METHODS AND SYSTEMS FOR HARVESTING COMMENTS REGARDING USERS ON A NETWORK-BASED FACILITY
    1.
    发明申请
    METHODS AND SYSTEMS FOR HARVESTING COMMENTS REGARDING USERS ON A NETWORK-BASED FACILITY 有权
    收集关于用户基于网络的设备的评论的方法和系统

    公开(公告)号:US20140082063A1

    公开(公告)日:2014-03-20

    申请号:US14086805

    申请日:2013-11-21

    Applicant: eBay Inc.

    Abstract: Displaying a user interface to harvest feedback information pertaining to transactions facilitated by a computerized transaction facility includes the display of multiple feedback windows, or other distinct areas, within a user interface displayed on a display device. Each feedback window includes transaction identifier information that identifies a respective transaction. Each feedback window also includes a feedback input that receives feedback information, pertaining to an associated transaction identified by the transaction information. The feedback input is displayed, within each feedback window, to indicate an association with the respective transaction information. Accordingly, feedback input for multiple transactions may conveniently be inputted through a single user interface.

    Abstract translation: 显示用于接收由计算机化交易设施促成的交易的反馈信息的用户界面包括在显示设备上显示的用户界面内显示多个反馈窗口或其他不同区域。 每个反馈窗口包括识别相应交易的交易标识符信息。 每个反馈窗口还包括反馈输入,其接收与由交易信息标识的关联交易相关的反馈信息。 在每个反馈窗口内显示反馈输入以指示与相应交易信息的关联。 因此,可以方便地通过单个用户界面输入用于多个事务的反馈输入。

    Detecting a suspicious transaction within a network-based facility
    2.
    发明申请
    Detecting a suspicious transaction within a network-based facility 审中-公开
    检测基于网络的设施中的可疑交易

    公开(公告)号:US20140195368A1

    公开(公告)日:2014-07-10

    申请号:US14153959

    申请日:2014-01-13

    Applicant: eBay Inc.

    CPC classification number: G06Q20/382 G06Q30/08 G06Q40/04

    Abstract: Methods and associated computer-readable media to detect fraudulent activities made over a network-based facility using a machine are disclosed. Responsive to a first event with respect to the network-based facility and initiated either under a first user identity or a first set of user transaction preferences from the machine which is coupled to the network-based facility via a network, the method causes a first identifier associated with either the first user identity or the first set of user transaction preferences to be stored on the machine. Responsive to a second event initiated under either a second user identity or a second set of user transaction preferences, detecting a potentially fraudulent activity occurs by detecting a lack of correspondence between the first identifier stored on the machine and a second identifier associated with either the second user identity or the second set of user transaction preferences.

    Abstract translation: 公开了用于检测使用机器的基于网络的设施进行的欺诈活动的方法和相关联的计算机可读介质。 响应于关于基于网络的设施的第一事件,并且在来自通过网络耦合到基于网络的设施的机器的第一用户身份或第一组用户事务偏好下发起,所述方法引起第一事件 标识符与要存储在机器上的第一用户身份或第一组用户事务偏好相关联。 响应于在第二用户身份或第二组用户事务偏好下发起的第二事件,通过检测存储在机器上的第一标识符与第二标识符相关联的第二标识符之间的对应关系的检测来发现潜在的欺诈活动 用户身份或第二组用户事务偏好。

Patent Agency Ranking