Abstract:
Bridging encrypted datasets is provided. A system transmits, to a server, a first identifier vector encrypted with a first encryption that is commutative. The system receives an encrypted first identifier vector encrypted based on the first encryption and encrypted by a second encryption associated with the server. The system receives a second identifier vector encrypted based on the second encryption. The system encrypts the second identifier vector with the first encryption to generate an encrypted second identifier vector that is encrypted based on the second encryption and further encrypted based on the first encryption. The system determines a correlation count between the encrypted first identifier vector and the encrypted second identifier vector. The system generates one identifier key for both the first identifier and the second identifier. The system can provide the one identifier key for input into an application to process interactions.
Abstract:
Systems and methods of cryptographically protecting location data transferred between servers via a network to tune a location engine are described herein. A first encryption module determines a first hash value for each location determination, encrypts the first hash value for each location determination using a first encryption protocol to generate a first encrypted data set, and transmits the first encrypted data set to a server. The first encryption module receives, from the server, a second encrypted data set with second hash values generated by a second encryption module of the server using a second encryption protocol. The first encryption module creates a first double encrypted data set from the second encrypted data set. A tuner compares the first double encrypted data set with a second double encrypted data set received from the server to adjust the location engine.
Abstract:
Systems and methods of cryptographically protecting location data transferred between servers via a network to tune a location engine are described herein. A first encryption module determines a first hash value for each location determination, encrypts the first hash value for each location determination using a first encryption protocol to generate a first encrypted data set, and transmits the first encrypted data set to a server. The first encryption module receives, from the server, a second encrypted data set with second hash values generated by a second encryption module of the server using a second encryption protocol. The first encryption module creates a first double encrypted data set from the second encrypted data set. A tuner compares the first double encrypted data set with a second double encrypted data set received from the server to adjust the location engine.
Abstract:
Location modeling may be generated for candidate locations based on validated location data. The location models for candidate locations may be based on validated location data associated with wireless access points that is validated using transaction data. Such validation may include comparing an identifier associated with candidate location data received from a client device to an identifier for a transaction account associated with a transaction from transaction data at a candidate location. Matching transaction data and candidate location data may generate validated location data to be used in generating location models for candidate locations.
Abstract:
Systems and methods of correlating an online content interaction with an offline content interaction are provided. A data processing system can identify an online conversion by a first computing device of a content item associated with a content provider, provide an online conversion identifier to an offline conversion identification unit, receive from the offline conversion identification unit detection data indicating that the offline conversion identification unit has detected the online conversion identifier on one of the first computing device and a second computing device, and provide the detection data to a content provider computing device associated with the content provider.
Abstract:
Systems and methods of estimating call conversion rates are described herein. The system can include a conversion tracker, which can receive, from a client device, an identification of a conversion event at a first time. The conversion event can be associated with a content item, content item provider, and phone number of a content item provider. The conversion tracker can transmit a request that can include the identification of the conversion event. Once received, the client device can scan the call log for the phone number and send an response indicating the phone number's existence. The conversion tracker can determine a time window in which the client device called the content provider. The conversion tracker can also aggregate the responses across multiple client devices to estimate the call conversion rate for the content item associated with the content provider.
Abstract:
Systems and methods of estimating call conversion rates are described herein. The system can include a conversion tracker, which can receive, from a client device, an identification of a conversion event at a first time. The conversion event can be associated with a content item, content item provider, and phone number of a content item provider. The conversion tracker can transmit a request that can include the identification of the conversion event. Once received, the client device can scan the call log for the phone number and send an response indicating the phone number's existence. The conversion tracker can determine a time window in which the client device called the content provider. The conversion tracker can also aggregate the responses across multiple client devices to estimate the call conversion rate for the content item associated with the content provider.
Abstract:
Systems and methods of matching identifiers between multiple datasets are described herein. A system can transmit a first identifier vector to a third party server. The first identifier vector can include a first identifier, first parameters, and second parameters. The system can receive, from the third party server, the first identifier vector encrypted based on a third-party encryption. The system can receive, from the third party server, a second identifier vector encrypted based on the third-party encryption associated with the third party server. The second identifier vector can include a second identifier, third parameters, and fourth parameters. The system can determine a correlation count between the first identifier vector and the second identifier vector. The system can determine that the first identifier corresponds to the second identifier based on the correlation count. The system can generate one identifier key for both the first identifier and the second identifier.
Abstract:
A method, includes receiving a first data packet with transaction data representing a transaction of a user at a storefront. The transaction data is parsed and decrypted to obtain a first identifier. The method further includes receiving a second data packet with interaction data representing an interaction with a content item on a resource. A log file is created that indexes the interaction data, including a second identifier. The transaction data and interaction data are compared, and it is determined if the first identifier and the second identifier are both associated with the user. The method further includes attributing the transaction at the storefront to the interaction of the user with the content item in response to the determination that the first identifier and the second identifier are both associated with the user. Conversion data is generated and stored indicating the attribution.
Abstract:
Systems and methods of matching identifiers between multiple datasets are described herein. A system can transmit a first identifier vector to a third party server. The first identifier vector can include a first identifier, first parameters, and second parameters. The system can receive, from the third party server, the first identifier vector encrypted based on a third-party encryption. The system can receive, from the third party server, a second identifier vector encrypted based on the third-party encryption associated with the third party server. The second identifier vector can include a second identifier, third parameters, and fourth parameters. The system can determine a correlation count between the first identifier vector and the second identifier vector. The system can determine that the first identifier corresponds to the second identifier based on the correlation count. The system can generate one identifier key for both the first identifier and the second identifier.