“Gail is an extremely supportive manager who keeps her eye on current technologies while contributing to the overall success of the company. She is a strong technical leader who is a pleasure to work with. I look forward to the day that I may get to work with Gail once again.”
About
Technology executive with 20+ years of software engineering leadership. Strategic and…
Activity
-
Heroku and Salesforce have a gem in our oclif open-source project. We might not know how to spell CONTRIBUTING (see github), but we sure know…
Heroku and Salesforce have a gem in our oclif open-source project. We might not know how to spell CONTRIBUTING (see github), but we sure know…
Shared by Gail Frederick
-
If you know Salesforce, you know that Trailhead is our amazing learning platform. Admin, code, AI, data, ethics, leadership, it's all there - and…
If you know Salesforce, you know that Trailhead is our amazing learning platform. Admin, code, AI, data, ethics, leadership, it's all there - and…
Shared by Gail Frederick
-
Who in my network works in the office of the US Surgeon General or HHS? Please DM me, I have some questions for you. Thank you so much.
Who in my network works in the office of the US Surgeon General or HHS? Please DM me, I have some questions for you. Thank you so much.
Posted by Gail Frederick
Experience
Education
Patents
-
Third-Party Application Risk Assessment in an Authorization Service
Issued US 11,757,924
Risk assessment in an authentication service is performed where an authorization request is received from a third-party application. Risk assessment policies for the authorization request are determined based on a class of the third-party application. The risk assessment policies are applied to the authorization request to determine an action to be performed for the authorization request, such as sending an authorization message in response to the authorization request or taking a remedial…
Risk assessment in an authentication service is performed where an authorization request is received from a third-party application. Risk assessment policies for the authorization request are determined based on a class of the third-party application. The risk assessment policies are applied to the authorization request to determine an action to be performed for the authorization request, such as sending an authorization message in response to the authorization request or taking a remedial action (e.g., suspending the application, limiting the available actions, or sending a notification to a trusted security application).
Other inventorsSee patent -
Complex Composite Tokens
Issued US 11,758,406
Technologies are shown for trust delegation that involve receiving a first request from a subject client and responding by sending a first token having first permissions to the subject client. A second request from a first actor includes the first token and responding involves linking the first actor to the subject client in a trust stack and sending a second token to the first actor with second permissions, the second token being a first complex token that identifies the subject client and the…
Technologies are shown for trust delegation that involve receiving a first request from a subject client and responding by sending a first token having first permissions to the subject client. A second request from a first actor includes the first token and responding involves linking the first actor to the subject client in a trust stack and sending a second token to the first actor with second permissions, the second token being a first complex token that identifies the subject client and the first actor. A third request from a second actor includes the second token and responding to the third request involves linking the second actor to the first actor in the trust stack, and sending a third token to the second actor partner with third permissions, the third token being a second complex token that identifies the first actor and the second actor.
-
Multi-legged network attribution using tracking tokens and attribution stack
Issued US 11,750,598
Technologies are shown for network attribution tracking for a multi-legged transaction that involve receiving a tracking token registration request from a partner service, generating a tracking token associated with the partner service, adding an entry to an attribution stack for a transaction, where the entry associates the tracking token with the partner service, and returning the tracking token to the partner service. Receiving a tracking token request can include determining whether the…
Technologies are shown for network attribution tracking for a multi-legged transaction that involve receiving a tracking token registration request from a partner service, generating a tracking token associated with the partner service, adding an entry to an attribution stack for a transaction, where the entry associates the tracking token with the partner service, and returning the tracking token to the partner service. Receiving a tracking token request can include determining whether the tracking token request includes a previously generated tracking token and using the previously generated tracking token to identify the attribution stack for the transaction. Adding an entry to an attribution stack for a transaction can include adding the entry to the attribution stack identified for the transaction. Attribution for a transaction can be obtained by accumulating attribution entities from each entry in the attribution stack identified for the transaction.
Other inventorsSee patent -
Application programming interface authorization conversion system
Issued CN 112583784 B
(Chinese patent) Systems and methods for translating API grants for UX sessions are provided. The authorization server receives a request to access a user experience (UX) session on behalf of a user from a third party application developed by a third party. The request includes an access token previously granted to the third party application by the authorization server in response to the user agreeing to allow the third party application to perform an action on behalf of itself. In one…
(Chinese patent) Systems and methods for translating API grants for UX sessions are provided. The authorization server receives a request to access a user experience (UX) session on behalf of a user from a third party application developed by a third party. The request includes an access token previously granted to the third party application by the authorization server in response to the user agreeing to allow the third party application to perform an action on behalf of itself. In one embodiment, the prior authorization includes an open authorization (OAuth). In response to receiving the request, the authorization server converts the access token into a single sign-on (SSO) link with the session token. The authorization server then returns the SSO link that includes a session token for a third party application hosted by the third party. The SSO link enables the third party application to redirect the user to the UX session corresponding to the SSO link.
