There are several mechanisms Branch uses to pass data through to the app and attribute app sessions back to the source. We always use the method with the highest match confidence rate.
Methods with 100% match accuracy
If the app is currently installed on the phone, and you’ve configured your Branch links with your app’s URI scheme (
myapp://) or to use Universal or App Links, we will open the app immediately and pass a click identifier through to our native library. This click identifier is then sent to the Branch servers to retrieve the dictionary of data associated with the link.
For example, we’d call
myapp://open?link_click_id=123456 to open the app immediately. The Branch native library parses out
link_click_id: 123456 and passes it back to the Branch API to retrieve the data dictionary associated with that link click.
IDFA token matching across the Branch Network
When a user clicks a Branch link for your app, and we’ve seen them click a link for another app on our partner network, we’ve already matched them up to a corresponding device identifier. This means that when they install the app, we know with 100% certainty that they just came from that link click.
The fact that we have such a global network of apps with hundreds of millions of users clicking links, means that when you join the platform, you can benefit from the crowd-sourced accuracy gained through all our apps contributing the browser-app profiles. Read more about how important this is on our blog.
Leveraging other match techniques
We’ve built out custom deep linking mechanisms that are specific to each platform to ensure that deep linking is accurate. Here are some of those techniques we use:
|Match Method||Implementation Details|
|Facebook deferred deep linking API||We’ve built a custom integration with Facebook where if a user originates from an app invite or advertisement, we connect with Facebook’s API to know with 100% certainty if the install originated from this source. You’ll need to authenticate with Facebook on the Branch dash if you want to support this.|
|Android Google Play referrer||Google Play supports passing a referrer through the install process that we listen for. It’s notoriously unreliable and currently unsupported when redirecting from Chrome. However, we’ll use it when available. Enabling this method is covered in the SDK Integration Guide.|
|iOS 9/10 Safari cookie passthrough||We built a custom technique into our iOS SDK that will guarantee 100% accuracy on iOS 9/10 when a user clicks from the Safari browser. This only applies if you include SafariServices.framework in your app. Note that this method has some risks due to a recent (9/1/16) policy change on iOS. Please see our new recommended path to use this feature.|
|Android Chrome Tabs cookie passthrough||We built a custom technique into our Android SDK that will guarantee 100% accurancy when a user originates from the Chrome browser. We’re automatically cookie match based on app.link, but you can configure the domain depending on your use case. Please see the guide here.|
Methods without 100% match accuracy
Browser to app fingerprint match
Branch collects information about devices both when a user is in the browser – via a click on a Branch link – and then after they open the app. This information includes IP Address, OS, OS version, device model and other parameters. This is the user’s digital fingerprint and can be obtained in the browser and in the app.
When no 100% match method is available, we connect the unique fingerprint collected in the app to the unique fingerprint collected in the browser to determine where user originated.
Customize the fingerprint matching criteria
If you are concerned that users may potentially have the same fingerprint, you can choose to have us not match users if two identical fingerprints are outstanding. On the Dashboard’s Link Settings page, under advanced options, you should set Match Type to
Unique. You can also modify the 7200 second (2 hour) default expiration for all links, or configure it for individual links by using the
This means that if two users with the same fingerprint, on the same wifi, were to click a Branch link for your app, we would blacklist those digital fingerprints for the expiration duration. Therefore, when either user opens up your app, no match would be made.