Patents by Inventor Chao Xiu

Chao Xiu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11954190
    Abstract: Biometric information is obtained from a user. A determination is made that the obtained biometric information matches at least one entry in a biometric database. In response to determining that the obtained biometric information matches the at least one entry in the biometric database, non-biometric verification information is obtained. A determination is made as to whether at least a portion of the non-biometric verification information matches at least a portion of preset non-biometric verification information associated with the user. In response to determining that the at least a portion of the non-biometric verification information matches, a determination is made that an identity of the user is verified. In response to determining that the at least a portion of the non-biometric verification information does not match, a determination is made that the identity of the user is not verified.
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: April 9, 2024
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Huifeng Jin, Yanghui Liu, Chao Xiu, Liyun Dong, Weijie Xiao
  • Publication number: 20230196328
    Abstract: Implementations of the present application provide data interaction methods and devices. In one example implementation, authorization data for a current interaction are received from a remote server, wherein the authorization data comprises signature information, time information of current authorization, a random number of the current authorization, and a threshold. The authorization data are verified by performing at least one of: comparing the time information comprised in the authorization data with a current time; determining whether the random number comprises in the authorization data exists in a previous data interaction; or determining whether the data of the current interaction exceeds the threshold comprised in the authorization data. Whether to cancel the current interaction is determined based on the verification of the authorization data.
    Type: Application
    Filed: February 14, 2013
    Publication date: June 22, 2023
    Applicant: Advanced New Technologies Co., Ltd.
    Inventors: Chao Xiu, Lei WANG, Yingde Liu
  • Patent number: 11587056
    Abstract: Implementations of the present application provide data interaction and offline credit payment methods and devices. In one implementation, a credit payment code generated by a server is obtained by scanning and parsing a two-dimensional code presented on a mobile computing device for making a payment. The credit payment code is then decrypted based on asymmetric key decryption to obtain a credit payment token. The credit payment token is parsed to obtain security content included in the credit payment token. The payment associated with the credit payment code is then determined to satisfy the security content and the payment is verified with the server that generates the credit payment code at a predetermined time.
    Type: Grant
    Filed: July 3, 2018
    Date of Patent: February 21, 2023
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Chao Xiu, Lei Wang, Yingde Liu
  • Patent number: 11127019
    Abstract: The present application relates to the field of information security technologies, and in particular, to smart card security verification methods and devices. In one example method, in response to detecting processing associated with a particular service at a smart card application of an intelligent terminal, a set of data related to the particular service is obtained. A set of security parameters associated with the smart card application are identified. The obtained set of data related to the particular service is compared to the identified set of security parameters. In response to determining from the comparison that the obtained set of data related to the particular service satisfies the identified set of security parameters, the particular service to is allowed to execute. In response to determining that the obtained set of data related to the particular service does not satisfy the identified set of security parameters, the particular service is terminated.
    Type: Grant
    Filed: July 3, 2018
    Date of Patent: September 21, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Chao Xiu, Lei Wang, Chenjie Shi
  • Patent number: 11063934
    Abstract: Disclosed in an embodiment of the present application is an information pushing method, comprising: a wireless network sharer client obtaining a first identifier of a wireless network selected from a wireless network list scanned/stored by a wireless network sharer terminal, and sending the same to a server; the server generating a second identifier and sending the same to the wireless network sharer client; the wireless network sharer changing the first identifier of the wireless network into a third identifier based on the second identifier; the wireless network sharer client obtaining a wireless network list updated by a wireless network sharer mobile terminal and sending the third identifier of the selected wireless network in the list to the server; and the server comparing the second identifier with the third identifier, and allowing successful authentication when the two identifiers are consistent, and registering information about the devices of the wireless network.
    Type: Grant
    Filed: October 4, 2018
    Date of Patent: July 13, 2021
    Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.
    Inventors: Jianbo Zhou, Yibin Xiong, Chao Xiu, Ming Wu
  • Patent number: 10719599
    Abstract: A verification request is received. In response to receiving the verification request, a first character string is obtained. The first character string comprises one or more variable characters. At least one of the one or more variable characters in the first character string is replaced with at least one backup character to generate a second character string based on multiple pre-established corresponding relationships. A verification code is generated based on the second character string. A user corresponding to the verification request is verified based on a user input corresponding to the verification code.
    Type: Grant
    Filed: April 24, 2019
    Date of Patent: July 21, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Chao Xiu, Lei Wang, Xing Chen, Chuanzhi Li, Yongzhi Zhang
  • Patent number: 10671719
    Abstract: A verification request is received. In response to receiving the verification request, a first character string is obtained. The first character string comprises one or more variable characters. At least one of the one or more variable characters in the first character string is replaced with at least one backup character to generate a second character string based on multiple pre-established corresponding relationships. A verification code is generated based on the second character string. A user corresponding to the verification request is verified based on a user input corresponding to the verification code.
