Data that Delivers

Centillion accelerates digital transformation with AI, data, and network solutions, delivering seamless connectivity, sharper decisions, and a powerful competitive edge.
Want answers?
Ask our support bot
Last 30 Days
63 Trillion
Signals added
The accelerators that help drive us

Your Key to unlocking
Unparalleled Business
Growth

Empowering Enterprises with Accurate, Compliant, and Advanced Data
Centillion is at the forefront of digital transformation, delivering innovative solutions that bridge the gap between technology and business needs. We empower enterprises to unlock new revenues, drive efficiency, and ensure compliance in an increasingly connected world through advanced AI, data, and network solutions.
99%
data accuracy
99.99%
USA coverage
95%
Real time updates
99.99%
data security
90%
data diversity
99.99%
data compliance
Your Key To Seeing The Full Picture
Don’t settle for accuracy, Centillion means precision.
Current Data
Centillion Data
Intellectual Property

Our Patents

2 issued, 28 provisional
Privacy-Compliant
Targeted Advertising
This patent outlines a system for delivering personalized ads by creating an anonymous, unique identifier from a user's mobile number. The platform analyzes user behavior across networks and applications to assign relevant attributes and deliver targeted ads. The process ensures compliance with privacy regulations like GDPR and CCPA while maintaining high advertising efficiency.

Privacy-Compliant Targeted Advertising

This patent discloses a method that uses a combination of user data, specifically a mobile phone number, to create a unique and anonymous identifier that adheres to privacy regulations. The method enables advertisers to personalize ads based on the user's behavior and interests without directly revealing the user's identity. By anonymizing the data, it ensures that personal information remains secure, even as advertisers utilize behavioral insights for targeted advertising..

Key Features of the Patent:

  • Extracting a Mobile Phone Number: The method begins by extracting the user's mobile phone number, which acts as a key identifier. This number is linked to the user's online activities and behaviors, but it is never exposed directly to advertisers. Instead, it serves as the basis for generating a unique and anonymous identifier. By using the mobile number as a starting point, the system ensures that the identifier is tied to a reliable and stable data point, given the ubiquity and consistency of mobile phone usage.
  • Generating an Anonymous Identifier: After extracting the mobile phone number, the method generates an anonymous and unique identifier for the user. This identifier complies with privacy rules, such as GDPR or CCPA, ensuring that the user's personal information (i.e., the mobile phone number) is not exposed. This anonymization process protects the user while still allowing advertisers to target them based on their unique attributes.
  • Behavioral Analysis and Attribute Assignment: Once the anonymous identifier is generated, the system analyzes the user’s behavior and interests. This behavioral analysis can include a wide range of data points, such as the user’s browsing history, app usage, purchase history, and other online interactions. Based on this analysis, the method assigns behavioral attributes to the identifier. For example, if a user frequently visits e-commerce websites for athletic gear, the system may assign attributes such as "fitness enthusiast" or "sports shopper" to the anonymous identifier. This behavioral profiling allows advertisers to target the user more effectively with ads that align with their interests.
  • Selecting an Advertiser Based on Categories: The method involves receiving input to select an advertiser based on the category of the advertisement. For instance, if the user’s behavioral attributes suggest an interest in fitness, the system might select an advertiser in the athletic or wellness sector. The input may come from either the system itself (through predefined algorithms) or from the advertiser (through an ad request).
  • Transmitting the Identifier to Advertisers: Once the advertiser is selected, the system transmits the anonymous identifier to the advertiser, along with the associated behavioral attributes. This allows the advertiser to generate a personalized advertisement for the user. Importantly, because the identifier is anonymized, the advertiser can tailor the ad based on behavior and interests without ever accessing the user’s actual identity or personal information.
  • Presenting the Advertisement to the User: After the advertiser generates the advertisement based on the identifier, the system receives the ad and presents it to the user. The ad is delivered through standard channels, such as web browsers, mobile apps, or social media platforms. Throughout the entire process, the user's identity remains anonymous, and only the behavioral insights derived from the user’s actions are used to inform the content of the advertisement.

Improvement Over Prior Art:

This patent improves upon prior methods of delivering targeted ads in several ways:
  • Privacy Compliance: By generating a unique identifier that complies with privacy rules, the system ensures that personal data, such as the mobile phone number, is not shared with advertisers. This focus on anonymization and privacy compliance is critical in today’s regulatory environment, where laws like GDPR and CCPA place strict limitations on the handling of personal data.
  • Behavior-Based Targeting: The system’s ability to analyze user behavior and interests and assign attributes to the anonymized identifier allows for more precise targeting compared to traditional methods that rely on less specific data (e.g., demographic targeting). This improves the relevance of ads shown to users, increasing engagement and the likelihood of conversion.
  • Advertiser Flexibility: Advertisers receive only the behavioral attributes associated with the anonymous identifier, allowing them to tailor ads specifically to user interests without accessing personal data. This provides a balance between effective advertising and user privacy, something many prior systems struggled to achieve.

Practical Application and Eligibility:

The method described is computer-implemented and focuses on creating a practical solution to the challenge of delivering personalized ads while complying with stringent privacy regulations. The method improves the efficiency and accuracy of ad targeting by leveraging behavioral data without sacrificing user privacy.

Unlike abstract advertising methods, this approach uses a specific technological process—anonymizing user data, generating behavioral profiles, and transmitting this data to advertisers in compliance with privacy rules. As a result, the patent represents a practical application of targeted advertising, enhancing both privacy protection and ad relevance.

Key Innovations:

  • Privacy-Compliant Targeting: The anonymous identifier ensures that advertisers can personalize ads while staying within the bounds of privacy laws.
  • Behavioral Attributes: The use of user behavior and interests to create personalized ad experiences ensures that the ads delivered are more relevant, improving the overall advertising experience.
  • Data Anonymization: The process of anonymizing the mobile number and other user data protects user identities and meets modern regulatory standards.
In summary, this patent provides an innovative and privacy-conscious solution for delivering personalized ads based on behavioral analysis. By generating an anonymous identifier linked to a user’s mobile number and online behavior, the system ensures compliance with privacy regulations while still allowing advertisers to target users effectively. This balance between privacy and personalization is a key advancement in the field of digital advertising.

Advanced User Identity Verification

The claim addresses an advanced process for verifying the identity of a user through interactions over a public network. This involves tracking and logging user activities from various sources, such as the network itself, applications, and devices associated with the user. This method represents a significant improvement over traditional identity verification processes by using a combination of data points to cross-reference and verify the user's identity.

Key Features of the Patent:

  • User Device Operation and Tracking: The method begins by operating a user device and tracking how the user interacts with a public network. This can include browsing activities, app usage, and interaction with network services. The system continually monitors these interactions to create a history of user behavior on the network.
  • Extracting Mobile Number and User History: The patent specifically mentions extracting the mobile number from the user’s interactions over the network. This extraction is not limited to network data alone; it also pulls data from the user’s application history and device history. This multi-source approach creates a more comprehensive view of the user’s activity across various platforms and devices, improving the accuracy of identity verification.
  • Cross-Referencing for Identity Authentication: Once the mobile number and related histories (network, application, and device) are gathered, the system initiates an authentication process. The cross-referencing of the user’s history across these different data streams enables the system to verify the user's identity with a higher degree of confidence. This method improves upon older techniques that rely on fewer data points and are more prone to inaccuracies or fraudulent activities.
  • Anonymization and Unique Identifier Generation: A notable aspect of the patent is its focus on generating an anonymous and unique identifier for the user, based on their mobile number. This ensures that the user's identity can be securely verified without exposing sensitive personal information. By anonymizing this data, the method upholds privacy while still providing the means to confirm identity across various networks and applications.
  • Recording to a Private Ledger: The patent includes a step where the mobile number, network user history, application user history, and device history are all written to a private ledger. A ledger in this context can be seen as a secure and immutable record, potentially akin to a blockchain or another secure distributed ledger technology. This ledger keeps a record of all activities and verifications, enhancing security and preventing tampering or fraud.
  • User Interface for Feature Selection: The user is given access to a user interface on their device, allowing them to select certain features. These feature selections are then recorded in the private ledger as well, ensuring that all user interactions and preferences are securely tracked.

Improvement Over Prior Art:

The patent improves upon prior identity verification systems in several ways:
  • Multi-Source Data: By pulling data from network history, application history, and device history, it builds a more robust profile of the user, reducing the likelihood of identity theft or misuse.
  • Efficient Data Structure: The claim emphasizes the use of an improved data structure, where fields are prioritized for more efficient processing. This allows the system to use fewer computing resources (processor, memory, and network communication), making it more scalable and less resource-intensive compared to traditional systems.
  • Cross-Referencing for Accuracy: The cross-referencing of multiple data sources ensures a higher accuracy in identity verification, reducing the risk of fraud or error.
  • Anonymization and Security: By generating an anonymous identifier based on the mobile number and writing all records to a private ledger, the method ensures that user privacy is maintained without sacrificing the integrity of the authentication process.

Practical Application and Eligibility:

The claim integrates a method of organizing human activity—specifically, identity verification—into a practical application. This method goes beyond the typical abstract idea of simply verifying identity by utilizing a concrete technological process that improves upon existing systems. The use of enhanced data structures and the focus on efficient computing resource usage makes this system more practical and scalable for real-world applications.

Therefore, the claims are eligible because they are not directed solely to an abstract idea but rather to a specific technological solution that improves the efficiency, accuracy, and security of identity verification systems. This makes the patent stand out as a practical improvement in the field of identity verification and data management.

Key Innovations:

  • Efficient Use of Computing Resources: Improved data structures lead to more efficient processing, reducing the burden on system resources.
  • Enhanced Security: The use of private ledgers for recording interactions and preferences adds an additional layer of security.
  • Scalability: The system’s ability to handle multiple data streams and cross-reference them efficiently makes it ideal for large-scale applications, such as in financial services or telecommunications.
This patent represents a forward-thinking solution in the fields of identity verification, privacy protection, and secure data management, addressing both efficiency and security concerns in a practical, real-world context.
Therefore, the claims are eligible because they are not directed solely to an abstract idea but rather to a specific technological solution that improves the efficiency, accuracy, and security of identity verification systems. This makes the patent stand out as a practical improvement in the field of identity verification and data management.
Advanced User
Identity Verification
This patent describes a method for verifying user identity by tracking interactions across networks, applications, and devices. It generates an anonymous identifier from the user's mobile number, securely logging activities on a private ledger. The system ensures efficient use of computing resources while maintaining strong privacy and security protections.
Our services
Who & How We Help
Monetize data, enhance services, and unlock new revenue streams
Data Monetization
Ongoing Support
Real-Time Analytics
API Integration
Analytics Dashboards
Secure Data Exchange
Data Monetization
Centillion provides tools that allow telecom operators to monetize their vast amounts of user data while ensuring privacy compliance.
Enhanced Services
By integrating CAMARA APIs and other advanced solutions, Centillion helps telecom operators offer new, value-added services like location-based advertising, identity management, and real-time analytics.
Ad Tech Integration
Centillion enables telecom operators to tap into the digital advertising market by providing platforms for targeted and personalized ad delivery, leading to new revenue streams.
Precise targeting, fraud prevention, and deep analytics for maximal impact.
API Integration
Fraud Detection
Anomaly Detection
Advanced Ad Targeting
Dynamic Consent
Opt-Out Management
Precise Targeting
We enhance the precision of ad targeting through the use of telecom data, improving campaign effectiveness and reducing wasted ad spend.
Fraud Prevention
By integrating real-time data validation and machine learning algorithms, Centillion helps AdTech companies combat ad fraud, ensuring that ads reach genuine users.
Advanced Analytics
Centillion provides comprehensive analytics and reporting tools that offer deeper insights into ad performance, allowing for more informed decision-making and campaign optimization.
Smarter strategies and better customer experiences.
Location-Based Targeting
Fraud Detection
Ad Personalization
Real-Time Analytics
In-Store Experiences
Personalized Marketing
Use our data-driven solutions to deliver highly personalized offers and promotions based on real-time location data and consumer preferences.
In-Store Experience
Centillion’s solutions help improve in-store navigation, offer special promotions, and provide a seamless digital-to-physical shopping experience.
Customer Insights
Retailers gain access to detailed analytics on customer behavior and engagement, enabling them to refine their marketing strategies and improve customer satisfaction.
Effective data management, privacy compliance and efficiency.
API Integration
Identity Management
Analytics Dashboards
Developer-Friendly
Dynamic Consent
Secure Data Exchange
Data Management
We provide robust data infrastructure solutions, enabling entities to manage and analyze large volumes of data effectively.
Privacy Compliance
Government agencies benefit from Centillion’s expertise in data privacy and security, ensuring that citizen data is protected and used in compliance with regulations.
Operational Efficiency
Centillion’s solutions help improve the operational efficiency of public sector projects by providing actionable insights and data-driven decision-making tools.
case studies
data driven solutions
Audience DNA Analysis
Behavioral Targeting
Real-Time Ad Performance Tracking
Data Monetization
Audience Segmentation

Podcast Audience Data Monetization Project

Centillion developed a sophisticated platform designed to help podcast creators and advertisers better understand and monetize their audience. By analyzing unique audience DNA from podcast episodes, Centillion provided granular insights into listener behaviors, demographics, and interests. This project aimed to transform each podcast episode into a rich data source, allowing creators to scale their audience reach while providing advertisers with precise targeting opportunities.

The platform extracted audience data from both past and present podcast episodes, segmenting listeners based on their behaviors, interests, and demographics. This approach allowed podcast creators to identify high-index audience segments and offer advertisers a more tailored, high-value advertising opportunity. Advertisers could then use this data to optimize their ad placements and ensure their messages reached the right audience at the right time.

Centillion’s solution also allowed for real-time ad performance tracking and the creation of bespoke audience profiles. This not only increased revenue potential for podcast creators but also provided advertisers with valuable, verifiable data about audience engagement. By using this enriched data, podcast creators were able to expand their reach and improve monetization strategies through targeted ad placements.

Audience DNA Analysis
Behavioral Targeting
Real-Time Ad Performance Tracking
Data Monetization
Audience Segmentation

Uber Driver Recruitment Campaign: Reducing CPA with Data-Driven Precision

Centillion collaborated with Uber to significantly reduce the cost of driver recruitment by leveraging advanced location-based data and proprietary insights. The partnership focused on refining Uber's recruitment efforts by identifying high-demand areas where driver acquisition would be most effective. Using real-time location data, Centillion helped target geographic regions with a strong demand for Uber's services, ensuring that new drivers were placed in areas where they could immediately meet rider needs. This targeted approach allowed Uber to focus its recruitment resources on the most profitable locations, reducing wasted efforts on broad, untargeted campaigns.

In addition to geographic targeting, Centillion utilized its proprietary insights into driver behavior and commuting patterns to further refine the recruitment process. By understanding the specific factors that motivated potential drivers in various regions, such as earning potential and proximity to high-demand areas, Centillion optimized Uber's messaging and ad placements. These dynamic ads were tailored in real time to attract the right candidates, further improving conversion rates.

As a result of this data-driven approach, Uber was able to reduce its cost per acquisition (CPA) from $32 to $4. This reduction was achieved by focusing on areas with the highest return on investment, ensuring that new drivers were not only easier to recruit but also immediately positioned to maximize their earnings. This strategy improved recruitment efficiency and significantly enhanced Uber’s return on investment (ROI) by reducing acquisition costs while ensuring driver satisfaction and productivity.

Hyper-Local Targeting
Behavioral Insights
Dynamic Ad Placement
Audience Segmentation
Real-Time Analytics

Therabody Digital Advertising Optimization Project

Centillion worked with Therabody to enhance their digital advertising efforts by utilizing its data-driven platform to improve ad targeting and increase return on investment (ROI). The project aimed to refine Therabody's marketing strategies through the integration of real-time analytics, audience segmentation, and behavioral insights to ensure their ads reached the most relevant audience at the optimal time.

Centillion employed hyper-local targeting to focus Therabody's ads on potential customers who demonstrated a strong interest in wellness, fitness, and recovery products. By analyzing consumer behaviors, purchasing patterns, and geographic locations, the platform enabled Therabody to deliver personalized ad experiences to their target audience, thereby increasing engagement and conversions. The project also leveraged dynamic ad placement strategies to ensure that ads were shown on high-value platforms where potential customers were most active.

Through this partnership, Therabody saw a marked improvement in the effectiveness of their advertising campaigns, resulting in reduced acquisition costs and higher conversion rates. The integration of Centillion's proprietary insights and real-time data allowed for constant optimization of ad placements, ensuring Therabody’s products reached the right customers with greater efficiency and accuracy.

Twitter Targeting
Behavioral Segmentation
Real-Time Analytics
Dynamic Content Strategy
Fan Engagement Optimization

NBA All-Star Game Player Voting Campaign for the Golden State Warriors

Centillion partnered with the Golden State Warriors to create a highly targeted digital campaign aimed at influencing fan voting for the NBA All-Star Game, ensuring the maximum number of Warriors players were selected for the All-Star team. The strategy primarily focused on leveraging Twitter targeting, using a combination of real-time analytics, audience segmentation, and hyper-local targeting to engage with NBA fans, especially those most likely to vote for Warriors players.

The campaign analyzed Twitter engagement patterns, focusing on users who frequently interacted with NBA content, Warriors-related hashtags, and players' profiles. By utilizing behavioral targeting, Centillion was able to identify fan segments that were not only Warriors supporters but also active voters in previous All-Star games. Targeted ads and organic content were then strategically deployed, encouraging these fans to participate in the voting process, using direct calls-to-action and emphasizing the impact their votes could have on the final selection.

Additionally, the campaign incorporated dynamic content strategies on Twitter, where ads and tweets featuring specific Warriors players were tailored in real-time based on trending topics, game highlights, and the players' current performance. This ensured that the content was always relevant and resonated with the audience. Centillion also employed geo-targeting to focus on regions where Warriors fanbases were particularly strong, ensuring maximum participation from areas like the Bay Area and other key fan hubs.

The result of the campaign was a significant boost in All-Star votes for the Warriors' key players, allowing the team to secure multiple selections in the NBA All-Star Game. By aligning digital strategies with fan behavior and social media trends, Centillion helped the Warriors maximize their visibility and influence in one of the league's most prominent events.

Hyper-Local Targeting
Behavioral Segmentation
Dynamic Ad Placement
Luxury Market Targeting
Real-Time Analytics

Bijan Digital Advertising Optimization Project

Centillion partnered with Bijan to enhance their digital advertising strategy by leveraging data-driven insights to improve targeting and increase the effectiveness of their campaigns. Similar to the work done with Therabody, the focus for Bijan was on optimizing ad placements through hyper-local targeting and behavioral segmentation, ensuring that the brand's high-end products were presented to the right audience in the right context.

By analyzing the purchasing behaviors, interests, and demographic data of Bijan's potential customers, Centillion developed a more focused advertising approach. This allowed Bijan to reach affluent consumers who were more likely to engage with luxury goods. The campaign employed real-time analytics to continuously refine ad placements, ensuring the ads appeared on premium platforms frequented by their target audience.

Centillion's platform also integrated dynamic ad placement, allowing Bijan to adjust its ads in real-time based on user interactions and behaviors. This strategy not only reduced acquisition costs but also increased conversion rates by ensuring the ads were shown to the most relevant audience at optimal times. The result was a more efficient use of Bijan's advertising budget and a significant improvement in their return on investment (ROI).

API Monetization
Consent Gateway
Adtech Optimization
Cross-Network Integration
Developer-Friendly APIs

Centillion’s Role in the CAMARA Project: Unlocking New Revenue Streams for Telcos

Centillion has been a key contributor to the CAMARA project, a global initiative designed to open mobile network operators (MNOs) to new revenue streams through API monetization. This project, developed alongside the GSMA, aims to make MNOs’ network capabilities—such as location services, edge computing, and quality on demand—easily accessible to third-party developers, businesses, and advertisers. Centillion’s role has been instrumental in ensuring that these APIs can be seamlessly integrated into external applications, allowing telecom operators to monetize their infrastructure beyond traditional connectivity services.

A significant part of Centillion’s contribution to CAMARA is the development of the Consent Gateway, which plays a critical role in managing user consent for data sharing in real-time. This system ensures that data shared via CAMARA APIs is verifiable, privacy-compliant, and aligns with global regulations like GDPR and CCPA. This has given telecom operators more control over their data, allowing them to monetize it ethically while maintaining user trust. Centillion’s Consent Gateway has been particularly valuable in the adtech optimization space, where it has helped improve targeted advertising, reduce ad fraud, and provide better measurement of ad performance using real-time telecom data.

In addition to privacy compliance, Centillion has helped simplify the cross-network integration of CAMARA APIs, enabling developers to create applications that work across multiple telecom networks globally. By making these APIs more developer-friendly, Centillion has reduced the complexity of integrating telecom services into new applications, fostering innovation and allowing for faster deployment of services across markets. This approach not only accelerates time-to-market for new apps but also positions MNOs to play a more critical role in the growing 5G and edge computing ecosystems.

Centillion’s work on CAMARA has reshaped how telecom operators interact with developers and businesses, allowing them to generate new income from their network data and infrastructure. Through its emphasis on privacy compliance, adtech optimization, and API monetization, Centillion is helping telcos transition into key players in the digital services economy, moving beyond traditional revenue models and embracing the opportunities presented by 5G and beyond.

Data Valuation Model
First-Party Data Monetization
Audience Segmentation
Investor Confidence Building
Esports Market Expansion

Gamer Pakistan IPO Based on Data Valuation Model

Centillion played a pivotal role in supporting the IPO of Gamer Pakistan by applying a sophisticated data valuation model to establish the company's market worth. The goal was to help Gamer Pakistan demonstrate the immense value of its digital user base, fan engagement, and gaming data, even in the pre-revenue stage. This data-driven approach ensured that the IPO reflected the company's potential in monetizing its growing community and valuable datasets.

Centillion's data valuation model analyzed multiple dimensions of Gamer Pakistan’s ecosystem, including user behaviors, gaming preferences, engagement metrics, and social interactions within the platform. By quantifying the value of these data points, Centillion provided a comprehensive valuation based on the future potential of monetizing these assets through sponsorships, targeted advertising, and partnerships. The model also leveraged first-party data from Gamer Pakistan's user base, highlighting the platform's ability to generate unique audience insights, which were highly valuable to advertisers and gaming partners.

To further bolster the IPO process, Centillion created a roadmap that demonstrated how Gamer Pakistan could transform its data into revenue streams. This included selling audience segmentation to advertisers, creating custom in-game experiences for brands, and building a robust advertiser marketplace leveraging the platform’s deep user data. Additionally, Centillion emphasized the growth of the gaming industry in Pakistan and how capturing this market early, along with effective data monetization strategies, positioned Gamer Pakistan as a leader in the region's emerging esports space.

The data valuation model presented by Centillion was crucial in securing investor confidence during the IPO. It showcased the future profitability of Gamer Pakistan by quantifying the potential revenue from its user base and digital assets, even before the company had established a traditional revenue stream. This model was a key factor in positioning the company as a high-value investment opportunity in the esports and gaming industry.

Location-Based Tracking
Anonymized Data Collection
Resource Optimization
Privacy and Consent Compliance
Behavioral Insights

Bexar County Homelessness Data Project

Centillion partnered with Bexar County to tackle homelessness by implementing an innovative data-driven project. The primary objective of this initiative was to use mobile data and advanced analytics to gain insights into the movement patterns and behaviors of the homeless population. This information would allow Bexar County to make more informed decisions about where and how to allocate resources effectively. The project focused on tracking anonymized mobile devices used by homeless individuals while ensuring compliance with strict privacy regulations, thus enabling the county to better understand the needs of the community without compromising individual privacy.

The system leveraged location-based tracking to map where homeless individuals tended to gather, where they accessed essential services, and how their movement patterns shifted over time. The insights gained from this data allowed local authorities to identify high-demand areas and provide targeted interventions. Furthermore, Centillion's technology was able to differentiate between devices used by homeless individuals and those used by staff or volunteers, ensuring a higher degree of accuracy in the data collection process.

This project empowered Bexar County to allocate resources more effectively, ensuring that services were directed toward areas with the highest need. By using real-time data and maintaining full anonymization of individual identities, the project not only helped improve the efficiency of homelessness services but also maintained the dignity and privacy of the individuals it aimed to support.

Open Gateway
The Art of What's Possible
how to work with us
From Concept to Completion
get in touch
Assessment + Integration
Centillion starts by assessing your needs and existing infrastructure, integrating our advanced solutions, including APIs, to enhance data capabilities and analytics.
Customization + Deployment
After integration, we customize services to align with your specific goals, deploying tailored solutions that ensure smooth operation and immediate benefits.
Optimization + Support
Centillion provides continuous monitoring and real-time analytics to optimize performance, offering ongoing support to adapt solutions as your business evolves.
our whitepapers
A Mission to Revolutionize
Download all
Name
Short Description
Name
Short Description
Name
Short Description
Name
Short Description
FAQ
Frequently Asked Questions
What is Centillion?
Centillion is a global leader in privacy, consent management, and ad measurement solutions, leveraging AI and 5G infrastructure.
How does Centillion ensure data privacy?
Centillion utilizes its patented "Consent Gateway" to provide verifiable user consent, ensuring compliance with global privacy regulations.
Who can benefit from Centillion’s services?
Telecom operators, ad tech companies, developers, brands, and public sector agencies can all benefit from Centillion’s services.
What industries does Centillion serve?
Centillion serves industries including telecom, advertising, retail, public sector, and healthcare.
How does Centillion handle user consent?
Centillion collects verifiable, revocable user consent through its telecom-based infrastructure, replacing outdated cookie tracking.
What partnerships does Centillion have?
Centillion partners with over 70 major telecom operators globally, facilitating its "Consent Gateway."
How can companies integrate Centillion’s solutions?
Companies can integrate Centillion’s solutions through Open Gateway APIs, enabling seamless data processing and consent management.
How does Centillion work with telecom operators?
Centillion bridges telecoms with ad tech by providing a consent gateway that leverages telecom data for privacy-compliant ad targeting.
How many telecom operators use Centillion’s Consent Gateway?
Centillion's Consent Gateway is adopted by 70 major telecoms, covering over 2.6 billion people.
How does Centillion monetize telecom data?
Centillion provides telecoms with new revenue streams by licensing its Consent Gateway and charging per record processed.
How is Centillion’s solution integrated into the 5G ecosystem?
Centillion’s solution is built on the 5G infrastructure, enabling telecom operators to provide identity verification and user consent services.
What role do APIs play in Centillion’s telecom solutions?
APIs allow telecoms to connect with ad tech and developers, providing real-time consent verification and audience targeting services.
How does Centillion improve telecom network efficiency?
Centillion uses its patented data structure to reduce the load on telecom networks, optimizing memory and processing efficiency.
What is Centillion’s relationship with the GSMA Open Gateway?
Centillion is a key partner in the GSMA Open Gateway initiative, helping unify global 5G data ecosystems through standardized APIs.
Can telecoms track user behavior using Centillion’s solutions?
Yes, telecoms can track user behavior with privacy-compliant consent, allowing for precise ad targeting and measurement.
How does Centillion address ad fraud?
Centillion provides transparent, verifiable user consent, reducing ad fraud and improving the accuracy of ad targeting.
What is Centillion’s Consent Gateway?
The Consent Gateway enables advertisers to meet new privacy regulations, providing consent-verified data for ad targeting.
How does Centillion improve ad measurement?
Centillion offers precise ad measurement, tying ad impressions to real sales data, a key feature for advertisers.
How does Centillion integrate with DSPs?
Centillion integrates with DSPs like The Trade Desk to ensure clean, privacy-compliant data flows for ad targeting.
What role does AI play in Centillion’s AdTech solutions?
AI enhances Centillion’s ability to optimize ad campaigns, personalize user experiences, and process consent data efficiently.
How does Centillion handle cross-device tracking?
AI enhances Centillion’s ability to optimize ad campaigns, personalize user experiencesCentillion uses its patented methods to bridge session IDs across devices, allowing seamless tracking with user consent., and process consent data efficiently.
What is the role of 5G in Centillion’s ad solutions?
5G infrastructure allows Centillion to deliver real-time, privacy-compliant ad measurement and targeting across mobile networks.
Can Centillion replace cookies in advertising?
Yes, Centillion replaces cookies by offering telecom-based identity verification and consent management, ensuring privacy compliance.
How does Centillion benefit retail companies?
Centillion helps retailers track customer behavior in-store and online using privacy-compliant data collected through mobile networks.
How does Centillion’s solution integrate with retail data?
Retailers can use Centillion’s APIs to link in-store proximity data with digital ad targeting, ensuring privacy compliance.
How does Centillion measure retail ad effectiveness?
Centillion ties ad impressions to actual sales data, offering retailers precise insights into ad campaign ROI.
Can Centillion be used for personalized offers?
Yes, Centillion enables retailers to deliver personalized offers to customers based on their consented data.
What type of data does Centillion collect from retail customers?
Centillion collects first-party, consent-verified data from customers, ensuring compliance with privacy laws.
How does Centillion handle location data in retail?
Centillion uses proximity sensors to track customer movements in-store, providing insights into shopping patterns while ensuring consent.
Can Centillion track online shopping behavior?
Yes, Centillion’s solution can track online shopping behavior through consent-based data collection.
How can retailers use Centillion’s data for advertising?
Retailers can use Centillion’s data to create targeted ad campaigns based on real-time customer behavior and purchase intent.
How does Centillion help public sector agencies?
Centillion provides public sector agencies with tools to track population movements and behaviors while ensuring data privacy compliance.
What is an example of Centillion’s work in the public sector?
Centillion worked with Bexar County to track homeless populations using anonymized mobile data, providing valuable insights for resource allocation.
How does Centillion ensure privacy in public sector projects?
Centillion’s patented consent management system anonymizes data and ensures compliance with privacy regulations in all projects.
Can Centillion track public health trends?
Yes, Centillion can track public health trends using mobile data while ensuring individual privacy through its consent gateway.
How does Centillion assist with disaster response?
Centillion provides real-time location data to help agencies plan and execute disaster responses more effectively.
What role does Centillion play in smart city initiatives?
Centillion supports smart city initiatives by providing consent-based data for urban planning and public services optimization.
Can Centillion be used to track population migration?
Yes, Centillion’s solutions can be used to track migration patterns, helping governments understand population shifts.
How does Centillion handle sensitive public data?
Centillion provides real-time location data to help agencies plan and execute disaster responses more effectively.

Privacy Policy

Effective Date: July 1, 2024 
Centillion AI Inc (“Centillion AI Inc” or “We”) respects your privacy and is committed to protecting it through our compliance with this Privacy Policy (the “Policy”). Please read this Policy carefully to understand our policies and practices regarding your information and how we will treat it. By accessing the Centillion AI Inc website, including any content, functionality, and services offered on or centillion.ai or any subsite, subdomain, or successor site, or any mobile application which links to this policy (collectively, “Centillion AI Inc”), you agree to this Policy. If you do not agree with our policies and practices, your choice is not to use Centillion AI Inc. This Policy may change from time to time. Your continued use of Centillion AI Inc after we make changes is deemed to be an acceptance of those changes, so please check the Policy periodically for updates. If we make a material change about how we treat our customers’ personal information we will notify you at the email address specified in your account. 

This Policy describes the types of information we may collect from you or that you may provide when you visit Centillion AI Inc and our practices for collecting, using, maintaining, protecting, and disclosing that information. 

This Policy applies to the information we collect on Centillion AI Inc, in email, text, or other electronic messages between you and Centillion AI Inc. This Policy does not apply to any services which do not display or link this Policy or that have their own privacy policy statements. Additionally, this Policy does not apply to any external websites which may be linked to Centillion AI Inc. 

1. Information We Collect About You and How We Collect It 

We may collect several types of information from or about users of Centillion AI Inc, including information: 
  • By which you may be personally identified, such as your name, email and telephone number (“Personal Information”); 
  • Information about you individually but does not identify you; and/or 
  • About your internet connection, the equipment you use to access our website, and usage details. 
We collect this information directly from you when you provide it to us and automatically as you navigate through Centillion AI Inc. Information collected automatically may include usage details, IP addresses, and information collected through Google Analytics. 

2. Information We Collect 

As you navigate through Centillion AI Inc, we may collect two types of information from you: (1) “personally identifiable information” (as described below); and (2) “non-personally identifiable information” (as described below). “Personally identifiable information” is information that identifies you personally, such as your name, address, telephone number, email address, or company name. Here are some examples of the ways in which we may collect and store your personally identifiable information through Centillion AI Inc: 
  • We may collect your first and last name, email address, or other information if you fill out certain forms or online requests on Centillion AI Inc; or 
  • Anonymization and Security: By generating an anonymous identifier based on the mobile number and writing all records to a private ledger, the method ensures that user privacy is maintained without sacrificing the integrity of the authentication process.
“Non-personally identifiable information” can be technical information, or it can be demographic information, such as your age, name, gender, or interests. Non-personally identifiable information may also mean aggregated, non-identifiable, or anonymized information. Non-personally identifiable information does not identify you personally. If you do provide us with non-personally identifiable information, we may use it for the purposes described in this statement, or any other legal purpose. 

Here are some examples of ways through which we may collect and store your non-personally identifiable information through Centillion AI Inc, and how we use such information: 
  • Log Information: When you use Centillion AI Inc, we automatically collect and store certain information in our server logs. This type of information includes details of how you use our service, IP address information described below, web pages which have been viewed by you, date and time, domain type, device event information such as crashes, system activity, hardware, settings, browser type, browser language, the date and time of your requests, and referral url. 
  • Internet Protocol (IP) Address: Your “IP address” is a number that lets computers attached to the internet know where to send you data, such as screens and pages of our services that you view. We use this information to deliver our screens and pages to you upon request, to tailor our services to the interests of you and our other visitors, and to measure traffic to and within our services. 
  • Usage Information: When you use Centillion AI Inc, we may collect and process information about how you use Centillion AI Inc, including how you move through Centillion AI Inc. 
  • Feedback Information: From time to time, we may request that you provide us with feedback regarding Centillion AI Inc, as well as the products and services we offer. We may do this in the form of a survey or other feedback mechanism. We may collect and analyze this information. 
The technologies we use for this automatic data collection may include: 
  • Cookies (or browser cookies): A cookie is a small file placed on the hard drive of your computer. You may refuse to accept browser cookies by activating the appropriate setting on your browser. However, if you select this setting, you may be unable to access certain parts of Centillion AI Inc. Unless you have adjusted your browser setting so that it will refuse our cookies, our system will use cookies when you direct your browser to our website. 
  • Additional Information: We use Google Analytics to count users who have visited Centillion AI Inc webpages and for other related website statistics (for example, recording the popularity of certain website content and verifying system and server integrity). 
If you encounter a screen or page that requests information you do not want to share with us, do not enter the information and do not proceed with that screen or page. 

3. How We Use Your Information 

Personally Identifiable Information 
If you provide us with personally identifiable information, we will only use it for the purposes described in this statement or where it was collected (including in a financial privacy statement). Primarily, we use it to: 
  • Offer you the products and services you request; 
  • Allow you to access certain areas of Centillion AI Inc; 
  • Register you as a member and develop your profile to take advantage of Centillion AI Inc; 
  • To improve your user experience and the experience of other users of Centillion AI Inc; 
  • To understand how you use Centillion AI Inc; or 
  • Contact you in response to an email or other communication. 
Non-Personally Identifiable Information
We may use non-personally identifiable information for the purposes described in this statement or where it is collected, or any other legal purpose, including, when and where applicable, combining non-personally identifiable information with personally identifiable information. Without limiting the above, we may collect information to understand how you use Centillion AI Inc and how we can improve Centillion AI Inc’s functionality. 

Reports 
We periodically prepare analyses and reports reflecting our customer use of Centillion AI Inc and its related services. In preparing these reports, we may combine and analyze the personal information you provide to us with information from other sources. However, these reports will only include aggregate information about visitors and members. The information in these reports will not identify you individually and any business partner with whom such reports may be shared will not be able to contact you based on the information contained in the reports.

4. Disclosures of Your Information 

We may disclose information we obtain about you in compliance with this Privacy Policy and in compliance with our financial privacy policy which may accompany any product or service we offer you. 

Personally Identifiable Information 
We may share or disclose your personally identifiable information in the following instances:
  • To fulfill a service to you; 
  • To send you information, including news, events, job openings and related information that you have subscribed to; 
  • To offer you products from our affiliates, strategic partners, or agents, or to assist such parties for research, administrative, and/or business purposes; 
  • To unaffiliated third-party service providers, agents, or independent contractors who help us maintain our products and services; 
  • To comply with law, or if in good faith we believe that such action is necessary to conform to the requirements of law, or comply with legal process served on us, and to protect and defend our rights or property, or act in urgent circumstances to protect the personal safety of you and our other visitors; 
  • To third parties as part of a corporate reorganization process including, but not limited to, a merger, acquisition, or sale of all or substantially all of our assets; 
  • To track and analyze non-identifying, aggregate usage and volume information from our visitors or members and provide such information to third parties; 
  • To protect against fraud or potential fraud. 
Non-Personally Identifiable Information 
We may share or disclose your non-personally identifiable information for the purposes disclosed in this statement or where it is collected (including in our financial privacy policy), or for any other legal purpose, including when and where applicable, sharing and disclosing non-personally identifiable information combined with personally identifiable information. 

Legal Disclosure 
We may disclose and share information about you and your use of Centillion AI Inc if we believe such disclosure is necessary to:
  • Comply with the law and/or legal process where a formal request has been made; 
  • Protect or defend our rights and/or property and property of others; 
  • Enforce our Centillion AI Inc Terms of Use and/or this Privacy Policy 
  • Respond to claims that the content(s) of a communication violates the rights of another. 

5. Choices About How We Use and Disclose Your Information 

We strive to prove you with choices regarding the personal information you provide to us. We have created mechanisms to provide you control over this process. You can set your browser to refuse all or some browser cookies, or to alert you when cookies are being sent. If you disable or refuse cookies, please note that some parts of this site may then be inaccessible or not function properly. 

6. Accessing and Correcting Your Information 

Subject to applicable law, you may obtain a copy of personal information we maintain about you by contacting us as indicated below. To help protect your privacy and maintain security, we will take steps to verify your identity before granting you access to the information. In addition, if you believe that personal information we maintain about you is inaccurate, subject to applicable law, you may have the right to request that we correct or amend the information by contacting us as indicated below. 

7. Data Security 

We have implemented measures to secure your personal information from accidental loss and from unauthorized access, use, alteration, and disclosure. Once we receive your information, we make reasonable efforts to ensure the security of our systems. We use firewalls to protect your information from unauthorized access, disclosure, alteration, or destruction. However, this is not a guarantee that such information may not be accessed, disclosed, altered, or destroyed by breach of such firewalls or secure server software. 

The safety and security of your information also depends on you. Where you have chosen a password to access Centillion AI Inc, you are responsible for keeping this password confidential. We ask that you not share this password with anyone. Unfortunately, the transmission of information via the internet is not completely secure. Although we do our best to protect your personal information, we cannot guarantee the security of your personal information transmitted via Centillion AI Inc. Any transmission of personal information is done at your own risk. We are not responsible for circumvention of any privacy settings or security measures contained on Centillion AI Inc. 

8. Retention and Deletion 

Personally identifiable information that we process for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. We will retain your personally identifiable information as follows: name, email address, phone number, job title, company name will be retained for a minimum period of 30 days following the date that you complete a contact form on Centillion AI Inc, and for a maximum period of 60 months following the date that you consent for us to store your personal information. Notwithstanding the other provisions of this section, we may retain your personally identifiable information where such retention is necessary for compliance with a legal obligation to which we are subject, or in order to protect your vital interests or the vital interests of another natural person. 

9. Do Not Track (DNT) Signals 

Centillion AI Inc does not respond to Do Not Track (DNT) signals. Some third-party sites do keep track of your browsing activities when they serve you content, which enables them to tailor what they present to you. If you are visiting such sites, your browser may include controls to block and delete cookies, web beacons and similar technologies, to allow you to opt out of data collection through those technologies. 

10. Information for California Residents 

California residents are entitled to contact us to request information about whether we have disclosed personal information to third parties for the third parties’ direct marketing purposes. We do not disclose personal information to third parties for the third parties’ direct marketing purposes. California customers may request further information about our compliance with this law by contacting us as noted in the “Contact Us” section below. 

11. Compliance and Cooperation with Regulatory Authorities 

We regularly review our compliance with our Privacy Policy. When we receive formal written complaints, we will contact the person who made the complaint to follow up. We work with the appropriate regulatory authorities, including local data protection authorities, to resolve any complaints regarding the transfer of personal data that we cannot resolve with our customers directly. 

12. Changes to this Policy 

From time to time, we may make changes to this Policy to accommodate new technologies, platforms, industry practices, regulatory requirements, or for other purposes. We encourage you to review this Policy periodically to ensure that you understand how we collect, use, and share information through Centillion AI Inc. If we