Patents by Inventor Jiwei GUO
Jiwei GUO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11945995Abstract: Disclosed are a temporary plugging agent and a preparation method thereof, and a method for temporary plugging and fracturing of a high-temperature reservoir. The temporary plugging agent includes the following components in mass fractions: acrylamide 5%, composite crosslinking agent 1%, laponite 1%, ammonium persulfate 0.1% and water 92.9%.Type: GrantFiled: December 15, 2020Date of Patent: April 2, 2024Assignee: CHINA UNIVERSITY OF PETROLEUMInventors: Tiankui Guo, Yuelong Zhang, Zengbao Wang, Ning Qi, Mingliang Luo, Feipeng Wu, Ming Chen, Xiaoqiang Liu, Jiwei Wang, Xiaozhi Wang, Yuanzhi Gong
-
Publication number: 20210224490Abstract: The disclosed embodiments provide a system for managing the translation of content. During operation, the system generates a user interface for specifying parameters of a translation request for translating a content item from a first language into a second language. Next, the system formats the parameters and the content item into a representation of the translation request that is submitted for processing by a translation system. The system then monitors a status associated with processing the translation request by the translation system. Upon verifying completion of the translation request by the translation system, the system retrieves, from the translation system, a translation of the content item from the first language into the second language. Finally, the system formats the translation within a response to the translation request and transmits the response to a content source of the content item.Type: ApplicationFiled: January 16, 2020Publication date: July 22, 2021Inventors: Jiwei Guo, Sameer N. Mehra, Yogesh M. Upadhyay, Nelson Mei
-
Patent number: 10990806Abstract: The present disclosure provides technical solutions for improving facial image capturing, recognition, and authentication, including: collecting a face image in response to a facial scan instruction (e.g., for facial recognition) using a camera of a mobile terminal; calculating a measure of image brightness (e.g., a luminance value) of the collected face image; enhancing, when a value of the measure of image brightness of the collected face image is less than a first preset threshold, luminance of light that is emitted from a display of the mobile terminal to a target luminance value, and re-collecting a face image using the camera of the mobile terminal and calculating a corresponding value of the measure of image brightness for the re-collected face image; and performing, when the value of the measure of image brightness of the re-collected face image falls within a preset value range, facial recognition based on the re-collected face image.Type: GrantFiled: February 19, 2019Date of Patent: April 27, 2021Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Lina Yuan, Jiwei Guo, Yifeng Li, Liang Wang
-
Patent number: 10657244Abstract: Embodiments of the present disclosure disclose an identity authentication method performed at a computing device, the method including: obtaining a sequence of finger gestures on a touchpad of the computing device from a user, wherein each finger gesture has an associated pressure type on the touchpad; generating a corresponding character string according to the sequence of finger gestures; comparing the character string with a verification code of a user account associated with an application program; in accordance with a determination that the character string matches the verification code, granting the user access to the user account associated with the application program; and in accordance with a determination that the character string does not match the verification code, denying the user access to the user account associated with the application program.Type: GrantFiled: November 17, 2017Date of Patent: May 19, 2020Assignee: Tencent Technology (Shenzhen) Company LimitedInventors: Xia Yang, Luyi Lin, Yunyun Hao, Yifeng Li, Shaoyu Zhang, Liang Wang, Jiwei Guo
-
Patent number: 10645579Abstract: An account login method includes receiving a login request command sent by a second terminal, the login request command carrying an account and a second terminal identifier. The method further includes detecting whether a device lock flag corresponding to the account is unlocked and that a state corresponding to the second terminal identifier is that a device lock is locked. If yes, the method further includes acquiring a first terminal identifier corresponding to the account, a state corresponding to the first terminal identifier being that the device lock is unlocked and implementing a login of the account on the second terminal by using a first terminal corresponding to the first terminal identifier.Type: GrantFiled: May 26, 2018Date of Patent: May 5, 2020Assignee: Tencent Technology (Shenzhen) Company LimitedInventors: Ningbo Jiang, Qinglei Feng, Zheng Jiang, Lei Qin, Jiwei Guo, Jie Zhao, Jun Ma, Siwei Zhou, Xing Chen
