US20220230202A1 - Systems and methods for matching online users across devices - Google Patents

Systems and methods for matching online users across devices Download PDF

Info

Publication number
US20220230202A1
US20220230202A1 US17/657,930 US202217657930A US2022230202A1 US 20220230202 A1 US20220230202 A1 US 20220230202A1 US 202217657930 A US202217657930 A US 202217657930A US 2022230202 A1 US2022230202 A1 US 2022230202A1
Authority
US
United States
Prior art keywords
user
user device
request
devices
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US17/657,930
Inventor
Nicholas P. MILLER
Simon D. Edwards
Alan J. MILFORD
Denys P. KIM
Bart W.R. SCHELFHOUT
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yahoo AD Tech LLC
Original Assignee
Yahoo AD Tech LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yahoo AD Tech LLC filed Critical Yahoo AD Tech LLC
Priority to US17/657,930 priority Critical patent/US20220230202A1/en
Assigned to YAHOO AD TECH LLC reassignment YAHOO AD TECH LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: VERIZON MEDIA INC.
Assigned to VERIZON MEDIA INC. reassignment VERIZON MEDIA INC. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: OATH (AMERICAS) INC.
Assigned to AOL ADVERTISING INC. reassignment AOL ADVERTISING INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EDWARDS, Simon D., MILFORD, ALAN J., KIM, DENYS P., MILLER, NICHOLAS P., SCHELFHOUT, BART W.R.
Publication of US20220230202A1 publication Critical patent/US20220230202A1/en
Assigned to OATH (AMERICAS) INC. reassignment OATH (AMERICAS) INC. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: AOL ADVERTISING INC.
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0255Targeted advertisements based on user history
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0269Targeted advertisements based on user profile or attribute

