US20210174398A1 - Method and system for identifying users across mobile and desktop devices - Google Patents

Method and system for identifying users across mobile and desktop devices Download PDF

Info

Publication number
US20210174398A1
US20210174398A1 US17/114,445 US202017114445A US2021174398A1 US 20210174398 A1 US20210174398 A1 US 20210174398A1 US 202017114445 A US202017114445 A US 202017114445A US 2021174398 A1 US2021174398 A1 US 2021174398A1
Authority
US
United States
Prior art keywords
user
social media
partner
advertisement
identifiers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/114,445
Inventor
Chinmoy Dutta
Santosh Kancha
Junjun Li
Wanchen Lu
Milind Mahajan
Sandeep Pandey
Xiaochuan Qin
Ameet Ranadive
Vibhor Rastogi
Shariq Rizvi
Abhishek Shrivastava
Yimin Wu
Lei Zhang
Ke Zhou
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Twitter Inc
Original Assignee
Twitter Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Twitter Inc filed Critical Twitter Inc
Priority to US17/114,445 priority Critical patent/US20210174398A1/en
Publication of US20210174398A1 publication Critical patent/US20210174398A1/en
Assigned to TWITTER, INC. reassignment TWITTER, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: QIN, XIAOCHUAN, LU, WANCHEN, ZHANG, LEI, MAHAJAN, MILIND, PANDEY, SANDEEP, RASTOGI, VIBHOR, SHRIVASTAVA, ABHISHEK, WU, YIMIN, RIZVI, SHARIQ, DUTTA, CHINMOY, KANCHA, SANTOSH, ZHOU, KE
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TWITTER, INC.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TWITTER, INC.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TWITTER, INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0267Wireless devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0269Targeted advertisements based on user profile or attribute
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • H04L67/22
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Definitions

