-
公开(公告)号:US20190392514A1
公开(公告)日:2019-12-26
申请号:US16561866
申请日:2019-09-05
Applicant: eBay Inc.
Inventor: Farhang Kassaei , Amanda A. Earhart , Snezana Sahter , Srinivasu Gottipati , Lars Wright , Craig Rowley , Lakshman Shyam Sundar Maddali , Nainesh Nayudu
Abstract: In various exemplary embodiments, a system and associated method to perform an adaptive risk-based assessment of a user is disclosed. A method includes receiving a request from a user to perform an action at an electronic marketplace, retrieving a plurality of risk assessment factors associated with the action and the user, performing a risk assessment process on the risk assessment factors to identify a risk mitigation process, requesting that the user perform the identified risk mitigation process, and allowing the user to perform the action in response to the user completing the risk mitigation.
-
公开(公告)号:US11893627B2
公开(公告)日:2024-02-06
申请号:US16561866
申请日:2019-09-05
Applicant: eBay Inc.
Inventor: Farhang Kassaei , Amanda A. Earhart , Snezana Sahter , Srinivasu Gottipati , Lars Wright , Craig Rowley , Lakshman Shyam Sundar Maddali , Nainesh Nayudu
IPC: G06Q40/00 , G06Q10/00 , G06Q30/0601
CPC classification number: G06Q40/00 , G06Q10/00 , G06Q30/0601
Abstract: In various exemplary embodiments, a system and associated method to perform an adaptive risk-based assessment of a user is disclosed. A method includes receiving a request from a user to perform an action at an electronic marketplace, retrieving a plurality of risk assessment factors associated with the action and the user, performing a risk assessment process on the risk assessment factors to identify a risk mitigation process, requesting that the user perform the identified risk mitigation process, and allowing the user to perform the action in response to the user completing the risk mitigation.
-
公开(公告)号:US11360955B2
公开(公告)日:2022-06-14
申请号:US15934353
申请日:2018-03-23
Applicant: eBay Inc.
Inventor: Scot Fraser Hamilton , Rekha Patel , Satya Seethasridhar , Nicholas Whyte , Parikshit Arora , Snezana Sahter
Abstract: In various example embodiments, a system and method for versioning data in an unstructured data store are presented. The method includes generating a first record in the unstructured data store based on a version of a second record in the unstructured data store. The method further includes initializing a parent version identifier of the first record based on the version of the second record. The method further includes comparing the parent version identifier of the first record to a version identifier of the second record. The method further includes determining whether the first record is consistent based on the comparison.
-
公开(公告)号:US20190294708A1
公开(公告)日:2019-09-26
申请号:US15934353
申请日:2018-03-23
Applicant: eBay Inc.
Inventor: Scot Fraser Hamilton , Rekha Patel , Satya Seethasridhar , Nicholas Whyte , Parikshit Arora , Snezana Sahter
IPC: G06F17/30
Abstract: In various example embodiments, a system and method for versioning data in an unstructured data store are presented. The method includes generating a first record in the unstructured data store based on a version of a second record in the unstructured data store. The method further includes initializing a parent version identifier of the first record based on the version of the second record. The method further includes comparing the parent version identifier of the first record to a version identifier of the second record. The method further includes determining whether the first record is consistent based on the comparison.
-
公开(公告)号:US20190108254A1
公开(公告)日:2019-04-11
申请号:US16195703
申请日:2018-11-19
Applicant: eBay Inc.
Inventor: Marc Delingat , Snezana Sahter , Liangjie Xu
Abstract: Systems and methods for multi-dimensional query statement modification are described. A system presents a user interface including a first plurality of graphical elements representing a plurality of activity dimensions to a user. The system detects a user selection of a first activity dimension and a second user selection of a first attribute of the first activity dimension without a selection of the second attribute. The system searches objects using a search query based on the first activity dimension and the first attribute to return search results including a first object published on a network-based publication system by a client. The system provides a notification message to the user responsive to identifying feedback information that is received from a trading partner of the client as transgressing a first threshold. The feedback information is identified based on the first object and the second attribute that is not selected from the user interface.