Definitions

  • Various embodiments of the present disclosure relate generally to online user identity management and to delivering Internet content and advertising. More specifically, exemplary embodiments of the present disclosure relate to systems and methods for identifying users as they use various devices to access the Internet (e.g., by matching devices and browsers to common users), and to online advertising based on users' identities for targeted and behavioral advertising.
  • Internet cookies have become a ubiquitous and invaluable tool for performing Internet advertising and other important online functions.
  • Traditional techniques for targeting electronic advertising involve configuring users' Internet browsers such that third party cookies can be set, read from, and written to.
  • a cookie is set on a browser, one of the identifying elements of the cookie is the domain from which it was served. If an Internet user visits, for example, www.site.com and that site contains code to set a cookie, then that cookie will be set with “site.com” as its domain.
  • site.com can also embed code that pulls content, such as ads, from URLs that are not on the site.com domain and those ads can also set cookies.
  • site.com can have code on its page that pulls an ad from, by way of example, www.adnetwork.com.
  • the ad will be served from adnetwork.com and will set cookies on the adnetwork.com domain.
  • Online advertising may be significantly enhanced by web browsers that, by default or by settings, allow third party cookies, and by people who permit visited sites to set and read third party cookies.
  • Use of third party cookies enables ad networks to access cookies that they set across a wide network of websites, thereby enabling behavioral and contextual advertising to web viewers across many visited websites.
  • web browsers that are set to allow third party cookies will allow, for example, adnetwork.com to set its cookie despite the user having visited www.site.com.
  • the same browser setting will also allow adnetwork.com to access any cookies set under their domain regardless of which site the Internet user is visiting.
  • ad networks typically have hundreds or thousands of partners (often referred to as “publishers”) that publish online content along with “ad tags” provided by their partner ad network.
  • publishers may engage an ad network to efficiently and profitably advertise to those websites' viewers.
  • the ad network provides each of those sites with an ad tag having the ad network's domain, e.g., “adnetwork.com.”
  • the ad network may access cookie data of visitors to its partners' sites (i.e., across its entire network of sites), even though those sites' domains (e.g., www.news.com, etc.) do not match the ad network's domain.
  • the ad network's ad tag on each site may access cookie data associated with the domain of the ad tag.
  • the ad network may learn more about a user's browsing history across its network, and therefore more about the user's likely demographics, interests, purchasing goals, and other useful advertising information.
  • impressions Each time an Internet advertisement is shown to a website visitor is known as an “impression.”
  • the user may select, or “click,” on the advertisement, or may take another “action,” such as completing an online form to request more information. If the user later purchases the product, the purchase is referred to as a “conversion” of the impression.
  • Advertisers may be interested in impressions (e.g., if they are trying to increase awareness of a brand), clicks (e.g., if they are trying to provide more information about a product), or conversions (e.g., if they are trying to make sales or get new users to sign up for services).
  • Advertisers may pay advertising networks and therefore publishers based on, for example, impressions, clicks, or conversions over the course of an advertising campaign.
  • an advertiser may have a spending plan that specifies how the advertiser wishes to spend its budget during a campaign.
  • Advertising networks rely on being able to accurately identify the person viewing an advertising creative in order to tailor the advertising creative to the user's specific interests, provide frequency capping, and provide other user specific functionality.
  • the user's identity is often tied to a user profile (targeting profile) containing information about their demographics, interests, and programmatically determined properties (such as look-a-like segmentation). This allows the advertising creative to be highly targeted to the specific user, providing more relevant offers and opportunities and as a result improving click through and conversion rates.
  • cookies enable advanced targeting and advertising to users whose browsers enable third party cookies
  • these technologies are unable to leverage browsing history, behavioral and contextual information, and other intelligence relating to a user when it is divided among multiple devices or browsers.
  • most modern users of the Internet often use more than one device to access the Internet over the course of a single day, such as, for example, a PC at home, a laptop at work, and one or more tablets and/or mobile devices throughout the day, whether employer-provided or personal.
  • the advantageous user IDs, browsing history, demographic data, etc. can only be stored in relation to a cookie stored for a particular browser on a particular device.
  • methods for associating a plurality of Internet-enabled devices with a common user profile for targeting Internet content or advertising.
  • One method includes receiving, from a plurality of Internet-enabled devices, a plurality of requests for electronic content or advertising; extracting, from each of the plurality of requests, a source IP address and a unique identifier associated with the respective Internet-enabled device; for each source IP address for which requests were received over a predetermined time period from a number of Internet-enabled devices below a threshold number of devices, identifying each possible pair of devices from which requests were received; and for each possible pair of devices, calculating a probability that the pair of devices are owned or operated by a common user.
  • systems for associating a plurality of Internet-enabled devices with a common user profile for targeting Internet content or advertising.
  • One system includes a data storage device storing instructions for associating a plurality of Internet-enabled devices with a common user profile for targeting Internet content or advertising; and a processor configured to execute the instructions to perform a method including: receiving, from a plurality of Internet-enabled devices, a plurality of requests for electronic content or advertising; extracting, from each of the plurality of requests, a source IP address and a unique identifier associated with the respective Internet-enabled device; for each source IP address for which requests were received over a predetermined time period from a number of Internet-enabled devices below a threshold number of devices, identifying each possible pair of devices from which requests were received; and for each possible pair of devices, calculating a probability that the pair of devices are owned or operated by a common user.
  • a non-tangible computer-readable medium storing instructions that, when executed by a processor, cause the processor to perform a method for associating a plurality of Internet-enabled devices with a common user profile for targeting Internet content or advertising, the method including: receiving, from a plurality of Internet-enabled devices, a plurality of requests for electronic content or advertising; extracting, from each of the plurality of requests, a source IP address and a unique identifier associated with the respective Internet-enabled device; for each source IP address for which requests were received over a predetermined time period from a number of Internet-enabled devices below a threshold number of devices, identifying each possible pair of devices from which requests were received; and for each possible pair of devices, calculating a probability that the pair of devices are owned or operated by a common user.
  • FIG. 1 is a series of schematic diagrams depicting exemplary environments in which users may use disclosed devices and methods according to an exemplary embodiment of the present disclosure
  • FIG. 2 is a schematic diagram of an exemplary environment and system for matching users and/or user advertising IDs across devices and browsers, according to an exemplary embodiment of the present disclosure
  • FIG. 3 is a flow diagram of an exemplary environment, systems, and data flow for matching users and/or user advertising IDs across devices and browsers, according to an exemplary embodiment of the present disclosure
  • FIG. 4 is a flow diagram of an overview method for performing Internet advertising techniques based on matching users and/or user advertising IDs across devices and browsers, according to an exemplary embodiment of the present disclosure
  • FIG. 5 is a flow diagram of one exemplary method for performing Internet advertising techniques based on matching users and/or user advertising IDs across devices and browsers, according to an exemplary embodiment of the present disclosure
  • FIG. 6 is a flow diagram of another exemplary method for performing Internet advertising techniques based on matching users and/or user advertising IDs across devices and browsers, according to an exemplary embodiment of the present disclosure.
  • FIG. 7 is a simplified functional block diagram of a computer and/or server that may be configured as a device or system for performing Internet advertising techniques based on matching users and/or user advertising IDs across devices and browsers, according to an exemplary embodiment of the present disclosure.
  • prior Internet advertising technologies involved cookies that stored advertising identifiers that are local or specific to a single machine/device or browser.
  • the present disclosure describes systems and methods for linking a user's identity across the user's devices to generate and leverage additional opportunities to reach the user with targeted advertising, and assemble fuller, more accurate behavioral profile of a user through the observation of larger slices of the users online activities.
  • the present disclosure describes a platform configured to link together individual unique targeting identities to create a holistic profile of a user's activity and behavior across multiple devices, and make that profile available to other systems for the purposes of delivering targeted advertising and content, and for the purposes of research and analysis.
  • Various aspects of the present disclosure are related to pluggable algorithms that create statistical links between unique devices or browsers, for example a user's desktop and their mobile phone, multiple web browsers on the same device, multiple mobile devices.
  • the resulting linkage allows content and advertising to be displayed on one device, using information collected about the user on the others. This permits a more complete view of the user to be generated regardless of which device they are using to access the internet.
  • ad calls and embedded pixel calls may collect information about the user (including some kind of identifier, such as the value of a cookie or a device identifier) and pass it back to a server.
  • ad calls and embedded pixel calls may collect information about the user (including some kind of identifier, such as the value of a cookie or a device identifier) and pass it back to a server.
  • Each web page visit, click, or other unit of activity may be considered an “event,” and messages generated for these events may be streamed into a software application, which consists of multiple tiers of filtering, sorting, aggregating, and the application of statistical algorithms.
  • every step of the disclosed methods may implement specific logic to an inbound “event,” transforming or enriching the data before passing it onto the next step.
  • the events may be aggregated together into increasingly large time blocks allowing multiple events to be evaluated at the same time. Further analysis may be performed on the aggregated results through the application of deterministic and probabilistic algorithms.
  • the data may stream through the application and the results may be pushed out in real time.
  • events may be captured and persisted to storage to permit batch or offline processing and analysis to be conducted.
  • the application supports multiple routes through the available processing steps, or algorithms, the exact pathway being determined by the data contained within the event.
  • the processing algorithms can be dynamically configured and could be described as pluggable, allowing new algorithms to be added to the system and existing algorithms to be configured dynamically.
  • the present disclosure is directed to linking together or matching all of the devices and/or browsers that belong to a specific user.
  • the term “devices” as used herein should be construed to cover both actual physical devices, such as mobile phones, tablets, and desktop or laptop computers, as well as different browser instances that may exist on the same physical piece of hardware.
  • Each step in the disclosed processing algorithms may evaluate the likelihood that two devices belong to the same user, by looking at properties, such as what IP address the request originates from, the location of the IP address, the time of day and day of the week the event occurred on, any authentication data that is available, any third party identifiers that have been made available, such as social network user identifiers, the type of device and browser being used, any information already known about the device or user (such as targeting segments), the request headers and other information that can be added to the event message by up-stream applications.
  • properties such as what IP address the request originates from, the location of the IP address, the time of day and day of the week the event occurred on, any authentication data that is available, any third party identifiers that have been made available, such as social network user identifiers, the type of device and browser being used, any information already known about the device or user (such as targeting segments), the request headers and other information that can be added to the event message by up-stream applications.
  • the present disclosure may involve monitoring a unique identifier for a device or browser (e.g., obtained using a cookie), observing how it appears on different IP addresses over time, and comparing this to how other unique identifiers appear on different IP addresses over time.
  • the present disclosure may also involve identifying pairs of identifiers that have a similar pattern (e.g., if they appear on the same non-public IP address a threshold number of times per day, for a certain percentage of the preceding X days), and thus establishing a link or relationship between the two device/browser identifiers, and also any logical distinction between devices.
  • the disclosed techniques may involve weighting the relationship between two devices or browsers by looking at the time of day these devices appear on an IP address, giving greater weight to those times of day when a user is most likely to be on their home network rather than on a public network or accessing the internet from work.
  • the present disclosure may involve further validating this relationship by looking at pre-existing data known about the devices/browsers and looking for similarities between the two, allowing the link to be confirmed or rejected.
  • This pre-existing data can be behavioral targeting segments, demographic data, or geographic data.
  • the disclosed embodiments may include using first party authentication data to create concrete links between two devices.
  • the disclosed embodiments may further include using authentication data collected from email service authentication (IMAP) associated with an IP address to compare with first party authentication data to create links between multiple devices/browsers.
  • IMAP email service authentication
  • the disclosed embodiments may further include generating multiple pairs of linked devices and grouping these together to create a complete picture of a user across all the devices they use to access the internet.
  • the disclosed embodiments may further include grouping users together into households, allowing household level targeting.
  • the disclosed embodiments may further include grouping larger sets of users together by some property, such as public network, to allow targeting of organizations (such as universities), specific locations (e.g., public places, such as coffee shops, shopping centers, public transport infrastructure, etc.).
  • the disclosed embodiments may further include undertaking one or more components of the above-described analysis in real-time, such as by streaming events through a multi-tier processing application, aggregating, sorting, and filtering data to produce the final result (e.g., event driven architecture) and immediately making this analyzed data available to external systems.
  • FIG. 1 is a schematic diagram of a series of environments in which users may access Internet content and advertising, according to exemplary embodiments of the present disclosure.
  • FIG. 1 depicts how the same user 100 may access the Internet using any number or type of Internet-enabled devices, such as, for example, a mobile device 102 (e.g., smartphone, PDA, etc.), a work computer 104 (e.g., such as a PC, Windows, Mac, etc., whether desktop or laptop), a home computer 106 (e.g., a PC or Mac laptop or desktop), an automobile computer 108 (e.g., whether OEM or after-market), a tablet 110 , or any other type of kiosk, computer, or mobile device connected to the Internet through a wired or wireless connection.
  • a mobile device 102 e.g., smartphone, PDA, etc.
  • a work computer 104 e.g., such as a PC, Windows, Mac, etc., whether desktop or laptop
  • a home computer 106 e.g
  • a typical user might wake up in the morning and check the weather and his or her e-mail on his or her smartphone 102 .
  • the user may then drive to work and access Internet content, such as traffic or news, through his or her automobile computer 108 .
  • the user may then operate a computer 104 upon arriving at his or her workplace, including to access Internet content, whether related to work activities and/or personal activities.
  • the user may then return home in the evening and use one or more of a home computer 106 and a tablet 110 .
  • the preceding scenario is only exemplary in nature, and users' Internet habits may vary widely in terms of which devices they use at given locations and times.
  • a tablet 110 may be used only at work or only at home, while other users may use a tablet 110 while at home and at work, and for both personal and professional activities.
  • some users may use a mobile device 102 to access both personal and professional Internet content and e-mail throughout the day, even while also using a work computer 104 .
  • a user may use a home computer 106 at non-traditional times of the day, and may use the home computer 106 to perform professional activities, whether during the day or evening.
  • FIG. 2 illustrates an exemplary environment in which users may access the Internet using multiple devices, including a plurality of user devices 102 - 110 .
  • FIG. 2 also illustrates an exemplary system for matching users and/or user advertising IDs across devices and browsers, the system including one or more of: publisher servers 112 , advertiser servers 114 , and user matching server systems 150 , all disposed in communication with the Internet 101 .
  • publisher servers 112 and advertiser servers 114 may be owned and operated by publishing and advertising entities, respectively, and not be strictly part of the same system as user matching server systems 150 .
  • user devices 102 - 110 may be owned and used by one or more people, who may be viewers of web pages over the Internet, either through a mobile browser or web browser stored on respective user devices.
  • user devices 102 - 110 may include any type of electronic device configured to send and receive data, such as websites and electronic advertisements, over the Internet.
  • each of user devices 102 - 110 may include a server, personal computer, tablet computer, mobile device, smartphone, and/or personal digital assistant (“PDA”) disposed in communication with the Internet.
  • PDA personal digital assistant
  • Each of user devices 102 - 110 may have a web browser or mobile browser installed for receiving and displaying web and/or ad content from web servers.
  • each of user devices 102 - 110 may be configured to receive and display data that is received from one or more of publisher servers 112 , advertiser servers 114 , and user matching server systems 150 , among any other web servers, domain name system (“DNS”) servers, content distribution network (“CDN”) servers, etc., over the Internet.
  • DNS domain name system
  • CDN content distribution network
  • a user may own and, simultaneously or intermittently, use one or more of user devices 102 - 110 , whether of similar or different type.
  • Publisher web servers 112 may be owned and/or operated by any entities having inventories of available online advertising space.
  • publishers may include online content providers, search engines, e-mail programs, or any other online site or program having online user traffic.
  • Publishers may interact with user devices 102 - 110 , advertiser servers 114 , and user matching server systems 150 , through publisher servers 112 connected to the Internet.
  • publishers may be able to communicate inventory information, such as site information, demographic information, cost information, etc., to other entities in the environment of FIG. 2 .
  • Advertiser servers 114 may be owned and/or operated by any entities having content, such as online advertisements (e.g., display ads, banner ads, pop-ups, etc.) desired to be delivered to online users. Advertisers may interact with user devices 102 - 110 , publisher servers 112 , and/or user matching server systems 150 , through advertiser servers 114 connected to the Internet 101 . Thus, advertisers may be able to communicate advertising information, such as ad information, targeting information, consumer information, budget information, bidding information, etc., to other entities in the environment of FIG. 2 .
  • advertising information such as ad information, targeting information, consumer information, budget information, bidding information, etc.
  • User matching server systems 150 may be configured to interact with one or more of user devices 102 - 110 , publisher servers 112 , and advertiser servers 114 over the Internet 101 to perform any of the presently disclosed techniques and methods.
  • user matching server systems 150 may include one or more of: a plurality of ad servers 152 , user matching processor(s) 154 , and database(s) 156 .
  • ad servers 152 may be operated by an operator only contractually or even loosely affiliated with an operator of user matching processor 154 .
  • the ad servers 152 and user matching processor 154 may be operated by the same advertising entity or online entity.
  • Ad servers 152 may include any type of servers configured to process advertising information from advertisers and/or site information from publishers, and send and receive ad requests and information from user devices 102 - 110 , either directly or indirectly.
  • ad servers 152 may be owned and operated by an ad network, which may be a business that receives ad buys from advertisers, and serves ads on inventory supplied by publishers.
  • an ad network operating ad servers 152 may receive revenue from advertisers, purchase impressions from publishers, and serve ads on publishers' web pages when viewers associated with user devices 102 - 110 view those web pages.
  • ad servers 152 may be configured to interact with user matching processor 154 , such as through one or more APIs associated with user matching processor 154 , to obtain one or more of: unique user IDs, cookie data, browsing history, demographic data, user profile data, etc., in response to interaction from user devices 102 - 110 .
  • ad servers 152 may be remote web servers that receive advertising information from advertisers and serve ads to be placed by publishers.
  • Ad servers 152 may be configured to serve ads across various domains of publishers, for example, based on advertising information provided by advertisers.