-
Patent number: 10536456Abstract: A method for identifying user information includes obtaining a first user identifier of a user in a social network; obtaining identity authentication information corresponding to the first user identifier; determining whether the identity authentication information is associated with a second user identifier; and storing, when the identity authentication information is associated with the second user identifier, an association relationship between the first user identifier and the second user identifier.Type: GrantFiled: September 22, 2017Date of Patent: January 14, 2020Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Haiyang Wang, Zixuan Zhao, Jiwei Guo
-
Patent number: 10476889Abstract: An information interaction method, apparatus and system are provided. A sensitive operation pre-performing message is received from a terminal where a secondary account is located. The sensitive operation pre-performing message may carry a secondary account identifier. Based on the secondary account identifier and a pre-stored association relationship between a primary account identifier and the secondary account identifier, the primary account identifier corresponding to the secondary account identifier may be determined. Based on the determined primary account identifier, a sensitive operation verification request message may be sent to a terminal where the primary account is located. A verification result information may be received from the terminal where the primary account is located.Type: GrantFiled: June 21, 2016Date of Patent: November 12, 2019Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Xiao He, Jiwei Guo, Huankui Chen, Jing Ning
-
Publication number: 20190188454Abstract: The present disclosure provides technical solutions for improving facial image capturing, recognition, and authentication, including: collecting a face image in response to a facial scan instruction (e.g., for facial recognition) using a camera of a mobile terminal; calculating a measure of image brightness (e.g., a luminance value) of the collected face image; enhancing, when a value of the measure of image brightness of the collected face image is less than a first preset threshold, luminance of light that is emitted from a display of the mobile terminal to a target luminance value, and re-collecting a face image using the camera of the mobile terminal and calculating a corresponding value of the measure of image brightness for the re-collected face image; and performing, when the value of the measure of image brightness of the re-collected face image falls within a preset value range, facial recognition based on the re-collected face image.Type: ApplicationFiled: February 19, 2019Publication date: June 20, 2019Inventors: Lina YUAN, Jiwei Guo, Yifeng Li, Liang Wang
-
Patent number: 10192042Abstract: The present disclosure provides a user verifying method, a terminal device, a server and a storage medium. The method may include: receiving, by a terminal device, a motion instruction from a server, and displaying the motion instruction on a display interface of the terminal device; obtaining sensed data of a gyroscope equipped in the terminal device and sending the sensed data to the server; determining, by the server, whether a motion trail of the terminal device constructed according to the sensed data meets a requirement of the motion instruction; and determining, by the server, that a user of the terminal device passes a user verification if the motion trail of the terminal device constructed according to the sensed data meets the requirement of the motion instruction. The method ensures that only human can accomplish the verifying process, which promotes the security of the user verification and improves the user experience.Type: GrantFiled: April 18, 2016Date of Patent: January 29, 2019Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Jiwei Guo, Haibo Zuo, Luyi Lin, Yijun Huang
-
Publication number: 20180279127Abstract: An account login method includes receiving a login request command sent by a second terminal, the login request command carrying an account and a second terminal identifier. The method further includes detecting whether a device lock flag corresponding to the account is unlocked and that a state corresponding to the second terminal identifier is that a device lock is locked. If yes, the method further includes acquiring a first terminal identifier corresponding to the account, a state corresponding to the first terminal identifier being that the device lock is unlocked and implementing a login of the account on the second terminal by using a first terminal corresponding to the first terminal identifier.Type: ApplicationFiled: May 26, 2018Publication date: September 27, 2018Inventors: Ningbo JIANG, Qinglei FENG, Zheng JIANG, Lei QIN, Jiwei GUO, Jie ZHAO, Jun MA, Siwei ZHOU, Xing CHEN
