US20190108565A1 - Providing privileges and granting or denying a level of access to resources based on authentication by authentication sources - Google Patents
Providing privileges and granting or denying a level of access to resources based on authentication by authentication sources Download PDFInfo
- Publication number
- US20190108565A1 US20190108565A1 US16/212,592 US201816212592A US2019108565A1 US 20190108565 A1 US20190108565 A1 US 20190108565A1 US 201816212592 A US201816212592 A US 201816212592A US 2019108565 A1 US2019108565 A1 US 2019108565A1
- Authority
- US
- United States
- Prior art keywords
- authentication
- privileges
- client
- response
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
Definitions
- This application relates generally to the field of computer technology, and in a specific example embodiment, enabling access to service levels based on source of truth.
- Some authentication methods include generating a challenge-response test to protect websites against bots by grading tests that humans can pass but current computer programs cannot.
- Other risk-reduction methods include obtaining a bank account number, a credit card number, a social security number, or any other unique identifying data to verify an identity of a prospective seller. Once the identifying data is verified, a seller has unfettered access to the e-commerce website.
- FIG. 1 is a network diagram depicting a network system having a client-server architecture configured for exchanging data over a network, according to one embodiment.
- FIG. 2 shows a block diagram illustrating one example embodiment of a marketplace application.
- FIG. 3 shows a block diagram illustrating one example embodiment of a service level application.
- FIG. 4 shows a block diagram illustrating one example embodiment of an authentication module.
- FIG. 5 shows a block diagram illustrating one example embodiment of a source of truth module.
- FIG. 6 shows a block diagram illustrating one example embodiment of a service level access module.
- FIG. 7 shows a flow diagram illustrating one example embodiment of an operation of the service level application.
- FIG. 8 shows a flow diagram illustrating another example embodiment of an operation of the service level application.
- FIG. 9 shows a ladder diagram illustrating one example embodiment of an operation of the service level application.
- FIG. 10 shows a ladder diagram illustrating another example embodiment of an operation of the service level application.
- FIG. 11 shows a diagrammatic representation of machine, in the example form of a computer system, within which a set of instructions may be executed to cause the machine to perform any one or more of the methodologies discussed herein.
- FIG. 12 is a block diagram illustrating a mobile device, according to an example embodiment.
- the service level application receives authentication data from a client seeking access to establish an account in an online marketplace.
- the service level application identifies a source of truth corresponding to the authentication data and verifies the authentication data with the corresponding source of truth.
- the source of truth may identify an authentication authority or agency (e.g., Department of Motor Vehicles, Social Security Agency, credit bureau, bank, network security provider, cryptosystem, peer referrals, email provider).
- the service level application determines an access level tier to the online marketplace for the client based on the source of truth.
- the access level tier identifies a scope of access to the online marketplace.
- an access level tier may identify a maximum sale amount for an item to be listed and a maximum number of transactions in a given time period.
- the service level application may then provide the client with the access level tier to the online marketplace in response to validated or verified authentication data.
- the service level application receives an authentication type corresponding to the authentication data.
- the authentication type is determined based on the authentication data.
- the service level application identifies the source of truth in response to at least one of an authentication type of the authentication data, and the authentication data.
- the service level application accesses the source of truth, and validates the authentication data based on the access to the source of truth.
- the service level application generates an access level tier matrix for the online marketplace and determines the access level tier from the access level tier matrix for the client based on the corresponding source of truth.
- the service level application generates an access level tier matrix for the online marketplace and determines the access level tier from the access level tier matrix for the client based on an authentication type corresponding to the authentication data.
- the service level application generates an authentication challenge to the client and receives a response to the authentication challenge from the client.
- the service level application may then identify a verification program associated with the authentication challenge. For example, if the authentication challenge includes a Captcha challenge or an audio visual challenge to filter out bots, the verification program may include the program that validates and verifies that the response from the client is correct. The verification program may be used to validate the response to the authentication challenge from the client.
- the service level application determines the access level tier to the online marketplace based on the verification program.
- the service level application communicates the access level tier of the client to the online marketplace.
- the online marketplace limits transaction activities of the client based on the access level tier assigned to the client.
- FIG. 1 is a network diagram depicting a network system 100 having a client-server architecture configured for exchanging data over a network, according to one embodiment.
- the network system 100 may be a publication/publisher system where clients may communicate and exchange data within the network system 100 .
- the data may pertain to various functions (e.g., online item purchases) and aspects (e.g., managing content and user reputation values) associated with the network system 100 and its users.
- client-server architecture other embodiments may include other network architectures, such as peer-to-peer or distributed network environments.
- a data exchange platform in an example form of a marketplace application 120 and a service level application 122 , may provide server-side functionality via a network 104 (e.g., the Internet) to one or more clients.
- the one or more clients may include users that utilize the network system 100 and, more specifically, the marketplace application 120 and the service level application 122 , to exchange data over the network 104 .
- These transactions may include transmitting, receiving (communicating), and processing data to, from, and regarding content and users of the network system 100 .
- the data may include, but is not limited to, content and user data such as user profiles; user attributes, product and service reviews and information, such as pricing and descriptive information; product, service, manufacturer, and vendor recommendations and identifiers, product and service listings associated with buyers and sellers; auction bids; and transaction data, such as collection and payment, shipping transactions, shipping label purchases, and real time synchronization of financial journals, among others.
- content and user data such as user profiles; user attributes, product and service reviews and information, such as pricing and descriptive information; product, service, manufacturer, and vendor recommendations and identifiers, product and service listings associated with buyers and sellers; auction bids; and transaction data, such as collection and payment, shipping transactions, shipping label purchases, and real time synchronization of financial journals, among others.
- the data exchanges within the network environment 100 may be dependent upon user-selected functions available through one or more client or user interfaces (UIs).
- the UIs may be associated with a client machine, such as a client machine 110 using a web client 106 .
- the web client 106 may be in communication with the marketplace application 120 via a web server 116 .
- the UIs may also be associated with a client machine 112 using a programmatic client 108 , such as a client application, or a third party server 130 using a third party application 128 .
- the client machines 110 or 112 , or the third party server 130 may be associated with a buyer, a seller, a third party electronic commerce platform, a payment service provider, a shipping service provider, or a financial institution system, each in communication with the networked system 102 and optionally with each other.
- the buyers and sellers may be any one of individuals, merchants, or service providers.
- an application program interface (API) server 114 and the web server 116 are coupled to, and provide programmatic and web interfaces respectively to, one or more application servers 118 .
- the application server 118 hosts a marketplace application 120 and the service level application 122 .
- the application server 118 is, in turn, shown to be coupled to one or more database servers 124 that facilitate access to one or more databases 126 .
- the web server 116 and the API server 114 communicate and receive data pertaining to listings and transactions, among other things, via various user input tools.
- the web server 116 may send and receive data to and from a toolbar or webpage on a browser application (e.g., the web client 106 ) operating on a client machine (e.g., the client machine 110 ).
- the API server 114 may send and receive data to and from an application (e.g., the programmatic client 108 or the third party application 128 ) running on another client machine (e.g., the client machine 112 or the third party server 130 ).
- the marketplace application 120 provides listings and price-setting mechanisms whereby a user may be a seller or buyer who lists or buys goods or services (e.g., for sale) published on the marketplace application 120 .
- the service level application 122 provides a system and a method for generating service level tiers, and assigning a service level tier based on authentication data or an authentication data type provided by a client.
- the service level application 122 may set a maximum listing price or a maximum number of transactions for a seller in the marketplace application 120 based on the type of authentication data provided by the seller when the seller signs up for an account with the marketplace application 120 .
- the type of authentication data may be used to verify the identity of the seller. For example, the service level tier for a seller providing a driver's license number from a Department of Motor Vehicles agency may be higher than the service level tier for a seller providing an email address as authentication data.
- different source of truth agencies may correspond to different service level tiers.
- a passport agency as a source of truth may correspond to a higher service level tier than would a local library as a source of truth.
- the type of authentication data may correspond to an authentication program that generates a challenge (e.g., Captcha, video feedback) to the client to prevent bots from impersonating users.
- a challenge e.g., Captcha, video feedback
- FIG. 2 shows a block diagram illustrating one example embodiment of the marketplace application 120 .
- the marketplace application 120 may be hosted on dedicated or shared server machines (not shown) that are communicatively coupled to enable communications between server machines.