  • a user activity may be tracked, for example, in cases in which a user is logged into a service, e.g., a social media service or an email service, where a unique user ID is used by the service to identify the user, regardless of the device being used. While the aforementioned mechanism may be useful in tracking logged-in users, the above mechanism is unable to track activities of users that are not logged-in to a service.
  • a service e.g., a social media service or an email service
  • Embodiments of the technology enable the identification of users across multiple devices including mobile and desktop devices. More specifically, embodiments of the invention enable analysis of different identifiers in order to ascertain that distinct identifiers are associated with the same user. The aforementioned process may be referred to as ID bridging (i.e., determining that two identifiers are associated with the same user).
  • ID bridging i.e., determining that two identifiers are associated with the same user.
  • Embodiments of the invention use the results of deterministic ID bridging in order to train a classifier which is subsequently used to perform probabilistic ID bridging. Deterministic bridging may be used whenever dispositive proof exists that two particular identifiers are associated with the same user.
  • Probabilistic ID bridging may be used whenever there is a reasonable probability that two particular identifiers are associated, but for which no dispositive proof has been obtained. Probabilistic bridging can be implemented programmatically by machine learning systems that apply heuristics over vast data on various digital foot prints that may be linked to a particular user. This two-phase approach to ID bridging enables additional bridges to be created, where such bridges could not be created using only deterministic ID bridging. For example, in certain implementations of the invention the use of the combination of deterministic ID bridging and probabilistic ID bridging may result in a 2.5 times increase in the number of bridges that may be created as compared with only using deterministic ID bridging. In certain embodiments the probabilistic ID bridging may rely on certain features such as IP addresses, time windows, weights, and/or probabilities.
  • results of the ID bridging may facilitate attribution of, for example, a purchase to an ad viewed elsewhere by the same user.
  • ID bridging may further be performed to obtain additional knowledge about the identity of a user. For example, if one identifier includes the social media ID of the user, and another identifier includes a location, contact information, or other user, it may be beneficial to join these elements to obtain a more comprehensive user profile. Any type of information associated with any identifier may be included in the common profile.
  • Knowledge about a user's identity, her location, interests and/or behaviors, obtained by combining information about the user associated with various identifiers, may be used for targeting the user with custom advertisements.
  • the invention relates to a method for conversion attribution, including obtaining a first identifier associated with a first device, obtaining a second identifier associated with a second device, bridging the first identifier and the second identifier based on a determination, made by a probabilistic classifier, that the first identifier and the second identifier are associated with a common user, and attributing, using the bridge, a conversion on a website accessed using the second device.
  • the invention relates to a non-transitory computer readable medium including instructions for performing a method, the method comprising performing deterministic ID bridging to obtain a set of deterministic ID bridges, training a probabilistic classifier using the set of deterministic ID bridges, obtaining a first identifier associated with a first device and a second identifier associated with a second device.
  • the method further comprises, after the training: bridging the first identifier and the second identifier based on a determination, made by the probabilistic classifier, that the first identifier and the second identifier are associated with a common user, and attributing, using the bridge, a conversion on a website accessed using the second device, wherein the conversion is attributed when the user accesses the webpage within a predetermined period of time after viewing an advertisement on the first device.
  • FIG. 1A shows a system in accordance with one or more embodiments of the invention.
  • FIG. 1B shows mappings between various identifiers in accordance with one or more embodiments of the invention.
  • FIG. 2 shows a method for bridging identifiers using a deterministic method in accordance with one or more embodiments of the invention.
  • FIG. 3A and 3B show methods for bridging identifiers using a probabilistic method in accordance with one or more embodiments of the invention.
  • FIG. 4 shows a method for conversion attribution in accordance with one or more embodiments of the invention.
  • FIG. 5 shows a method for targeting advertisements in accordance with one or more embodiments of the invention.
  • FIG. 6 shows an example in accordance with one or more embodiments of the invention.
  • FIG. 7 shows an example computing system.
  • ordinal numbers e.g., first, second, third, etc.
  • an element i.e., any noun in the application.
  • the use of ordinal numbers is not to imply or create any particular ordering of the elements nor to limit any element to being only a single element unless expressly disclosed, such as by the use of the terms “before”, “after”, “single”, and other such terminology. Rather, the use of ordinal numbers is to distinguish between the elements.
  • a first element is distinct from a second element, and the first element may encompass more than one element and succeed (or precede) the second element in an ordering of elements.
  • embodiments of the invention relate to a method and system for determining the relationships between various identifiers used in computing systems and then using these determined relationships to understand how users are interacting with various content (including advertisements) within websites and mobile applications.
  • the aforementioned relationships may be established using both deterministic and/or probabilistic approaches. Further, the results of the deterministic ID bridging may be used to train a classifier that is subsequently used for probabilistic ID bridging. Each of these approaches is discussed below.
  • One or more embodiments of the invention may be used to determine relationships between one or more of the following types of identifiers: device IDs, social media IDs, partner user IDs, and guest IDs.
  • identifiers include device IDs, social media IDs, partner user IDs, and guest IDs.
  • a device ID in accordance with an embodiment of the invention, is a distinctive identifier associated with a device, including but not limited to, cellular phone, desktop computer, etc., used by a user.
  • the device ID may be logged by various logging services whenever the device sends a request, accompanied by the device ID.
  • a partner user ID is a distinctive identifier, associated with a user, assigned by a partner and/or an advertising platform, e.g. a demand-side platform (DSP).
  • a partner user ID may be assigned to a user when they navigate to particular a webpage or when they are provided with an advertisement from a particular partner.
  • a DSP may have a tracking pixel placed on a webpage, e.g. the webpage of a vendor that cooperates with the DSP, and a visit to the vendor webpage by the user may result in the automatic generation of a partner user ID and the dropping of a cookie with the partner user ID on the user's device.
  • the partner user ID may be logged by various logging services whenever, as a result of the tracking pixel firing, the partner user ID is sent by the device.
  • a social media ID in accordance with an embodiment of the invention, is a distinctive identifier associated with a user, assigned by a social media network, e.g., the login name of the social media account.
  • the social media ID may be logged by various logging services whenever the device transmits the social media ID.
  • a social media network may be, for example a combination of software and/or hardware that enables or facilitates the social interaction among people by supporting the creation, sharing and/or exchanging of information, ideas, pictures and/or videos in virtual communities and networks.
  • a guest ID in accordance with an embodiment of the invention, is a distinctive identifier associated with a user, assigned by a service such as a social media network. Unlike the social media ID which may only be assigned to users that are members of the social media network, a guest ID may be assigned to any user, even to users that are not members of the social media network, when the user is visiting a website associated with social media network. The guest ID may be logged by various logging services whenever the device transmits the guest ID. In one embodiment of the invention, the guest ID may be assigned to any user that, for example, navigates to a website of a social media network when the user is not logged into the social media network.
  • FIG. 1A shows a system in accordance with one or more embodiments of the invention.
  • the system has multiple components including one or more devices ( 101 A- 101 N), each executing an application ( 103 A- 103 N), a user mapping service ( 105 ), an ID synchronization service ( 107 ), an advertisement server system ( 109 ), one or more partners ( 111 A- 111 N), and one or more advertisers ( 113 A).
  • devices 101 A- 101 N
  • each executing an application 103 A- 103 N
  • a user mapping service ( 105 )
  • an ID synchronization service 107
  • an advertisement server system 109
  • partners 111 A- 111 N
  • advertisers 113 A
  • each device ( 101 A- 101 N) may be a desktop personal computer (PC), a laptop, a tablet computer, an electronic reader (e-reader), a cable box, a kiosk, a smart phone, a server, a mainframe, a personal digital assistant (PDA), or any other type of hardware device.
  • Each device may be a computing device similar to the computing system shown in FIG. 7 that may include a processor that executes the one or more applications ( 103 A- 103 N).
  • the device may communicate (directly or indirectly) with the user mapping service ( 105 ) and/or the advertisement server system ( 107 ) using any wired and/or wireless (e.g., Wi-Fi, cellular, etc.) connections.
  • the application may be a software application of any type (e.g., operating system, messaging application, social media application, game, word processing application, web browser, etc.).
  • the application may be implemented to include one or more advertisement placements.
  • An advertisement placement is a predefined space in an application used to display one or more native or non-native online advertisements.
  • the advertisement placement may be a specific location within the user interface of an application.
  • the advertisement placement may be associated with a feature in the application, e.g., in a news feed, a message feed, or stream.
  • the stream is a presentation of, list of, or other organization of content within application ( 103 A- 103 N).
  • the stream may include both content and ads (which may include native ads).
  • the application may be deployed along with a software development kit (SDK).
  • SDK software development kit
  • the SDK may issue a fill request to the advertisement server system ( 109 ).
  • the fill request may be a request for advertisement content from the advertisement server system ( 109 ).
  • the fill request may take the form of a uniform resource locator (URL).
  • URL uniform resource locator
  • the fill request may include one or more parameters including an advertisement placement ID, a device ID, the version of the SDK, one or more keywords, a type of content (e.g., sports, cars, pets, vacations, clothes, etc.) displayed around the advertisement placement, a type of connection (e.g., Wi-Fi, cellular, etc.) between the device ( 101 ) and the advertisement server system ( 109 ), etc.
  • an advertisement placement ID e.g., a device ID
  • the version of the SDK e.g., the version of the SDK
  • keywords e.g., a type of content (e.g., sports, cars, pets, vacations, clothes, etc.) displayed around the advertisement placement, a type of connection (e.g., Wi-Fi, cellular, etc.) between the device ( 101 ) and the advertisement server system ( 109 ), etc.
  • a type of content e.g., sports, cars, pets, vacations, clothes, etc.
  • a type of connection
  • the one or more partners ( 111 A- 111 N) and/or the one or more advertisers ( 113 A- 113 N) provide the advertisement content to the advertisement server system ( 109 ).
  • Different partners and advertisers may provide advertisement content in different formats.
  • the advertisement content provided by the one or more partners and the one or more advertisers may be in a format that is different from the format of the advertisement content required/requested to generate and populate the advertisement placement.
  • the ID synchronization service ( 107 ) includes functionality to receive, store, and deliver information to the user mapping service ( 105 ).
  • the ID synchronization service ( 107 ) may be capable of receiving and storing information from the one or more advertisers, either directly or indirectly via the one or more partners and/or the advertisement server system ( 109 ).
  • the aforementioned information may include an IP address used to access an advertiser's webpage, a timestamp associated with the access, a social media ID associated with the access, a partner user ID associated with the access, personal information (e.g., phone number, electronic mail address, facsimile number, physical mailing address, etc.) associated with the partner user ID, etc.
  • the ID synchronization service ( 107 ) may be implemented on a computing device similar to the computing system shown in FIG. 7 and may be configured to communicate with the user mapping service ( 105 ). Additional details about the ID synchronization service are provided below.
  • the user mapping service ( 105 ) includes functionality to receive, store, and deliver information to the applications, the ID synchronization service ( 107 ), and/or the advertisement server system ( 109 ).
  • the user mapping system ( 105 ) may be configured to receive and store information associated with an access of the application by the device. Information may include an IP address used to access the application, a timestamp associated with the access, the social media ID associated with the access, the device ID associated with the device accessing the application, etc.
  • the user mapping service ( 105 ) may be implemented on a computing device similar to the computing system shown in FIG. 7 and may be configured to communicate with the devices ( 101 A- 101 N) and the ID synchronization service ( 107 ).
  • the user mapping service ( 105 ), in accordance with an embodiment of the invention, is further configured to retrieve information including the IP address used to access the advertiser webpage, the timestamp associated with the access, the social media ID associated with the access, the partner user ID associated with the access and/or personal information (e.g., phone number, electronic mail address, facsimile number, physical mailing address, etc.) associated with the partner user ID, etc.), directly from the one or more advertisers or indirectly from the ID synchronization service ( 107 ).
  • the aforementioned information, obtained by the user mapping service may be obtained and stored in accordance with current privacy and/or data protection requirements.
  • the user mapping service ( 105 ) may possess two sets of information and may create mappings that, on the basis of a comparison between the social media ID associated with application and the social media ID associated with the visit to the advertiser website (the visit to the advertiser website may or may not have been made on the same device that is executing the application), maps, for example, the device ID to the partner user ID. Accordingly, as the user visits multiple advertiser websites (where the user may or may not possess a different partner user ID corresponding to each advertiser website), it may be possible to create a mapping that maps multiple partner user IDs to the device ID(s).
  • the partner user ID corresponds to an ID associated with the user when the user accesses an advertiser's website, e.g., via a web browser. In some embodiments of the invention, the partner user ID corresponds to an ID that is associated with the advertiser website.
  • the user mapping server may also generate mappings between other identifiers, without departing from the invention.
  • mappings may help quantify the effectiveness of an online advertisement. Details of using the mappings to attribute conversions to online advertisements, in accordance with one or more embodiments of the invention, are described in FIGS. 2-4 .
  • the advertisement server system ( 109 ) is configured to communicate with the application ( 103 A- 103 N), the user mapping service ( 105 ), the one or more partners, the one or more advertisers ( 113 A- 113 N), and/or other entities required to facilitate the fulfillment of native or non-native advertisements in the application ( 103 A- 103 N).
  • the advertisement server system ( 109 ) includes functionality to interface with partners ( 111 A- 111 N), advertisers ( 113 A- 113 N).
  • the advertisement server system solicits the aforementioned entities to provide an ad and then may ultimately select an ad from the set of ads that are provided. The selection of the particular ad may depend on several factors. Some of these factors may be related to the identity of the user.
  • the advertisement server system ( 109 ) may forward the request, including information about mappings, obtained from the user mapping service ( 105 ), to the one or more partners, one or more ad exchanges (not shown) and/or the one or more advertisers ( 113 A- 113 N).
  • the mapping information enables partners ( 111 A- 111 N) and/or advertisers ( 113 A- 113 N) to obtain and understand the purchasing behavior of a user associated with a particular partner user ID.
  • a partner(s), and/or advertiser(s) may thus make a decision about whether to bid for placing an ad in the advertisement placement in the application ( 103 A- 103 N) that the user is accessing.
  • the partner aggregates ads (directly or indirectly) from a variety of different advertisers and then provides these ads to the advertisement server system ( 109 ).
  • an advertisement exchange is a platform that allows real-time bidding (RTB) on advertisement placements by the one or more partners ( 111 A- 111 N) and/or the one or more advertisers ( 113 A- 113 N).
  • RTB real-time bidding
  • publishers may auction the advertisement placement to the highest bidder through a single interface.
  • the one or more advertisers include their own ad content and provide this ad content directly to the advertisement server system.
  • FIG. 1A shows a system in accordance with one or more embodiments of the invention
  • the architecture of the system is not limited to the components shown in FIG. 1A .
  • the system may, for example, include additional servers.
  • various functionalities that are separately described may be combined on a single server. For example, the ID synchronization service and the user mapping service may execute on the same server.
  • the components of the system may communicate using any combination of wired and/or wireless communication protocols.
  • the network used to connect the above components may include wide area network segments (e.g., the Internet), and/or a local area network segments (e.g. enterprise or home networks).
  • the communication between the components may include any combination of secured (e.g., encrypted) and non-secured (e.g., un-encrypted) communication.
  • the manner in which the components communicate may vary based on the implementation of the invention.
  • FIG. 1B shows mappings between various IDs in accordance with one or more embodiments of the invention. These mappings may be stored and updated by the user mapping service ( 105 ). The information described below may be stored in one or more data structures. Any type of data structure (e.g., arrays, linked lists, hash tables, etc.) may be used.
  • the device ID ( 131 ) is a distinctive identifier (typically comprising numbers and letters) associated with a device, including but not limited to, a cellular phone, a desktop computer, etc.
  • the social media ID ( 133 ) may be a username associated with a social media network, including but not limited to, Twitter.
  • the user mapping service ( 105 ) may store many mappings between many device IDs and many social media IDs. For example, a social media network may have millions of users, with each user having a social media ID. Many of these users may further use multiple devices to access the social media network.
  • the mapping between the device ID ( 131 ) and the social media ID ( 133 ) may be created when a user of the device inputs his or her social media ID ( 133 ) when accessing an application (e.g., 103 A).
  • the mapping between the social media ID ( 133 ) and the partner user ID ( 135 ) may be created, for example, in accordance with the scenario shown in FIG. 6 .
  • the mapping between the device ID ( 131 ) and partner user ID ( 135 ) may be determined using the two aforementioned mappings. An example of how the aforementioned mappings may be created is shown in FIG. 6 .
  • the mappings shown in FIG. 1B may be established using deterministic bridging, for example, as described in FIG. 2 and in FIG. 6 .
  • a common ID e.g., a device ID, a social media ID, and/or a Partner User ID
  • the mappings shown in FIG. 1B may be establishing using probabilistic bridging as shown in FIGS. 3A and 3B .
  • FIGS. 2-3B show methods for identifying users across mobile and desktop devices, in accordance with one or more embodiments of the invention.
  • the execution of the method described in FIGS. 2-3B may be triggered by a user selecting an advertisement (or other external content) in an application, e.g. in a social media application.
  • steps of FIGS. 2-3B may be executed periodically, for example, in order to process identifiers in batches.
  • FIG. 2 shows a method for bridging identifiers, i.e. for identifying identifiers of different types that are affiliated with the same user, using a deterministic method in accordance with one or more embodiment of the invention.
  • the method shown in FIG. 2 may be executed by the user mapping service.
  • the method shown in FIG. 2 may be referred to as deterministic ID bridging.
  • a device ID and a social media ID, associated with a first device are obtained.
  • the social media ID may be obtained by the user mapping service, for example, when a user inputs his or her social media ID to gain access to a social media platform.
  • a cookie that includes the social media ID may be provided to the device for retrieval at a later time.
  • a social media application e.g., the Twitter application for an iPhone
  • the device ID i.e., the unique ID of the mobile device
  • the corresponding social media ID i.e., the social media ID that the user used to login into the social media application
  • a partner user ID associated with a user accessing an advertiser webpage using a second device is obtained.
  • a partner pixel on the webpage may make a call to a server operated by a partner (i.e., the entity that embedded the partner pixel on the advertiser webpage).
  • the partner pixel may be, for example, a segment of HTML, JavaScript or any other type of browser-executable code, etc. that executes once partner pixel fires, e.g., when the user accesses the advertiser webpage.
  • the partner pixel includes code that, when the tracking pixel fires, retrieves the partner user ID from the device used for accessing the advertiser webpage, where it may be stored, for example, in a cookie.
  • the tracking pixel may transmit the retrieved partner user ID, e.g., to the server operated by the partner.
  • the server may archive the partner user ID and/or may forward the partner user ID to the user mapping service.
  • a social media ID associated with the second device is obtained from a cookie installed on the second device.
  • the cookie may be a cookie analogous to the cookie discussed in Step 201 , i.e., a cookie that was generated when the user accessed the social media platform using the second device, or it may be a different mechanism for storing the social media ID.
  • Step 207 the social media ID obtained in Step 201 and the social media ID obtained in Step 205 are compared. If the social media IDs match, the method may proceed to Step 209 . A match may indicate that the same user may be using the first and the second device. If the social media IDs do not match, the execution of the method may terminate without the generation of a mapping. In this case, the method may be re-executed for a different combination of previously obtained social media IDs. The method may be re-executed until a pair of matching social media IDs is detected.
  • Step 209 a mapping between the device ID and the partner user ID is created based on the matching social media IDs.
  • the mapping, by the user mapping service may thus enable the identification of a user across multiple devices, and/or may enable the identification of multiple partner user IDs that are affiliated with a particular user.
  • the mappings generated in step 209 may be referred to as deterministic ID bridges.
  • Step 207 may be omitted.
  • the device ID may be used to map the social media ID to the partner user ID. Both the action taken in the application and the access of an advertiser website may be attributed to the device ID of the first device. Accordingly, in this embodiment, as long as the user who accesses the application and the user who visits the advertiser webpage share the same device ID, the user may be considered the same person.
  • FIGS. 3A and 3B show probabilistic methods for bridging identifiers, i.e., for identifying identifiers of different types that are affiliated with the same user, in accordance with one or more embodiments of the invention.
  • the bridging described in FIGS. 3A and 3B may be used, for example, when there is no direct link between a first ID and a second ID.
  • the bridging may be performed based on a common ID such as the social media ID. However, such a common ID may not always be available. In this case, the methods described in FIGS. 3A and 3B may nevertheless enable successful bridging between the two identifiers.
  • the bridging is performed using a classifier (also referred to as a probabilistic classifier).
  • the classifier in accordance with an embodiment of the invention, is programmed to determine whether two identifiers correspond to the same user.
  • the classifier may be configured based on pairs of identifiers where a correspondence is known. These pairs of identifiers may be used as training data for the classifier.
  • FIG. 3A describes the training of the classifier.
  • FIG. 3B describes the application of the classifier on newly obtained identifiers, i.e. on identifiers where corresponding identifiers are unknown, in order to determine whether bridging can be performed for those identifiers.
  • bridging refers to device IDs and guest IDs
  • bridging may also be performed between other types of identifiers, without departing from the invention.