    Type: Grant
    Filed: April 24, 2019
    Date of Patent: June 2, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Chao Xiu, Lei Wang, Xing Chen, Chuanzhi Li, Yongzhi Zhang
  • Publication number: 20200042979
    Abstract: This specifications describes techniques for processing transactions. A card reading terminal device associated with an integrated circuit (IC) card issuer identifies an IC card associated with the IC card issuer and associated with a current transaction. The card reading terminal device determines that the IC card satisfies a predetermined credit payment condition. In response to determining that the IC card satisfies the predetermined credit payment condition, the card reading terminal device completes the current transaction. The card reading terminal device generates transaction information associated with the current transaction. The IC card issuer generates a deduction request that includes the transaction information associated with the current transaction. The IC card issuer sends the deduction request to a credit authorizer, wherein the credit authorizer registers a payment account of an IC card holder in advance.
    Type: Application
    Filed: October 11, 2019
    Publication date: February 6, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Xing CHEN, Chao Xiu, Lingnan Shen, Yanghui Liu, Ge Chen
  • Patent number: 10498731
    Abstract: Apparatus and method are disclosed for controlling wireless network access and wireless data traffic. The method may include obtaining a recognition identifier of a Wireless Fidelity (Wi-Fi) hotspot device. The method may also include determining a type of the Wi-Fi hotspot device according to the recognition identifier. In addition, the method may include controlling information downloading or wireless data traffic of an information processing device according to the type of the Wi-Fi hotspot device.
    Type: Grant
    Filed: June 22, 2015
    Date of Patent: December 3, 2019
    Assignee: ALIBABA GROUP HOLDING LIMITED
    Inventor: Chao Xiu
  • Publication number: 20190251243
    Abstract: A verification request is received. In response to receiving the verification request, a first character string is obtained. The first character string comprises one or more variable characters. At least one of the one or more variable characters in the first character string is replaced with at least one backup character to generate a second character string based on multiple pre-established corresponding relationships. A verification code is generated based on the second character string. A user corresponding to the verification request is verified based on a user input corresponding to the verification code.
    Type: Application
    Filed: April 24, 2019
    Publication date: August 15, 2019
    Applicant: Alibaba Group Holding Limited
    Inventors: Chao Xiu, Lei WANG, Xing CHEN, Chuanzhi LI, Yongzhi ZHANG
  • Publication number: 20190037400
    Abstract: Disclosed in an embodiment of the present application is an information pushing method, comprising: a wireless network sharer client obtaining a first identifier of a wireless network selected from a wireless network list scanned/stored by a wireless network sharer terminal, and sending the same to a server; the server generating a second identifier and sending the same to the wireless network sharer client; the wireless network sharer changing the first identifier of the wireless network into a third identifier based on the second identifier; the wireless network sharer client obtaining a wireless network list updated by a wireless network sharer mobile terminal and sending the third identifier of the selected wireless network in the list to the server; and the server comparing the second identifier with the third identifier, and allowing successful authentication when the two identifiers are consistent, and registering information about the devices of the wireless network.
    Type: Application
    Filed: October 4, 2018
    Publication date: January 31, 2019
    Inventors: JIANBO ZHOU, YIBIN XIONG, CHAO XIU, MING WU
  • Publication number: 20180357401
    Abstract: Biometric information is obtained from a user. A determination is made that the obtained biometric information matches at least one entry in a biometric database. In response to determining that the obtained biometric information matches the at least one entry in the biometric database, non-biometric verification information is obtained. A determination is made as to whether at least a portion of the non-biometric verification information matches at least a portion of preset non-biometric verification information associated with the user. In response to determining that the at least a portion of the non-biometric verification information matches, a determination is made that an identity of the user is verified. In response to determining that the at least a portion of the non-biometric verification information does not match, a determination is made that the identity of the user is not verified.
    Type: Application
    Filed: June 8, 2018
    Publication date: December 13, 2018
    Applicant: Alibaba Group Holding Limited
    Inventors: Huifeng Jin, Yanghui Liu, Chao Xiu, Liyun Dong, Weijie Xiao
  • Patent number: 10136317
    Abstract: Disclosed in an embodiment of the present application is an information pushing method, comprising: a wireless network sharer client obtaining a first identifier of a wireless network selected from a wireless network list scanned/stored by a wireless network sharer terminal, and sending the same to a server; the server generating a second identifier and sending the same to the wireless network sharer client; the wireless network sharer changing the first identifier of the wireless network into a third identifier based on the second identifier; the wireless network sharer client obtaining a wireless network list updated by a wireless network sharer mobile terminal and sending the third identifier of the selected wireless network in the list to the server; and the server comparing the second identifier with the third identifier, and allowing successful authentication when the two identifiers are consistent, and registering information about the devices of the wireless network.
