Abstract:
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. A linking is provided of identifiers for users or devices known to a content delivery service. Each identifier is associated with the user or device in a specific context. The linking includes first and second identifiers. A request for content is received that includes either the first or second identifier. Bidders in an exchange are identified that have expressed an interest in bidding on a content delivery opportunity associated with the user or the device. For each bidder, a relative value is determined for a respective bidder for the opportunity to present content to the user or device in association with each identifier known to the bidder. For each bidder, a real-time bid request is generated in the exchange that includes the highest value identifier for submission to a respective bidder.
Abstract:
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. A linking is provided of identifiers for users or devices known to a content delivery service. Each identifier is associated with the user or device in a specific context. The linking includes first and second identifiers. A request for content is received that includes either the first or second identifier. Bidders in an exchange are identified that have expressed an interest in bidding on a content delivery opportunity associated with the user or the device. For each bidder, a relative value is determined for a respective bidder for the opportunity to present content to the user or device in association with each identifier known to the bidder. For each bidder, a real-time bid request is generated in the exchange that includes the highest value identifier for submission to a respective bidder.
Abstract:
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. A linking is provided of identifiers for users or devices known to a content delivery service. Each identifier is associated with the user or device in a specific context. The linking includes first and second identifiers. A request for content is received that includes either the first or second identifier. Bidders in an exchange are identified that have expressed an interest in bidding on a content delivery opportunity associated with the user or the device. For each bidder, a relative value is determined for a respective bidder for the opportunity to present content to the user or device in association with each identifier known to the bidder. For each bidder, a real-time bid request is generated in the exchange that includes the highest value identifier for submission to a respective bidder.
Abstract:
Systems and methods in which an intermediary server provides a proxy token value in lieu of a stable token value to a third-party. The intermediary server identifies a stable token value associated with a first-party and accesses a knowledge base to determine a length of time since a third-party used a first proxy token value in a prior action, where the first proxy token value had previously been presented to the third-party in lieu of the stable token value. The intermediary server determines that the length of time since the third-party used the proxy token value in the prior action exceeds a maximum reliability time threshold and, responsive to the determination, generates a second proxy token value. The intermediary server then provides, to the third-party, an invitation to use the second proxy token value in an action, the invitation omitting the stable token value and the first proxy token value.
Abstract:
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium for providing content. A method includes: receiving a first request for filling a slot on a first publisher page, the request including an encrypted publisher cookie; providing content responsive to the request; upon receipt of an indication that a user interacted with the content, creating and providing a content serving system cookie; linking the received encrypted publisher cookie with the content serving system cookie; receiving a second, different request for content in association with rendering a second, different publisher page, the second, different request including an encrypted publisher cookie associated with the second different publisher page and the previously provided content serving system cookie; linking the received encrypted publisher cookie associated with the second, different publisher page with the encrypted publisher cookie associated with the first publisher page; and using the linkings to determine content to deliver.
Abstract:
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. An indication of receipt of a request is received from a user device to navigate to a first web based resource. The request includes an appended cookie when one is available on the requesting device. Partner web based resources are identified in a co-operative that includes the first web based resource. A code segment is provided that is configured to send, to respective entities associated with the identified partner web based resources, a second request to share user data with the first web based resource. The shared user data is data collected by a respective partner web based resource and is associated with the user device. The shared data is data that was collected by an entity associated with the respective partner web based resource and associated with the user device.
Abstract:
A computer-implemented method is provided that includes propagating a first identifier and a first key to one or more cipher engines on a computing system, the one or more cipher engines configured to perform at least one of decryption and encryption based on a first cryptographic scheme from a plurality of cryptographic schemes identified by the first identifier, and the first key; on expiration of the first identifier and the first key, propagating a second identifier and a second key to the one or more cipher engines on the computing system and instructions for configuring the one or more cipher engines to change the first cryptographic scheme to a second cryptographic scheme based on the second identifier and the second key; and setting a time window beyond the expiration for acceptance of messages encrypted in the first cryptographic scheme and messages encrypted in the second cryptographic scheme.
Abstract:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for selecting content items for presentation along with publisher resources. In one aspect, a method includes receiving a request for a content item for presentation at a user device with a publisher resource; receiving, from a content item provider a first selection value for each of a plurality of content items provided by the content item provider; determining, for each of the content items and using accessed distribution parameters, a second selection value distinct from the first selection value; and determining, for each of the content items and independent of a bid corresponding to the content item, a combined selection value based on the first selection value for the content item and the second selection value for the content item.
Abstract:
A location of a client device may be obscured by using generated random offsets and/or a set of regions. In one implementation, the location of a client device may be obscured using a first random offset and a second random offset. A pseudo-location may be determined based on the location of the client device, the first random offset, and the second random offset. The pseudo-location may be transmitted to a third-party for a location-based service. In another implementation, the location of a client device may be obscured using a first random offset and a set of regions. An intermediate location may be determined based on the location of the client device and the first random offset. A region of the set of regions may be determined based on the intermediate location. A pseudo-location may be transmitted to a third-party for a location-based service based on the determined region.
Abstract:
Systems and methods for multi-function and multi-purpose cryptography are described, including obtaining a message to be encrypted by a cipher engine configured to perform encryption using a plurality of predetermined tags with an encryption function; determining a tag of the plurality of predetermined tags based on the message; encrypting, by the cipher engine, the message using the tag to produce a ciphertext; and sending the ciphertext.