Skip to main content

Online Shopping Identity - Identifying Bad Merchants, Bad Customers

Ever came across a bad merchant operating under different alias name on eBay and CraigsList…ever came across a customer who always uses and returns product in the 30 day money back trial…let’s identify them and understand an architecture solution option for this.

In a patent disclosure 20110047040- Alias Identity And Reputation Validation Engine, the inventors Mark Carlson, Patrick Stan, Patrick Faith, Benjamin Rewis present methods and system which provides online identity and reputation information.

With the prevalence of multiple online shopping sites, it is common for merchants and customers to have different alias (aka user ids) on different sites. This means that if a merchant selling products on eBay gets a lot of negative feedback for poor quality, he just closes that alias and opens a new alias on eBay or CraigsList. Similarly a mischievous customer keeps on having multiple alias on same or different sites. It would be prudent in such online business environment to have a common reputation and identity mechanism which can link together all the alias and provide combined transaction history, feedback, rating etc.

The alias profile of a merchant usually includes information about the financial institutions used by the entity to conduct its business, the complaint history, information about the server computer used by the entity, any other aliases used by the entity, location of the entity, transaction information about the entity, and any ratings information.

“Since the reputation and validation engine captures information about an alias from various sources … even though the merchant is new to the second marketplace, the alias identity and reputation validation server computer can analyze the information gathered from the merchant at the second marketplace and match it with information received from the first marketplace and conclude that this is the same merchant.”

For the purpose of simpler instance, let us have a payment processing and analysis module communicate the collected raw transaction data to the data collection module. The data collection module can be a Apache Hadoop cluster with HDFS to store data across nodes.

The raw transaction data is transmitted to alias indexing module which uses HBase for supporting indexed and real-time queries. The module does not provide detailed information on profile or history – just indexed results on transactions per merchant or customer. For instance, if during a transaction, the history of a merchant is queried, the web portal can invoke a query from its web server cache which has been periodically refreshed or updated real time from HBase.

The alias profiling module is the one which creates linkages between various transactions and the aliases/objects that are involved in the transactions.  Although the inventors don’t mention usage of MapReduce, it is one of the algorithm approach that can be used to arrive at a single common view of information per merchant or customer.

Similarly, the information captured and processed can be used to predict entity behavior also. For instance, if a merchant has a history to delay shipments of mobile phones but has a good track record of shipping TVs, the customer can have that info handy. Similarly, if a customer has a history of buying in first week of each month, the shopping portal and specific merchants can send interesting offers during the last week of each month.

In a real world, however, the challenges of course remain with fierce competition between various portals and lack of data sharing among the portals. However, the technology solution is here and with some online market consolidation expected in next few years, we can expect better identity management in e-commerce.

©, All Rights reserved

Apache™ Hadoop™ HBase™are the trademarks of Apache Software foundation.


Popular posts from this blog

Beyond NSA, the intelligence community has a big technology footprint

While all through the past few days the focus has been on NSA activities, the discussion has often veered around the technologies and products used by NSA. At the same time, a side discussion topic has been the larger technical ecosystem of intelligence units. CIA has been one of the more prolific users of Information Technology by its own admission. To that extent, CIA spinned off a venture capital firm In-Q-Tel in 1999 to invest in focused sector companies. Per Helen Coster of Fortune Magazine, In-Q-Tel (IQT) has been named “after the gadget-toting James Bond character Q”.
In-Q-Tel states on its website that “We design our strategic investments to accelerate product development and delivery for this ready-soon innovation, and specifically to help companies add capabilities needed by our customers in the Intelligence Community”. To that effect, it has made over 200 investments in early stage companies for propping up products. Being a not-for-profit group, unlike Private Venture capi…

Data deduplication tactics with HDFS and MapReduce

As the amount of data continues to grow exponentially, there has been increased focus on stored data reduction methods. Data compression, single instance store and data deduplication are among the common techniques employed for stored data reduction.
Deduplication often refers to elimination of redundant subfiles (also known as chunks, blocks, or extents). Unlike compression, data is not changed and eliminates storage capacity for identical data. Data deduplication offers significant advantage in terms of reduction in storage, network bandwidth and promises increased scalability.
From a simplistic use case perspective, we can see application in removing duplicates in Call Detail Record (CDR) for a Telecom carrier. Similarly, we may apply the technique to optimize on network traffic carrying the same data packets.
Some of the common methods for data deduplication in storage architecture include hashing, binary comparison and delta differencing. In this post, we focus on how MapReduce and…

Top Big Data Influencers of 2015

2015 was an exciting year for big data and hadoop ecosystem. We saw hadoop becoming an essential part of data management strategy of almost all major enterprise organizations. There is cut throat competition among IT vendors now to help realize the vision of data hub, data lake and data warehouse with Hadoop and Spark.
As part of its annual assessment of big data and hadoop ecosystem, HadoopSphere publishes a list of top big data influencers each year. The list is derived based on a scientific methodology which involves assessing various parameters in each category of influencers. HadoopSphere Top Big Data Influencers list reflects the people, products, organizations and portals that exercised the most influence on big data and ecosystem in a particular year. The influencers have been listed in the following categories:

AnalystsSocial MediaOnline MediaProductsTechiesCoachThought LeadersClick here to read the methodology used.

Analysts:Doug HenschenIt might have been hard to miss Doug…