- the marketplace application 120 and the service level application 122 themselves are communicatively coupled (e.g., via appropriate interfaces) to each other and to various data sources, so as to allow information to be passed between the marketplace application 120 and the service level application 122 or so as to allow the marketplace application 120 and the service level application 122 to share and access common data.
- the marketplace application 120 and the service level application 122 may, furthermore, access the one or more databases 126 via the database servers 124 .
- the networked system 102 may provide a number of publishing, listing, and price-setting mechanisms whereby a seller may list (or publish information concerning) goods or services for sale; a buyer can express interest in or indicate a desire to purchase such goods or services; and a price can be set for a transaction pertaining to the goods or services.
- the marketplace application 120 is shown to include at least one publication application 200 and one or more auction applications 202 , which support auction-format listing and price setting mechanisms (e.g., English, Dutch, Vickrey, Chinese, Double, Reverse auctions,).
- the various auction applications 202 may also provide a number of features in support of such auction-format listings, such as a reserve price feature whereby a seller may specify a reserve price in connection with a listing, and a proxy-bidding feature whereby a bidder may invoke automated proxy bidding.
- a reserve price feature whereby a seller may specify a reserve price in connection with a listing
- a proxy-bidding feature whereby a bidder may invoke automated proxy bidding.
- a number of fixed-price applications 204 support fixed-price listing formats (e.g., a traditional classified-advertisement-type listing or a catalogue listing) and buyout-type listings.
- buyout-type listings e.g., including the Buy-It-Now (BIN) technology developed by eBay Inc., of San Jose, Calif.
- BIN Buy-It-Now
- auction-format listings may be offered in conjunction with auction-format listings, and allow a buyer to purchase goods or services, which are also being offered for sale via an auction, for a fixed price that is typically higher than the starting price of the auction.
- Store applications 206 allow a seller to group listings within a “virtual” store, which may be branded and otherwise personalized by and for the seller. Such a virtual store may also offer promotions, incentives, and features that are specific and personalized to a relevant seller.
- Reputation applications 208 allow users who transact, utilizing the networked system 102 , to establish, build, and maintain reputations, which may be made available and published to potential trading partners. For example, consider that where the networked system 102 supports person-to-person trading, users may have no history or other reference information whereby the trustworthiness and credibility of potential trading partners may be assessed.
- the reputation applications 208 allow a user (for example, through feedback provided by other transaction partners) to establish a reputation within the networked system 102 over time. Other potential trading partners may then reference such a reputation for the purposes of assessing credibility and trustworthiness.
- Personalization applications 210 allow users of the networked system 102 to personalize various aspects of their interactions with the networked system 102 . For example a user may, utilizing an appropriate personalization application 210 , create a personalized reference page in which information regarding transactions to which the user is (or has been) a party may be viewed. Further, a personalization application 210 may enable a user to personalize listings and other aspects of their interactions with the networked system 102 and other parties.
- the networked system 102 may support a number of marketplaces that are customized, for example, for specific geographic regions.
- a version of the networked system 102 may be customized for the United Kingdom, whereas another version of the networked system 102 may be customized for the United States.
- Each of these versions may operate as an independent marketplace or may be customized (or internationalized) presentations of a common underlying marketplace.
- the networked system 102 may, accordingly, include a number of internationalization applications 212 that customize information in (or the presentation of information by) the networked system 102 according to predetermined criteria (e.g., geographic, demographic, or marketplace criteria).
- the internationalization applications 212 may be used to support the customization of information for a number of regional websites that are operated by the networked system 102 and that are accessible via respective web servers 116 .
- Navigation of the networked system 102 may be facilitated by one or more navigation applications 214 .
- a search application (as an example of a navigation application 214 ) may enable key word searches of listings published via the networked system 102 .
- a browse application may allow users to browse various category, catalogue, or inventory data structures according to which listings may be classified within the networked system 102 .
- Various other navigation applications 214 may be provided to supplement the search and browse applications.
- the marketplace application 120 may include one or more imaging applications 216 , which users may utilize to upload images for inclusion within the listings.
- An imaging application 216 also operates to incorporate images within viewed listings.
- the imaging applications 216 may also support one or more promotional features, such as image galleries that are presented to potential buyers. For example, sellers may pay an additional fee to have an image included within a gallery of images for promoted items.
- Listing creation applications 218 allow sellers to conveniently author listings pertaining to goods or services that they wish to transact via the networked system 102 , and listing management applications 220 allow sellers to manage such listings. Specifically, where a particular seller has authored or published a large number of listings, the management of such listings may present a challenge.
- the listing management applications 220 provide a number of features (e.g., auto-relisting, inventory level monitors) to assist the seller in managing such listings.
- One or more post-listing management applications 222 also assist sellers with a number of activities that typically occur post-listing. For example, upon completion of an auction facilitated by the one or more auction applications 202 , a seller may wish to leave feedback regarding a particular buyer. To this end, a post-listing management application 222 may provide an interface to the one or more reputation applications 208 , so as to allow the seller to conveniently provide feedback regarding multiple buyers to the reputation applications 208 .
- Dispute resolution applications 224 provide mechanisms whereby disputes arising between transacting parties may be resolved.
- the dispute resolution applications 224 may provide guided procedures whereby the parties are guided through a number of steps in an attempt to settle a dispute. In the event that the dispute cannot be settled via the guided procedures, the dispute may be escalated to a third party mediator or arbitrator.
- a number of fraud prevention applications 226 implement fraud detection and prevention mechanisms to reduce the occurrence of fraud within the networked system 102 .
- Messaging applications 228 are responsible for the generation and delivery of messages to users of the networked system 102 (such as, for example, messages advising users regarding the status of listings at the networked system 102 (e.g., providing “outbid” notices to bidders during an auction process or providing promotional and merchandising information to users)). Respective messaging applications 228 may utilize any one of a number of message delivery networks and platforms to deliver messages to users.
- the messaging applications 228 may deliver electronic mail (e-mail), instant message (IM), Short Message Service (SMS), text, facsimile, or voice (e.g., Voice over IP (VoIP)) messages via wired (e.g., the Internet), plain old telephone service (POTS), or wireless (e.g., mobile, cellular, WiFi, WiMAX) networks.
- e-mail electronic mail
- IM instant message
- SMS Short Message Service
- SMS Short Message Service
- text e.g., facsimile
- voice e.g., Voice over IP (VoIP)
- wired e.g., the Internet
- POTS plain old telephone service
- wireless e.g., mobile, cellular, WiFi, WiMAX
- Merchandising applications 230 support various merchandising functions that are made available to sellers to enable sellers to increase sales via the networked system 102 .
- the merchandising applications 230 also operate the various merchandising features that may be invoked by sellers and may monitor and track the success of merchandising strategies employed by sellers.
- the networked system 102 itself, or one or more parties that transact via the networked system 102 may operate loyalty programs that are supported by one or more loyalty/promotion applications 232 . For example, a buyer may earn loyalty or promotion points for each transaction established or concluded with a particular seller, and be offered a reward for which accumulated loyalty points can be redeemed.
- FIG. 3 shows a block diagram illustrating one example embodiment of the service level application 122 .
- the service level application 122 may include an authentication module 302 , a source of truth module 304 , and a service level access module 306 .
- the authentication module 302 may determine a type of authentication data received from the client. For example, the authentication module 302 may determine that the authentication data corresponds to a telephone number based on a format. In another example, the client may specify the type of authentication data (e.g., telephone number, address, driver's license number). In another embodiment, the authentication module 302 may determine an authentication program based on the authentication data. For example, the authentication program may include a Captcha challenge, a password, or any other challenge-response authentication program. The authentication module 302 is described in more detail below with respect to FIG. 4 .
- the source of truth module 304 may determine a source of truth corresponding to the authentication data.
- the source of truth may include an authority or an agency associated with the authentication data.
- the source of truth for a driver's license number would be a Department of Motor Vehicles agency.
- the source of truth for a Social Security number would be the Social Security Administration agency.
- the source of truth for a credit card number may be a credit bureau or a bank.
- the source of truth module 304 is described in more detail below with respect to FIG. 5 .
- the service level access module 306 may generate a tiered access level matrix for the marketplace application 120 based on the type of the authentication data and a type of the source of truth.
- the service level access module 306 assigns an access level tier to a seller in the marketplace application 120 .
