Patents by Inventor Jupeng Xia

Jupeng Xia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11570194
    Abstract: This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: January 31, 2023
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Jupeng Xia, Caiwei Li
  • Patent number: 11250404
    Abstract: An authentication factor is received, including an authentication key, an account information of a user, and a dynamic time factor. A bound authentication information is generated by using the authentication factor and a device information of a client device that requested the secure offline payment. The bound authentication information is transmitted to a service server system perform an offline payment authorization based on the bound authentication information. In response to a successful offline payment authorization, a graphical identifier is generated for completing the secure offline payment associated with the authentication factor, where the graphical identifier includes the bound authentication information and a dynamic password generated based on the dynamic time factor.
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: February 15, 2022
    Assignee: Advanced New Technologies Co., Ltd.
    Inventor: Jupeng Xia
  • Patent number: 11075938
    Abstract: This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.
    Type: Grant
    Filed: January 22, 2019
    Date of Patent: July 27, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Jupeng Xia, Caiwei Li
  • Patent number: 10990957
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a scan-to-pay method are provided. One of the methods includes: receiving a payment request from an operator of a mobile device; and generating a payment code based on the payment request, wherein the payment code comprises first information and second information, with the first information associated with an payment account, and the second information associated with at least one recent behavioral biometric signature of the operator and at least one historical behavioral biometric signature recorded in the mobile device. This scan-to-pay method provides robust risk control with substantially reduced cost, therefore it provides a more friendly user experience on a scan-to-pay application over its conventional counterparts.
    Type: Grant
    Filed: May 1, 2019
    Date of Patent: April 27, 2021
    Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.
    Inventors: Yicheng Lu, Shuai Chen, Tao Chen, Jupeng Xia, Ning Wang
  • Publication number: 20200250677
    Abstract: The present application discloses techniques for processing service requests based on risk. One example method includes: receiving a service processing request including service data; performing risk identification on the service processing request based on a stored risk identification rule or a stored risk identification model with reference to the service data to generate a risk identification result; determining that the risk identification result is an indefinite result; and in response to determining that the risk identification result is the indefinite result, sending a risk identification request that comprises the service data to a cloud risk identification system, wherein the risk identification request is configured to request the cloud risk identification system to perform risk identification on the service processing request.
    Type: Application
    Filed: December 23, 2019
    Publication date: August 6, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Xi Gu, Caiwei Li, Jupeng Xia
  • Publication number: 20200242614
    Abstract: The present application discloses example methods, computer-readable mediums, and systems for controlling service operation risks. In one example, method, an application program on an end-user device monitors a service operation initiated by a user for invoking offline service information. After the service operation is monitored, it is determined whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model. In response to determining that the service operation is a risky operation, a refusal to invoke the offline service information is performed. In response to determining that the service operation is not a risky operation, the offline service information is invoked.
    Type: Application
    Filed: December 23, 2019
    Publication date: July 30, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei Li, Xi Gu, Bao Jiang
  • Publication number: 20200236128
    Abstract: This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.
    Type: Application
    Filed: December 20, 2019
    Publication date: July 23, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei LI
  • Patent number: 10691794
    Abstract: Implementations of the present specification disclose a method and an apparatus for detecting model security and an electronic device. The method includes the following: obtaining result data computed by using a model, wherein the result data comprises intermediate result data and output result data; obtaining a discriminator through training by using a generative adversarial network (GAN) framework, the model, and a sample; discriminating the result data by using the discriminator by using the model for current input data, to detect whether the model is currently secure, wherein the model is in a trusted execution environment for obtaining the discriminator through training; and determining a security detection result of the model.
    Type: Grant
    Filed: October 30, 2019
    Date of Patent: June 23, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei Li
  • Publication number: 20200143272
    Abstract: A rule operation request associated with a service is received by a terminal. A rule corresponding to the rule operation request is obtained from a rule set associated with the service, where the rule set has been previously obtained from the server based on at least one of a device identifier or a user identifier corresponding to the terminal. A rule tree is generated based on the rule. An operation result of the rule is determined based on the rule tree and service data related to the rule.
    Type: Application
    Filed: December 23, 2019
    Publication date: May 7, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Xueyao Gao, Shaoqing MA, Bei Tian, Chongmin Huang
  • Publication number: 20200134630
    Abstract: The present application discloses example methods, computer-readable mediums, and systems for controlling service operation risks. In one example, method, an application program on an end-user device monitors a service operation initiated by a user for invoking offline service information. After the service operation is monitored, it is determined whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model. In response to determining that the service operation is a risky operation, a refusal to invoke the offline service information is performed. In response to determining that the service operation is not a risky operation, the offline service information is invoked.
    Type: Application
    Filed: December 23, 2019
    Publication date: April 30, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei Li, Xi Gu, Bao Jiang
  • Publication number: 20200065479
    Abstract: Implementations of the present specification disclose a method and an apparatus for detecting model security and an electronic device. The method includes the following: obtaining result data computed by using a model, wherein the result data comprises intermediate result data and output result data; obtaining a discriminator through training by using a generative adversarial network (GAN) framework, the model, and a sample; discriminating the result data by using the discriminator by using the model for current input data, to detect whether the model is currently secure, wherein the model is in a trusted execution environment for obtaining the discriminator through training; and determining a security detection result of the model.
