Stripe, Inc. patent applications on 2025-06-12
Patent Applications by Stripe, Inc. on June 12th, 2025
Stripe, Inc.: 6 patent applications
Stripe, Inc. has applied for patents in the areas of G06F16/9577 ({Optimising the visualization of content, e.g. distillation of HTML documents}, 1), G06Q20/389 ({Keeping log of transactions for guaranteeing non-repudiation of a transaction}, 1), G06Q20/4016 ({involving fraud or risk level assessment in transaction processing}, 1), G06Q40/12 (Accounting, 1), H04L9/3213 ({using tickets or tokens, e.g. Kerberos (network architectures or network communication protocols for entities authentication using tickets in a packet data network )}, 1), H04L63/0884 ({by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity}, 1)
With keywords such as: data, worker, shared, across, object, browser, example, embodiment, used, synchronize in patent application abstracts.
Top Inventors:
- Miguel Jimenez Esun of Madrid ES (1 patents)
- Ilya Ganelin of Berkeley CA US (2 patents)
- Sharjeel Sohail of Redmond WA US (2 patents)
- Peter Bakkum of San Francisco CA US (2 patents)
- Amadeo Casas of Brookline MA US (1 patents)
Patent Applications by Stripe, Inc.
20250190511. AUTOMATICALLY UPDATING MODULES ACROSS WEB INTERFACES (Stripe, .)
Abstract: in an example embodiment, a shared worker object is used in a web browser to synchronize data across tabs in the web browser, without relying upon a web server to perform or coordinate that synchronization. more particularly, each browsing context includes a web page and zero or more web worker objects, each web worker object corresponding to a different module of the web page. the zero or more web worker objects in each web page user interface are then configured to communicate with a single shared worker, through which all data requests and data changes are sent. the single shared worker forwards data requests and data changes to the web server, but also tracks such data requests and then automatically updates any browsing context that requested a particular piece of data in the past with a change that occurred to that particular piece of data.
20250190982. SYSTEMS METHODS HEALTH ANALYSIS MODELED SOFTWARE SYSTEM (Stripe, .)
Abstract: a method and apparatus are described for performing a health analysis of a modeled software system of a distributed services system. a stream of ledger transaction messages generated during execution of the software system are received and stored in a data store. a ledger data model is accessed, where the data model represents a state machine having states, data, and transitions between states indicative of proper functioning of the underlying software system. a ledger clearing operation is performed to generate monetary balances of states in the data model for a plurality of transactions, and aggregated values associated with operational characteristics of various states of the data model. from the aggregated values, a graphical user interface is caused to be display the values of the operational characteristics aggregated over a set of transactions as health indicators of the underlying operations performed by a software system, across software systems, or other subsets of configurable options.
20250190991. TRANSACTION RISK RULES ENGINE (Stripe, .)
Abstract: a service for providing extensible fraud detection may manage the application of a ruleset that evaluates whether or not a transaction is fraudulent. the service groups the features in a ruleset or across multiple rulesets, and dispatches a thread for each group to obtain the feature values for that group. the service evaluates the ruleset with the obtained feature values to determine whether or not a given transaction is fraudulent in view of the ruleset.
20250191076. SYSTEMS METHODS MODELING DISTRIBUTED SERVICE SYSTEMS LEDGER SYSTEM (Stripe, .)
Abstract: a method and apparatus are described for modeling a software system of a distributed services system. the method includes receiving a stream of ledger transaction messages generated by a software system, which are then stored in a data store. a ledger system accesses a data model representing a state machine of the proper functioning of the software system. a ledger clearance operation is performed using the state machine and the data stored within the stream of ledger transaction messages in the data store to generate balances within states of the state machine. the ledger system detects an operational characteristic, such as proper function or improper function, of the software system based on a balance of a state in the state machine. such detection is performed without knowledge of the underlying implementation of the software system.
20250193009. SYSTEMS METHODS AUTHENTICATING CLIENTS ACCESS DATA (Stripe, .)
Abstract: presented herein are systems and methods of generating security-aware tokens. a token may include (i) a first signature encrypted by the second service and (ii) an identification of the plurality of databases accessible using the first token. when a processor determines that the token is valid, the processor may generate a second signature using an encryption key of the first service and a third signature using the shared key of the second service. thereby a second token derivative of the first token can be created to include (i) the second signature of the first service, (ii) the third signature generated from the shared key of the second service, and (iii) the identification of the plurality of databases accessible using the second token.
20250193185. SYSTEMS METHODS AUTHENTICATING CLIENTS ACCESS DATA (Stripe, .)
Abstract: presented herein are systems and methods of authenticating clients to access data via proxy layers. a gateway on a proxy layer may receive a request from a client to access data in a compartment on the database layer. the request may include a token based at least on an encryption of an identifier of the compartment responsive to successful authentication of the request at an application layer. the gateway may, responsive to identifying the identifier as referencing the compartment, determine that the client is authorized to access the data in the compartment on the database layer through the proxy layer. the gateway may select a permission for the client to access the compartment through the proxy layer based on the context of the request. the gateway may generate an indication that the client is authorized to access the data in accordance with the permission.