Skip to content

Commit f1209ed

Browse files
committed
edits from AT
1 parent c9d902a commit f1209ed

File tree

6 files changed

+20
-38
lines changed

6 files changed

+20
-38
lines changed
-94.4 KB
Loading
Binary file not shown.

docs/ref-info/ref-how-uid-is-created.md

Lines changed: 10 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -9,74 +9,67 @@ import Link from '@docusaurus/Link';
99

1010
# How the UID2 Token Is Created
1111

12-
When a publisher sends <Link href="../ref-info/glossary-uid#gl-dii">DII</Link> (email or phone number) to UID2, and in return receives a <Link href="../ref-info/glossary-uid#gl-uid2-token">UID2 token</Link> to use for targeted advertising, there is a very specific sequence of processing steps that occurs along the way.
12+
When a publisher sends a user's <Link href="../ref-info/glossary-uid#gl-dii">DII</Link>&#8212;<Link href="../ref-info/glossary-uid#gl-hash">hashed</Link> or unhashed email addresses or phone numbers&#8212;to the UID2 Operator, and in return receives a <Link href="../ref-info/glossary-uid#gl-uid2-token">UID2 token</Link> to use for targeted advertising, there is a very specific sequence of processing steps that occurs along the way.
1313

1414
Some preliminary steps are taken by the publisher, but most of the processing steps are done by the UID2 <Link href="../ref-info/glossary-uid#gl-operator">Operator</Link>.
1515

1616
It's very important that the publisher steps are performed in the correct sequence:
17-
- When steps are performed in sequence, the resulting value **matches** other instances of tokens generated from online activity by the same individual, and therefore the token is **valuable** for targeted advertising.
18-
- If steps are taken out of sequence, the resulting value **does not match** other instances of tokens generated from online activity by the same individual, and therefore the token is **not valid** for targeted advertising.
17+
- When steps are performed in sequence, the resulting value can be recognized as related to other instances of tokens generated from online activity by the same individual: the underlying [raw UID2](../ref-info/glossary-uid.md#gl-raw-uid2) matches other tokens generated from the same raw UID2, and therefore the token is suitable for targeted advertising.
18+
- If steps are taken out of sequence, the resulting value cannot be related to other instances of tokens generated from online activity by the same individual, and therefore the token is not suitable for targeted advertising.
1919

2020
For a summary, see [Steps to Create a UID2 Token](#steps-to-create-a-uid2-token). For an example in diagram form, see [Creating a UID2 Token&#8212;Example](#creating-a-uid2-tokenexample).
2121

2222
## Steps to Create a UID2 Token
2323

2424
The following table shows the steps for creating a UID2 token from DII, the sequence, and who performs each step.
2525

26-
For an example showing each step performed on a sample value, see [Creating a UID2 Token&#8212;Example](#creating-a-uid2-tokenexample).
26+
For an example with sample values, see [Creating a UID2 Token&#8212;Example](#creating-a-uid2-tokenexample).
2727

2828
<table width="100%">
2929
<thead>
3030
<tr>
3131
<th width="5%">Step</th>
32-
<th width="30%">Action</th>
33-
<th width="25%">Who Does It?</th>
34-
<th width="25%">Documentation</th>
35-
<th width="15%">[Example](#creating-a-uid2-tokenexample)</th>
32+
<th width="35%">Action</th>
33+
<th width="30%">Who Does It?</th>
34+
<th width="35%">Documentation</th>
3635
</tr>
3736
</thead>
3837
<tbody>
3938
<tr>
4039
<td>1</td>
41-
<td>Normalization</td>
40+
<td><Link href="../ref-info/glossary-uid#gl-normalize">Normalization</Link></td>
4241
<td>**Email**: Publisher or UID2 Operator<br/>**Phone number**: Publisher must normalize</td>
4342
<td>[Email Address Normalization](../getting-started/gs-normalization-encoding.md#email-address-normalization)<br/>[Phone Number Normalization](../getting-started/gs-normalization-encoding.md#phone-number-normalization)</td>
44-
<td>Not shown. For examples, see [Normalization Examples for Email](../getting-started/gs-normalization-encoding.md#normalization-examples-for-email).</td>
4543
</tr>
4644
<tr>
4745
<td>2</td>
48-
<td>SHA-256 hashing of normalized email address</td>
46+
<td><Link href="../ref-info/glossary-uid#gl-sha-256">SHA-256</Link> hashing of normalized email address</td>
4947
<td>Publisher or UID2 Operator</td>
5048
<td>[Email Address Hash Encoding](../getting-started/gs-normalization-encoding.md#email-address-hash-encoding)<br/>[Phone Number Hash Encoding](../getting-started/gs-normalization-encoding.md#phone-number-hash-encoding)</td>
51-
<td>Column 1</td>
5249
</tr>
5350
<tr>
5451
<td>3</td>
55-
<td>Hex to Base64 encoding of SHA-256 hash</td>
52+
<td>Base64 encoding of SHA-256 hash</td>
5653
<td>Publisher or UID2 Operator</td>
5754
<td>[Email Address Hash Encoding](../getting-started/gs-normalization-encoding.md#email-address-hash-encoding)<br/>[Phone Number Hash Encoding](../getting-started/gs-normalization-encoding.md#phone-number-hash-encoding)</td>
58-
<td>Column 1</td>
5955
</tr>
6056
<tr>
6157
<td>4</td>
6258
<td>Send value to UID2 Operator via the [POST&nbsp;/token/generate](../endpoints/post-token-generate.md) endpoint, an SDK, Prebid.js, or another supported integration.</td>
6359
<td>Publisher</td>
6460
<td>Various: for a summary, see [Implementation Resources](../overviews/overview-publishers.md#implementation-resources)</td>
65-
<td>Not shown</td>
6661
</tr>
6762
<tr>
6863
<td>5</td>
6964
<td>Perform multiple steps including hashing and adding the secret <Link href="../ref-info/glossary-uid#gl-salt">salt</Link> value to create a raw UID2.</td>
7065
<td>UID2 Operator</td>
7166
<td>Not applicable: these steps are all performed by the UID2 Operator.</td>
72-
<td>Column 2</td>
7367
</tr>
7468
<tr>
7569
<td>6</td>
7670
<td>Encrypt the raw UID2 to create a UID2 token.</td>
7771
<td>UID2 Operator</td>
7872
<td>Not applicable: performed by the UID2 Operator.</td>
79-
<td>Column 3</td>
8073
</tr>
8174
</tbody>
8275
</table>
@@ -88,5 +81,3 @@ The following diagram shows the high-level steps for creating a [raw UID2](../re
8881
The publisher can send a request to the [POST&nbsp;/token/generate](../endpoints/post-token-generate.md) endpoint or use one of the other integration options, such as an SDK or Prebid. Whatever the integration option, the result is a UID2 token&#8212;an encrypted value that the publisher can send in the bidstream for targeted advertising.
8982

9083
![Sequential steps for creating a UID2](images/HowUID2Created_UID2ImplementationPlaybook.jpg)
91-
92-
The token cannot be reverse engineered to tie back to the advertiser side. The UID2 process operates by passing an email or its hashed equivalent to the UID2 Operator, and the Operator then processes and encrypts the value to create a UID2 token. Demand-Side Platforms (DSPs) decrypt this token to arrive at the underlying raw UID2, and can then align it with UID2 segments predefined by advertisers who have transformed their data into UID2 format. Each participant only has access to their own specific information.
-94.4 KB
Loading

i18n/ja/docusaurus-plugin-content-docs/current/ref-info/ref-how-uid-is-created.md

Lines changed: 10 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -9,74 +9,67 @@ import Link from '@docusaurus/Link';
99

1010
# How the UID2 Token Is Created
1111

12-
When a publisher sends <Link href="../ref-info/glossary-uid#gl-dii">DII</Link> (email or phone number) to UID2, and in return receives a <Link href="../ref-info/glossary-uid#gl-uid2-token">UID2 token</Link> to use for targeted advertising, there is a very specific sequence of processing steps that occurs along the way.
12+
When a publisher sends a user's <Link href="../ref-info/glossary-uid#gl-dii">DII</Link>&#8212;<Link href="../ref-info/glossary-uid#gl-hash">hashed</Link> or unhashed email addresses or phone numbers&#8212;to the UID2 Operator, and in return receives a <Link href="../ref-info/glossary-uid#gl-uid2-token">UID2 token</Link> to use for targeted advertising, there is a very specific sequence of processing steps that occurs along the way.
1313

1414
Some preliminary steps are taken by the publisher, but most of the processing steps are done by the UID2 <Link href="../ref-info/glossary-uid#gl-operator">Operator</Link>.
1515

1616
It's very important that the publisher steps are performed in the correct sequence:
17-
- When steps are performed in sequence, the resulting value **matches** other instances of tokens generated from online activity by the same individual, and therefore the token is **valuable** for targeted advertising.
18-
- If steps are taken out of sequence, the resulting value **does not match** other instances of tokens generated from online activity by the same individual, and therefore the token is **not valid** for targeted advertising.
17+
- When steps are performed in sequence, the resulting value can be recognized as related to other instances of tokens generated from online activity by the same individual: the underlying [raw UID2](../ref-info/glossary-uid.md#gl-raw-uid2) matches other tokens generated from the same raw UID2, and therefore the token is suitable for targeted advertising.
18+
- If steps are taken out of sequence, the resulting value cannot be related to other instances of tokens generated from online activity by the same individual, and therefore the token is not suitable for targeted advertising.
1919

2020
For a summary, see [Steps to Create a UID2 Token](#steps-to-create-a-uid2-token). For an example in diagram form, see [Creating a UID2 Token&#8212;Example](#creating-a-uid2-tokenexample).
2121

2222
## Steps to Create a UID2 Token
2323

2424
The following table shows the steps for creating a UID2 token from DII, the sequence, and who performs each step.
2525

26-
For an example showing each step performed on a sample value, see [Creating a UID2 Token&#8212;Example](#creating-a-uid2-tokenexample).
26+
For an example with sample values, see [Creating a UID2 Token&#8212;Example](#creating-a-uid2-tokenexample).
2727

2828
<table width="100%">
2929
<thead>
3030
<tr>
3131
<th width="5%">Step</th>
32-
<th width="30%">Action</th>
33-
<th width="25%">Who Does It?</th>
34-
<th width="25%">Documentation</th>
35-
<th width="15%">[Example](#creating-a-uid2-tokenexample)</th>
32+
<th width="35%">Action</th>
33+
<th width="30%">Who Does It?</th>
34+
<th width="35%">Documentation</th>
3635
</tr>
3736
</thead>
3837
<tbody>
3938
<tr>
4039
<td>1</td>
41-
<td>Normalization</td>
40+
<td><Link href="../ref-info/glossary-uid#gl-normalize">Normalization</Link></td>
4241
<td>**Email**: Publisher or UID2 Operator<br/>**Phone number**: Publisher must normalize</td>
4342
<td>[Email Address Normalization](../getting-started/gs-normalization-encoding.md#email-address-normalization)<br/>[Phone Number Normalization](../getting-started/gs-normalization-encoding.md#phone-number-normalization)</td>
44-
<td>Not shown. For examples, see [Normalization Examples for Email](../getting-started/gs-normalization-encoding.md#normalization-examples-for-email).</td>
4543
</tr>
4644
<tr>
4745
<td>2</td>
48-
<td>SHA-256 hashing of normalized email address</td>
46+
<td><Link href="../ref-info/glossary-uid#gl-sha-256">SHA-256</Link> hashing of normalized email address</td>
4947
<td>Publisher or UID2 Operator</td>
5048
<td>[Email Address Hash Encoding](../getting-started/gs-normalization-encoding.md#email-address-hash-encoding)<br/>[Phone Number Hash Encoding](../getting-started/gs-normalization-encoding.md#phone-number-hash-encoding)</td>
51-
<td>Column 1</td>
5249
</tr>
5350
<tr>
5451
<td>3</td>
55-
<td>Hex to Base64 encoding of SHA-256 hash</td>
52+
<td>Base64 encoding of SHA-256 hash</td>
5653
<td>Publisher or UID2 Operator</td>
5754
<td>[Email Address Hash Encoding](../getting-started/gs-normalization-encoding.md#email-address-hash-encoding)<br/>[Phone Number Hash Encoding](../getting-started/gs-normalization-encoding.md#phone-number-hash-encoding)</td>
58-
<td>Column 1</td>
5955
</tr>
6056
<tr>
6157
<td>4</td>
6258
<td>Send value to UID2 Operator via the [POST&nbsp;/token/generate](../endpoints/post-token-generate.md) endpoint, an SDK, Prebid.js, or another supported integration.</td>
6359
<td>Publisher</td>
6460
<td>Various: for a summary, see [Implementation Resources](../overviews/overview-publishers.md#implementation-resources)</td>
65-
<td>Not shown</td>
6661
</tr>
6762
<tr>
6863
<td>5</td>
6964
<td>Perform multiple steps including hashing and adding the secret <Link href="../ref-info/glossary-uid#gl-salt">salt</Link> value to create a raw UID2.</td>
7065
<td>UID2 Operator</td>
7166
<td>Not applicable: these steps are all performed by the UID2 Operator.</td>
72-
<td>Column 2</td>
7367
</tr>
7468
<tr>
7569
<td>6</td>
7670
<td>Encrypt the raw UID2 to create a UID2 token.</td>
7771
<td>UID2 Operator</td>
7872
<td>Not applicable: performed by the UID2 Operator.</td>
79-
<td>Column 3</td>
8073
</tr>
8174
</tbody>
8275
</table>
@@ -88,5 +81,3 @@ The following diagram shows the high-level steps for creating a [raw UID2](../re
8881
The publisher can send a request to the [POST&nbsp;/token/generate](../endpoints/post-token-generate.md) endpoint or use one of the other integration options, such as an SDK or Prebid. Whatever the integration option, the result is a UID2 token&#8212;an encrypted value that the publisher can send in the bidstream for targeted advertising.
8982

9083
![Sequential steps for creating a UID2](images/HowUID2Created_UID2ImplementationPlaybook.jpg)
91-
92-
The token cannot be reverse engineered to tie back to the advertiser side. The UID2 process operates by passing an email or its hashed equivalent to the UID2 Operator, and the Operator then processes and encrypts the value to create a UID2 token. Demand-Side Platforms (DSPs) decrypt this token to arrive at the underlying raw UID2, and can then align it with UID2 segments predefined by advertisers who have transformed their data into UID2 format. Each participant only has access to their own specific information.

0 commit comments

Comments
 (0)