MANAGING ASSOCIATIONS BETWEEN DEVICE IDENTIFIERS
Device identifiers for devices, such as computing devices, software, and applications, etc., are analyzed to determine whether the device identifiers are associated with each other (e.g., are connected to each other) and how strongly the device identifiers are associated with each other. A stronger connection between two device identifiers may indicate that the device identifiers are connected to the same user, same computing device, or same household. Connections between device identifiers are identified and/or weighted if the device identifiers are associated with the same network or if the device identifiers use the same login information to access content. The identifiers and their connections may form a device graph. Content is targeted to the clients based on the device graph. The device graph may also be used to perform targeting and orchestration of advertising, attribution reporting, analytics, and content optimization across devices in the device graph.
Latest TAPAD, INC. Patents:
This Application is a Continuation of U.S. application Ser. No. 16/380,794, filed Apr. 10, 2019, entitled “MANAGING ASSOCIATIONS BETWEEN DEVICE IDENTIFIERS,” which is a Continuation of U.S. application Ser. No. 13/677,110, filed Nov. 14, 2012, entitled “MANAGING ASSOCIATIONS BETWEEN DEVICE IDENTIFIERS,” which is a Non-Provisional of Provisional (35 USC 119(e)) of U.S. Application Ser. No. 61/563,963, filed Nov. 28, 2011, entitled “SYSTEM AND METHOD FOR USING DEVICE SIGNATURES TO TRACK USERS IN A PRIVACY-SECURE MANNER.” application Ser. No. 13/677,110 is a Non-Provisional of Provisional (35 USC 119(e)) of U.S. Application Ser. No. 61/563,277, filed Nov. 23, 2011, entitled “SYSTEM AND METHOD FOR USING DEVICE FINGERPRINTS TO TRACK USERS IN A PRIVACY-SECURE MANNER.” application Ser. No. 13/677,110 is a Non-Provisional of Provisional (35 USC 119(e)) of U.S. Application Ser. No. 61/559,879, filed Nov. 15, 2011, entitled “SYSTEM AND METHOD FOR REAL-TIME BIDDING ACROSS BRIDGED PLATFORMS,” the contents of which are hereby incorporated by reference herein.
BACKGROUNDThe use of computing devices such as computer systems, smartphones, laptops computers, tablet computers, netbook computers, smart televisions, personal digital assistants (PDAs), cell phones, media players, gaming consoles (e.g., PlayStation®, XBOX®), smart televisions (TVs), etc., is now prevalent. Users often employ various computing devices and various applications to access content online. For example, a user may use a laptop computer and a first type of browser (e.g., Firefox®) to access a news website or a social networking website when the user is at home. The user may also use a smartphone and a second type of browser (e.g., Safari®) to access such websites (e.g., the news website and/or the social networking website) when the user is at another location (e.g., at work or at a grocery store, etc.). The user may also use various applications to access online content. For example, many publishers, such as news, email, and/or social network publishers (e.g., Yahoo®, Facebook®, CNN®, or other companies or entities that provide online content, etc.) provide applications which allow users to access email, website, and/or other content without using a browser application.
Many entities (such as companies that sell/market goods or services, advertisers, marketing firms, etc.) use various forms of online advertising to advertise and/or market various products and/or services to user. Online advertising may involve the serving of advertisements (e.g., banners, text, images, video clips, audio clips, other rich media, etc.) to users when the users access content (e.g., when a user visits a particular website or when a user views a particular streaming video). For example, when a user visits a website, an advertisement server may deliver and/or provide an advertisement to a region and/or portion of the website for viewing by the user. The size and position of the advertisement may vary based on the design of the particular website. For example, the advertisement may be a banner with text and images that is displayed in a left region of the website (e.g., along the left side of the website). In another example, the advertisement may be a video clip that is displayed on the top region of the website (e.g., along the top of the website).
In order to achieve better targeting of specific audiences of users, many advertisers and/or companies use techniques such as cookies and pixels to track how users are interacting with different websites. Cookies may be data that is sent from a website and stored in a user's web browser. The cookie data may be accessed while a user is browsing the website. Some websites contain instructions that can save and edit information in a user's cookie. For example, a cookie generated by a retail website may contain information such as (i) products viewed and/or purchased by a user, (ii) information about the user such as internet protocol (IP) address, computer/browser type, and (iii) date/time of the user's last visit to the website. Pixels may be used to place and update cookies and may allow third parties (such as website publishers and/or advertisers) to place and update cookies in order to track how and when users are interacting with particular websites. By using cookies and pixels to track user interaction with certain websites, advertisers and/or companies may be able to personalize and orchestrate advertising or content to certain types of users based on information gathered from the cookies and pixels.
SUMMARYCompanies and/or advertisers use tracking techniques such as cookies and pixels to track how users interact with different websites and other digital services. However, these techniques do not allow advertisers to track the activities of users across multiple browsers and/or applications on the same device. For example, different applications (e.g., different browsers applications such as Firefox® and Safari®) on the same computing device may appear as different devices/identifiers to server systems/platforms (e.g., software, servers, computers and/or other components used by advertisers and companies to provide and track advertisements). These techniques also do not allow advertisers and/or companies to track the activities of users across multiple devices. For example, a user may have both a laptop computer and a smartphone. Existing techniques, such as cookies and pixels, may not be able to link or track the user's behavior and/or activities across both the laptop computer and the smartphone. Consequently, advertisers are not able to target and/or orchestrate advertisements (e.g., ads) to the same user on multiple devices or across multiple browsers/applications.
System and methods of tracking, managing, and/or using device identifiers are disclosed herein. A device identifier may be an identifier (e.g., a cookie ID, a derived identifier based on website header information, such HyperText Transfer Protocol header (HTTP) header information/fields, and other parameters, a hardware or an operating system identifier (such as an iOS® Identifier For Advertisers (IDFA) or an Android® device ID for a smartphone, etc.), a network device identifier such as an Internet Protocol (IP) address for a laptop, a Medium Access Control (MAC) address for a tablet, an International Mobile Equipment Identity (IMEI) number for a smart phone, etc.) used by a device when the device accesses content (e.g., access a news website, access posts or messages on a social networking website, etc.). A device may be a computing device (e.g., a smartphone, a tablet computer, a laptop computer, a desktop computer, etc.) and/or an application, software, software modules, and/or other component on the computing device (e.g., a web browser, a mobile application installed on a smartphone, etc.). When the different computing devices, applications, software, software modules and/or other components access content (e.g., websites, services, and/or locations) online, one or more device identifiers may be recorded, captured, and/or stored by servers that host the content. For example, when a user access a news website using a web browser application on a smartphone, the servers that host content for the news website may record the IP address of the computing device, other website header information (e.g., HTTP header information/fields), and an identifier for the web browser application (e.g., an identifier in a cookie for the website such as a cookie ID, a Globally Unique IDentifier (GUID)).
