System and method related to generating and tracking an email campaign

ABSTRACT

A method and system for generating and tracking an email campaign is described. An email campaign generator generates an email campaign template from an email target database. The email target database comprises at least one email target. An email campaign engine generates a custom email corresponding to each of the at least one email target. The custom email is formed from the email campaign template. The email campaign engine sends to each of the at least one email target the corresponding custom email. A campaign tracker receives at least one response corresponding to the sent custom email. The campaign tracker creates a campaign tracking list that includes the received at least one response.

[0001] This application claims the benefit of U.S. ProvisionalApplication No. 60/199,355, filed Apr. 25, 2000.

BACKGROUND OF THE INVENTION

[0002] 1. Field of the Invention

[0003] The present invention is directed to marketing via email, and, inparticular, to generating and tracking marketing related email.

[0004] 2. Background Art

[0005] The ability to market a product or service to individuals who areaccessible on the Internet is becoming increasingly important. Effectiveways of contacting these individuals are being sought. For instance, tomarket to these individuals, email may be sent to the individuals overthe Internet, to provide information related to the product or service.Email systems exist today for sending email to a target set of emailaddresses for purposes such as marketing, information acquisition, andotherwise. A system for sending email to a number of email targets forsuch purposes may be called an email campaign.

[0006] Present email campaigns may suffer from difficulties in locatinga pool of relevant individuals to be contacted. In a small emailcampaign, each email sent is critical to the success of the campaign,and needs to be carefully created. In other situations, large numbers ofindividuals to be contacted may have been found. This may result inincreased difficulty in tailoring the large number of required emailmessages to the individuals for more effective contact.

[0007] Furthermore, once an email campaign has been initiated,difficulties in measuring success of the email campaign are presented.Effective ways for determining whether email recipients have receivedemail from the email campaign have been sought. Also, effective ways forallowing the email recipients to provide feedback have also been sought.It may be desirable for the email recipients to be able to respond withfeedback, and for the quantity and content of the responses to bemonitored and tracked.

[0008] In light of the foregoing, what is needed is an efficient way tocreate and track a email campaign.

BRIEF SUMMARY OF THE INVENTION

[0009] The present invention is directed to a system for generating andtracking an email campaign. An email campaign generator generates anemail campaign template from an email target database. The email targetdatabase includes at least one email target. An email campaign enginegenerates a custom email corresponding to each of the email targets inthe email target database. The custom email are formed from the emailcampaign template. The email campaign engine sends each custom email tothe corresponding email target. A campaign tracker receives at least oneresponse corresponding to one or more of the sent custom email. Thecampaign tracker creates a campaign tracking list that includes thereceived at least one response.

[0010] The present invention is further directed to a method for anemail campaign. An email target database is received. An email campaigntemplate related to at least one email target in the received emailtarget database is generated. An email customized for each email targetis sent to the respective email target. Each customized email is formedfrom the email campaign template. The sent custom email is tracked.

[0011] The email campaign template can be generated by generating amessage template, and generating a configuration file to contain datarelated to each email target. The data for each email target isinsertable in the generated message template. The data may include acustom resource locator address. The custom uniform resource locator(URL) address can be generated for each email target. The generatedcustom URL address for each email target is inserted into theconfiguration file. A message authentication code can be generated foreach email target. All or a portion of the generated messageauthentication code for each email target can be appended to a host webaddress to form the custom URL address for each target.

[0012] Further features and advantages of the invention as well as thestructure and operation of various embodiments of the present inventionare described in detail below with reference to the accompanyingdrawings.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

[0013] The accompanying drawings, which are incorporated herein and forma part of the specification, illustrate the present invention and,together with the description, further serve to explain the principlesof the invention and to enable a person skilled in the pertinent art tomake and use the invention.

[0014]FIG. 1 illustrates an exemplary computer network according to thepresent invention.

[0015]FIG. 2 illustrates an exemplary email campaign generator andtracker, according to an embodiment of the present invention.

[0016]FIG. 3A illustrates structure and operation of an exemplary emailcampaign generator, according to an embodiment of the present invention.

[0017]FIG. 3B illustrates an exemplary email campaign generator,according to an embodiment of the present invention.

[0018]FIG. 4 illustrates structure and operation of an exemplary emailcampaign engine, according to an embodiment of the present invention.

[0019]FIG. 5 illustrates structure and operation of an exemplarycampaign tracker, according to an embodiment of the present invention.

[0020]FIG. 6 illustrates generation of a customized URL address,according to an example embodiment of the present invention.

[0021]FIG. 7 illustrates an exemplary email target database generator,according to an embodiment of the present invention.

[0022]FIG. 8A illustrates an example email campaign history, accordingto an embodiment of the present invention.

[0023]FIG. 8B illustrates an example email campaign summary, accordingto an embodiment of the present invention.

[0024]FIG. 9 is a flowchart illustrating a sequence of operationaccording to an embodiment of the present invention.

[0025]FIG. 10 is a flowchart illustrating a sequence of operation forgenerating an email target database, according to an embodiment of thepresent invention.