- the service level access module 306 is described in more detail below with respect to FIG. 6 .
- FIG. 4 shows a block diagram illustrating one example embodiment of the authentication module 302 .
- the authentication module 302 may include an authentication type query module 402 and an authentication type category module 404 .
- the authentication type query module 402 may generate a query to the client requesting the client to specify a type of authentication data.
- the authentication type category module 404 may determine the type of authentication data based on a format of the authentication data provided by the client or based on the information provided by the client in response to the query generated by the authentication type query module 402 .
- authentication types may include using authentication data related to a source of truth or using an authentication program such as a username and password.
- the authentication type category module 404 generates a category for the information provided by the client in response to the query generated by the authentication type query module 402 .
- FIG. 5 shows a block diagram illustrating one example embodiment of the source of truth module 304 .
- the source of truth module 304 may include a source of truth agency module 502 , a source of truth access module 504 , and a validation module 506 .
- the source of truth agency module 502 determines which agency to access based on the authentication data provided by the client. For example, the source of truth agency module 502 may determine that the source of truth is a bank corresponding to a bank account number provided by the client.
- the source of truth access module 504 may be configured to access multiple source of truth agencies. For example, the source of truth access module 504 may access and query a database of the bank related to the bank account number provided by the client. In another example, the source of truth access module 504 may access and query information from a credit bureau in response to credit information provided by the client.
- the validation module 506 may be configured to verify the information provided by the client with the corresponding source of truth agency. For example, the validation module 506 may query a bank to verify a validity of the bank account number provided by the client. If the bank account number is valid, the validation module 506 may validate the authentication data provided by the client.
- FIG. 6 shows a block diagram illustrating one example embodiment of the service level access module 306 .
- the service level access module 306 may include an access level tier matrix module 602 and an access level tier module 604 .
- the service level access module 306 determines a level of access tier based on the type of source of truth or authentication data.
- the access level tier matrix module 602 may generate a matrix identifying access level tiers based on the type of source of truth or authentication data.
- the access level tier matrix may include a first access level tier corresponding to a source of truth such as credit bureau agencies, a second access level tier corresponding to banks, and a third access level tier corresponding to e-mail providers.
- the first access level tier may include greater access privileges than the second and third access level tiers.
- the second access level tier may include greater access privileges than the third access level tier.
- the privileges may include a sale amount limit and a limit on number of transactions during a predefined amount of time. The privileges may increase as the user transacts more frequently with the marketplace application 120 and receives positive feedback from buyers (e.g., through the reputation applications 208 ).
- the access level tier module 604 assigns an access level tier to the client based on the access level tier matrix.
- FIG. 7 shows a flow diagram illustrating one example embodiment of a method 700 of the service level application 122 .
- the service level application 122 receives authentication data and determines a type of authentication corresponding to the authentication data.
- operation 702 may be implemented with the authentication module 302 .
- the service level application 122 identifies a source of truth agency corresponding to the type of authentication.
- operation 704 may be implemented with the source of truth module 304 .
- the service level application 122 accesses the corresponding source of truth agency to verify the authentication data provided by the client.
- operation 706 may be implemented with the source of truth module 304 .
- the service level application 122 determines whether the provided authentication data is valid based on the access to the corresponding source of truth agency. In one example embodiment, operation 708 may be implemented with the source of truth module 304 . The service level application 122 may deny the client access to opening an account with the marketplace application 120 in response to invalid authentication data at operation 712 . For example, the service level application 122 may determine that the client is a bot based on the invalid authentication data.
- the service level application 122 determines and assigns an access level tier to the client or user based on the type of authentication and the source of truth. In one example embodiment, operation 710 may be implemented with the service level access module 306 .
- FIG. 8 shows a flow diagram illustrating another example embodiment of a method 800 of the service level application 122 .
- the service level application 122 receives authentication data from a client and determines the type of authentication corresponding to the authentication data. In one example embodiment, operation 802 may be implemented with the authentication type query module 404 .
- the service level application 122 accesses a verification program corresponding to the type of authentication.
- the service level application 122 determines whether the authentication data is valid using the verification program. The service level application 122 may deny the client access to opening an account with the marketplace application 120 in response to invalid authentication data at operation 810 .
- the service level application 122 determines and assigns an access level tier to the client or user based on the type of authentication and the verification program. In one example embodiment, operation 808 may be implemented with the service level access module 306 .
- FIG. 9 shows a ladder diagram illustrating one example embodiment of an operation of the service level application.
- a client 902 provides authentication data or an authentication type of the authentication data to a service level application 904 .
- the service level application 904 determines an authentication type and a corresponding source of truth agency.
- the service level application 904 accesses the corresponding source of truth agency 906 .
- the service level application 904 verifies the authentication data with the source of truth agency 906 .
- the service level application 904 determines a corresponding access level tier, and provides the client 902 access to a marketplace application 908 with the corresponding access level tier in operation 920 .
- the service level application 904 may communicate the authorized access level tier to the marketplace application 908 .
- FIG. 10 shows a ladder diagram illustrating another example embodiment of an operation of the service level application.
- a client 1002 provides authentication data or an authentication type of the authentication data to a service level application 1004 .
- the service level application 1004 determines the authentication type and a corresponding verification program.
- the service level application 1004 accesses the corresponding verification program 1006 .
- the service level application 1004 verifies the authentication data with the verification program 1006 .
- the service level application 1004 determines the corresponding access level tier based on the verification program 1006 .
- the service level application 1004 provides the client 1002 with access to a marketplace application 1008 with the corresponding access level tier.
- the service level application 1004 communicates the authorized access level tier to the marketplace application 1008 .
- Modules may constitute either software modules (e.g., code embodied (1) on a non-transitory machine-readable medium or (2) in a transmission signal) or hardware-implemented modules.
- a hardware-implemented module is a tangible unit capable of performing certain operations and may be configured or arranged in a certain manner.
- one or more computer systems e.g., a standalone, client, or server computer system
- one or more processors may be configured by software (e.g., an application or application portion) as a hardware-implemented module that operates to perform certain operations as described herein.
- a hardware-implemented module may be implemented mechanically or electronically.
- a hardware-implemented module may comprise dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC)) to perform certain operations.
- a hardware-implemented module may also comprise programmable logic or circuitry (e.g., as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware-implemented module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.
- the term “hardware-implemented module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily or transitorily configured (e.g., programmed) to operate in a certain manner or to perform certain operations described herein.
- hardware-implemented modules are temporarily configured (e.g., programmed)
- each of the hardware-implemented modules need not be configured or instantiated at any one instance in time.
- the hardware-implemented modules comprise a general-purpose processor configured using software
- the general-purpose processor may be configured as respectively different hardware-implemented modules at different times.
- Software may, accordingly, configure a processor, for example, to constitute a particular hardware-implemented module at one instance of time and to constitute a different hardware-implemented module at a different instance of time.
- Hardware-implemented modules can provide information to, and receive information from, other hardware-implemented modules. Accordingly, the described hardware-implemented modules may be regarded as being communicatively coupled. Where multiples of such hardware-implemented modules exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses that connect the hardware-implemented modules). In embodiments in which multiple hardware-implemented modules are configured or instantiated at different times, communications between such hardware-implemented modules may be achieved, for example, through the storage and retrieval of information in memory structures to which the multiple hardware-implemented modules have access. For example, one hardware-implemented module may perform an operation, and store the output of that operation in a memory device to which it is communicatively coupled.
- a further hardware-implemented module may then, at a later time, access the memory device to retrieve and process the stored output.
- Hardware-implemented modules may also initiate communications with input or output devices, and can operate on a resource (e.g., a collection of information).
- processors may be temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions.
- the modules referred to herein may, in some example embodiments, comprise processor-implemented modules.
- the methods described herein may be at least partially processor-implemented. For example, at least some of the operations of a method may be performed by one or more processors or processor-implemented modules. The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the processor or processors may be located in a single location (e.g., within a home environment, an office environment, or a server farm), while in other embodiments the processors may be distributed across a number of locations.
- the one or more processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). For example, at least some of the operations may be performed by a group of computers (as examples of machines including processors), with these operations being accessible via the network 104 (e.g., the Internet) and via one or more appropriate interfaces (e.g., APIs).
- SaaS software as a service
- Example embodiments may be implemented in digital electronic circuitry, or in computer hardware, firmware, or software, or in combinations of them.