    Type: Grant
    Filed: July 17, 2015
    Date of Patent: November 20, 2018
    Assignee: ALIBABA GROUP HOLDING LIMITED
    Inventors: Jianbo Zhou, Yibin Xiong, Chao Xiu, Ming Wu
  • Publication number: 20180330354
    Abstract: Implementations of the present application provide data interaction and offline credit payment methods and devices. In one implementation, a credit payment code generated by a server is obtained by scanning and parsing a two-dimensional code presented on a mobile computing device for making a payment. The credit payment code is then decrypted based on asymmetric key decryption to obtain a credit payment token. The credit payment token is parsed to obtain security content included in the credit payment token. The payment associated with the credit payment code is then determined to satisfy the security content and the payment is verified with the server that generates the credit payment code at a predetermined time.
    Type: Application
    Filed: July 3, 2018
    Publication date: November 15, 2018
    Applicant: Alibaba Group Holding Limited
    Inventors: Chao Xiu, Lei WANG, Yingde Liu
  • Patent number: 10122704
    Abstract: When a portable terminal of a user receives an authentication prompt message pushed by an application server, an authentication prompt option corresponding to the authentication prompt message is output at the portable terminal. A portal authentication is initiated after the authentication prompt option is selected by the user. MAC address information of the portable terminal returned by a portal server is acquired after the portal authentication is initiated. A user name and password for the application client terminal to log into the application server terminal is used as a user name and password for portal authentication. The MAC address information of the portable terminal returned by the portal server is sent to the application server. The present disclosure facilitates the operation of using the portal authentication, prevents the user from forgetting to perform the portal authentication, and brings convenience to those who are not familiar with the portal authentication mechanism.
    Type: Grant
    Filed: April 14, 2015
    Date of Patent: November 6, 2018
    Assignee: Alibaba Group Holding Limited
    Inventor: Chao Xiu
  • Publication number: 20180315048
    Abstract: The present application relates to the field of information security technologies, and in particular, to smart card security verification methods and devices. In one example method, in response to detecting processing associated with a particular service at a smart card application of an intelligent terminal, a set of data related to the particular service is obtained. A set of security parameters associated with the smart card application are identified. The obtained set of data related to the particular service is compared to the identified set of security parameters. In response to determining from the comparison that the obtained set of data related to the particular service satisfies the identified set of security parameters, the particular service to is allowed to execute. In response to determining that the obtained set of data related to the particular service does not satisfy the identified set of security parameters, the particular service is terminated.
    Type: Application
    Filed: July 3, 2018
    Publication date: November 1, 2018
    Applicant: Alibaba Group Holding Limited
    Inventors: Chao Xiu, Lei WANG, Chenjie SHI
  • Publication number: 20170201883
    Abstract: Disclosed in an embodiment of the present application is an information pushing method, comprising: a wireless network sharer client obtaining a first identifier of a wireless network selected from a wireless network list scanned/stored by a wireless network sharer terminal, and sending the same to a server; the server generating a second identifier and sending the same to the wireless network sharer client; the wireless network sharer changing the first identifier of the wireless network into a third identifier based on the second identifier; the wireless network sharer client obtaining a wireless network list updated by a wireless network sharer mobile terminal and sending the third identifier of the selected wireless network in the list to the server; and the server comparing the second identifier with the third identifier, and allowing successful authentication when the two identifiers are consistent, and registering information about the devices of the wireless network.
    Type: Application
    Filed: July 17, 2015
    Publication date: July 13, 2017
    Applicant: ALIBABA GROUP HOLDING LIMITED
    Inventors: JIANBO ZHOU, YIBIN XIONG, CHAO XIU, MING WU
  • Publication number: 20160007265
    Abstract: Apparatus and method are disclosed for controlling wireless network access and wireless data traffic. The method may include obtaining a recognition identifier of a Wireless Fidelity (Wi-Fi) hotspot device. The method may also include determining a type of the Wi-Fi hotspot device according to the recognition identifier. In addition, the method may include controlling information downloading or wireless data traffic of an information processing device according to the type of the Wi-Fi hotspot device.
    Type: Application
    Filed: June 22, 2015
    Publication date: January 7, 2016
    Inventor: Chao XIU
  • Publication number: 20150295915
    Abstract: When a portable terminal of a user receives an authentication prompt message pushed by an application server, an authentication prompt option corresponding to the authentication prompt message is output at the portable terminal. A portal authentication is initiated after the authentication prompt option is selected by the user. MAC address information of the portable terminal returned by a portal server is acquired after the portal authentication is initiated. A user name and password for the application client terminal to log into the application server terminal is used as a user name and password for portal authentication. The MAC address information of the portable terminal returned by the portal server is sent to the application server. The present disclosure facilitates the operation of using the portal authentication, prevents the user from forgetting to perform the portal authentication, and brings convenience to those who are not familiar with the portal authentication mechanism.
    Type: Application
    Filed: April 14, 2015
    Publication date: October 15, 2015
    Inventor: Chao Xiu