Patents by Inventor Jeffrey L. King

Jeffrey L. King has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10282180
    Abstract: A merchant generates a customized service strategy related to a suite of electronic transaction services hosted by a service provider. The custom strategy specifies services to perform, and possibly an order in which to perform the services, by a service provider in relation to an electronic transaction associated with the merchant. Through use of a user interface, the strategy can be represented as a graphical decision tree, with terminal nodes representing services or actions. A customized strategy is transmitted to a service provider, as is transaction related information, whereby the service provider can service the transaction according to the strategy and based on the transaction information. Scheduling information that specifies different strategies to apply to different transaction scenarios can be generated. A strategy is selected by a service provider based on the scheduling information and transaction information, and is used to service one or more electronic transactions.
    Type: Grant
    Filed: May 4, 2016
    Date of Patent: May 7, 2019
    Assignee: CyberSource Corporation
    Inventors: Michael Pe Jiminez, Theodore A. Strout, Timothy R. Harding, Jeffrey L. King
  • Publication number: 20160246581
    Abstract: A merchant generates a customized service strategy related to a suite of electronic transaction services hosted by a service provider. The custom strategy specifies services to perform, and possibly an order in which to perform the services, by a service provider in relation to an electronic transaction associated with the merchant. Through use of a user interface, the strategy can be represented as a graphical decision tree, with terminal nodes representing services or actions. A customized strategy is transmitted to a service provider, as is transaction related information, whereby the service provider can service the transaction according to the strategy and based on the transaction information. Scheduling information that specifies different strategies to apply to different transaction scenarios can be generated. A strategy is selected by a service provider based on the scheduling information and transaction information, and is used to service one or more electronic transactions.
    Type: Application
    Filed: May 4, 2016
    Publication date: August 25, 2016
    Inventors: Michael Pe Jiminez, Theodore A. Strout, Timothy R. Harding, Jeffrey L. King
  • Patent number: 7930284
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Grant
    Filed: July 2, 2010
    Date of Patent: April 19, 2011
    Assignee: eBay Inc.
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley
  • Publication number: 20100269161
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Application
    Filed: July 2, 2010
    Publication date: October 21, 2010
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H. Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley
  • Patent number: 7769737
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Grant
    Filed: September 28, 2009
    Date of Patent: August 3, 2010
    Assignee: eBay Inc.
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley
  • Publication number: 20100017865
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Application
    Filed: September 28, 2009
    Publication date: January 21, 2010
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H. Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley
  • Patent number: 7606821
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Grant
    Filed: June 30, 2004
    Date of Patent: October 20, 2009
    Assignee: eBay Inc.
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley
  • Publication number: 20020024420
    Abstract: A key for selectively allowing access to an enclosure having an unpowered lock and a lock controller is disclosed. The key comprises: a housing.
    Type: Application
    Filed: June 27, 2001
    Publication date: February 28, 2002
    Inventors: Raymond F. Ayala, Philip J. Finlay, Jeffrey L. King, Steven Shannon, Woodrow C. Stillwagon
  • Publication number: 20020014950
    Abstract: A method for programming a key for selectively allowing access to at least one enclosure having a lock controlled by a lock controller is disclosed. The method comprises: detecting the key; identifying the key by a static key number and a key user; identifying the at least one authorized enclosure corresponding to the identified key; loading the at least one authorized enclosure identification onto the key; generating a plurality of date sensitive key access codes; and loading the plurality of date sensitive key access codes in the key.
    Type: Application
    Filed: June 27, 2001
    Publication date: February 7, 2002
    Inventors: Raymond F. Ayala, Philip J. Finlay, Jeffrey L. King, Steven Shannon, Matthew D. Steindl, Woodrow C. Stillwagon