  • bridging may be performed between guest IDs and social media IDs, between guest IDs and partner user IDs, etc.
  • the methods described in FIGS. 3A-3B may be referred to as probabilistic ID bridging.
  • FIG. 3A shows a method for training a classifier to be used for bridging of identifiers, in accordance with an embodiment of the invention.
  • the method may be executed periodically, e.g., daily, to update or re-compute the classifier to be used for bridging identifiers, to reflect newly obtained identifiers.
  • the method may be executed by the user mapping service.
  • Device IDs are obtained.
  • Device IDs may be transmitted by devices that are operated by users to access social networks, advertisements, and/or other content. These device IDs may be stored in, for example, ad exchange logs and/or client event logs, e.g., of a social media network.
  • a device ID stored in a log may be accompanied by a timestamp for when the device ID was received by the log, an Internet Protocol (IP) address from where the device ID was received, and other information such as an operating system and/or a browser used on the device, etc.
  • IP Internet Protocol
  • Guest IDs are obtained.
  • Guest IDs may be transmitted by devices that are operated by users to access web content.
  • a guest ID as previously described, may be an identifier relied upon by the social media network to identify a user that is not a member of the social network, but that may have visited the social network prior to visiting a web page that triggers the sending of the guest ID.
  • the visited web page may have code embedded which, upon the user's visit, triggers the identification of the user via the guest ID, and transmits the guest ID to a logging service, e.g., to a social media button log (such as, in case of the Twitter network, a log may be maintained for logging user identity data returned from web pages that have the “Tweet” button embedded).
  • logs that receive user identity data from other user tracking mechanisms such as tracking pixels, web beacons, JavaScript tags, etc. may also be used for logging.
  • Information accompanying a logged guest ID may include, for example, a timestamp for when the guest ID was received by the log, an IP address from where the guest ID was received, and other information such as an operating system and/or a browser used on the device, etc.
  • the guest IDs, logged over time, in Step 303 may be retrieved by the user mapping service.
  • a pair in accordance with an embodiment of the invention, is a combination of a device ID and a guest ID, where both the device ID and the guest ID are affiliated with the same IP address.
  • the device ID and the guest ID may need to be logged within a certain time interval, for example, no further than 24 hours apart, in order to qualify for being considered a candidate pair.
  • the time interval to be considered may be configurable.
  • the home network has an IP address “123.123.123.123”, assigned by the user's internet service provider.
  • a smailphone and a desktop PC are connected to the home network. Both devices thus operate using the “123.123.123.123” IP address.
  • the user accesses the Twitter social media network using his smailphone application.
  • the smailphone device ID is logged, along with the IP address (123.123.123.123) and a timestamp ( 11 PM).
  • other information may be logged.
  • the user's social media ID may be logged.
  • the next morning at 7 AM the user accesses an airline's webpage from his desktop PC to complete the check-in for an upcoming flight.
  • the airline webpage has a Twitter “Tweet” button embedded in the webpage and reports a user's guest ID to a logging service, which archives the guest ID along with the IP address (123.123.123.123) and a timestamp (7 AM, next day).
  • No social media ID is logged because the user is not logged on to a Twitter account on his desktop PC.
  • the user mapping service generates a candidate pair from the two entries because both entries originated from the same IP address and occurred within a 24 hour time window.
  • candidate pairs may be generated.
  • the user's daughter may interact with various social media networks and may access web content. Some or all of her actions may generate entries that, because they also originated from the same IP address and because they also occurred within the 24 hour time window, may be considered for forming candidate pairs.
  • candidate pairs of logged device IDs and guest IDs may be formed, regardless of the user that has caused the log entry. The steps below attempt to identify the candidate pairs where device IDs and guest IDs belong to the same user.
  • multiple social media IDs may exist for the same device ID, for example, when multiple users rely on the same device to access their social media account.
  • separate candidate pairs of identities may be used, even if the device ID and the guest ID are the same, in order to disambiguate between the users.
  • Step 307 features are computed, separately for each candidate pair of identifiers.
  • the features may include, but are not limited to, the following:
  • the number of times a device ID was logged during one or more time intervals of a specified duration may be weighted, based on the time that has elapsed. For example, a device ID logged within the most recent one hour time window may be weighted higher than a device ID log had occurred 14 hours ago.
  • weights may be used to adjust the weight of a logged guest ID or device ID, e.g., based on the frequency of their occurrence, and/or on other factors.
  • a probability is calculated for each candidate pair of identifiers, based on the features of the candidate pair.
  • the probability is a ratio of the number of times a device ID was registered or associated with the IP address, as described under (i) in Step 307 , and the number of times any device ID was registered or associated with the IP address, as described under (iii) in Step 307 .
  • the ratio may be understood as the probability that a device with a particular device ID is associated with an activity that triggered the logging of a particular guest ID.
  • probabilities obtained in step 309 may be obtained using other approaches without departing from the invention. The invention is thus not limited to the particular method for calculating the probability, described in Step 309 .
  • the candidate pairs are pruned. Pruning may be performed if many device IDs are associated with a guest ID, or vice versa. Pruning may limit the number of device IDs associated with a guest ID, and/or the number of guest IDs associated with a device ID. Pruning may be performed based on the probabilities obtained in Step 309 . Any candidate pairs below a certain probability threshold may be removed, or alternatively, a fixed number of pairs (the pairs with the highest calculated probabilities) may be picked, whereas all other pairs may be eliminated from consideration.
  • each candidate pair of identifiers is labeled using external and/or additional information.
  • the label associated with each candidate pair may one of the following: true positive, false positive, and unknown.
  • a label of true positive indicates that identifiers in the candidate pair are in-fact associated with the same user (i.e., the external information independently validates that a relationship exists between the identifiers in the candidate pair).
  • the information to independently validate the relationship may be a social media ID.
  • the candidate pair is labeled as “true positive”.
  • a label of false positive indicates that identifiers in the candidate pair are in-fact not associated with the same user (i.e., the external information independently validates that no relationship exists between the identifiers in the candidate pair).
  • the candidate pair is labeled as “false positive”.
  • mappings created using the deterministic ID bridging method shown in FIG. 2 may be used to label the candidate pairs in step 313 . Specifically, if a mapping exists between a device ID and a partner user ID (as determined from FIG. 2 ), the corresponding pair (i.e., the candidate pair that relates the device ID to the partner user ID) may be labeled “true positive”. Further, if a mapping exists between a device ID and a second partner user ID (as determined from FIG. 2 ), the corresponding pair (i.e., the candidate pair that relates the device ID to the first partner user ID) may be labeled “false positive”.
  • Step 315 the candidate pairs of identifiers including the features and probabilities computed in Steps 307 and 309 , respectively, and the labels assigned in Step 313 , may be merged with previously obtained candidate pairs.
  • the previously obtained candidate pairs may have been obtained at an earlier time.
  • the method described in FIG. 3A may be executed following a fixed schedule, e.g. once per day.
  • labeled candidate pairs obtained from the current execution of the method may be added to a set of labeled candidate pairs obtained from prior executions of the method.
  • Step 317 prior to classifier training, one or more features, e.g., identified in step 307 , may be selected for use in training the probabilistic classifier.
  • the following describes possible features (or sets of features) that may be used for training the probabilistic classifier.
  • the invention is not limited to the features (or set of features) listed below.
  • the weight may be any aggregate function of a set of requests affiliated with the device ID of the candidate pair, using the IP address during the time window.
  • the weight may be any aggregate function of a set of requests affiliated with the guest ID of the candidate pair, using the IP address during the time window.
  • the weight may be any aggregate function of a set of requests affiliated with the device ID of the candidate pair, using the IP address during all time windows. Earlier time windows (i.e., windows further back in time) may be down-weighted.
  • the weight may be any aggregate function of a set of requests affiliated with the guest ID of the candidate pair, using the IP address during all time windows. Earlier time windows (e.g., windows further back in time) may be down-weighted.
  • the weight may be any aggregate function of a set of requests affiliated with all device IDs (i.e., not limited to the device ID in the candidate pair), using the IP address during the time window.
  • the weight may be any aggregate function of a set of requests affiliated with all guest IDs (i.e., not limited to the guest ID in the candidate pair), using the IP address during the time window.
  • (g) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight.
  • the weight may be a sum of all weights of all device IDs over all time windows using the IP address, i.e., the weights obtained in (e), over all time windows.
  • (h) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight.
  • the weight may be a sum of all weights of all guest IDs over all time windows using the IP address, i.e., the weights obtained in (f), over all time windows.
  • the probability in accordance with an embodiment of the invention, is a ratio of the weight described under (c) and the weight described under (g).
  • the weight described under (g) may be limited to a maximum of 1.0.
  • (j) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight.
  • the weight may be the number of unique device IDs seen by the ad exchange, and associated with the IP address, over all time windows.
  • (k) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight.
  • the weight may be the number of unique guest IDs seen by the ad exchange, and associated with the IP address, over all time windows.
  • a feature vector would not include IP addresses such as “123.123.123.123” or “124.125.126.127”. Instead, a transformation may be applied to, for example, convert “123.123.123.123” to “1” and to convert “124.125.126.127” to “2”. Similarly, discretization functions may be applied to transform float variables that may be in various ranges to integer values within a desired range. These discretization functions may be linear or nonlinear.
  • the classifier is trained to distinguish between “true positive” and “false positive”.
  • a logistic regression is used for performing the classification.
  • the training of the logistic regression model may set a decision boundary that distinguishes between “true positive” and “false positive” pairs based on the input data established in Step 317 .
  • the classifier is not limited to logistic regressions. Rather, any type of supervised machine learning may be used to obtain a classification rule that distinguishes “true positive” from “false positive”, based on the labeled candidate pairs. This includes, for example, support vector machines, na ⁇ ve Bayes, decision trees, etc.
  • the labeled candidate pairs may be separated into training and validation data. For example, 80% of the labeled candidate pairs may be used for training and 20% may be used for validation. A randomization of the labeled candidate pairs may be performed prior to the separation of the validation samples from the training samples.
  • the classifier training may be performed using the Vowpal Wabbit method.
  • the classifier training may be performed on a distributed system.
  • Classifier accuracy may be assessed using the validation samples. Further, based on the classifier accuracy, the features used for classification, may be updated, gains may be adjusted, or the labeled pairs to be used as classifier input may be sampled differently until a satisfactory classification performance is achieved.
  • FIG. 3B shows a method for bridging identifiers using the classifier established as described in FIG. 3A .
  • the method may be executed periodically, e.g. daily, to update the bridged identifiers, or spontaneously whenever a new pair of identifiers becomes available.
  • the method may be executed by the user mapping service.
  • Step 351 the features for the pair of identifiers are established.
  • the features to be established are features that the classifier algorithm may require as inputs, i.e., the features to be established are of similar format and type as the features discussed in Step 307 , 309 and 317 of FIG. 3A .
  • the classifier is applied to the features of the pair of identifiers.
  • the output may be a classification as “true positive” or “false positive” that indicates whether the device ID and the guest ID should be bridged. Further, a probability score may indicate the confidence in the classification. Bridging may be performed if the classification was performed with at least a certain level of confidence.
  • the resulting newly established pair of identifiers may be used, for example, to enable partners or advertisers to target the user with advertisements on the device that the user is accessing and/or to attribute conversions to an advertisement viewed by the user, as subsequently described.
  • FIG. 4 shows a method for conversion attribution in accordance with one or more embodiments of the invention.
  • the conversion attribution may rely on identifiers that may have been obtained as previously discussed.
  • Step 401 the viewing of an advertisement a user in an application on a device at a first time T 1 is detected.
  • an identifier such as a social media ID, a guest ID, and or a device ID may be provided to the user mapping service.
  • Step 403 the user accessing the advertiser webpage at a second time T 2 is detected.
  • Various methods for detecting that the advertiser webpage has been accessed exist. These methods include, for example, detecting that the user has completed a purchase, downloaded a file, filled out a form, signed a contract, provided solicited information, etc.
  • an identifier such as a social media ID, a partner user ID, a guest ID, and or a device ID may be provided to the user mapping service.
  • a mapping service system is used to match the user from step 401 and the user from Step 403 .
  • a device ID may need to be mapped to a partner user ID.
  • the mapping may be performed based on the methods described in FIGS. 2-3B . If a social media ID is available from Steps 401 and 403 , the social media ID may be used to perform the mapping as described in FIG. 2 . Alternatively, the method of FIGS. 3A and 3B may be used to perform the mapping. .
  • Step 407 T 1 and T 2 are compared. If a determination is made that the difference between T 2 and T 1 is less than a preset threshold, then the method may proceed to Step 409 to attribute the conversion to the advertisement. If the condition is not met, the execution of the method may terminate without making the attribution. Step 407 may thus effectively prevent attributing a conversion in which T 1 and T 2 occur too far apart for the advertisement to have been effective.
  • the threshold may be as short as a minute or may be as long as a week depending on various circumstances (the length of the advertisement campaign, the number of avenues for advertisement placement, etc.).
  • the conversion is attributed to the advertisement, thereby providing a feedback to the one or more advertisers.
  • the feedback may be an entry including the number of users who have made a purchase, a probability score that enables the advertisers to know the confidence of the conversion attribution, cost-benefit analysis of the advertisement etc.
  • FIG. 5 shows a method for targeting advertisements in accordance with one or more embodiments.
  • Step 501 a request for an advertisement from a device having a device ID is received by an advertisement server system.
  • the request process typically takes place when the device runs an application.
  • Step 503 partner user IDs associated with a device ID is obtained from a user mapping service.
  • Step 505 the partner user IDs and the device ID are provided to advertisers.
  • the advertisers can determine prior behaviors of the users associated with the partner IDs.
  • Step 507 advertisement placement responses from the advertisers are received.
  • the advertisers may choose to submit or not submit an advertisement to the user, based on the purchase behavior associated with the partner user ID.
  • Step 509 an advertisement from one advertiser is selected to fill the ad request.
  • An advertisement exchange may participate in the selection of the ad, for example by providing real time bidding enabling the advertisers to bid for the advertisement opportunity.
  • the selected advertisement appears on the device running the application.
  • FIG. 6 shows examples in accordance with one or more embodiments of the invention. The following examples are not intended to limit the scope of the invention.
  • Sam is using a first device ( 601 ) to execute a social media application ( 605 ).
  • a social media application 605
  • Advertiser A 617
  • Sam's device ID and social media ID associated with the first device ( 601 ) are forwarded to a user mapping service ( 609 ).
  • Sam Upon seeing the advertiser A advertisement on the first device ( 601 ), Sam decides to use the same device ( 601 ) to visit the advertiser A webpage (not shown). As soon as Sam makes a purchase on the advertiser A webpage a cookie (not shown) fires information to a data base that subsequently forwards the information contained in the cookie to the user mapping service ( 609 ). From the cookie, the user mapping service ( 609 ) knows Sam's partner A ID (i.e., partner A user ID assigned by partner ( 615 ) to Sam) that is associated with Sam's device ID.
  • Sam's partner A ID i.e., partner A user ID assigned by partner ( 615 ) to Sam
  • the user mapping service ( 609 ) also includes a mapping between Sam's device ID and social media ID
  • the user mapping service ( 609 ) may then create and store mapping between Sam's device ID to Sam's partner A ID.
  • advertiser A ( 617 ) directly or indirectly may be able to determine how effective its advertisement is on the social media network (i.e., the social media network that is associated with the social media ID).
  • Sam is using a first device ( 601 ) to run a social media application ( 605 ).
  • a social media application 605
  • Sam's device ID and social media ID associated with the first device ( 601 ) are forwarded to a user mapping service ( 609 ).
  • Sam Upon seeing the advertiser A advertisement on the first device ( 601 ), Sam decides to use a second device ( 603 ) to visit the advertiser A webpage ( 607 ).
  • Sam has previously visited the social media network (via a web browser) using the second device ( 603 ); accordingly, Sam's social media ID and other relevant information are stored in the form of a cookie ( 621 ) on the second device ( 603 ).
  • a cookie ( 619 ) fires to an ID synchronizing service ( 611 ).
  • the ID synchronizing service ( 611 ) is able to create a mapping between Sam's social media ID and Sam's partner A ID because this information is included within the cookie ( 619 ).
  • the user mapping service ( 609 ) infers that the individual with the device ID associated with the first device ( 601 ) is the same person as the individual with the partner A ID associated with the second device ( 603 ). The user mapping service ( 609 ) then may create, store, and/or forward such mappings. Effectively, advertiser A ( 617 ) is now able to methodologically understand how effective its advertisement is on the social network.
  • an ad placement request with a device ID is sent to the ad server system ( 613 ) from Sam's device ( 601 ).
  • the ad server system determines the corresponding partner user ID for Sam using a device ID to partner ID mapping obtained from the user mapping service ( 609 ).
  • the ad server may then provide the partner user ID to the partner ( 615 ), which may subsequently provide this information to one or more advertisers ( 617 ).
  • advertiser A e.g., an insurance company from which Sam has purchased car insurance
  • advertiser A will be provided with an opportunity to bid on an ad to be shown to the user associated with the partner user ID, where advertiser A may have other information about the user identified with partner user ID (i.e., Sam) has interacted with the advertiser A′s website in the past.
  • partner user ID i.e., Sam
  • advertiser A wants to show an ad to the user associated with the partner user ID.
  • advertiser A provides an ad to the ad network, which may then forward the ad to the advertisement server system.
  • the advertisement server system may interact directly with the advertisers ( 617 ) without departing from the invention.
  • the ad from advertiser A is ultimately displayed to Sam on his device ( 601 ) via the application ( 605 ) (i.e., the application that included the ad placement).
  • the mapping between the device ID and the partner user ID which, although not known to the advertiser, may be used by the advertiser to target users with specific ads, where the information about the user's interaction with the advertiser's website is typically only known to the advertiser.
  • the user mapping service may know the following information: (i) a social media ID for Sam and (ii) an email address for Sam, where the email address corresponds to the email address that Sam used to initially sign-up to the social media network.
  • Advertiser A may still be able to target advertising to Sam based on the relationship between Sam's social media ID and his email address, which advertiser A possesses. More specifically, when Sam is using the application ( 605 ) on his device, an advertisement may be targeted to Sam as follows: (i) application ( 605 ) sends the device ID to the ad server system ( 613 ); (ii) the ad server system uses the device ID along with the device ID to social media ID mapping to obtain a social media ID corresponding to the device ID; (iii) the user mapping service may then obtain the Sam's email address using the social media ID to email mapping (discussed above); (iv) the ad server may then provide the email map (directly or indirectly) to advertiser A; (v) advertiser A may then use this information to determine whether to bid for its ad to be shown to Sam; (vi) if advertiser A's bid is successful, advertiser A's ad is subsequently shown to Sam via the application ( 605 ).
  • Example 3 advertiser A ( 617 ) may communicate directly with the advertisement server system ( 613 ).
  • Embodiments of the technology may be implemented on a computing system. Any combination of mobile, desktop, server, embedded, or other types of hardware may be used.
  • the computing system ( 700 ) may include one or more computer processor(s) ( 702 ), associated memory ( 704 ) (e.g., random access memory (RAM), cache memory, flash memory, etc.), one or more storage device(s) ( 706 ) (e.g., a hard disk, an optical drive such as a compact disk (CD) drive or digital versatile disk (DVD) drive, a flash memory stick, etc.), and numerous other elements and functionalities.
  • the computer processor(s) ( 702 ) may be an integrated circuit for processing instructions.
  • the computer processor(s) may be one or more cores, or micro-cores of a processor.
  • the computing system ( 700 ) may also include one or more input device(s) ( 710 ), such as a touchscreen, keyboard, mouse, microphone, touchpad, electronic pen, or any other type of input device.
  • the computing system ( 700 ) may include one or more output device(s) ( 708 ), such as a screen (e.g., a liquid crystal display (LCD), a plasma display, touchscreen, cathode ray tube (CRT) monitor, projector, or other display device), a printer, external storage, or any other output device.
  • a screen e.g., a liquid crystal display (LCD), a plasma display, touchscreen, cathode ray tube (CRT) monitor, projector, or other display device
  • a printer external storage, or any other output device.
  • One or more of the output device(s) may be the same or different from the input device(s).
  • the computing system ( 700 ) may be connected to a network ( 712 ) (e.g., a local area network (LAN), a wide area network (WAN) such as the Internet, mobile network, or any other type of network) via a network interface connection (not shown).
  • the input and output device(s) may be locally or remotely (e.g., via the network ( 712 )) connected to the computer processor(s) ( 702 ), memory ( 704 ), and storage device(s) ( 706 ).
  • a network e.g., a local area network (LAN), a wide area network (WAN) such as the Internet, mobile network, or any other type of network
  • the input and output device(s) may be locally or remotely (e.g., via the network ( 712 )) connected to the computer processor(s) ( 702 ), memory ( 704 ), and storage device(s) ( 706 ).
  • Software instructions in the form of computer readable program code to perform embodiments of the technology may be stored, in whole or in part, temporarily or permanently, on a non-transitory computer readable medium such as a CD, DVD, storage device, a diskette, a tape, flash memory, physical memory, or any other computer readable storage medium.
  • the software instructions may correspond to computer readable program code that, when executed by a processor(s), is configured to perform embodiments of the technology.
  • one or more elements of the aforementioned computing system ( 700 ) may be located at a remote location and connected to the other elements over a network ( 712 ).
  • embodiments of the technology may be implemented on a distributed system having a plurality of nodes, where each portion of the technology may be located on a different node within the distributed system.
  • the node corresponds to a distinct computing device.
  • the node may correspond to a computer processor with associated physical memory.
  • the node may alternatively correspond to a computer processor or micro-core of a computer processor with shared memory and/or resources.