  • Ad servers 152 may also be configured to serve ads based on contextual targeting of web sites, search results, and/or user profile information.
  • ad servers 152 may be configured to serve ads based on ad tags served by advertiser servers 114 and/or publisher servers 112 , and on ad requests received from user devices 102 - 110 .
  • Ad servers 152 may be configured to send and receive data from user devices 102 - 110 , publisher servers 112 , advertiser servers 114 , and/or user matching processor 154 , over the Internet.
  • Ad servers 152 and user matching processor 154 may include any type or combination of computing systems, such as clustered computing machines and/or servers.
  • each of ad servers 152 and user matching processor 154 may be an assembly of hardware, including a memory, a central processing unit (“CPU”), and/or a user interface.
  • the memory may include any type of RAM or ROM embodied in a physical storage medium, such as magnetic storage including floppy disk, hard disk, or magnetic tape; semiconductor storage such as solid state disk (SSD) or flash memory; optical disc storage; or magneto-optical disc storage.
  • the CPU may include one or more processors for processing data according to instructions stored in the memory.
  • the functions of the processor may be provided by a single dedicated processor or by a plurality of processors.
  • the processor may include, without limitation, digital signal processor (DSP) hardware, or any other hardware capable of executing software.
  • DSP digital signal processor
  • the user interface may include any type or combination of input/output devices, such as a display monitor, touchpad, touchscreen, microphone, camera, keyboard, and/or mouse.
  • one or more of ad servers 152 and user matching processor 154 may be programmed with instructions to perform a method of user matching user advertising IDs across devices and browsers, and performing online targeted and behavioral advertising across user devices, according to the exemplary disclosed methods, such as the exemplary methods described with respect to FIGS. 3-6 below.
  • FIG. 3 is a schematic diagram of the flow of information between users and components of user matching server systems 150 for matching users and/or user advertising IDs across devices and browsers, and for performing online targeted and behavioral advertising across user devices, according to an exemplary embodiment of the present disclosure.
  • user devices 102 - 110 , publisher servers 112 , advertiser servers 114 , and ad servers 152 may exchange data with one or more of user matching processor 154 and databases 156 of user matching server systems 150 (all through one or more computers and/or servers connected to the Internet 101 , as described with respect to FIG. 2 ).
  • FIG. 3 depicts an exemplary embodiment of user matching server system 150 , operating a plurality of platforms for receiving online event data from users, e.g., over the Internet, for matching users across devices for performing delivery of targeted content and advertising.
  • user matching server system 150 may include a mobile services platform 302 and an event formatting platform 304 .
  • mobile services platform 302 may receive online event data from users based on the users' interaction with any of the users' mobile devices, such as mobile devices 102 and/or tablet devices 110 .
  • the event formatting platform 304 may receive online event data from users based on the users' interaction with any of the users' non-mobile devices, such as laptop and/or desktop PCs 104 , 106 .
  • User matching server system 150 may further include a user matching platform 306 disposed in communication with a user targeting platform 308 .
  • the user matching platform 306 and user targeting platform 308 may each be disposed in communication with one or more components of a distributed file system for storing, indexing, and parsing through large quantities of data, such as distributed file system 310 .
  • the user targeting platform 308 may be disposed in communication with one or more ad servers 152 , which may be configured to identify and serve advertisements based on targeting rules set by the user targeting platform 308 for devices matched to users by user matching platform 306 . Any or all of the components of FIG.
  • any component or subsystem of the platforms of FIG. 3 may be outsourced and/or contracted out to an entity distinct from or in association with an operator of ad servers 152 , publishers 112 , and/or advertisers 114 .
  • the structures, configurations, and operations of mobile services platform 302 , event formatting platform 304 , and user matching platform 306 will now be described in greater detail.
  • user matching server system 150 may be configured to collect information about online activity that users 100 engage in, and online events, such as requests, transmissions, downloads, ad calls, clicks, mouse-overs, purchases, etc. that users make using their various Internet-connected devices 102 - 110 .
  • mobile services platform 302 may be configured for receiving and handling advertising requests from native apps and web browsers of mobile phone and tablet devices, such as by constructing a message for each inbound request and forwarding each constructed message to a queue for consumption by user matching platform 306 .
  • the user may have requested a web page via the mobile web browser, which includes code that makes a request for an advertisement.
  • the request for the advertisement may be routed either to the mobile services platform 302 (which determines which ad serving platform the request should be routed to) or routed directly to an ad server 152 to process the request. In either case, the destination ad server 152 may respond by delivering an advertising creative and logging certain data about the request.
  • mobile services platform 302 may collect certain data about the request, and present this message to user matching platform 306 via the message queue. If the events or requests are generated by a mobile application, then the ad requests may be sent directly to mobile services platform 302 in lieu of ad servers 152 .
  • Event formatting platform 304 may be configured to receive data about events from PC (e.g., desktop or laptop) clients, and to construct a suitable message for each event (e.g., ad call, site visit, click, mouse-over, etc.) for forwarding to user matching platform 306 .
  • event formatting platform 304 may be implemented as a real time exchange (or “RTX”) integration system that collects pixel tracking events received from user devices 104 , 106 , and forwards messages about those PC events to an Active MQ cluster for consumption by the user matching platform 306 .
  • the Active MQ cluster may be configured to receive constructed, formatted messages from both the mobile services platform 302 and event formatting platform 304 , for consistent delivery to the user matching platform 306 .
  • a PC-based ad request may originate from a web browser or from any other type of software, such as a client application for exchanging messages and/or multimedia.
  • User matching platform 306 may be configured to, along with mobile services platform 302 and event formatting platform 304 , perform techniques involving the methods of FIGS. 4 and 5 .
  • user matching platform 306 may implement a Streaming Aggregation Framework (“SAF”), which may be a highly-scalable framework for quickly and efficiently processing large volumes of mobile and non-mobile Internet events in real-time, for identifying matches between devices.
  • SAF Streaming Aggregation Framework
  • This structure may involve streaming messages through a series of tiers, each tier performing one or more of a plurality of desired operations on the received events before passing on a result message to a subsequent tier.
  • This design structure may allow analysis to be performed in near real time.
  • the user matching platform 306 may include a plurality of processing tiers through which event messages received from mobile services platform 302 and/or event formatting platform 304 are streamed and within which processing is performed. Processing may include filtering, aggregating, sorting, applying statistical or mathematical models, and/or routing of outbound result messages to specific destinations.
  • user matching platform 306 may identify groups of two or more devices or browsers that are likely owned or operated by a common Internet user. For example, user matching platform 306 may receive event messages from mobile services platform 302 and/or event formatting platform 304 , and process those messages according to the methods described below with respect to the flow charts of FIGS.
  • User targeting platform 308 may operate as a service that creates, stores, maintains, and makes available user targeting data to ad servers and other components of user matching system 150 .
  • user targeting platform 308 may implement one or more of the targeting algorithms described in U.S. Pat. No. 8,504,411 filed by AOL Advertising Inc. on Sep. 14, 2009, and U.S. patent application Ser. No. 13/241,856, filed by AOL Advertising Inc. on Sep. 23, 2011, the entireties of which are hereby incorporated herein by reference.
  • FIG. 4 is a flow diagram that depicts an exemplary method performed by user matching platform 306 for matching users across various Internet-enabled devices, and by user targeting platform 308 for performing online advertising based on users' identities for targeted and behavioral advertising.
  • FIG. 4 depicts a method 400 that includes determining whether two devices appear on the same non-public IP address over a threshold number of times within a predetermined period of time (e.g., within one day). If the two devices appear on the same non-public IP address over a threshold number of times within a predetermined period of time, then the method may include identifying those devices as being matched to a user for that predetermined period of time (e.g., that day) (step 402 ).
  • the present disclosure may involve various assumptions, such as: if two devices or browsers appear on the IP address of a public network, such as that of a coffee shop or library, then they are not necessarily very likely to be owned or operated by the same individual. However, if two devices or browsers appear on the IP address of a private network, such as that of a person's home wired/wireless network or mobile hotspot, then they are more likely to be owned or operated by the same individual.
  • public and private networks may be distinguished based on the number of devices or browsers that “appear on” that network (i.e., for which requests for websites or ads are received). For example, it might be typical or reasonable for a home network to have up to 8 different devices (e.g., 2 per person in avg. household of 4). But a network from which requests are received from 10 different devices might be assumed to be a public network that offers little assurance that two devices are more likely owned or operated by the same person.
  • the method may identify those devices as being matched to a user for that predetermined period of time (e.g., that day).
  • the period of time may be any amount of time, such as an hour, six hours, twelve hours, twenty-four hours, etc.
  • the threshold number of times may be any number of times, such as five, ten, twenty, fifty, etc.
  • Method 400 further includes determining whether the two devices are identified as being matched to a user for a threshold number of time periods within the last predetermined number of time periods (e.g., three of the last five days, or five of the last seven days). If the two devices are identified as being matched to a user for a threshold number of time periods within the last predetermined number of time periods (e.g., three of the last five days, or five of the last seven days), then the method may include identifying those devices as being matched to the user until the match is set to expire (step 404 ). More specifically, if the time period is six hours, then step 404 might link two devices as likely associated with a common user if those devices are initially linked for three of the four preceding six hour periods.
  • a threshold number of time periods within the last predetermined number of time periods e.g., three of the last five days, or five of the last seven days.
  • step 404 might link two devices as likely associated with a common user if those devices are initially linked for seven of the ten preceding days.
  • the number of preceding time periods may be set to any value, and the threshold may be set to any number of the preceding time periods, or any percentage of the preceding time periods.
  • Method 400 may then include performing targeting of content and/or advertising to a user based on the identification of a pair of the user's devices as belonging to the same user (step 406 ).
  • user targeting platform 308 may leverage the matches and linkages generated by and received from user matching platform 306 to advertise to a user based on an advertising profile common to multiple user devices or a segmentation profile merged from multiple device profiles, and/or based on which device a user is using to access the Internet. For example, if it is determined that a user is using his or her work computer, the advertising may incorporate all of the browsing and demographic data across the user's devices to determine an ad the user will most likely click on while using his or her work computer. If it is determined that a user is using his or her home computer, the advertising may incorporate all of the browsing and demographic data across the user's devices to determine an ad the user will most likely click on while using his or her home computer.
  • the advertising may incorporate all of the browsing and demographic data across the user's devices to determine an ad the user will most likely click on while using his or her mobile device.
  • the advertising system may be freed from previous constraints of considering only a user's work browsing history when delivering ads to the user's work computer browser, or considering only a user's home browsing history when delivering ads to the user's home computer, or considering only a user's mobile browsing history when delivering ads to the user's mobile device.
  • the advertising system may advantageously use the presently disclosed device matching techniques and related systems and methods to leverage a user's demographic and browsing history across all of the user's devices to identify and deliver targeted ads.
  • FIG. 5 is a flow diagram that depicts an exemplary method 500 performed by user matching platform 306 for matching users across various Internet-enabled devices, and by user targeting platform 308 for performing online advertising based on users' identities for targeted and behavioral advertising.
  • method 500 may include receiving “events” or any type of requests for content and/or ads from a plurality of user devices over the Internet (step 502 ).
  • Events or requests received from user devices may originate from a PC (e.g., laptop or desktop) web browser, a PC application, a mobile web browser, a mobile application, or any other client software that is installed on an end user device and which is capable of making requests via a public network to a system or service that is hosted on a remote system, such as a web server.
  • PC e.g., laptop or desktop
  • the request from the user may be for any type or combination of electronic content and/or advertising, whether in textual, graphical, video, and/or audio format.
  • Events may be defined as distinct interactions between a user and a service which can be considered complete and self-contained. In certain embodiments, these interactions may take the form of advertising impressions.
  • An impression may be any request made by client side code (e.g., a JavaScript tag) that results in a request to an ad serving platform that responds with the delivery of an advertising creative.
  • client side code e.g., a JavaScript tag
  • events may include any client side initiated request over HTTP/S to a host side process that is able to capture various properties of the request and make them available to the user matching system, such as, for example, events generated by third party content or advertising platforms.
  • Method 500 may further include extracting from the requests information including: source IP address, unique device ID, and/or cookie data, if any (step 504 ).
  • method 500 may include extracting a time of the event (i.e., the time of an impression, click, purchase, etc.), a source IP address, a unique user ID and/or unique device ID, and a user agent.
  • Extracted information may include any information transmitted in the contents of cookies stored on the user's device against the domain of the request, HTTP headers containing information about the user agent and its capabilities (user agent, accept-type, language/locale, etc.), and/or any parameters determined on the client side and appended to the request URL.
  • the extracted information may also include any unique identification of the user's browser or device, such as the value of a cookie, a mobile device identifier, a third party identifier added to the request, or an identifier generated by the application code responsible for sending the request.
  • a value may be passed as part of the request that uniquely identifies either the device or the software upon the device that is originating the request.
  • one or more unique identifiers may be available and can be transmitted with the request.
  • identifiers of user devices or software may be referred to as universal targeting identifiers (“UTIDs”).
  • UTDs universal targeting identifiers
  • the unique identifiers used to describe or identify any particular user device or software (browser or application) may depend on the context of the received request (i.e., the type of software originating the request).
  • a unique identifier may include an identifier stored in a cookie text file or in browser local storage.
  • a unique identifier may include an identifier stored in a cookie (which may or may not be shared with a system default browser), or a unique identifier generated by the application or a host of the application, and appended to any HTTP requests for advertising.
  • identifiers may be selected based on which mobile platform the application is running on.
  • a unique targeting identifier may be an Identifier For Advertisers (IFA), an application install specific identifier or an identifier that has been generated by the software package used to create the application, such as a targeting identifier stored in a cookie, an Android ID, a Microsoft ID, or any other suitable identifier.
  • the identifier may be an Identifier for Vendors (“IFV”), which is a common identifier that spans across all apps produced by a specific vendor.
  • method 500 may include formatting captured or logged messages into structures suitable for user matching platform 306 .
  • each inbound message may be validated to ensure that the necessary information is present and that it is formatted correctly.
  • UTIDs may be validated with the following regular expression: [a-zA-Z0-9._-] ⁇ 14,40 ⁇ . Messages that do not meet the specification described above may be discarded. Other cleaning, filtering operation and data enrichment may be conducted on the content of the messages to ensure they are suitable to be processed by user matching platform 306 .
  • Method 500 may further include inferring, for each of the requests, additional information, such as device type and local time of request (step 506 ).
  • method 500 may include inferring the device family (e.g., mobile phone, tablet device, desktop, laptop, or other) from the user agent, and the time zone of the user from the source IP address.
  • the device family e.g., mobile phone, tablet device, desktop, laptop, or other
  • WURFL Wireless Universal Resource FiLe
  • Method 500 may further include filtering out requests from public or likely-public IP addresses (step 508 ).
  • public networks and public IP addresses may be filtered out by identifying the number of unique browsers appearing on each IP address within a predetermined period of time. If the count exceeds the predetermined threshold, then the IP address may be flagged as public, or likely-public, so that subsequent events occurring at that IP address for some period of time may be ignored, on the assumption that the appearance of two devices appearing on a public IP address are not likely to be matched to the same user.
  • step 508 may include counting the number of devices that appear against an IP address over the course of an hour.
  • the IP address may be added to a blacklist that is broadcast to all processing steps of user matching platform 306 .
  • the threshold may be set as seven or eight devices within a one hour period, and the IP address blacklist may be anywhere from 18 - 24 hours. Of course, any other desired number of devices, time window, and/or expiration window may be used.
  • method 500 may include aggregating all events for a given IP address, UTID, Day Timestamp and Week Time Block into multiple minute buckets (e.g., five, ten, or fifteen minute periods), so that, for example, two or more clicks within a couple of minutes are not treated as separate events.
  • minute buckets e.g., five, ten, or fifteen minute periods
  • Method 500 may further include weighting each request based on the time of day and/or day of week, with heavier weights going to requests determined to likely originate from a user's home network (step 510 ).
  • the presently disclosed methods may be performed based on assumptions that requests made while people are statistically more likely to be at home may be more indicative of requests made between devices owned or operated by the same person. For example, if two devices appear on a network during the middle of the day when most people are at work, then those events may be weighted less. If two devices appear on a network in the evening when most people are at home, then those events may be weighted more.
  • the IP address may be matched through a series of APIs against a proprietary database of IP address allocations. Once the time zone has been determined, three values may be calculated: (1) the Day Timestamp (DayTS), (2) the Timezone Neutral Event Timestamp (User Timestamp), and (3) the Week Time Block (WTB).
  • DayTS Day Timestamp
  • User Timestamp Timezone Neutral Event Timestamp
  • WTB Week Time Block
  • method 500 may be configured to (1) obtain the event timestamp in seconds since epoch in UTC, and (2) subtract the number of seconds the user's location is offset from UTC.
  • timezone neutral event timestamp (i.e., user timestamp) may be calculated based on the following:
  • This value may be the equivalent of the user's local time as if they were in the UTC time zone.
  • Method 500 may then include calculating the day timestamp (“DayTS”) by calculating the start of that day in seconds since the epoch for the purpose of grouping together all events for that user for that date:
  • DayTS day timestamp
  • Method 500 may then include calculating the week time block (“WTB”) and day time block (“DTB”) of an event.
  • WTB week time block
  • DTB day time block
  • each week may be divided into fourteen blocks of time, seven of which are times when a user is unlikely to be on their home network, and seven of which are times when a user is likely to be on their home network.
  • the week time block may represent not only whether the user is likely home (day vs. morning and evenings), but also whether the day is a weekday or weekend.
  • each day may be assigned an integer starting from Sunday as “1,” Monday as “2,” and so on, to Saturday as “7,” allowing one day to be weighted higher than another in the subsequent algorithmic processing.
  • the week time block may be calculated as: ((Day of the Week—1) ⁇ 2)+Day Time Block, where the Day Time Block is determined as follows:
  • Week Time Blocks may be calculated as follows:
  • Method 500 may further include grouping, over a predetermined time period, all requests received from devices originating from each source IP address (step 512 ).
  • Each message corresponding to each event aggregated for a particular source IP address may have one or more of the following fields: IP Address, Event Time Stamp, Unique Targeting Identifier (UTID), Day Timestamp (dayTS), Week Time Block (WTB), User Timestamp, Device Type, Device Brand, and Device Operating System.