[0026] FIGS. 11A-C are flowcharts illustrating sequences of operationrelated to generating an email campaign template,

[0027]FIG. 12 is a diagram of an example Internet environment accordingto the present invention.

[0028]FIG. 13 shows a simplified four-layered communication modelsupporting Web commerce.

[0029]FIG. 14 is a block diagram of a computer system according to anexample implementation of the present invention.

[0030] The present invention will now be described with reference to theaccompanying drawings. In the drawings, like reference numbers indicateidentical or functionally similar elements. Additionally, the left-mostdigit(s) of a reference number identifies the drawing in which thereference number first appears.

DETAILED DESCRIPTION OF THE INVENTION

[0031] Overview

[0032] The present invention is directed to a method and system forgenerating and tracking an email campaign. An email campaign generatorgenerates an email campaign template from an email target database. Theemail target database includes one or more email targets. An emailcampaign engine generates a custom email corresponding to each of theemail targets in the email target database. The custom email are formedfrom the email campaign template. The email campaign engine sends eachcustom email to the corresponding email target. A campaign trackerreceives at least one response corresponding to one or more of the sentcustom email. The campaign tracker creates a campaign tracking list thatincludes the received at least one response.

[0033] In an example embodiment, the email campaign is related topermission-based marketing. For example, the email campaign may berelated to permission-based marketing of resumes. The resumes may havebeen collected by an email campaign host or manager from the Internet byspider engines, or otherwise. The invention determines email targets oremail addresses for each resume. This allows the email campaign host ormanager to send a custom email to each resume owner, to request theirpermission to post the resume owner's resume on the email campaignhost's web site, for example. The resume owner may provide theirpermission via a custom uniform resource locator (URL) address providedto the resume owner in the custom email. The resume owner may select thecustom URL address, which will open a custom web page displaying theresume owner's collected resume. The resume owner may then optionallyedit their collected resume on the web page. The resume owner may alsodecline to have their resume posted via email or the custom URL.

[0034] The invention is also adaptable to information and documentsother than resumes, as would be understood persons skilled in therelevant art(s) from the teachings herein. The alternative informationand documents should have an email address associated with them, so thatthe information and document owners may be contacted by email, asdescribed according to the present invention herein.

[0035] The invention is adaptable to any type of web, Internet, network,and other form of electronic communication used for marketing ofinformation, information broadcasting, and any other form ofcommunication tracking and handling.

[0036] System Level Description

[0037]FIG. 1 illustrates an exemplary computer network 100, according toembodiments of the present invention. Computer network 100 includes anemail campaign generator and tracker 110, a network 120, a first usercomputer system 130, a second user computer system 140, and a third usercomputer system 150.

[0038] Email campaign generator and tracker 110 generates and tracks anemail campaign, according to the present invention. In embodiments,email campaign generator and tracker 110 receives an email targetdatabase. In alternate embodiments, email campaign generator and tracker110 generates an email target database from raw documentation, such asone or more resumes obtained from the Internet. Email campaign generatorand tracker 110 generates a custom email for one or more of the emailtargets in the email target database, and sends each custom email to thecorresponding email target. Email campaign generator and tracker 110then tracks and organizes responses from the email targets. Emailcampaign generator and tracker 110 as described in this section andelsewhere herein can be achieved using any number of structuralimplementations, including hardware, firmware, software, or anycombination thereof. For example, email campaign generator and tracker110 may reside and operate in a computer system. The details of suchstructural implementations will be apparent to persons skilled in therelevant art(s) based on the teachings contained herein.

[0039] Email campaign generator and tracker 110 is coupled to network120 via first communications link 160. First communications link 160 canbe any suitable communications link for interfacing a computer system orother hardware with a network, such as network 120, as would be apparentto a person skilled in the relevant art(s) from the teachings herein.

[0040] Network 120 can be any communications network known to personsskilled in the relevant art(s) from the teachings herein. For instance,network 120 can be a network such as a local area network (LAN), anintranet, or the Internet. Examples embodiments for network 120 arefurther described herein. An example network 120 can include an Internet1200, which is illustrated in FIG. 12 as described more fully below.

[0041] First, second, and third user computer systems 130, 140, and 150are coupled to network 120 via a second, a third, and a fourthcommunications link 170, 180, and 190, respectively. First, second, andthird user computer systems 130, 140, and 150 can be any computersystems that are configured to receive and send email, and can accessweb pages. Suitable computer systems would be apparent to a personskilled in the relevant art(s). Any number of user computer systems mayinterface with network 120, according to embodiments of the presentinvention.

[0042] Second, third, and fourth communications links 170, 180, and 190can be any suitable communications links for interfacing a computersystem or other hardware with a network, such as network 120, as wouldbe recognized by persons skilled in the relative art(s) from theteachings herein. Various suitable communication links for first,second, third, and fourth communications links 160, 170, 180, and 190are described below in relation to FIGS. 12-14.

