Multi-user cross-device tracking
    1.
    发明授权

    公开(公告)号:US11782958B2

    公开(公告)日:2023-10-10

    申请号:US17496501

    申请日:2021-10-07

    发明人: Wira Pradjinata

    摘要: Embodiments collect, from an event stream having both client-side and server-side information from multiple tracking sources, user interaction records for a web application and supporting systems. The records are stored in a data store, and are retroactively correlated with conclusive user identifiers and, if applicable, with areas of interest. Attribution of interaction records to conclusive identifiers and areas of interest is based on links that have been established between identifiers. Established identifier links may be subject to one or more link removal criteria. If link removal criteria is satisfied for an established link, the link is broken. Once a link is broken, interaction records, found in the data store, that are associated with the inconclusive identifier of the broken link are no longer associated with the conclusive identifier of the broken link. Each interaction record that is associated with a conclusive identifier is assigned a confidence metric for the association.

    Multi-layered credit card with transaction-dependent source selection

    公开(公告)号:US11580554B2

    公开(公告)日:2023-02-14

    申请号:US16729245

    申请日:2019-12-27

    摘要: Techniques are described herein for selecting an optimal financial account for a financial transaction. In an embodiment, a multi-account payment card is used to initiate a financial transaction. Transaction information of the financial transaction including a multi-account payment card ID is transmitted to a server for processing. The server determines that the multi-account payment card ID is associated with a plurality of financial accounts, wherein each of the plurality of financial accounts is associated with any one of a credit card, a debit card, an automatic teller machine (ATM) card, a gift card, or a credit line. A financial account of the plurality of financial accounts is selected by the server based on financial account information, such as reward information, associated with the plurality of financial accounts and the transaction information of the financial transaction. The financial transaction is then charged to the selected financial account.

    Techniques for automatically addressing anomalous behavior

    公开(公告)号:US11556520B2

    公开(公告)日:2023-01-17

    申请号:US15833958

    申请日:2017-12-06

    摘要: Techniques a provided for performing multi-system operations in which changes are asynchronously committed in multiple systems. Metadata about the multi-system operation is injected into the commit logs of one system involved in a multi-system operation. An event stream is generated based on the commit logs of the one system, and is used to drive the operations that one or more other systems need to perform as part of the multi-system operation. A reconciliation system reads the logs of all systems involved in the multi-system operation and determines whether the multi-system operation completed successfully. Techniques are also provided for using machine learning to generate models of normal execution of different types of operations, detect anomalies, pre-emptively send expectation messages, and automatically suggest and/or apply fixes.

    Conditionally-deferred authentication steps for tiered authentication

    公开(公告)号:US11483312B2

    公开(公告)日:2022-10-25

    申请号:US16836813

    申请日:2020-03-31

    IPC分类号: H04L29/06 H04L9/40

    摘要: Techniques are described herein for using special session identifiers to defer additional authentication steps (AAS) for at least some restricted application actions. A client session is associated with a special session identifier that is mapped to an authentication tier (AT) achieved for the session based on the satisfied authentication steps. Web servers that are enabled for AAS deferral include context information, which identifies a requested action, with session verification requests to an authentication service. The authentication service determines that AAS is required to perform an action when (a) the AT associated with the action is a higher-security tier than the AT associated with the session, or (b) the session is associated with an AT that is lower than the highest-security AT and there is no context information accompanying the request for session validation, in which case the authentication service assumes that the highest-security AT is required to perform the request.

    DYNAMICALLY-TIERED AUTHENTICATION

    公开(公告)号:US20210306344A1

    公开(公告)日:2021-09-30

    申请号:US16836814

    申请日:2020-03-31

    IPC分类号: H04L29/06

    摘要: Techniques are described herein for dynamically-tiered authentication, which allows the authentication tier (AT) associated with a session to be automatically downgraded based on the session satisfying one or more downgrade criteria. Automatically downgrading a session eliminates some authentication-based privileges for the session without eliminating all privileges for the session. A session satisfies downgrade criteria based on: an explicit request for session downgrading; client interaction with the application; and/or activity on the device on which the client runs. For example, if a client authenticates to a third AT, but only performs actions in the application that are associated with the first AT during a pre-defined amount of time, the AT associated with the session is automatically downgraded. The session is either downgraded from the third AT to the first AT, or downgraded in intervals until the current or more recently accessed tiers are consistent with the current AT of the session.

    MULTI-LAYERED CREDIT CARD WITH TRANSACTION-DEPENDENT SOURCE SELECTION

    公开(公告)号:US20210201316A1

    公开(公告)日:2021-07-01

    申请号:US16729245

    申请日:2019-12-27

    摘要: Techniques are described herein for selecting an optimal financial account for a financial transaction. In an embodiment, a multi-account payment card is used to initiate a financial transaction. Transaction information of the financial transaction including a multi-account payment card ID is transmitted to a server for processing. The server determines that the multi-account payment card ID is associated with a plurality of financial accounts, wherein each of the plurality of financial accounts is associated with any one of a credit card, a debit card, an automatic teller machine (ATM) card, a gift card, or a credit line. A financial account of the plurality of financial accounts is selected by the server based on financial account information, such as reward information, associated with the plurality of financial accounts and the transaction information of the financial transaction. The financial transaction is then charged to the selected financial account.

    EXTRACTING VALUES FROM IMAGES OF DOCUMENTS

    公开(公告)号:US20210201014A1

    公开(公告)日:2021-07-01

    申请号:US16729291

    申请日:2019-12-27

    发明人: Yifan Wu

    IPC分类号: G06K9/00 G06T7/00

    摘要: Techniques are described for extracting key values from a document without having to rely on finding corresponding labels for the target keys within the extracted text of the document. Further the techniques do not rely on knowledge of the correlation between (a) the location of labels within a document, and (b) the location of the key values that correspond to the labels. Key values are extracted from a document by, identifying candidate values within the document, establishing “joint-candidate” sets from those candidate values, and using a trained machine learning mechanism to score each joint-candidate set of values. The highest scoring joint-candidate set is deemed to reflect the correct mapping of candidate values to target keys for the document.

    PROOF OF DYNAMIC QUORUM FOR BLOCKCHAIN CONSENSUS

    公开(公告)号:US20210119768A1

    公开(公告)日:2021-04-22

    申请号:US16658118

    申请日:2019-10-20

    IPC分类号: H04L9/06

    摘要: Proof-of-Dynamic-Quorum is a consensus mechanism for blockchain networks that selects a dynamic quorum of nodes to validate a proposed block based on digital data included in the proposed block. In an embodiment, a request to add a proposed block to a blockchain is received by a node of a blockchain network. A composite key value is generated based on one or more values within the proposed block. Based on a composite-key-value-to-quorum-participants mapping that is indicated in one or more blocks that are already present in the blockchain, a validating quorum is determined to determine whether the proposed block is to be added to the blockchain. When each node of the validating quorum indicates that the proposed block is accepted, the receiving node writes the proposed block to the blockchain. Proof-of-Dynamic-Quorum enables real-world authority data to be considered when performing a consensus algorithm in a blockchain network.

    AUTHENTICATING AND AUTHORIZING USERS WITH JWT AND TOKENIZATION

    公开(公告)号:US20210112052A1

    公开(公告)日:2021-04-15

    申请号:US17130790

    申请日:2020-12-22

    IPC分类号: H04L29/06 H04L9/32

    摘要: Techniques are provided for using tokenization in conjunction with “behind-the-wall” JWT authentication. “Behind-the-wall” JWT authentication refers to JWT authentication techniques in which the JWT stays exclusively within the private network that is controlled by the web application provider. Because the JWT stays within the private network, the security risk posed by posting the JWT in a client cookie is avoided. However, because JWT is used behind-the-wall to authenticate a user with the services requested by the user, the authentication-related overhead is significantly reduced.

    MULTI-USER CROSS-DEVICE TRACKING
    10.
    发明申请

    公开(公告)号:US20220027390A1

    公开(公告)日:2022-01-27

    申请号:US17496501

    申请日:2021-10-07

    发明人: Wira Pradjinata

    摘要: Embodiments collect, from an event stream having both client-side and server-side information from multiple tracking sources, user interaction records for a web application and supporting systems. The records are stored in a data store, and are retroactively correlated with conclusive user identifiers and, if applicable, with areas of interest. Attribution of interaction records to conclusive identifiers and areas of interest is based on links that have been established between identifiers. Established identifier links may be subject to one or more link removal criteria. If link removal criteria is satisfied for an established link, the link is broken. Once a link is broken, interaction records, found in the data store, that are associated with the inconclusive identifier of the broken link are no longer associated with the conclusive identifier of the broken link. Each interaction record that is associated with a conclusive identifier is assigned a confidence metric for the association.