-
Patent number: 10009767Abstract: An account login method includes receiving a login request command sent by a second terminal, the login request command carrying an account and a second terminal identifier. The method further includes detecting whether a device lock flag corresponding to the account is unlocked and that a state corresponding to the second terminal identifier is that a device lock is locked If yes, the method further includes acquiring a first terminal identifier corresponding to the account, a state corresponding to the first terminal identifier being that the device lock is unlocked and implementing a login of the account on the second terminal by using a first terminal corresponding to the first terminal identifier.Type: GrantFiled: July 6, 2016Date of Patent: June 26, 2018Assignee: Tencent Technology (Shenzhen) Company LimitedInventors: Ningbo Jiang, Qinglei Feng, Zheng Jiang, Lei Qin, Jiwei Guo, Jie Zhao, Jun Ma, Siwei Zhou, Xing Chen
-
Publication number: 20180077157Abstract: A method for identifying user information includes obtaining a first user identifier of a user in a social network; obtaining identity authentication information corresponding to the first user identifier; determining whether the identity authentication information is associated with a second user identifier; and storing, when the identity authentication information is associated with the second user identifier, an association relationship between the first user identifier and the second user identifier.Type: ApplicationFiled: September 22, 2017Publication date: March 15, 2018Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Haiyang WANG, Zixuan ZHAO, Jiwei GUO
-
Publication number: 20180075230Abstract: Embodiments of the present disclosure disclose an identity authentication method performed at a computing device, the method including: obtaining a sequence of finger gestures on a touchpad of the computing device from a user, wherein each finger gesture has an associated pressure type on the touchpad; generating a corresponding character string according to the sequence of finger gestures; comparing the character string with a verification code of a user account associated with an application program; in accordance with a determination that the character string matches the verification code, granting the user access to the user account associated with the application program; and in accordance with a determination that the character string does not match the verification code, denying the user access to the user account associated with the application program.Type: ApplicationFiled: November 17, 2017Publication date: March 15, 2018Inventors: Xia Yang, Luyi Lin, Yunyun Hao, Yifeng Li, Shaoyu Zhang, Liang Wang, Jiwei Guo
-
Patent number: 9635018Abstract: A user verification method and system, a password protection apparatus and a storage medium are disclosed, and the method includes: receiving an operation request containing a user identity of a user sent by the user via a user terminal; generating identity verification information according to the user identity; sending the identity verification information to an NFC terminal through near field communication with the NFC terminal, so that the NFC terminal prompts the user to provide identity acknowledgement; receiving identity acknowledgement information from the NFC terminal, if the identity acknowledgement is provided by the user, where the identity acknowledgement information contains an identifier of the NFC terminal; determining whether the user identity matches the identifier of the NFC terminal according to the identity acknowledgement information; and sending operation response information to the user terminal of the user if the user identity matches the identifier of the NFC terminal.Type: GrantFiled: April 27, 2016Date of Patent: April 25, 2017Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Jiwei Guo, Xin Yu, Luyi Lin, Shan Lu
-
Publication number: 20160352757Abstract: An information interaction method, apparatus and system are provided. A sensitive operation pre-performing message is received from a terminal where a secondary account is located. The sensitive operation pre-performing message may carry a secondary account identifier. Based on the secondary account identifier and a pre-stored association relationship between a primary account identifier and the secondary account identifier, the primary account identifier corresponding to the secondary account identifier may be determined. Based on the determined primary account identifier, a sensitive operation verification request message may be sent to a terminal where the primary account is located. A verification result information may be received from the terminal where the primary account is located.Type: ApplicationFiled: June 21, 2016Publication date: December 1, 2016Inventors: Xiao HE, Jiwei GUO, Huankui CHEN, Jing NING
