Patents by Inventor Caiwei Li

Caiwei Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11570194
    Abstract: This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: January 31, 2023
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Jupeng Xia, Caiwei Li
  • Patent number: 11075938
    Abstract: This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.
    Type: Grant
    Filed: January 22, 2019
    Date of Patent: July 27, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Jupeng Xia, Caiwei Li
  • Publication number: 20200250677
    Abstract: The present application discloses techniques for processing service requests based on risk. One example method includes: receiving a service processing request including service data; performing risk identification on the service processing request based on a stored risk identification rule or a stored risk identification model with reference to the service data to generate a risk identification result; determining that the risk identification result is an indefinite result; and in response to determining that the risk identification result is the indefinite result, sending a risk identification request that comprises the service data to a cloud risk identification system, wherein the risk identification request is configured to request the cloud risk identification system to perform risk identification on the service processing request.
    Type: Application
    Filed: December 23, 2019
    Publication date: August 6, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Xi Gu, Caiwei Li, Jupeng Xia
  • Publication number: 20200242614
    Abstract: The present application discloses example methods, computer-readable mediums, and systems for controlling service operation risks. In one example, method, an application program on an end-user device monitors a service operation initiated by a user for invoking offline service information. After the service operation is monitored, it is determined whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model. In response to determining that the service operation is a risky operation, a refusal to invoke the offline service information is performed. In response to determining that the service operation is not a risky operation, the offline service information is invoked.
    Type: Application
    Filed: December 23, 2019
    Publication date: July 30, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei Li, Xi Gu, Bao Jiang
  • Publication number: 20200236128
    Abstract: This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.
    Type: Application
    Filed: December 20, 2019
    Publication date: July 23, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei LI
  • Patent number: 10691794
    Abstract: Implementations of the present specification disclose a method and an apparatus for detecting model security and an electronic device. The method includes the following: obtaining result data computed by using a model, wherein the result data comprises intermediate result data and output result data; obtaining a discriminator through training by using a generative adversarial network (GAN) framework, the model, and a sample; discriminating the result data by using the discriminator by using the model for current input data, to detect whether the model is currently secure, wherein the model is in a trusted execution environment for obtaining the discriminator through training; and determining a security detection result of the model.
    Type: Grant
    Filed: October 30, 2019
    Date of Patent: June 23, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei Li
  • Publication number: 20200134630
    Abstract: The present application discloses example methods, computer-readable mediums, and systems for controlling service operation risks. In one example, method, an application program on an end-user device monitors a service operation initiated by a user for invoking offline service information. After the service operation is monitored, it is determined whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model. In response to determining that the service operation is a risky operation, a refusal to invoke the offline service information is performed. In response to determining that the service operation is not a risky operation, the offline service information is invoked.
    Type: Application
    Filed: December 23, 2019
    Publication date: April 30, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei Li, Xi Gu, Bao Jiang
  • Publication number: 20200065479
    Abstract: Implementations of the present specification disclose a method and an apparatus for detecting model security and an electronic device. The method includes the following: obtaining result data computed by using a model, wherein the result data comprises intermediate result data and output result data; obtaining a discriminator through training by using a generative adversarial network (GAN) framework, the model, and a sample; discriminating the result data by using the discriminator by using the model for current input data, to detect whether the model is currently secure, wherein the model is in a trusted execution environment for obtaining the discriminator through training; and determining a security detection result of the model.
    Type: Application
    Filed: October 30, 2019
    Publication date: February 27, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei Li
  • Patent number: 10536430
    Abstract: A request message requesting a service is received from a terminal device. Computer code is transmitted to the terminal device, and a communication connection request is received from the terminal device in response to running the computer code on the terminal device. In response to receiving the communication connection request, a communication connection is established to the terminal device. A first IP address associated with the terminal device is determined based on one or more communications transmitted through the communication connection.