Other inventorsSee patent -
Third-Party Application Risk Assessment in an Authorization Service
Issued US 11,503,062
Technologies are shown for application risk assessment in an authentication service where an authorization request is received from a third party application calling an Application Programming Interface (API). Risk assessment policies that pertain to behavioral characteristics, such as API usage patterns or past delegation of permissions, are applied to the authorization request to obtain a risk assessment score. If the risk assessment score does not exceed a risk threshold, then an…
Technologies are shown for application risk assessment in an authentication service where an authorization request is received from a third party application calling an Application Programming Interface (API). Risk assessment policies that pertain to behavioral characteristics, such as API usage patterns or past delegation of permissions, are applied to the authorization request to obtain a risk assessment score. If the risk assessment score does not exceed a risk threshold, then an authorization message is sent in response to the authorization request. If the risk assessment score exceeds the risk threshold, then remedial action, such as suspending the application, limiting the available actions, or sending a notification to a trusted security application, is executed for an account associated with the third party application. Machine learning can be applied to historical behavioral data to generate the risk assessment policies.
Other inventorsSee patent -
Application programming interface authorization transformation system
Issued US 11,368,461
Systems and methods for transforming an API authorization to a UX session are provided. An authorization server receives, from a third-party application developed by a third-party, a request to access a user experience (UX) session on behalf of a user. The request comprises an access token previously granted by the authorization server to the third-party application in response to consent, by the user, to allow the third-party application to perform actions on behalf of the user.
Other inventorsSee patent -
Multi-dimensional Commerce Platform
Issued US 11,295,373
Aspects of the present disclosure relate to a multi-dimensional commerce platform that may be utilized for the communication of data. Aspects of the multi-dimensional commerce platform may include various functional components to facilitate a system to receive inventory data at a first server associated with the multi-dimensional commerce platform, provide a second server associated with a third-party (e.g., a third party seller/distributor) access to the inventory data, alter or modify the…
Aspects of the present disclosure relate to a multi-dimensional commerce platform that may be utilized for the communication of data. Aspects of the multi-dimensional commerce platform may include various functional components to facilitate a system to receive inventory data at a first server associated with the multi-dimensional commerce platform, provide a second server associated with a third-party (e.g., a third party seller/distributor) access to the inventory data, alter or modify the inventory data based on attributes of the second server, and cause display of a presentation of the modified inventory data at a client device.
Other inventorsSee patent -
Complex Composite Tokens
Issued US 11,057,778
Technologies are shown for trust delegation that involve receiving a first request from a subject client and responding by sending a first token having first permissions to the subject client. A second request from a first actor includes the first token and responding involves linking the first actor to the subject client in a trust stack and sending a second token to the first actor with second permissions, the second token being a first complex token that identifies the subject client and the…
Technologies are shown for trust delegation that involve receiving a first request from a subject client and responding by sending a first token having first permissions to the subject client. A second request from a first actor includes the first token and responding involves linking the first actor to the subject client in a trust stack and sending a second token to the first actor with second permissions, the second token being a first complex token that identifies the subject client and the first actor. A third request from a second actor includes the second token and responding to the third request involves linking the second actor to the first actor in the trust stack, and sending a third token to the second actor partner with third permissions, the third token being a second complex token that identifies the first actor and the second actor.
Other inventorsSee patent -
Multi-dimensional commerce platform
Issued US 10,607,276
Aspects of the present disclosure relate to a multi-dimensional commerce platform that may be utilized for the communication of data. Aspects of the multi-dimensional commerce platform may include various functional components to facilitate a system to receive inventory data at a first server associated with the multi-dimensional commerce platform, provide a second server associated with a third-party (e.g., a third party seller/distributor) access to the inventory data, alter or modify the…
Aspects of the present disclosure relate to a multi-dimensional commerce platform that may be utilized for the communication of data. Aspects of the multi-dimensional commerce platform may include various functional components to facilitate a system to receive inventory data at a first server associated with the multi-dimensional commerce platform, provide a second server associated with a third-party (e.g., a third party seller/distributor) access to the inventory data, alter or modify the inventory data based on attributes of the second server, and cause display of a presentation of the modified inventory data at a client device.
Other inventorsSee patent
Honors & Awards
-
John Donahoe Award
eBay
The John Donahoe Award is eBay's highest leadership award.
-
Intel Quality Award (IQA)
Intel Corporation
Member of technology leadership team at Intel's Open Source Technology Center, we were awarded the Intel Quality Award (IQA) in 2014 recognizing the software quality of our open source contributions.
Organizations
-
Lesbians Who Tech
Executive Advisory Board
-Member of Executive Advisory Board for Lesbians Who Tech.
-
OpenAPI Initiative at Linux Foundation
Business Governing Board Member
-Representing eBay in the Open API Initiative at the Linux Foundation.
-
Libra Association
Member
-Representing eBay in the formation of Libra Association.
Recommendations received
7 people have recommended Gail
Join now to viewMore activity by Gail
-
I had a fabulous time in Chicago at the Beverage Alcohol Retailer’s Conference taking a deep dive into third parties and alcohol e-commerce with…
I had a fabulous time in Chicago at the Beverage Alcohol Retailer’s Conference taking a deep dive into third parties and alcohol e-commerce with…
Liked by Gail Frederick
-
Kicked off the Futureforce Women in Tech Summit today, in Hyderabad, with 100+ talented women engineers from universities across India. This…
Kicked off the Futureforce Women in Tech Summit today, in Hyderabad, with 100+ talented women engineers from universities across India. This…
Liked by Gail Frederick
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Gail Frederick in United States
-
Gail Frederick
--
-
Gail Frederick
Mortgage Consultant at Trident Mortgage
-
Gail Frederick
Realtor at Long & Foster Realtors - Greenville, DE
-
Gail Frederick
Mortgage Planner at Trident Mortgage Company
29 others named Gail Frederick in United States are on LinkedIn
See others named Gail Frederick