ONLINE TRANSACTION METHOD, SYSTEM, AND COMPUTER-READABLE NON-TRANSITORY MEDIUM FOR IDENTIFYING COUNTERFEITS

    公开(公告)号:US20250029120A1

    公开(公告)日:2025-01-23

    申请号:US18784007

    申请日:2024-07-25

    Applicant: eBay Inc.

    Abstract: Systems and methods are provided for identifying an item that is counterfeit in the marketplace. Sales of counterfeit items in marketplaces, particularly at auction places, have been an issue. There has been a need to automatically detect an item that is counterfeit when a seller submits the item for sale in the marketplace. The disclosed technology receives information about an item for transaction. The information associated with the item includes metadata related to the item and an image of the item. The method uses a database of items that are known to be not for sale (e.g., a stock photo) or is otherwise a counterfeit item. The method matches the data of the item against the data in the database and identifies the item as counterfeit based on the matched result. The matching operation includes analyzing the data (e.g., image analyses using features of the image data). Use of the disclosed technology enables automatic and efficient detection of counterfeit items as a seller submits the item for sale in the marketplace, thereby increasing reliability of the marketplace from buyers' perspective.

    Transaction security techniques
    2.
    发明授权

    公开(公告)号:US12034851B2

    公开(公告)日:2024-07-09

    申请号:US17381461

    申请日:2021-07-21

    Applicant: eBay Inc.

    CPC classification number: H04L9/32 H04L9/30

    Abstract: Aspects of the present disclosure relate to transaction security techniques. In examples, a resource platform causes a set of executable verification instructions associated with an authorization processor to be executed by a user computing device. The verification instructions may be encrypted by the authorization processor for decryption by the user computing device. The verification instructions may generate verification information associated with the user computing device. In some instances, the verification information may be encrypted for decryption by the authorization processor. The encrypted verification instructions may be provided to the authorization processor (e.g., via the resource platform), such that the authorization processor may provide an indication to the resource platform as to whether the verification is verified. Accordingly, if the verification information is verified a transaction associated with the resource platform may proceed or, as another example, the user computing device may be granted access to information.

    TRANSACTION SECURITY TECHNIQUES
    3.
    发明申请

    公开(公告)号:US20250007712A1

    公开(公告)日:2025-01-02

    申请号:US18735899

    申请日:2024-06-06

    Applicant: eBAY iNC.

    Abstract: Aspects of the present disclosure relate to transaction security techniques. In examples, a resource platform causes a set of executable verification instructions associated with an authorization processor to be executed by a user computing device. The verification instructions may be encrypted by the authorization processor for decryption by the user computing device. The verification instructions may generate verification information associated with the user computing device. In some instances, the verification information may be encrypted for decryption by the authorization processor. The encrypted verification instructions may be provided to the authorization processor (e.g., via the resource platform), such that the authorization processor may provide an indication to the resource platform as to whether the verification is verified. Accordingly, if the verification information is verified a transaction associated with the resource platform may proceed or, as another example, the user computing device may be granted access to information.

    Online transaction method, system, and computer-readable non-transitory medium for identifying counterfeits

    公开(公告)号:US12051079B2

    公开(公告)日:2024-07-30

    申请号:US17243516

    申请日:2021-04-28

    Applicant: eBay Inc.

    CPC classification number: G06Q30/0185 G06Q30/0248 G06Q30/0609

    Abstract: Systems and methods are provided for identifying an item that is counterfeit in the marketplace. Sales of counterfeit items in marketplaces, particularly at auction places, have been an issue. There has been a need to automatically detect an item that is counterfeit when a seller submits the item for sale in the marketplace. The disclosed technology receives information about an item for transaction. The information associated with the item includes metadata related to the item and an image of the item. The method uses a database of items that are known to be not for sale (e.g., a stock photo) or is otherwise a counterfeit item. The method matches the data of the item against the data in the database and identifies the item as counterfeit based on the matched result. The matching operation includes analyzing the data (e.g., image analyses using features of the image data). Use of the disclosed technology enables automatic and efficient detection of counterfeit items as a seller submits the item for sale in the marketplace, thereby increasing reliability of the marketplace from buyers' perspective.

    TRANSACTION RISK ASSESSMENT USING MACHINE-TRAINED MODELS

    公开(公告)号:US20230368207A1

    公开(公告)日:2023-11-16

    申请号:US17745791

    申请日:2022-05-16

    Applicant: eBay Inc.

    CPC classification number: G06Q20/4016

    Abstract: Systems and methods are directed to assessing risk and triggering a mitigation action prior to executing an offer based on a level of risk. Risk models are trained with data extracted from past transactions, whereby the risk models are configured to determine levels of risk for potential transactions. A request to make an offer on a listing representing an item is received. In response, the system identifies one or more account attributes associated with the user account and determines a level of risk by applying the one or more account attributes to one or more of the risk models. If the level of risk transgresses a threshold, the system triggers the automatic payment flow prior to executing the offer, which includes causing display of an information request user interface through which payment and shipping information is received. Responsive to receiving the payment and shipping information, the offer is executed.

    TRANSACTION SECURITY TECHNIQUES
    6.
    发明申请

    公开(公告)号:US20230024967A1

    公开(公告)日:2023-01-26

    申请号:US17381461

    申请日:2021-07-21

    Applicant: eBay Inc.

    Abstract: Aspects of the present disclosure relate to transaction security techniques. In examples, a resource platform causes a set of executable verification instructions associated with an authorization processor to be executed by a user computing device. The verification instructions may be encrypted by the authorization processor for decryption by the user computing device. The verification instructions may generate verification information associated with the user computing device. In some instances, the verification information may be encrypted for decryption by the authorization processor. The encrypted verification instructions may be provided to the authorization processor (e.g., via the resource platform), such that the authorization processor may provide an indication to the resource platform as to whether the verification is verified. Accordingly, if the verification information is verified a transaction associated with the resource platform may proceed or, as another example, the user computing device may be granted access to information.

Patent Agency Ranking