Patents by Inventor Chao Xiu
Chao Xiu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11954190Abstract: Biometric information is obtained from a user. A determination is made that the obtained biometric information matches at least one entry in a biometric database. In response to determining that the obtained biometric information matches the at least one entry in the biometric database, non-biometric verification information is obtained. A determination is made as to whether at least a portion of the non-biometric verification information matches at least a portion of preset non-biometric verification information associated with the user. In response to determining that the at least a portion of the non-biometric verification information matches, a determination is made that an identity of the user is verified. In response to determining that the at least a portion of the non-biometric verification information does not match, a determination is made that the identity of the user is not verified.Type: GrantFiled: June 8, 2018Date of Patent: April 9, 2024Assignee: Advanced New Technologies Co., Ltd.Inventors: Huifeng Jin, Yanghui Liu, Chao Xiu, Liyun Dong, Weijie Xiao
-
Publication number: 20230196328Abstract: Implementations of the present application provide data interaction methods and devices. In one example implementation, authorization data for a current interaction are received from a remote server, wherein the authorization data comprises signature information, time information of current authorization, a random number of the current authorization, and a threshold. The authorization data are verified by performing at least one of: comparing the time information comprised in the authorization data with a current time; determining whether the random number comprises in the authorization data exists in a previous data interaction; or determining whether the data of the current interaction exceeds the threshold comprised in the authorization data. Whether to cancel the current interaction is determined based on the verification of the authorization data.Type: ApplicationFiled: February 14, 2013Publication date: June 22, 2023Applicant: Advanced New Technologies Co., Ltd.Inventors: Chao Xiu, Lei WANG, Yingde Liu
-
Patent number: 11587056Abstract: Implementations of the present application provide data interaction and offline credit payment methods and devices. In one implementation, a credit payment code generated by a server is obtained by scanning and parsing a two-dimensional code presented on a mobile computing device for making a payment. The credit payment code is then decrypted based on asymmetric key decryption to obtain a credit payment token. The credit payment token is parsed to obtain security content included in the credit payment token. The payment associated with the credit payment code is then determined to satisfy the security content and the payment is verified with the server that generates the credit payment code at a predetermined time.Type: GrantFiled: July 3, 2018Date of Patent: February 21, 2023Assignee: Advanced New Technologies Co., Ltd.Inventors: Chao Xiu, Lei Wang, Yingde Liu
-
Patent number: 11127019Abstract: The present application relates to the field of information security technologies, and in particular, to smart card security verification methods and devices. In one example method, in response to detecting processing associated with a particular service at a smart card application of an intelligent terminal, a set of data related to the particular service is obtained. A set of security parameters associated with the smart card application are identified. The obtained set of data related to the particular service is compared to the identified set of security parameters. In response to determining from the comparison that the obtained set of data related to the particular service satisfies the identified set of security parameters, the particular service to is allowed to execute. In response to determining that the obtained set of data related to the particular service does not satisfy the identified set of security parameters, the particular service is terminated.Type: GrantFiled: July 3, 2018Date of Patent: September 21, 2021Assignee: Advanced New Technologies Co., Ltd.Inventors: Chao Xiu, Lei Wang, Chenjie Shi
-
Patent number: 11063934Abstract: Disclosed in an embodiment of the present application is an information pushing method, comprising: a wireless network sharer client obtaining a first identifier of a wireless network selected from a wireless network list scanned/stored by a wireless network sharer terminal, and sending the same to a server; the server generating a second identifier and sending the same to the wireless network sharer client; the wireless network sharer changing the first identifier of the wireless network into a third identifier based on the second identifier; the wireless network sharer client obtaining a wireless network list updated by a wireless network sharer mobile terminal and sending the third identifier of the selected wireless network in the list to the server; and the server comparing the second identifier with the third identifier, and allowing successful authentication when the two identifiers are consistent, and registering information about the devices of the wireless network.Type: GrantFiled: October 4, 2018Date of Patent: July 13, 2021Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.Inventors: Jianbo Zhou, Yibin Xiong, Chao Xiu, Ming Wu
-
Patent number: 10719599Abstract: A verification request is received. In response to receiving the verification request, a first character string is obtained. The first character string comprises one or more variable characters. At least one of the one or more variable characters in the first character string is replaced with at least one backup character to generate a second character string based on multiple pre-established corresponding relationships. A verification code is generated based on the second character string. A user corresponding to the verification request is verified based on a user input corresponding to the verification code.Type: GrantFiled: April 24, 2019Date of Patent: July 21, 2020Assignee: Alibaba Group Holding LimitedInventors: Chao Xiu, Lei Wang, Xing Chen, Chuanzhi Li, Yongzhi Zhang
-