In one embodiment, the servers may provide network data to an identifier module or the servers may provide the network data to a network data server that may provide the network data to the identifier module. The network data may include a device identifier for a device (e.g., a computing device and/or an application), a type of a network used by the device (e.g., a residential/home network), an identifier for the network (e.g., an IP address for the network gateway), an identifier for the servers that host the content (e.g., an IP address or a domain name for the servers), information about a software/application (such as the type of a browser application/user agent), other website header information (e.g., HTTP header information/fields), and/or a time that the content was accessed (e.g., Sep. 1, 2012 at 1:25 PM PST). In one embodiment, the header information may include information such as the type of application or software, modules that are used by the application or software (e.g., add-ons or extensions used by a browser application), the type of operating system that the application or software is running on, type and version of browser, etc. All or some of the information above may also be referred to as a user-agent string. In one embodiment, the website header information may include HTTP header information/fields including, but not limited to, the domain name of a server that hosts content, a date, a referrer (e.g., the name of a previous website or web page), the content type (e.g., HTML content, portable document format (PDF) content, digital video, etc.), a cookie ID, authorization credentials (e.g., username and/or password), etc.
The identifier module may use the network data to identify connections between different device identifiers. For example, a first device with a first device identifier (e.g., a smartphone with a an iOS® IDFA) may access a mobile application and second device with second device identifier (e.g., a laptop with a cookie ID) may access a different website using the same network (e.g., both devices access the different websites from the same Wi-Fi network in a user's residence or home). The identifier module may associate the first device identifier (e.g., the iOS® IDFA) and the second device identifier (e.g., the cookie ID) with each other because both device identifiers used the same network (e.g., may identify a connection between the first device identifier and the second device identifier). In another example, a user may log into a partner's (e.g., advertiser's, publisher's) website or application that requires user credentials using a web browser application (with a cookie ID) on a laptop and may later use a mobile application on a smartphone (with a Android® device ID) to log into the same partner's (e.g., advertiser's, publisher's) website/application. The identifier module may associate the cookie ID with the Android® device ID (e.g., may identify a connection between the cookie ID and the Android® device ID) because both the cookie ID and the Android® device ID were used by devices (e.g., computing devices, software, and/or applications) when accessing the partner's (e.g., advertiser's, publisher's) website. In one embodiment, the identifier module may collect anonymized login information (e.g., hashed/obfuscated usernames) from different advertisers/publishers (e.g., from an email website). The identifier module may identify a connection between two different device identifiers (e.g., between the computing devices and/or applications associated with the different device identifiers) if the two different devices use the same login information to access content from the partner (e.g., advertiser, publisher).
In one embodiment, the identifier module may assign weights to the connections between the device identifiers. The identifier may also adjust or modify the weights based on various criteria and/or conditions (as discussed in more detail below in conjunctions with
In one embodiment, the identifier module may use the connections and/or the weights of the connections between device identifiers to provide content, such as advertising, to different devices. For example, the identifier module may perform advertisement targeting and/or retargeting of users or audiences across different computing devices. In another example, the identifier module may perform attributions (e.g., attributing a sale or conversion to an advertisement) across different computing devices. In a further example, the identifier module may perform other functions including, but not limited to, brand survey delivery, campaign/audience analytics, frequency capping, and lookalike modeling, across different computing devices and/or applications.
The above summary is a simplified summary of the disclosure in order to provide a basic understanding of some aspects of the disclosure. This summary is not an extensive overview of the disclosure. It is intended to neither identify key or critical elements of the disclosure, nor delineate any scope of the particular implementations of the disclosure or any scope of the claims. Its sole purpose is to present some concepts of the disclosure in a simplified form as a prelude to the more detailed description that is presented later.
The present disclosure will be understood more fully from the detailed description given below and from the accompanying drawings of various embodiments of the present disclosure, which, however, should not be taken to limit the present disclosure to the specific embodiments, but are for explanation and understanding only.
Each device (e.g., each computing device and/or each software or application) may have one or more device identifiers. For example, a smartphone (e.g., a device) may have a MAC address, a serial number (e.g., a serial number from a manufacturer an Open Device Identification Number (ODIN), a Unique Device Identifier (UDID), an OpenUDID, a Globally Unique Identifier (GUID), an IMEI number, an IP address, etc., which may each be device identifiers. In another example, applications, software, and/or software modules may also have device identifiers. For example, an application on a computing device may have a serial number which may be the device identifier for the application. In another example, a web browser application may have cookie which includes an identifier and the identifier in the cookie (e.g., the cookie ID) may be the device identifier for the web browser application. In a further example, an application (e.g., a mobile news application, a game, etc.) may use different types of device identifiers (e.g., a GUID, a UUID, etc.). In other embodiments, device identifiers may include, but are not limited to, IP addresses, a MAC addresses, IMEI numbers, serial numbers, ODINs, UDIDs, OpenUDIDs, GUIDs, cookie IDs, an iOS® IDFA, an Identifier for Vendors (IDFV), and/or any other data/information which may be used to identify a device (e.g., an application, software, and/or a computing device). In one embodiment, a device identifier may be a number (e.g., 734598238742), an alphanumeric value (e.g., A984FDSJL334), a string of characters (e.g., HZ$98!324*J), or any type of value that may be used to identify a device (e.g., an application, software, and/or a computing device).
In one embodiment, a device (e.g., a computing device, an application, software, a software module, etc.) may generate a device identifier. For example, when the application (e.g., a device) is installed onto the computing device the application (or an installer/install file for the application) may generate a device identifier based on a MAC address for the computing device. In another example, a computing device (e.g., a device, such as a smartphone), may generate a device identifier based on other identifiers for the computing device (e.g., the smartphone may generate a device identifier based on an IMEI number or a UDID for the smartphone). In some embodiments, the device (e.g., a computing device, an application, etc.) may use a variety methods, algorithms, operations, and/or functions, to generate device identifiers. For example, an application on a computing device may use a cryptographic hash function (e.g., Secure Hash Algorithm-1 (SHA-1), Secure Hash Algorithm-2 (SHA-2), Message Digest-5 (MD-5), etc.) to generate a device identifier for the application based on an IMEI for the computing device. In another example, a computing device (e.g., a tablet computer) may use a random number generator (e.g., a Pseudo-Random Number Generator (PRNG)) to generate a device identifier based on a MAC address for the computing device.
