Abstract:
A method and apparatus for processing a transaction between a merchant system and a customer system, the customer system associated with a customer of the merchant are described. The method may include receiving, at a commerce platform, a transaction request from the merchant system, wherein the transaction request is generated by the merchant system and comprises a card identifier and encrypted payment card data, wherein the card identifier is determined from card data for a payment card used in the transaction and the encrypted payment card data comprises at least an encryption of a payment account number. The method may also include decrypting, by the commerce platform, the encrypted payment card data using an encryption key selected based on the card identifier, the encryption key associated with the commerce platform. Furthermore, the method may include authorizing, by the commerce platform in communication with one or more authorization systems, the transaction using the decrypted payment card data.
Abstract:
Embodiments of the present disclosure include systems and methods for identifying people in an image that contains more than one face images. In embodiments, a query feature vector that represents features is extracted from each face image. In embodiments, each query feature vector is compared to image feature vectors in a database and a set of candidate vectors is selected among the image feature vectors. Then, a set of user accounts that is associated with the set of candidate vectors is selected. The strengths of connection in a network between user accounts in a set of candidate user accounts corresponding to a face image and user accounts in a different set of candidate user accounts corresponding to a different face image may be determined. In embodiments, user accounts that has the highest strength of connection are selected and used to identify the persons corresponding to the face images.
Abstract:
Described herein are systems and methods for predicting a metric value for an entity associated with a query node in a graph that represents a network. In embodiments, using a user's profile as the query node, a metric about that user may be estimated based, at least in part, as a function of how well connected the query node is to a whitelist of “good” users/nodes in the network, a blacklist of “bad” users/nodes in the network, or both. In embodiments, one or more nodes or edges may be weighted when determining a final score for the query node. In embodiments, the final score regarding the metric may be used to take one or more actions relative to the query node, including accepting it into a network, allowing or rejecting a transaction, assigning a classification to the node, using the final score to compute another estimate for a node, etc.
Abstract:
A method and apparatus for a certificate authority system providing authentication to a plurality of devices associated with an organization are described. The method may include receiving, at the certificate authority system, a request from a device to sign authentication information of the device, wherein the device is associated with the organization. The method may also include sending a challenge to the device to perform an action with a system other than the certificate authority system, and receiving the response to the challenge from the device. Furthermore, the method may include verifying that the response was generated correctly based on the challenge, and signing the authentication information of the device with one or more keys of the certificate authority system as an authentication of an identity of the device.
Abstract:
In embodiments, methods and systems for implementing source code extraction are provided. Source code extraction facilitates processing obfuscated byte code and extracting source code representations of original source code of applications. Source code extraction is implemented based on leveraging and monitoring an interpreter (e.g., a software interpreter running on a virtual machine) when portions of obfuscated byte code (i.e., obfuscated compiled version of source code) are loaded or executed using the interpreter. In operation, the obfuscated byte code is accessed at the interpreter. The interpreter, processing the obfuscated byte code, is monitored using a source code extraction manager that supports instrumentation instances associated with functions of the obfuscated byte code. Instruction sequences of functions that the interpreter is processing are recorded using the source code extraction manager. Source code representations are generated based on the instruction sequences that are recorded while monitoring the functions that are processed by the interpreter.
Abstract:
Method to generate onboarding flow for application starts with on-boarding server receiving request from electronic device to activate application. On-boarding server determines whether request is initial request. Request is determined to be initial request when minimal set of information associated with user is not stored in on-boarding server. When request is determined to be initial request, on-boarding server signals to electronic device to display request for minimal set of information associated with user which includes at least one of: user identification, legal name, phone number, or email address. Minimal set of information associated with user is then received and stored in on-boarding server. On-boarding server signals to allow initial access to application. Signaling to allow initial access includes signaling that user requires access to payment processing hardware to process user's physical payment instrument. On-boarding server receives default payment information entered using payment processing hardware. Other embodiments are also described.
Abstract:
In embodiments, methods and systems for order management and processing based on a distributed commerce platform are provided. A distributed commerce platform supports end-to-end integrated product publication, order-management and payment services. In particular, the distributed commerce platform supports components based on Application Programming Interfaces (API) that standardize the implementation of a distributed commerce solution or configuration of off-site buying experiences. Using the distributed commerce platform, merchants can concurrently offer, sell, and process orders for products through a plurality of different affiliate channels. The distributed commerce platform can also be implemented as a federated portal from which a merchant can identify affiliate channels to publish product objects, access the plurality of affiliate channels and define configurations for processing objects of the merchant's distributed commerce solution. The configurations can be accessed during a purchase flow such that orders from a channel are processed based on the specific attributes identified in the configurations.
Abstract:
Various embodiments described herein support or provide for data management operations, such as receiving a request to access a webpage; determining that accessing the webpage requires secure access via a secure browser; identifying a virtual machine that is configured to allow access to the webpage; and causing display of the webpage in the secure browser embedded in a local browser of the sender device.
Abstract:
Aspects of the subject technology include receiving from a user device a request for obtaining data associated with the user device. The request is addressed to a destination device. Aspects also include determining with a first controller whether to transmit the request to the destination device via a first path. The determination is based on a first success rate of the first path. Aspects also include transmitting the request to the destination device via the first path in response to a determination to transmit the request to the destination device via the first path. Aspects also include determining, with a second controller, whether to transmit the request to the destination device via a second path, in response to a determination not to transmit the request via the first path. The determination is based on a second success rate of the second path.
Abstract:
A method and apparatus for executing data access requests in a distributed storage system are described. The method can include initiating, by a service application executing on a first computing node, a data access request to manage service data using a plurality of distributed data storage nodes that store service data for the service. The method also includes communicating, by the service application to a router application executing on the first computing node, the data access request, and determining, by the router application, at least one data storage node from the plurality of distributed data storage nodes that can satisfy the data access request. The method also includes transmitting, by the router application to at least one data storage node, the data access request for fulfillment of the data access request on behalf of the service application.