[0043] Description in these terms is provided for convenience only. Itis not intended that the invention be limited to application in thisexample network environment. In fact, after reading the followingdescription, it will become apparent to a person skilled in the relevantart(s) how to implement the invention in alternative environments knownnow or developed in the future.

[0044] Email Campaign Generator and Tracker

[0045]FIG. 2 illustrates an exemplary email campaign generator andtracker 110, according to an embodiment of the present invention. Emailcampaign generator and tracker 110 includes an email campaign generator210, an email campaign engine 220, and a campaign tracker 230.

[0046] Email campaign generator 210 receives an email target database295. In embodiments, the email campaign generator 210 generates an emailcampaign template 280 from email target database 295. Email targetdatabase 295 includes a plurality of email targets (email addresses, forexample). In an embodiment where the email campaign is related to acollection of resumes, email target database 295 may include one or moreresumes, each with a corresponding email address for the resume owner.

[0047]FIG. 3A illustrates operation and structure of exemplary emailcampaign generator 210, according to an embodiment of the presentinvention. Email campaign generator 210 receives an email target list310. In an embodiment, email campaign generator 210 requests emailtarget list 310 according to a structured query language (SQL)statement, as would be understood by persons skilled in the relevantart(s) from the teachings herein. Email target database 295 may includeemail target list 310.

[0048] Email campaign generator 210 outputs a text message file 320 anda configuration file 330. Text message file 320 and configuration file330 are included in email campaign template 280.

[0049] Text message file 320 is a customized text message for thecurrent email campaign. Hence, text message file 320 contains a textualmessage for an email recipient. Text message file 320 also contains aseries of custom tags to be filled in with email recipient specificdata, such as the recipient's full name, other recipient specific data,and a custom URL. When a custom email is received from the current emailcampaign, the recipient may select the custom URL in the received email,which will open a web page for the recipient that the email campaignmanager desires the recipient to view.

[0050] Configuration file 330 is generated to contain data related toeach email target or recipient. The data for each email target isinsertable in the message template created from text message file 320.This data may include invariant data and variant data, as shown in FIG.3A. Invariant data may include information such as the subject line ofthe email message (i.e., “we found your resume”), and other items in theemail message that will not vary from email to email in a particularemail campaign. The invariant data may also include email source serverinformation. Variant data may include custom information used to fill inthe custom tags of text message file 320, such as full name=“JohnJones”.

[0051] In an embodiment, email campaign generator 210 creates a customURL. FIG. 3B illustrates an example email campaign generator 210,according to an embodiment of the present invention. Email campaigngenerator 210 includes a URL generator 340. In an embodiment, URLgenerator 340 uses an MD5 hash to create a custom URL for each emailtarget or recipient. Other message authentication code generators otherthan MD5 may be adapted for this use, as would be recognized by personsskilled in the relevant art(s) from the teachings herein.

[0052]FIG. 6 illustrates generation of a customized URL 660, accordingto an example embodiment of the present invention. For example, URLgenerator 340 may operate according to the operation and structure shownin FIG. 6. A custom URL address is typically generated for each emailtarget, although in some situations it may be advantageous to providethe same URL address to one or more recipients. The generated custom URLaddress for each email target is inserted as data into configurationfile 330.

[0053] As shown in FIG. 6, a hash generator 620 receives ID file 610. IDfile 610 includes a campaign ID, a version ID, and an IC (independentcontractor) ID (userid). The campaign ID is unique for each emailcampaign conducted. The version ID is the current version of textmessage file 320. The IC ID is a unique ID for the current email target.

[0054] Hash generator 620 further receives a private key 670. Privatekey 670 is a private key or password unique to the email campaign host,as would be understood by persons skilled in the relevant art(s) fromthe teachings herein.

[0055] Hash generator 620 generates a 32-byte hash 630 from the campaignID, the version ID, the IC ID, and the private key 670, for each emailtarget. For example, hash generator 620 may use MD5 to create hash 630.The invention is applicable to hash sizes other than 32-bytes, althougha 32-byte hash is provided as an example herein.

[0056] 16 bytes of the generated 32-byte hash 630 are appended to a hostweb address 680 to form customized URL 660 for each email target. Eithera first 16 bytes 640 or a second 16 bytes 650 of 32-byte hash 630 may beappended to host web address 680. Other portions of generated hash 630may also be used

[0057] Various host web addresses may be used for host web address 680.In an example embodiment, a generic host web address 680 is equal to:

hostname/module?token

[0058] where “hostname”, “module”, and “token” are replaceableparameters. “hostname” may be replaced by any addressable Internetaddress, such as “www.icplanet.com”. “module” may be replaced by anyidentifier or filename for software that handles execution of the linkof customized URL 660 when it is selected by the email recipient.“token” may be replaced with any collection of numbers or letters thatidentify unique information related to customized URL 660. For example,host web address 680 may be equal to:

www.hostname.com/rz.cfm?a=&b=&c=

[0059] where “hostname” is equal to “www.hostname.com”,“module” is equalto “rz.cfm”, and token is equal to “&a=&b=&c=”.