Referring back to
In one embodiment, the weight of the connection (e.g., the weight 7 for connection 110) may be indicative of how closely or how strongly two device identifiers are associated with each other. For example, the weight for each connection may be a numeric value (e.g., a number). A higher numeric value may indicate that two device identifiers are closely associated with each other and a lower numeric value may indicate that two device identifiers are less closely associated with each other. In one embodiment, a closer association between two device identifiers may indicate that the two device identifiers originate from the same computing device. For example, a first device identifier may be an identifier for a computing device (e.g., a smartphone) and a second device identifier may be for an application (e.g., a web browser) that is used on the computing device. In another example, a first device identifier may be an identifier for a first application (e.g., a web browser) on a computing device and the second device identifier may be for a second application (e.g., a game or a social networking application) on the same computing device. In another embodiment, a closer association between two device identifiers may indicate that the two device identifiers originate from computing devices that are used by the same user, or that are used by users who know each other (e.g., members of a household, friends, etc.). For example, the first device identifier may be for a first computing device (e.g., a smartphone) used by a user and the second device identifier may be for a second computing device (e.g., a laptop computer) used by the same user. In another example, the first device identifier may be for a first computing device (e.g., a tablet computer) used by a user and the second device identifier may be for a second computing device (e.g., a laptop computer) used by a family member (e.g., husband, wife, brother, sister, son, daughter, etc.) of the user.
In one embodiment, the connections 105, 110, 115, 120, 125, and/or 130 may also include other information in addition to the weights. For example, the connection 120 includes information (e.g., the text/value “login”) indicating that the connection 120 was established because the device associated with device identifier C and the device associated with device identifier D used the same login information (e.g., same username/password) to access content from a partner (e.g., publisher, advertiser). In another example, the connection 125 includes information (e.g., the text/value “login”) indicating that the connection 125 was identified because the device for device identifier A and the device for device identifier D used the same login information to access content from a publisher (e.g., used the same username/password to access an email account), and information (e.g., the weight “1”) indicating that the connection 125 was also identified because device identifier A and device identifier D used the same network gateway (e.g., accessed the publisher service via the same Wi-Fi network). In addition, the connection may also include information indicating the name of the partner (e.g., a publisher, an advertiser, etc.) that provided the login information. For example, the connection may include the text/value “login—Gmail®” indicating that the login information was received from Google®, or the connection may include the text/value “login/Pandora®” indicating that the login information was received from Pandora®. In a further example, the connection may also include information indicating where the network data (that was used to identify the connection) was obtained from (e.g., a merchant server, a content server, an advertisement server, a network data server, etc.). Although strings or text are illustrated in
In one embodiment, the connections between the device identifiers may not include weights. For example, when a connection between two device identifiers is identified using login information, the connection may not include a weight.
As discussed above, the connections 105, 110, 115, 120, 125, and 130, and the weights for the connections may be determined or identified using network data and/or login information (e.g., username and/or password) that is used by different devices to access a partner's (e.g., publisher's, advertiser's) website. The network data may include a device identifier (e.g., an iOS® IDFA, a Android® device ID, an identifier in a cookie, etc.) for a device (e.g., a computing device and/or an application), a type of a network used by the device (e.g., whether the network is a residential/home network, or a commercial/business/corporate network), an identifier for the network (e.g., an IP address for the network, such as the IP address for a Wi-Fi router) that is used by the device, a type for the content that was accessed by the computing device and/or application (e.g., news content, music content, video content, etc.), an identifier for the servers that host the content (e.g., an IP address or a domain name for the servers), user agent information (e.g., the type of a browser, such as Mozilla®, Safari®, Firefox®, Chrome®, Internet Explorer®, etc.), website header information (e.g., HTTP headers/fields), and/or a time that the content was accessed (e.g., Sep. 1, 2012 at 1:25 PM PST). In one embodiment, the network data may be generated, obtained and/or inferred by a server (e.g., tracking server 305, network data server 325, etc., as shown in
The servers which host or store the content (e.g., websites, multimedia content, etc.) that is accessed by the devices may obtain and/or record network data when the device accesses the content. For example, a server that hosts a news website may obtain a cookie ID for a web browser on a smartphone. In another example, a server that hosts social networking content may obtain an IP address for a tablet computer that accesses the social networking content. In one embodiment, these servers may provide the network data (e.g., device identifiers, network types, identifiers for the servers, etc.) to an identifier module (e.g., as illustrated and discussed further below in conjunction with
In another embodiment, the identifier module may obtain login information and network data from different servers. The identifier module may identify connections between different device identifiers, based on the login information. For example, the identifier module may obtain hashed login information that was used to access an email server. The identifier module may determine that two different devices (each with different device identifiers) used the same login information (e.g., same username and/or password) to access an email account. The identifier module may create a connection between the two device identifiers (e.g., between the two devices) because the two devices associated with the two device identifiers used the same login information to access the email account.
In one embodiment, the weights for the connections 105, 110, 115, 120, 125, and 130, and the weights may be increased or decreased based on different criteria, rules, factors, and/or conditions. For example, the weight for the connection 105 may be increased if device identifier A and device identifier B are seen on the same residential network within a period of time (e.g., seven days). In another example, the weight for connection 130 may be decreased of device identifier B and device identifier C have not been seen on the same residential network for a period of time (e.g., two weeks). The identifier module (as illustrated and discussed further below in conjunction with
In one embodiment, device identifiers may be removed from the device graph 100. For example, device identifier E is not connected to other device identifiers. After a period of time (e.g., 30 days, 7 days, etc.), the device identifier E may be removed from the device graph 100 if the device identifier E is still not connected to other identifiers or the device identifier has not been refreshed in a threshold period of time. In another embodiment, device identifiers may be added to the device graph 100. For example, a new device identifier may be added to the device graph and a new connection may connect the new device identifier to device identifier F (not shown in the figures).
In one embodiment, a server may manage, update, and/or track all device identifiers (e.g., all identifiers for computing devices, software, application, etc.) and the connections between all the device identifiers using a single device graph. Because all device identifiers may be included in a single device graph, the single device graph may include disjointed groups of connected device identifiers and single device identifiers that have no connections. In another embodiment, there may be separate device graphs that contain different device identifiers and connections.
