The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 28, 2025

Filed:

Dec. 22, 2020
Applicant:

Stripe, Inc., San Francisco, CA (US);

Inventors:

Ryan Drapeau, Seattle, WA (US);

Leela Senthil Nathan, Seattle, WA (US);

Kefeng Chen, Kirkland, WA (US);

Ryan Koven, New York, NY (US);

Joseph Kirwin, Victoria, CA;

Assignee:

STRIPE, INC., San Francisco, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 9/32 (2006.01); G06F 9/54 (2006.01); G06N 20/00 (2019.01); G06Q 20/08 (2012.01); G06Q 20/34 (2012.01); G06Q 20/38 (2012.01); G06Q 20/40 (2012.01); G06Q 30/018 (2023.01); G06Q 40/02 (2023.01); H04L 67/146 (2022.01);
U.S. Cl.
CPC ...
H04L 9/3242 (2013.01); G06F 9/546 (2013.01); G06N 20/00 (2019.01); G06Q 20/085 (2013.01); G06Q 20/34 (2013.01); G06Q 20/3825 (2013.01); G06Q 20/3827 (2013.01); G06Q 20/4014 (2013.01); G06Q 20/4016 (2013.01); G06Q 20/405 (2013.01); G06Q 30/0185 (2013.01); H04L 9/3226 (2013.01); G06Q 40/02 (2013.01); G06Q 2220/00 (2013.01); H04L 67/146 (2013.01); H04L 2209/56 (2013.01);
Abstract

A method and apparatus for using cryptographically signed secure identifiers to detect fraud during network based transactions are described. The method may include receiving a transaction from a user device, the transaction comprising a secure identifier purported to be associated with the user device, and the transaction further comprising transaction data. The method may also include extracting a first identifier and a second identifier from the secure identifier purported to be associated with the user device, and then regenerating a true second identifier using the first identifier. Furthermore, when it is determined that the true second identifier matches the second identifier extracted from the secure identifier purported to be associated with the user device, the method may include determining that the secure identifier is valid, and processing the transaction based at least in part on the determination that the secure identifier is valid.


Find Patent Forward Citations

Loading…