Multi-legged network attribution using tracking tokens and attribution stack

    公开(公告)号:US11750598B2

    公开(公告)日:2023-09-05

    申请号:US16517004

    申请日:2019-07-19

    申请人: eBay Inc.

    IPC分类号: H04L9/40 G06Q20/40

    CPC分类号: H04L63/0853 G06Q20/401

    摘要: Technologies are shown for network attribution tracking for a multi-legged transaction that involve receiving a tracking token registration request from a partner service, generating a tracking token associated with the partner service, adding an entry to an attribution stack for a transaction, where the entry associates the tracking token with the partner service, and returning the tracking token to the partner service. Receiving a tracking token request can include determining whether the tracking token request includes a previously generated tracking token and using the previously generated tracking token to identify the attribution stack for the transaction. Adding an entry to an attribution stack for a transaction can include adding the entry to the attribution stack identified for the transaction. Attribution for a transaction can be obtained by accumulating attribution entities from each entry in the attribution stack identified for the transaction.

    Third-party application risk assessment in an authorization service

    公开(公告)号:US11503062B2

    公开(公告)日:2022-11-15

    申请号:US16870721

    申请日:2020-05-08

    申请人: eBay Inc.

    摘要: Technologies are shown for application risk assessment in an authentication service where an authorization request is received from a third party application calling an Application Programming Interface (API). Risk assessment policies that pertain to behavioral characteristics, such as API usage patterns or past delegation of permissions, are applied to the authorization request to obtain a risk assessment score. If the risk assessment score does not exceed a risk threshold, then an authorization message is sent in response to the authorization request. If the risk assessment score exceeds the risk threshold, then remedial action, such as suspending the application, limiting the available actions, or sending a notification to a trusted security application, is executed for an account associated with the third party application. Machine learning can be applied to historical behavioral data to generate the risk assessment policies.

    Complex composite tokens
    3.
    发明授权

    公开(公告)号:US11758406B2

    公开(公告)日:2023-09-12

    申请号:US17977628

    申请日:2022-10-31

    申请人: eBay Inc.

    摘要: Technologies are shown for trust delegation that involve receiving a first request from a subject client and responding by sending a first token having first permissions to the subject client. A second request from a first actor includes the first token and responding involves linking the first actor to the subject client in a trust stack and sending a second token to the first actor with second permissions, the second token being a first complex token that identifies the subject client and the first actor. A third request from a second actor includes the second token and responding to the third request involves linking the second actor to the first actor in the trust stack, and sending a third token to the second actor partner with third permissions, the third token being a second complex token that identifies the first actor and the second actor.

    THIRD-PARTY APPLICATION RISK ASSESSMENT IN AN AUTHORIZATION SERVICE

    公开(公告)号:US20210352097A1

    公开(公告)日:2021-11-11

    申请号:US16870721

    申请日:2020-05-08

    申请人: eBay Inc.

    摘要: Technologies are shown for application risk assessment in an authentication service where an authorization request is received from a third party application calling an Application Programming Interface (API). Risk assessment policies that pertain to behavioral characteristics, such as API usage patterns or past delegation of permissions, are applied to the authorization request to obtain a risk assessment score. If the risk assessment score does not exceed a risk threshold, then an authorization message is sent in response to the authorization request. If the risk assessment score exceeds the risk threshold, then remedial action, such as suspending the application, limiting the available actions, or sending a notification to a trusted security application, is executed for an account associated with the third party application. Machine learning can be applied to historical behavioral data to generate the risk assessment policies.

    Multi-legged network attribution using tracking tokens and attribution stack

    公开(公告)号:US11916898B2

    公开(公告)日:2024-02-27

    申请号:US18205039

    申请日:2023-06-02

    申请人: eBay Inc.

    IPC分类号: H04L9/40 G06Q20/40

    CPC分类号: H04L63/0853 G06Q20/401

    摘要: Technologies are shown for network attribution tracking for a multi-legged transaction. In accordance with some aspects, a first token is provided to a first partner service. A token request is received from a second partner service, wherein the token request includes the first token. A second token is associated with the first token, and the second token is provided to the second partner service. A transaction is attributed to the first partner service and the second partner service based on the association of the second token with the first token.

    Application programming interface authorization transformation system

    公开(公告)号:US11368461B2

    公开(公告)日:2022-06-21

    申请号:US16588958

    申请日:2019-09-30

    申请人: eBay Inc.

    IPC分类号: H04L9/40 H04W12/084

    摘要: Systems and methods for transforming an API authorization to a UX session are provided. An authorization server receives, from a third-party application developed by a third-party, a request to access a user experience (UX) session on behalf of a user. The request comprises an access token previously granted by the authorization server to the third-party application in response to consent, by the user, to allow the third-party application to perform actions on behalf of the user. In one embodiment, this previous authorization comprises an Open Authorization (OAuth). In response to receiving the request the authorization server transforms the access token into a single sign on (SSO) link with a session token. The authorization server then returns the SSO link that includes the session token the third-party application hosted by the third-party. The SSO link causes the third-party application to redirect the user to the UX session corresponding to the SSO link.

    Messaging, Protocols and APIs for Dynamic Inventory Provision by One-Time Codeshares Across Platforms

    公开(公告)号:US20210090109A1

    公开(公告)日:2021-03-25

    申请号:US17110787

    申请日:2020-12-03

    申请人: eBay Inc.

    IPC分类号: G06Q30/02 H04L29/08 G06Q30/06

    摘要: Described are computing systems and methods, computer program products, and application programming interfaces (APIs) or web requests that facilitate code sharing between operators of e-commerce platforms. In accordance with various embodiments, a codeshare principal shares its inventory and other functionality with a codeshare partner to thereby expand its customer base. Requests from the partner to the principal include identifiers of the partner as well as the partner's user, allowing the principal to track its extended customer base and tailor restricted offers to users of affiliated partner systems.

    Multi-dimensional commerce platform

    公开(公告)号:US11295373B2

    公开(公告)日:2022-04-05

    申请号:US16805965

    申请日:2020-03-02

    申请人: eBay Inc.

    IPC分类号: G06Q30/06

    摘要: Aspects of the present disclosure relate to a multi-dimensional commerce platform that may be utilized for the communication of data. Aspects of the multi-dimensional commerce platform may include various functional components to facilitate a system to receive inventory data at a first server associated with the multi-dimensional commerce platform, provide a second server associated with a third-party (e.g., a third party seller/distributor) access to the inventory data, alter or modify the inventory data based on attributes of the second server, and cause display of a presentation of the modified inventory data at a client device.