Patents by Inventor Haizhi Xu
Haizhi Xu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10803413Abstract: A provider network is configured to provide continuous workflow service for an open-ended number of workflows using non-persistent threads. The provider network includes a workflow translator service configured to receive workflows defined according to multiple workflow domain specific languages and translate the received workflows into a particular domain specific language used by the workflow service to execute workflows. In some cases, the provider network includes a workflow handling service and a workflow evaluation service. The workflow handling service may receive indications of task completion events related to respective workflows, and in turn may send non-blocking requests for workflow decisions from the workflow evaluation service. In generating a workflow decision, the workflow evaluation service may determine resources for executing a workflow.Type: GrantFiled: June 23, 2016Date of Patent: October 13, 2020Assignee: Amazon Technologies, Inc.Inventors: Haizhi Xu, David Wood, Yun Bai, Shreekant Balasaheb Waphare, Xi Wang, Aaron-Kenneth Karl Rehaag
-
Patent number: 10242364Abstract: A user can be authenticated to a mobile computing device using an authentication process that recognizes the user and verifies that an actual human being is attempting to be authenticated, in order to minimize the ability of another person to spoof the authentication process. A model of a user can be generated and stored in the cloud, enabling that model to be synchronized across various devices. A user accessing one of these devices can have infrared image information captured, which can be used with a facial recognition process, to recognize the user, and with a human verification process, to verify that the facial information corresponds to a human user. Various approaches such as visual analysis and thermal imaging can be used to verify that the human user being recognized is interactive with the device.Type: GrantFiled: October 12, 2018Date of Patent: March 26, 2019Assignee: Amazon Technologies, Inc.Inventors: Yicong Wang, Haizhi Xu
-
Publication number: 20190050866Abstract: A user can be authenticated to a mobile computing device using an authentication process that recognizes the user and verifies that an actual human being is attempting to be authenticated, in order to minimize the ability of another person to spoof the authentication process. A model of a user can be generated and stored in the cloud, enabling that model to be synchronized across various devices. A user accessing one of these devices can have infrared image information captured, which can be used with a facial recognition process, to recognize the user, and with a human verification process, to verify that the facial information corresponds to a human user. Various approaches such as visual analysis and thermal imaging can be used to verify that the human user being recognized is interactive with the device.Type: ApplicationFiled: October 12, 2018Publication date: February 14, 2019Inventors: Yicong Wang, Haizhi Xu
-
Patent number: 10108961Abstract: A user can be authenticated to any of a number of computing devices using an authentication process that recognizes the user and verifies that an actual human being is attempting to be authenticated, in order to minimize the ability of another person to spoof the authentication process. A model of a user can be generated and stored in the cloud, enabling that model to be synchronized across various devices. A user accessing one of these devices can have image information captured, which can be used with a facial recognition process, to recognize the user, and with a human verification process, to verify that the facial information corresponds to a human user. Various approaches such as visual analysis, three-dimensional imaging, and thermal imaging can be used to verify that the human user being recognized is interactive with the device.Type: GrantFiled: March 27, 2018Date of Patent: October 23, 2018Assignee: Amazon Technologies, Inc.Inventors: Yicong Wang, Haizhi Xu
-
Publication number: 20180218371Abstract: A user can be authenticated to any of a number of computing devices using an authentication process that recognizes the user and verifies that an actual human being is attempting to be authenticated, in order to minimize the ability of another person to spoof the authentication process. A model of a user can be generated and stored in the cloud, enabling that model to be synchronized across various devices. A user accessing one of these devices can have image information captured, which can be used with a facial recognition process, to recognize the user, and with a human verification process, to verify that the facial information corresponds to a human user. Various approaches such as visual analysis, three-dimensional imaging, and thermal imaging can be used to verify that the human user being recognized is interactive with the device.Type: ApplicationFiled: March 27, 2018Publication date: August 2, 2018Inventors: Yicong Wang, Haizhi Xu
-
Patent number: 9934504Abstract: A transaction is authorized using an authentication process that prompts the user to perform an action in view of a camera or sensor. The process identifies the user and verifies that the user requesting the transaction is a living human being. The user is identified using image information which is processed utilizing facial recognition. The device verifies that the image information corresponds to a living human using one or more human-verification processes. The device prompts the user to perform an action to confirm the transaction, and causes the transaction to be performed after verifying performance of the action by the identified user.Type: GrantFiled: October 19, 2015Date of Patent: April 3, 2018Assignee: Amazon Technologies, Inc.Inventors: Yicong Wang, Haizhi Xu