Patent number: 10671719Abstract: A verification request is received. In response to receiving the verification request, a first character string is obtained. The first character string comprises one or more variable characters. At least one of the one or more variable characters in the first character string is replaced with at least one backup character to generate a second character string based on multiple pre-established corresponding relationships. A verification code is generated based on the second character string. A user corresponding to the verification request is verified based on a user input corresponding to the verification code.Type: GrantFiled: April 24, 2019Date of Patent: June 2, 2020Assignee: Alibaba Group Holding LimitedInventors: Chao Xiu, Lei Wang, Xing Chen, Chuanzhi Li, Yongzhi Zhang
-
Publication number: 20200042979Abstract: This specifications describes techniques for processing transactions. A card reading terminal device associated with an integrated circuit (IC) card issuer identifies an IC card associated with the IC card issuer and associated with a current transaction. The card reading terminal device determines that the IC card satisfies a predetermined credit payment condition. In response to determining that the IC card satisfies the predetermined credit payment condition, the card reading terminal device completes the current transaction. The card reading terminal device generates transaction information associated with the current transaction. The IC card issuer generates a deduction request that includes the transaction information associated with the current transaction. The IC card issuer sends the deduction request to a credit authorizer, wherein the credit authorizer registers a payment account of an IC card holder in advance.Type: ApplicationFiled: October 11, 2019Publication date: February 6, 2020Applicant: Alibaba Group Holding LimitedInventors: Xing CHEN, Chao Xiu, Lingnan Shen, Yanghui Liu, Ge Chen
-
Patent number: 10498731Abstract: Apparatus and method are disclosed for controlling wireless network access and wireless data traffic. The method may include obtaining a recognition identifier of a Wireless Fidelity (Wi-Fi) hotspot device. The method may also include determining a type of the Wi-Fi hotspot device according to the recognition identifier. In addition, the method may include controlling information downloading or wireless data traffic of an information processing device according to the type of the Wi-Fi hotspot device.Type: GrantFiled: June 22, 2015Date of Patent: December 3, 2019Assignee: ALIBABA GROUP HOLDING LIMITEDInventor: Chao Xiu
-
Publication number: 20190251243Abstract: A verification request is received. In response to receiving the verification request, a first character string is obtained. The first character string comprises one or more variable characters. At least one of the one or more variable characters in the first character string is replaced with at least one backup character to generate a second character string based on multiple pre-established corresponding relationships. A verification code is generated based on the second character string. A user corresponding to the verification request is verified based on a user input corresponding to the verification code.Type: ApplicationFiled: April 24, 2019Publication date: August 15, 2019Applicant: Alibaba Group Holding LimitedInventors: Chao Xiu, Lei WANG, Xing CHEN, Chuanzhi LI, Yongzhi ZHANG
-
Publication number: 20190037400Abstract: Disclosed in an embodiment of the present application is an information pushing method, comprising: a wireless network sharer client obtaining a first identifier of a wireless network selected from a wireless network list scanned/stored by a wireless network sharer terminal, and sending the same to a server; the server generating a second identifier and sending the same to the wireless network sharer client; the wireless network sharer changing the first identifier of the wireless network into a third identifier based on the second identifier; the wireless network sharer client obtaining a wireless network list updated by a wireless network sharer mobile terminal and sending the third identifier of the selected wireless network in the list to the server; and the server comparing the second identifier with the third identifier, and allowing successful authentication when the two identifiers are consistent, and registering information about the devices of the wireless network.Type: ApplicationFiled: October 4, 2018Publication date: January 31, 2019Inventors: JIANBO ZHOU, YIBIN XIONG, CHAO XIU, MING WU
-
Publication number: 20180357401Abstract: Biometric information is obtained from a user. A determination is made that the obtained biometric information matches at least one entry in a biometric database. In response to determining that the obtained biometric information matches the at least one entry in the biometric database, non-biometric verification information is obtained. A determination is made as to whether at least a portion of the non-biometric verification information matches at least a portion of preset non-biometric verification information associated with the user. In response to determining that the at least a portion of the non-biometric verification information matches, a determination is made that an identity of the user is verified. In response to determining that the at least a portion of the non-biometric verification information does not match, a determination is made that the identity of the user is not verified.Type: ApplicationFiled: June 8, 2018Publication date: December 13, 2018Applicant: Alibaba Group Holding LimitedInventors: Huifeng Jin, Yanghui Liu, Chao Xiu, Liyun Dong, Weijie Xiao
-
Patent number: 10136317Abstract: Disclosed in an embodiment of the present application is an information pushing method, comprising: a wireless network sharer client obtaining a first identifier of a wireless network selected from a wireless network list scanned/stored by a wireless network sharer terminal, and sending the same to a server; the server generating a second identifier and sending the same to the wireless network sharer client; the wireless network sharer changing the first identifier of the wireless network into a third identifier based on the second identifier; the wireless network sharer client obtaining a wireless network list updated by a wireless network sharer mobile terminal and sending the third identifier of the selected wireless network in the list to the server; and the server comparing the second identifier with the third identifier, and allowing successful authentication when the two identifiers are consistent, and registering information about the devices of the wireless network.Type: GrantFiled: July 17, 2015Date of Patent: November 20, 2018Assignee: ALIBABA GROUP HOLDING LIMITEDInventors: Jianbo Zhou, Yibin Xiong, Chao Xiu, Ming Wu