Abstract

A method for conversion attribution. The method includes obtaining a first identifier associated with a first device, obtaining a second identifier associated with a second device, bridging the first identifier and the second identifier based on a determination, made by a probabilistic classifier, that the first identifier and the second identifier are associated with a common user, and attributing, using the bridge, a conversion on a website accessed using the second device.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation application of, and claims priority to, U.S. patent application Ser. No. 16/579,696, filed on Sep. 23, 2019, now allowed which is a continuation of U.S. patent application Ser. No. 15/019,959, filed on Feb. 9, 2016, which claims the benefit of the filing date of U.S. Provisional Patent Application No. 62/113,876 filed Feb. 9, 2015. The disclosure of the foregoing applications are incorporated here by reference.
  • BACKGROUND
  • In order to determine the effectiveness of online advertising campaigns, companies have traditionally relied on tracking logged-in users across one or more devices. In particular, user activity may be tracked, for example, in cases in which a user is logged into a service, e.g., a social media service or an email service, where a unique user ID is used by the service to identify the user, regardless of the device being used. While the aforementioned mechanism may be useful in tracking logged-in users, the above mechanism is unable to track activities of users that are not logged-in to a service.
  • SUMMARY
  • Embodiments of the technology enable the identification of users across multiple devices including mobile and desktop devices. More specifically, embodiments of the invention enable analysis of different identifiers in order to ascertain that distinct identifiers are associated with the same user. The aforementioned process may be referred to as ID bridging (i.e., determining that two identifiers are associated with the same user). Embodiments of the invention use the results of deterministic ID bridging in order to train a classifier which is subsequently used to perform probabilistic ID bridging. Deterministic bridging may be used whenever dispositive proof exists that two particular identifiers are associated with the same user. Probabilistic ID bridging may be used whenever there is a reasonable probability that two particular identifiers are associated, but for which no dispositive proof has been obtained. Probabilistic bridging can be implemented programmatically by machine learning systems that apply heuristics over vast data on various digital foot prints that may be linked to a particular user. This two-phase approach to ID bridging enables additional bridges to be created, where such bridges could not be created using only deterministic ID bridging. For example, in certain implementations of the invention the use of the combination of deterministic ID bridging and probabilistic ID bridging may result in a 2.5 times increase in the number of bridges that may be created as compared with only using deterministic ID bridging. In certain embodiments the probabilistic ID bridging may rely on certain features such as IP addresses, time windows, weights, and/or probabilities.
  • The results of the ID bridging, in accordance with an embodiment of the invention, may facilitate attribution of, for example, a purchase to an ad viewed elsewhere by the same user.
  • In various embodiments of the invention, ID bridging may further be performed to obtain additional knowledge about the identity of a user. For example, if one identifier includes the social media ID of the user, and another identifier includes a location, contact information, or other user, it may be beneficial to join these elements to obtain a more comprehensive user profile. Any type of information associated with any identifier may be included in the common profile.
  • Knowledge about a user's identity, her location, interests and/or behaviors, obtained by combining information about the user associated with various identifiers, may be used for targeting the user with custom advertisements.
  • In general, in one aspect, the invention relates to a method for conversion attribution, including obtaining a first identifier associated with a first device, obtaining a second identifier associated with a second device, bridging the first identifier and the second identifier based on a determination, made by a probabilistic classifier, that the first identifier and the second identifier are associated with a common user, and attributing, using the bridge, a conversion on a website accessed using the second device.
  • In general, in one aspect, the invention relates to a non-transitory computer readable medium including instructions for performing a method, the method comprising performing deterministic ID bridging to obtain a set of deterministic ID bridges, training a probabilistic classifier using the set of deterministic ID bridges, obtaining a first identifier associated with a first device and a second identifier associated with a second device. The method further comprises, after the training: bridging the first identifier and the second identifier based on a determination, made by the probabilistic classifier, that the first identifier and the second identifier are associated with a common user, and attributing, using the bridge, a conversion on a website accessed using the second device, wherein the conversion is attributed when the user accesses the webpage within a predetermined period of time after viewing an advertisement on the first device.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1A shows a system in accordance with one or more embodiments of the invention.
  • FIG. 1B shows mappings between various identifiers in accordance with one or more embodiments of the invention.
  • FIG. 2 shows a method for bridging identifiers using a deterministic method in accordance with one or more embodiments of the invention.
  • FIG. 3A and 3B show methods for bridging identifiers using a probabilistic method in accordance with one or more embodiments of the invention.
  • FIG. 4 shows a method for conversion attribution in accordance with one or more embodiments of the invention.
  • FIG. 5 shows a method for targeting advertisements in accordance with one or more embodiments of the invention.
  • FIG. 6 shows an example in accordance with one or more embodiments of the invention.
  • FIG. 7 shows an example computing system.
  • DETAILED DESCRIPTION
  • Specific embodiments of the technology will now be described in detail with reference to the accompanying figures. Like elements in the various figures are denoted by like reference numerals for consistency.
  • In the following detailed description of embodiments of the technology, numerous specific details are set forth in order to provide a more thorough understanding of the technology. However, it will be apparent to one of ordinary skill in the art that the technology may be practiced without these specific details. In other instances, well-known features have not been described in detail to avoid unnecessarily complicating the description.
  • Throughout the application, ordinal numbers (e.g., first, second, third, etc.) may be used as an adjective for an element (i.e., any noun in the application). The use of ordinal numbers is not to imply or create any particular ordering of the elements nor to limit any element to being only a single element unless expressly disclosed, such as by the use of the terms “before”, “after”, “single”, and other such terminology. Rather, the use of ordinal numbers is to distinguish between the elements. By way of an example, a first element is distinct from a second element, and the first element may encompass more than one element and succeed (or precede) the second element in an ordering of elements.
  • In general, embodiments of the invention relate to a method and system for determining the relationships between various identifiers used in computing systems and then using these determined relationships to understand how users are interacting with various content (including advertisements) within websites and mobile applications. The aforementioned relationships may be established using both deterministic and/or probabilistic approaches. Further, the results of the deterministic ID bridging may be used to train a classifier that is subsequently used for probabilistic ID bridging. Each of these approaches is discussed below.
  • One or more embodiments of the invention may be used to determine relationships between one or more of the following types of identifiers: device IDs, social media IDs, partner user IDs, and guest IDs. Each of the identifier types is discussed below. Those skilled in the art will appreciate that the invention is not limited to the aforementioned types of identifiers.
  • A device ID, in accordance with an embodiment of the invention, is a distinctive identifier associated with a device, including but not limited to, cellular phone, desktop computer, etc., used by a user. The device ID may be logged by various logging services whenever the device sends a request, accompanied by the device ID.
  • A partner user ID, in accordance with an embodiment of the invention, is a distinctive identifier, associated with a user, assigned by a partner and/or an advertising platform, e.g. a demand-side platform (DSP). A partner user ID may be assigned to a user when they navigate to particular a webpage or when they are provided with an advertisement from a particular partner. For example, a DSP may have a tracking pixel placed on a webpage, e.g. the webpage of a vendor that cooperates with the DSP, and a visit to the vendor webpage by the user may result in the automatic generation of a partner user ID and the dropping of a cookie with the partner user ID on the user's device. The partner user ID may be logged by various logging services whenever, as a result of the tracking pixel firing, the partner user ID is sent by the device.
  • A social media ID, in accordance with an embodiment of the invention, is a distinctive identifier associated with a user, assigned by a social media network, e.g., the login name of the social media account. The social media ID may be logged by various logging services whenever the device transmits the social media ID. In one embodiment of the invention, a social media network may be, for example a combination of software and/or hardware that enables or facilitates the social interaction among people by supporting the creation, sharing and/or exchanging of information, ideas, pictures and/or videos in virtual communities and networks.
  • A guest ID, in accordance with an embodiment of the invention, is a distinctive identifier associated with a user, assigned by a service such as a social media network. Unlike the social media ID which may only be assigned to users that are members of the social media network, a guest ID may be assigned to any user, even to users that are not members of the social media network, when the user is visiting a website associated with social media network. The guest ID may be logged by various logging services whenever the device transmits the guest ID. In one embodiment of the invention, the guest ID may be assigned to any user that, for example, navigates to a website of a social media network when the user is not logged into the social media network.
  • FIG. 1A shows a system in accordance with one or more embodiments of the invention. As shown in FIG. 1A, the system has multiple components including one or more devices (101A-101N), each executing an application (103A-103N), a user mapping service (105), an ID synchronization service (107), an advertisement server system (109), one or more partners (111A-111N), and one or more advertisers (113 A). Each of these components is described below.
  • In one or more embodiments of the invention, each device (101A-101N) may be a desktop personal computer (PC), a laptop, a tablet computer, an electronic reader (e-reader), a cable box, a kiosk, a smart phone, a server, a mainframe, a personal digital assistant (PDA), or any other type of hardware device. Each device may be a computing device similar to the computing system shown in FIG. 7 that may include a processor that executes the one or more applications (103A-103N). The device may communicate (directly or indirectly) with the user mapping service (105) and/or the advertisement server system (107) using any wired and/or wireless (e.g., Wi-Fi, cellular, etc.) connections.
  • In one or more embodiments of the invention, the application (103A-103N) may be a software application of any type (e.g., operating system, messaging application, social media application, game, word processing application, web browser, etc.). The application may be implemented to include one or more advertisement placements. An advertisement placement is a predefined space in an application used to display one or more native or non-native online advertisements. For example, the advertisement placement may be a specific location within the user interface of an application. In another example, the advertisement placement may be associated with a feature in the application, e.g., in a news feed, a message feed, or stream. In one embodiment of the invention, the stream is a presentation of, list of, or other organization of content within application (103A-103N). The stream may include both content and ads (which may include native ads).
  • In one or more embodiments of the invention, the application may be deployed along with a software development kit (SDK). During the execution of the application, the SDK may issue a fill request to the advertisement server system (109). The fill request may be a request for advertisement content from the advertisement server system (109). In order to generate an advertisement and populate the advertisement placement. The fill request may take the form of a uniform resource locator (URL). Moreover, the fill request may include one or more parameters including an advertisement placement ID, a device ID, the version of the SDK, one or more keywords, a type of content (e.g., sports, cars, pets, vacations, clothes, etc.) displayed around the advertisement placement, a type of connection (e.g., Wi-Fi, cellular, etc.) between the device (101) and the advertisement server system (109), etc.
  • In one or more embodiments of the invention, the one or more partners (111A-111N) and/or the one or more advertisers (113A-113N) provide the advertisement content to the advertisement server system (109). Different partners and advertisers may provide advertisement content in different formats. Further, the advertisement content provided by the one or more partners and the one or more advertisers may be in a format that is different from the format of the advertisement content required/requested to generate and populate the advertisement placement.
  • In one or more embodiments of the invention, the ID synchronization service (107) includes functionality to receive, store, and deliver information to the user mapping service (105). The ID synchronization service (107) may be capable of receiving and storing information from the one or more advertisers, either directly or indirectly via the one or more partners and/or the advertisement server system (109). The aforementioned information may include an IP address used to access an advertiser's webpage, a timestamp associated with the access, a social media ID associated with the access, a partner user ID associated with the access, personal information (e.g., phone number, electronic mail address, facsimile number, physical mailing address, etc.) associated with the partner user ID, etc. The ID synchronization service (107) may be implemented on a computing device similar to the computing system shown in FIG. 7 and may be configured to communicate with the user mapping service (105). Additional details about the ID synchronization service are provided below.
  • In one or more embodiments of the invention, the user mapping service (105) includes functionality to receive, store, and deliver information to the applications, the ID synchronization service (107), and/or the advertisement server system (109). The user mapping system (105) may be configured to receive and store information associated with an access of the application by the device. Information may include an IP address used to access the application, a timestamp associated with the access, the social media ID associated with the access, the device ID associated with the device accessing the application, etc. The user mapping service (105) may be implemented on a computing device similar to the computing system shown in FIG. 7 and may be configured to communicate with the devices (101A-101N) and the ID synchronization service (107).
  • The user mapping service (105), in accordance with an embodiment of the invention, is further configured to retrieve information including the IP address used to access the advertiser webpage, the timestamp associated with the access, the social media ID associated with the access, the partner user ID associated with the access and/or personal information (e.g., phone number, electronic mail address, facsimile number, physical mailing address, etc.) associated with the partner user ID, etc.), directly from the one or more advertisers or indirectly from the ID synchronization service (107). In one or more embodiments of the invention, the aforementioned information, obtained by the user mapping service, may be obtained and stored in accordance with current privacy and/or data protection requirements.
  • Upon communicating with both the device (e.g., 101A, 101N) and the ID synchronization service (107), the user mapping service (105) may possess two sets of information and may create mappings that, on the basis of a comparison between the social media ID associated with application and the social media ID associated with the visit to the advertiser website (the visit to the advertiser website may or may not have been made on the same device that is executing the application), maps, for example, the device ID to the partner user ID. Accordingly, as the user visits multiple advertiser websites (where the user may or may not possess a different partner user ID corresponding to each advertiser website), it may be possible to create a mapping that maps multiple partner user IDs to the device ID(s). In one embodiment of the invention, the partner user ID corresponds to an ID associated with the user when the user accesses an advertiser's website, e.g., via a web browser. In some embodiments of the invention, the partner user ID corresponds to an ID that is associated with the advertiser website. The user mapping server may also generate mappings between other identifiers, without departing from the invention.
  • The mappings may help quantify the effectiveness of an online advertisement. Details of using the mappings to attribute conversions to online advertisements, in accordance with one or more embodiments of the invention, are described in FIGS. 2-4.
  • In one or more embodiments of the invention, the advertisement server system (109) is configured to communicate with the application (103A-103N), the user mapping service (105), the one or more partners, the one or more advertisers (113A-113N), and/or other entities required to facilitate the fulfillment of native or non-native advertisements in the application (103A-103N). The advertisement server system (109) includes functionality to interface with partners (111A-111N), advertisers (113A-113N). As described above, in one embodiment of the invention, the advertisement server system solicits the aforementioned entities to provide an ad and then may ultimately select an ad from the set of ads that are provided. The selection of the particular ad may depend on several factors. Some of these factors may be related to the identity of the user.
  • In response to having received a fill request from an application (103A-103N), the advertisement server system (109) may forward the request, including information about mappings, obtained from the user mapping service (105), to the one or more partners, one or more ad exchanges (not shown) and/or the one or more advertisers (113A-113N). In one or more embodiments of the invention, the mapping information enables partners (111A-111N) and/or advertisers (113A-113N) to obtain and understand the purchasing behavior of a user associated with a particular partner user ID. A partner(s), and/or advertiser(s) may thus make a decision about whether to bid for placing an ad in the advertisement placement in the application (103A-103N) that the user is accessing.
  • In one or more embodiments of the invention, the partner aggregates ads (directly or indirectly) from a variety of different advertisers and then provides these ads to the advertisement server system (109).
  • In one embodiment of the invention, an advertisement exchange is a platform that allows real-time bidding (RTB) on advertisement placements by the one or more partners (111A-111N) and/or the one or more advertisers (113A-113N). Using an advertisement exchange, publishers may auction the advertisement placement to the highest bidder through a single interface.
  • In one embodiment of the invention, the one or more advertisers (113A-113N) include their own ad content and provide this ad content directly to the advertisement server system.
  • While FIG. 1A shows a system in accordance with one or more embodiments of the invention, the architecture of the system is not limited to the components shown in FIG. 1A. Those skilled in the art will recognize that the system may, for example, include additional servers. For example, there may not be a single advertisement server system. Instead, multiple servers may be necessary to support a large user base. Further, various functionalities that are separately described may be combined on a single server. For example, the ID synchronization service and the user mapping service may execute on the same server. Also, the components of the system, including the portable device (101A-1-101N), the ID synchronization service (107), the user mapping service (105), the advertisement server system (109), the partner servers (111A-111N) and the advertiser servers (113A-113N) may communicate using any combination of wired and/or wireless communication protocols. The network used to connect the above components may include wide area network segments (e.g., the Internet), and/or a local area network segments (e.g. enterprise or home networks). The communication between the components may include any combination of secured (e.g., encrypted) and non-secured (e.g., un-encrypted) communication. The manner in which the components communicate may vary based on the implementation of the invention.
  • FIG. 1B shows mappings between various IDs in accordance with one or more embodiments of the invention. These mappings may be stored and updated by the user mapping service (105). The information described below may be stored in one or more data structures. Any type of data structure (e.g., arrays, linked lists, hash tables, etc.) may be used.
  • The user mapping service (105), in accordance with one or more embodiments of the invention, stores a mapping of the device ID (131) and the social media ID (133). The device ID (131) is a distinctive identifier (typically comprising numbers and letters) associated with a device, including but not limited to, a cellular phone, a desktop computer, etc. The social media ID (133) may be a username associated with a social media network, including but not limited to, Twitter. The user mapping service (105) may store many mappings between many device IDs and many social media IDs. For example, a social media network may have millions of users, with each user having a social media ID. Many of these users may further use multiple devices to access the social media network.
  • The mapping between the device ID (131) and the social media ID (133) may be created when a user of the device inputs his or her social media ID (133) when accessing an application (e.g., 103A). The mapping between the social media ID (133) and the partner user ID (135) may be created, for example, in accordance with the scenario shown in FIG. 6. Finally, the mapping between the device ID (131) and partner user ID (135) may be determined using the two aforementioned mappings. An example of how the aforementioned mappings may be created is shown in FIG. 6.
  • The mappings shown in FIG. 1B may be established using deterministic bridging, for example, as described in FIG. 2 and in FIG. 6. In such cases, a common ID (e.g., a device ID, a social media ID, and/or a Partner User ID) may be used to establish the deterministic ID bridging. In scenarios in which there is no common ID, the mappings shown in FIG. 1B may be establishing using probabilistic bridging as shown in FIGS. 3A and 3B.
  • FIGS. 2-3B show methods for identifying users across mobile and desktop devices, in accordance with one or more embodiments of the invention. The execution of the method described in FIGS. 2-3B may be triggered by a user selecting an advertisement (or other external content) in an application, e.g. in a social media application. Alternatively or additionally steps of FIGS. 2-3B may be executed periodically, for example, in order to process identifiers in batches.
  • While the various steps in the flowcharts are presented and described sequentially, one of ordinary skill will appreciate that some or all of these steps may be executed in different orders, may be combined or omitted, and some or all of the steps may be executed in parallel. In one embodiment of the invention, the steps shown in FIGS. 2-3B may be performed in parallel with any other steps shown in FIGS. 2-3B without departing from the invention.
  • FIG. 2 shows a method for bridging identifiers, i.e. for identifying identifiers of different types that are affiliated with the same user, using a deterministic method in accordance with one or more embodiment of the invention. The method shown in FIG. 2 may be executed by the user mapping service. The method shown in FIG. 2 may be referred to as deterministic ID bridging.
  • In Step 201, a device ID and a social media ID, associated with a first device, are obtained. The social media ID may be obtained by the user mapping service, for example, when a user inputs his or her social media ID to gain access to a social media platform. A cookie that includes the social media ID may be provided to the device for retrieval at a later time. Consider, for example, a scenario in which a user installs a social media application (e.g., the Twitter application for an iPhone) on her mobile device. In this scenario, when the user launches the social media application and logs in to the social media application on the mobile device, the device ID (i.e., the unique ID of the mobile device) and the corresponding social media ID (i.e., the social media ID that the user used to login into the social media application) may be provided to the user mapping service.
  • In Step 203, a partner user ID associated with a user accessing an advertiser webpage using a second device is obtained. In one embodiment of the invention when a user accesses an advertiser webpage, a partner pixel on the webpage may make a call to a server operated by a partner (i.e., the entity that embedded the partner pixel on the advertiser webpage). The partner pixel may be, for example, a segment of HTML, JavaScript or any other type of browser-executable code, etc. that executes once partner pixel fires, e.g., when the user accesses the advertiser webpage. In one embodiment of the invention, the partner pixel includes code that, when the tracking pixel fires, retrieves the partner user ID from the device used for accessing the advertiser webpage, where it may be stored, for example, in a cookie. Next, the tracking pixel may transmit the retrieved partner user ID, e.g., to the server operated by the partner. The server may archive the partner user ID and/or may forward the partner user ID to the user mapping service.
  • In Step 205, a social media ID associated with the second device is obtained from a cookie installed on the second device. The cookie may be a cookie analogous to the cookie discussed in Step 201, i.e., a cookie that was generated when the user accessed the social media platform using the second device, or it may be a different mechanism for storing the social media ID.
  • In Step 207, the social media ID obtained in Step 201 and the social media ID obtained in Step 205 are compared. If the social media IDs match, the method may proceed to Step 209. A match may indicate that the same user may be using the first and the second device. If the social media IDs do not match, the execution of the method may terminate without the generation of a mapping. In this case, the method may be re-executed for a different combination of previously obtained social media IDs. The method may be re-executed until a pair of matching social media IDs is detected.
  • In Step 209, a mapping between the device ID and the partner user ID is created based on the matching social media IDs. The mapping, by the user mapping service may thus enable the identification of a user across multiple devices, and/or may enable the identification of multiple partner user IDs that are affiliated with a particular user. The mappings generated in step 209 may be referred to as deterministic ID bridges.
  • In scenarios in which the user executes the application and causes the firing of the pixel on the first device rather than on a second device, Step 207 may be omitted. In this case, the device ID may be used to map the social media ID to the partner user ID. Both the action taken in the application and the access of an advertiser website may be attributed to the device ID of the first device. Accordingly, in this embodiment, as long as the user who accesses the application and the user who visits the advertiser webpage share the same device ID, the user may be considered the same person.
  • FIGS. 3A and 3B show probabilistic methods for bridging identifiers, i.e., for identifying identifiers of different types that are affiliated with the same user, in accordance with one or more embodiments of the invention. The bridging described in FIGS. 3A and 3B may be used, for example, when there is no direct link between a first ID and a second ID. Consider the bridging performed between a device ID and a partner user ID, described above with reference to FIG. 2. The bridging may be performed based on a common ID such as the social media ID. However, such a common ID may not always be available. In this case, the methods described in FIGS. 3A and 3B may nevertheless enable successful bridging between the two identifiers. In one embodiment of the invention, the bridging is performed using a classifier (also referred to as a probabilistic classifier). The classifier, in accordance with an embodiment of the invention, is programmed to determine whether two identifiers correspond to the same user. The classifier may be configured based on pairs of identifiers where a correspondence is known. These pairs of identifiers may be used as training data for the classifier. FIG. 3A describes the training of the classifier. FIG. 3B describes the application of the classifier on newly obtained identifiers, i.e. on identifiers where corresponding identifiers are unknown, in order to determine whether bridging can be performed for those identifiers. Although the subsequently described bridging refers to device IDs and guest IDs, those skilled in the art will appreciate that bridging may also be performed between other types of identifiers, without departing from the invention. For example, bridging may be performed between guest IDs and social media IDs, between guest IDs and partner user IDs, etc. The methods described in FIGS. 3A-3B may be referred to as probabilistic ID bridging.
  • FIG. 3A shows a method for training a classifier to be used for bridging of identifiers, in accordance with an embodiment of the invention. The method may be executed periodically, e.g., daily, to update or re-compute the classifier to be used for bridging identifiers, to reflect newly obtained identifiers. The method may be executed by the user mapping service.
  • Turning to FIG. 3A, in Step 301, device IDs are obtained. Device IDs may be transmitted by devices that are operated by users to access social networks, advertisements, and/or other content. These device IDs may be stored in, for example, ad exchange logs and/or client event logs, e.g., of a social media network. A device ID stored in a log may be accompanied by a timestamp for when the device ID was received by the log, an Internet Protocol (IP) address from where the device ID was received, and other information such as an operating system and/or a browser used on the device, etc. These device IDs, logged in ad exchange logs and/or in client event logs over time, may be retrieved by the user mapping service, in Step 301.
  • In Step 303, guest IDs are obtained. Guest IDs may be transmitted by devices that are operated by users to access web content. A guest ID, as previously described, may be an identifier relied upon by the social media network to identify a user that is not a member of the social network, but that may have visited the social network prior to visiting a web page that triggers the sending of the guest ID. The visited web page may have code embedded which, upon the user's visit, triggers the identification of the user via the guest ID, and transmits the guest ID to a logging service, e.g., to a social media button log (such as, in case of the Twitter network, a log may be maintained for logging user identity data returned from web pages that have the “Tweet” button embedded). Further, other logs that receive user identity data from other user tracking mechanisms such as tracking pixels, web beacons, JavaScript tags, etc. may also be used for logging. Information accompanying a logged guest ID may include, for example, a timestamp for when the guest ID was received by the log, an IP address from where the guest ID was received, and other information such as an operating system and/or a browser used on the device, etc. The guest IDs, logged over time, in Step 303 may be retrieved by the user mapping service.
  • In Step 305, candidate pairs of identifiers are generated from the device IDs and the guest IDs collected in Steps 301 and 303. A pair, in accordance with an embodiment of the invention, is a combination of a device ID and a guest ID, where both the device ID and the guest ID are affiliated with the same IP address. The device ID and the guest ID may need to be logged within a certain time interval, for example, no further than 24 hours apart, in order to qualify for being considered a candidate pair. The time interval to be considered may be configurable.
  • Consider, for example, a scenario in which a user has a home network. The home network has an IP address “123.123.123.123”, assigned by the user's internet service provider. A smailphone and a desktop PC are connected to the home network. Both devices thus operate using the “123.123.123.123” IP address. At 11PM, the user accesses the Twitter social media network using his smailphone application. The smailphone device ID is logged, along with the IP address (123.123.123.123) and a timestamp (11PM). In addition, other information may be logged. For example, the user's social media ID may be logged. The next morning at 7 AM, the user accesses an airline's webpage from his desktop PC to complete the check-in for an upcoming flight. The airline webpage has a Twitter “Tweet” button embedded in the webpage and reports a user's guest ID to a logging service, which archives the guest ID along with the IP address (123.123.123.123) and a timestamp (7 AM, next day). No social media ID is logged because the user is not logged on to a Twitter account on his desktop PC. The user mapping service generates a candidate pair from the two entries because both entries originated from the same IP address and occurred within a 24 hour time window.
  • Many other candidate pairs may be generated. For example, the user's daughter may interact with various social media networks and may access web content. Some or all of her actions may generate entries that, because they also originated from the same IP address and because they also occurred within the 24 hour time window, may be considered for forming candidate pairs. Thus, candidate pairs of logged device IDs and guest IDs may be formed, regardless of the user that has caused the log entry. The steps below attempt to identify the candidate pairs where device IDs and guest IDs belong to the same user.
  • In one embodiment of the invention, multiple social media IDs may exist for the same device ID, for example, when multiple users rely on the same device to access their social media account. In this case, separate candidate pairs of identities may be used, even if the device ID and the guest ID are the same, in order to disambiguate between the users.
  • Continuing with the discussion of FIG. 3, in Step 307, features are computed, separately for each candidate pair of identifiers. The features may include, but are not limited to, the following:
  • (i) The number of times a device ID was logged during one or more time intervals of a specified duration. The occurrences may be weighted, based on the time that has elapsed. For example, a device ID logged within the most recent one hour time window may be weighted higher than a device ID log had occurred 14 hours ago.
  • (ii) The number of times a guest ID was logged during one or more time intervals of a specified duration. The occurrences may be also be weighted based on the time that has elapsed.
  • (iii) The number of times any device ID (i.e., the device ID of the candidate pair but also all other device IDs) was logged within a particular time span.
  • (iv) The number of times any guest ID (i.e., the guest ID of the candidate pair but also all other guest IDs) was logged within a particular time span.
  • Each of the aforementioned features may be weighted. For example, the weights may be used to adjust the weight of a logged guest ID or device ID, e.g., based on the frequency of their occurrence, and/or on other factors.
  • Those skilled in the art will appreciate that other features, such as whether a device ID was obtained from an ad exchange log or from a client event log, may be used without departing from the invention.
  • Continuing with the discussion of FIG. 3A, in Step 309, a probability is calculated for each candidate pair of identifiers, based on the features of the candidate pair. In one embodiment of the invention, the probability is a ratio of the number of times a device ID was registered or associated with the IP address, as described under (i) in Step 307, and the number of times any device ID was registered or associated with the IP address, as described under (iii) in Step 307. Intuitively, the ratio may be understood as the probability that a device with a particular device ID is associated with an activity that triggered the logging of a particular guest ID. One skilled in the art will recognize that probabilities obtained in step 309 may be obtained using other approaches without departing from the invention. The invention is thus not limited to the particular method for calculating the probability, described in Step 309.
  • In Step 311, the candidate pairs are pruned. Pruning may be performed if many device IDs are associated with a guest ID, or vice versa. Pruning may limit the number of device IDs associated with a guest ID, and/or the number of guest IDs associated with a device ID. Pruning may be performed based on the probabilities obtained in Step 309. Any candidate pairs below a certain probability threshold may be removed, or alternatively, a fixed number of pairs (the pairs with the highest calculated probabilities) may be picked, whereas all other pairs may be eliminated from consideration.
  • In Step 313, each candidate pair of identifiers is labeled using external and/or additional information. In one embodiment of the invention, the label associated with each candidate pair may one of the following: true positive, false positive, and unknown. A label of true positive indicates that identifiers in the candidate pair are in-fact associated with the same user (i.e., the external information independently validates that a relationship exists between the identifiers in the candidate pair). The information to independently validate the relationship may be a social media ID. Consider, for example, a scenario in which a candidate pair includes a device ID and a guest ID. Further, assume that a first social media ID was obtained along with the device ID and a second social media ID was obtained along with the guest ID. If the first social media ID matches the second social media ID, the candidate pair is labeled as “true positive”. A label of false positive indicates that identifiers in the candidate pair are in-fact not associated with the same user (i.e., the external information independently validates that no relationship exists between the identifiers in the candidate pair). In the above scenario, assume that the first and the second social media ID do not match. In this case, the candidate pair is labeled as “false positive”. Finally, in scenarios in which the external information is not available and/or is not sufficient to be used to label the candidate pair as “true positive” or “false positive”, a label of unknown is assigned to the candidate pair.
  • In one embodiment of the invention, mappings created using the deterministic ID bridging method shown in FIG. 2 may be used to label the candidate pairs in step 313. Specifically, if a mapping exists between a device ID and a partner user ID (as determined from FIG. 2), the corresponding pair (i.e., the candidate pair that relates the device ID to the partner user ID) may be labeled “true positive”. Further, if a mapping exists between a device ID and a second partner user ID (as determined from FIG. 2), the corresponding pair (i.e., the candidate pair that relates the device ID to the first partner user ID) may be labeled “false positive”.
  • In Step 315, the candidate pairs of identifiers including the features and probabilities computed in Steps 307 and 309, respectively, and the labels assigned in Step 313, may be merged with previously obtained candidate pairs. The previously obtained candidate pairs may have been obtained at an earlier time. For example, the method described in FIG. 3A may be executed following a fixed schedule, e.g. once per day. Thus, labeled candidate pairs obtained from the current execution of the method may be added to a set of labeled candidate pairs obtained from prior executions of the method.
  • In Step 317, prior to classifier training, one or more features, e.g., identified in step 307, may be selected for use in training the probabilistic classifier. The following describes possible features (or sets of features) that may be used for training the probabilistic classifier. The invention is not limited to the features (or set of features) listed below.
  • Example Features or Sets of Features
  • (a) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight. The weight may be any aggregate function of a set of requests affiliated with the device ID of the candidate pair, using the IP address during the time window.
  • (b) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight. The weight may be any aggregate function of a set of requests affiliated with the guest ID of the candidate pair, using the IP address during the time window.
  • (c) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight. The weight may be any aggregate function of a set of requests affiliated with the device ID of the candidate pair, using the IP address during all time windows. Earlier time windows (i.e., windows further back in time) may be down-weighted.
  • (d) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight. The weight may be any aggregate function of a set of requests affiliated with the guest ID of the candidate pair, using the IP address during all time windows. Earlier time windows (e.g., windows further back in time) may be down-weighted.
  • (e) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight. The weight may be any aggregate function of a set of requests affiliated with all device IDs (i.e., not limited to the device ID in the candidate pair), using the IP address during the time window.
  • (f) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight. The weight may be any aggregate function of a set of requests affiliated with all guest IDs (i.e., not limited to the guest ID in the candidate pair), using the IP address during the time window.
  • (g) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight. The weight may be a sum of all weights of all device IDs over all time windows using the IP address, i.e., the weights obtained in (e), over all time windows.
  • (h) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight. The weight may be a sum of all weights of all guest IDs over all time windows using the IP address, i.e., the weights obtained in (f), over all time windows.
  • (i) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a probability. The probability, in accordance with an embodiment of the invention, is a ratio of the weight described under (c) and the weight described under (g). The weight described under (g) may be limited to a maximum of 1.0.
  • (j) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight. The weight may be the number of unique device IDs seen by the ad exchange, and associated with the IP address, over all time windows.
  • (k) A triplet including an IP address associated with both identifiers in the candidate pairs, a time window during which the candidate pair was seen and a weight. The weight may be the number of unique guest IDs seen by the ad exchange, and associated with the IP address, over all time windows.
  • Those skilled in the art will recognize that many combinations of features to be used for classifier training are feasible and may thus be used without departing from the invention.
  • Selection of these features may be specific to a particular scenario. In one embodiment of the invention, at least some of the features are scaled to be within a certain numerical range. For example, a feature vector would not include IP addresses such as “123.123.123.123” or “124.125.126.127”. Instead, a transformation may be applied to, for example, convert “123.123.123.123” to “1” and to convert “124.125.126.127” to “2”. Similarly, discretization functions may be applied to transform float variables that may be in various ranges to integer values within a desired range. These discretization functions may be linear or nonlinear.
  • In Step 319, the classifier is trained to distinguish between “true positive” and “false positive”. In one embodiment of the invention, a logistic regression is used for performing the classification. The training of the logistic regression model may set a decision boundary that distinguishes between “true positive” and “false positive” pairs based on the input data established in Step 317. Those skilled in the art will recognize that the classifier is not limited to logistic regressions. Rather, any type of supervised machine learning may be used to obtain a classification rule that distinguishes “true positive” from “false positive”, based on the labeled candidate pairs. This includes, for example, support vector machines, naïve Bayes, decision trees, etc.
  • The labeled candidate pairs may be separated into training and validation data. For example, 80% of the labeled candidate pairs may be used for training and 20% may be used for validation. A randomization of the labeled candidate pairs may be performed prior to the separation of the validation samples from the training samples.
  • In one embodiment of the invention, the classifier training may be performed using the Vowpal Wabbit method. The classifier training may be performed on a distributed system.
  • Classifier accuracy may be assessed using the validation samples. Further, based on the classifier accuracy, the features used for classification, may be updated, gains may be adjusted, or the labeled pairs to be used as classifier input may be sampled differently until a satisfactory classification performance is achieved.
  • FIG. 3B shows a method for bridging identifiers using the classifier established as described in FIG. 3A. The method may be executed periodically, e.g. daily, to update the bridged identifiers, or spontaneously whenever a new pair of identifiers becomes available. The method may be executed by the user mapping service.
  • In Step 351, the features for the pair of identifiers are established. The features to be established are features that the classifier algorithm may require as inputs, i.e., the features to be established are of similar format and type as the features discussed in Step 307, 309 and 317 of FIG. 3A.
  • In Step 353, the classifier is applied to the features of the pair of identifiers. The output, may be a classification as “true positive” or “false positive” that indicates whether the device ID and the guest ID should be bridged. Further, a probability score may indicate the confidence in the classification. Bridging may be performed if the classification was performed with at least a certain level of confidence.
  • The resulting newly established pair of identifiers may be used, for example, to enable partners or advertisers to target the user with advertisements on the device that the user is accessing and/or to attribute conversions to an advertisement viewed by the user, as subsequently described.
  • FIG. 4 shows a method for conversion attribution in accordance with one or more embodiments of the invention. The conversion attribution may rely on identifiers that may have been obtained as previously discussed.
  • In Step 401, the viewing of an advertisement a user in an application on a device at a first time T1 is detected. Various methods for detecting that the advertisement has been viewed exist. These methods include, for example, detecting the user clicking on the advertisement, detecting the user sharing the advertisement by clicking on social media icons in connection with the advertisement, etc. As a result, an identifier such as a social media ID, a guest ID, and or a device ID may be provided to the user mapping service.
  • In Step 403, the user accessing the advertiser webpage at a second time T2 is detected. Various methods for detecting that the advertiser webpage has been accessed exist. These methods include, for example, detecting that the user has completed a purchase, downloaded a file, filled out a form, signed a contract, provided solicited information, etc. As a result, an identifier such as a social media ID, a partner user ID, a guest ID, and or a device ID may be provided to the user mapping service.
  • In Step 405, a mapping service system is used to match the user from step 401 and the user from Step 403. For example, a device ID may need to be mapped to a partner user ID. The mapping may be performed based on the methods described in FIGS. 2-3B. If a social media ID is available from Steps 401 and 403, the social media ID may be used to perform the mapping as described in FIG. 2. Alternatively, the method of FIGS. 3A and 3B may be used to perform the mapping. .
  • In Step 407, T1 and T2 are compared. If a determination is made that the difference between T2 and T1 is less than a preset threshold, then the method may proceed to Step 409 to attribute the conversion to the advertisement. If the condition is not met, the execution of the method may terminate without making the attribution. Step 407 may thus effectively prevent attributing a conversion in which T1 and T2 occur too far apart for the advertisement to have been effective. The threshold may be as short as a minute or may be as long as a week depending on various circumstances (the length of the advertisement campaign, the number of avenues for advertisement placement, etc.).
  • In Step 409, the conversion is attributed to the advertisement, thereby providing a feedback to the one or more advertisers. The feedback may be an entry including the number of users who have made a purchase, a probability score that enables the advertisers to know the confidence of the conversion attribution, cost-benefit analysis of the advertisement etc.
  • FIG. 5 shows a method for targeting advertisements in accordance with one or more embodiments.
  • In Step 501, a request for an advertisement from a device having a device ID is received by an advertisement server system. The request process typically takes place when the device runs an application.
  • In Step 503, partner user IDs associated with a device ID is obtained from a user mapping service.
  • In Step 505, the partner user IDs and the device ID are provided to advertisers. With the partner IDs, the advertisers can determine prior behaviors of the users associated with the partner IDs.
  • In Step 507, advertisement placement responses from the advertisers are received. In this step, the advertisers may choose to submit or not submit an advertisement to the user, based on the purchase behavior associated with the partner user ID.
  • In Step 509, an advertisement from one advertiser is selected to fill the ad request. An advertisement exchange may participate in the selection of the ad, for example by providing real time bidding enabling the advertisers to bid for the advertisement opportunity. In Step 511, the selected advertisement appears on the device running the application.
  • FIG. 6 shows examples in accordance with one or more embodiments of the invention. The following examples are not intended to limit the scope of the invention.
  • FIRST EXAMPLE
  • Sam is using a first device (601) to execute a social media application (605). As Sam browses the social media application (605) on the first mobile device (601) he sees an advertisement from advertiser A (617), a sportswear company. At some point while using the social media application, Sam's device ID and social media ID associated with the first device (601) are forwarded to a user mapping service (609).
  • Upon seeing the advertiser A advertisement on the first device (601), Sam decides to use the same device (601) to visit the advertiser A webpage (not shown). As soon as Sam makes a purchase on the advertiser A webpage a cookie (not shown) fires information to a data base that subsequently forwards the information contained in the cookie to the user mapping service (609). From the cookie, the user mapping service (609) knows Sam's partner A ID (i.e., partner A user ID assigned by partner (615) to Sam) that is associated with Sam's device ID. Further, because the user mapping service (609) also includes a mapping between Sam's device ID and social media ID, the user mapping service (609) may then create and store mapping between Sam's device ID to Sam's partner A ID. Using the aforementioned mapping, advertiser A (617) (directly or indirectly) may be able to determine how effective its advertisement is on the social media network (i.e., the social media network that is associated with the social media ID).
  • SECOND EXAMPLE
  • Sam is using a first device (601) to run a social media application (605). As Sam uses the social media application (605) on the first device (601) he sees an advertisement from advertiser A (617). At some point while Sam is using the social media application (605), Sam's device ID and social media ID associated with the first device (601) are forwarded to a user mapping service (609).
  • Upon seeing the advertiser A advertisement on the first device (601), Sam decides to use a second device (603) to visit the advertiser A webpage (607). Sam has previously visited the social media network (via a web browser) using the second device (603); accordingly, Sam's social media ID and other relevant information are stored in the form of a cookie (621) on the second device (603). As soon as Sam makes a purchase on the advertiser A webpage (607) using the second device (603) a cookie (619) fires to an ID synchronizing service (611). The ID synchronizing service (611) is able to create a mapping between Sam's social media ID and Sam's partner A ID because this information is included within the cookie (619).
  • Because the social media ID associated with the partner A ID and the social media ID associated with the device ID are the same, the user mapping service (609) infers that the individual with the device ID associated with the first device (601) is the same person as the individual with the partner A ID associated with the second device (603). The user mapping service (609) then may create, store, and/or forward such mappings. Effectively, advertiser A (617) is now able to methodologically understand how effective its advertisement is on the social network.
  • THIRD EXAMPLE
  • Consider a scenario in which an ad placement request with a device ID is sent to the ad server system (613) from Sam's device (601). The ad server system determines the corresponding partner user ID for Sam using a device ID to partner ID mapping obtained from the user mapping service (609). The ad server may then provide the partner user ID to the partner (615), which may subsequently provide this information to one or more advertisers (617). In this example if the partner user ID is associated with advertiser A then advertiser A (e.g., an insurance company from which Sam has purchased car insurance) may be provided with Sam's partner user ID along with a request for an ad. Said another way, advertiser A will be provided with an opportunity to bid on an ad to be shown to the user associated with the partner user ID, where advertiser A may have other information about the user identified with partner user ID (i.e., Sam) has interacted with the advertiser A′s website in the past.
  • For the purposes of this example assume that advertiser A wants to show an ad to the user associated with the partner user ID. In such cases, advertiser A provides an ad to the ad network, which may then forward the ad to the advertisement server system. Those skilled in the art will appreciate that the advertisement server system may interact directly with the advertisers (617) without departing from the invention. Continuing with the example, assume that the ad from advertiser A is ultimately displayed to Sam on his device (601) via the application (605) (i.e., the application that included the ad placement). The mapping between the device ID and the partner user ID which, although not known to the advertiser, may be used by the advertiser to target users with specific ads, where the information about the user's interaction with the advertiser's website is typically only known to the advertiser.
  • FOURTH EXAMPLE
  • Consider a scenario in which advertiser A (617) wants to advertise to its frequent customers, including Sam. However, advertiser A (617) only possesses Sam's email address.
  • In such cases, the user mapping service may know the following information: (i) a social media ID for Sam and (ii) an email address for Sam, where the email address corresponds to the email address that Sam used to initially sign-up to the social media network.
  • Advertiser A may still be able to target advertising to Sam based on the relationship between Sam's social media ID and his email address, which advertiser A possesses. More specifically, when Sam is using the application (605) on his device, an advertisement may be targeted to Sam as follows: (i) application (605) sends the device ID to the ad server system (613); (ii) the ad server system uses the device ID along with the device ID to social media ID mapping to obtain a social media ID corresponding to the device ID; (iii) the user mapping service may then obtain the Sam's email address using the social media ID to email mapping (discussed above); (iv) the ad server may then provide the email map (directly or indirectly) to advertiser A; (v) advertiser A may then use this information to determine whether to bid for its ad to be shown to Sam; (vi) if advertiser A's bid is successful, advertiser A's ad is subsequently shown to Sam via the application (605).
  • The above-examples are not intended to limit the scope of the invention. One of ordinary skill in the art with the benefit of the detailed specification would understand that variations to the invention, including the addition and/or the removal of certain steps, features, components, are possible and fall within the scope of the invention. For example, in Example 3, advertiser A (617) may communicate directly with the advertisement server system (613).
  • Embodiments of the technology may be implemented on a computing system. Any combination of mobile, desktop, server, embedded, or other types of hardware may be used. For example, as shown in FIG. 7, the computing system (700) may include one or more computer processor(s) (702), associated memory (704) (e.g., random access memory (RAM), cache memory, flash memory, etc.), one or more storage device(s) (706) (e.g., a hard disk, an optical drive such as a compact disk (CD) drive or digital versatile disk (DVD) drive, a flash memory stick, etc.), and numerous other elements and functionalities. The computer processor(s) (702) may be an integrated circuit for processing instructions. For example, the computer processor(s) may be one or more cores, or micro-cores of a processor. The computing system (700) may also include one or more input device(s) (710), such as a touchscreen, keyboard, mouse, microphone, touchpad, electronic pen, or any other type of input device. Further, the computing system (700) may include one or more output device(s) (708), such as a screen (e.g., a liquid crystal display (LCD), a plasma display, touchscreen, cathode ray tube (CRT) monitor, projector, or other display device), a printer, external storage, or any other output device. One or more of the output device(s) may be the same or different from the input device(s). The computing system (700) may be connected to a network (712) (e.g., a local area network (LAN), a wide area network (WAN) such as the Internet, mobile network, or any other type of network) via a network interface connection (not shown). The input and output device(s) may be locally or remotely (e.g., via the network (712)) connected to the computer processor(s) (702), memory (704), and storage device(s) (706). Many different types of computing systems exist, and the aforementioned input and output device(s) may take other forms.
  • Software instructions in the form of computer readable program code to perform embodiments of the technology may be stored, in whole or in part, temporarily or permanently, on a non-transitory computer readable medium such as a CD, DVD, storage device, a diskette, a tape, flash memory, physical memory, or any other computer readable storage medium. Specifically, the software instructions may correspond to computer readable program code that, when executed by a processor(s), is configured to perform embodiments of the technology.
  • Further, one or more elements of the aforementioned computing system (700) may be located at a remote location and connected to the other elements over a network (712). Further, embodiments of the technology may be implemented on a distributed system having a plurality of nodes, where each portion of the technology may be located on a different node within the distributed system. In one embodiment of the technology, the node corresponds to a distinct computing device. Alternatively, the node may correspond to a computer processor with associated physical memory. The node may alternatively correspond to a computer processor or micro-core of a computer processor with shared memory and/or resources.
  • While the invention has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments can be devised which do not depart from the scope of the technology as disclosed herein. Accordingly, the scope of the technology should be limited only by the attached claims.

Claims (1)

What is claimed is:
1. A method for conversion attribution, comprising:
performing deterministic ID bridging to obtain a set of deterministic ID bridges;
training a probabilistic classifier using the set of deterministic ID bridges;
obtaining a first identifier associated with a first device;
obtaining a second identifier associated with a second device;
after the training:
bridging the first identifier and the second identifier based on a determination, made by the probabilistic classifier, that the first identifier and the second identifier are associated with a common user; and
attributing, using the bridge, a conversion on a website accessed using the second device.
US17/114,445 2015-02-09 2020-12-07 Method and system for identifying users across mobile and desktop devices Abandoned US20210174398A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/114,445 US20210174398A1 (en) 2015-02-09 2020-12-07 Method and system for identifying users across mobile and desktop devices

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201562113876P 2015-02-09 2015-02-09
US15/019,959 US10423985B1 (en) 2015-02-09 2016-02-09 Method and system for identifying users across mobile and desktop devices
US16/579,696 US10861055B1 (en) 2015-02-09 2019-09-23 Method and system for identifying users across mobile and desktop devices
US17/114,445 US20210174398A1 (en) 2015-02-09 2020-12-07 Method and system for identifying users across mobile and desktop devices

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US16/579,696 Continuation US10861055B1 (en) 2015-02-09 2019-09-23 Method and system for identifying users across mobile and desktop devices

Publications (1)

Publication Number Publication Date
US20210174398A1 true US20210174398A1 (en) 2021-06-10

Family

ID=67988693

Family Applications (3)

Application Number Title Priority Date Filing Date
US15/019,959 Expired - Fee Related US10423985B1 (en) 2015-02-09 2016-02-09 Method and system for identifying users across mobile and desktop devices
US16/579,696 Active US10861055B1 (en) 2015-02-09 2019-09-23 Method and system for identifying users across mobile and desktop devices
US17/114,445 Abandoned US20210174398A1 (en) 2015-02-09 2020-12-07 Method and system for identifying users across mobile and desktop devices

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US15/019,959 Expired - Fee Related US10423985B1 (en) 2015-02-09 2016-02-09 Method and system for identifying users across mobile and desktop devices
US16/579,696 Active US10861055B1 (en) 2015-02-09 2019-09-23 Method and system for identifying users across mobile and desktop devices

Country Status (1)

Country Link
US (3) US10423985B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11449888B2 (en) 2015-07-10 2022-09-20 Twitter, Inc. Reconciliation of disjoint user identifier spaces
WO2023275530A1 (en) * 2021-07-01 2023-01-05 Novatiq Technologies Limited Method, apparatus and system for associating different instances of user engagement with a content provider

Families Citing this family (91)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10423985B1 (en) 2015-02-09 2019-09-24 Twitter, Inc. Method and system for identifying users across mobile and desktop devices
US11244367B2 (en) 2016-04-01 2022-02-08 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US20220164840A1 (en) 2016-04-01 2022-05-26 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US11228620B2 (en) 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10685140B2 (en) 2016-06-10 2020-06-16 OneTrust, LLC Consent receipt management systems and related methods
US10678945B2 (en) 2016-06-10 2020-06-09 OneTrust, LLC Consent receipt management systems and related methods
US10169609B1 (en) 2016-06-10 2019-01-01 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11222309B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11366909B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11651104B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Consent receipt management systems and related methods
US11651106B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11134086B2 (en) 2016-06-10 2021-09-28 OneTrust, LLC Consent conversion optimization systems and related methods
US10896394B2 (en) 2016-06-10 2021-01-19 OneTrust, LLC Privacy management systems and methods
US11366786B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing systems for processing data subject access requests
US11481710B2 (en) 2016-06-10 2022-10-25 OneTrust, LLC Privacy management systems and methods
US10740487B2 (en) 2016-06-10 2020-08-11 OneTrust, LLC Data processing systems and methods for populating and maintaining a centralized database of personal data
US10909265B2 (en) 2016-06-10 2021-02-02 OneTrust, LLC Application privacy scanning systems and related methods
US10878127B2 (en) 2016-06-10 2020-12-29 OneTrust, LLC Data subject access request processing systems and related methods
US11222139B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems and methods for automatic discovery and assessment of mobile software development kits
US11238390B2 (en) 2016-06-10 2022-02-01 OneTrust, LLC Privacy management systems and methods
US11343284B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US10909488B2 (en) 2016-06-10 2021-02-02 OneTrust, LLC Data processing systems for assessing readiness for responding to privacy-related incidents
US11222142B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for validating authorization for personal data collection, storage, and processing
US11416590B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11544667B2 (en) 2016-06-10 2023-01-03 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11586700B2 (en) 2016-06-10 2023-02-21 OneTrust, LLC Data processing systems and methods for automatically blocking the use of tracking tools
US10282559B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11227247B2 (en) 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US10949565B2 (en) 2016-06-10 2021-03-16 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11438386B2 (en) 2016-06-10 2022-09-06 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11418492B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US11210420B2 (en) 2016-06-10 2021-12-28 OneTrust, LLC Data subject access request processing systems and related methods
US11188862B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Privacy management systems and methods
US11636171B2 (en) 2016-06-10 2023-04-25 OneTrust, LLC Data processing user interface monitoring systems and related methods
US11727141B2 (en) 2016-06-10 2023-08-15 OneTrust, LLC Data processing systems and methods for synching privacy-related user consent across multiple computing devices
US10592648B2 (en) 2016-06-10 2020-03-17 OneTrust, LLC Consent receipt management systems and related methods
US11341447B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Privacy management systems and methods
US11277448B2 (en) 2016-06-10 2022-03-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11520928B2 (en) 2016-06-10 2022-12-06 OneTrust, LLC Data processing systems for generating personal data receipts and related methods
US10606916B2 (en) 2016-06-10 2020-03-31 OneTrust, LLC Data processing user interface monitoring systems and related methods
US10510031B2 (en) 2016-06-10 2019-12-17 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11416589B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US10467432B2 (en) 2016-06-10 2019-11-05 OneTrust, LLC Data processing systems for use in automatically generating, populating, and submitting data subject access requests
US11354434B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US10318761B2 (en) 2016-06-10 2019-06-11 OneTrust, LLC Data processing systems and methods for auditing data request compliance
US11562097B2 (en) 2016-06-10 2023-01-24 OneTrust, LLC Data processing systems for central consent repository and related methods
US11416798B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US11295316B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US11461500B2 (en) 2016-06-10 2022-10-04 OneTrust, LLC Data processing systems for cookie compliance testing with website scanning and related methods
US11416109B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11392720B2 (en) 2016-06-10 2022-07-19 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US10997318B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for generating and populating a data inventory for processing data access requests
US11328092B2 (en) 2016-06-10 2022-05-10 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US11294939B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11200341B2 (en) 2016-06-10 2021-12-14 OneTrust, LLC Consent receipt management systems and related methods
US11625502B2 (en) 2016-06-10 2023-04-11 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US11336697B2 (en) 2016-06-10 2022-05-17 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11410106B2 (en) 2016-06-10 2022-08-09 OneTrust, LLC Privacy management systems and methods
US11403377B2 (en) 2016-06-10 2022-08-02 OneTrust, LLC Privacy management systems and methods
US10846433B2 (en) 2016-06-10 2020-11-24 OneTrust, LLC Data processing consent management systems and related methods
US11188615B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Data processing consent capture systems and related methods
US11475136B2 (en) 2016-06-10 2022-10-18 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US11675929B2 (en) 2016-06-10 2023-06-13 OneTrust, LLC Data processing consent sharing systems and related methods
US10284604B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US11301796B2 (en) 2016-06-10 2022-04-12 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11354435B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US10834449B2 (en) * 2016-12-31 2020-11-10 The Nielsen Company (Us), Llc Methods and apparatus to associate audience members with over-the-top device media impressions
US10270746B2 (en) * 2017-01-25 2019-04-23 Facebook, Inc. People-based user synchronization within an online system
KR102393818B1 (en) * 2017-02-02 2022-05-03 구글 엘엘씨 Custom digital components
US10417664B2 (en) * 2017-02-15 2019-09-17 Facebook, Inc. Notification for pre-announced discount offer
US10013577B1 (en) * 2017-06-16 2018-07-03 OneTrust, LLC Data processing systems for identifying whether cookies contain personally identifying information
US11232163B2 (en) * 2018-08-23 2022-01-25 Walmart Apollo, Llc Method and apparatus for ecommerce search ranking
US11544409B2 (en) 2018-09-07 2023-01-03 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US10803202B2 (en) 2018-09-07 2020-10-13 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
CN110891097B (en) * 2019-12-04 2022-05-17 秒针信息技术有限公司 Cross-device user identification method and device
US11797528B2 (en) 2020-07-08 2023-10-24 OneTrust, LLC Systems and methods for targeted data discovery
WO2022026564A1 (en) 2020-07-28 2022-02-03 OneTrust, LLC Systems and methods for automatically blocking the use of tracking tools
US20230289376A1 (en) 2020-08-06 2023-09-14 OneTrust, LLC Data processing systems and methods for automatically redacting unstructured data from a data subject access request
WO2022060860A1 (en) 2020-09-15 2022-03-24 OneTrust, LLC Data processing systems and methods for detecting tools for the automatic blocking of consent requests
WO2022061270A1 (en) 2020-09-21 2022-03-24 OneTrust, LLC Data processing systems and methods for automatically detecting target data transfers and target data processing
US11397819B2 (en) 2020-11-06 2022-07-26 OneTrust, LLC Systems and methods for identifying data processing activities based on data discovery results
WO2022159901A1 (en) 2021-01-25 2022-07-28 OneTrust, LLC Systems and methods for discovery, classification, and indexing of data in a native computing system
US11442906B2 (en) 2021-02-04 2022-09-13 OneTrust, LLC Managing custom attributes for domain objects defined within microservices
EP4288889A1 (en) 2021-02-08 2023-12-13 OneTrust, LLC Data processing systems and methods for anonymizing data samples in classification analysis
US11601464B2 (en) 2021-02-10 2023-03-07 OneTrust, LLC Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system
WO2022178089A1 (en) 2021-02-17 2022-08-25 OneTrust, LLC Managing custom workflows for domain objects defined within microservices
US11546661B2 (en) 2021-02-18 2023-01-03 OneTrust, LLC Selective redaction of media content
EP4305539A1 (en) 2021-03-08 2024-01-17 OneTrust, LLC Data transfer discovery and analysis systems and related methods
US11562078B2 (en) 2021-04-16 2023-01-24 OneTrust, LLC Assessing and managing computational risk involved with integrating third party computing functionality within a computing system
CN113987255B (en) * 2021-12-30 2022-04-01 南湖实验室 Multi-source ciphertext image retrieval method based on federal learning and secret sharing
US11620142B1 (en) 2022-06-03 2023-04-04 OneTrust, LLC Generating and customizing user interfaces for demonstrating functions of interactive user environments

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010104928A1 (en) * 2009-03-10 2010-09-16 Google Inc. Generating user profiles
US20110295687A1 (en) * 2010-05-26 2011-12-01 Microsoft Corporation Per-User Predictive Profiles for Personalized Advertising
US20150235258A1 (en) * 2014-02-20 2015-08-20 Turn Inc. Cross-device reporting and analytics

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2958043A (en) * 1959-12-15 1960-10-25 Bell Telephone Labor Inc Measurement and elimination of flutter associated with periodic pulses
US20070128899A1 (en) * 2003-01-12 2007-06-07 Yaron Mayer System and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows
US7788260B2 (en) 2004-06-14 2010-08-31 Facebook, Inc. Ranking search results based on the frequency of clicks on the search results by members of a social network who are within a predetermined degree of separation
US8738923B2 (en) 2007-09-14 2014-05-27 Oracle International Corporation Framework for notifying a directory service of authentication events processed outside the directory service
KR101001555B1 (en) 2008-09-23 2010-12-17 한국전자통신연구원 Network ID based federation and Single Sign On authentication method
JP5389702B2 (en) * 2010-03-12 2014-01-15 株式会社日立製作所 ID bridge service system and method
US20150134459A1 (en) * 2010-12-09 2015-05-14 Inmarket Media Llc System and method for using mobile devices to create securitized locally deployed signals to deliver value
WO2012106655A2 (en) 2011-02-05 2012-08-09 Visa International Service Association Merchant-consumer bridging platform apparatuses, methods and systems
US10290017B2 (en) * 2011-11-15 2019-05-14 Tapad, Inc. Managing associations between device identifiers
US11734712B2 (en) * 2012-02-24 2023-08-22 Foursquare Labs, Inc. Attributing in-store visits to media consumption based on data collected from user devices
US9552590B2 (en) * 2012-10-01 2017-01-24 Dstillery, Inc. Systems, methods, and media for mobile advertising conversion attribution
US20140244351A1 (en) 2013-02-28 2014-08-28 Single Funnel Pty Ltd Customer relationship management (crm) systems
WO2014143755A1 (en) * 2013-03-15 2014-09-18 Beulah Works, Llc Knowledge capture and discovery system
US20140365296A1 (en) * 2013-06-07 2014-12-11 Google Inc. Cross-device conversion estimates
US20150242885A1 (en) * 2014-02-21 2015-08-27 Apple Inc. Invitational content attribution
US10055754B2 (en) 2014-03-13 2018-08-21 Tune, Inc. Systems and methods for tracking application installs that distinguish new users from existing users without directly accessing user account records
US10204239B2 (en) * 2015-01-12 2019-02-12 Google Llc Methods and systems for detecting device or carrier change conversions
US10423985B1 (en) 2015-02-09 2019-09-24 Twitter, Inc. Method and system for identifying users across mobile and desktop devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010104928A1 (en) * 2009-03-10 2010-09-16 Google Inc. Generating user profiles
US20110295687A1 (en) * 2010-05-26 2011-12-01 Microsoft Corporation Per-User Predictive Profiles for Personalized Advertising
US20150235258A1 (en) * 2014-02-20 2015-08-20 Turn Inc. Cross-device reporting and analytics

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11449888B2 (en) 2015-07-10 2022-09-20 Twitter, Inc. Reconciliation of disjoint user identifier spaces
WO2023275530A1 (en) * 2021-07-01 2023-01-05 Novatiq Technologies Limited Method, apparatus and system for associating different instances of user engagement with a content provider
GB2608598A (en) * 2021-07-01 2023-01-11 Novatiq Tech Limited Method, apparatus and system for associating different instances of user engagement with a content provider

Also Published As

Publication number Publication date
US10423985B1 (en) 2019-09-24
US10861055B1 (en) 2020-12-08

Similar Documents

Publication Publication Date Title
US10861055B1 (en) Method and system for identifying users across mobile and desktop devices
CN105210094B (en) Identifying users of advertising opportunities based on paired identifiers
US10628858B2 (en) Initiating real-time bidding based on expected revenue from bids
US11063902B2 (en) Method for identifying multiple devices belonging to the same group
US10248975B2 (en) Providing advertisement content via an advertisement proxy server
US20130191215A1 (en) Location-based application pop up
US20130073336A1 (en) System and method for using global location information, 2d and 3d mapping, social media, and user behavior and information for a consumer feedback social media analytics platform for providing analytic measfurements data of online consumer feedback for global brand products or services of past, present, or future customers, users or target markets
EP2891995A1 (en) Systems and methods for search results targeting
US11062361B1 (en) Predicting demographic information of an online system user based on online system login status
JP6660375B2 (en) Selection of alternative content based on content presented to users of online system
US20190080367A1 (en) Optimizing delivery of content items to users of an online system to promote physical store visits as conversion events
US10748192B2 (en) Signal generation for one computer system based on online activities of entities with respect to another computer system
EP2772881B1 (en) Providing advertisement content via an advertisement proxy server
JP2016500457A (en) Generate metrics based on client device ownership
US11144954B1 (en) Physical store visit attribution
US10863316B1 (en) Predicting a physical location of an online system user from multiple candidate physical locations based on a geographic location of a client device associated with the user
US8843817B2 (en) System and method for obtaining user information
US20170287002A1 (en) Targeting content for users of external websites
US20220067778A1 (en) System of determining advertising incremental lift
US20130275218A1 (en) Location-based wish list

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED

AS Assignment

Owner name: TWITTER, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DUTTA, CHINMOY;KANCHA, SANTOSH;LU, WANCHEN;AND OTHERS;SIGNING DATES FROM 20190718 TO 20190821;REEL/FRAME:056809/0583

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

AS Assignment

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: SECURITY INTEREST;ASSIGNOR:TWITTER, INC.;REEL/FRAME:062079/0677

Effective date: 20221027

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: SECURITY INTEREST;ASSIGNOR:TWITTER, INC.;REEL/FRAME:061804/0086

Effective date: 20221027

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: SECURITY INTEREST;ASSIGNOR:TWITTER, INC.;REEL/FRAME:061804/0001

Effective date: 20221027

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION