-
公开(公告)号:US20240231816A1
公开(公告)日:2024-07-11
申请号:US18094286
申请日:2023-01-06
Applicant: Stripe, Inc.
Inventor: Michael Julien KOVACS , Bowen PAN , Yuliya GORLOVETSKY , Caitlyn M. CAWTHRON , Esther LEE , Dmitriy GAK , Gabriel HURLEY , Katarzyna BABULA , Timothy James FONTAINE
IPC: G06F8/76 , G06F8/61 , G06F9/451 , H04L67/00 , H04L67/306
CPC classification number: G06F8/76 , G06F8/61 , G06F9/451 , H04L67/306 , H04L67/34
Abstract: This disclosure provides techniques for enabling developers to create a single implementation of an application that is accessible via different types of surfaces. For example, a developer can develop a single application and, based on how the developer defines parameters in a schema of the application, the corresponding user interfaces and features of the application can be used on different types of surfaces. Moreover, the single application can be made available to install via a hosted network and installed without regard to the type of surface that is being used to access the hosted network.
-
公开(公告)号:US20240231784A1
公开(公告)日:2024-07-11
申请号:US18094289
申请日:2023-01-06
Applicant: Stripe, Inc.
Inventor: Gabriel HURLEY , Timothy James FONTAINE , Julia CHAVES , Justin TULLOSS , Kenneth AUCHENBERG , Sandhya JAGANNATH
CPC classification number: G06F9/451 , G06F9/44526
Abstract: The disclosure generally describes one or more techniques for supporting deployment of application extensions for a client system.
-
173.
公开(公告)号:US20240211966A1
公开(公告)日:2024-06-27
申请号:US18086394
申请日:2022-12-21
Applicant: Stripe, Inc.
Inventor: Massoud Hosseinali , Florian Hartl , Efstathios Vafeias , Keagan Long , Stef Nelson-Lindall , Dan Brown
IPC: G06Q30/018 , G06Q20/38 , G06Q20/40
CPC classification number: G06Q30/0185 , G06Q20/389 , G06Q20/4014 , G06Q20/4016 , G06Q20/407
Abstract: A method and apparatus for detecting fraudulent merchant activities at a commerce platform system are described. The method may include accessing different types of merchant system data generated for a merchant system transaction being processed by a commerce platform system. The method may also include encoding sets of merchant system data into sets of different types of data, and inputting the sets into different machine learning models to generate predictions of different types of merchant fraud. The method may also include generating a single merchant fraud score by combining the different fraud scores, and in response to detecting that the single merchant fraud score satisfies a fraud detection threshold, initiating one or more remediative actions against the merchant system transaction, the merchant system, or a combination thereof.
-
公开(公告)号:US20240211219A1
公开(公告)日:2024-06-27
申请号:US18086631
申请日:2022-12-21
Applicant: Stripe, Inc.
Inventor: Fanyun FANG , Christopher Jeffrey STREETER , Jorge Eugenio AGUIRRE GONZALEZ , Kevin Chekin HO , Jason GUPTA , Matthew Anthony BASTA , Samuel De Jun Victor LYE
IPC: G06F8/38 , G06F3/0481 , G06F3/0484 , G06F9/451 , G06F9/54 , G06F16/958 , G06F40/143
CPC classification number: G06F8/38 , G06F3/0481 , G06F3/0484 , G06F9/451 , G06F9/548 , G06F16/986 , G06F40/143
Abstract: In some embodiments, a computer system receives a request to render components of a webpage. In some embodiments, in response to receiving the request, a platform of the webpage loads a script element that creates an inline frame element and receives a secret token. In some embodiments, the computer system authenticates an embedded session within the platform using the secret token and generates an API key, wherein the API key is used by the inline frame element to authenticate API requests to an API server. In some embodiments, the computer system receives, via the inline frame element, data corresponding to the one or more embedded UI elements from a resource associated with a third-party entity, wherein the inline frame element is a proxy between the platform and the API server. In some embodiments, the computer system renders the one or more embedded UI elements in a shadow document object model.
-
公开(公告)号:USD1032332S1
公开(公告)日:2024-06-25
申请号:US29808019
申请日:2021-09-16
Applicant: Stripe, Inc.
Designer: Conor Hayes , James Foody
Abstract: FIG. 1 is a front elevation view of a mounting adapter showing our new design;
FIG. 2 is a rear elevation view thereof;
FIG. 3 is a right side elevation view thereof;
FIG. 4 is a left side elevation view thereof;
FIG. 5 is a top plan view thereof;
FIG. 6 is a bottom plan view thereof;
FIG. 7 is a top-front-right perspective view thereof;
FIG. 8 is a top-front-left perspective view thereof;
FIG. 9 is a top-rear-left perspective view thereof;
FIG. 10 is a top-rear-right perspective view thereof;
FIG. 11 is a bottom-front-right perspective view thereof;
FIG. 12 is a bottom-front-left perspective view thereof;
FIG. 13 is a bottom-rear-left perspective view thereof; and,
FIG. 14 is a bottom-rear-right perspective view thereof.
The shade lines show surface contour and not surface ornamentation.-
公开(公告)号:US20240177162A1
公开(公告)日:2024-05-30
申请号:US18072126
申请日:2022-11-30
Applicant: Stripe, Inc.
Inventor: Isaac MADWED , Ryan DRAPEAU
IPC: G06Q20/40
CPC classification number: G06Q20/4016
Abstract: A method and apparatus for generating an ML model may include: generating an ML feature template comprising a first grouping of first ML feature variables and a second grouping of second ML feature variables; generating ML features by combining a respective one of each of the first ML feature variables with a respective one of each of the second ML feature variables; training a first ML model utilizing the ML features and first training data to generate an ML output; analyzing the ML output to determine a prediction accuracy of the ML features; based on the prediction accuracy of the ML features, selecting a subset of the ML features; training a second ML model based on the subset of the ML features and the first training data; and providing a network transaction to the second ML model to generate a classification of the network transaction.
-
公开(公告)号:US20240177161A1
公开(公告)日:2024-05-30
申请号:US18071381
申请日:2022-11-29
Applicant: Stripe, Inc.
Inventor: Charlotte Gils , Efstathios Vafeias
IPC: G06Q20/40 , G06V10/774 , G06V10/82 , G06V20/00 , G06V30/41
CPC classification number: G06Q20/4016 , G06V10/774 , G06V10/82 , G06V20/95 , G06V30/41
Abstract: A method and apparatus for fraud detection during transactions using identity graphs are described. The method may include receiving a document image for detecting whether an identity document depicted within the document image is fraudulent. The method may also include extracting data associated with the document image to generate extracted data. The method may also include processing, by a single machine learning model, subsets of the decoded image data used as corresponding inputs to each of a set of machine learning model backbones of the single machine learning model that generate one or more intermediate signals indicative of whether a subset of the extracted image data input into said each machine learning model backbone is associated with a fraudulent identity document. The method may also include processing, by a second machine learning model backbone that generates a final score indicative of whether the document image depicts a fraudulent identity document, at least one or more intermediate signals.
-
公开(公告)号:US11995454B2
公开(公告)日:2024-05-28
申请号:US17890155
申请日:2022-08-17
Applicant: STRIPE, INC.
Inventor: Hassaan Markhiani , Alex Parker LeBlanc , Colin Murray McLeod , John Iksoo Song , Jotham Mcclellan Taylor, III , Daniel Garcia Diaz
IPC: G06F15/177 , G06F8/38 , G06F9/445 , H04L67/306
CPC classification number: G06F9/4451 , G06F8/38 , H04L67/306
Abstract: A method for generating a user interface includes: receiving a user request to access a software platform, the user request being associated with a user identifier; generating a user context based on the user request, the user context including a user profile associated with the user identifier; loading a data structure representing a user interface layout, the data structure including a plurality of viewport nodes, each of the viewport nodes being associated with one or more child nodes; selecting, by a computer system, a first child node from one or more child nodes of a first viewport node of the plurality of viewport nodes based on the user context to generate an evaluated data structure including a plurality of evaluated viewport nodes, each of the evaluated viewport nodes having at most one child node; and generating a customized user interface based on the evaluated data structure.
-
公开(公告)号:US20240168730A1
公开(公告)日:2024-05-23
申请号:US17990431
申请日:2022-11-18
Applicant: STRIPE, INC.
Inventor: Sushain Cherivirala , Ainsley Escorce-Jones
CPC classification number: G06F8/41 , G06F8/10 , G06F11/302
Abstract: Examples of the present disclosure describe systems and methods for remotebuild software build action-merging. In some examples, a build server receives a first software build action and a second software build action. In examples, it is determined that there is a match between a first hash value of the first software build action and a second hash value of the second software build action. In examples, only the first software build action is run from among the first software build action and the second software build action based on the match to produce a software build action result. In examples, the software build action result is returned as an output of the first software build action and an output of the second software build action.
-
公开(公告)号:US20240161090A1
公开(公告)日:2024-05-16
申请号:US17986783
申请日:2022-11-14
Applicant: STRIPE, INC.
Inventor: Sen Fang
IPC: G06Q20/36
CPC classification number: G06Q20/3674 , G06Q20/3678 , G06Q2220/00
Abstract: A proxy cryptocurrency wallet configured to: receive a pre-authorization from a user cryptocurrency wallet, the pre-authorization corresponding to a transaction requested to be executed and specifying a digital asset to purchase and a price denominated in a cryptocurrency, the user cryptocurrency wallet being configured to allow for a pre-authorization of the transaction without a sufficient amount of cryptocurrency required for the transaction being present in the user cryptocurrency wallet; in response to receiving the pre-authorization, identify if an amount of cryptocurrency in the proxy cryptocurrency wallet is sufficient to execute the transaction; and in response to identifying that the amount of cryptocurrency in the proxy cryptocurrency wallet is sufficient to execute the transaction, execute the transaction resulting in a purchase of the digital asset and a transfer of the digital asset to a recipient cryptocurrency wallet, the recipient cryptocurrency wallet being different from the proxy cryptocurrency wallet.
-
-
-
-
-
-
-
-
-