-
公开(公告)号:US20240104157A1
公开(公告)日:2024-03-28
申请号:US18524648
申请日:2023-11-30
Applicant: eBay Inc.
Inventor: Tyler Rolan Corley , Winfred James Jebasingh , Damodaran Chingleput Sathyakumar , Shobith Srinivas Alva , Jack Charles Maize
IPC: G06F16/955 , G06F16/957 , G06F16/958 , G06N20/00 , G06Q50/00
CPC classification number: G06F16/9558 , G06F16/9577 , G06F16/986 , G06N20/00 , G06Q50/01
Abstract: Dynamic link preview generation techniques are described that overcome the challenges of conventional techniques by supporting link preview generation by a content provider system that proves the digital content via a respective network address. In one example, a content provider system, based on a request received from a service provider system, identifies a communication platform of the service provider system that is to be used to communicate the shared link. Upon identifying the communication platform, the content provider system locates customization data that describes how the link preview is to be generated for the communication platform. In response, the content provider system renders digital content available via the network address to generate the link preview.
-
公开(公告)号:US11941685B2
公开(公告)日:2024-03-26
申请号:US17173660
申请日:2021-02-11
Applicant: eBay Inc.
Inventor: Yuyangzi Fu
IPC: G06Q30/0601 , G06F9/455 , G06F3/01
CPC classification number: G06Q30/0643 , G06F9/455 , G06Q30/0601 , G06F3/011
Abstract: Virtual environment arrangement and configuration techniques are described. In one example, virtualization techniques are employed to generate a virtual environment as implemented via a virtual reality platform by one or more computing devices. The virtual environment includes virtual stores arranged along virtual streets. Virtual digital content is included in the stores, such as to initiate conversion of a good or service represented by the content. Configuration of the virtual environment is based on user, provider, and/or machine learning inputs.
-
63.
公开(公告)号:US11930067B2
公开(公告)日:2024-03-12
申请号:US17588501
申请日:2022-01-31
Applicant: eBay Inc.
Inventor: Rodrigo Madanes
Abstract: In various exemplary embodiments, a system and an associated method for presenting a commerce application to an electronic device of an end-user. The method includes establishing electronic communications from the end-user to a first server (e.g., an electronic marketplace) in response to the end-user accessing a widget presented by the first server, and establishing electronic communications between the first server and a second server. The second server may be another electronic marketplace. The first server sends a chrome to the end-user. Substantially concurrent with the first server sending a chrome, the second server transmits electronically an Iframe to be placed within the chrome on a browser on an electronic device of the end-user. The blending of the chrome and the Iframe is transparent to the end user; thus, the end-user may be unaware that additional information (e.g., in terms of the Iframe and any accompanying metadata) is being received from the second server.
-
公开(公告)号:US11928428B2
公开(公告)日:2024-03-12
申请号:US18120557
申请日:2023-03-13
Applicant: eBay Inc.
Inventor: Dishan Gupta , Ajinkya Gorakhnath Kale , Stefan Boyd Schoenmackers , Amit Srivastava
IPC: G06F40/274 , G06F40/279 , G06V30/194
CPC classification number: G06F40/274 , G06F40/279 , G06V30/194
Abstract: Understanding emojis in the context of online experiences is described. In at least some embodiments, text input is received and a vector representation of the text input is computed. Based on the vector representation, one or more emojis that correspond to the vector representation of the text input are ascertained and a response is formulated that includes at least one of the one or more emojis. In other embodiments, input from a client machine is received. The input includes at least one emoji. A computed vector representation of the emoji is used to look for vector representations of words or phrases that are close to the computed vector representation of the emoji. At least one of the words or phrases is selected and at least one task is performed using the selected word(s) or phrase(s).
-
公开(公告)号:US20240070606A1
公开(公告)日:2024-02-29
申请号:US18387989
申请日:2023-11-08
Applicant: eBay Inc.
Inventor: Jonathan Gabbai
IPC: G06Q10/083 , H04B1/38
CPC classification number: G06Q10/0838 , H04B1/38
Abstract: Systems and methods change a user interface for the purpose of pairing a shipping container with an item that is intended to be shipped in the shipping container. Example embodiments include a machine-implemented method for accessing a shipping request, detecting a radio signal from a candidate container using a radio receiver, detecting an impact between a pairing device and a query container using an accelerometer, determining that the query container is the candidate container, and generating a shipping record that correlates the shipping container and the item. The device can further determine that the query container is the candidate container based on the signal strength and change in signal strength of one or more signals. The device can further detect an impact between the pairing device and the query container by ranking one or more sets of acceleration data collected by the accelerometer.
-
公开(公告)号:US20240070013A1
公开(公告)日:2024-02-29
申请号:US18387241
申请日:2023-11-06
Applicant: eBay Inc.
Inventor: Timothy David ROBISON , Steven Bruce WEST , Sarang Mukund KULKARNI , Douglas Wayne HATHAWAY
IPC: G06F11/07
CPC classification number: G06F11/0793 , G06F11/0706 , G06F11/0757
Abstract: Systems and methods for are provided for predicting impending failure of a database and preemptively initiating mitigating failover actions, for example by shedding connections or redirecting connection requests to an alternate database that can fulfill resources being requested. In an example embodiment, to detect a slow or unstable database, connection wait times are monitored over a rolling window of time intervals, a quantity of intervals in which at least one excessive wait time event occurred are counted during the time window, and if the quantity exceeds a threshold, the database is deemed unavailable, thereby triggering connection adjustments.
-
公开(公告)号:US11916727B2
公开(公告)日:2024-02-27
申请号:US14901376
申请日:2015-01-23
Applicant: eBay Inc.
Inventor: Sharad R. Murthy , Xinglang Wang , Rajeshwari Muthupandian
IPC: H04L41/0806 , G06F16/2455 , H04L12/18 , H04L41/5003 , H04L43/0805 , H04L47/52 , H04L49/90 , H04L61/5007 , H04L69/16
CPC classification number: H04L41/0806 , G06F16/24558 , H04L12/1859 , H04L41/5003 , H04L43/0805 , H04L47/522 , H04L49/90 , H04L61/5007 , H04L69/16
Abstract: Disclosed are a system comprising a computer-readable storage medium storing at least one program, and a computer-implemented method for event messaging over a network. An identification module receives first data identifying consumer devices available to receive event messages linked to a topic. The identification module receives second data identifying a producer device available to provide event messages linked to the topic. A provisioning module links a plurality of values to respective consumer devices that are linked to the topic. A scheduler module accesses a first data message linked to the topic. The first data message includes a key value. The scheduler module provides the first data message to a selected one of the consumer devices based on a comparison of the key value and the plurality of values of the respective consumer devices.
-
68.
公开(公告)号:US20240061562A1
公开(公告)日:2024-02-22
申请号:US18385146
申请日:2023-10-30
Applicant: eBay Inc.
Inventor: Ahmed Reda Mohamed Saeid Abdulaal , Bass Chorng
Abstract: Described are computing systems and methods configured to detect a small, but meaningful, anomaly within one or more metrics associated with a platform. The system displays visuals of the metrics so that a user monitoring the platform can effectively notice a problem associated with the anomaly and take appropriate action to remediate the problem. An operational visual includes a radar-based visual with a heatmap arranging metrics, and a node representing a state of the metrics. Moreover, the system uses an ensemble of unsupervised machine learning algorithms for multi-dimensional clustering of hundreds of thousands of monitored metrics. Via the visuals and the implementation of the machine learning algorithms, the described techniques provide an improved way of representing and simulating many metrics being monitored for a platform. Moreover, the techniques are configured to expose actionable and useful information associated with the platform in a manner that can be effectively interpreted.
-
公开(公告)号:US20240054437A1
公开(公告)日:2024-02-15
申请号:US18383590
申请日:2023-10-25
Applicant: eBay Inc.
Inventor: Constanza Maria HEATH , Ethan Benjamin RUBINSON
IPC: G06Q10/0832 , G06Q10/0833 , G06Q10/0835 , H04L9/06 , G06K19/07 , G06F16/182 , G06Q20/38 , G06Q50/28 , G06K7/14 , H04L9/32 , G06F16/23 , G06F16/955 , G06Q20/40 , G06Q30/08 , H04L9/08 , G06Q10/0834 , G06Q30/0283
CPC classification number: G06Q10/0832 , G06Q10/0833 , G06Q10/08355 , H04L9/0637 , G06K19/0717 , G06F16/1824 , G06Q20/382 , G06Q50/28 , H04L9/0643 , G06K7/1408 , G06Q10/0835 , H04L9/3263 , G06F16/2379 , G06F16/955 , G06Q20/3825 , G06Q20/4014 , G06Q30/08 , H04L9/0869 , H04L9/3242 , G06Q10/08345 , G06Q30/0283 , H04L9/50
Abstract: The disclosed technologies include receiving a request from a second computing device to verify ownership of a blockchain address. A challenge content is generated and sent to the requestor. A signature is received comprising a hash of the challenge content generated using a private key. A public key corresponding to the private key is obtained, and the signature is validated using the public key. In response to validating the signature, a characteristic is associated with a user associated with the blockchain address.
-
公开(公告)号:US11899783B2
公开(公告)日:2024-02-13
申请号:US17571371
申请日:2022-01-07
Applicant: EBAY INC.
Inventor: Venkata Siva Vijayendra Bhamidipati , Michael Chan , Derek Chamorro , Arpit Jain , Ashok Srinivasa Murthy
CPC classification number: G06F21/54 , G06Q20/3678 , G06Q20/405 , H04L9/0637
Abstract: Technologies are shown for system level function based access control for smart contract execution on a blockchain. Access control rules control function calls at a system level by utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for execution of a smart contract. The access control rules are applied to the function call stack to allow or prohibit specific functions or function call chains. Access control rules can also define allowed or prohibited parameter data in the function call chain. If the function call chain or parameters do not meet the requirements defined in the access control rules, then the function call can be blocked from executing or completing execution. The access control rules can produce sophisticated access control policies based on complex function call chains.
-
-
-
-
-
-
-
-
-