-
Patent number: 9494037Abstract: In an inclined layered solid-filling mining method in an ultrathick coal layer, tunnels and equipment are arranged according to a solid-filling mining method. An artificial roof for a lower layer is formed by metal meshes and bamboo fences of a first layer a solid-filling mining method. The method is repeated, until the entire ultrathick coal layer is finished. The method is repeated forming additional roofs for subsequent layers.Type: GrantFiled: January 22, 2014Date of Patent: November 15, 2016Assignee: China University of Mining and TechnologyInventors: Jixiong Zhang, Nan Zhou, Qiang Zhang, Jiwei Guo, Xiaoming Shen, Feng Ju, Haiqiang Jiang
-
Publication number: 20160316369Abstract: An account login method includes receiving a login request command sent by a second terminal, the login request command carrying an account and a second terminal identifier. The method further includes detecting whether a device lock flag corresponding to the account is unlocked and that a state corresponding to the second terminal identifier is that a device lock is locked If yes, the method further includes acquiring a first terminal identifier corresponding to the account, a state corresponding to the first terminal identifier being that the device lock is unlocked and implementing a login of the account on the second terminal by using a first terminal corresponding to the first terminal identifier.Type: ApplicationFiled: July 6, 2016Publication date: October 27, 2016Inventors: Ningbo JIANG, Qinglei FENG, Zheng JIANG, Lei QIN, Jiwei GUO, Jie ZHAO, Jun MA, Siwei ZHOU, Xing CHEN
-
Publication number: 20160241544Abstract: A user verification method and system, a password protection apparatus and a storage medium are disclosed, and the method includes: receiving an operation request containing a user identity of a user sent by the user via a user terminal; generating identity verification information according to the user identity; sending the identity verification information to an NFC terminal through near field communication with the NFC terminal, so that the NFC terminal prompts the user to provide identity acknowledgement; receiving identity acknowledgement information from the NFC terminal, if the identity acknowledgement is provided by the user, where the identity acknowledgement information contains an identifier of the NFC terminal; determining whether the user identity matches the identifier of the NFC terminal according to the identity acknowledgement information; and sending operation response information to the user terminal of the user if the user identity matches the identifier of the NFC terminal.Type: ApplicationFiled: April 27, 2016Publication date: August 18, 2016Inventors: Jiwei GUO, Xin Yu, Luyi Lin, Shan Lu
-
Publication number: 20160232338Abstract: The present disclosure provides a user verifying method, a terminal device, a server and a storage medium. The method may include: receiving, by a terminal device, a motion instruction from a server, and displaying the motion instruction on a display interface of the terminal device; obtaining sensed data of a gyroscope equipped in the terminal device and sending the sensed data to the server; determining, by the server, whether a motion trail of the terminal device constructed according to the sensed data meets a requirement of the motion instruction; and determining, by the server, that a user of the terminal device passes a user verification if the motion trail of the terminal device constructed according to the sensed data meets the requirement of the motion instruction. The method ensures that only human can accomplish the verifying process, which promotes the security of the user verification and improves the user experience.Type: ApplicationFiled: April 18, 2016Publication date: August 11, 2016Inventors: JIWEI GUO, HAIBO ZUO, LUYI LIN, YIJUN HUANG
-
Publication number: 20160102553Abstract: An inclined layered solid-filling mining method in an ultrathick coal layer is applicable to exploitation in a “three-unders” ultrathick coal layer. In this method, the number of inclined layers is determined based on a principle of layered thickness from 2.5 m to 4.5 m, and a layered-exploitation downward-filling exploitation order is adopted. Tunnels and equipment are arranged according to a conventional solid-filling mining method. A cyclic order of mining, layout of metal meshes (14) and bamboo fences (24), and filling is adopted, so as to accomplish filling and exploitation of a first mining face and a first layer (21).Type: ApplicationFiled: January 22, 2014Publication date: April 14, 2016Inventors: Jixiong Zhang, Nan Zhou, Qiang Zhang, Jiwei Guo, Xiaoming Shen, Feng Ju, Haiqiang Jiang