-
Patent number: 9753713Abstract: A distributed application may be updated by using information provided by the application to determine grouping, sequencing, and whether or not to advance an update sequence. The application may provide input to an update sequence, and may cause the update sequence to repair one or more replicas prior to updating. The update mechanism may be used to change the distributed application topology as well as make changes to the application executable code, application configuration, quest operating system, virtual machine, and host systems, among others. In some cases, the distributed application may use a quorum to determine which version is current, and the quorum may change during the update process.Type: GrantFiled: October 22, 2010Date of Patent: September 5, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Ajay Mani, Pavel Dournov, Luis Irun-Briz, Pavithra Nagesharao, Haizhi Xu, Akram Hassan, Ashish Shah, Todd Pfleiger
-
Publication number: 20160071111Abstract: A transaction is authorized using an authentication process that prompts the user to perform an action in view of a camera or sensor. The process identifies the user and verifies that the user requesting the transaction is a living human being. The user is identified using image information which is processed utilizing facial recognition. The device verifies that the image information corresponds to a living human using one or more human-verification processes. The device prompts the user to perform an action to confirm the transaction, and causes the transaction to be performed after verifying performance of the action by the identified user.Type: ApplicationFiled: October 19, 2015Publication date: March 10, 2016Inventors: Yicong Wang, Haizhi Xu
-
Patent number: 9202105Abstract: A user can be authenticated to any of a number of computing devices using an authentication process that recognizes the user and verifies that an actual human being is attempting to be authenticated, in order to minimize the ability of another person to spoof the authentication process. A model of a user can be generated and stored in the cloud, enabling that model to be synchronized across various devices. A user accessing one of these devices can have image information captured, which can be used with a facial recognition process, to recognize the user, and with a human verification process, to verify that the facial information corresponds to a human user. Various approaches such as visual analysis, three-dimensional imaging, and thermal imaging can be used to verify that the human user being recognized is interactive with the device.Type: GrantFiled: January 13, 2012Date of Patent: December 1, 2015Assignee: Amazon Technologies, Inc.Inventors: Yicong Wang, Haizhi Xu
-
Patent number: 8365009Abstract: Subject matter described herein is directed to reallocating an application component from a faulty data-center resource to a non-faulty data-center resource. Background monitors identify data-center resources that are faulty and schedule migration of application components from the faulty data-center resources to non-faulty data-center resources. Migration is carried out in an automatic manner that allows an application to remain available. Thresholds are in place to control a rate of migration, as well as, detect when resource failure might be resulting from data-center-wide processes or from an application failure.Type: GrantFiled: September 10, 2010Date of Patent: January 29, 2013Assignee: Microsoft CorporationInventors: Pavel A. Dournov, Haizhi Xu
-
Publication number: 20120102481Abstract: A distributed application may be updated by using information provided by the application to determine grouping, sequencing, and whether or not to advance an update sequence. The application may provide input to an update sequence, and may cause the update sequence to repair one or more replicas prior to updating. The update mechanism may be used to change the distributed application topology as well as make changes to the application executable code, application configuration, quest operating system, virtual machine, and host systems, among others. In some cases, the distributed application may use a quorum to determine which version is current, and the quorum may change during the update process.Type: ApplicationFiled: October 22, 2010Publication date: April 26, 2012Applicant: MICROSOFT CORPORATIONInventors: Ajay Mani, Pavel Dournov, Luis Irun-Briz, Pavithra Nagesharao, Haizhi Xu, Akram Hassan, Ashish Shah, Todd Pfleiger
-
Publication number: 20120066541Abstract: Subject matter described herein is directed to reallocating an application component from a faulty data-center resource to a non-faulty data-center resource. Background monitors identify data-center resources that are faulty and schedule migration of application components from the faulty data-center resources to non-faulty data-center resources. Migration is carried out in an automatic manner that allows an application to remain available. Thresholds are in place to control a rate of migration, as well as, detect when resource failure might be resulting from data-center-wide processes or from an application failure.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Applicant: MICROSOFT CORPORATIONInventors: PAVEL A. DOURNOV, HAIZHI XU