  • method 500 may include identifying links between pairs of devices by aggregating all events together over a period of time by IP address, weighting the occurrences of events based on the week time block, summing these occurrences for all occurrences in that window, and generating a score for the pair of devices.
  • method 500 may further include identifying each possible pair of devices for which requests were received from a source IP address (step 514 ).
  • all devices i.e., UTIDs
  • step 514 may include identifying pairs AB, AC, AD, BC, BD, and CD.
  • Method 500 may further include calculating, for each possible pair of devices, based on the weighting, a confidence level that the pair of devices belong to the same user (step 516 ).
  • the confidence level may be calculated based on a mathematical or statistical model of weightings and likelihoods that a device is being operated in the home, and/or that two particular devices are owned or operated by the same user.
  • a weight may be calculated based on the week time block and the number of times the UTIDs were seen. week time blocks during which a user is likely to be on their home network and not a public network are given greater weight.
  • the modulus of the week time block divided by two may be calculated, if the remainder is greater than 0 then the week time block was an odd number and represents a period when the user was more likely to be on a public network.
  • the frequency of occurrence of each UTID on the IP address is multiplied by a weighting factor if the event occurred in a Week Time Block that represents a greater chance of being on a home or private network.
  • the weighting factor may be set to “2” and can be configured dynamically. In one embodiment, only those pairs that have a weighting score that meets a minimum predetermined threshold are sent on to subsequent steps of determining a confidence of the devices being matched to a common user. In one embodiment this threshold may be set to 3 and may be configured dynamically.
  • method 500 may include returning to step 516 to further calculate, for the possible pair of devices, based on the weighting, a confidence level that the pair of devices belong to the same user. If, at step 520 , it is determined that a time period has elapsed, then method 500 may include returning to step 512 to update a grouping of requests received from all devices originating from the source IP address. If, at step 522 , it is determined that updated weights are available, then method 500 may include returning to step 512 to update a grouping of requests received from all devices originating from the source IP address based on recent weights last generated at step 510 .
  • Method 500 may further include identifying a pair of devices as belonging to the same user if the calculated confidence level exceeds a threshold level (step 524 ).
  • step 524 may include receiving a weight assigned to each possible pair of devices that might be matched to a common user.
  • step 524 may include, for a particular pair of devices, receiving a message including one or more of the following fields: UTID 1, UTID 2, IP Address, Day Timestamp (dayTS), Weight, UTID 1 Device Type, UTID 1 Device Operating System, UTID 1 Device Brand, UTID 2 Device Type, UTID 2 Device Operating System, and UTID 2 Device Brand.
  • the confidence level for a particular pair of devices may be calculated by aggregating all weights calculated for each event message received for that pair over a preceding period of time, such as over a 24 hour period starting from the first instance the pair is identified. At the end of the 24 hour window a series of algorithms may be executed to determine a final confidence score for that 24 hour period and an overall confidence score for that link for all time.
  • method 500 may perform an evaluation of the weights of each of the events to calculate a daily (or 24 hour) confidence score. In one embodiment, if the matched pair has been identified it is assigned a value of 20; otherwise it has a value of zero. The logic in this algorithm can be extended to provide a more complex analysis of the daily weight scores when determining the daily confidence score.
  • a final confidence score may be a value between 0 and 100. This value may be used to decide if an identified link is sufficiently well established by comparison with a configurable threshold value. In one embodiment, this value may be set to 60. In one embodiment, the final confidence score may be calculated by taking into account the confidence score achieved on previous days plus any so-called “confidence boosters” (described later). The amount the historic confidence scores can contribute is configured as a proportion of the overall confidence score. In one embodiment, this value may be set to 80, meaning that historic confidence scores alone are enough to permit a link to be considered confidently established.
  • the total number of days to include in the historic lookback is a configurable value, which in some cases may be set to four. For each of the days in the historic look back a proportion of the total available score may be allocated. This is configurable and is currently set to:
  • a subsequent step may make a binary decision that the link exists and allocates it a score of 20 for each day the link was seen.
  • the scores for the last four days would be 0, 20, 20, 20 giving a total score is 60, which meets the threshold and qualifies the relationship as a confident link.
  • link expiry time may be set to four days, which means that even if the confidence score drops below the threshold value, the link is still considered valid until the expiry time is reached.
  • the expiry time is reset each day that the link exceeds the threshold value, which means that a user can stop creating events on both devices for a period of time without causing the relationship to be forgotten (e.g., they may have gone on vacation and only taken one of the devices with them). It also means that if a link was established that was invalid it would only take four days for that relationship to be broken. Overall these processing steps help to ensure that the accuracy of the established links is high.
  • a confidence score may be “boosted” based on one or more additional factors.
  • a booster may be a property that can be assessed about the relationship between two devices that adds weight to the belief that the two devices are linked. A booster can only add confidence to an already established link.
  • some third parties may be able to provide data to us that can be used to validate if an identified link is real.
  • a third party is able to map together device IDs and household registration data using some proprietary mechanism. They make this data available as a feed which is ingested into the user matching platform 306 .
  • method 500 may determine if both the UTIDs are found within the third party data set and if they are linked to the same household identifier. If this relationship is present, a boosting factor may be applied to the confidence score for the link.
  • the value for the boosting factor is configurable, and by way of example may be set to 20. Where a user logs into a system on both devices (perhaps an email or messaging service), it may be determined that a solid link exists. In one embodiment, boosting factor of 100 could be applied ensuring that the link automatically is considered confirmed.
  • the user may interact with a third party service which provides some kind of identifier for the user.
  • a third party service which provides some kind of identifier for the user. This could be a mobile operator adding a header to all devices that belong to a particular user accessing their network, or a user authenticates with a website using a social networking identifier. If this identifier is found appearing on both devices in a link, then method 500 may apply a booster reflecting certainty that this is the same user on both devices. A boosting factor of 100 could be applied to indicate that significant confidence exists about the link.
  • the device type may provide another boosting factor. For example, it has been possible to validate using other available data that when a link is identified between two tablet devices, a high proportion of the time it is the same user. This means that when a link is identified between two tablet devices it may be desirable to apply a boosting factor that is proportional to a previous assessment of the accuracy of this type of link.
  • a record of this may be stored in the local system of record.
  • the system of record may be consulted and the highest score may be used. This could happen where a link is determined via different processing flows or where the same data has been fed to multiple algorithms.
  • Method 500 may further include performing targeting of content and/or advertising based on identification of pair of devices as belonging to the same user (step 526 ).
  • an individual's smartphone might have the device ID “UTID: 123” and be associated with features “x, y, z”
  • their tablet might have the device ID “UTID: 456” and be associated with features “a, b, z”
  • their PC might have the device ID “UTID: 789” and be associated with features “i, j, z.”
  • the individual might have a profile that associates the individual with all of the features, “a, b, i, j, x, y, z.”
  • the individual might have a profile that aggregates the segmentation and/or targeting profiles associated with each of the user's three devices.
  • FIG. 6 is a flow diagram of a method performed by user matching platform 306 for matching users across various Internet-enabled devices, and by user targeting platform 308 for performing online advertising based on users' identities for targeted and behavioral advertising, according to an exemplary embodiment of the present disclosure.
  • FIG. 6 depicts a method 600 for executing techniques between ad servers 152 , user matching processor 154 , and/or databases 156 of user matching server systems 150 to advertise to users based on data collected across a plurality of devices they may use.
  • method 600 may include receiving, from a publisher, a request for an advertisement, the request including a unique identifier and/or instance identifier for a user or the user's device (step 602 ). While an ad request may be received from a publisher, an ad request may alternatively or additionally be received from the user or from the user's device. Specifically, an ad server 152 may receive a request to deliver an ad or ad tag to a user upon the user requesting and/or visiting a web page hosted on a publisher server 112 .
  • the ad request may include the unique ID assigned to the user, the instance ID assigned to the user's device, and/or cookie data containing one or both of the unique ID and the instance ID.
  • the unique ID and/or instance ID may have been matched or linked by user matching platform 302 with a unique ID and/or instance ID of one or more other devices of a plurality of the user's devices.
  • Method 600 may further include receiving, based on the unique identifier and/or instance identifier, a demographic or browsing history information generated from the user's use of a first device (step 604 ).
  • an ad server 152 and/or user matching processor 154 of the user matching server 150 may lookup demographic and/or browsing history information generated from the user's use of a first device.
  • the ad server 152 and/or user matching processor 154 may search databases 156 for the unique identifier and/or instance identifier to find indexed browsing history, demographic data, behavioral information, user profiling information, purchase history, etc.
  • the stored historical data may be data generated from the user's first device or any other device having local storage containing the unique identifier and/or instance identifier.
  • Method 600 may further include determining, based on the demographic or browsing history information generated from the user's use of the first device, an advertisement to display to the user during the user's use of a second device (step 606 ).
  • a user uses a second device to request web content, e.g., from a publisher server 112
  • the user's second device may also request an ad from an ad server 152 .
  • the user's second device may send an ad request containing the user's unique identifier or instance identifier, the ad servers 152 and/or user matching processor 154 may again lookup demographic or browsing history information generated from the user's use of a first device.
  • the ad server 152 and/or user matching processor 154 may search databases 156 for the unique identifier and/or instance identifier to find indexed browsing history, demographic data, behavioral information, user profiling information, purchase history, etc.
  • the stored historical data may be data generated from the user's first device or any other device having a unique identifier or instance identifier that is matched by user matching platform 306 with the unique identifier and/or instance identifier.
  • the ad servers 152 and/or user matching processor 154 may be able to serve ads on the user's device based on one or more of: browsing history, demographic data, behavioral information, user profiling information, purchase history, any or all of which may be based on data collected from more than one device used by the user.
  • publishers 112 may host websites having web pages that display content and advertising.
  • the publisher may send an impression request to an ad network, in this case, an ad server 152 .
  • the publisher 112 may request an advertisement to display to the visiting user.
  • the impression request may include any data elements normally included in an impression request, such as information about the web page, the publisher, and/or the visiting user.
  • the advertising system may select an advertisement for the publisher to display based on an algorithm that considers the received information about the web page, the publisher, and/or the visiting user.
  • the Internet advertising system may, consistent with its ad bidding and exchange techniques and various business rules, award impressions of ads to impression requests from publisher servers 112 .
  • the Internet advertising system through ad servers 152 , may cause ads received from advertiser servers 114 to be displayed on web pages hosted on publisher servers 112 when users devices 102 - 110 request those web pages.
  • the display of the ads may be precisely targeted both to the identities of the users and publishers of servers 112 , and the content of the publisher's web page.
  • the Internet advertising system may select for display the ad that is most likely to generate a strong and favorable reaction from the visiting user, based on assumptions, historical data, and statistics gathered about the publisher's site and the user.
  • a number of use cases are applicable to the above described method of FIG. 6 ., as performed by user matching system 150 .
  • this pixel may add the user to a population of users. The user then visits a different website upon their mobile device upon which an advert is displayed. Because the user was added to a population upon their desktop computer, the user may be immediately retargeted with an appropriate advertising for that population on their mobile device.
  • a user might visit a website on their mobile device and view an advertisement.
  • the advertisement may advertise a specific product that the user is interested in and the user may click on the advertisement, but not purchase the product at that time. Later, when the user is navigating around the Internet on their desktop or laptop, the user may be targeted with an advertisement for the product (or related products) that the user originally saw and expressed an interest in on their mobile device.
  • a user of a laptop or desktop computer may visit many websites, and view many online advertisements, and over time a profile of their interests are generated.
  • the user may also use a mobile device (mobile phone or tablet) to access the Internet.
  • the two devices i.e., the PC and the mobile device
  • the two devices may be linked together (either through a common profile, or associated unique IDs), thereby allowing content and advertising to be targeted to any of these devices (mobile, tablet, and desktop) using the interest profiles generated on the user's desktop computer.
  • a user of a laptop or desktop computer may use multiple browsers to access the Internet.
  • Each browser used by the user may have a separate identity for the purposes of tracking and targeting the user.
  • these devices are linked together according to the disclosed embodiments, it may be possible to target advertising and content appropriate for that user across all of the browsers they use.
  • a user may view on their mobile device an advertisement for a product or service that they are interested in. Later, the user may use their desktop computer to purchase the same product or service. Because the two devices are linked together according to the disclosed embodiments, it may be possible to attribute the purchase to the advertisement they saw on their mobile device allowing cross device, or cross screen, attribution, and allowing reporting and insights to be generated.
  • a user may view an advertisement for a specific campaign on their desktop or laptop.
  • the campaign may be frequency capped to only display to a user once.
  • the user may then navigate around the Internet using their tablet device and encounter pages containing advertisements. Because the two devices may be linked together according to the disclosed embodiments, the advertising network may avoid showing the campaign to the same user again on their tablet device, so as to honor the frequency cap for the campaign reached by the user on their desktop.
  • the user's first device and second device may be any type of device 102 - 110 described with respect to FIGS. 1 and 2 .
  • any number of devices may be applicable within the scope of the description of FIGS. 3-6 .
  • ad or publisher servers may optionally be the same server; and although depicted as a single server system, ad or user matching server systems 150 may be separate and distinct servers accessed by the user's multiple devices, such as devices.
  • the ad or user matching server(s) may determine, based on the demographic or browsing history information generated from the user's use of the first device, an advertisement to display to the user during the user's use of a second device.
  • the user's second device may also request an ad from an ad server 152 .
  • the user's second device may send an ad request containing a unique ID which is matched by user matching platform 306 with a unique ID of the first device, the ad servers 152 and/or user matching processor 154 may again lookup demographic or browsing history information generated from the user's use of a first device.
  • the ad server 152 and/or user matching processor 154 may search databases 156 for the unique identifier and/or instance identifier to find indexed browsing history, demographic data, behavioral information, user profiling information, purchase history, etc.
  • the ad servers 152 and/or user matching processor 154 may be able to serve ads on the user's device based on one or more of: browsing history, demographic data, behavioral information, user profiling information, purchase history, any or all of which may be based on data collected from more than one device used by the user.
  • the advertising systems may then advertise to a user based on which device a user is using to access the Internet. For example, if it is determined that a user is using his or her work computer, the advertising may incorporate all of the browsing and demographic data across the user's devices to determine an ad the user will most likely click on while using his or her work computer. If it is determined that a user is using his or her home computer, the advertising may incorporate all of the browsing and demographic data across the user's devices to determine an ad the user will most likely click on while using his or her home computer.
  • the advertising may incorporate all of the browsing and demographic data across the user's devices to determine an ad the user will most likely click on while using his or her mobile device.
  • the advertising system may be freed from previous constraints of considering only a user's work browsing history when delivering ads to the user's work computer browser, or considering only a user's home browsing history when delivering ads to the user's home computer, or considering only a user's mobile browsing history when delivering ads to the user's mobile device.
  • the advertising system may advantageously use the presently disclosed unique identifier and related systems and methods to leverage a user's demographic and browsing history across all of the user's devices to identify and deliver targeted ads.
  • the presently disclosed systems are configured to allow different platforms and algorithms (e.g., various processing steps) to be chained together in different ways.
  • This configuration can be changed at startup. This allows algorithms to be added and removed. Many parameters used in the algorithm can be configured dynamically while the system is running. This makes it possible to fine tweak the performance of the algorithms without interrupting processing.
  • multiple routes to be defined within the platform allowing the same source events to be routed through different algorithm stacks and the output results to be compared. This opens the possibility for enabling machine learning, where the system performs multiple processing streams in parallel, and based on a measurement of the performance of the different processing routes to select which result to use in the final confidence determination.
  • FIG. 7 provides a functional block diagram illustration of general purpose computer hardware platforms.
  • FIG. 7 illustrates a network or host computer platform 700 , as may typically be used to implement a server, such as user matching processors 154 , or any other server executing user matching platform 306 . It is believed that those skilled in the art are familiar with the structure, programming and general operation of such computer equipment and as a result the drawings should be self-explanatory.
  • a platform for a server or the like 700 may include a data communication interface for packet data communication 760 .
  • the platform may also include a central processing unit (CPU) 720 , in the form of one or more processors, for executing program instructions.
  • the platform typically includes an internal communication bus 710 , program storage and data storage for various data files to be processed and/or communicated by the platform such as ROM 730 and RAM 740 , although the server 700 often receives programming and data via network communications 770 .
  • the hardware elements, operating systems and programming languages of such equipment are conventional in nature, and it is presumed that those skilled in the art are adequately familiar therewith.
  • the server 700 also may include input and output ports 750 to connect with input and output devices such as keyboards, mice, touchscreens, monitors, displays, etc.
  • input and output devices such as keyboards, mice, touchscreens, monitors, displays, etc.
  • the various server functions may be implemented in a distributed fashion on a number of similar platforms, to distribute the processing load.
  • the servers may be implemented by appropriate programming of one computer hardware platform.
  • Storage type media include any or all of the tangible memory of the computers, processors or the like, or associated modules thereof, such as various semiconductor memories, tape drives, disk drives and the like, which may provide non-transitory storage at any time for the software programming. All or portions of the software may at times be communicated through the Internet or various other telecommunication networks.
  • Such communications may enable loading of the software from one computer or processor into another, for example, from a management server or host computer of the mobile communication network into the computer platform of a server and/or from a server to the mobile device.
  • another type of media that may bear the software elements includes optical, electrical and electromagnetic waves, such as used across physical interfaces between local devices, through wired and optical landline networks and over various air-links.
  • the physical elements that carry such waves, such as wired or wireless links, optical links or the like, also may be considered as media bearing the software.
  • terms such as computer or machine “readable medium” refer to any medium that participates in providing instructions to a processor for execution.

