-
公开(公告)号:US20250125969A1
公开(公告)日:2025-04-17
申请号:US18988512
申请日:2024-12-19
Applicant: Stripe, Inc.
Inventor: Ryan Drapeau , Leela Senthil Nathan , Kefeng Chen , Ryan Koven , Joseph Kirwin
IPC: H04L9/32 , G06F9/54 , G06N20/00 , G06Q20/08 , G06Q20/34 , G06Q20/38 , G06Q20/40 , G06Q30/018 , G06Q40/02 , H04L67/146
Abstract: Described herein are systems and methods for fraud detection in network operations. The method may receive a request for execution of a network operation, the request including a first identifier associated with a user device. The method may extract, using the first identifier, attributes of the network operation and user device attributes. The method may extract a second identifier previously generated for the user device. The method may execute a cryptographic protocol using the second identifier and a cryptographic key to generate a first authentication code. The method may execute a machine learning model to predict a likelihood of fraud using mismatched attributes based on determining that the first authentication code matches a second authentication code parsed from the first identifier. The method may reject the request to execute the network operation in response to determining that a prediction of likelihood of fraud fails to satisfy a security threshold.
-
公开(公告)号:US12212681B1
公开(公告)日:2025-01-28
申请号:US17130574
申请日:2020-12-22
Applicant: Stripe, Inc.
Inventor: Ryan Drapeau , Leela Senthil Nathan , Kefeng Chen , Ryan Koven , Joseph Kirwin
IPC: H04L9/32 , G06F9/54 , G06N20/00 , G06Q20/08 , G06Q20/34 , G06Q20/38 , G06Q20/40 , G06Q30/018 , G06Q40/02 , H04L67/146
Abstract: A method and apparatus for using cryptographically signed secure identifiers to detect fraud during network based transactions are described. The method may include receiving a transaction from a user device, the transaction comprising a secure identifier purported to be associated with the user device, and the transaction further comprising transaction data. The method may also include extracting a first identifier and a second identifier from the secure identifier purported to be associated with the user device, and then regenerating a true second identifier using the first identifier. Furthermore, when it is determined that the true second identifier matches the second identifier extracted from the secure identifier purported to be associated with the user device, the method may include determining that the secure identifier is valid, and processing the transaction based at least in part on the determination that the secure identifier is valid.
-