[0060] When an email target or recipient receives customized URL 660 inthe custom email message, the recipient may select it, to view theircustom web site, which is hosted at the email campaign host. The emailcampaign host compares the incoming URL address request to local datatables to verify the validity of the URL recipient, to allow therecipient access to the web page. Once the recipient is verified, therecipient may view and edit the web site. For example, when the web pagerepresents the recipient's resume, the recipient may edit their postedresume.

[0061] In the described embodiment, 16 bytes of the 32 byte hash areutilized because, in tools such as Eudora and Outlook, text is cut offat 72 characters, and then does a word wrap. Hence, a “clickable” URLsent via email that is longer than 72 characters would wrap, and maythen become an unexecutable link. Using 16 bytes of the 32 byte hashkeeps the URL address length below the 72 character limit, avoiding wordwrap.

[0062] As shown in FIG. 2, email campaign engine 220 receives emailcampaign template 280, and outputs email 260 and email campaign data290. Email 260 includes one or more custom email messages. Emailcampaign data 290 is described more fully elsewhere herein. FIG. 4illustrates operation and structure of an exemplary email campaignengine 220, according to an embodiment of the present invention. Emailcampaign engine 220 receives text message file 320 and configurationfile 330.

[0063] Email campaign engine 220 generates a custom email message 410corresponding to each email target in email target database 295. Emailmessage 410 is formed from email campaign template 280 (text messagefile 320 and configuration file 330). Email campaign engine 220 copiestext message file 320, and replaces each custom tag in text message file320 with corresponding data in configuration file 330, to generatecustom email message 410. For example, customized URL 660 may beinserted for a corresponding custom tag in custom email message 410.Email campaign engine 220 sends each custom email message 410 to acorresponding email target.

[0064] Email campaign engine 220 also outputs email campaign data 290.For example, email campaign data 290 includes any data that may beutilized by campaign tracker 230.

[0065] As shown in FIG. 2, campaign tracker 230 receives email campaigndata 290 and a response 270, and outputs tracking information 250. FIG.5 illustrates operation of an exemplary campaign tracker 230, accordingto an embodiment of the present invention. Campaign tracker 230 receivesa response 270 and email campaign data 290. Response 270 is typically aURL access or a sent email, which may occur through a firewall 510, whenpresent. Campaign tracker 230 outputs tracking information 250. Trackinginformation 250 includes a campaign tracking list 520.

[0066] Each response 270 corresponds to a sent custom email message 410and is received from the recipient of that sent custom email message410. For example, response 270 for a particular sent custom emailmessage 410 may be created by the email recipient by executingcustomized URL 660 in the custom email. Campaign tracker 230 createscampaign tracking list 520 that includes data related to each response270.

[0067] Campaign tracking list 520 may include links to other pages, suchas statistical data page 530 and charts 540.

[0068]FIG. 8A illustrates an exemplary campaign tracking list 520, emailcampaign history 800, according to an embodiment of the presentinvention. Email campaign history 800 illustrates various parameters andmeasured data related to a number of email campaigns. For example, emailcampaign history 800 may be displayed in a computer systemdisplay/graphical user interface.

[0069] Email campaign history 800 includes a campaign ID column 802, ahits column 804, a subject column 806, a date column 808, a message textcolumn 812, and a demographics column 814. Campaign ID column 802includes a list of identifiers for one or more email campaigns.Identifiers in campaign ID column 802 may be selected to display furtherinformation on a particular email campaign, as further described below.Hits column 804 includes an indication of the number or percentage ofsuccessful hits for email campaigns listed in campaign ID column 802.For example, a successful hit may be declared when an email recipientselects their customized URL 660. Subject column 806 provides a briefdescription for email campaigns listed in campaign ID column 802. Datecolumn 808 includes a date and time indication of the initiation ofemail campaigns listed in campaign ID column 802. Message text column812 displays an identifier for the text of an email used in emailcampaigns listed in campaign ID column 802. For example, if anidentifier in message text column 812 is selected, the text of an email,such as text message file 320 of FIG. 3A corresponding to the emailcampaign, may be displayed. Demographics column 814 allows for one ormore demographics charts to be displayed for email campaigns listed incampaign ID column 802.

[0070] By selecting a campaign ID in campaign ID column 802 of emailcampaign history 800, a user may display a campaign statistical datapage 530, as shown in FIG. 5. For example, if a first campaign ID 816 inFIG. 8A is selected, a user may display an email campaign summary 810,an example of which is shown in FIG. 8B. Email campaign summary 810shows a variety of statistical data related to the email campaign offirst campaign ID 816.

[0071] The email campaign generator and tracker of the present inventionis not limited to these implementations. The email generator andtracker, and its elements, as described in this section can be achievedusing any number of structural implementations, including hardware,firmware, software, or any combination thereof. The details of suchstructural implementations will be apparent to persons skilled in therelevant art(s) based on the teachings contained herein.