Landscapes

  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Systems and methods are disclosed for associating a plurality of Internet-enabled devices with a common user profile for targeting Internet content or advertising. One method includes: receiving, from a plurality of Internet-enabled devices, a plurality of requests for electronic content or advertising; extracting, from each of the plurality of requests, a source IP address and a unique identifier associated with the respective Internet-enabled device; for each source IP address for which requests were received over a predetermined time period from a number of Internet-enabled devices below a threshold number of devices, identifying each possible pair of devices from which requests were received; and for each possible pair of devices, calculating a probability that the pair of devices are owned or operated by a common user.

Description

    TECHNICAL FIELD
  • Various embodiments of the present disclosure relate generally to online user identity management and to delivering Internet content and advertising. More specifically, exemplary embodiments of the present disclosure relate to systems and methods for identifying users as they use various devices to access the Internet (e.g., by matching devices and browsers to common users), and to online advertising based on users' identities for targeted and behavioral advertising.
  • BACKGROUND
  • In recent years, people have started spending more and more time browsing content on the Internet, as opposed to traditional sources, such as television, radio, and print media. As a result, the value of advertising on web pages has risen significantly, and techniques for targeting demographics of interest have become very advanced.
  • Internet cookies have become a ubiquitous and invaluable tool for performing Internet advertising and other important online functions. Traditional techniques for targeting electronic advertising involve configuring users' Internet browsers such that third party cookies can be set, read from, and written to. When a cookie is set on a browser, one of the identifying elements of the cookie is the domain from which it was served. If an Internet user visits, for example, www.site.com and that site contains code to set a cookie, then that cookie will be set with “site.com” as its domain. Continuing this illustrative example, site.com can also embed code that pulls content, such as ads, from URLs that are not on the site.com domain and those ads can also set cookies. For example, site.com can have code on its page that pulls an ad from, by way of example, www.adnetwork.com. The ad will be served from adnetwork.com and will set cookies on the adnetwork.com domain.
  • Online advertising may be significantly enhanced by web browsers that, by default or by settings, allow third party cookies, and by people who permit visited sites to set and read third party cookies. Use of third party cookies enables ad networks to access cookies that they set across a wide network of websites, thereby enabling behavioral and contextual advertising to web viewers across many visited websites. Specifically, web browsers that are set to allow third party cookies will allow, for example, adnetwork.com to set its cookie despite the user having visited www.site.com. Furthermore, the same browser setting will also allow adnetwork.com to access any cookies set under their domain regardless of which site the Internet user is visiting.
  • By way of background, ad networks typically have hundreds or thousands of partners (often referred to as “publishers”) that publish online content along with “ad tags” provided by their partner ad network. For example, each of a news website (www.news.com), a blog (www.blog.com), and an informational website (www.info.com), among others, may engage an ad network to efficiently and profitably advertise to those websites' viewers. The ad network provides each of those sites with an ad tag having the ad network's domain, e.g., “adnetwork.com.” For any visitors, or more specifically, visitors' browsers that allow third party cookies, the ad network may access cookie data of visitors to its partners' sites (i.e., across its entire network of sites), even though those sites' domains (e.g., www.news.com, etc.) do not match the ad network's domain. Specifically, the ad network's ad tag on each site may access cookie data associated with the domain of the ad tag. As a result, the ad network may learn more about a user's browsing history across its network, and therefore more about the user's likely demographics, interests, purchasing goals, and other useful advertising information.
  • Each time an Internet advertisement is shown to a website visitor is known as an “impression.” When the user is shown the advertisement, the user may select, or “click,” on the advertisement, or may take another “action,” such as completing an online form to request more information. If the user later purchases the product, the purchase is referred to as a “conversion” of the impression. Advertisers may be interested in impressions (e.g., if they are trying to increase awareness of a brand), clicks (e.g., if they are trying to provide more information about a product), or conversions (e.g., if they are trying to make sales or get new users to sign up for services). Advertisers may pay advertising networks and therefore publishers based on, for example, impressions, clicks, or conversions over the course of an advertising campaign. Typically, an advertiser may have a spending plan that specifies how the advertiser wishes to spend its budget during a campaign.
  • Advertising networks rely on being able to accurately identify the person viewing an advertising creative in order to tailor the advertising creative to the user's specific interests, provide frequency capping, and provide other user specific functionality. In the world of behavioral advertising, the user's identity is often tied to a user profile (targeting profile) containing information about their demographics, interests, and programmatically determined properties (such as look-a-like segmentation). This allows the advertising creative to be highly targeted to the specific user, providing more relevant offers and opportunities and as a result improving click through and conversion rates.
  • Even though cookies enable advanced targeting and advertising to users whose browsers enable third party cookies, these technologies are unable to leverage browsing history, behavioral and contextual information, and other intelligence relating to a user when it is divided among multiple devices or browsers. Specifically, most modern users of the Internet often use more than one device to access the Internet over the course of a single day, such as, for example, a PC at home, a laptop at work, and one or more tablets and/or mobile devices throughout the day, whether employer-provided or personal. Because of the standards associated with existing cookies and browsers, the advantageous user IDs, browsing history, demographic data, etc., can only be stored in relation to a cookie stored for a particular browser on a particular device. Recent trends in mobile and tablet technology has meant that users are more frequently utilizing multiple devices to access the Internet and as a result see ads across many different devices or screens. Because online advertisers are interested in improved targeting to their intended audience, ad networks also have a strong interest in providing targeting to users across their various browsers and devices. Thus, the traditional method of identifying a user and tying a targeting to profile to a user's device has significant disadvantages, since the profile is effectively tied to a device and not to the real target: the user. Furthermore, many mobile devices do not permit third party cookies to be stored on the device, rendering the identification of the user via this method challenging. User targeting has been limited to device level targeting, instead of offering a more holistic view of a user's behavior online.
  • Accordingly, a need exists for systems and methods for improved online user and device ID management, and delivery of Internet advertising and content to devices matched to common users. More specifically, a need exists for systems and methods for matching users across various Internet-enabled devices, and to online advertising based on users' identities for targeted and behavioral advertising.
  • SUMMARY OF THE DISCLOSURE
  • According to certain embodiments, methods are disclosed for associating a plurality of Internet-enabled devices with a common user profile for targeting Internet content or advertising. One method includes receiving, from a plurality of Internet-enabled devices, a plurality of requests for electronic content or advertising; extracting, from each of the plurality of requests, a source IP address and a unique identifier associated with the respective Internet-enabled device; for each source IP address for which requests were received over a predetermined time period from a number of Internet-enabled devices below a threshold number of devices, identifying each possible pair of devices from which requests were received; and for each possible pair of devices, calculating a probability that the pair of devices are owned or operated by a common user.
  • According to certain embodiments, systems are disclosed for associating a plurality of Internet-enabled devices with a common user profile for targeting Internet content or advertising. One system includes a data storage device storing instructions for associating a plurality of Internet-enabled devices with a common user profile for targeting Internet content or advertising; and a processor configured to execute the instructions to perform a method including: receiving, from a plurality of Internet-enabled devices, a plurality of requests for electronic content or advertising; extracting, from each of the plurality of requests, a source IP address and a unique identifier associated with the respective Internet-enabled device; for each source IP address for which requests were received over a predetermined time period from a number of Internet-enabled devices below a threshold number of devices, identifying each possible pair of devices from which requests were received; and for each possible pair of devices, calculating a probability that the pair of devices are owned or operated by a common user.
  • According to certain embodiments, a non-tangible computer-readable medium is disclosed storing instructions that, when executed by a processor, cause the processor to perform a method for associating a plurality of Internet-enabled devices with a common user profile for targeting Internet content or advertising, the method including: receiving, from a plurality of Internet-enabled devices, a plurality of requests for electronic content or advertising; extracting, from each of the plurality of requests, a source IP address and a unique identifier associated with the respective Internet-enabled device; for each source IP address for which requests were received over a predetermined time period from a number of Internet-enabled devices below a threshold number of devices, identifying each possible pair of devices from which requests were received; and for each possible pair of devices, calculating a probability that the pair of devices are owned or operated by a common user.
  • Additional objects and advantages of the disclosed embodiments will be set forth in part in the description that follows, and in part will be apparent from the description, or may be learned by practice of the disclosed embodiments. The objects and advantages of the disclosed embodiments will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims.
  • It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosed embodiments, as claimed.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate various exemplary embodiments and together with the description, serve to explain the principles of the disclosed embodiments.
  • FIG. 1 is a series of schematic diagrams depicting exemplary environments in which users may use disclosed devices and methods according to an exemplary embodiment of the present disclosure;
  • FIG. 2 is a schematic diagram of an exemplary environment and system for matching users and/or user advertising IDs across devices and browsers, according to an exemplary embodiment of the present disclosure;
  • FIG. 3 is a flow diagram of an exemplary environment, systems, and data flow for matching users and/or user advertising IDs across devices and browsers, according to an exemplary embodiment of the present disclosure;
  • FIG. 4 is a flow diagram of an overview method for performing Internet advertising techniques based on matching users and/or user advertising IDs across devices and browsers, according to an exemplary embodiment of the present disclosure;
  • FIG. 5 is a flow diagram of one exemplary method for performing Internet advertising techniques based on matching users and/or user advertising IDs across devices and browsers, according to an exemplary embodiment of the present disclosure;
  • FIG. 6 is a flow diagram of another exemplary method for performing Internet advertising techniques based on matching users and/or user advertising IDs across devices and browsers, according to an exemplary embodiment of the present disclosure; and
  • FIG. 7 is a simplified functional block diagram of a computer and/or server that may be configured as a device or system for performing Internet advertising techniques based on matching users and/or user advertising IDs across devices and browsers, according to an exemplary embodiment of the present disclosure.
  • DESCRIPTION OF THE EMBODIMENTS
  • Reference will now be made in detail to the exemplary embodiments of the disclosure, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
  • As described above, prior Internet advertising technologies involved cookies that stored advertising identifiers that are local or specific to a single machine/device or browser. The present disclosure describes systems and methods for linking a user's identity across the user's devices to generate and leverage additional opportunities to reach the user with targeted advertising, and assemble fuller, more accurate behavioral profile of a user through the observation of larger slices of the users online activities. For example, the present disclosure describes a platform configured to link together individual unique targeting identities to create a holistic profile of a user's activity and behavior across multiple devices, and make that profile available to other systems for the purposes of delivering targeted advertising and content, and for the purposes of research and analysis.
  • Various aspects of the present disclosure are related to pluggable algorithms that create statistical links between unique devices or browsers, for example a user's desktop and their mobile phone, multiple web browsers on the same device, multiple mobile devices. The resulting linkage allows content and advertising to be displayed on one device, using information collected about the user on the others. This permits a more complete view of the user to be generated regardless of which device they are using to access the internet.
  • When a user visits a web page or uses a mobile app, data is collected via ad calls and embedded pixel calls. These ad calls and embedded pixel calls may collect information about the user (including some kind of identifier, such as the value of a cookie or a device identifier) and pass it back to a server. Each web page visit, click, or other unit of activity may be considered an “event,” and messages generated for these events may be streamed into a software application, which consists of multiple tiers of filtering, sorting, aggregating, and the application of statistical algorithms. In certain embodiments, every step of the disclosed methods may implement specific logic to an inbound “event,” transforming or enriching the data before passing it onto the next step. At certain steps the events may be aggregated together into increasingly large time blocks allowing multiple events to be evaluated at the same time. Further analysis may be performed on the aggregated results through the application of deterministic and probabilistic algorithms. The data may stream through the application and the results may be pushed out in real time. In addition, events may be captured and persisted to storage to permit batch or offline processing and analysis to be conducted. The application supports multiple routes through the available processing steps, or algorithms, the exact pathway being determined by the data contained within the event. The processing algorithms can be dynamically configured and could be described as pluggable, allowing new algorithms to be added to the system and existing algorithms to be configured dynamically.
  • More specifically, the present disclosure is directed to linking together or matching all of the devices and/or browsers that belong to a specific user. The term “devices” as used herein should be construed to cover both actual physical devices, such as mobile phones, tablets, and desktop or laptop computers, as well as different browser instances that may exist on the same physical piece of hardware. Each step in the disclosed processing algorithms may evaluate the likelihood that two devices belong to the same user, by looking at properties, such as what IP address the request originates from, the location of the IP address, the time of day and day of the week the event occurred on, any authentication data that is available, any third party identifiers that have been made available, such as social network user identifiers, the type of device and browser being used, any information already known about the device or user (such as targeting segments), the request headers and other information that can be added to the event message by up-stream applications. Once a link is established between two devices, the link may be persisted and made available to other systems, such as ad servers and content targeting applications, which can use the links to understand a user across multiple screens, ensuring the best content and advertising is targeted to the user.
  • According to certain embodiments, the present disclosure may involve monitoring a unique identifier for a device or browser (e.g., obtained using a cookie), observing how it appears on different IP addresses over time, and comparing this to how other unique identifiers appear on different IP addresses over time. The present disclosure may also involve identifying pairs of identifiers that have a similar pattern (e.g., if they appear on the same non-public IP address a threshold number of times per day, for a certain percentage of the preceding X days), and thus establishing a link or relationship between the two device/browser identifiers, and also any logical distinction between devices. The disclosed techniques may involve weighting the relationship between two devices or browsers by looking at the time of day these devices appear on an IP address, giving greater weight to those times of day when a user is most likely to be on their home network rather than on a public network or accessing the internet from work.
  • The present disclosure may involve further validating this relationship by looking at pre-existing data known about the devices/browsers and looking for similarities between the two, allowing the link to be confirmed or rejected. This pre-existing data can be behavioral targeting segments, demographic data, or geographic data. In one embodiment, the disclosed embodiments may include using first party authentication data to create concrete links between two devices. The disclosed embodiments may further include using authentication data collected from email service authentication (IMAP) associated with an IP address to compare with first party authentication data to create links between multiple devices/browsers.
  • The disclosed embodiments may further include generating multiple pairs of linked devices and grouping these together to create a complete picture of a user across all the devices they use to access the internet. The disclosed embodiments may further include grouping users together into households, allowing household level targeting. The disclosed embodiments may further include grouping larger sets of users together by some property, such as public network, to allow targeting of organizations (such as universities), specific locations (e.g., public places, such as coffee shops, shopping centers, public transport infrastructure, etc.). Moreover, the disclosed embodiments may further include undertaking one or more components of the above-described analysis in real-time, such as by streaming events through a multi-tier processing application, aggregating, sorting, and filtering data to produce the final result (e.g., event driven architecture) and immediately making this analyzed data available to external systems.
  • Turning now to the figures, FIG. 1 is a schematic diagram of a series of environments in which users may access Internet content and advertising, according to exemplary embodiments of the present disclosure. Specifically, FIG. 1 depicts how the same user 100 may access the Internet using any number or type of Internet-enabled devices, such as, for example, a mobile device 102 (e.g., smartphone, PDA, etc.), a work computer 104 (e.g., such as a PC, Windows, Mac, etc., whether desktop or laptop), a home computer 106 (e.g., a PC or Mac laptop or desktop), an automobile computer 108 (e.g., whether OEM or after-market), a tablet 110, or any other type of kiosk, computer, or mobile device connected to the Internet through a wired or wireless connection. For example, a typical user might wake up in the morning and check the weather and his or her e-mail on his or her smartphone 102. The user may then drive to work and access Internet content, such as traffic or news, through his or her automobile computer 108. The user may then operate a computer 104 upon arriving at his or her workplace, including to access Internet content, whether related to work activities and/or personal activities. The user may then return home in the evening and use one or more of a home computer 106 and a tablet 110. Of course, the preceding scenario is only exemplary in nature, and users' Internet habits may vary widely in terms of which devices they use at given locations and times. For example, many users may use a tablet 110 only at work or only at home, while other users may use a tablet 110 while at home and at work, and for both personal and professional activities. Likewise, some users may use a mobile device 102 to access both personal and professional Internet content and e-mail throughout the day, even while also using a work computer 104. Also, a user may use a home computer 106 at non-traditional times of the day, and may use the home computer 106 to perform professional activities, whether during the day or evening.
  • FIG. 2 illustrates an exemplary environment in which users may access the Internet using multiple devices, including a plurality of user devices 102-110. FIG. 2 also illustrates an exemplary system for matching users and/or user advertising IDs across devices and browsers, the system including one or more of: publisher servers 112, advertiser servers 114, and user matching server systems 150, all disposed in communication with the Internet 101. In one embodiment, publisher servers 112 and advertiser servers 114 may be owned and operated by publishing and advertising entities, respectively, and not be strictly part of the same system as user matching server systems 150.
  • In one embodiment, user devices 102-110 may be owned and used by one or more people, who may be viewers of web pages over the Internet, either through a mobile browser or web browser stored on respective user devices. As described above, user devices 102-110 may include any type of electronic device configured to send and receive data, such as websites and electronic advertisements, over the Internet. For example, each of user devices 102-110 may include a server, personal computer, tablet computer, mobile device, smartphone, and/or personal digital assistant (“PDA”) disposed in communication with the Internet. Each of user devices 102-110 may have a web browser or mobile browser installed for receiving and displaying web and/or ad content from web servers. Thus, each of user devices 102-110 may be configured to receive and display data that is received from one or more of publisher servers 112, advertiser servers 114, and user matching server systems 150, among any other web servers, domain name system (“DNS”) servers, content distribution network (“CDN”) servers, etc., over the Internet. As described above, in one embodiment, a user may own and, simultaneously or intermittently, use one or more of user devices 102-110, whether of similar or different type.
  • Publisher web servers 112 may be owned and/or operated by any entities having inventories of available online advertising space. For example, publishers may include online content providers, search engines, e-mail programs, or any other online site or program having online user traffic. Publishers may interact with user devices 102-110, advertiser servers 114, and user matching server systems 150, through publisher servers 112 connected to the Internet. Thus, publishers may be able to communicate inventory information, such as site information, demographic information, cost information, etc., to other entities in the environment of FIG. 2.
  • Advertiser servers 114 may be owned and/or operated by any entities having content, such as online advertisements (e.g., display ads, banner ads, pop-ups, etc.) desired to be delivered to online users. Advertisers may interact with user devices 102-110, publisher servers 112, and/or user matching server systems 150, through advertiser servers 114 connected to the Internet 101. Thus, advertisers may be able to communicate advertising information, such as ad information, targeting information, consumer information, budget information, bidding information, etc., to other entities in the environment of FIG. 2.
  • User matching server systems 150 may be configured to interact with one or more of user devices 102-110, publisher servers 112, and advertiser servers 114 over the Internet 101 to perform any of the presently disclosed techniques and methods. In one embodiment, user matching server systems 150 may include one or more of: a plurality of ad servers 152, user matching processor(s) 154, and database(s) 156. Of course, it should be appreciated that ad servers 152 may be operated by an operator only contractually or even loosely affiliated with an operator of user matching processor 154. Alternatively, the ad servers 152 and user matching processor 154 may be operated by the same advertising entity or online entity.
  • Ad servers 152 may include any type of servers configured to process advertising information from advertisers and/or site information from publishers, and send and receive ad requests and information from user devices 102-110, either directly or indirectly. In one embodiment, ad servers 152 may be owned and operated by an ad network, which may be a business that receives ad buys from advertisers, and serves ads on inventory supplied by publishers. Thus, an ad network operating ad servers 152 may receive revenue from advertisers, purchase impressions from publishers, and serve ads on publishers' web pages when viewers associated with user devices 102-110 view those web pages. According to aspects of the present disclosure, ad servers 152 may be configured to interact with user matching processor 154, such as through one or more APIs associated with user matching processor 154, to obtain one or more of: unique user IDs, cookie data, browsing history, demographic data, user profile data, etc., in response to interaction from user devices 102-110.
  • In certain embodiments, ad servers 152 may be remote web servers that receive advertising information from advertisers and serve ads to be placed by publishers. Ad servers 152 may be configured to serve ads across various domains of publishers, for example, based on advertising information provided by advertisers. Ad servers 152 may also be configured to serve ads based on contextual targeting of web sites, search results, and/or user profile information. In some embodiments, ad servers 152 may be configured to serve ads based on ad tags served by advertiser servers 114 and/or publisher servers 112, and on ad requests received from user devices 102-110. Ad servers 152 may be configured to send and receive data from user devices 102-110, publisher servers 112, advertiser servers 114, and/or user matching processor 154, over the Internet.