    Type: Grant
    Filed: May 8, 2018
    Date of Patent: January 14, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Jianye Liu, Peng Zheng, Caiwei Li
  • Publication number: 20190156342
    Abstract: The present application discloses example methods, computer-readable mediums, and systems for controlling service operation risks. In one example, method, an application program on an end-user device monitors a service operation initiated by a user for invoking offline service information. After the service operation is monitored, it is determined whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model. In response to determining that the service operation is a risky operation, a refusal to invoke the offline service information is performed. In response to determining that the service operation is not a risky operation, the offline service information is invoked.
    Type: Application
    Filed: January 22, 2019
    Publication date: May 23, 2019
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei LI, Xi GU, Bao JIANG
  • Publication number: 20190156343
    Abstract: The present application discloses techniques for processing service requests based on risk. One example method includes: receiving a service processing request including service data; performing risk identification on the service processing request based on a stored risk identification rule or a stored risk identification model with reference to the service data to generate a risk identification result; determining that the risk identification result is an indefinite result; and in response to determining that the risk identification result is the indefinite result, sending a risk identification request that comprises the service data to a cloud risk identification system, wherein the risk identification request is configured to request the cloud risk identification system to perform risk identification on the service processing request.
    Type: Application
    Filed: January 22, 2019
    Publication date: May 23, 2019
    Applicant: Alibaba Group Holding Limited
    Inventors: Xi GU, Caiwei LI, Jupeng Xia
  • Publication number: 20190158528
    Abstract: This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.
    Type: Application
    Filed: January 22, 2019
    Publication date: May 23, 2019
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei LI
  • Publication number: 20180255018
    Abstract: A request message requesting a service is received from a terminal device. Computer code is transmitted to the terminal device, and a communication connection request is received from the terminal device in response to running the computer code on the terminal device. In response to receiving the communication connection request, a communication connection is established to the terminal device. A first IP address associated with the terminal device is determined based on one or more communications transmitted through the communication connection.
    Type: Application
    Filed: May 8, 2018
    Publication date: September 6, 2018
    Applicant: Alibaba Group Holding Limited
    Inventors: Jianye LIU, Peng ZHENG, Caiwei LI
  • Patent number: 8666861
    Abstract: Systems and methods for risk and fraud mitigation are presented. According to one or more aspects of the disclosure, a plurality of transactions may be processed without applying one or more active fraud rules. A hit rate for at least one fraud rule of the one or more active fraud rules then may be determined. Thereafter, a positive hit rate for the at least one fraud rule may be determined based on fraud event data corresponding to the plurality of transactions. In some arrangements, each transaction of the plurality of transactions may be randomly selected, from a larger plurality of received transactions, for inclusion in the plurality of transactions to be processed without application of the one or more active fraud rules. Additionally or alternatively, in certain arrangements, one or more fraud rules may be activated or deactivated based on their corresponding hit rates and positive hit rates.
    Type: Grant
    Filed: October 21, 2011
    Date of Patent: March 4, 2014
    Assignee: Visa International Service Association
    Inventors: Caiwei Li, Christopher John Brocoum, Lex Bayer
  • Publication number: 20120101930
    Abstract: Systems and methods for risk and fraud mitigation are presented. According to one or more aspects of the disclosure, a plurality of transactions may be processed without applying one or more active fraud rules. A hit rate for at least one fraud rule of the one or more active fraud rules then may be determined. Thereafter, a positive hit rate for the at least one fraud rule may be determined based on fraud event data corresponding to the plurality of transactions. In some arrangements, each transaction of the plurality of transactions may be randomly selected, from a larger plurality of received transactions, for inclusion in the plurality of transactions to be processed without application of the one or more active fraud rules. Additionally or alternatively, in certain arrangements, one or more fraud rules may be activated or deactivated based on their corresponding hit rates and positive hit rates.
    Type: Application
    Filed: October 21, 2011
    Publication date: April 26, 2012
    Inventors: Caiwei Li, Christopher John Brocoum, Lex Bayer