    Type: Application
    Filed: October 30, 2019
    Publication date: February 27, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei Li
  • Publication number: 20190259021
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a scan-to-pay method are provided. One of the methods includes: receiving a payment request from an operator of a mobile device; and generating a payment code based on the payment request, wherein the payment code comprises first information and second information, with the first information associated with an payment account, and the second information associated with at least one recent behavioral biometric signature of the operator and at least one historical behavioral biometric signature recorded in the mobile device. This scan-to-pay method provides robust risk control with substantially reduced cost, therefore it provides a more friendly user experience on a scan-to-pay application over its conventional counterparts.
    Type: Application
    Filed: May 1, 2019
    Publication date: August 22, 2019
    Inventors: Yicheng LU, Shuai CHEN, Tao CHEN, Jupeng XIA, Ning WANG
  • Patent number: 10389710
    Abstract: Extracting characteristic information includes receiving a collection command from a client, obtaining, via a collection device, biometric information based on the collection command, selecting a stored extraction algorithm corresponding to the client, the stored extraction algorithm being selected from among a plurality of stored extraction algorithms, extracting characteristic values from the obtained biometric information, the characteristic values being extracted based on the selected extraction algorithm, and sending the extracted characteristic values to the client.
    Type: Grant
    Filed: February 13, 2015
    Date of Patent: August 20, 2019
    Assignee: Alibaba Group Holding Limited
    Inventors: Xiaoling Li, Junkui Li, Jupeng Xia, Yan Hu
  • Publication number: 20190158528
    Abstract: This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.
    Type: Application
    Filed: January 22, 2019
    Publication date: May 23, 2019
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei LI
  • Publication number: 20190156342
    Abstract: The present application discloses example methods, computer-readable mediums, and systems for controlling service operation risks. In one example, method, an application program on an end-user device monitors a service operation initiated by a user for invoking offline service information. After the service operation is monitored, it is determined whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model. In response to determining that the service operation is a risky operation, a refusal to invoke the offline service information is performed. In response to determining that the service operation is not a risky operation, the offline service information is invoked.
    Type: Application
    Filed: January 22, 2019
    Publication date: May 23, 2019
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Caiwei LI, Xi GU, Bao JIANG
  • Publication number: 20190156343
    Abstract: The present application discloses techniques for processing service requests based on risk. One example method includes: receiving a service processing request including service data; performing risk identification on the service processing request based on a stored risk identification rule or a stored risk identification model with reference to the service data to generate a risk identification result; determining that the risk identification result is an indefinite result; and in response to determining that the risk identification result is the indefinite result, sending a risk identification request that comprises the service data to a cloud risk identification system, wherein the risk identification request is configured to request the cloud risk identification system to perform risk identification on the service processing request.
    Type: Application
    Filed: January 22, 2019
    Publication date: May 23, 2019
    Applicant: Alibaba Group Holding Limited
    Inventors: Xi GU, Caiwei LI, Jupeng Xia
  • Publication number: 20190156228
    Abstract: A rule operation request associated with a service is received by a terminal. A rule corresponding to the rule operation request is obtained from a rule set associated with the service, where the rule set has been previously obtained from the server based on at least one of a device identifier or a user identifier corresponding to the terminal. A rule tree is generated based on the rule. An operation result of the rule is determined based on the rule tree and service data related to the rule.
    Type: Application
    Filed: January 22, 2019
    Publication date: May 23, 2019
    Applicant: Alibaba Group Holding Limited
    Inventors: Jupeng Xia, Xueyao GAO, Shaoqing MA, Bei TIAN, Chongmin HUANG
  • Patent number: 10073916
    Abstract: Embodiments of the present application disclose a method for providing a terminal identifier to a terminal. During operation, a security server receives a registration information set from the terminal, in which the registration information set includes multiple pieces of equipment information from the terminal. The security server then generates a terminal identifier based on the multiple pieces of equipment information in the registration information set. The security server then returns the terminal identifier to the terminal.
    Type: Grant
    Filed: September 13, 2017
    Date of Patent: September 11, 2018
    Assignee: Alibaba Group Holding Limited
    Inventor: Jupeng Xia
  • Publication number: 20180068290
    Abstract: An authentication factor is received, including an authentication key, an account information of a user, and a dynamic time factor. A bound authentication information is generated by using the authentication factor and a device information of a client device that requested the secure offline payment. The bound authentication information is transmitted to a service server system perform an offline payment authorization based on the bound authentication information. In response to a successful offline payment authorization, a graphical identifier is generated for completing the secure offline payment associated with the authentication factor, where the graphical identifier includes the bound authentication information and a dynamic password generated based on the dynamic time factor.
    Type: Application
    Filed: November 7, 2017
    Publication date: March 8, 2018
    Applicant: Alibaba Group Holding Limited
    Inventor: Jupeng Xia
  • Publication number: 20180004852
    Abstract: Embodiments of the present application disclose a method for providing a terminal identifier to a terminal. During operation, a security server receives a registration information set from the terminal, in which the registration information set includes multiple pieces of equipment information from the terminal. The security server then generates a terminal identifier based on the multiple pieces of equipment information in the registration information set. The security server then returns the terminal identifier to the terminal.
    Type: Application
    Filed: September 13, 2017
    Publication date: January 4, 2018
    Applicant: Alibaba Group Holding Limited
    Inventor: Jupeng Xia