-
公开(公告)号:US20180314848A1
公开(公告)日:2018-11-01
申请号:US16027600
申请日:2018-07-05
Applicant: eBay Inc.
Inventor: Snezana Sahter , Arumugam Alwarappan , Mahendar Madhavan , Mallikarjuna Potta
CPC classification number: G06F21/6227 , G06F16/22 , G06F16/284 , G06F21/6245 , G06F21/6254 , H04L63/0209 , H04L63/102
Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.
-
公开(公告)号:US20180129820A1
公开(公告)日:2018-05-10
申请号:US15345808
申请日:2016-11-08
Applicant: eBay Inc.
Inventor: Snezana Sahter , Arumugam Alwarappan , Mahendar Madhavan , Mallikarjuna Potta
CPC classification number: G06F21/6227 , G06F17/30312 , G06F17/30595 , G06F21/6245 , G06F21/6254 , H04L63/0209 , H04L63/102
Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.
-
公开(公告)号:US11615201B2
公开(公告)日:2023-03-28
申请号:US16716639
申请日:2019-12-17
Applicant: eBay Inc.
Inventor: Snezana Sahter , Arumugam Alwarappan , Mahendar Madhavan , Mallikarjuna Potta
Abstract: Methods, systems, and programs are presented for securing user-address information. A first memory is configured according to a first table that does not include information about user identifiers. Each entry in the first table includes a physical location identifier and information about a physical location. A second memory is configured according to a second table, where each entry in the second table includes the physical location identifier and an account identifier of a user for accessing a service. The first and second tables are configured to separate profile information from the address information of the user. Additionally, a firewall is configured to control access to the second memory. The firewall defines an authentication zone including the second memory but not the first memory, where access to the second memory by internal services is allowed and direct access by the user to the second memory is denied.
-
公开(公告)号:US10133772B2
公开(公告)日:2018-11-20
申请号:US15091357
申请日:2016-04-05
Applicant: eBay Inc.
Inventor: Marc Delingat , Snezana Sahter , Liangjie Xu
Abstract: Systems and methods for multi-dimensional query statement modification are described. A system presents a user interface including a first plurality of graphical elements representing a plurality of activity dimensions to a user. The system detects a user selection of a first activity dimension and a second user selection of a first attribute of the first activity dimension without a selection of the second attribute. The system searches objects using a search query based on the first activity dimension and the first attribute to return search results including a first object published on a network-based publication system by a client. The system provides a notification message to the user responsive to identifying feedback information that is received from a trading partner of the client as transgressing a first threshold. The feedback information is identified based on the first object and the second attribute that is not selected from the user interface.
-
公开(公告)号:US20180082364A1
公开(公告)日:2018-03-22
申请号:US15818126
申请日:2017-11-20
Applicant: eBay Inc.
Inventor: Farhang Kassaei , Amanda A. Earhart , Snezana Sahter , Srinivasu Gottipati , Lars Wright , Craig Rowley , Lakshman Shyam Sundar Maddali , Nainesh Nayudu
CPC classification number: G06Q40/00 , G06Q10/00 , G06Q30/0601
Abstract: In various exemplary embodiments, a system and associated method to perform an adaptive risk-based assessment of a user is disclosed. The method includes assigning a risk assessment process to the user and providing a plurality of assessment factors to the risk assessment process. The plurality of assessment factors are based on both the user (e.g., previously assessed factors, residence, phone number, address, etc.) and one or more actions the user may perform (e.g., selling an item in an electronic marketplace and the value of the item). A post-action analysis of the risk assessment process is performed. The risk assessment process can be modified based on a determination of the post-action analysis.
-
-
-
-
-
-
-
-
-