- Example embodiments may be implemented using a computer program product (e.g., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable medium for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers).
- a computer program product e.g., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable medium for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers.
- a computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a standalone program or as a module, subroutine, or other unit suitable for use in a computing environment.
- a computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
- operations may be performed by one or more programmable processors executing a computer program to perform functions by operating on input data and generating output.
- Method operations can also be performed by, and apparatus of example embodiments may be implemented as, special purpose logic circuitry (e.g., an FPGA or an ASIC).
- the computing system can include clients and servers.
- a client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
- both hardware and software architectures merit consideration. Specifically, it will be appreciated that the choice of whether to implement certain functionality in permanently configured hardware (e.g., an ASIC), in temporarily configured hardware (e.g., a combination of software and a programmable processor), or in a combination of permanently and temporarily configured hardware may be a design choice.
- hardware e.g., machine
- software architectures that may be deployed in various example embodiments.
- FIG. 11 shows a diagrammatic representation of a machine in the example form of a machine or computer system 1100 within which a set of instructions 1124 may be executed causing the machine to perform any one or more of the methodologies discussed herein.
- the machine operates as a standalone device or may be connected (e.g., networked) to other machines.
- the machine may operate in the capacity of a server or a client machine 110 or 112 in a server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
- the machine may be a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a cellular telephone, a web appliance, a network router, switch or bridge, or any machine capable of executing a set of instructions 1124 (sequential or otherwise) that specify actions to be taken by that machine.
- PC personal computer
- PDA personal digital assistant
- STB set-top box
- WPA personal digital assistant
- a cellular telephone a web appliance
- network router switch or bridge
- the example computer system 1100 includes a processor 1102 (e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both), a main memory 1104 , and a static memory 1106 , which communicate with each other via a bus 1108 .
- the computer system 1100 may further include a video display unit 1110 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)).
- the computer system 1100 also includes an alphanumeric input device 1112 (e.g., a keyboard), a UI navigation device 1114 (e.g., a mouse), a drive unit 1116 , a signal generation device 1118 (e.g., a speaker), and a network interface device 1120 .
- an alphanumeric input device 1112 e.g., a keyboard
- a UI navigation device 1114 e.g., a mouse
- drive unit 1116 e.g., a drive unit
- signal generation device 1118 e.g., a speaker
- the drive unit 1116 includes a computer-readable medium 1122 on which is stored one or more sets of data structures and instructions 1124 (e.g., software) embodying or utilized by any one or more of the methodologies or functions described herein.
- the instructions 1124 may also reside, completely or at least partially, within the main memory 1104 or within the processor 1102 during execution thereof by the computer system 1100 , with the main memory 1104 and the processor 1102 also constituting machine-readable media.
- the instructions 1124 may further be transmitted or received over a network 1126 via the network interface device 1120 utilizing any one of a number of well-known transfer protocols (e.g., HTTP).
- HTTP transfer protocol
- While the computer-readable medium 1122 is shown in an example embodiment to be a single medium, the term “computer-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions 1124 .
- the term “computer-readable medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions 1124 for execution by the machine that cause the machine to perform any one or more of the methodologies of the present disclosure, or that is capable of storing, encoding, or carrying data structures utilized by or associated with such a set of instructions 1124 .
- the term “computer-readable medium” shall, accordingly, be taken to include, but not be limited to, solid-state memories, optical media, and magnetic media.
- the machine-readable medium is non-transitory in that it does not embody a propagating signal.
- labeling the tangible machine-readable medium “non-transitory” should not be construed to mean that the medium is incapable of movement—the medium should be considered as being transportable from one physical location to another.
- the machine-readable medium since the machine-readable medium is tangible, the medium may be considered to be a machine-readable device.
- FIG. 12 is a block diagram illustrating a mobile device 1200 , according to an example embodiment.
- the mobile device 1200 may include a processor 1202 .
- the processor 1202 may be any of a variety of different types of commercially available processors 1202 suitable for mobile devices 1200 (for example, an XScale architecture microprocessor, a microprocessor without interlocked pipeline stages (MIPS) architecture processor, or another type of processor 1202 ).
- a memory 1204 such as a random access memory (RAM), a flash memory, or another type of memory, is typically accessible to the processor 1202 .
- RAM random access memory
- flash memory or another type of memory
- the memory 1204 may be adapted to store an operating system (OS) 1206 , as well as applications 1208 , such as a mobile location enabled application that may provide location-based services (LBSs) to a user.
- OS operating system
- applications 1208 such as a mobile location enabled application that may provide location-based services (LBSs) to a user.
- the processor 1202 may be coupled, either directly or via appropriate intermediary hardware, to a display 1210 and to one or more input/output (I/O) devices 1212 , such as a keypad, a touch panel sensor, a microphone, and the like.
- the processor 1202 may be coupled to a transceiver 1214 that interfaces with an antenna 1216 .
- the transceiver 1214 may be configured to both transmit and receive cellular network signals, wireless data signals, or other types of signals via the antenna 1216 , depending on the nature of the mobile device 1200 . Further, in some configurations, a GPS receiver 1218 may also make use of the antenna 1216 to receive GPS signals.
- the term “or” may be construed in either an inclusive or exclusive sense. Moreover, plural instances may be provided for resources, operations, or structures described herein as a single instance. Additionally, boundaries between various resources, operations, modules, engines, and data stores are somewhat arbitrary, and particular operations are illustrated in a context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within a scope of various embodiments of the present invention. In general, structures and functionality presented as separate resources in the example configurations may be implemented as a combined structure or resource. Similarly, structures and functionality presented as a single resource may be implemented as separate resources. These and other variations, modifications, additions, and improvements fall within a scope of embodiments of the present invention as represented by the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- This application is a continuation of U.S. patent application Ser. No. 14/462,361, filed Aug. 18, 2014, which is incorporated by reference herein in its entirety.
- This application relates generally to the field of computer technology, and in a specific example embodiment, enabling access to service levels based on source of truth.
- To reduce fraudulent activities, procedures to verify and approve prospective sellers signing up for an e-commerce account can be lengthy and time consuming. Some authentication methods include generating a challenge-response test to protect websites against bots by grading tests that humans can pass but current computer programs cannot. Other risk-reduction methods include obtaining a bank account number, a credit card number, a social security number, or any other unique identifying data to verify an identity of a prospective seller. Once the identifying data is verified, a seller has unfettered access to the e-commerce website.
- The present disclosure is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings, in which:
-
FIG. 1 is a network diagram depicting a network system having a client-server architecture configured for exchanging data over a network, according to one embodiment. -
FIG. 2 shows a block diagram illustrating one example embodiment of a marketplace application. -
FIG. 3 shows a block diagram illustrating one example embodiment of a service level application. -
FIG. 4 shows a block diagram illustrating one example embodiment of an authentication module. -
FIG. 5 shows a block diagram illustrating one example embodiment of a source of truth module. -
FIG. 6 shows a block diagram illustrating one example embodiment of a service level access module. -
FIG. 7 shows a flow diagram illustrating one example embodiment of an operation of the service level application. -
FIG. 8 shows a flow diagram illustrating another example embodiment of an operation of the service level application. -
FIG. 9 shows a ladder diagram illustrating one example embodiment of an operation of the service level application. -
FIG. 10 shows a ladder diagram illustrating another example embodiment of an operation of the service level application. -
FIG. 11 shows a diagrammatic representation of machine, in the example form of a computer system, within which a set of instructions may be executed to cause the machine to perform any one or more of the methodologies discussed herein. -
FIG. 12 is a block diagram illustrating a mobile device, according to an example embodiment. - Although the present disclosure is described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the disclosure. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
- A system and method for providing a service level application are described. The service level application receives authentication data from a client seeking access to establish an account in an online marketplace. The service level application identifies a source of truth corresponding to the authentication data and verifies the authentication data with the corresponding source of truth. The source of truth may identify an authentication authority or agency (e.g., Department of Motor Vehicles, Social Security Agency, credit bureau, bank, network security provider, cryptosystem, peer referrals, email provider). The service level application determines an access level tier to the online marketplace for the client based on the source of truth. The access level tier identifies a scope of access to the online marketplace. For example, an access level tier may identify a maximum sale amount for an item to be listed and a maximum number of transactions in a given time period. The service level application may then provide the client with the access level tier to the online marketplace in response to validated or verified authentication data.