-
Publication number: 20180330354Abstract: Implementations of the present application provide data interaction and offline credit payment methods and devices. In one implementation, a credit payment code generated by a server is obtained by scanning and parsing a two-dimensional code presented on a mobile computing device for making a payment. The credit payment code is then decrypted based on asymmetric key decryption to obtain a credit payment token. The credit payment token is parsed to obtain security content included in the credit payment token. The payment associated with the credit payment code is then determined to satisfy the security content and the payment is verified with the server that generates the credit payment code at a predetermined time.Type: ApplicationFiled: July 3, 2018Publication date: November 15, 2018Applicant: Alibaba Group Holding LimitedInventors: Chao Xiu, Lei WANG, Yingde Liu
-
Patent number: 10122704Abstract: When a portable terminal of a user receives an authentication prompt message pushed by an application server, an authentication prompt option corresponding to the authentication prompt message is output at the portable terminal. A portal authentication is initiated after the authentication prompt option is selected by the user. MAC address information of the portable terminal returned by a portal server is acquired after the portal authentication is initiated. A user name and password for the application client terminal to log into the application server terminal is used as a user name and password for portal authentication. The MAC address information of the portable terminal returned by the portal server is sent to the application server. The present disclosure facilitates the operation of using the portal authentication, prevents the user from forgetting to perform the portal authentication, and brings convenience to those who are not familiar with the portal authentication mechanism.Type: GrantFiled: April 14, 2015Date of Patent: November 6, 2018Assignee: Alibaba Group Holding LimitedInventor: Chao Xiu
-
Publication number: 20180315048Abstract: The present application relates to the field of information security technologies, and in particular, to smart card security verification methods and devices. In one example method, in response to detecting processing associated with a particular service at a smart card application of an intelligent terminal, a set of data related to the particular service is obtained. A set of security parameters associated with the smart card application are identified. The obtained set of data related to the particular service is compared to the identified set of security parameters. In response to determining from the comparison that the obtained set of data related to the particular service satisfies the identified set of security parameters, the particular service to is allowed to execute. In response to determining that the obtained set of data related to the particular service does not satisfy the identified set of security parameters, the particular service is terminated.Type: ApplicationFiled: July 3, 2018Publication date: November 1, 2018Applicant: Alibaba Group Holding LimitedInventors: Chao Xiu, Lei WANG, Chenjie SHI
-
Publication number: 20170201883Abstract: Disclosed in an embodiment of the present application is an information pushing method, comprising: a wireless network sharer client obtaining a first identifier of a wireless network selected from a wireless network list scanned/stored by a wireless network sharer terminal, and sending the same to a server; the server generating a second identifier and sending the same to the wireless network sharer client; the wireless network sharer changing the first identifier of the wireless network into a third identifier based on the second identifier; the wireless network sharer client obtaining a wireless network list updated by a wireless network sharer mobile terminal and sending the third identifier of the selected wireless network in the list to the server; and the server comparing the second identifier with the third identifier, and allowing successful authentication when the two identifiers are consistent, and registering information about the devices of the wireless network.Type: ApplicationFiled: July 17, 2015Publication date: July 13, 2017Applicant: ALIBABA GROUP HOLDING LIMITEDInventors: JIANBO ZHOU, YIBIN XIONG, CHAO XIU, MING WU
-
Publication number: 20160007265Abstract: Apparatus and method are disclosed for controlling wireless network access and wireless data traffic. The method may include obtaining a recognition identifier of a Wireless Fidelity (Wi-Fi) hotspot device. The method may also include determining a type of the Wi-Fi hotspot device according to the recognition identifier. In addition, the method may include controlling information downloading or wireless data traffic of an information processing device according to the type of the Wi-Fi hotspot device.Type: ApplicationFiled: June 22, 2015Publication date: January 7, 2016Inventor: Chao XIU
-
Publication number: 20150295915Abstract: When a portable terminal of a user receives an authentication prompt message pushed by an application server, an authentication prompt option corresponding to the authentication prompt message is output at the portable terminal. A portal authentication is initiated after the authentication prompt option is selected by the user. MAC address information of the portable terminal returned by a portal server is acquired after the portal authentication is initiated. A user name and password for the application client terminal to log into the application server terminal is used as a user name and password for portal authentication. The MAC address information of the portable terminal returned by the portal server is sent to the application server. The present disclosure facilitates the operation of using the portal authentication, prevents the user from forgetting to perform the portal authentication, and brings convenience to those who are not familiar with the portal authentication mechanism.Type: ApplicationFiled: April 14, 2015Publication date: October 15, 2015Inventor: Chao Xiu