Conversion tracking of a user across multiple devices
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06Q-020/38
G06Q-030/02
G06F-007/00
출원번호
US-0563580
(2012-07-31)
등록번호
US-9881301
(2018-01-30)
발명자
/ 주소
Rajkumar, Nareshkumar
Ramachandran, Vinod Kumar
출원인 / 주소
Google LLC
대리인 / 주소
Fish & Richardson P.C.
인용정보
피인용 횟수 :
1인용 특허 :
32
초록▼
Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium, and including a method for conversion tracking. The method comprises anonymously linking plural identifiers, each identifier associated with a user and specific requesting source. Anonymously
Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium, and including a method for conversion tracking. The method comprises anonymously linking plural identifiers, each identifier associated with a user and specific requesting source. Anonymously linking includes linking different identifiers associated with different requesting sources used by the user to access content. Anonymously linking includes linking the different identifiers using an identifier that does not include any personally identifiable information, and storing impression, click and interaction data for the user in association with respective identifiers. The method further comprises determining that an impression of content to the user has occurred on one of the two different requesting sources and that an interaction, associated with the impression, has been recorded on another of the two different requesting sources, and linking the impression and/or click with the interaction, including charging a sponsor associated with the impression and/or click.
대표청구항▼
1. A computer-implemented method comprising: receiving, by one or more processors, a first login request from a first user device, the first login request including a login identifier (ID);retrieving, by the one or more processors, an entry from a user login information table based on the login ID,
1. A computer-implemented method comprising: receiving, by one or more processors, a first login request from a first user device, the first login request including a login identifier (ID);retrieving, by the one or more processors, an entry from a user login information table based on the login ID, and obtaining a seed from the retrieved entry;transmitting, by the one or more processors, the retrieved seed to the first user device;receiving, by the one or more processors, a first public key from the first user device based on the transmitted seed;storing, by the one or more processors in the user login information table, the first public key and the login ID;receiving, by the one or more processors, a second login request from a second user device that is different from the first user device, the second login request including the login ID;retrieving, by the one or more processors, the entry from the user login information table based on the login ID, and obtaining the seed from the retrieved entry;transmitting, by the one or more processors, the retrieved seed to the second user device;receiving, by the one or more processors, a second public key from the second user device based on the transmitted seed, the second public key being different from the first public key;updating, by the one or more processors, the entry in the user login information table, by storing the second public key in the entry in association with the stored login ID and first public key;sending, by the one or more processors, the first public key to the second user device;receiving, by the one or more processors and from the second user device, a secret key and a second anonymous device identifier in response to sending the first public key;storing, by the one or more processors in an anonymous identifier table, the secret key and the second anonymous device identifier;receiving, by the one or more processors, a third login request from the first user device, the third login request including the login ID;retrieving, by the one or more processors, the entry from the user login information table based on the login ID;retrieving, by the one or more processors, the second public key from the retrieved entry;sending, by the one or more processors, the second public key to the first user device;receiving, by the one or more processors and from the first user device, the secret key and a first anonymous device identifier;storing, by the one or more processors in the anonymous identifier table, the first anonymous device identifier in association with the secret key and the second anonymous device identifier;receiving, by the one or more processors from the first user device, impression data associated with a content item and including the first anonymous device identifier and a first time;storing, by the one or more processors, the impression data in association with the first anonymous device identifier;receiving, by the one or more processors from the second user device, interaction data associated with the content item and including the second anonymous device identifier and a second time;storing, by the one or more processors, the interaction data in association with the second anonymous device identifier;determining, by the one or more processors, that the impression data corresponds to the interaction data by determining that the stored secret key of the first anonymous identifier received with the impression data matches the stored secret key of the second anonymous identifier received with the interaction data in the anonymous identifier table;calculating, by the one or more processors, a time difference between the first time of the stored impression data and the second time of the stored interaction data;determining, by the one or more processors, that the time difference between the first time of the stored impression data and the second time of the interaction data is within a threshold conversion time among one or more impressions and one or more interactions;identifying, by the one or more processors, a conversion based on determination that the impression data corresponds to the interaction data and based on determination that the time difference between the first time of the stored impression data and the second time of the interaction data is within the threshold conversion time among one or more impressions and one or more interactions; andcharging, by the one or more processors and based on the identified conversion, a sponsor associated with the content item. 2. The method of claim 1 wherein one of the first user device and the second user device is a non-mobile computing device and the other one of the first user device and the second user device is a mobile device. 3. The method of claim 1 wherein the identified conversion is an action associated with the content item, the action comprising one or more of a purchase, filling out a form, enrolling in a service, traversing to a threshold depth in a website, spending a threshold amount of time on the website, walking into a store, paying using a mobile wallet within the store, using a barcode scanner to scan a product, making a phone call, searching for the product in a browser, and following the product on a social network. 4. The method of claim 1 further comprising: crediting a publisher associated with an impression identified by the impression data. 5. The method of claim 1 wherein the content item is an advertisement and an interaction identified in the interaction data is a survey. 6. The method of claim 1 wherein the first user device and the second user device comprise one or more of: a mobile device including a smart phone, a laptop computer, a tablet, a desktop device, a set-top box, a television, a browser, an application on a mobile device, and a stand-alone application. 7. The method of claim 1 wherein storing the first anonymous device identifier in association with the secret key and the second anonymous device identifier includes anonymous device linking using a Diffie-Hellman key exchange protocol. 8. The method of claim 1 wherein storing the first anonymous device identifier in association with the secret key and the second anonymous device identifier includes linking the first anonymous device identifier and the second anonymous device identifier by applying a one-way encoding function that prevents backward identification of the user to a key received from the first user device or the second user device to generate a hashed key, wherein each of the first user device and the second user device is configured to generate the key, and wherein the one-way encoding function is a one-way hash function using a secret key, the secret key being generated from a seed that is unique to the user. 9. A non-transitory computer readable medium storing instructions that when executed by one or more processors cause the one or more processors to perform the steps of: receiving, by the one or more processors, a first login request from a first user device, the first login request including a login identifier (ID);retrieving, by the one or more processors, an entry from a user login information table based on the login ID, and obtaining a seed from the retrieved entry;transmitting, by the one or more processors, the retrieved seed to the first user device;receiving, by the one or more processors, a first public key from the first user device based on the transmitted seed;storing, by the one or more processors in the user login information table, the first public key and the login ID;receiving, by the one or more processors, a second login request from a second user device that is different from the first user device, the second login request including the login ID;retrieving, by the one or more processors, the entry from the user login information table based on the login ID, and obtaining the seed from the retrieved entry;transmitting, by the one or more processors, the retrieved seed to the second user device;receiving, by the one or more processors, a second public key from the second user device based on the transmitted seed, the second public key being different from the first public key;updating, by the one or more processors, the entry in the user login information table, by storing the second public key in the entry in association with the stored login ID and first public key;sending, by the one or more processors, the first public key to the second user device;receiving, by the one or more processors and from the second user device, a secret key and a second anonymous device identifier in response to sending the first public key;storing, by the one or more processors in an anonymous identifier table, the secret key and the second anonymous device identifier;receiving, by the one or more processors, a third login request from the first user device, the third login request including the login ID;retrieving, by the one or more processors, the entry from the user login information table based on the login ID;retrieving, by the one or more processors, the second public key from the retrieved entry;sending, by the one or more processors, the second public key to the first user device;receiving, by the one or more processors and from the first user device, the secret key and a first anonymous device identifier;storing, by the one or more processors in the anonymous identifier table, the first anonymous device identifier in association with the secret key and the second anonymous device identifier;receiving, by the one or more processors from the first user device, impression data associated with a content item and including the first anonymous device identifier and a first time;storing, by the one or more processors, the impression data in association with the first anonymous device identifier;receiving, by the one or more processors from the second user device, interaction data associated with the content item and including the second anonymous device identifier and a second time;storing, by the one or more processors, the interaction data in association with the second anonymous device identifier;determining, by the one or more processors, that the impression data corresponds to the interaction data by determining that the stored secret key of the first anonymous identifier received with the impression data matches the stored secret key of the second anonymous identifier received with the interaction data in the anonymous identifier table;calculating, by the one or more processors, a time difference between the first time of the stored impression data and the second time of the stored interaction data;determining, by the one or more processors, that the time difference between the first time of the stored impression data and the second time of the interaction data is within a threshold conversion time among one or more impressions and one or more interactions;identifying, by the one or more processors, a conversion based on determination that the impression data corresponds to the interaction data and based on determination that the time difference between the first time of the stored impression data and the second time of the interaction data is within the threshold conversion time among one or more impressions and one or more interactions; andcharging, by the one or more processors and based on the identified conversion, a sponsor associated with the content item. 10. The non-transitory computer readable medium of claim 9 wherein storing the first anonymous device identifier in association with the secret key and the second anonymous device identifier includes anonymous device linking using a Diffie-Hellman key exchange protocol. 