- In one example embodiment, the service level application receives an authentication type corresponding to the authentication data. The authentication type is determined based on the authentication data.
- In another example embodiment, the service level application identifies the source of truth in response to at least one of an authentication type of the authentication data, and the authentication data. The service level application accesses the source of truth, and validates the authentication data based on the access to the source of truth.
- In another example embodiment, the service level application generates an access level tier matrix for the online marketplace and determines the access level tier from the access level tier matrix for the client based on the corresponding source of truth.
- In another example embodiment, the service level application generates an access level tier matrix for the online marketplace and determines the access level tier from the access level tier matrix for the client based on an authentication type corresponding to the authentication data.
- In another example embodiment, the service level application generates an authentication challenge to the client and receives a response to the authentication challenge from the client. The service level application may then identify a verification program associated with the authentication challenge. For example, if the authentication challenge includes a Captcha challenge or an audio visual challenge to filter out bots, the verification program may include the program that validates and verifies that the response from the client is correct. The verification program may be used to validate the response to the authentication challenge from the client. The service level application then determines the access level tier to the online marketplace based on the verification program.
- In another example embodiment, the service level application communicates the access level tier of the client to the online marketplace. The online marketplace limits transaction activities of the client based on the access level tier assigned to the client.
-
FIG. 1 is a network diagram depicting anetwork system 100 having a client-server architecture configured for exchanging data over a network, according to one embodiment. For example, thenetwork system 100 may be a publication/publisher system where clients may communicate and exchange data within thenetwork system 100. The data may pertain to various functions (e.g., online item purchases) and aspects (e.g., managing content and user reputation values) associated with thenetwork system 100 and its users. Although illustrated herein as a client-server architecture, other embodiments may include other network architectures, such as peer-to-peer or distributed network environments. - A data exchange platform, in an example form of a
marketplace application 120 and aservice level application 122, may provide server-side functionality via a network 104 (e.g., the Internet) to one or more clients. The one or more clients may include users that utilize thenetwork system 100 and, more specifically, themarketplace application 120 and theservice level application 122, to exchange data over thenetwork 104. These transactions may include transmitting, receiving (communicating), and processing data to, from, and regarding content and users of thenetwork system 100. The data may include, but is not limited to, content and user data such as user profiles; user attributes, product and service reviews and information, such as pricing and descriptive information; product, service, manufacturer, and vendor recommendations and identifiers, product and service listings associated with buyers and sellers; auction bids; and transaction data, such as collection and payment, shipping transactions, shipping label purchases, and real time synchronization of financial journals, among others. - In various embodiments, the data exchanges within the
network environment 100 may be dependent upon user-selected functions available through one or more client or user interfaces (UIs). The UIs may be associated with a client machine, such as aclient machine 110 using aweb client 106. Theweb client 106 may be in communication with themarketplace application 120 via aweb server 116. The UIs may also be associated with aclient machine 112 using aprogrammatic client 108, such as a client application, or athird party server 130 using athird party application 128. It can be appreciated that in various embodiments, theclient machines third party server 130, may be associated with a buyer, a seller, a third party electronic commerce platform, a payment service provider, a shipping service provider, or a financial institution system, each in communication with thenetworked system 102 and optionally with each other. The buyers and sellers may be any one of individuals, merchants, or service providers. - Turning specifically to the
marketplace application 120 and theservice level application 122, an application program interface (API)server 114 and theweb server 116 are coupled to, and provide programmatic and web interfaces respectively to, one ormore application servers 118. Theapplication server 118 hosts amarketplace application 120 and theservice level application 122. Theapplication server 118 is, in turn, shown to be coupled to one ormore database servers 124 that facilitate access to one ormore databases 126. - In one embodiment, the
web server 116 and theAPI server 114 communicate and receive data pertaining to listings and transactions, among other things, via various user input tools. For example, theweb server 116 may send and receive data to and from a toolbar or webpage on a browser application (e.g., the web client 106) operating on a client machine (e.g., the client machine 110). TheAPI server 114 may send and receive data to and from an application (e.g., theprogrammatic client 108 or the third party application 128) running on another client machine (e.g., theclient machine 112 or the third party server 130). - In one embodiment, the
marketplace application 120 provides listings and price-setting mechanisms whereby a user may be a seller or buyer who lists or buys goods or services (e.g., for sale) published on themarketplace application 120. - In one embodiment, the
service level application 122 provides a system and a method for generating service level tiers, and assigning a service level tier based on authentication data or an authentication data type provided by a client. Theservice level application 122 may set a maximum listing price or a maximum number of transactions for a seller in themarketplace application 120 based on the type of authentication data provided by the seller when the seller signs up for an account with themarketplace application 120. The type of authentication data may be used to verify the identity of the seller. For example, the service level tier for a seller providing a driver's license number from a Department of Motor Vehicles agency may be higher than the service level tier for a seller providing an email address as authentication data. In another example, different source of truth agencies may correspond to different service level tiers. For example, a passport agency as a source of truth may correspond to a higher service level tier than would a local library as a source of truth. In another example, the type of authentication data may correspond to an authentication program that generates a challenge (e.g., Captcha, video feedback) to the client to prevent bots from impersonating users. Components of theservice level application 122 are described in more detail below with respect toFIG. 3 . -
FIG. 2 shows a block diagram illustrating one example embodiment of themarketplace application 120. Themarketplace application 120 may be hosted on dedicated or shared server machines (not shown) that are communicatively coupled to enable communications between server machines. Themarketplace application 120 and theservice level application 122 themselves are communicatively coupled (e.g., via appropriate interfaces) to each other and to various data sources, so as to allow information to be passed between themarketplace application 120 and theservice level application 122 or so as to allow themarketplace application 120 and theservice level application 122 to share and access common data. Themarketplace application 120 and theservice level application 122 may, furthermore, access the one ormore databases 126 via thedatabase servers 124. - The
networked system 102 may provide a number of publishing, listing, and price-setting mechanisms whereby a seller may list (or publish information concerning) goods or services for sale; a buyer can express interest in or indicate a desire to purchase such goods or services; and a price can be set for a transaction pertaining to the goods or services. To this end, themarketplace application 120 is shown to include at least onepublication application 200 and one ormore auction applications 202, which support auction-format listing and price setting mechanisms (e.g., English, Dutch, Vickrey, Chinese, Double, Reverse auctions,). Thevarious auction applications 202 may also provide a number of features in support of such auction-format listings, such as a reserve price feature whereby a seller may specify a reserve price in connection with a listing, and a proxy-bidding feature whereby a bidder may invoke automated proxy bidding. - A number of fixed-
price applications 204 support fixed-price listing formats (e.g., a traditional classified-advertisement-type listing or a catalogue listing) and buyout-type listings. Specifically, buyout-type listings (e.g., including the Buy-It-Now (BIN) technology developed by eBay Inc., of San Jose, Calif.) may be offered in conjunction with auction-format listings, and allow a buyer to purchase goods or services, which are also being offered for sale via an auction, for a fixed price that is typically higher than the starting price of the auction. -
Store applications 206 allow a seller to group listings within a “virtual” store, which may be branded and otherwise personalized by and for the seller. Such a virtual store may also offer promotions, incentives, and features that are specific and personalized to a relevant seller. -
Reputation applications 208 allow users who transact, utilizing thenetworked system 102, to establish, build, and maintain reputations, which may be made available and published to potential trading partners. For example, consider that where thenetworked system 102 supports person-to-person trading, users may have no history or other reference information whereby the trustworthiness and credibility of potential trading partners may be assessed. Thereputation applications 208 allow a user (for example, through feedback provided by other transaction partners) to establish a reputation within thenetworked system 102 over time. Other potential trading partners may then reference such a reputation for the purposes of assessing credibility and trustworthiness. -
Personalization applications 210 allow users of thenetworked system 102 to personalize various aspects of their interactions with thenetworked system 102. For example a user may, utilizing anappropriate personalization application 210, create a personalized reference page in which information regarding transactions to which the user is (or has been) a party may be viewed. Further, apersonalization application 210 may enable a user to personalize listings and other aspects of their interactions with thenetworked system 102 and other parties. - The
networked system 102 may support a number of marketplaces that are customized, for example, for specific geographic regions. A version of thenetworked system 102 may be customized for the United Kingdom, whereas another version of thenetworked system 102 may be customized for the United States. Each of these versions may operate as an independent marketplace or may be customized (or internationalized) presentations of a common underlying marketplace. Thenetworked system 102 may, accordingly, include a number ofinternationalization applications 212 that customize information in (or the presentation of information by) thenetworked system 102 according to predetermined criteria (e.g., geographic, demographic, or marketplace criteria). For example, theinternationalization applications 212 may be used to support the customization of information for a number of regional websites that are operated by thenetworked system 102 and that are accessible viarespective web servers 116. - Navigation of the