  • Ad servers 152 and user matching processor 154, either alone or in combination, may include any type or combination of computing systems, such as clustered computing machines and/or servers. In one embodiment, each of ad servers 152 and user matching processor 154 may be an assembly of hardware, including a memory, a central processing unit (“CPU”), and/or a user interface. The memory may include any type of RAM or ROM embodied in a physical storage medium, such as magnetic storage including floppy disk, hard disk, or magnetic tape; semiconductor storage such as solid state disk (SSD) or flash memory; optical disc storage; or magneto-optical disc storage. The CPU may include one or more processors for processing data according to instructions stored in the memory. The functions of the processor may be provided by a single dedicated processor or by a plurality of processors. Moreover, the processor may include, without limitation, digital signal processor (DSP) hardware, or any other hardware capable of executing software. The user interface may include any type or combination of input/output devices, such as a display monitor, touchpad, touchscreen, microphone, camera, keyboard, and/or mouse.
  • Regardless of specific physical components or layout, one or more of ad servers 152 and user matching processor 154, or any other servers or systems associated with ad network involving ad servers 152 and user matching processor 154, may be programmed with instructions to perform a method of user matching user advertising IDs across devices and browsers, and performing online targeted and behavioral advertising across user devices, according to the exemplary disclosed methods, such as the exemplary methods described with respect to FIGS. 3-6 below.
  • FIG. 3 is a schematic diagram of the flow of information between users and components of user matching server systems 150 for matching users and/or user advertising IDs across devices and browsers, and for performing online targeted and behavioral advertising across user devices, according to an exemplary embodiment of the present disclosure. Specifically, according to embodiments of the present disclosure, user devices 102-110, publisher servers 112, advertiser servers 114, and ad servers 152, may exchange data with one or more of user matching processor 154 and databases 156 of user matching server systems 150 (all through one or more computers and/or servers connected to the Internet 101, as described with respect to FIG. 2).
  • Specifically, FIG. 3 depicts an exemplary embodiment of user matching server system 150, operating a plurality of platforms for receiving online event data from users, e.g., over the Internet, for matching users across devices for performing delivery of targeted content and advertising. As shown in FIG. 3, in one embodiment, user matching server system 150 may include a mobile services platform 302 and an event formatting platform 304. In one embodiment, mobile services platform 302 may receive online event data from users based on the users' interaction with any of the users' mobile devices, such as mobile devices 102 and/or tablet devices 110. The event formatting platform 304 may receive online event data from users based on the users' interaction with any of the users' non-mobile devices, such as laptop and/or desktop PCs 104, 106. User matching server system 150 may further include a user matching platform 306 disposed in communication with a user targeting platform 308. The user matching platform 306 and user targeting platform 308 may each be disposed in communication with one or more components of a distributed file system for storing, indexing, and parsing through large quantities of data, such as distributed file system 310. In addition, the user targeting platform 308 may be disposed in communication with one or more ad servers 152, which may be configured to identify and serve advertisements based on targeting rules set by the user targeting platform 308 for devices matched to users by user matching platform 306. Any or all of the components of FIG. 3 may be incorporated into or disposed in communication with the ad servers 152, user matching processors 154, and/or database devices 156 described above with respect to user matching server system 150 of FIG. 2. Moreover, any component or subsystem of the platforms of FIG. 3 may be outsourced and/or contracted out to an entity distinct from or in association with an operator of ad servers 152, publishers 112, and/or advertisers 114. The structures, configurations, and operations of mobile services platform 302, event formatting platform 304, and user matching platform 306 will now be described in greater detail.
  • As described above, the present disclosure is directed to identifying links between Internet-connected user devices to determine devices that are likely owned and/or used by a common individual. Accordingly, user matching server system 150 may be configured to collect information about online activity that users 100 engage in, and online events, such as requests, transmissions, downloads, ad calls, clicks, mouse-overs, purchases, etc. that users make using their various Internet-connected devices 102-110. In one embodiment, mobile services platform 302 may be configured for receiving and handling advertising requests from native apps and web browsers of mobile phone and tablet devices, such as by constructing a message for each inbound request and forwarding each constructed message to a queue for consumption by user matching platform 306. When events or requests are generated by a mobile web browser, the user may have requested a web page via the mobile web browser, which includes code that makes a request for an advertisement. The request for the advertisement may be routed either to the mobile services platform 302 (which determines which ad serving platform the request should be routed to) or routed directly to an ad server 152 to process the request. In either case, the destination ad server 152 may respond by delivering an advertising creative and logging certain data about the request. When mobile services platform 302 is involved in the routing, mobile services platform 302 may collect certain data about the request, and present this message to user matching platform 306 via the message queue. If the events or requests are generated by a mobile application, then the ad requests may be sent directly to mobile services platform 302 in lieu of ad servers 152.
  • Event formatting platform 304 may be configured to receive data about events from PC (e.g., desktop or laptop) clients, and to construct a suitable message for each event (e.g., ad call, site visit, click, mouse-over, etc.) for forwarding to user matching platform 306. In one embodiment, event formatting platform 304 may be implemented as a real time exchange (or “RTX”) integration system that collects pixel tracking events received from user devices 104, 106, and forwards messages about those PC events to an Active MQ cluster for consumption by the user matching platform 306. For example, the Active MQ cluster may be configured to receive constructed, formatted messages from both the mobile services platform 302 and event formatting platform 304, for consistent delivery to the user matching platform 306. It should be appreciated that a PC-based ad request may originate from a web browser or from any other type of software, such as a client application for exchanging messages and/or multimedia.
  • User matching platform 306 may be configured to, along with mobile services platform 302 and event formatting platform 304, perform techniques involving the methods of FIGS. 4 and 5. In one embodiment, user matching platform 306 may implement a Streaming Aggregation Framework (“SAF”), which may be a highly-scalable framework for quickly and efficiently processing large volumes of mobile and non-mobile Internet events in real-time, for identifying matches between devices. This structure may involve streaming messages through a series of tiers, each tier performing one or more of a plurality of desired operations on the received events before passing on a result message to a subsequent tier. This design structure may allow analysis to be performed in near real time. Specifically, according to certain embodiments, the user matching platform 306 may include a plurality of processing tiers through which event messages received from mobile services platform 302 and/or event formatting platform 304 are streamed and within which processing is performed. Processing may include filtering, aggregating, sorting, applying statistical or mathematical models, and/or routing of outbound result messages to specific destinations.
  • In one embodiment, user matching platform 306 may identify groups of two or more devices or browsers that are likely owned or operated by a common Internet user. For example, user matching platform 306 may receive event messages from mobile services platform 302 and/or event formatting platform 304, and process those messages according to the methods described below with respect to the flow charts of FIGS. 4 and 5, and forward the results of those methods to the user targeting platform 308 for delivering targeted content and/or advertising to users' devices based on the inferences or insights that a user's two or more devices belong to that same user (e.g., based on merged user profiles, merged device profiles, combined segmentation profiles, etc.) User targeting platform 308 may operate as a service that creates, stores, maintains, and makes available user targeting data to ad servers and other components of user matching system 150. Specifically, user targeting platform 308 may implement one or more of the targeting algorithms described in U.S. Pat. No. 8,504,411 filed by AOL Advertising Inc. on Sep. 14, 2009, and U.S. patent application Ser. No. 13/241,856, filed by AOL Advertising Inc. on Sep. 23, 2011, the entireties of which are hereby incorporated herein by reference.
  • FIG. 4 is a flow diagram that depicts an exemplary method performed by user matching platform 306 for matching users across various Internet-enabled devices, and by user targeting platform 308 for performing online advertising based on users' identities for targeted and behavioral advertising. Specifically, FIG. 4 depicts a method 400 that includes determining whether two devices appear on the same non-public IP address over a threshold number of times within a predetermined period of time (e.g., within one day). If the two devices appear on the same non-public IP address over a threshold number of times within a predetermined period of time, then the method may include identifying those devices as being matched to a user for that predetermined period of time (e.g., that day) (step 402). For example, the present disclosure may involve various assumptions, such as: if two devices or browsers appear on the IP address of a public network, such as that of a coffee shop or library, then they are not necessarily very likely to be owned or operated by the same individual. However, if two devices or browsers appear on the IP address of a private network, such as that of a person's home wired/wireless network or mobile hotspot, then they are more likely to be owned or operated by the same individual.
  • As will be described in more detail below, public and private networks may be distinguished based on the number of devices or browsers that “appear on” that network (i.e., for which requests for websites or ads are received). For example, it might be typical or reasonable for a home network to have up to 8 different devices (e.g., 2 per person in avg. household of 4). But a network from which requests are received from 10 different devices might be assumed to be a public network that offers little assurance that two devices are more likely owned or operated by the same person.
  • Again, if two devices appear on the same non-public IP address over a threshold number of times within a predetermined period of time (e.g., within one day), then the method may identify those devices as being matched to a user for that predetermined period of time (e.g., that day). Of course, the period of time may be any amount of time, such as an hour, six hours, twelve hours, twenty-four hours, etc. Also, the threshold number of times may be any number of times, such as five, ten, twenty, fifty, etc.
  • Method 400 further includes determining whether the two devices are identified as being matched to a user for a threshold number of time periods within the last predetermined number of time periods (e.g., three of the last five days, or five of the last seven days). If the two devices are identified as being matched to a user for a threshold number of time periods within the last predetermined number of time periods (e.g., three of the last five days, or five of the last seven days), then the method may include identifying those devices as being matched to the user until the match is set to expire (step 404). More specifically, if the time period is six hours, then step 404 might link two devices as likely associated with a common user if those devices are initially linked for three of the four preceding six hour periods. If the time period is one day, then step 404 might link two devices as likely associated with a common user if those devices are initially linked for seven of the ten preceding days. Of course the number of preceding time periods may be set to any value, and the threshold may be set to any number of the preceding time periods, or any percentage of the preceding time periods.
  • Method 400 may then include performing targeting of content and/or advertising to a user based on the identification of a pair of the user's devices as belonging to the same user (step 406). For example, user targeting platform 308 may leverage the matches and linkages generated by and received from user matching platform 306 to advertise to a user based on an advertising profile common to multiple user devices or a segmentation profile merged from multiple device profiles, and/or based on which device a user is using to access the Internet. For example, if it is determined that a user is using his or her work computer, the advertising may incorporate all of the browsing and demographic data across the user's devices to determine an ad the user will most likely click on while using his or her work computer. If it is determined that a user is using his or her home computer, the advertising may incorporate all of the browsing and demographic data across the user's devices to determine an ad the user will most likely click on while using his or her home computer.
  • If it is determined that a user is using his or her mobile device to access the Internet, the advertising may incorporate all of the browsing and demographic data across the user's devices to determine an ad the user will most likely click on while using his or her mobile device. Thus, the advertising system may be freed from previous constraints of considering only a user's work browsing history when delivering ads to the user's work computer browser, or considering only a user's home browsing history when delivering ads to the user's home computer, or considering only a user's mobile browsing history when delivering ads to the user's mobile device. To the contrary, the advertising system may advantageously use the presently disclosed device matching techniques and related systems and methods to leverage a user's demographic and browsing history across all of the user's devices to identify and deliver targeted ads.
  • FIG. 5 is a flow diagram that depicts an exemplary method 500 performed by user matching platform 306 for matching users across various Internet-enabled devices, and by user targeting platform 308 for performing online advertising based on users' identities for targeted and behavioral advertising. In one embodiment, method 500 may include receiving “events” or any type of requests for content and/or ads from a plurality of user devices over the Internet (step 502). Events or requests received from user devices may originate from a PC (e.g., laptop or desktop) web browser, a PC application, a mobile web browser, a mobile application, or any other client software that is installed on an end user device and which is capable of making requests via a public network to a system or service that is hosted on a remote system, such as a web server. The request from the user may be for any type or combination of electronic content and/or advertising, whether in textual, graphical, video, and/or audio format. Events may be defined as distinct interactions between a user and a service which can be considered complete and self-contained. In certain embodiments, these interactions may take the form of advertising impressions. An impression may be any request made by client side code (e.g., a JavaScript tag) that results in a request to an ad serving platform that responds with the delivery of an advertising creative. In addition to advertising impressions, events may include any client side initiated request over HTTP/S to a host side process that is able to capture various properties of the request and make them available to the user matching system, such as, for example, events generated by third party content or advertising platforms.
  • Method 500 may further include extracting from the requests information including: source IP address, unique device ID, and/or cookie data, if any (step 504). In one embodiment, method 500 may include extracting a time of the event (i.e., the time of an impression, click, purchase, etc.), a source IP address, a unique user ID and/or unique device ID, and a user agent. Extracted information may include any information transmitted in the contents of cookies stored on the user's device against the domain of the request, HTTP headers containing information about the user agent and its capabilities (user agent, accept-type, language/locale, etc.), and/or any parameters determined on the client side and appended to the request URL. The extracted information may also include any unique identification of the user's browser or device, such as the value of a cookie, a mobile device identifier, a third party identifier added to the request, or an identifier generated by the application code responsible for sending the request. In each case, as described in more detail below, a value may be passed as part of the request that uniquely identifies either the device or the software upon the device that is originating the request.
  • Specifically, depending upon the environment within which an event is being triggered, one or more unique identifiers may be available and can be transmitted with the request. In one embodiment, identifiers of user devices or software may be referred to as universal targeting identifiers (“UTIDs”). In one embodiment, the unique identifiers used to describe or identify any particular user device or software (browser or application) may depend on the context of the received request (i.e., the type of software originating the request). In the context of requests received from PC-based browsers or mobile browsers, a unique identifier may include an identifier stored in a cookie text file or in browser local storage. In the context of requests received from a PC-based application, a unique identifier may include an identifier stored in a cookie (which may or may not be shared with a system default browser), or a unique identifier generated by the application or a host of the application, and appended to any HTTP requests for advertising. In the context of requests received from a mobile application, identifiers may be selected based on which mobile platform the application is running on. In one embodiment, a unique targeting identifier may be an Identifier For Advertisers (IFA), an application install specific identifier or an identifier that has been generated by the software package used to create the application, such as a targeting identifier stored in a cookie, an Android ID, a Microsoft ID, or any other suitable identifier. Alternatively, the identifier may be an Identifier for Vendors (“IFV”), which is a common identifier that spans across all apps produced by a specific vendor.
  • According to certain embodiments, in addition to validating identifiers, method 500 may include formatting captured or logged messages into structures suitable for user matching platform 306. For example, each inbound message may be validated to ensure that the necessary information is present and that it is formatted correctly. In one embodiment, UTIDs may be validated with the following regular expression: [a-zA-Z0-9._-]{14,40}. Messages that do not meet the specification described above may be discarded. Other cleaning, filtering operation and data enrichment may be conducted on the content of the messages to ensure they are suitable to be processed by user matching platform 306.
  • Method 500 may further include inferring, for each of the requests, additional information, such as device type and local time of request (step 506). In one embodiment, method 500 may include inferring the device family (e.g., mobile phone, tablet device, desktop, laptop, or other) from the user agent, and the time zone of the user from the source IP address. For example, where an event message contains a user agent string, the string may be analyzed using a proprietary database and API, such as those provided from ScientiaMobile Inc. known as Wireless Universal Resource FiLe (“WURFL”), which allows the determination of the device type, the brand, and the operating system of the device. These pieces of information may then be added to the event message for use later in the analysis.
  • Method 500 may further include filtering out requests from public or likely-public IP addresses (step 508). In one embodiment, public networks and public IP addresses may be filtered out by identifying the number of unique browsers appearing on each IP address within a predetermined period of time. If the count exceeds the predetermined threshold, then the IP address may be flagged as public, or likely-public, so that subsequent events occurring at that IP address for some period of time may be ignored, on the assumption that the appearance of two devices appearing on a public IP address are not likely to be matched to the same user. In one embodiment, step 508 may include counting the number of devices that appear against an IP address over the course of an hour. Once the number reaches a predetermined threshold, the IP address may be added to a blacklist that is broadcast to all processing steps of user matching platform 306. In one embodiment, the threshold may be set as seven or eight devices within a one hour period, and the IP address blacklist may be anywhere from 18-24 hours. Of course, any other desired number of devices, time window, and/or expiration window may be used.
  • In certain embodiments, to reduce the number of events or messages being sent to subsequent steps for processing, method 500 may include aggregating all events for a given IP address, UTID, Day Timestamp and Week Time Block into multiple minute buckets (e.g., five, ten, or fifteen minute periods), so that, for example, two or more clicks within a couple of minutes are not treated as separate events.
  • Method 500 may further include weighting each request based on the time of day and/or day of week, with heavier weights going to requests determined to likely originate from a user's home network (step 510). For example, the presently disclosed methods may be performed based on assumptions that requests made while people are statistically more likely to be at home may be more indicative of requests made between devices owned or operated by the same person. For example, if two devices appear on a network during the middle of the day when most people are at work, then those events may be weighted less. If two devices appear on a network in the evening when most people are at home, then those events may be weighted more. Various exemplary methods will now be described for determining the day and time of an event, for purposes of determining the local time of an event and therefore the likelihood that a request originated from a user's home network. To determine what time zone the user is in, the IP address may be matched through a series of APIs against a proprietary database of IP address allocations. Once the time zone has been determined, three values may be calculated: (1) the Day Timestamp (DayTS), (2) the Timezone Neutral Event Timestamp (User Timestamp), and (3) the Week Time Block (WTB). To calculate the User Timestamp, method 500 may be configured to (1) obtain the event timestamp in seconds since epoch in UTC, and (2) subtract the number of seconds the user's location is offset from UTC. For example, if an event takes place at 2013:08:26T09:46:21 UTC, and the user is determined to be located in Hawaii based on their IP address which is 10 hours behind UTC, then the local time may be calculated to be 2013:08:25T23:46:21 HAST. Thus, from the user's perspective the event took place at 23:46:21 on the 25 Aug. 2013.
  • The timezone neutral event timestamp (i.e., user timestamp) may be calculated based on the following:
      • Event Time in Seconds (UTC): 1377510381
      • Get the Users Location from IP address: Hawaii—Time Zone HAST
      • Subtract the UTC difference: 1377510381-36000=1377474381
      • Timezone Neutral Event Time Stamp (User Timestamp):
      • 1377474381
  • This value may be the equivalent of the user's local time as if they were in the UTC time zone.
  • Method 500 may then include calculating the day timestamp (“DayTS”) by calculating the start of that day in seconds since the epoch for the purpose of grouping together all events for that user for that date:
      • Get the start of the day in seconds: 1377474381−(1377474381%86400)=1377388800
      • Day Time Stamp (DayTS)=1377388800
  • Method 500 may then include calculating the week time block (“WTB”) and day time block (“DTB”) of an event. In one embodiment, each week may be divided into fourteen blocks of time, seven of which are times when a user is unlikely to be on their home network, and seven of which are times when a user is likely to be on their home network. By dividing a week into fourteen blocks, the week time block may represent not only whether the user is likely home (day vs. morning and evenings), but also whether the day is a weekday or weekend. In one embodiment, each day may be assigned an integer starting from Sunday as “1,” Monday as “2,” and so on, to Saturday as “7,” allowing one day to be weighted higher than another in the subsequent algorithmic processing.
  • In one embodiment, the week time block may be calculated as: ((Day of the Week—1)×2)+Day Time Block, where the Day Time Block is determined as follows:
      • 00:00:00-07:59:59=0
      • 08:00:00-17:59:59=1
      • 18:00:00−23:59:59=0
  • As a result, the Week Time Blocks may be calculated as follows:
  • Sun Mon Tues Wed Thurs Fri Sat
    (1) (2) (3) (4) (5) (6) (7)
    HOME 0 2 4 6 8 10 12
    AWAY 1 3 5 7 9 11 13
  • Method 500 may further include grouping, over a predetermined time period, all requests received from devices originating from each source IP address (step 512). Each message corresponding to each event aggregated for a particular source IP address may have one or more of the following fields: IP Address, Event Time Stamp, Unique Targeting Identifier (UTID), Day Timestamp (dayTS), Week Time Block (WTB), User Timestamp, Device Type, Device Brand, and Device Operating System.
  • In one embodiment, method 500 may include identifying links between pairs of devices by aggregating all events together over a period of time by IP address, weighting the occurrences of events based on the week time block, summing these occurrences for all occurrences in that window, and generating a score for the pair of devices. Thus, method 500 may further include identifying each possible pair of devices for which requests were received from a source IP address (step 514). In one embodiment, all devices (i.e., UTIDs) having events that occur against the same IP address in a given Day Timestamp may be pooled together and all the possible pairwise combinations of UTIDs may be computed. Thus, if the IP address for a given household shows devices A, B, C, and D, step 514 may include identifying pairs AB, AC, AD, BC, BD, and CD.
  • Method 500 may further include calculating, for each possible pair of devices, based on the weighting, a confidence level that the pair of devices belong to the same user (step 516). In one embodiment, the confidence level may be calculated based on a mathematical or statistical model of weightings and likelihoods that a device is being operated in the home, and/or that two particular devices are owned or operated by the same user. In one embodiment, for each pair that has been identified, a weight may be calculated based on the week time block and the number of times the UTIDs were seen. week time blocks during which a user is likely to be on their home network and not a public network are given greater weight. In one embodiment, to determine if a week time block represents a period when a user is more likely to be on a home or private network the modulus of the week time block divided by two may be calculated, if the remainder is greater than 0 then the week time block was an odd number and represents a period when the user was more likely to be on a public network. To calculate the weight, the frequency of occurrence of each UTID on the IP address is multiplied by a weighting factor if the event occurred in a Week Time Block that represents a greater chance of being on a home or private network. In one exemplary embodiment, the weighting factor may be set to “2” and can be configured dynamically. In one embodiment, only those pairs that have a weighting score that meets a minimum predetermined threshold are sent on to subsequent steps of determining a confidence of the devices being matched to a common user. In one embodiment this threshold may be set to 3 and may be configured dynamically.
  • If, at step 518, it is determined that additional pairs of devices exist within the set of devices aggregated for the source IP address over the preceding time period, then method 500 may include returning to step 516 to further calculate, for the possible pair of devices, based on the weighting, a confidence level that the pair of devices belong to the same user. If, at step 520, it is determined that a time period has elapsed, then method 500 may include returning to step 512 to update a grouping of requests received from all devices originating from the source IP address. If, at step 522, it is determined that updated weights are available, then method 500 may include returning to step 512 to update a grouping of requests received from all devices originating from the source IP address based on recent weights last generated at step 510.
  • Method 500 may further include identifying a pair of devices as belonging to the same user if the calculated confidence level exceeds a threshold level (step 524). Specifically, step 524 may include receiving a weight assigned to each possible pair of devices that might be matched to a common user. For example, step 524 may include, for a particular pair of devices, receiving a message including one or more of the following fields: UTID 1, UTID 2, IP Address, Day Timestamp (dayTS), Weight, UTID 1 Device Type, UTID 1 Device Operating System, UTID 1 Device Brand, UTID 2 Device Type, UTID 2 Device Operating System, and UTID 2 Device Brand.
  • In one embodiment, the confidence level for a particular pair of devices may be calculated by aggregating all weights calculated for each event message received for that pair over a preceding period of time, such as over a 24 hour period starting from the first instance the pair is identified. At the end of the 24 hour window a series of algorithms may be executed to determine a final confidence score for that 24 hour period and an overall confidence score for that link for all time. In one embodiment, once all link events for a pair of UTIDs across all IP addresses they occur upon have been aggregated for 24 hours, method 500 may perform an evaluation of the weights of each of the events to calculate a daily (or 24 hour) confidence score. In one embodiment, if the matched pair has been identified it is assigned a value of 20; otherwise it has a value of zero. The logic in this algorithm can be extended to provide a more complex analysis of the daily weight scores when determining the daily confidence score.
  • In one embodiment, a final confidence score may be a value between 0 and 100. This value may be used to decide if an identified link is sufficiently well established by comparison with a configurable threshold value. In one embodiment, this value may be set to 60. In one embodiment, the final confidence score may be calculated by taking into account the confidence score achieved on previous days plus any so-called “confidence boosters” (described later). The amount the historic confidence scores can contribute is configured as a proportion of the overall confidence score. In one embodiment, this value may be set to 80, meaning that historic confidence scores alone are enough to permit a link to be considered confidently established. The total number of days to include in the historic lookback is a configurable value, which in some cases may be set to four. For each of the days in the historic look back a proportion of the total available score may be allocated. This is configurable and is currently set to:
  • Current Day: 20
  • Current Day −1: 20
  • Current Day −2: 20
  • Current Day −3: 20
  • Total possible score: 80
  • As an example, assuming the existence of two devices (A and B) in a pair, if these two devices have been seen consistently over the last three days and each has scored enough to be considered suitable for an initial matching determination, a subsequent step may make a binary decision that the link exists and allocates it a score of 20 for each day the link was seen. The scores for the last four days would be 0, 20, 20, 20 giving a total score is 60, which meets the threshold and qualifies the relationship as a confident link.
  • As a second example, if devices A and B were seen together on current day −2 and today with a high enough score to be passed to tier 4 but on current day −1 the threshold was not met. As a result the daily scores for the last 4 days were 0, 20, 0, 20 and the total 40, which would not be enough to meet the overall threshold to say the relationship qualifies as a confident link unless there is another boosting factor which improves the overall score (see below). This rolling window means that as links appear and disappear their score goes up and down, the more consistently a match or link is identified, then the more likely it is that the pair will be determine to be a valid relationship. For example, taking the second example, if the linked pair is observed again on a 5th day, looking back 4 days would now yield daily scores of 20, 0, 20, 20 with a total of 60, which is a score that is high enough to be confident about the link according to the exemplary threshold.
  • Of course, all of the above-described parameters, such as number of days to look back, the possible score available on each day, the total available scores, and the threshold values, can be configured while the system is running, which allows insights to be implemented in real time into the system and the overall algorithm performance to be fine-tuned.
  • Once a link has been established it may be considered valid for a configurable period of time (link expiry time). In one embodiment, this may be set to four days, which means that even if the confidence score drops below the threshold value, the link is still considered valid until the expiry time is reached. The expiry time is reset each day that the link exceeds the threshold value, which means that a user can stop creating events on both devices for a period of time without causing the relationship to be forgotten (e.g., they may have gone on vacation and only taken one of the devices with them). It also means that if a link was established that was invalid it would only take four days for that relationship to be broken. Overall these processing steps help to ensure that the accuracy of the established links is high.
  • In certain embodiments, a confidence score may be “boosted” based on one or more additional factors. For example, a booster may be a property that can be assessed about the relationship between two devices that adds weight to the belief that the two devices are linked. A booster can only add confidence to an already established link.
  • In one embodiments, some third parties may be able to provide data to us that can be used to validate if an identified link is real. In one example, a third party is able to map together device IDs and household registration data using some proprietary mechanism. They make this data available as a feed which is ingested into the user matching platform 306. For example, when a link is identified, method 500 may determine if both the UTIDs are found within the third party data set and if they are linked to the same household identifier. If this relationship is present, a boosting factor may be applied to the confidence score for the link. The value for the boosting factor is configurable, and by way of example may be set to 20. Where a user logs into a system on both devices (perhaps an email or messaging service), it may be determined that a solid link exists. In one embodiment, boosting factor of 100 could be applied ensuring that the link automatically is considered confirmed.
  • In some cases, the user may interact with a third party service which provides some kind of identifier for the user. This could be a mobile operator adding a header to all devices that belong to a particular user accessing their network, or a user authenticates with a website using a social networking identifier. If this identifier is found appearing on both devices in a link, then method 500 may apply a booster reflecting certainty that this is the same user on both devices. A boosting factor of 100 could be applied to indicate that significant confidence exists about the link.
  • When a link has been identified between two devices it is possible to look at the existing targeting data for each device. If there is a strong correlation between the two targeting profiles this may add weight to the link. A boosting factor of 20 could be applied which may be enough to push the confidence score for the link above the threshold.
  • The device type may provide another boosting factor. For example, it has been possible to validate using other available data that when a link is identified between two tablet devices, a high proportion of the time it is the same user. This means that when a link is identified between two tablet devices it may be desirable to apply a boosting factor that is proportional to a previous assessment of the accuracy of this type of link.
  • It may be the case that once a user has purchased a device in a particular technology eco system (e.g., Android devices, iOS devices) that they are more likely to purchase another device in the same ecosystem when buying a tablet or new mobile phone. It may, with some combinations of operating system or brand, be appropriate to apply a boosting factor to reflect this.
  • Likewise, when a link has been established that meets or exceeds the confidence threshold and that has an expiry date set, a record of this may be stored in the local system of record. In the situation where a confidence score is determined multiple times within a single day, the system of record may be consulted and the highest score may be used. This could happen where a link is determined via different processing flows or where the same data has been fed to multiple algorithms.
  • Method 500 may further include performing targeting of content and/or advertising based on identification of pair of devices as belonging to the same user (step 526). For example, for purposes of illustration, an individual's smartphone might have the device ID “UTID: 123” and be associated with features “x, y, z,” their tablet might have the device ID “UTID: 456” and be associated with features “a, b, z,” and their PC might have the device ID “UTID: 789” and be associated with features “i, j, z.” In this case, the individual might have a profile that associates the individual with all of the features, “a, b, i, j, x, y, z.” Likewise, the individual might have a profile that aggregates the segmentation and/or targeting profiles associated with each of the user's three devices.
  • FIG. 6 is a flow diagram of a method performed by user matching platform 306 for matching users across various Internet-enabled devices, and by user targeting platform 308 for performing online advertising based on users' identities for targeted and behavioral advertising, according to an exemplary embodiment of the present disclosure. Specifically, FIG. 6 depicts a method 600 for executing techniques between ad servers 152, user matching processor 154, and/or databases 156 of user matching server systems 150 to advertise to users based on data collected across a plurality of devices they may use.
  • In one embodiment, method 600 may include receiving, from a publisher, a request for an advertisement, the request including a unique identifier and/or instance identifier for a user or the user's device (step 602). While an ad request may be received from a publisher, an ad request may alternatively or additionally be received from the user or from the user's device. Specifically, an ad server 152 may receive a request to deliver an ad or ad tag to a user upon the user requesting and/or visiting a web page hosted on a publisher server 112. In one embodiment, the ad request may include the unique ID assigned to the user, the instance ID assigned to the user's device, and/or cookie data containing one or both of the unique ID and the instance ID. As described above with respect to FIG. 3, the unique ID and/or instance ID may have been matched or linked by user matching platform 302 with a unique ID and/or instance ID of one or more other devices of a plurality of the user's devices.
  • Method 600 may further include receiving, based on the unique identifier and/or instance identifier, a demographic or browsing history information generated from the user's use of a first device (step 604). Upon receiving the unique identifier and/or instance identifier, an ad server 152 and/or user matching processor 154 of the user matching server 150 may lookup demographic and/or browsing history information generated from the user's use of a first device. For example, the ad server 152 and/or user matching processor 154 may search databases 156 for the unique identifier and/or instance identifier to find indexed browsing history, demographic data, behavioral information, user profiling information, purchase history, etc. The stored historical data may be data generated from the user's first device or any other device having local storage containing the unique identifier and/or instance identifier.
  • Method 600 may further include determining, based on the demographic or browsing history information generated from the user's use of the first device, an advertisement to display to the user during the user's use of a second device (step 606). Specifically, when a user uses a second device to request web content, e.g., from a publisher server 112, the user's second device may also request an ad from an ad server 152. Because the user's second device may send an ad request containing the user's unique identifier or instance identifier, the ad servers 152 and/or user matching processor 154 may again lookup demographic or browsing history information generated from the user's use of a first device. For example, the ad server 152 and/or user matching processor 154 may search databases 156 for the unique identifier and/or instance identifier to find indexed browsing history, demographic data, behavioral information, user profiling information, purchase history, etc. The stored historical data may be data generated from the user's first device or any other device having a unique identifier or instance identifier that is matched by user matching platform 306 with the unique identifier and/or instance identifier. As a result, the ad servers 152 and/or user matching processor 154 may be able to serve ads on the user's device based on one or more of: browsing history, demographic data, behavioral information, user profiling information, purchase history, any or all of which may be based on data collected from more than one device used by the user.
  • In general, publishers 112 may host websites having web pages that display content and advertising. In general, when a user uses a device 102-110 to visit a web page hosted on a publisher server 112, the publisher may send an impression request to an ad network, in this case, an ad server 152. In the impression request, the publisher 112 may request an advertisement to display to the visiting user. The impression request may include any data elements normally included in an impression request, such as information about the web page, the publisher, and/or the visiting user. The advertising system may select an advertisement for the publisher to display based on an algorithm that considers the received information about the web page, the publisher, and/or the visiting user. Thus, the Internet advertising system may, consistent with its ad bidding and exchange techniques and various business rules, award impressions of ads to impression requests from publisher servers 112. In other words, the Internet advertising system, through ad servers 152, may cause ads received from advertiser servers 114 to be displayed on web pages hosted on publisher servers 112 when users devices 102-110 request those web pages. Of course, as discussed above, the display of the ads may be precisely targeted both to the identities of the users and publishers of servers 112, and the content of the publisher's web page. For example, the Internet advertising system may select for display the ad that is most likely to generate a strong and favorable reaction from the visiting user, based on assumptions, historical data, and statistics gathered about the publisher's site and the user.
  • A number of use cases are applicable to the above described method of FIG. 6., as performed by user matching system 150. For example, if a user visits a website upon which a pixel is embedded, this pixel may add the user to a population of users. The user then visits a different website upon their mobile device upon which an advert is displayed. Because the user was added to a population upon their desktop computer, the user may be immediately retargeted with an appropriate advertising for that population on their mobile device.
  • As another example, a user might visit a website on their mobile device and view an advertisement. The advertisement may advertise a specific product that the user is interested in and the user may click on the advertisement, but not purchase the product at that time. Later, when the user is navigating around the Internet on their desktop or laptop, the user may be targeted with an advertisement for the product (or related products) that the user originally saw and expressed an interest in on their mobile device.
  • As another example, a user of a laptop or desktop computer may visit many websites, and view many online advertisements, and over time a profile of their interests are generated. The user may also use a mobile device (mobile phone or tablet) to access the Internet. The two devices (i.e., the PC and the mobile device) may be linked together (either through a common profile, or associated unique IDs), thereby allowing content and advertising to be targeted to any of these devices (mobile, tablet, and desktop) using the interest profiles generated on the user's desktop computer.
  • As another example, a user of a laptop or desktop computer may use multiple browsers to access the Internet. Each browser used by the user may have a separate identity for the purposes of tracking and targeting the user. As these devices are linked together according to the disclosed embodiments, it may be possible to target advertising and content appropriate for that user across all of the browsers they use.
  • As another example, a user may view on their mobile device an advertisement for a product or service that they are interested in. Later, the user may use their desktop computer to purchase the same product or service. Because the two devices are linked together according to the disclosed embodiments, it may be possible to attribute the purchase to the advertisement they saw on their mobile device allowing cross device, or cross screen, attribution, and allowing reporting and insights to be generated.
  • As another example, a user may view an advertisement for a specific campaign on their desktop or laptop. The campaign may be frequency capped to only display to a user once. The user may then navigate around the Internet using their tablet device and encounter pages containing advertisements. Because the two devices may be linked together according to the disclosed embodiments, the advertising network may avoid showing the campaign to the same user again on their tablet device, so as to honor the frequency cap for the campaign reached by the user on their desktop.
  • As described above, the user's first device and second device may be any type of device 102-110 described with respect to FIGS. 1 and 2. Also, it should be appreciated that any number of devices may be applicable within the scope of the description of FIGS. 3-6. In addition, it should be appreciated that, although depicted as different, ad or publisher servers may optionally be the same server; and although depicted as a single server system, ad or user matching server systems 150 may be separate and distinct servers accessed by the user's multiple devices, such as devices.
  • For example, the ad or user matching server(s) may determine, based on the demographic or browsing history information generated from the user's use of the first device, an advertisement to display to the user during the user's use of a second device. Specifically, when a user uses a second device to request web content, e.g., from a publisher server 112, the user's second device may also request an ad from an ad server 152. Because the user's second device may send an ad request containing a unique ID which is matched by user matching platform 306 with a unique ID of the first device, the ad servers 152 and/or user matching processor 154 may again lookup demographic or browsing history information generated from the user's use of a first device. For example, the ad server 152 and/or user matching processor 154 may search databases 156 for the unique identifier and/or instance identifier to find indexed browsing history, demographic data, behavioral information, user profiling information, purchase history, etc. As a result, the ad servers 152 and/or user matching processor 154 may be able to serve ads on the user's device based on one or more of: browsing history, demographic data, behavioral information, user profiling information, purchase history, any or all of which may be based on data collected from more than one device used by the user.
  • According to certain embodiments, the advertising systems may then advertise to a user based on which device a user is using to access the Internet. For example, if it is determined that a user is using his or her work computer, the advertising may incorporate all of the browsing and demographic data across the user's devices to determine an ad the user will most likely click on while using his or her work computer. If it is determined that a user is using his or her home computer, the advertising may incorporate all of the browsing and demographic data across the user's devices to determine an ad the user will most likely click on while using his or her home computer. If it is determined that a user is using his or her mobile device to access the Internet, the advertising may incorporate all of the browsing and demographic data across the user's devices to determine an ad the user will most likely click on while using his or her mobile device. Thus, the advertising system may be freed from previous constraints of considering only a user's work browsing history when delivering ads to the user's work computer browser, or considering only a user's home browsing history when delivering ads to the user's home computer, or considering only a user's mobile browsing history when delivering ads to the user's mobile device. To the contrary, the advertising system may advantageously use the presently disclosed unique identifier and related systems and methods to leverage a user's demographic and browsing history across all of the user's devices to identify and deliver targeted ads.
  • The presently disclosed systems are configured to allow different platforms and algorithms (e.g., various processing steps) to be chained together in different ways. This configuration can be changed at startup. This allows algorithms to be added and removed. Many parameters used in the algorithm can be configured dynamically while the system is running. This makes it possible to fine tweak the performance of the algorithms without interrupting processing. In addition, multiple routes to be defined within the platform, allowing the same source events to be routed through different algorithm stacks and the output results to be compared. This opens the possibility for enabling machine learning, where the system performs multiple processing streams in parallel, and based on a measurement of the performance of the different processing routes to select which result to use in the final confidence determination.
  • FIG. 7 provides a functional block diagram illustration of general purpose computer hardware platforms. FIG. 7 illustrates a network or host computer platform 700, as may typically be used to implement a server, such as user matching processors 154, or any other server executing user matching platform 306. It is believed that those skilled in the art are familiar with the structure, programming and general operation of such computer equipment and as a result the drawings should be self-explanatory.
  • A platform for a server or the like 700, for example, may include a data communication interface for packet data communication 760. The platform may also include a central processing unit (CPU) 720, in the form of one or more processors, for executing program instructions. The platform typically includes an internal communication bus 710, program storage and data storage for various data files to be processed and/or communicated by the platform such as ROM 730 and RAM 740, although the server 700 often receives programming and data via network communications 770. The hardware elements, operating systems and programming languages of such equipment are conventional in nature, and it is presumed that those skilled in the art are adequately familiar therewith. The server 700 also may include input and output ports 750 to connect with input and output devices such as keyboards, mice, touchscreens, monitors, displays, etc. Of course, the various server functions may be implemented in a distributed fashion on a number of similar platforms, to distribute the processing load. Alternatively, the servers may be implemented by appropriate programming of one computer hardware platform.
  • Program aspects of the technology may be thought of as “products” or “articles of manufacture” typically in the form of executable code and/or associated data that is carried on or embodied in a type of machine readable medium. “Storage” type media include any or all of the tangible memory of the computers, processors or the like, or associated modules thereof, such as various semiconductor memories, tape drives, disk drives and the like, which may provide non-transitory storage at any time for the software programming. All or portions of the software may at times be communicated through the Internet or various other telecommunication networks. Such communications, for example, may enable loading of the software from one computer or processor into another, for example, from a management server or host computer of the mobile communication network into the computer platform of a server and/or from a server to the mobile device. Thus, another type of media that may bear the software elements includes optical, electrical and electromagnetic waves, such as used across physical interfaces between local devices, through wired and optical landline networks and over various air-links. The physical elements that carry such waves, such as wired or wireless links, optical links or the like, also may be considered as media bearing the software. As used herein, unless restricted to non-transitory, tangible “storage” media, terms such as computer or machine “readable medium” refer to any medium that participates in providing instructions to a processor for execution.
  • The many features and advantages of the disclosure are apparent from the detailed specification, and thus, it is intended by the appended claims to cover all such features and advantages of the disclosure which fall within the true spirit and scope of the disclosure. Further, since numerous modifications and variations will readily occur to those skilled in the art, it is not desired to limit the disclosure to the exact construction and operation illustrated and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope of the disclosure.
  • Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.

