Patents by Inventor Jupeng Xia
Jupeng Xia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11570194Abstract: This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.Type: GrantFiled: December 20, 2019Date of Patent: January 31, 2023Assignee: Advanced New Technologies Co., Ltd.Inventors: Jupeng Xia, Caiwei Li
-
Patent number: 11250404Abstract: An authentication factor is received, including an authentication key, an account information of a user, and a dynamic time factor. A bound authentication information is generated by using the authentication factor and a device information of a client device that requested the secure offline payment. The bound authentication information is transmitted to a service server system perform an offline payment authorization based on the bound authentication information. In response to a successful offline payment authorization, a graphical identifier is generated for completing the secure offline payment associated with the authentication factor, where the graphical identifier includes the bound authentication information and a dynamic password generated based on the dynamic time factor.Type: GrantFiled: November 7, 2017Date of Patent: February 15, 2022Assignee: Advanced New Technologies Co., Ltd.Inventor: Jupeng Xia
-
Patent number: 11075938Abstract: This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.Type: GrantFiled: January 22, 2019Date of Patent: July 27, 2021Assignee: Advanced New Technologies Co., Ltd.Inventors: Jupeng Xia, Caiwei Li
-
Patent number: 10990957Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a scan-to-pay method are provided. One of the methods includes: receiving a payment request from an operator of a mobile device; and generating a payment code based on the payment request, wherein the payment code comprises first information and second information, with the first information associated with an payment account, and the second information associated with at least one recent behavioral biometric signature of the operator and at least one historical behavioral biometric signature recorded in the mobile device. This scan-to-pay method provides robust risk control with substantially reduced cost, therefore it provides a more friendly user experience on a scan-to-pay application over its conventional counterparts.Type: GrantFiled: May 1, 2019Date of Patent: April 27, 2021Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.Inventors: Yicheng Lu, Shuai Chen, Tao Chen, Jupeng Xia, Ning Wang
-
Publication number: 20200250677Abstract: The present application discloses techniques for processing service requests based on risk. One example method includes: receiving a service processing request including service data; performing risk identification on the service processing request based on a stored risk identification rule or a stored risk identification model with reference to the service data to generate a risk identification result; determining that the risk identification result is an indefinite result; and in response to determining that the risk identification result is the indefinite result, sending a risk identification request that comprises the service data to a cloud risk identification system, wherein the risk identification request is configured to request the cloud risk identification system to perform risk identification on the service processing request.Type: ApplicationFiled: December 23, 2019Publication date: August 6, 2020Applicant: Alibaba Group Holding LimitedInventors: Xi Gu, Caiwei Li, Jupeng Xia
-
Publication number: 20200242614Abstract: The present application discloses example methods, computer-readable mediums, and systems for controlling service operation risks. In one example, method, an application program on an end-user device monitors a service operation initiated by a user for invoking offline service information. After the service operation is monitored, it is determined whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model. In response to determining that the service operation is a risky operation, a refusal to invoke the offline service information is performed. In response to determining that the service operation is not a risky operation, the offline service information is invoked.Type: ApplicationFiled: December 23, 2019Publication date: July 30, 2020Applicant: Alibaba Group Holding LimitedInventors: Jupeng Xia, Caiwei Li, Xi Gu, Bao Jiang
-
Publication number: 20200236128Abstract: This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.Type: ApplicationFiled: December 20, 2019Publication date: July 23, 2020Applicant: Alibaba Group Holding LimitedInventors: Jupeng Xia, Caiwei LI
-
Patent number: 10691794Abstract: Implementations of the present specification disclose a method and an apparatus for detecting model security and an electronic device. The method includes the following: obtaining result data computed by using a model, wherein the result data comprises intermediate result data and output result data; obtaining a discriminator through training by using a generative adversarial network (GAN) framework, the model, and a sample; discriminating the result data by using the discriminator by using the model for current input data, to detect whether the model is currently secure, wherein the model is in a trusted execution environment for obtaining the discriminator through training; and determining a security detection result of the model.Type: GrantFiled: October 30, 2019Date of Patent: June 23, 2020Assignee: Alibaba Group Holding LimitedInventors: Jupeng Xia, Caiwei Li
-
Publication number: 20200143272Abstract: A rule operation request associated with a service is received by a terminal. A rule corresponding to the rule operation request is obtained from a rule set associated with the service, where the rule set has been previously obtained from the server based on at least one of a device identifier or a user identifier corresponding to the terminal. A rule tree is generated based on the rule. An operation result of the rule is determined based on the rule tree and service data related to the rule.Type: ApplicationFiled: December 23, 2019Publication date: May 7, 2020Applicant: Alibaba Group Holding LimitedInventors: Jupeng Xia, Xueyao Gao, Shaoqing MA, Bei Tian, Chongmin Huang
-
Publication number: 20200134630Abstract: The present application discloses example methods, computer-readable mediums, and systems for controlling service operation risks. In one example, method, an application program on an end-user device monitors a service operation initiated by a user for invoking offline service information. After the service operation is monitored, it is determined whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model. In response to determining that the service operation is a risky operation, a refusal to invoke the offline service information is performed. In response to determining that the service operation is not a risky operation, the offline service information is invoked.Type: ApplicationFiled: December 23, 2019Publication date: April 30, 2020Applicant: Alibaba Group Holding LimitedInventors: Jupeng Xia, Caiwei Li, Xi Gu, Bao Jiang
-
