Abstract:
Method to generate onboarding flow for application starts with on-boarding server receiving request from electronic device to activate application. On-boarding server determines whether request is initial request. Request is determined to be initial request when minimal set of information associated with user is not stored in on-boarding server. When request is determined to be initial request, on-boarding server signals to electronic device to display request for minimal set of information associated with user which includes at least one of: user identification, legal name, phone number, or email address. Minimal set of information associated with user is then received and stored in on-boarding server. On-boarding server signals to allow initial access to application. Signaling to allow initial access includes signaling that user requires access to payment processing hardware to process user's physical payment instrument. On-boarding server receives default payment information entered using payment processing hardware. Other embodiments are also described.
Abstract:
In embodiments, methods and systems for order management and processing based on a distributed commerce platform are provided. A distributed commerce platform supports end-to-end integrated product publication, order-management and payment services. In particular, the distributed commerce platform supports components based on Application Programming Interfaces (API) that standardize the implementation of a distributed commerce solution or configuration of off-site buying experiences. Using the distributed commerce platform, merchants can concurrently offer, sell, and process orders for products through a plurality of different affiliate channels. The distributed commerce platform can also be implemented as a federated portal from which a merchant can identify affiliate channels to publish product objects, access the plurality of affiliate channels and define configurations for processing objects of the merchant's distributed commerce solution. The configurations can be accessed during a purchase flow such that orders from a channel are processed based on the specific attributes identified in the configurations.
Abstract:
A method and apparatus for efficient and progressive fraud detection are described. Transactions are received by a server computer system and include attributes and transaction data. To determine whether a transaction is fraudulent, and thus should be rejected, a progressive fraud determination process is performed by the server computer system. The progressive fraud determination process includes performing a first set of one or more transaction fraud determinations based on a first set of features determined for the transaction. When the first set of one or more transaction fraud determinations identifies the transaction as fraudulent or legitimate, the progressive fraud determination process is terminated based on this decision, and before performing additional successive fraud determination processes. By exiting the progressive fraud determination process early, substantial processing, memory and bandwidth savings can be realized without sacrificing fraud detection accuracy.
Abstract:
A method and apparatus for providing a document-integrated software integration validation by a service provider system are described. The method includes detecting an application program interface (API) call generated by a user system in a test transaction, the API call comprising a test identifier (ID) and a user system ID, the test ID identifying an API integration test scenario and the user system ID identifying the user system. The method also includes tracking a sequence of API calls and responses. Furthermore, the method includes receiving login credentials from the user system. The method also includes verifying the received login credentials with previously established login credentials associated with the user system ID. Additionally, the method includes determining whether the sequence of API calls and responses is performed correctly for the test transaction and serving the interactive integration guide to the user system indicating a result for the API integration test scenario.
Abstract:
A method and apparatus for performing privacy preserving fraud detection in network based transactions are described. The method may include receiving a fraud detection message during a transaction between a user system and a merchant system, the message having a set of cryptographically transformed universal resource locator (URL) components generated from a URL of a web page of the merchant system on which the transaction is to occur. The method may also include generating one or more secure and anonymous fraud detection features, each fraud detection feature comprising a select subset of the cryptographically transformed URL components. The method may also include performing fraud detection for the web page using the one or more secure and anonymous fraud detection features to determine a likelihood that fraud is occurring in the transaction.
Abstract:
Described herein are systems and methods to use modeling techniques to identify gradual changes in various metrics identified as a result of analyzing an aggregated transaction dataset. In one method, a computer model dynamically slice the data using an attribute, calculates an entropy value for using a rolling time window, and uses the entropy value to identify anomalous behavior. The model may use information gain to determine whether to further segmented the data slice into smaller data slices. The model may iteratively slice and analyze the data until a data slice corresponding to the root cause is determined. The model may then traverse the hierarchy of data slices and combine the data slices until an optimized combined data slice. The model may train a machine learning component, such as a booted tree algorithm, to optimize its traversal of the hierarchy of data slices.
Abstract:
A method and apparatus for updating data router nodes in a distributed storage system are described. The method can include querying, by a first database agent of a database node, a cache data store for health status metrics of the cache data store. The method can also include storing, by the first database agent of the database node, the health status metrics in a data repository. Furthermore, the method can include obtaining, by a second database agent of a router node, the health status metrics from the data repository, and updating, by the second database agent of the router node, a database topology file based on the health status metrics.
Abstract:
Systems and methods are provided for filtering and/or creating Points-of-Interest (POIs). In one embodiment, a list of POIs is obtained and then filtered based on crowd data related to the list of POIs to provide a filtered list of POIs. In another embodiment, one or more crowd-sourced POIs are created based on one or more crowds relevant to a corresponding bounding region for POI creation.
Abstract:
In an example embodiment, interactions among services in a service proxy are recorded in an interaction log. A service graph manager then parses the interaction log. The service graph manager reads each interaction and then processes the interaction to determine if it violates the rules. If so, the service graph manager reports the violation to the software developer and also recommends an action to remedy the violation. In an example embodiment, this recommendation takes the form of an indication of which files to modify to allow the service interaction (e.g., which rule(s) to modify to ensure that the service interaction is not a violation). The software developer can then approve the proposed action, which can then be automatically implemented to ensure that once the service is sent to a quality assurance environment there will be no rules violation from the corresponding interaction(s).
Abstract:
Embodiments of the invention include a method of performing a payment transaction comprising receiving transaction data by a PIN pad terminal from a point-of-sale terminal, and receiving tender from a customer, by the PIN pad terminal. Tender data and the transaction data are sent to a service gateway, by the PIN pad terminal. The service gateway collects metadata from the tender data and the transaction data. The tender data is sent by the PIN pad terminal to the point-of-sale terminal, which sends the tender data and the transaction data to a merchant gateway for approval or denial of the tender data. The tender data sent to the POS may be encrypted. The service gateway may provide customer and merchant analytics based on the metadata, as well as perform security/fraud checks, BIN management, PIN pad management. Systems are also disclosed.