[0072] Operation

[0073] Exemplary operational and/or structural implementations relatedto the structure(s), and/or embodiments described above are presented inthis section (and its subsections). These components and methods arepresented herein for purposes of illustration, and not limitation. Theinvention is not limited to the particular examples of components andmethods described herein. Alternatives (including equivalents,extensions, variations, deviations, etc., of those described herein)will be apparent to persons skilled in the relevant art(s) based on theteachings contained herein. Such alternatives fall within the scope andspirit of the present invention.

[0074]FIG. 9 shows a flowchart providing detailed operational steps ofan example embodiment of the present invention. The steps of FIG. 9 canbe implemented in hardware, firmware, software, or a combinationthereof. For instance, the steps of FIG. 9 can be implemented by emailcampaign generator and tracker 110, and/or apportioned among emailcampaign generator 210, email campaign engine 220, and campaign tracker230. Other structural embodiments will be apparent to persons skilled inthe relevant art(s) based on the discussion contained herein. Thesesteps are described in detail below.

[0075] The process begins with step 910. In step 910, an email targetdatabase is received. In embodiments, the email target database isrequested according to a structured query language (SQL) statement, aswould be understood by persons skilled in the relevant art(s) from theteachings herein. In embodiments, the email target database is receivedfrom a resume database vendor, is generated from resume data gathered bya spider engine, or is otherwise previously generated. For example, theemail target database is email target database 295 shown in FIG. 2. Inembodiments, the email target database is generated from raw resumedocuments and/or other related data. Refer to further descriptionrelated to FIG. 7 herein for example structure for an email targetdatabase generator, and to FIG. 10 herein for example operational stepsrelated to email target database generation.

[0076] In step 920, an email related to at least one email target in thereceived email target database is generated. For example, the generatedemail campaign template is email campaign template 280, which includestext message file 320 and configuration file 330.

[0077] In step 930, an email customized for each email target is sent toeach email target, wherein each customized email is formed from theemail campaign template. In embodiments, a customized email for eachemail target is formed from the generated text message template and thegenerated configuration file. For example, the customized email iscustom email message 410.

[0078] In step 940, the sent custom email is tracked. In embodiments, atleast one response is received from a respondent corresponding to one ofthe sent customized email, and a campaign tracking list is created fromthe received at least one response. For example, campaign tracker 230receives response 270, and outputs campaign tracking list 520, as shownin FIG. 5.

[0079] In embodiments, creating the campaign tracking list includesdetermining various parameters. This may include determining a number ofsuccessful visits from respondents, determining a number of sentcustomized email that were undeliverable (e.g., email did not find theirrespective target email addresses), and determining a number ofrespondents that requested deletion.

[0080] FIGS. 11A-C illustrate flowcharts providing operationalembodiments for implementing at least a portion of the operation of step920 in FIG. 9. The steps of FIGS. 11A-C can be implemented in hardware,firmware, software, or a combination thereof. Other structuralembodiments will be apparent to persons skilled in the relevant art(s)based on the discussion contained herein. These steps are described indetail below.

[0081] The steps shown in FIG. 11A may occur in any order. The processin FIG. 11A begins with step 1110. In step 1110, a message template isgenerated. For example, the message template is text message file 320shown in FIG. 3A.

[0082] In step 1120, a configuration file is generated to contain datarelated to each email target, wherein the data for each email target isinsertable in the generated message template. For example, theconfiguration file is configuration file 330 shown in FIG. 3A.

[0083] The process in FIG. 11B begins with step 1130. In step 1130, acustom URL address is generated for each email target. For example, thecustom URL address is customized URL 660 shown in FIG. 6.

[0084] In step 1140, the generated custom URL address for each emailtarget is inserted into the configuration file.

[0085] The process in FIG. 11C begins with step 1150. In step 1150, a32-byte hash is generated from a campaign ID, a message template versionID, a user reference ID, and a private key, for each email target. Asdescribed above, MD5 or other message authentication code generator maybe used to generate the hash. Other hash sizes than 32 bytes may begenerated.

[0086] In step 1160, the first 16 bytes of the generated 32-byte hashfor each email target is appended to a host web address to form thecustom URL address for each email target. The invention is applicable toappending other portions of the hash. In an embodiment, as describedabove, the host web address may be equal to:

hostname/module?token

[0087] where “hostname”, “module”, and “token” are replaceableparameters that are more fully described above.

[0088] These embodiments are provided for purposes of illustration, andare not intended to limit the invention. Alternate embodiments,differing slightly or substantially from those described herein, will beapparent to persons skilled in the relevant art(s) based on theteachings contained herein.

[0089] Email Target Database

[0090]FIG. 7 illustrates an exemplary email target database generator700, according to an embodiment of the present invention. For example,email target database generator 700 may generate email target database295 shown in FIG. 2. For exemplary purposes, email target databasegenerator 700 is described below in reference to the processing ofcollected resumes. It will be understood by a person skilled in therelevant art(s) from the teachings herein, that the email targetdatabase generator 700 of the present invention is applicable to theprocessing of any document type.

[0091] Email target database generator 700 includes a resume parser 710,a resume auto-categorizer, adatabase inserter 730, and anemail-de-duplicator 740.