In one embodiment, device identifiers may be merged if the device identifiers originate from the same computing device. For example, device identifier A may be an identifier for the computing device's operating system (e.g., an iOS® IDFA), device identifier B may be an identifier for a web browser (e.g., a cookie ID), and device identifier C may be an identifier for another application (e.g., a game application) on the computing device (e.g., a serial number for a second application). One of the applications (e.g., the game application) may obtain different identifiers for the computing device and/or the applications on the computing device. For example, the game application may obtain the IMEI number, the iOS® IDFA, and a cookie ID. The game application may provide these identifiers to the identifier module and may indicate that these three identifiers originate from the same computing device and/or user. The identifier module may merge the different identifiers in a device graph, based on this information. In one embodiment, after device identifiers are merged, when the identifier module later accesses the device graph to find a device identifier, the merged device identifiers are stored as being equivalent to each other. For example, when the identifier module accesses device graph 200 to find device identifier A, the device identifier A is stored in the device graph 200 as being equivalent to device identifier B and/or device identifier C.
In another embodiment, device identifier may be merged when cookie syncing is performed. For example, an advertiser or a publisher may implement cookie syncing between an advertisement exchange (e.g., an ad exchange where bids for advertisements are processed). The advertiser/publisher may use a first cookie ID (e.g., cookie ID A) and the advertisement exchange may use a second cookie ID (e.g., cookie ID B). The identifier module may merge the first cookie ID and the second cookie ID because the publisher and the advertisement exchange have synced the two cookie IDs (e.g., both cookie IDs belong to the same device).
In one embodiment device identifiers may not be merged even though the device identifiers are associated with the same login information or user credentials. For example, as discussed above, the identifier module may identify a connection between two device identifiers because the two device identifiers are associated with the same login information (e.g., same user credentials). The identifier module may not merge the two device identifiers, but may indicate in the connection (e.g., in the extra information included in the connection) that the connection was identified based on login information. In another embodiment, device identifiers may be merged if the device identifiers are associated with the same user credentials for a server. For example, a user may use desktop computer at work to log into an email website. The desktop computer may have the device identifier A. The user may also use an email application on a smartphone to access the same email website when the user is away from a computer. The email application may have the device identifier B. The user may also use a web browser on a tablet computer to access the email website when the user is at home (e.g., at the user's residence). The table computer may have the device identifier C. Because the user may use the same user credentials (e.g., username, password, personal identification number (PIN), etc.), the server that hosts the email website may provide network data indicating that device identifiers A, B, and C, are all associated with the same user credentials. The device identifiers A, B, and C, may be merged or combined into the merged identifier ABC, based on the network data.
In one embodiment, when multiple device identifiers are merged, the connections and the weights for the multiple device identifiers may also be merged or combined. For example, as illustrated in
Although
It should be understood that in other embodiments, the device identifiers, connections, and weights for the connections may be represented using other data structures and/or representations, such as graphs, tables, charts, trees, etc.
Network architecture 300 also includes a network 350 that is communicatively coupled to the network 301 and to devices 355 and 360. In one embodiment, the network 350 may be a residential network or a home network. For example, the network 350 may be a Wi-Fi network in the residence of a user. The network 350 may be coupled to the network 301 via a service provider that provides network connectivity to residential users (e.g., a cable TV service provider, a telephone service provider, an internet service provider, etc.). Network architecture 300 further includes a network 370 that is communicatively coupled to the network 301 and devices 355, 375 and 380 that are communicatively coupled to the network 370. In one embodiment, the network 370 may be a business network, a corporate network, a phone carrier network, and/or a Wi-Fi network (e.g., a Wi-Fi hotspot). For example, the network 370 may be a network that is used by a company to connect multiple computing devices to each other and to the network 301 (e.g., the Internet).
Each of the networks, servers and devices illustrated in
Devices 355, 360, 375, and 380 may each be computing devices (e.g., computing devices, such as a smartphone, a laptop computer, a tablet computer, etc.). Each of the devices 355, 360, 375, and 380 may have one or more device identifiers (e.g., MAC address, IMEI number, serial number, UDID, etc.) Device 355 includes applications 356 and 357 (e.g., a web browser, a game, an email application, etc.). Each of the applications 356 and 357 may also have one or more device identifiers (e.g., cookie IDs, GUIDs, a hash generated based on a MAC address of the device 355, etc.). Device 380 includes applications 381 and 382, and each of the applications 381 and 382 may have one or more device identifiers. Device 375 includes application 376 (e.g., a media player). Each of applications 356, 357, 376. 381 and 382 may have their own unique identifiers and therefore, may also be considered unique devices in the device graph. As shown in
The merchant server 315 may be a server that hosts a merchant website. For example, the merchant server 315 may host an online store that allows users to purchase products and/or services online. The merchant server 315 may obtain a device identifier from a device (e.g., device 355 or application 356 on the device 355) that accesses the merchant server 315. For example, the merchant server 315 may obtain the IP address of the device 355 and/or may obtain the cookie ID for a web browser (e.g., application 356). The merchant server 315 may provide the device identifier, as well as other network data (e.g., a time or timestamp, an identifier for the merchant server 315, etc.) to the tracking server 305. The content server 320 may be a server that provides content to a user. For example, the content server 320 may host a news website that provides news, updates, and other information to a user. In another example, the content server 320 may be a server that hosts a social networking website or an email website. The content server 320 may obtain a device identifier from a device (e.g., device 380 or application 381 on the device 380) that accesses the content server 320. For example, the content server 320 may obtain the cookie ID of the device 380 of a browser on that device and/or may obtain the Android® ID through an email application (e.g., application 381) on that device. The content server 320 may provide the device identifier, as well as other network data (e.g., a time or timestamp, an identifier for the content server 320, the type of content that was accessed, etc.) to the tracking server 305. In one embodiment, one or more of the merchant server 315 and the content server 320 may generate, update, and/or store an audience record (e.g., indicating that the device belongs to a certain audience/segment/group). For example, the content server 320 may generate and/or update an audience record that may include a list or other data indicative of different device identifiers accessed certain content (e.g., a certain news article, a certain webpage, etc.). In another example, the merchant server 315 may generate and/or update an audience record that may include a list or other data indicative of different device identifiers that have view a particular item (e.g., a tent), or a category of items (e.g., camping equipment). In another embodiment, the tracking server 305 may generate, update, and/or store the audience record. For example, merchant server 315 and/or the content server 320 may include a pixel (e.g., a tracking pixel) that is provided by the tracking server 305 or the publisher for tracking server 305. The pixel may allow the tracking server 305 to track the device identifiers for devices that have accessed content on the merchant server 315 and/or the content server 320, and to generate/update the audience record.
The advertisement server 310 may be a server that provides advertisements (e.g., ads) to the other servers and/or to the devices 355. For example the advertisement server 310 may provide an advertisement to the content server 320 and the content server may provide the advertisement, along with content (e.g., a news article) to a device, such as device 355. In another example, the advertisement server 310 may provide the advertisement to the device 355 itself. In one embodiment, the advertisement server 310 may generate, update, and/or store an impression history. The impression history may be a list or other data indicating the different advertisements that have been provided to different devices (e.g., provided to an application, such as a web browser, or a computing device, such as a smartphone). The advertisement server 310 may obtain the device identifier for the device (e.g., from content server 320 or merchant server 315) and may associate the device identifier with each advertisement in order to track whether an advertisement has been displayed, shown, or provided to the device. In one embodiment, the advertisement 310 may perform targeting, attribution, behavioral analysis, frequency capping, and lookalike modeling, based on a device graph received from the identifier module 306 (as discussed below in more detail in conjunction with
The tracking server 305 includes identifier module 306. The tracking server 305 may use the identifier module 306 to obtain and/or generate one or more device graphs (e.g., as illustrated in
The identifier module 306 may analyze the network data to determine whether the network data should be used when creating the device graphs. In one embodiment, the identifier module 306 may use only network data that indicates that the device associated with a device identifier was using a residential or home network. For example, the identifier module 306 may discard or may not use network data that is obtained from a business network because the devices (e.g., computing devices or applications) on a business network may not be closely associated with each other. This may help prevent the identifier module from creating connections between devices which are not closely associated with each other. For example, this may prevent the identifier module 306 from creating a connection between a first device identifier for laptop computer used a user and a second device identifier for a desktop computer used by a co-worker of the user. In another embodiment, the identifier module 306 may use network data that is obtained from a business network to adjust the weights of the connections if devices that use the business network were previously seen on a home or residential network. In another embodiment, the identifier module 306 may use network data that is obtained, such as location data (e.g., a device's GPS location) or contextual data (e.g., accessing a specific news site every day) to adjust the weights to show a stronger connection between two device identifiers (e.g., increase the weight of a connection).
In one embodiment, the identifier module 306 may discard network data from a network if more than a threshold number of devices use the network within a threshold amount of time. For example, if more than five devices (e.g., more than five computing devices) use a particular network within an hour, the network data associated with that network (e.g., network data that includes an identifier for that network) may be discarded or may not be used.
The identifier module 306 may also remove device identifiers from the device graph, based on network data. In one embodiment, if a device identifier is connected to more than a threshold number of device identifier within a threshold amount of time, the identifier module may remove the device identifier and its associated connections from the device graph. For example, if a device identifier is connected to more than five other device identifiers within an hour, the device identifier and its associated connections may be removed from the device graph. In another embodiment, the identifier module 306 may remove a device identifier and its associated connections from the device graph if the device identifier is connected to more than a threshold number of other device identifiers. For example, the identifier module 306 may remove a device identifier if it is connected to more than forty other different device identifiers. In a further embodiment, the identifier module 306 may remove a device identifier and its associated connections from the device graph if the device identifier is included in network data over a threshold number of times within a threshold period of time. For example, the identifier module 306 may remove a device identifier from the device graph if the device identifier appears in five different network data sets received from different servers within an hour, because this may indicate that the device associated with the device identifier may not be a consumer computing device (e.g., the device may be a proxy server computer that forwards and receives data for multiple computing devices).
The identifier module 306 may also adjust the weights of the connections between device identifiers based on how frequently and/or recently the device identifiers appear on the same network. In one embodiment, the identifier module 306 may increase the weight of a connection between two device identifiers, if the two device identifiers have recently appeared on the same network (e.g., both device identifiers used the same residential network) within a threshold period of time. For example, the weight of a connection between two device identifiers may be increased by one (or some other value) each time the two device identifiers appear on the same network within the last seven days. In a further embodiment, the identifier module 306 may decrease the weight of a connection between two device identifiers, if the two device identifiers do not appear on the same network within a threshold amount of time. For example, if two device identifiers to not use the same network within a month, the weight of the connection between the two device identifiers may be decreased. In one embodiment, the identifier module 306 may remove a connection that has weight of zero from the device graph (e.g., the two device identifiers may not longer be connected or associated with each other). In another embodiment, the identifier module 306 may remove device identifiers that have no connections to other device identifiers from the device graph after a period of time. For example, a device identifier may be removed from the device graph if the device identifier has had no connections for longer than fourteen days or the device has not been refreshed in fourteen days.
It should be understood that in other embodiments, different threshold periods of time (e.g., 30 minutes, 2 hours, 5 days, 1 month, etc.) and different threshold values (e.g., 5, 20, 100) may be used by the identifier module 306 when determining whether to use network data, when determining whether to remove device identifiers and connections, and/or when adjusting the weights of the connections. In other embodiments, the weights may be values other than numeric values. For example, the weights may be alphanumeric strings. The weights may also use different scales (e.g., a lower value may indicate that two identifiers are more closely associated instead of a higher value). In addition, in some embodiments, the identifier module 306 may remove merged identifiers, may remove connections connected to the merged identifiers, and/or may adjust the weight for connections connected to the merged identifiers.
The identifier module 400 may create and/or obtain device graphs (as illustrated in
In one embodiment, the connection module 405 may identify connections between device identifiers. For example, the connection module 405 may identify a connection between two device identifiers if network data indicates that the two device identifiers have appeared on the same network. In another example, the connection module 405 may identify a connection between two device identifiers if the two devices associated with the device identifiers use the same login information to access content from an advertiser/publisher. In another embodiment, the connection module 405 may add a new device identifier to a device graph and may add a connection for the new device identifier to an existing device identifier in the device graph, based on the network data. In a further embodiment, the connection module 405 may remove device identifiers and/or connections between the device identifiers from the device graphs, based on various criteria or conditions, as discussed above in conjunction with
In one embodiment, the weight adjustment module 410 may adjust or modify the weight of the connections between different device identifiers. For example, the weight adjustment module 410 may increase a weight of a connection between two device identifiers if the two device identifiers use the same network within a period of time. In another example, the weight adjustment module 410 may decrease the weight of the connection between two device identifiers if the two device identifiers do not use the same network for a period of time.
The merging module 415 may merge different device identifiers into a merged identifier, as illustrated in
The identifier module 400 may be communicatively coupled to the advertising module 450. The advertising module 450 includes a targeting module 455, an attribution module 460, an analytics module 465 and a data store 470. The identifier module 400 may provide device graphs (as illustrated in
In one embodiment, the targeting module 455 may perform target or re-target advertisements to different devices, based on a device graph. For example a first device (e.g., a laptop computer) associated with a first device identifier (e.g., a cookie ID) may have visited a particular website. The device graph may indicate that the first device identifier is connected to a second device identifier and that the connection has a high weight (e.g., the first device is closely associated with the second device, such as a smartphone) or that the connection has been established based on login information from partners (e.g., advertisers, publishers). The targeting module 455 may provide the same advertisements or the same types of advertisements that were provided to the first device, to the second device. For example, an advertisement for camping gear may have been provided to the first device. The targeting module 455 may provide other advertisements for the same camping gear or may provide advertisements for items and/or services related to camping, to the second device.
In one embodiment, the targeting module 455 may add the first device identifier and the second device identifier to an audience record. The audience record may later be used to perform ad targeting and/or retargeting. For example, the targeting module 455 may target all device identifiers in an audience record with the same advertisements. The targeting module 455 may add device identifiers A, B, C, and D to the audience record because those device identifiers are connected to each other and the connections have higher weights or that the connections have been established based on login information from partners (e.g., advertisers, publishers). The device graph may allow the targeting module 455 to target ads to a user across multiple computing devices (e.g., target ads to a laptop computer, a tablet computer, a smartphone, a game console, and a smart TV that all belong to the same user) thereby improving reach, effectiveness, and value of the advertisements or advertising campaign. In one embodiment, the targeting module 455 may update, modify, and/or optimize an advertisement campaign based on the device graph and/or the impression history. For example, the impression history may indicate the number of times different devices have seen a certain advertisement. The targeting module 455 may switch to a different advertisement if that certain advertisement has been provided too many times to the different devices used by the user.
In another embodiment, the targeting module 455 may provide targeting/retargeting of other content besides advertisements, using the device graph and an impression history. For example, a news website may use the device graph and an impression history (that may include a list of content viewed by a user) to determine what articles that user has read across different devices (e.g., different computing devices) in order identify additional news articles that the user may be interested in. In another example, a bank may use the device graph to determine what types of searches a user has performed for different banking services across different devices (e.g., across different applications and/or computing devices). The bank may provide a particular banking offer (e.g., 0% interest) based on the searches performed using the multiple computing devices.
The attribution module 460 may perform ad attribution. For example, the attribution module 460 may attribute a conversion event (e.g., sale of a product and/or a service) to a particular advertisement (e.g., to a showing of the advertisement). Current methods of ad attribution generally work with a single identifier (e.g., a cookie ID) on a single computing device. For example, a user generally should view an ad and purchase a product in order for the purchase to be correctly attributed to the viewing of the ad. However, the attribution module 450 may use the device graph and the impression history to perform attribution across different devices. For example, a user may purchase an item from a vendor using a first device (e.g., a laptop computer) with a first identifier. The attribution module 460 may analyze the device graph to obtain other device identifiers (e.g., other devices) connected to the first device identifier. The attribution module 460 may then use the impression history to see if any advertisements from the vendor were provided to other devices associated with the other device identifiers. The attribution module 460 may determine that an advertisement from that vendor was previously displayed to a second device (e.g., a smartphone) and may attribute the conversion (e.g., a sale of an item) to that particular advertisement.
The analytics module 465 may perform one or more of brand studies, creative ad delivery, cross-device reporting, behavior analysis across devices, frequency capping, and lookalike modeling, based using the device graph and/or impression histories and/or audience records. In one embodiment, the analytics module 465 may perform creative ad delivery using the device graph and/or the impression history. For example, an advertisement may include three videos that present a story when shown in sequence (e.g., in order). When determining which of the three videos to show to a first device, the analytics module 465 may analyze the device graph to identify other device identifiers that are connected to the first device's device identifier. The analytics module 465 may then access the device graph and/or an impression history to determine whether any of the three videos were shown to other devices that are associated with the device identifiers. For example, the analytics module may determine that the first two video have already been shown to other devices in the device graph and/or the impression history, and may provide the third video to the first device.
In one embodiment, the analytics module 465 may perform behavior analysis across different computing devices of the user (e.g., across devices) using the device graph. For example, the analytics module 465 may determine that a user typically does online shopping during a particular time (e.g., during a lunch break) no matter what computing device the user is using. In another example, the analytics module 465 may determine that the user only reads his email from a particular email site using the user's laptop computer.
In one embodiment, the analytics module 465 may perform frequency capping using the device graph and/or the impression history. For example, the analytics module 465 may determine that a particular advertisement has been shown to other device that are associated with a current device, more than a threshold number of times (e.g., an advertisement has already been shown to a user 5 times across their laptop computer, smartphone, and tablet computer). The analytics module 465 may determine the advertisement should not be provide to the user on the current device (e.g., may cap or limit the number of times the advertisement is shown) in order to help prevent overexposure of the advertisement.
In one embodiment, the analytics module 465 may perform look-alike modeling using the device graph and/or the audience record. Lookalike modeling may be used by advertisers to target users which may a similar characteristics, features and/or behaviors. For example, lookalike modeling may be use to target people who enjoy the outdoors or people who enjoy playing a particular sport. The analytics module 465 may analyze a device graph and identify connections that have lower weights (e.g., because the device identifiers for the connections are not seen on the same network as often). The analytics module 465 may target these device identifiers to perform look-alike modeling. For example, a user may have a friend that periodically visits the user's home and uses the user's home Wi-Fi network to browse content online. The friend may use a different computing device with a different device identifier. The different device identifier may be weakly associated with the user's computing devices, because it is seen on the same network as the other computing devices. The friend may have the same interest, characteristics, or behaviors as the user (e.g., both the friend and the user may be interested in football, or both enjoy the same type of music, etc.). The analytics module 465 may target the friend's computing device with the same ads targeted to the user's computing devices, based on the lookalike modeling.
In one embodiment, the analytics module 465 may perform a brand study using the device graph. For example, using the device graph and an impression record, the analytics module may determine the number of times advertisements from a particular company or for a particular product (e.g., for a particular brand) were displayed to different users, independent of the device. The analytics module 465 may determine whether certain companies or products (e.g., certain brands) are of interest to different users, based on the number of advertisements for the company or products that were viewed by the user.
In one embodiment, the analytics module 465 may perform a cross-device analysis using the device graph. For example, the analytics module may 465 may analyze a user's actions (e.g., which advertisements a user has viewed and whether any conversions resulted from those advertisements) across different devices using the device graph and an impression history. The device graph and the impression history may allow the analytics module to determine which advertisements were displayed to a user on what device. The analytics module 465 may generate a cross-device report that indicates the different advertisements that were displayed on the devices the advertisements were displayed on.
Referring to
At block 525, the identifier module may receive additional network data associated with one or more or the identifiers and may adjust the weights for one or more connections, based on the additional network data. For example, the identifier module may increase the weight of a connection between two identifiers because the additional network data indicates that the device associated with the two identifiers used the same network. After adjusting the weights for the one or more connections, the identifier may provide content to a device (e.g., a computing device, an application, etc.) based on one or more of the connections and/or one or more of the weights (e.g., block 530). After block 530, the method 500 ends.
Referring to
If no identifiers have greater than the threshold number of total connections, the method 600 proceeds to block 630 where the identifier module determines whether any identifiers have used (e.g., have been observed or seen on) the same network within a threshold time. For example, the identifier module may determine whether two identifiers have been seen on the same network within the last seven days. If there are identifiers that have been seen on the same network within the threshold time, the method 600 proceeds to block 635 where the identifier module increases the weight of the connections between the identifiers that have been seen on the same network. If no identifiers have been seen on the same network within the threshold time, the method 600 proceeds to block 640 where the identifier module determines whether there are any identifies that have not been seen on the same network within a threshold time. For example, the identifier module may determine whether there are any identifiers that have not been seen on the same network in the last thirty days. If there are identifiers that have not been seen on the same network within a threshold time, the method 600 proceeds to block 645 where the identifier module decrease the weights of the connections between the identifiers. After block 645, the method 600 ends.
The method 700 starts at block 705 where the advertising module receives a device graph. For example, the advertising module may receive the device graph from an identifier module (as illustrated in
If the method 700 proceeds to block 740 the advertising module may perform ad frequency capping based on the device graph and the impression history (as discussed above in conjunction with
The exemplary computer system 800 includes a processing device (e.g., a processor) 802, a main memory 804 (e.g., flash memory, Random Access Memory (RAM), a static memory 806 (e.g., flash memory, Static Random Access Memory (SRAM)) and a data storage device 818, which communicate with each other via a bus 830.
Processing device 802 represents one or more general-purpose processing devices such as a microprocessor, central processing unit, or the like. More particularly, the processing device 802 may be a Complex Instruction Set Computing (CISC) microprocessor, Reduced Instruction Set Computing (RISC) microprocessor, Very Long Instruction Word (VLIW) microprocessor, or a processor implementing other instruction sets or processors implementing a combination of instruction sets. The processing device 802 may also be one or more special-purpose processing devices such as an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), network processor, or the like. The processing device 802 is configured to execute the identifier module 826 for performing the operations and steps discussed herein.
The computer system 800 may further include a network interface device 808 which may communicate with a network 820. The computer system 800 also may include a video display unit 810 (e.g., a Liquid Crystal Display (LCD) or a Cathode Ray Tube (CRT)), an alphanumeric input device 812 (e.g., a keyboard), a cursor control device 814 (e.g., a mouse) and a signal generation device 816 (e.g., a speaker).
The data storage device 818 may include a computer-readable medium 828 on which is stored one or more sets of instructions (e.g., instructions of identifier module 826) embodying any one or more of the methodologies or functions described herein. The identifier module 826 may also reside, completely or at least partially, within the main memory 804 and/or within the processing device 802 during execution thereof by the computer system 800, the main memory 804 and the processing device 802 also constituting computer-readable media. The instructions may further be transmitted or received over a network 820 via the network interface device 808.
While the computer-readable storage medium 828 is shown in an exemplary embodiment to be a single medium, the term “computer-readable storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database and/or associated caches and servers) that store the one or more sets of instructions. The term “computer-readable storage medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present invention. The term “computer-readable storage medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical media and magnetic media.
In the embodiments described above that obtain may device identifiers for different devices, or may make use of device identifiers, the users may be provided with an opportunity to control whether programs or features collect user information (e.g., device identifiers used by a user's devices), or to control whether and/or how to receive content or advertisements from a server that may be more relevant to the user. In addition, certain data may be modified or obfuscated in one or more ways before it is stored or used, so that any personally identifiable information is removed (e.g., a hash function may be applied to an IMEI number or a MAC address). Thus, the user may have control over how information is collected about the user and used by different servers.
In the above description, numerous details are set forth. It will be apparent, however, to one of ordinary skill in the art having the benefit of this disclosure, that embodiments of the invention may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring the description.
Some portions of the detailed description are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the above discussion, it is appreciated that throughout the description, discussions utilizing terms such as “receiving,” “identifying,” “assigning,” “adjusting,” “providing,” “determining,” “merging,” “increasing,” “decreasing,” “targeting,” “generating,” “attributing,” “performing,” “obtaining,” “limiting,” or the like, refer to the actions and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (e.g., electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
Embodiments of the invention also relate to an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a non-transitory computer readable storage medium, such as, but not limited to, any type of disk including floppy disks, optical disks, CD-ROMs and magnetic-optical disks, Read-Only Memories (ROMs), Random Access Memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, flash memory, or any type of media suitable for storing electronic instructions.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct a more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
The above description sets forth numerous specific details such as examples of specific systems, components, methods and so forth, in order to provide a good understanding of several embodiments of the present invention. It will be apparent to one skilled in the art, however, that at least some embodiments of the present invention may be practiced without these specific details. In other instances, well-known components or methods are not described in detail or are presented in simple block diagram format in order to avoid unnecessarily obscuring the present invention. Thus, the specific details set forth above are merely exemplary. Particular implementations may vary from these exemplary details and still be contemplated to be within the scope of the present invention.
The words “example” or “exemplary” are used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “example’ or “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs. Rather, use of the words “example” or “exemplary” is intended to present concepts in a concrete fashion. As used in this application, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or”. That is, unless specified otherwise, or clear from context, “X includes A or B” is intended to mean any of the natural inclusive permutations. That is, if X includes A; X includes B; or X includes both A and B, then “X includes A or B” is satisfied under any of the foregoing instances. In addition, the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from context to be directed to a singular form. Moreover, use of the term “an embodiment” or “one embodiment” or “an implementation” or “one implementation” throughout is not intended to mean the same embodiment or implementation unless described as such.
It is to be understood that the above description is intended to be illustrative and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reading and understanding the above description. The scope of the invention should, therefore, be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
Claims
1. A computer implemented method comprising:
- receiving, by at least one processor, a plurality of identifiers including a first identifier and a second identifier from a data source, wherein the first identifier is associated with a first device or a first application executing on the first device and wherein the second identifier is associated with a second device or a second application executing on the second device;
- identifying, by the at least one processor, at least one association between the plurality of identifiers, including identifying an association between at least the first identifier and the second identifier based on a first set of network data, wherein the association is indicative of commonality between the first device or first application and the second device or second application;
- assigning, by the at least one processor, an association value to the association between the first identifier and the second identifier;
- adjusting, by the at least one processor, a determination of the value of the association between the first identifier and the second identifier based a second set of network data for the first identifier and the second identifier, wherein adjusting the value of the association includes increasing or decreasing the association value responsive to analyzing network activity associated with a common IP address for the first identifier and the second identifier; and
- providing, by the at least one processor, content to one or more of the first device and the second device, based on the at least one association.
2. The method of claim 1, further comprising an act of generating at least one grouping of device identifiers responsive to analyzing network activity associated with a common IP address and time.
3. The method of claim 1, wherein identifying the association between the first identifier and the second identifier comprises analyzing whether the first device or first application and the second device or second application appear on a common network.
4. The method of claim 3, wherein identifying the association between the first identifier and the second identifier comprises analyzing whether the first device or first application and the second device or second application appear on the common network within a time window.
5. The method of claim 1, wherein identifying the association between the first identifier and the second identifier comprises analyzing whether the first device and the second device have logged into one or more services using a same login information.
6. The method of claim 1, wherein the adjusting of the determination of the value of the association between the first identifier and the second identifier is based on analyzing a second set of network data for the first identifier and the second identifier,
7. The method of claim 1, further comprising:
- receiving additional identifiers from the data source, wherein the additional identifiers are associated with additional devices or additional applications executing on the additional devices;
- identifying additional associations between the additional identifiers, the first identifier, and the second identifier;
- assigning an association value for the additional devices.
8. The method of claim 7, further comprising:
- adjusting the additional association values of the additional associations based on a third set of network data for the first device or first application, the second device or second application, and the additional devices or the additional applications; and
- providing content to a combination of two or more of the first device, the second device, or the additional devices based on one or more of the association, the additional associations, the association value, or the additional association values.
9. The method of claim 1, wherein a set of associations to the first identifier are removed when the set of associations exceeds a threshold size or when a number of associations in the set of associations increases by a threshold amount within a threshold amount of time.
10. The method of claim 1, further comprising:
- generating an audience record including a plurality of device identifiers; and
- targeting additional content to the plurality of devices using the audience record.
11. The method of claim 1, further comprising attributing a network activity originating from the second device, to the first device, based on one or more of the association, the association value, or an impression history.
12. A system comprising:
- at least one processor operatively connected to a memory configured to store a plurality of identifiers; and
- a processing device, executed by the at least one processor and coupled to the memory, the processing device, configured to: receive a plurality of identifiers including a first identifier and a second identifier from a data source, wherein the first identifier is associated with a first device or a first application executing on the first device and wherein the second identifier is associated with a second device or a second application executing on the second device; identify at least one association between the plurality of identifiers, including identifying an association between at least the first identifier and the second identifier based on a first set of network data, wherein the association is indicative of commonality between the first device or first application and the second device or second application; assign an association value to the association between the first identifier and the second identifier; adjust a determination of the value of the association between the first identifier and the second identifier based a second set of network data for the first identifier and the second identifier, wherein adjusting the value of the association includes increasing or decreasing the value of the association responsive to analyzing network activity associated with a common IP address for the first identifier and the second identifier; and providing content to one or more of the first device and the second device, based on the at least one association.
12. The system of claim 12, wherein the processing device is further configured to: generate at least one grouping of device identifiers responsive to analyzing network activity associated with a common IP address and time.
13. The system of claim 12, wherein the processing device is further configured to: analyze whether the first device or first application and the second device or second application appear on a common network.
14. The system of claim 12, wherein the processing device is further configured to: analyze whether the first device and the second device have logged into one or more services using a same login information.
15. The system of claim 11, wherein the processing device is further configured to:
- receive additional identifiers from the data source, wherein the additional identifiers are associated with additional devices or additional applications executing on the additional devices;
- identify additional associations between the additional identifiers, the first identifier, and the second identifier;
- assign an association value for the additional devices.
16. The system of claim 11, wherein the processing device is further configured to:
- adjust the additional association values of the additional associations based a third set of network data for the first device or first application, the second device or second application, and the additional devices or the additional applications; and
- provide content to a combination of two or more of the first device, the second device, or the additional devices based on one or more of the association, the additional associations, the value, or the additional values.
17. The system of claim 11, wherein the processing device is further configured to: remove a set of associations to the first identifier when the set of associations exceeds a threshold size or when a number of associations in the set of associations increases by a threshold amount within a threshold amount of time.
18. The system of claim 11, wherein the processing device is further configured to:
- generate an audience record including a plurality of device identifiers; and
- target additional content to the plurality of devices using the audience record.
19. A non-transitory computer-readable storage medium storing instructions which, when executed, cause a processing device to perform operations comprising:
- receiving a plurality of identifiers including a first identifier and a second identifier from a data source, wherein the first identifier is associated with a first device or a first application executing on the first device and wherein the second identifier is associated with a second device or a second application executing on the second device;
- identifying at least one association between the plurality of identifiers, including identifying an association between at least the first identifier and the second identifier based on a first set of network data, wherein the association is indicative of commonality between the first device or first application and the second device or second application;
- assigning an association value to the association between the first identifier and the second identifier;
- adjusting the value of the association between the first identifier and the second identifier based a second set of network data for the first identifier and the second identifier, wherein adjusting the value of the association includes increasing or decreasing the value of the association responsive to analyzing network activity associated with a common IP address for the first identifier and the second identifier; and
- providing content to one or more of the first device and the second device, based on the at least one association.
Type: Application
Filed: Mar 30, 2020
Publication Date: Sep 17, 2020
Applicant: TAPAD, INC. (New York, NY)
Inventors: Are Helge Traasdahl (New York, NY), Dag Oeyvind Liodden (New York, NY), Vivian Wei-Hua Chang (New York, NY)
Application Number: 16/834,454