Abstract: Extracting characteristic information includes receiving a collection command from a client, obtaining, via a collection device, biometric information based on the collection command, selecting a stored extraction algorithm corresponding to the client, the stored extraction algorithm being selected from among a plurality of stored extraction algorithms, extracting characteristic values from the obtained biometric information, the characteristic values being extracted based on the selected extraction algorithm, and sending the extracted characteristic values to the client.
February 13, 2015
Date of Patent:
August 20, 2019
Alibaba Group Holding Limited
Xiaoling Li, Junkui Li, Jupeng Xia, Yan Hu
Abstract: The present application provides a service processing method, apparatus and server, and the method includes: when a first user logs on a client device based on a first account, receiving an operation request for requesting a service operation from the first user; according to the first account, searching account binding relationship which has been stored; if a second account of a second user bound with the first account is found, permitting the first user to accomplish the service operation using the second account authority of the second account; after the first user accomplishes the service operation using the second account authority of the second account, updating the second account information of the second account according to the operation result of the service operation.
Abstract: A method and apparatus for quantum key distribution comprised of a privacy amplification method and device for the quantum key distribution process as well as a data transmission method and system based on quantum keys is provided, wherein the quantum key distribution method includes the following process: obtaining a bit stream of the same basis vector by sending or receiving coding quantum states of random bit streams and comparing those measurements obtained with the measurement basis vector; in accordance with a preset manner, extracting parameter information associated with privacy amplification and initial key information from the bit stream of the same basis vector after error correction; and using the initial key as an input to implement the privacy amplification algorithm based on the parameter information and thereby obtain shared quantum keys.
Abstract: Example methods and devices for processing a page are described. One or more pages of a designated website are acquired. The one or more pages are clustered to obtain one or more classes in accordance with page features of the pages. At least one class is selected as a list page set according to a page linking relationship between the one or more classes. It is not necessary to require an operator to manually involve in the process of establishing the list page set. The present techniques have simple operations and high accuracy rate, thereby improving an efficiency and reliability of establishing a list page library.
Abstract: Making a payment using a payment plug-in is disclosed, including: receiving a payment request from a device; receiving an indication that the payment plug-in is not installed at the device; determining that the device has received the payment plug-in, wherein the payment plug-in is configured to be installed at the device; receiving an activation message from the payment plug-in, the activation message including at least an attribute associated with the device; determining a stored user account that matches the attribute associated with the device; and receiving from the payment plug-in a confirmation to process the payment request based at least in part on the matching user account.
Abstract: Embodiments of the present application relate to a method, apparatus, and system for managing confidential information. The method includes accessing stored target information comprising a public part and a confidential part, wherein an identifier corresponds to the confidential part of the target information, outputting the public part of the target information and the corresponding identifier, wherein the public part of the target information comprises at least first address information, receiving location information and a to-be-recognized identifier, wherein the location information is associated with a current location of a mobile terminal, determining whether the location information is consistent with the first address information, and in the event that the location information is consistent with the first address information, sending the confidential part of the target information associated with the to-be-recognized identifier to the mobile terminal.
Abstract: A picture synthesis method and apparatus, an instant messaging method and a picture synthesis server/device are disclosed. The method comprises: after at least two pictures to be synthesized are acquired, determining a visual center of each of the pictures to be synthesized; cutting the corresponding pictures to be synthesized in accordance with the visual center of each of the pictures to be synthesized and a first set specification; and synthesizing all of the cut pictures to be synthesized to obtain a synthesized picture. Due to full consideration of the visual center of each of the pictures to be synthesized, a visual effect of the finally obtained synthesized picture is ensured, thereby improving the user experience.
Abstract: Implementations of the present disclosure include instantiating a test blockchain container having read-only access to a production blockchain, copying a set of blocks from the production blockchain to a test environment to provide a test blockchain, the test blockchain container having read-write access to the test blockchain, and executing a test of a blockchain application, the test resulting in a set of test blocks being sequentially appended to the test blockchain, each test block at least partially including test data, wherein production blocks are appended to the production blockchain during execution of the test.
Abstract: A display instruction associated with a graphic code is received from a terminal device and at a client computing device. A biometric feature identifier associated with a biometric feature that is verified by a server is obtained by the client computing device. A code string that includes the biometric feature identifier is generated by the client computing device. The graphic code that includes the code string is displayed at the client computing device, to permit completion of a service by the terminal device using the graphic code.
Abstract: A verification request is received. In response to receiving the verification request, a first character string is obtained. The first character string comprises one or more variable characters. At least one of the one or more variable characters in the first character string is replaced with at least one backup character to generate a second character string based on multiple pre-established corresponding relationships. A verification code is generated based on the second character string. A user corresponding to the verification request is verified based on a user input corresponding to the verification code.
