US 12,341,763 B2
Generating bridge match identifiers for linking identifers from server logs
Mahyar Salek, San Jose, CA (US); Philip McDonnell, Belmont, CA (US); Vinod Kumar Ramachandran, Sunnyvale, CA (US); Shobhit Saxena, Sunnyvale, CA (US); and David Owen Shanaha, Sunnyvale, CA (US)
Assigned to GOOGLE LLC, Mountain View, CA (US)
Filed by GOOGLE LLC, Mountain View, CA (US)
Filed on Jun. 14, 2022, as Appl. No. 17/840,588.
Application 17/840,588 is a continuation of application No. 16/843,553, filed on Apr. 8, 2020, granted, now 11,363,006.
Application 16/843,553 is a continuation of application No. 16/216,768, filed on Dec. 11, 2018, granted, now 10,652,221.
Application 16/216,768 is a continuation of application No. 15/650,099, filed on Jul. 14, 2017, granted, now 10,182,042.
Application 15/650,099 is a continuation of application No. 14/808,634, filed on Jul. 24, 2015, granted, now 9,716,697.
Prior Publication US 2022/0311754 A1, Sep. 29, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 21/62 (2013.01)
CPC H04L 63/06 (2013.01) [G06F 21/6254 (2013.01); H04L 63/068 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of matching identifiers between multiple datasets in a computer network environment, comprising:
transmitting, by a data processing system having one or more processors, a first identifier vector to a third party server, the first identifier vector comprising a first identifier, a plurality of first parameters, and a plurality of second parameters;
receiving, by the data processing system, from the third party server, the first identifier vector that was (i) encrypted based on a first-party encryption that is commutative and (ii) further encrypted by a third-party encryption associated with the third party server, the third-party encryption being commutative and different from the first-party encryption;
receiving, by the data processing system, from the third party server, a second identifier vector encrypted based on the third-party encryption associated with the third party server, the second identifier vector comprising a second identifier, a plurality of third parameters, and a plurality of fourth parameters;
encrypting, by the data processing system, the second identifier vector with the first-party encryption to generate an encrypted second identifier vector that is encrypted based on the third-party encryption and further encrypted based on the first-party encryption;
determining, by the data processing system, a correlation count between the encrypted first identifier vector and the encrypted second identifier vector based on a match between some of the plurality of first parameters and some of the plurality of third parameters of the encrypted first identifier vector, and between some of the plurality of second parameters and some of the plurality of fourth parameters of the encrypted second identifier vector;
determining, by the data processing system, that the first identifier corresponds to the second identifier based on the correlation count between the first identifier vector and the second identifier vector being above a determined threshold; and
generating, by the data processing system, responsive to determining that the first identifier corresponds to the second identifier, one identifier key for both the first identifier and the second identifier.