s) 610. This information may then be accessed and manipulated by the combination of software modules or stored in the data storage 630 of any of a plurality of data centers, either separate from or integrated into the one or more servers, so that the information is available to be searched and accessed by the user and/or any other components of any or all data centers.

Any references to “software combination,” “combination of software,” “combination of software modules” etc. referred to herein may include any combination of software modules executed by a microprocessor on either the server 610 or client 620 computers. These software modules may also be used in combination with any other hardware or software structures disclosed herein. The servers 610 may be hosted in any data center (640, 650) operated by any hosting provider such as those disclosed herein and the servers 610 and clients 620 may be operated by any users disclosed herein.

The system also may comprise a domain name generation module 660 that may be stored in the memory of—and run on—at least one server 610 and may comprise any software and/or scripts containing instructions that, when executed by the server's 610 microprocessor, cause the microprocessor to generate a domain name relevant to the keyword collection. As illustrated in FIG. 7, the domain name generation module 660 may comprise an information source receipt module 680 and a keyword extraction and combination module 690. The information source receipt module 680 may comprise scripts and/or software running on the server 610 that operates to obtain a plurality of data from any information source. As described in detail above, the information source forming the basis of generated domain names may comprise any collection of data, accessible to the domain name generation module 660 that may contain data regarding the user and/or the user's business, for example, including, but not limited to websites, web pages, news feeds, and/or Real Simple Syndication (RSS) feeds.

The keyword extraction and combination module 690 also may comprise software and/or scripts running on the server 610 and may operate to parse received data into a plurality of keywords, combine keywords into a root name, and concatenate a top level domain to the root name, thereby generating the candidate or alternate domain name. In one possible embodiment, the keyword extraction and combination module 690 also may determine a topic to which each keyword relates, sort the keywords into subcategories according to topic, and generate a root name by combining keywords from the same subcategory. A domain name relevant to the keyword collection is thereby generated after a TLD is concatenated to the root name. Modules 680 and 690 may comprise any software and/or scripts running on the server 210 that may accomplish the methods described in detail above.

The system also may comprise a domain name registration module 670 running on at least one server 610 and offering the generated domain name for registration (if available). This module may comprise software and/or scripts containing instructions that, when executed by the server's 610 microprocessor, cause the microprocessor to determine whether the domain name is available for registration and provide the domain name for registration, if available. Additionally, the domain name registration module 670 may, if the domain name is available, register the domain name to the registrant. It may comprise any domain name registration system known in the art or developed in the future including, but not limited to, a website enabled domain name purchase and registration system, such as that described in detail above and/or may be available on GODADDY.COM's website. The domain names database may comprise, as non-limiting examples, a local database, online database, desktop database, server-side database, relational database, hierarchical database, network database, object database, object-relational database, associative database, concept-oriented database, entity-attribute-value database, multi-dimensional database, semi-structured database, star schema database, XML database, file, collection of files, spreadsheet, or other means of data storage located on a computer, client, server, or any other storage device known in the art or developed in the future.

The present disclosure describes preferred embodiments with reference to the Figures, in which like numbers represent the same or similar elements. Reference throughout this specification to “one embodiment,” “an embodiment,” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases “in one embodiment,” “in an embodiment,” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.

The described features, structures, or characteristics of the invention may be combined in any suitable manner in one or more embodiments. In the description, numerous specific details are recited to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, materials, and so forth. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the invention.

The schematic flow chart diagrams included are generally set forth as logical flow-chart diagrams. As such, the depicted order and labeled steps are indicative of one embodiment of the presented method. Other steps and methods may be conceived that are equivalent in function, logic, or effect to one or more steps, or portions thereof, of the illustrated method. Additionally, the format and symbols employed are provided to explain the logical steps of the method and are understood not to limit the scope of the method. Although various arrow types and line types may be employed in the flow-chart diagrams, they are understood not to limit the scope of the corresponding method. Indeed, some arrows or other connectors may be used to indicate only the logical flow of the method. For instance, an arrow may indicate a waiting or monitoring period of unspecified duration between enumerated steps of the depicted method. Additionally, the order in which a particular method occurs may or may not strictly adhere to the order of the corresponding steps shown.

The present invention has been described in terms of one or more preferred embodiments, and it should be appreciated that many equivalents, alternatives, variations, and modifications, aside from those expressly stated, are possible and within the scope of the invention. 

The invention claimed is:
 1. A method, comprising: receiving, by at least one server computer communicatively coupled to a network, a first request to access a website builder application for a website from a first user, the website being hosted by the at least one server computer; transmitting, by the at least one server computer in response to the first request and through the network, a website builder application to the first user, the website builder application including a plurality of user interface elements enabling the first user to modify content of the website; receiving, by the at least one server computer through the network from the website builder application, a user input into one of the plurality of user interface elements; modifying, by the at least one server computer, the website according to the user input to create a modified website stored on the at least one server computer, the at least one server computer being configured to transmit the modified website to a second user in response to a request, received from the second user through the network, for the website; parsing, by a keyword extraction and combination module, the user input into keywords associated with at least one of the first user, a website of the first user, and a business of the first user; determining, by the at least one server computer, an identity of the first user; accessing, by the at least one server computer, a social website using the identity of the first user; retrieving, by the at least one server computer, at least one social keyword from the social website using the identity of the first user, the at least one social keyword including data describing the first user including at least one of a city or state associated with the first user, a school attended by the first user, and an employer of the first user; generating, by a domain name generation module running on the at least one server computer and without further input from the first user, a candidate domain name relevant to the keywords and the at least one social keyword, wherein generating the candidate domain name relevant to the keywords and the at least one social keyword includes: determining a search engine visibility rating of an existing domain name associated with the website; and when the search engine visibility rating of the existing domain name is less than a predetermined threshold, generating the candidate domain name relevant to the keywords and the at least one social keyword using the search engine visibility rating; and transmitting, by the at least one server computer through the network to the first user, a domain purchase user interface element for display within the website builder application, the domain purchase user interface element enabling the first user to register the candidate domain name.
 2. The method of claim 1, including: determining, by the at least one server computer, a business category associated with at least one of the first user and the website and wherein generating the candidate domain name relevant to the keywords includes generating the candidate domain name relevant to the keywords and the business category.
 3. The method of claim 1, wherein the keywords associated with at least one of the first user and the website of the first user include at least one of a business name and a business description.
 4. A system, comprising: at least one server computer in communication with a network, the at least one server computer including a processor configured to: receive, by the at least one server computer, a first request to access a website builder application for a website from a first user, the website being hosted by the at least one server computer; transmit, by the at least one server computer in response to the first request and through the network, a website builder application to the first user, the website builder application including a plurality of user interface elements enabling the first user to modify content of the website; receive, by the at least one server computer through the network from the website builder application, a user input into one of the plurality of user interface elements; modify, by the at least one server computer, the website according to the user input to create a modified website stored on the at least one server computer, the at least one server computer being configured to transmit the modified website to a second user in response to a request, received from the second user through the network, for the website; parse, by a keyword extraction and combination module, the user input into keywords associated with at least one of the first user, a website of the first user, and a business of the first user; determine an identity of the first user; access, by the at least one server computer, a social website using the identity of the first user; retrieve at least one social keyword from the social website using the identity of the first user, the at least one social keyword including data describing the first user including at least one of a city or state associated with the first user, a school attended by the first user, and an employer of the first user; generate, by a domain name generation module running on the at least one server computer, a candidate domain name relevant to the keywords and the at least one social keyword, wherein the at least one server computer is configured to: determine a search engine visibility rating of an existing domain name associated with the website; and when the search engine visibility rating of the existing domain name is less than a predetermined threshold, generate the candidate domain name relevant to the keywords and the at least one social keyword using the search engine visibility rating; and transmit, by the at least one server computer through the network to the first user, a domain purchase user interface element for display within the website builder application, the domain purchase user interface element enabling the first user to register the candidate domain name.
 5. The system of claim 4, wherein the at least one server computer is configured to determine a business category associated with at least one of the first user and the website and wherein generating the candidate domain name relevant to the keywords includes generating the candidate domain name relevant to the keywords and the business category. 