Abstract: One embodiment provides a system for facilitating data organization. The system receives a request which indicates a file to be read from a non-volatile storage, which is divided into a plurality of logical chunks, wherein a chunk is divided into a plurality of bulks. The system determines a chunk index, a first offset between a beginning of the file and a beginning of a chunk corresponding to the chunk index, and a requested length of the file. The system calculates a bulk index for the requested file based on the chunk index and the first offset. The system identifies a location in the non-volatile storage based on the bulk index. The system reads the requested file from the identified location in the non-volatile storage based on the requested length.
Abstract: A name of a submitted application is obtained. A determination is made that the name of the submitted application is same as a name of an existing application. In response to determining that the name of the submitted application is same as the name of the existing application: a predetermined disable command is triggered, where the predetermined disable command invokes an end function for each node in the existing application; for each particular node in the existing application, a particular process occupied by the particular node in the existing application is recycled when receiving execution completion information from the existing application; and a predetermined start command is triggered when the recycling is completed, where the predetermined start command starts a process for each node in the submitted application.
Abstract: A first row of pixels from a barcode image is extracted by a terminal device based on a predetermined extraction policy. The first row of pixels is parsed by the terminal device to obtain a first character string. Whether the first character string satisfies a predetermined character rule is determined by the terminal device. Responsive to a determination that the first character string satisfies the predetermined character rule: the first character string is determined as an identification result of a barcode in the barcode image and the identification result is generated including the first character string.
Abstract: This specification describes techniques for managing assets in a blockchain. One example method includes receiving, from a target user recorded in a distributed database of the blockchain network, a user input including a request to generate an asset object in the blockchain network, the blockchain network including an account object and a contract object, determining, based on the user input, an asset type of the asset object, initiating, in the blockchain network, the contract object corresponding to generate the asset object based on the asset type, the asset object including a digital asset corresponding to a physical asset associated with the target user, assigning the asset object to a target object of the target user, and adding address information of the asset object to the target object.
Abstract: Implementations of the present disclosure include obtaining, by a client node of a blockchain network, a public key of a regulator node; generating, by the client node, one or more commitment values of a confidential transaction of the client node by applying a cryptographic commitment scheme to transaction data of the confidential transaction; generating, by the client node, encrypted regulatory information of the confidential transaction by encrypting the transaction data using the public key of the regulator node; and transmitting, by the client node to a consensus node of the blockchain network, a content of the confidential transaction for execution, wherein the content of the confidential transaction includes: the one or more commitment values; the encrypted regulatory information; and one or more zero-knowledge proofs of the transaction data.
Abstract: An identity authentication procedure of a user is initiated and a plurality of virtual reality articles is displayed. Selection operation information of the user is determined for the plurality of virtual reality articles. Whether the selection operation information matches predefined standard selection operation information is determined. In response to determining that the selection operation information matches the predefined standard selection operation information, whether the identity authentication procedure of the user succeeds is determined.
Abstract: Implementations of the present disclosure include obtaining a secret key, by a client node, according to a threshold secret sharing scheme agreed to by a number of client nodes; generating one or more commitment values of a confidential transaction of the client node by applying a cryptographic commitment scheme to transaction data; generating encrypted transaction information of the confidential transaction by encrypting the transaction data using the secret key; and transmitting, to a consensus node of a blockchain network, a content of the confidential transaction for execution, wherein the content of the confidential transaction includes: the one or more commitment values; the encrypted transaction information; and one or more zero-knowledge proofs of the transaction data.
Abstract: Implementations of the present disclosure include receiving a merger request including a first identifier of a first node, a second identifier of a second node, and an identifier of a first smart asset, the first smart asset being associated with the first node, determining whether the first smart asset is capable of merger with a second smart asset associated with the second node at least partially based on the identifier of the first smart asset and an identifier of the second smart asset, and, in response to determining that the first smart asset is capable of being merged with the second smart asset, automatically: updating the second smart asset, the updated second smart asset being assigned a value, and including properties of the first smart asset, recording the updated second smart asset to the second node, and deleting the first smart asset.
Abstract: Implementations of the present specification include polling the blockchain at specified time intervals, receiving block information from one or more updated blocks, the block information including static information and dynamic information, the dynamic information including one or more variables to be used in a smart contract, converting the dynamic information into one or more binary logs, and updating the local database using the one or more binary logs.
Abstract: The present application provides a barcode-based communication method, including: rendering first transmission information into a first barcode, and displaying the first barcode for scanning by a peer device; and scanning a second barcode displayed by the peer device, to obtain second transmission information included in the second barcode, where the second transmission information is obtained by the peer device based on a processing result of the first transmission information. According to the technical solutions of the present application, two communication parties can perform bidirectional information transmission by using barcodes, to alleviate information asymmetry caused by unidirectional communication and improve service integrity and security.