11. The non-transitory computer readable medium of claim 9 wherein storing the first anonymous device identifier in association with the secret key and the second anonymous device identifier includes linking the first anonymous device identifier and the second anonymous device identifier by applying a one-way encoding function that prevents backward identification of the user to a key received from the first user device or the second user device to generate a hashed key, wherein each of the first user device and the second user device is configured to generate the key, and wherein the one-way encoding function is a one-way hash function using a secret key, the secret key being generated from a seed that is unique to the user. 12. A system comprising: one or more processors; andone or more non-transitory machine-readable media storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:receiving, by the one or more processors, a first login request from a first user device, the first login request including a login identifier (ID);retrieving, by the one or more processors, an entry from a user login information table based on the login ID, and obtaining a seed from the retrieved entry;transmitting, by the one or more processors, the retrieved seed to the first user device;receiving, by the one or more processors, a first public key from the first user device based on the transmitted seed;storing, by the one or more processors in the user login information table, the first public key and the login ID;receiving, by the one or more processors, a second login request from a second user device that is different from the first user device, the second login request including the login ID;retrieving, by the one or more processors, the entry from the user login information table based on the login ID, and obtaining the seed from the retrieved entry;transmitting, by the one or more processors, the retrieved seed to the second user device;receiving, by the one or more processors, a second public key from the second user device based on the transmitted seed, the second public key being different from the first public key;updating, by the one or more processors, the entry in the user login information table, by storing the second public key in the entry in association with the stored login ID and first public key;sending, by the one or more processors, the first public key to the second user device;receiving, by the one or more processors and from the second user device, a secret key and a second anonymous device identifier in response to sending the first public key;storing, by the one or more processors in an anonymous identifier table, the secret key and the second anonymous device identifier;receiving, by the one or more processors, a third login request from the first user device, the third login request including the login ID;retrieving, by the one or more processors, the entry from the user login information table based on the login ID;retrieving, by the one or more processors, the second public key from the retrieved entry;sending, by the one or more processors, the second public key to the first user device;receiving, by the one or more processors and from the first user device, the secret key and a first anonymous device identifier;storing, by the one or more processors in the anonymous identifier table, the first anonymous device identifier in association with the secret key and the second anonymous device identifier;receiving, by the one or more processors from the first user device, impression data associated with a content item and including the first anonymous device identifier and a first time;storing, by the one or more processors, the impression data in association with the first anonymous device identifier;receiving, by the one or more processors from the second user device, interaction data associated with the content item and including the second anonymous device identifier and a second time;storing, by the one or more processors, the interaction data in association with the second anonymous device identifier;determining, by the one or more processors, that the impression data corresponds to the interaction data by determining that the stored secret key of the first anonymous identifier received with the impression data matches the stored secret key of the second anonymous identifier received with the interaction data in the anonymous identifier table;calculating, by the one or more processors, a time difference between the first time of the stored impression data and the second time of the stored interaction data;determining, by the one or more processors, that the time difference between the first time of the stored impression data and the second time of the interaction data is within a threshold conversion time among one or more impressions and one or more interactions;identifying, by the one or more processors, a conversion based on determination that the impression data corresponds to the interaction data and based on determination that the time difference between the first time of the stored impression data and the second time of the interaction data is within the threshold conversion time among one or more impressions and one or more interactions; andcharging, by the one or more processors and based on the identified conversion, a sponsor associated with the content item. 13. The system of claim 12 wherein storing the first anonymous device identifier in association with the secret key and the second anonymous device identifier includes anonymous device linking using a Diffie-Hellman key exchange protocol. 14. The system of claim 12 wherein storing the first anonymous device identifier in association with the secret key and the second anonymous device identifier includes linking the first anonymous device identifier and the second anonymous device identifier by applying a one-way encoding function that prevents backward identification of the user to a key received from the first user device or the second user device to generate a hashed key, wherein each of the first user device and the second user device is configured to generate the key, and wherein the one-way encoding function is a one-way hash function using a secret key, the secret key being generated from a seed that is unique to the user.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (32)
Ann M. Rice, Automated bookmarking of online advertisements.
Skirmont, David Aaron; Buragohain, Saumitra; Wusirika, Balakrishna; Kollu, Badrinath; Kim, Kyuh, Diagnostic port for inter-switch link testing in electrical, optical and remote loopback modes.
Barnes, James D.; Sharma, Sanjay K.; Distler, Peter H.; Urbanek, Robert E., Dynamic advertising content distribution and placement systems and methods.
Altberg, Ebbe; Faber, Scott; Hirson, Ron; Van Der Linden, Sean; Lyon, Ben Harris; Manca, Paul G., Methods and apparatuses for pay for deal advertisements.
Kessel, Steven; Freed, Ian W.; Story, Jr., Guy A.; Wolfish, Howard; Agarwal, Amit D.; Nicholls, Nanyan; Lattyak, John; Slezak, James C.; Tomay, Beryl; Bezos, Jeffrey P., Synchronization of digital content.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Yoder, Jeanette; Amaro, Leigh; Hagey, Ryan; Vroom, Derek A.; Bankston, Michael Steven, Systems and methods to provide messages in real-time with transaction processing.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.