[0092] Email target database generator 700 receives raw data 750. Inembodiments, raw data 750 may be a collection of resumes, or otherresume related data. As described above, in alternative embodiments, rawdata 750 may include a collection of other types of documentation orinformation. This data may be based on templates and other descriptorfiles.

[0093] Resume parser 710 receives raw data 750. Resume parser 710includes one or more programs that identify parts of a resume. Resumeparser 710 detects sections of resumes (e.g., education, summary, workhistory, etc.), and breaks the resumes into separate series of files. Inalternative embodiments, parser 710 may be adapted to parsing otherdocument types or information.

[0094] Resume auto-categorizer 720 receives the output of resume parser710. Resume auto-categorizer 720 analyzes the received collection ofinformation, and executes a keyword matching operation on theinformation. For example, in an embodiment related to resumes, resumeauto-categorizer 720 maintains a list of job categories and wholecollection of associated keywords, scores the keywords (e.g., if itfinds a keyword many times in a resume, it gives that resume a highscore). For instance, one particular resume may receive a rating of “10”in information technology, and a “2” in management.

[0095] Database inserter 730 receives the output of resumeauto-categorizer, and inserts all of the resume-related information, orother information, into a database.

[0096] Email de-duplicator 740 receives the output of database inserter730, and searches for duplicate email addresses due potentially due toduplicate resumes or other documents collected. Email de-duplicator 740eliminates duplicates so that each email target receives a single customemail.

[0097] Email de-duplicator outputs resume database information 760,which in an embodiment may be all or a portion of email target database295.

[0098] The email target database generator of the present invention isnot limited to these implementations. The email target databasegenerator as described in this section can be achieved using any numberof structural implementations, including hardware, firmware, software,or any combination thereof. The details of such structuralimplementations will be apparent to persons skilled in the relevantart(s) based on the teachings contained herein.

[0099]FIG. 10 shows a flowchart providing detailed operational steps ofan example embodiment of the email target database generator of thepresent invention. The steps of FIG. 10 can be implemented in hardware,firmware, software, or a combination thereof. For instance, the steps ofFIG. 10 can be implemented by email target database generator 700,and/or apportioned among resume parser 710, resume auto-categorizer 720,database inserter 730, and email de-duplicator 740. Furthermore, thesteps of FIG. 10 do not necessarily have to occur in the order shown, aswill be apparent to persons skilled in the relevant art(s) based on theteachings herein. Other structural embodiments will be apparent topersons skilled in the relevant art(s) based on the discussion containedherein. These steps are described in detail below.

[0100] The process begins with step 1010. In step 1010, at least one rawdocument is collected. For example, the one or more raw documents may beresumes.

[0101] In step 1020, the collected at least one document is parsed.

[0102] In step 1030, the parsed at least one document is categorizedinto at least one category. For example, when the documents are resumes,the at least one category may be at least one job category.

[0103] In step 1040, the at least one document is inserted into adatabase.

[0104] In step 1050, documents corresponding to duplicate emailaddresses are removed from the database.

[0105] These embodiments are provided for purposes of illustration, andare not intended to limit the invention. Alternate embodiments,differing slightly or substantially from those described herein, will beapparent to persons skilled in the relevant art(s) based on theteachings contained herein.

[0106] Example Network Environment

[0107] The present invention can be implemented in conjunction with anycommunication network, such as the Internet, which supports interactiveservices and applications. In particular, the present invention can beimplemented in any Web service, preferably a Web service supportingsecure transactions, such as, the Secure Socket Layer (SSL) protocoland/or using a Secure HyperText Transport Protocol (S-HTTP). In oneexample, the present invention is implemented in a multi-platform(platform independent) programming language such as Java 1.1.Java-enabled browsers are used, such as, Netscape, HotJava, andMicrosoft Explorer browsers. Active content Web pages can be used. Suchactive content Web pages can include Java applets or ActiveX controls,or any other active content technology developed now or in the future.The present invention, however, is not intended to be limited to Java orJava-enabled browsers, and can be implemented in any programminglanguage and browser, developed now or in the future, as would beapparent to a person skilled in the art given this description.

[0108]FIG. 12 is a diagram of an example internetwork environmentaccording to the present invention. FIG. 12 shows a communicationnetwork or combination of networks (Internet) 1200, which can supportthe invention. Internet 1200 consists of interconnected computers thatsupport communication between many different types of users includingbusinesses, universities, individuals, government, and financialinstitutions. Internet 1200 supports many different types ofcommunication links implemented in a variety of architectures. Forexample, voice and data links can be used including phone, paging,cellular, and cable TV (CATV) links. Terminal equipment can includelocal area networks, personal computers with modems, content servers ofmulti-media, audio, video, and other information, pocket organizers,Personal Data Assistants (PDAs), and set-top boxes.