Claims (21)

1-20. (canceled)
21. A method for determining a common user for two or more user devices, the method comprising:
receiving a first request for electronic content from a first user device;
determining a first device type and first source internet protocol (IP) address associated with the first user device, and a first local time at a first geographic location corresponding to the first request for electronic content;
receiving a second request for electronic content from a second user device;
determining a second device type and second source internet protocol (IP) address associated with the second user device, and a second local time at a second geographic location corresponding to the second request for electronic content;
determining a probability that the first user device and the second user device are operated by a common user, based on each of the first device type, the second device type, the first source internet protocol (IP) address, the second source internet protocol (IP) address, the first local time at the first geographic location corresponding to the first request, and the second local time at the second geographic location corresponding to the second request; and
determining that the first user device and the second user device are operated by a common user when the probability exceeds a predetermined threshold.
22. The method of claim 21, wherein the probability is calculated at least in part by incorporating a first likelihood that the pair of devices are owned or operated by a common user determined over a predetermined time period.
23. The method of claim 22, wherein the probability is calculated at least in part by incorporating a second likelihood that the pair of devices are owned or operated by a common user determined over a second predetermined time period.
24. The method of claim 23, further comprising:
normalizing the first likelihood and the second likelihood;
combining the first likelihood and the second likelihood to create a combined likelihood; and
determining an overall probability that the pair of devices are owned or operated by a common user based at least in part on the combined likelihood.
25. The method of claim 21, further comprising:
grouping the first request and the second request by source IP address over the predetermined time period; and
determining, for each source IP address, whether the first request and the second request over a predetermined time period were from a number of user devices below a threshold number of user devices.
26. The method of claim 21, wherein determining the probability that the pair of devices are owned or operated by a common user further comprises:
weighting web events that occur when users are statistically expected to be at home less heavily than web events that occur at time periods when users are statistically likely to be away from home; and
determining the probability that the first user device and the second user device are operated by a common user, based on the weighted web events.
27. The method of claim 21, further comprising:
receiving, from the first user device over a network, a request for web page content;
transmitting, to the first user device, instructions either to store a unique identifier in local storage on the first user device or to look-up a unique identifier in local storage on the first user device; and
generating an electronic content request containing the stored or looked-up unique identifier.
28. The method of claim 21, further comprising, sending instructions to one of the first user device and the second user device to set a cookie containing a unique identifier, and to generate an electronic content request containing cookie data of the cookie.
29. The method of claim 21, further comprising:
receiving, over a network, a first request for electronic content to display at the first user device, the first request including a first unique identifier stored on the first user device;
receiving, over the network, a second request for electronic content to display at the second user device, the second request including a second unique identifier stored on the second user device; and
determining a number or frequency of occurrences that one of the first user device and the second user device are sending requests for electronic content from a common source IP address.
30. The method of claim 21, further comprising:
accessing, in a database, a demographic or browsing history information generated from the use of the second user device, the demographic or browsing history information being stored in the database in relation to a unique identifier; and
identifying, based on the demographic or browsing history information, electronic content to display at the first user device;
wherein the demographic or browsing history information is synchronized based on the unique identifier being associated with the first user device and the second user device.
31. The method of claim 30, wherein the demographic or browsing history information includes one or more of: browsing history, demographic data, behavioral information, user profiling information, and purchase history generated from both the use of the first user device and the use of the second user device.
32. A system for determining a common user for two or more user devices, the system including:
a data storage device storing instructions; and
a processor configured to execute the instructions to perform a method including:
receiving a first request for electronic content from a first user device;
determining a first device type and first source internet protocol (IP) address associated with the first user device, and a first local time at a first geographic location corresponding to the first request for electronic content;
receiving a second request for electronic content from a second user device;
determining a second device type and second source internet protocol (IP) address associated with the second user device, and a second local time at a second geographic location corresponding to the second request for electronic content;
determining a probability that the first user device and the second user device are operated by a common user, based on each of the first device type, the second device type, the first source internet protocol (IP) address, the second source internet protocol (IP) address, the first local time at the first geographic location corresponding to the first request, and the second local time at the second geographic location corresponding to the second request; and
determining that the first user device and the second user device are operated by a common user when the probability exceeds a predetermined threshold.
33. The system of claim 32, wherein the probability is calculated at least in part by incorporating a first likelihood that the pair of devices are owned or operated by a common user determined over a predetermined time period.
34. The system of claim 32, wherein the probability is calculated at least in part by incorporating a second likelihood that the pair of devices are owned or operated by a common user determined over a second predetermined time period.
35. The system of claim 32, wherein the processor is further configured for:
grouping the first request and the second request by source IP address over the predetermined time period; and
determining, for each source IP address, whether the first request and the second request over a predetermined time period were from a number of user devices below a threshold number of user devices.
36. The system of claim 32, wherein determining the probability that the pair of devices are owned or operated by a common user further comprises:
weighting web events that occur when users are statistically expected to be at home less heavily than web events that occur at time periods when users are statistically likely to be away from home; and
determining the probability that the first user device and the second user device are operated by a common user, based on the weighted web events.
37. The system of claim 32, further comprising:
receiving, from the first user device over a network, a request for web page content;
transmitting, to the first user device, instructions either to store a unique identifier in local storage on the first user device or to look-up a unique identifier in local storage on the first user device; and
generating an electronic content request containing the stored or looked-up unique identifier.
38. The system of claim 32, further comprising, sending instructions to one of the first user device and the second user device to set a cookie containing a unique identifier, and to generate an electronic content request containing cookie data of the cookie.
39. The system of claim 32, further comprising:
accessing, in a database, a demographic or browsing history information generated from the use of the second user device, the demographic or browsing history information being stored in the database in relation to a unique identifier; and
identifying, based on the demographic or browsing history information, electronic content to display at the first user device;
wherein the demographic or browsing history information is synchronized based on the unique identifier being associated with the first user device and the second user device.
40. A non-transitory computer-readable medium storing instructions that, when executed by a processor, cause the processor to perform a method of determining a common user for two or more user devices, the method including:
receiving a first request for electronic content from a first user device;
determining a first device type and first source internet protocol (IP) address associated with the first user device, and a first local time at a first geographic location corresponding to the first request for electronic content;
receiving a second request for electronic content from a second user device;
determining a second device type and second source internet protocol (IP) address associated with the second user device, and a second local time at a second geographic location corresponding to the second request for electronic content;
determining a probability that the first user device and the second user device are operated by a common user, based on each of the first device type, the second device type, the first source internet protocol (IP) address, the second source internet protocol (IP) address, the first local time at the first geographic location corresponding to the first request, and the second local time at the second geographic location corresponding to the second request; and
determining that the first user device and the second user device are operated by a common user when the probability exceeds a predetermined threshold.
US17/657,930 2013-10-15 2022-04-04 Systems and methods for matching online users across devices Pending US20220230202A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/657,930 US20220230202A1 (en) 2013-10-15 2022-04-04 Systems and methods for matching online users across devices

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/054,500 US11328323B2 (en) 2013-10-15 2013-10-15 Systems and methods for matching online users across devices
US17/657,930 US20220230202A1 (en) 2013-10-15 2022-04-04 Systems and methods for matching online users across devices

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/054,500 Continuation US11328323B2 (en) 2013-10-15 2013-10-15 Systems and methods for matching online users across devices

Publications (1)

Publication Number Publication Date
US20220230202A1 true US20220230202A1 (en) 2022-07-21

Family

ID=51866324

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/054,500 Active 2035-11-03 US11328323B2 (en) 2013-10-15 2013-10-15 Systems and methods for matching online users across devices
US17/657,930 Pending US20220230202A1 (en) 2013-10-15 2022-04-04 Systems and methods for matching online users across devices

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/054,500 Active 2035-11-03 US11328323B2 (en) 2013-10-15 2013-10-15 Systems and methods for matching online users across devices

Country Status (2)

Country Link
US (2) US11328323B2 (en)
WO (1) WO2015057707A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220385551A1 (en) * 2021-05-30 2022-12-01 Bi Science (2009) Ltd System and a method for identifying client devices used by the same user

Families Citing this family (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US8151327B2 (en) 2006-03-31 2012-04-03 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US9112850B1 (en) 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US10754913B2 (en) * 2011-11-15 2020-08-25 Tapad, Inc. System and method for analyzing user device information
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
WO2014022813A1 (en) 2012-08-02 2014-02-06 The 41St Parameter, Inc. Systems and methods for accessing records via derivative locators
US9619812B2 (en) * 2012-08-28 2017-04-11 Nuance Communications, Inc. Systems and methods for engaging an audience in a conversational advertisement
WO2014078569A1 (en) 2012-11-14 2014-05-22 The 41St Parameter, Inc. Systems and methods of global identification
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
WO2015069957A1 (en) * 2013-11-06 2015-05-14 Yume, Inc. Systems and methods for identifying household users of electronic screen devices
US9515984B1 (en) * 2013-11-19 2016-12-06 El Toro.Com, Llc Determining and utilizing one or more attributes of IP addresses
US10505893B1 (en) 2013-11-19 2019-12-10 El Toro.Com, Llc Generating content based on search instances
US10333890B1 (en) 2013-11-19 2019-06-25 El Toro.Com, Llc Determining IP addresses that are associated with physical locations with new occupants and providing advertisements tailored to new movers to one or more of those IP addresses
US10348842B1 (en) 2013-11-19 2019-07-09 El Toro.Com, Llc Generating content based on a captured IP address associated with a visit to an electronic resource
US10318987B2 (en) * 2014-02-18 2019-06-11 International Business Machines Corporation Managing cookie data
US20150269616A1 (en) * 2014-03-18 2015-09-24 Linkedln Corporation Business audience marketing system
US20150348094A1 (en) * 2014-05-28 2015-12-03 Videology, Inc. Method and system for advertisement conversion measurement based on associated discrete user activities
CN106663105B (en) * 2014-06-27 2020-12-01 索尼公司 Information processing apparatus, information processing method, and program
US9838502B2 (en) * 2014-08-06 2017-12-05 Michael D. CROFT Systems and methods for RWD app store based collaborative enterprise information management
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10587706B2 (en) 2014-10-20 2020-03-10 The Nielsen Company (US) Methods and apparatus to correlate a demographic segment with a fixed device
US9571649B2 (en) * 2014-10-23 2017-02-14 Teletech Holdings, Inc. Method for connecting users with agents based on user values dynamically determined according to a set of rules or algorithms
US9350865B2 (en) 2014-10-23 2016-05-24 Teletech Holdings, Inc. Method for connecting a user with an agent based on user interaction of a link of a prior message exchanged between the user and the agent
US10026097B2 (en) * 2015-02-18 2018-07-17 Oath (Americas) Inc. Systems and methods for inferring matches and logging-in of online users across devices
US9864999B2 (en) * 2015-04-30 2018-01-09 Yahoo Holdings, Inc. Method for identifying multiple devices belonging to the same group
US9667591B2 (en) * 2015-05-22 2017-05-30 Conversant, Inc. System and method for maintaining coherence of assocation across a network address change or reassignment
WO2016195090A1 (en) * 2015-06-05 2016-12-08 日本電信電話株式会社 Detection system, detection device, detection method and detection program
US20190005533A1 (en) * 2016-01-25 2019-01-03 Quaero Signal Matching for Entity Resolution
CN107015980B (en) * 2016-01-27 2020-12-25 腾讯科技(北京)有限公司 Method and device for information display
US10715852B2 (en) * 2016-04-20 2020-07-14 Dentsu Inc. Information processing apparatus, information processing method, information processing system, and program
US10769670B2 (en) * 2016-08-17 2020-09-08 Criteo Sa Runtime matching of computing entities
RU2659475C1 (en) * 2017-04-25 2018-07-02 Общество с ограниченной ответственностью "НПО Аналитика" Method of efficiency measurement of online advertising campaign placing (options)
US11720924B2 (en) 2017-04-05 2023-08-08 Cinarra Systems, Inc. Systems and methods for cookieless opt-out of device specific targeting
US11164212B2 (en) * 2017-04-12 2021-11-02 Cinarra Systems, Inc. Systems and methods for relevant targeting of online digital advertising
US11328308B1 (en) * 2017-05-31 2022-05-10 Juniper Networks, Inc Systems and methods for matching and delivering account-level data from multiple customer-facing platforms based on contact-level touchpoints
WO2019182583A1 (en) * 2018-03-21 2019-09-26 Rovi Guides, Inc. Systems and methods for presenting auxiliary video relating to an object a user is interested in when the user returns to a frame of a video in which the object is depicted
US10878051B1 (en) * 2018-03-30 2020-12-29 Palantir Technologies Inc. Mapping device identifiers
US10932118B1 (en) 2018-05-25 2021-02-23 El Toro.Com, Llc Systems, methods, and apparatuses for providing content according to geolocation
CN110955847B (en) * 2018-09-26 2023-08-25 北京国双科技有限公司 Information processing method, device, storage medium and processor
JP6720365B1 (en) * 2019-02-15 2020-07-08 株式会社電通グループ Advertisement contact determination system, advertisement contact determination device and program
US20210142341A1 (en) * 2019-11-11 2021-05-13 Terragon Holdings Mauritius System and method to uniquely identify a user across internet and non-internet channels
CN112948663B (en) * 2019-12-10 2024-08-20 京东科技控股股份有限公司 Information recommendation method and device, equipment and storage medium
CN112215636B (en) * 2020-01-21 2021-11-19 华为技术有限公司 Advertisement attribution method and equipment
CN114298760A (en) * 2021-12-30 2022-04-08 胜斗士(上海)科技技术发展有限公司 Advertisement attribution method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130124327A1 (en) * 2011-11-11 2013-05-16 Jumptap, Inc. Identifying a same user of multiple communication devices based on web page visits
US20130124309A1 (en) * 2011-11-15 2013-05-16 Tapad, Inc. Managing associations between device identifiers
US20130268375A1 (en) * 2012-04-05 2013-10-10 Blis Media Limited Identifying the Physical Location of Internet Service Providers
WO2013170198A2 (en) * 2012-05-10 2013-11-14 Drawbridge, Inc. System and method for determining related digital identities
US8880097B1 (en) * 2013-12-04 2014-11-04 4Info, Inc. Systems and methods for statistically associating mobile devices to households
US20160006628A1 (en) * 2011-05-02 2016-01-07 Google Inc. Determining geo-locations of users from user activities

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8255489B2 (en) 2006-08-18 2012-08-28 Akamai Technologies, Inc. Method of data collection among participating content providers in a distributed network
US8504411B1 (en) 2009-09-14 2013-08-06 Aol Advertising Inc. Systems and methods for online user profiling and segmentation
US9357024B2 (en) 2010-08-05 2016-05-31 Qualcomm Incorporated Communication management utilizing destination device user presence probability
US9197733B2 (en) 2012-02-21 2015-11-24 Blackberry Limited System and method for transferring data between electronic devices
WO2017019645A1 (en) * 2015-07-24 2017-02-02 Videoamp, Inc. Cross-screen optimization of advertising placement

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160006628A1 (en) * 2011-05-02 2016-01-07 Google Inc. Determining geo-locations of users from user activities
US20130124327A1 (en) * 2011-11-11 2013-05-16 Jumptap, Inc. Identifying a same user of multiple communication devices based on web page visits
US20130124309A1 (en) * 2011-11-15 2013-05-16 Tapad, Inc. Managing associations between device identifiers
US20130268375A1 (en) * 2012-04-05 2013-10-10 Blis Media Limited Identifying the Physical Location of Internet Service Providers
WO2013170198A2 (en) * 2012-05-10 2013-11-14 Drawbridge, Inc. System and method for determining related digital identities
US8880097B1 (en) * 2013-12-04 2014-11-04 4Info, Inc. Systems and methods for statistically associating mobile devices to households

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220385551A1 (en) * 2021-05-30 2022-12-01 Bi Science (2009) Ltd System and a method for identifying client devices used by the same user
US11722389B2 (en) * 2021-05-30 2023-08-08 Bi Science (2009) Ltd System and a method for identifying client devices used by the same user
US20230318949A1 (en) * 2021-05-30 2023-10-05 Bi Science (2009) Ltd System and a method for identifying client devices used by the same user
US12095638B2 (en) * 2021-05-30 2024-09-17 Bi Science (2009) Ltd System and a method for identifying client devices used by the same user

Also Published As

Publication number Publication date
WO2015057707A2 (en) 2015-04-23
WO2015057707A3 (en) 2015-08-06
US11328323B2 (en) 2022-05-10
US20150106198A1 (en) 2015-04-16

Similar Documents

Publication Publication Date Title
US11729285B2 (en) Systems and methods for matching online users across devices
US20220230202A1 (en) Systems and methods for matching online users across devices
US11704694B2 (en) Systems and methods for inferring matches and logging-in of online users across devices
US10861055B1 (en) Method and system for identifying users across mobile and desktop devices
EP2534632B1 (en) Communicating information in a social network system about activities from another domain
US9779417B2 (en) Systems and methods for cross-browser advertising ID synchronization
US11741506B2 (en) Systems and methods for providing targeted content across user channels
US11468482B2 (en) Systems and methods for identity-protected data element distribution network
US20170083941A1 (en) Media Planning Tool
US10019736B2 (en) Systems and methods for identifying household users of electronic screen devices
US20150339720A1 (en) System and method for targeting users for content delivery
US20150006297A1 (en) Generating communications including content based on derived attributes
US20230344913A1 (en) Systems and methods for matching online users across devices

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: AOL ADVERTISING INC., NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MILLER, NICHOLAS P.;EDWARDS, SIMON D.;MILFORD, ALAN J.;AND OTHERS;SIGNING DATES FROM 20140520 TO 20140521;REEL/FRAME:059563/0623

Owner name: YAHOO AD TECH LLC, NEW YORK

Free format text: CHANGE OF NAME;ASSIGNOR:VERIZON MEDIA INC.;REEL/FRAME:059676/0587

Effective date: 20211102

Owner name: VERIZON MEDIA INC., NEW YORK

Free format text: CHANGE OF NAME;ASSIGNOR:OATH (AMERICAS) INC.;REEL/FRAME:059676/0556

Effective date: 20200122

AS Assignment

Owner name: OATH (AMERICAS) INC., NEW YORK

Free format text: CHANGE OF NAME;ASSIGNOR:AOL ADVERTISING INC.;REEL/FRAME:062864/0500

Effective date: 20170613

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER