Built for the technical buyer. This page covers the identity spine architecture, resolution methods, data hygiene processes, output fields, integration options, and compliance framework.
The identity spine is a foundational database that links digital signals — cookies, hashed emails, IP addresses, device fingerprints — to verified physical identity.
It covers 308M consumer records, representing approximately 98% of US adult households.
Unlike company-based identity systems, the identity spine is person-based. Identity follows the individual across job changes, moves, and device switches.
Average job tenure is 4.1 years. Company-based identity breaks constantly. Person-based identity doesn't.
Monthly NCOA verification against USPS data — the same database used by government agencies.
Every record's latitude and longitude coordinates are updated when a move is detected.
Geo-coordinates serve as the anchor for all downstream identity matching.
When someone moves, their entire digital footprint is re-linked to their new physical location.
| Method | What It Does | Resolution Rate |
|---|---|---|
| Cookie / HEM Matching | Maps browser cookies to hashed emails in the identity spine | Varies by cookie health |
| Geo-Framed Proximity | Uses device lat/long + verified household addresses to resolve shared-IP scenarios | ~60% |
| B2B Firmographic Overlay | Enriches person-level identity with current company, title, industry | Additive layer |
| Persistent ID (UID2) | Maps identity to non-expiring identifiers that survive cookie deprecation | Future-proof |
Every resolution fires instantly to your endpoint.
Batch queries and historical lookups.
Identified visitors become contacts automatically.
Filter existing customers from results.
Event tracking integration.
Compatible via webhook for any workflow.
All data is opt-in compliant and sourced through licensed, regulated channels.
NCOA data is USPS-regulated.
No scraping, no dark web data, no unauthorized collection.
Hashed email processing — raw PII is never transmitted in the matching pipeline.
Full suppression/opt-out support.
We built identity resolution the right way: licensed data sources, regulated verification, and hashed processing at every stage.
Schedule a technical deep dive with our data team. We'll walk through architecture, resolution methodology, and integration requirements.