Secure management of user addresses in network service using firewall and tables

    公开(公告)号:US11615201B2

    公开(公告)日:2023-03-28

    申请号:US16716639

    申请日:2019-12-17

    Applicant: eBay Inc.

    Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.

    Transaction security techniques
    2.
    发明授权

    公开(公告)号:US12034851B2

    公开(公告)日:2024-07-09

    申请号:US17381461

    申请日:2021-07-21

    Applicant: eBay Inc.

    CPC classification number: H04L9/32 H04L9/30

    Abstract: Aspects of the present disclosure relate to transaction security techniques. In examples, a resource platform causes a set of executable verification instructions associated with an authorization processor to be executed by a user computing device. The verification instructions may be encrypted by the authorization processor for decryption by the user computing device. The verification instructions may generate verification information associated with the user computing device. In some instances, the verification information may be encrypted for decryption by the authorization processor. The encrypted verification instructions may be provided to the authorization processor (e.g., via the resource platform), such that the authorization processor may provide an indication to the resource platform as to whether the verification is verified. Accordingly, if the verification information is verified a transaction associated with the resource platform may proceed or, as another example, the user computing device may be granted access to information.

    TRANSACTION SECURITY TECHNIQUES
    3.
    发明申请

    公开(公告)号:US20250007712A1

    公开(公告)日:2025-01-02

    申请号:US18735899

    申请日:2024-06-06

    Applicant: eBAY iNC.

    Abstract: Aspects of the present disclosure relate to transaction security techniques. In examples, a resource platform causes a set of executable verification instructions associated with an authorization processor to be executed by a user computing device. The verification instructions may be encrypted by the authorization processor for decryption by the user computing device. The verification instructions may generate verification information associated with the user computing device. In some instances, the verification information may be encrypted for decryption by the authorization processor. The encrypted verification instructions may be provided to the authorization processor (e.g., via the resource platform), such that the authorization processor may provide an indication to the resource platform as to whether the verification is verified. Accordingly, if the verification information is verified a transaction associated with the resource platform may proceed or, as another example, the user computing device may be granted access to information.

    SECURE MANAGEMENT OF USER ADDRESSES IN NETWORK SERVICE

    公开(公告)号:US20180314848A1

    公开(公告)日:2018-11-01

    申请号:US16027600

    申请日:2018-07-05

    Applicant: eBay Inc.

    Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.

    SECURE MANAGEMENT OF USER ADDRESSES IN NETWORK SERVICE

    公开(公告)号:US20180129820A1

    公开(公告)日:2018-05-10

    申请号:US15345808

    申请日:2016-11-08

    Applicant: eBay Inc.

    Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.

    TRANSACTION SECURITY TECHNIQUES
    6.
    发明申请

    公开(公告)号:US20230024967A1

    公开(公告)日:2023-01-26

    申请号:US17381461

    申请日:2021-07-21

    Applicant: eBay Inc.

    Abstract: Aspects of the present disclosure relate to transaction security techniques. In examples, a resource platform causes a set of executable verification instructions associated with an authorization processor to be executed by a user computing device. The verification instructions may be encrypted by the authorization processor for decryption by the user computing device. The verification instructions may generate verification information associated with the user computing device. In some instances, the verification information may be encrypted for decryption by the authorization processor. The encrypted verification instructions may be provided to the authorization processor (e.g., via the resource platform), such that the authorization processor may provide an indication to the resource platform as to whether the verification is verified. Accordingly, if the verification information is verified a transaction associated with the resource platform may proceed or, as another example, the user computing device may be granted access to information.

    Secure management of user addresses in network service using firewall and tables

    公开(公告)号:US10528755B2

    公开(公告)日:2020-01-07

    申请号:US16027600

    申请日:2018-07-05

    Applicant: eBay Inc.

    Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.

    Secure management of user addresses in network service

    公开(公告)号:US10043031B2

    公开(公告)日:2018-08-07

    申请号:US15345808

    申请日:2016-11-08

    Applicant: eBay Inc.

    Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.

Patent Agency Ranking