[0109] Communication over a communication network, such as Internet1200, is carried out through different layers of communication. FIG. 13shows a simplified four-layered communication model supporting Webcommerce including an application layer 1308, transport layer 1310,Internet layer 1320, physical layer 1330. As would be apparent to aperson skilled in the art, in practice, a number of different layers canbe used depending upon a particular network design and communicationapplication. Application layer 1308 represents the different tools andinformation services which are used to access the information over theInternet. Such tools include, but are not limited to, Telnet log-inservice 1301, IRC chat 1302, Web service 1303, and SMTP (Simple MailTransfer Protocol) electronic mail service 1306. Web service 1303 allowsaccess to HTTP documents 1304, and FTP and Gopher files 1305. A SecureSocket Layer (SSL) is an optional protocol used to encryptcommunications between a Web browser and Web server.

[0110] Description of the example environment in these terms is providedfor convenience only. It is not intended that the invention be limitedto application in this example environment. In fact, after reading thefollowing description, it will become apparent to a person skilled inthe relevant art how to implement the invention in alternativeenvironments.

[0111] Example Computer System

[0112] An example of a computer system 1440 is shown in FIG. 14. Thecomputer system 1440 represents any single or multi-processor computer.Single-threaded and multi-threaded computers can be used. Unified ordistributed memory systems can be used.

[0113] Computer system 1440 includes one or more processors, such asprocessor 1444. One or more processors 1444 can execute softwareimplementing routine 400 as described above. Each processor 1444 isconnected to a communication infrastructure 1442 (e.g., a communicationsbus, cross-bar, or network). Various software embodiments are describedin terms of this exemplary computer system. After reading thisdescription, it will become apparent to a person skilled in the relevantart how to implement the invention using other computer systems and/orcomputer architectures.

[0114] Computer system 1440 also includes a main memory 1446, preferablyrandom access memory (RAM), and can also include a secondary memory1448. The secondary memory 1448 can include, for example, a hard diskdrive 1450 and/or a removable storage drive 1452, representing a floppydisk drive, a magnetic tape drive, an optical disk drive, etc. Theremovable storage drive 1452 reads from and/or writes to a removablestorage unit 1454 in a well known manner. Removable storage unit 1454represents a floppy disk, magnetic tape, optical disk, etc., which isread by and written to by removable storage drive 1452. As will beappreciated, the removable storage unit 1454 includes a computer usablestorage medium having stored therein computer software and/or data.

[0115] In alternative embodiments, secondary memory 1448 can includeother similar means for allowing computer programs or other instructionsto be loaded into computer system 1440. Such means can include, forexample, a removable storage unit 1462 and an interface 1460. Examplescan include a program cartridge and cartridge interface (such as thatfound in video game devices), a removable memory chip (such as an EPROM,or PROM) and associated socket, and other removable storage units 1462and interfaces 1460 which allow software and data to be transferred fromthe removable storage unit 1462 to computer system 1440.

[0116] Computer system 1440 can also include a communications interface1464. Communications interface 1464 allows software and data to betransferred between computer system 1440 and external devices viacommunications path 1466. Examples of communications interface 1464 caninclude a modem, a network interface (such as Ethernet card), acommunications port, etc. Software and data transferred viacommunications interface 1464 are in the form of signals which can beelectronic, electromagnetic, optical or other signals capable of beingreceived by communications interface 1464, via communications path 1466.Note that communications interface 1464 provides a means by whichcomputer system 1440 can interface to a network such as the Internet.

[0117] The present invention can be implemented using software running(that is, executing) in an environment similar to that described abovewith respect to FIG. 12. In this document, the term “computer programproduct” is used to generally refer to removable storage drive 1452, ahard disk installed in hard disk drive 1450, or a carrier wave carryingsoftware over a communication path 1466 (wireless link or cable) tocommunication interface 1464. A computer useable medium can includemagnetic media, optical media, or other recordable media, or media thattransmits a carrier wave or other signal. These computer programproducts are means for providing software to computer system 1440. Forinstance, in embodiments, email campaign generator and tracker 110 isimplemented as one or more computer programs. Furthermore, the examplemodules of email campaign generator and tracker 110 shown in FIG. 2, maybe implemented as one or more separate computer programs.

[0118] Computer programs (also called computer control logic) are storedin main memory 1446 and/or secondary memory 1448. Computer programs canalso be received via communications interface 1464. Such computerprograms, when executed, enable the computer system 1440 to perform thefeatures of the present invention as discussed herein. In particular,the computer programs, when executed, enable the processor 1444 toperform the features of the present invention. Accordingly, suchcomputer programs represent controllers of the computer system 1440.

[0119] The present invention can be implemented as control logic insoftware, firmware, hardware or any combination thereof. In anembodiment where the invention is implemented using software, thesoftware may be stored in a computer program product and loaded intocomputer system 1440 using removable storage drive 1452, hard drive1450, or interface 1460. Alternatively, the computer program product maybe downloaded to computer system 1440 over communications path 1466. Thecontrol logic (software), when executed by the one or more processors1444, causes the processor(s) 1444 to perform the functions of theinvention as described herein.