Publication number: 20200065479Abstract: Implementations of the present specification disclose a method and an apparatus for detecting model security and an electronic device. The method includes the following: obtaining result data computed by using a model, wherein the result data comprises intermediate result data and output result data; obtaining a discriminator through training by using a generative adversarial network (GAN) framework, the model, and a sample; discriminating the result data by using the discriminator by using the model for current input data, to detect whether the model is currently secure, wherein the model is in a trusted execution environment for obtaining the discriminator through training; and determining a security detection result of the model.Type: ApplicationFiled: October 30, 2019Publication date: February 27, 2020Applicant: Alibaba Group Holding LimitedInventors: Jupeng Xia, Caiwei Li
-
Publication number: 20190259021Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a scan-to-pay method are provided. One of the methods includes: receiving a payment request from an operator of a mobile device; and generating a payment code based on the payment request, wherein the payment code comprises first information and second information, with the first information associated with an payment account, and the second information associated with at least one recent behavioral biometric signature of the operator and at least one historical behavioral biometric signature recorded in the mobile device. This scan-to-pay method provides robust risk control with substantially reduced cost, therefore it provides a more friendly user experience on a scan-to-pay application over its conventional counterparts.Type: ApplicationFiled: May 1, 2019Publication date: August 22, 2019Inventors: Yicheng LU, Shuai CHEN, Tao CHEN, Jupeng XIA, Ning WANG
-
Patent number: 10389710Abstract: Extracting characteristic information includes receiving a collection command from a client, obtaining, via a collection device, biometric information based on the collection command, selecting a stored extraction algorithm corresponding to the client, the stored extraction algorithm being selected from among a plurality of stored extraction algorithms, extracting characteristic values from the obtained biometric information, the characteristic values being extracted based on the selected extraction algorithm, and sending the extracted characteristic values to the client.Type: GrantFiled: February 13, 2015Date of Patent: August 20, 2019Assignee: Alibaba Group Holding LimitedInventors: Xiaoling Li, Junkui Li, Jupeng Xia, Yan Hu
-
Publication number: 20190158528Abstract: This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.Type: ApplicationFiled: January 22, 2019Publication date: May 23, 2019Applicant: Alibaba Group Holding LimitedInventors: Jupeng Xia, Caiwei LI
-
Publication number: 20190156342Abstract: The present application discloses example methods, computer-readable mediums, and systems for controlling service operation risks. In one example, method, an application program on an end-user device monitors a service operation initiated by a user for invoking offline service information. After the service operation is monitored, it is determined whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model. In response to determining that the service operation is a risky operation, a refusal to invoke the offline service information is performed. In response to determining that the service operation is not a risky operation, the offline service information is invoked.Type: ApplicationFiled: January 22, 2019Publication date: May 23, 2019Applicant: Alibaba Group Holding LimitedInventors: Jupeng Xia, Caiwei LI, Xi GU, Bao JIANG
-
Publication number: 20190156343Abstract: The present application discloses techniques for processing service requests based on risk. One example method includes: receiving a service processing request including service data; performing risk identification on the service processing request based on a stored risk identification rule or a stored risk identification model with reference to the service data to generate a risk identification result; determining that the risk identification result is an indefinite result; and in response to determining that the risk identification result is the indefinite result, sending a risk identification request that comprises the service data to a cloud risk identification system, wherein the risk identification request is configured to request the cloud risk identification system to perform risk identification on the service processing request.Type: ApplicationFiled: January 22, 2019Publication date: May 23, 2019Applicant: Alibaba Group Holding LimitedInventors: Xi GU, Caiwei LI, Jupeng Xia
-
Publication number: 20190156228Abstract: A rule operation request associated with a service is received by a terminal. A rule corresponding to the rule operation request is obtained from a rule set associated with the service, where the rule set has been previously obtained from the server based on at least one of a device identifier or a user identifier corresponding to the terminal. A rule tree is generated based on the rule. An operation result of the rule is determined based on the rule tree and service data related to the rule.Type: ApplicationFiled: January 22, 2019Publication date: May 23, 2019Applicant: Alibaba Group Holding LimitedInventors: Jupeng Xia, Xueyao GAO, Shaoqing MA, Bei TIAN, Chongmin HUANG
-
Patent number: 10073916Abstract: Embodiments of the present application disclose a method for providing a terminal identifier to a terminal. During operation, a security server receives a registration information set from the terminal, in which the registration information set includes multiple pieces of equipment information from the terminal. The security server then generates a terminal identifier based on the multiple pieces of equipment information in the registration information set. The security server then returns the terminal identifier to the terminal.Type: GrantFiled: September 13, 2017Date of Patent: September 11, 2018Assignee: Alibaba Group Holding LimitedInventor: Jupeng Xia
-
Publication number: 20180068290Abstract: An authentication factor is received, including an authentication key, an account information of a user, and a dynamic time factor. A bound authentication information is generated by using the authentication factor and a device information of a client device that requested the secure offline payment. The bound authentication information is transmitted to a service server system perform an offline payment authorization based on the bound authentication information. In response to a successful offline payment authorization, a graphical identifier is generated for completing the secure offline payment associated with the authentication factor, where the graphical identifier includes the bound authentication information and a dynamic password generated based on the dynamic time factor.Type: ApplicationFiled: November 7, 2017Publication date: March 8, 2018Applicant: Alibaba Group Holding LimitedInventor: Jupeng Xia
-
Publication number: 20180004852Abstract: Embodiments of the present application disclose a method for providing a terminal identifier to a terminal. During operation, a security server receives a registration information set from the terminal, in which the registration information set includes multiple pieces of equipment information from the terminal. The security server then generates a terminal identifier based on the multiple pieces of equipment information in the registration information set. The security server then returns the terminal identifier to the terminal.Type: ApplicationFiled: September 13, 2017Publication date: January 4, 2018Applicant: Alibaba Group Holding LimitedInventor: Jupeng Xia