networked system 102 may be facilitated by one ormore navigation applications 214. For example, a search application (as an example of a navigation application 214) may enable key word searches of listings published via thenetworked system 102. A browse application may allow users to browse various category, catalogue, or inventory data structures according to which listings may be classified within thenetworked system 102. Variousother navigation applications 214 may be provided to supplement the search and browse applications. - In order to make listings available via the
networked system 102 as visually informing and attractive as possible, themarketplace application 120 may include one ormore imaging applications 216, which users may utilize to upload images for inclusion within the listings. Animaging application 216 also operates to incorporate images within viewed listings. Theimaging applications 216 may also support one or more promotional features, such as image galleries that are presented to potential buyers. For example, sellers may pay an additional fee to have an image included within a gallery of images for promoted items. -
Listing creation applications 218 allow sellers to conveniently author listings pertaining to goods or services that they wish to transact via thenetworked system 102, andlisting management applications 220 allow sellers to manage such listings. Specifically, where a particular seller has authored or published a large number of listings, the management of such listings may present a challenge. Thelisting management applications 220 provide a number of features (e.g., auto-relisting, inventory level monitors) to assist the seller in managing such listings. One or morepost-listing management applications 222 also assist sellers with a number of activities that typically occur post-listing. For example, upon completion of an auction facilitated by the one ormore auction applications 202, a seller may wish to leave feedback regarding a particular buyer. To this end, apost-listing management application 222 may provide an interface to the one ormore reputation applications 208, so as to allow the seller to conveniently provide feedback regarding multiple buyers to thereputation applications 208. -
Dispute resolution applications 224 provide mechanisms whereby disputes arising between transacting parties may be resolved. For example, thedispute resolution applications 224 may provide guided procedures whereby the parties are guided through a number of steps in an attempt to settle a dispute. In the event that the dispute cannot be settled via the guided procedures, the dispute may be escalated to a third party mediator or arbitrator. - A number of
fraud prevention applications 226 implement fraud detection and prevention mechanisms to reduce the occurrence of fraud within thenetworked system 102. -
Messaging applications 228 are responsible for the generation and delivery of messages to users of the networked system 102 (such as, for example, messages advising users regarding the status of listings at the networked system 102 (e.g., providing “outbid” notices to bidders during an auction process or providing promotional and merchandising information to users)).Respective messaging applications 228 may utilize any one of a number of message delivery networks and platforms to deliver messages to users. For example, themessaging applications 228 may deliver electronic mail (e-mail), instant message (IM), Short Message Service (SMS), text, facsimile, or voice (e.g., Voice over IP (VoIP)) messages via wired (e.g., the Internet), plain old telephone service (POTS), or wireless (e.g., mobile, cellular, WiFi, WiMAX) networks. -
Merchandising applications 230 support various merchandising functions that are made available to sellers to enable sellers to increase sales via thenetworked system 102. Themerchandising applications 230 also operate the various merchandising features that may be invoked by sellers and may monitor and track the success of merchandising strategies employed by sellers. - The
networked system 102 itself, or one or more parties that transact via thenetworked system 102, may operate loyalty programs that are supported by one or more loyalty/promotion applications 232. For example, a buyer may earn loyalty or promotion points for each transaction established or concluded with a particular seller, and be offered a reward for which accumulated loyalty points can be redeemed. -
FIG. 3 shows a block diagram illustrating one example embodiment of theservice level application 122. Theservice level application 122 may include anauthentication module 302, a source oftruth module 304, and a servicelevel access module 306. - The
authentication module 302 may determine a type of authentication data received from the client. For example, theauthentication module 302 may determine that the authentication data corresponds to a telephone number based on a format. In another example, the client may specify the type of authentication data (e.g., telephone number, address, driver's license number). In another embodiment, theauthentication module 302 may determine an authentication program based on the authentication data. For example, the authentication program may include a Captcha challenge, a password, or any other challenge-response authentication program. Theauthentication module 302 is described in more detail below with respect toFIG. 4 . - The source of
truth module 304 may determine a source of truth corresponding to the authentication data. The source of truth may include an authority or an agency associated with the authentication data. For example, the source of truth for a driver's license number would be a Department of Motor Vehicles agency. The source of truth for a Social Security number would be the Social Security Administration agency. The source of truth for a credit card number may be a credit bureau or a bank. The source oftruth module 304 is described in more detail below with respect toFIG. 5 . - The service
level access module 306 may generate a tiered access level matrix for themarketplace application 120 based on the type of the authentication data and a type of the source of truth. The servicelevel access module 306 assigns an access level tier to a seller in themarketplace application 120. The servicelevel access module 306 is described in more detail below with respect toFIG. 6 . -
FIG. 4 shows a block diagram illustrating one example embodiment of theauthentication module 302. Theauthentication module 302 may include an authenticationtype query module 402 and an authenticationtype category module 404. The authenticationtype query module 402 may generate a query to the client requesting the client to specify a type of authentication data. The authenticationtype category module 404 may determine the type of authentication data based on a format of the authentication data provided by the client or based on the information provided by the client in response to the query generated by the authenticationtype query module 402. As previously described, authentication types may include using authentication data related to a source of truth or using an authentication program such as a username and password. In another embodiment, the authenticationtype category module 404 generates a category for the information provided by the client in response to the query generated by the authenticationtype query module 402. -
FIG. 5 shows a block diagram illustrating one example embodiment of the source oftruth module 304. The source oftruth module 304 may include a source oftruth agency module 502, a source oftruth access module 504, and avalidation module 506. The source oftruth agency module 502 determines which agency to access based on the authentication data provided by the client. For example, the source oftruth agency module 502 may determine that the source of truth is a bank corresponding to a bank account number provided by the client. - The source of
truth access module 504 may be configured to access multiple source of truth agencies. For example, the source oftruth access module 504 may access and query a database of the bank related to the bank account number provided by the client. In another example, the source oftruth access module 504 may access and query information from a credit bureau in response to credit information provided by the client. - The
validation module 506 may be configured to verify the information provided by the client with the corresponding source of truth agency. For example, thevalidation module 506 may query a bank to verify a validity of the bank account number provided by the client. If the bank account number is valid, thevalidation module 506 may validate the authentication data provided by the client. -
FIG. 6 shows a block diagram illustrating one example embodiment of the servicelevel access module 306. The servicelevel access module 306 may include an access leveltier matrix module 602 and an accesslevel tier module 604. The servicelevel access module 306 determines a level of access tier based on the type of source of truth or authentication data. The access leveltier matrix module 602 may generate a matrix identifying access level tiers based on the type of source of truth or authentication data. For example, the access level tier matrix may include a first access level tier corresponding to a source of truth such as credit bureau agencies, a second access level tier corresponding to banks, and a third access level tier corresponding to e-mail providers. The first access level tier may include greater access privileges than the second and third access level tiers. The second access level tier may include greater access privileges than the third access level tier. The privileges may include a sale amount limit and a limit on number of transactions during a predefined amount of time. The privileges may increase as the user transacts more frequently with themarketplace application 120 and receives positive feedback from buyers (e.g., through the reputation applications 208). The accesslevel tier module 604 assigns an access level tier to the client based on the access level tier matrix. -
FIG. 7 shows a flow diagram illustrating one example embodiment of amethod 700 of theservice level application 122. Atoperation 702, theservice level application 122 receives authentication data and determines a type of authentication corresponding to the authentication data. In one example embodiment,operation 702 may be implemented with theauthentication module 302. Atoperation 704, theservice level application 122 identifies a source of truth agency corresponding to the type of authentication. In one example embodiment,operation 704 may be implemented with the source oftruth module 304. Atoperation 706, theservice level application 122 accesses the corresponding source of truth agency to verify the authentication data provided by the client. In one example embodiment,operation 706 may be implemented with the source oftruth module 304. At operation 708, theservice level application 122 determines whether the provided authentication data is valid based on the access to the corresponding source of truth agency. In one example embodiment, operation 708 may be implemented with the source oftruth module 304. Theservice level application 122 may deny the client access to opening an account with themarketplace application 120 in response to invalid authentication data atoperation 712. For example, theservice level application 122 may determine that the client is a bot based on the invalid authentication data. Atoperation 710, theservice level application 122 determines and assigns an access level tier to the client or user based on the type of authentication and the source of truth. In one example embodiment,operation 710 may be implemented with the servicelevel access module 306. -
FIG. 8 shows a flow diagram illustrating another example embodiment of amethod 800 of theservice level application 122. Atoperation 802, theservice level application 122 receives authentication data from a client and determines the type of authentication corresponding to the authentication data. In one example embodiment,operation 802 may be implemented with the authenticationtype query module 404. Atoperation 804, theservice level application 122 accesses a verification program corresponding to the type of authentication. At operation 806, theservice level application 122 determines whether the authentication data is valid using the verification program. Theservice level application 122 may deny the client access to opening an account with themarketplace application 120 in response to invalid authentication data atoperation 810. Atoperation 808, theservice level application 122 determines and assigns an access level tier to the client or user based on the type of authentication and the verification program. In one example embodiment,operation 808 may be implemented with the servicelevel access module 306. -
FIG. 9 shows a ladder diagram illustrating one example embodiment of an operation of the service level application. Atoperation 910, aclient 902 provides authentication data or an authentication type of the authentication data to aservice level application 904. Atoperation 912, theservice level application 904 determines an authentication type and a corresponding source of truth agency. Atoperation 914, theservice level application 904 accesses the corresponding source oftruth agency 906. Atoperation 916, theservice level application 904 verifies the authentication data with the source oftruth agency 906. Atoperation 918, theservice level application 904 determines a corresponding access level tier, and provides theclient 902 access to amarketplace application 908 with the corresponding access level tier inoperation 920. Atoperation 922, theservice level application 904 may communicate the authorized access level tier to themarketplace application 908. -
FIG. 10 shows a ladder diagram illustrating another example embodiment of an operation of the service level application. Atoperation 1010, aclient 1002 provides authentication data or an authentication type of the authentication data to aservice level application 1004. Atoperation 1012, theservice level application 1004 determines the authentication type and a corresponding verification program. Atoperation 1014, theservice level application 1004 accesses thecorresponding verification program 1006. Atoperation 1016, theservice level application 1004 verifies the authentication data with theverification program 1006. At operation 1018, theservice level application 1004 determines the corresponding access level tier based on theverification program 1006. Atoperation 1020, theservice level application 1004 provides theclient 1002 with access to amarketplace application 1008 with the corresponding access level tier. Atoperation 1022, theservice level application 1004 communicates the authorized access level tier to themarketplace application 1008. - Certain embodiments are described herein as including logic or a number of components, modules, or mechanisms. Modules may constitute either software modules (e.g., code embodied (1) on a non-transitory machine-readable medium or (2) in a transmission signal) or hardware-implemented modules. A hardware-implemented module is a tangible unit capable of performing certain operations and may be configured or arranged in a certain manner. In example embodiments, one or more computer systems (e.g., a standalone, client, or server computer system) or one or more processors may be configured by software (e.g., an application or application portion) as a hardware-implemented module that operates to perform certain operations as described herein.
- In various embodiments, a hardware-implemented module may be implemented mechanically or electronically. For example, a hardware-implemented module may comprise dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC)) to perform certain operations. A hardware-implemented module may also comprise programmable logic or circuitry (e.g., as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware-implemented module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.
- Accordingly, the term “hardware-implemented module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily or transitorily configured (e.g., programmed) to operate in a certain manner or to perform certain operations described herein. Considering embodiments in which hardware-implemented modules are temporarily configured (e.g., programmed), each of the hardware-implemented modules need not be configured or instantiated at any one instance in time. For example, where the hardware-implemented modules comprise a general-purpose processor configured using software, the general-purpose processor may be configured as respectively different hardware-implemented modules at different times. Software may, accordingly, configure a processor, for example, to constitute a particular hardware-implemented module at one instance of time and to constitute a different hardware-implemented module at a different instance of time.
- Hardware-implemented modules can provide information to, and receive information from, other hardware-implemented modules. Accordingly, the described hardware-implemented modules may be regarded as being communicatively coupled. Where multiples of such hardware-implemented modules exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses that connect the hardware-implemented modules). In embodiments in which multiple hardware-implemented modules are configured or instantiated at different times, communications between such hardware-implemented modules may be achieved, for example, through the storage and retrieval of information in memory structures to which the multiple hardware-implemented modules have access. For example, one hardware-implemented module may perform an operation, and store the output of that operation in a memory device to which it is communicatively coupled. A further hardware-implemented module may then, at a later time, access the memory device to retrieve and process the stored output. Hardware-implemented modules may also initiate communications with input or output devices, and can operate on a resource (e.g., a collection of information).
- The various operations of example methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions. The modules referred to herein may, in some example embodiments, comprise processor-implemented modules.
- Similarly, the methods described herein may be at least partially processor-implemented. For example, at least some of the operations of a method may be performed by one or more processors or processor-implemented modules. The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the processor or processors may be located in a single location (e.g., within a home environment, an office environment, or a server farm), while in other embodiments the processors may be distributed across a number of locations.
- The one or more processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). For example, at least some of the operations may be performed by a group of computers (as examples of machines including processors), with these operations being accessible via the network 104 (e.g., the Internet) and via one or more appropriate interfaces (e.g., APIs).
- Example embodiments may be implemented in digital electronic circuitry, or in computer hardware, firmware, or software, or in combinations of them. Example embodiments may be implemented using a computer program product (e.g., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable medium for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers).
- A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a standalone program or as a module, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
- In example embodiments, operations may be performed by one or more programmable processors executing a computer program to perform functions by operating on input data and generating output. Method operations can also be performed by, and apparatus of example embodiments may be implemented as, special purpose logic circuitry (e.g., an FPGA or an ASIC).
- The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. In embodiments deploying a programmable computing system, it will be appreciated that both hardware and software architectures merit consideration. Specifically, it will be appreciated that the choice of whether to implement certain functionality in permanently configured hardware (e.g., an ASIC), in temporarily configured hardware (e.g., a combination of software and a programmable processor), or in a combination of permanently and temporarily configured hardware may be a design choice. Below are set out hardware (e.g., machine) and software architectures that may be deployed in various example embodiments.
-
FIG. 11 shows a diagrammatic representation of a machine in the example form of a machine orcomputer system 1100 within which a set ofinstructions 1124 may be executed causing the machine to perform any one or more of the methodologies discussed herein. In alternative embodiments, the machine operates as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the machine may operate in the capacity of a server or aclient machine instructions 1124 to perform any one or more of the methodologies discussed herein. - The
example computer system 1100 includes a processor 1102 (e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both), amain memory 1104, and astatic memory 1106, which communicate with each other via abus 1108. Thecomputer system 1100 may further include a video display unit 1110 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)). Thecomputer system 1100 also includes an alphanumeric input device 1112 (e.g., a keyboard), a UI navigation device 1114 (e.g., a mouse), adrive unit 1116, a signal generation device 1118 (e.g., a speaker), and anetwork interface device 1120. - The
drive unit 1116 includes a computer-readable medium 1122 on which is stored one or more sets of data structures and instructions 1124 (e.g., software) embodying or utilized by any one or more of the methodologies or functions described herein. Theinstructions 1124 may also reside, completely or at least partially, within themain memory 1104 or within theprocessor 1102 during execution thereof by thecomputer system 1100, with themain memory 1104 and theprocessor 1102 also constituting machine-readable media. - The
instructions 1124 may further be transmitted or received over anetwork 1126 via thenetwork interface device 1120 utilizing any one of a number of well-known transfer protocols (e.g., HTTP). - While the computer-
readable medium 1122 is shown in an example embodiment to be a single medium, the term “computer-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets ofinstructions 1124. The term “computer-readable medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set ofinstructions 1124 for execution by the machine that cause the machine to perform any one or more of the methodologies of the present disclosure, or that is capable of storing, encoding, or carrying data structures utilized by or associated with such a set ofinstructions 1124. The term “computer-readable medium” shall, accordingly, be taken to include, but not be limited to, solid-state memories, optical media, and magnetic media. - Furthermore, the machine-readable medium is non-transitory in that it does not embody a propagating signal. However, labeling the tangible machine-readable medium “non-transitory” should not be construed to mean that the medium is incapable of movement—the medium should be considered as being transportable from one physical location to another. Additionally, since the machine-readable medium is tangible, the medium may be considered to be a machine-readable device.