[0120] In another embodiment, the invention is implemented primarily infirmware and/or hardware using, for example, hardware components such asapplication specific integrated circuits (ASICs). Implementation of ahardware state machine so as to perform the functions described hereinwill be apparent to persons skilled in the relevant art(s).

[0121] Conclusion

[0122] While various embodiments of the present invention have beendescribed above, it should be understood that they have been presentedby way of example only, and not limitation. It will be apparent topersons skilled in the relevant art that various changes in form anddetail can be made therein without departing from the spirit and scopeof the invention. Thus, the breadth and scope of the present inventionshould not be limited by any of the above-described exemplaryembodiments, but should be defined only in accordance with the followingclaims and their equivalents.

What is claimed is:
 1. A method for conducting an email campaign,comprising the steps of: (1) receiving an email target database; (2)generating an email campaign template related to at least one emailtarget in the received email target database; (3) sending to each of theat least one email target a corresponding custom email, wherein thecustom email is formed from the email campaign template; and (4)tracking the custom email sent to each of the at least one email target.2. The method of claim 1, wherein step (1) comprises the step of: (a)generating the email target database.
 3. The method of claim 2, whereinstep (a) comprises the steps of: (i) collecting at least one rawdocument; (ii) parsing said collected at least one document; (iii)categorizing said parsed at least one document into at least onecategory; (iv) inserting said at least one document into a database; and(v) removing documents from the database corresponding to duplicateemail addresses.
 4. The method of claim 1, wherein step (1) comprisesthe step of: (a) requesting an email target database according to astructured query language statement.
 5. The method of claim 1, whereinstep (1) comprises the step of: (a) receiving an email target databasefrom a database vendor.
 6. The method of claim 1, wherein step (2)comprises the steps of: (a) generating a message template; and (b)generating a configuration file to contain data related to each of theat least one email target, wherein the data is insertable in thegenerated message template.
 7. The method of claim 6, wherein step (b)comprises the steps of: (i) generating a custom uniform resource locatoraddress for each of the at least one email target; and (ii) insertingthe generated custom uniform resource locator address for each of the atleast one email target into the configuration file.
 8. The method ofclaim 7, wherein step (i) comprises the steps of: (A) generating a hashfrom a campaign ID, a message template version ID, a user reference ID,and a private key, for each of the at least one email target; and (B)appending a first portion of the generated hash for each of the at leastone email target to a host web address to form the custom uniformresource locator address for each of the at least one email target. 9.The method of claim 8, wherein the host web address is equal to:hostname/module?token where hostname is replaced with an email campaignhost Internet address, module is replaced with an identifier forsoftware located at the email campaign host directed to processing thecustom uniform resource locator address for each email target after itis selected, and token is replaced with any alphanumeric identifier forunique information related to the customized uniform resource locatoraddress for each of the at least one email target.
 10. The method ofclaim 6, wherein step (3) comprises the step of: (a) forming the customemail for each of the at least one email target from the generated textmessage template and the generated configuration file.
 11. The method ofclaim 1, wherein step (4) comprises the steps of: (a) receiving at leastone response from the at least one email target; and (b) creating acampaign tracking list from said received at least one response.
 12. Themethod of claim 11, wherein step (b) comprises the steps of: (i)determining a number of successful visits from the at least one emailtarget; (ii) determining a number of the custom email sent to the atleast one email target that were undeliverable; and (iii) determining anumber of the at least one email target that requested deletion.
 13. Asystem for generating and tracking an email campaign, comprising: anemail campaign generator that generates an email campaign template froman email target database, wherein said email target database comprisesan email target; an email campaign engine that generates a custom emailcorresponding to said email target, wherein said custom email is formedfrom said email campaign template, wherein said email campaign enginesends said custom email to said email target; and a campaign trackerthat receives a response corresponding to said sent custom email, andwherein said campaign tracker creates a campaign tracking list thatincludes said received response.
 14. The system of claim 13, whereinsaid email campaign template comprises: a text message; and aconfiguration file that includes data from said email target databasecorresponding to said email target.
 15. The system of claim 14, whereinsaid email campaign engine makes a copy of said text message to generatesaid custom email.
 16. The system of claim 15, wherein said emailcampaign engine replaces at least one custom tag in said text messagecopy with a corresponding portion of said configuration file data. 17.The system of claim 14, wherein said email campaign generator comprisesa custom uniform resource locator generator that creates a customuniform resource locator address for said email target, wherein saidconfiguration file includes said custom uniform resource locator addressin said data.
 18. The system of claim 17, wherein said custom uniformresource locator generator generates a hash from a campaign ID, amessage template version ID, a user reference ID, and a private key, forsaid email target, and appends at least a portion of the generated hashto a host web address to form said custom uniform resource locatoraddress for said email target.
 19. The system of claim 18, wherein saidhost web address is equal to: hostname/module?token where hostname isreplaced with an email campaign host Internet address, module isreplaced with an identifier for software located at the email campaignhost directed to processing said custom uniform resource locator addressfor said email target after it is selected, and token is replaced withany alphanumeric identifier for unique information related to saidcustom uniform resource locator address for said email target.