Abstract:
A method for linking user identifiers. The method includes receiving, by a linking server and from a company server, a first data structure comprising entries. Each entry comprising a user tag, a first hashed user information, and a second hashed user information. The method includes receiving, by a linking server and from a partner server, a second data structure comprising entries. Each entry comprising a bridge tag, a first hashed bridge information, and a second hashed bridge information. The method includes retrieving, by the linking server and from the first data structure, a first entry of the entries and retrieving, by the linking server and from the second data structure, a first entry of the entries. The method includes linking the user tag of the first entry of the first data structure to the bridge tag of the first entry of the second data structure to generate a first linkage.
Abstract:
Multi-computing device network based cross-device conversion determination is described. A content selection computer server can identify cross-device conversions. A first computing device accesses third-party content via a first computer network connection. A second computing device accesses a webpage of the third-party content provider via a second computer network connection. The first and devices can be logged into a same online account. The content selection computer server can obtain, via a content tag that includes a script that executes on a webpage that includes the third-party content, data indicating that the first computing device accessed the third-party content. The selection computer server determines the conversion from the content tag and the second computing device having accessed the webpage. Based on a percentage of first and second sets of computing devices that have logged into common respective online accounts, the content selection computer server extrapolates an estimated number of cross-device conversions.
Abstract:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting and utilizing conversion data are disclosed. In one aspect, a method includes receiving an indication of a user interaction with an advertisement presented at a user device; receiving a user identifier corresponding to the user device; determining that the first application was installed on the user device, based at least in part on a device identifier of the user device being received with installation data corresponding to the installation; receiving, from a second application installed on the user device, (1) the user identifier and (2) the device identifier of the user device; determining, based on receipt of the user identifier and device identifier from the second application that the installation of the first application is attributable to the user interaction.
Abstract:
Bridging encrypted datasets is provided. A system transmits, to a server, a first identifier vector encrypted with a first encryption that is commutative. The system receives an encrypted first identifier vector encrypted based on the first encryption and encrypted by a second encryption associated with the server. The system receives a second identifier vector encrypted based on the second encryption. The system encrypts the second identifier vector with the first encryption to generate an encrypted second identifier vector that is encrypted based on the second encryption and further encrypted based on the first encryption. The system determines a correlation count between the encrypted first identifier vector and the encrypted second identifier vector. The system generates one identifier key for both the first identifier and the second identifier. The system can provide the one identifier key for input into an application to process interactions.
Abstract:
A method for linking user identifiers. The method includes receiving, by a linking server and from a company server, a first data structure comprising entries. Each entry comprising a user tag, a first hashed user information, and a second hashed user information. The method includes receiving, by a linking server and from a partner server, a second data structure comprising entries. Each entry comprising a bridge tag, a first hashed bridge information, and a second hashed bridge information. The method includes retrieving, by the linking server and from the first data structure, a first entry of the entries and retrieving, by the linking server and from the second data structure, a first entry of the entries. The method includes linking the user tag of the first entry of the first data structure to the bridge tag of the first entry of the second data structure to generate a first linkage.
Abstract:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting and utilizing conversion data are disclosed. In one aspect, the system can receive an indication of a user interaction with content item presented at a user device. Based at least in part on a device identifier of the user device being received with installation data corresponding to the installation of an application, the system can attribute a conversion of the content item to the user interaction.
Abstract:
Example processes may include identifying online activity associated with content from a content provider; determining a first set of identification information, where the first set of identification information identifies users corresponding to the identified online activity associated with the content from the content provider; transmitting the first set of identification information to a first service and receiving, in return, a second set of different identification information; transmitting items of the second set of different identification information to a second different service and receiving, in return, aggregated offline transaction information corresponding to a set of transactions for users that are included in the second set of different identification information; attributing transactions indicated by the aggregated offline transaction information; and providing a report to the content provider that is based on the aggregated offline transaction information.
Abstract:
Systems and methods of matching identifiers between multiple datasets are described herein. A system can transmit a first identifier vector to a third party server. The first identifier vector can include a first identifier, first parameters, and second parameters. The system can receive, from the third party server, the first identifier vector encrypted based on a third-party encryption. The system can receive, from the third party server, a second identifier vector encrypted based on the third-party encryption associated with the third party server. The second identifier vector can include a second identifier, third parameters, and fourth parameters. The system can determine a correlation count between the first identifier vector and the second identifier vector. The system can determine that the first identifier corresponds to the second identifier based on the correlation count. The system can generate one identifier key for both the first identifier and the second identifier.
Abstract:
A method, includes receiving a first data packet with transaction data representing a transaction of a user at a storefront. The transaction data is parsed and decrypted to obtain a first identifier. The method further includes receiving a second data packet with interaction data representing an interaction with a content item on a resource. A log file is created that indexes the interaction data, including a second identifier. The transaction data and interaction data are compared, and it is determined if the first identifier and the second identifier are both associated with the user. The method further includes attributing the transaction at the storefront to the interaction of the user with the content item in response to the determination that the first identifier and the second identifier are both associated with the user. Conversion data is generated and stored indicating the attribution.
Abstract:
Systems and methods of matching identifiers between multiple datasets are described herein. A system can transmit a first identifier vector to a third party server. The first identifier vector can include a first identifier, first parameters, and second parameters. The system can receive, from the third party server, the first identifier vector encrypted based on a third-party encryption. The system can receive, from the third party server, a second identifier vector encrypted based on the third-party encryption associated with the third party server. The second identifier vector can include a second identifier, third parameters, and fourth parameters. The system can determine a correlation count between the first identifier vector and the second identifier vector. The system can determine that the first identifier corresponds to the second identifier based on the correlation count. The system can generate one identifier key for both the first identifier and the second identifier.