-
FIG. 12 is a block diagram illustrating amobile device 1200, according to an example embodiment. Themobile device 1200 may include aprocessor 1202. Theprocessor 1202 may be any of a variety of different types of commerciallyavailable processors 1202 suitable for mobile devices 1200 (for example, an XScale architecture microprocessor, a microprocessor without interlocked pipeline stages (MIPS) architecture processor, or another type of processor 1202). Amemory 1204, such as a random access memory (RAM), a flash memory, or another type of memory, is typically accessible to theprocessor 1202. Thememory 1204 may be adapted to store an operating system (OS) 1206, as well asapplications 1208, such as a mobile location enabled application that may provide location-based services (LBSs) to a user. Theprocessor 1202 may be coupled, either directly or via appropriate intermediary hardware, to adisplay 1210 and to one or more input/output (I/O)devices 1212, such as a keypad, a touch panel sensor, a microphone, and the like. Similarly, in some embodiments, theprocessor 1202 may be coupled to atransceiver 1214 that interfaces with anantenna 1216. Thetransceiver 1214 may be configured to both transmit and receive cellular network signals, wireless data signals, or other types of signals via theantenna 1216, depending on the nature of themobile device 1200. Further, in some configurations, aGPS receiver 1218 may also make use of theantenna 1216 to receive GPS signals. - Although an embodiment has been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the present disclosure. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense. The accompanying drawings that form a part hereof show by way of illustration, and not of limitation, specific embodiments in which the subject matter may be practiced. The embodiments illustrated are described in sufficient detail to enable those skilled in the art to practice the teachings disclosed herein. Other embodiments may be utilized and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. This Detailed Description, therefore, is not to be taken in a limiting sense, and the scope of various embodiments is defined only by the appended claims, along with the full range of equivalents to which such claims are entitled.
- As used herein, the term “or” may be construed in either an inclusive or exclusive sense. Moreover, plural instances may be provided for resources, operations, or structures described herein as a single instance. Additionally, boundaries between various resources, operations, modules, engines, and data stores are somewhat arbitrary, and particular operations are illustrated in a context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within a scope of various embodiments of the present invention. In general, structures and functionality presented as separate resources in the example configurations may be implemented as a combined structure or resource. Similarly, structures and functionality presented as a single resource may be implemented as separate resources. These and other variations, modifications, additions, and improvements fall within a scope of embodiments of the present invention as represented by the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
- Such embodiments of the inventive subject matter may be referred to herein, individually and/or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed. Thus, although specific embodiments have been illustrated and described herein, it should be appreciated that any arrangement calculated to achieve the same purpose may be substituted for the specific embodiments shown. This disclosure is intended to cover any and all adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent to those of skill in the art upon reviewing the above description.
- The Abstract of the Disclosure is provided to comply with 37 C.F.R. § 1.72(b), requiring an abstract that will allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/212,592 US20190108565A1 (en) | 2014-08-18 | 2018-12-06 | Providing privileges and granting or denying a level of access to resources based on authentication by authentication sources |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/462,361 US10181143B2 (en) | 2014-08-18 | 2014-08-18 | Providing privileges and granting or denying a level of access to resources based on authentication by authentication sources |
US16/212,592 US20190108565A1 (en) | 2014-08-18 | 2018-12-06 | Providing privileges and granting or denying a level of access to resources based on authentication by authentication sources |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/462,361 Continuation US10181143B2 (en) | 2014-08-18 | 2014-08-18 | Providing privileges and granting or denying a level of access to resources based on authentication by authentication sources |
Publications (1)
Publication Number | Publication Date |
---|---|
US20190108565A1 true US20190108565A1 (en) | 2019-04-11 |
Family
ID=55302504
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/462,361 Expired - Fee Related US10181143B2 (en) | 2014-08-18 | 2014-08-18 | Providing privileges and granting or denying a level of access to resources based on authentication by authentication sources |
US16/212,592 Abandoned US20190108565A1 (en) | 2014-08-18 | 2018-12-06 | Providing privileges and granting or denying a level of access to resources based on authentication by authentication sources |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/462,361 Expired - Fee Related US10181143B2 (en) | 2014-08-18 | 2014-08-18 | Providing privileges and granting or denying a level of access to resources based on authentication by authentication sources |
Country Status (1)
Country | Link |
---|---|
US (2) | US10181143B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11082454B1 (en) | 2019-05-10 | 2021-08-03 | Bank Of America Corporation | Dynamically filtering and analyzing internal communications in an enterprise computing environment |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10880312B1 (en) * | 2018-11-21 | 2020-12-29 | Amazon Technologies, Inc. | Authentication and authorization with remotely managed user directories |
US10715463B1 (en) | 2020-02-20 | 2020-07-14 | Robert Gelfond | System and method for controlling access to resources in a multicomputer network |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8925053B1 (en) * | 2012-02-24 | 2014-12-30 | Emc Corporation | Internet-accessible service for dynamic authentication and continuous assertion of trust level in identities |
US20150142647A1 (en) * | 2013-11-20 | 2015-05-21 | Bank Of America Corporation | Consumer Bill-Pay |
US20150227732A1 (en) * | 2014-02-10 | 2015-08-13 | Level 3 Communications, Llc | Authentication system and method |
US20150229624A1 (en) * | 2014-02-07 | 2015-08-13 | Bank Of America Corporation | User authentication based on historical user behavior |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6609198B1 (en) * | 1999-08-05 | 2003-08-19 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
-
2014
- 2014-08-18 US US14/462,361 patent/US10181143B2/en not_active Expired - Fee Related
-
2018
- 2018-12-06 US US16/212,592 patent/US20190108565A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8925053B1 (en) * | 2012-02-24 | 2014-12-30 | Emc Corporation | Internet-accessible service for dynamic authentication and continuous assertion of trust level in identities |
US20150142647A1 (en) * | 2013-11-20 | 2015-05-21 | Bank Of America Corporation | Consumer Bill-Pay |
US20150229624A1 (en) * | 2014-02-07 | 2015-08-13 | Bank Of America Corporation | User authentication based on historical user behavior |
US20150227732A1 (en) * | 2014-02-10 | 2015-08-13 | Level 3 Communications, Llc | Authentication system and method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11082454B1 (en) | 2019-05-10 | 2021-08-03 | Bank Of America Corporation | Dynamically filtering and analyzing internal communications in an enterprise computing environment |
Also Published As
Publication number | Publication date |
---|---|
US20160048893A1 (en) | 2016-02-18 |
US10181143B2 (en) | 2019-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20150112887A1 (en) | Locker drop off | |
US11847625B2 (en) | Kiosk for receiving and delivering packages | |
US20130110716A1 (en) | System and method for utilizing student accounts | |
US20080162295A1 (en) | Method and system for payment authentication | |
US8621490B2 (en) | Method and system for user-designed application deployment | |
US20090037285A1 (en) | Method and system for dynamic funding | |
US11017456B2 (en) | Time- and geolocation-limited marketplace | |
US11488218B2 (en) | Using plain text to list an item on a publication system | |
US20190108565A1 (en) | Providing privileges and granting or denying a level of access to resources based on authentication by authentication sources | |
US8069114B2 (en) | Method and system for processing transfer requests | |
US11727455B2 (en) | Unpaid item risk management | |
US20100121649A1 (en) | Methods and systems for user registration | |
US10015240B2 (en) | Method and system for interface data utilization | |
US20110119069A1 (en) | Methods and systems for recurring feature subscription service | |
US20150100460A1 (en) | Arranging safe and convenient transactions | |
US10650004B2 (en) | Self-guided verification of an item | |
US20150286999A1 (en) | Method and system for transaction processing | |
KR20200061123A (en) | System and method for preventing false offerings by confirming seller of real estate | |
CA2704095A1 (en) | Methods and systems for recurring feature subscription service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: EBAY INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:THANUVAN, VENKATESH;VENGALATHUR SRINATH, BADRINATH;REEL/FRAME:047802/0660 Effective date: 20140805 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |