Patents by Inventor Lizhong Li

Lizhong Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240103328
    Abstract: A displaying base plate and a manufacturing method thereof, and a displaying device. The displaying base plate includes a substrate, and a first electrode layer disposed on one side of the substrate, wherein the first electrode layer includes a first electrode pattern; a first planarization layer disposed on one side of the first electrode layer that is away from the substrate, wherein the first planarization layer is provided with a through hole, and the through hole penetrates the first planarization layer, to expose the first electrode pattern; and a second electrode layer, a second planarization layer and a third electrode layer that are disposed in stack on one side of the first planarization layer that is away from the substrate, wherein the second electrode layer is disposed closer to the substrate, the second electrode layer is connected to the first electrode pattern and the third electrode layer.
    Type: Application
    Filed: June 29, 2021
    Publication date: March 28, 2024
    Applicant: BOE Technology Group Co., Ltd.
    Inventors: Zhen Zhang, Fuqiang Li, Zhenyu Zhang, Yunping Di, Lizhong Wang, Zheng Fang, Jiahui Han, Yawei Wang, Chenyang Zhang, Chengfu Xu, Ce Ning, Pengxia Liang, Feihu Zhou, Xianqin Meng, Weiting Peng, Qiuli Wang, Binbin Tong, Rui Huang, Tianmin Zhou, Wei Yang
  • Publication number: 20240097042
    Abstract: At least one embodiment of the present disclosure provides an oxide thin film transistor, a display device, and a preparation method of the oxide thin film transistor, and the oxide thin film transistor includes a base substrate; an oxide semiconductor layer provided on the base substrate, and an insulating layer provided on a side of the oxide semiconductor layer away from the base substrate; in which the insulating layer is made of oxide; the insulating layer includes a first insulating layer and a second insulating layer which are stacked; a density of the second insulating layer is greater than a density of the first insulating layer; and the second insulating layer is farther away from the base substrate than the first insulating layer.
    Type: Application
    Filed: June 25, 2021
    Publication date: March 21, 2024
    Applicant: BOE TECHNOLOGY GROUP CO., LTD.
    Inventors: Lizhong WANG, Guangcai YUAN, Ce NING, Nianqi YAO, Hehe HU, Liping LEI, Dongfang WANG, Dapeng XUE, Shuilang DONG, Zhengliang LI
  • Patent number: 11925064
    Abstract: The present disclosure provides a display substrate including: a base substrate, and a thin film transistor, an oxygen supplementing functional layer and an oxygen containing layer formed on the base substrate. The thin film transistor includes: an active layer in direct contact with the oxygen containing layer, and the active layer includes an oxide semiconductor material. The oxygen supplementing functional layer includes a metal oxide material and serves as a first electrode of the display substrate. The oxygen containing layer is between the oxygen supplementing functional layer and the base substrate.
    Type: Grant
    Filed: September 7, 2021
    Date of Patent: March 5, 2024
    Assignees: FUZHOU BOE OPTOELECTRONICS TECHNOLOGY CO., LTD., BOE TECHNOLOGY GROUP CO., LTD.
    Inventors: Dapeng Xue, Guangcai Yuan, Xiaochun Xu, Zheng Liu, Liangliang Li, Shuilang Dong, Lizhong Wang, Niangi Yao
  • Patent number: 11533163
    Abstract: The embodiments of the invention relate to a mining method and device based on a blockchain, and a computer readable storage medium. The method comprises: acquiring behavior data of at least one user within a cycle; determining a value corresponding to each user in the at least one user within the cycle according to the behavior data of the at least one user and a value of a rated quantity within the cycle; and recording an identifier, the behavior data and the value of the at least one user within the cycle in the blockchain, so as to realize more reasonable and more resource-efficient mining.
    Type: Grant
    Filed: January 17, 2018
    Date of Patent: December 20, 2022
    Assignees: CHONGQING JINVOVO NETWORK TECHNOLOGY CO., LTD., LI ZHAN (SHANGHAI) TECHNOLOGY CO., LTD.
    Inventor: Lizhong Li
  • Publication number: 20220132846
    Abstract: This invention provides 1-pyridyl pyrazole amide compounds represented by Formula (I) and preparation and uses thereof, wherein each substituent is defined in the disclosure. The compounds of Formula (I) of this invention possess excellent insecticidal activities, especially very strong activities against pests such as aphids, armyworms and diamondback moths, etc., and can be used to control various pests. This invention also provides synthetic intermediates represented by Formula (II) for preparing compounds of Formula (I) wherein each substituent is defined in the specification.
    Type: Application
    Filed: April 28, 2020
    Publication date: May 5, 2022
    Applicant: HUNAN RESEARCH INSTITUTE OF CHEMICAL INDUSTRY CO., LTD.
    Inventors: Aiping LIU, Yeguo REN, Weidong LIU, Chuyun LONG, Xiaoming OU, Chunge ZHOU, Lizhong LI, Li HU, Xingping LIU, Xuanqing KONG
  • Patent number: 10977648
    Abstract: Techniques for providing a risk control method and device for resolving the issue of low application software security are described. A transaction request is received from a first user, and the transaction request comprises transaction data, data identifying the first user, and data identifying a second user. An attribute of the first user is determined from the data identifying the first user. An attribute of the second user is identified using the data identifying the second user. In response to the attribute of the first user being determined and the attribute of the second user being identified, an attribute similarity between the first user and the second user is determined. The attribute similarity is compared to a threshold. In response to determining the attribute similarity is less than the threshold, a notification is transmitted to the first user requesting a confirmation of the identified attribute of the second user.
    Type: Grant
    Filed: July 27, 2018
    Date of Patent: April 13, 2021
    Assignee: Alibaba Group Holding Limited
    Inventor: Lizhong Li
  • Patent number: 10915903
    Abstract: Techniques for providing a risk control method and device for resolving the issue of low application software security are described. A transaction request is received from a first user, and the transaction request comprises transaction data, data identifying the first user, and data identifying a second user. An attribute of the first user is determined from the data identifying the first user. An attribute of the second user is identified using the data identifying the second user. In response to the attribute of the first user being determined and the attribute of the second user being identified, an attribute similarity between the first user and the second user is determined. The attribute similarity is compared to a threshold. In response to determining the attribute similarity is less than the threshold, a notification is transmitted to the first user requesting a confirmation of the identified attribute of the second user.
    Type: Grant
    Filed: July 27, 2018
    Date of Patent: February 9, 2021
    Assignee: Alibaba Group Holding Limited
    Inventor: Lizhong Li
  • Publication number: 20200366748
    Abstract: The embodiments of the invention relate to a mining method and device based on a blockchain, and a computer readable storage medium. The method comprises: acquiring behavior data of at least one user within a cycle; determining a value corresponding to each user in the at least one user within the cycle according to the behavior data of the at least one user and a value of a rated quantity within the cycle; and recording an identifier, the behavior data and the value of the at least one user within the cycle in the blockchain, so as to realize more reasonable and more resource-efficient mining.
    Type: Application
    Filed: January 17, 2018
    Publication date: November 19, 2020
    Applicants: CHONGQING JINVOVO NETWORK TECHNOLOGY CO., LTD.
    Inventor: Lizhong LI
  • Patent number: 10789592
    Abstract: Techniques for providing a risk control method and device for resolving the issue of low application software security are described. A transaction request is received from a first user, and the transaction request comprises transaction data, data identifying the first user, and data identifying a second user. An attribute of the first user is determined from the data identifying the first user. An attribute of the second user is identified using the data identifying the second user. In response to the attribute of the first user being determined and the attribute of the second user being identified, an attribute similarity between the first user and the second user is determined. The attribute similarity is compared to a threshold. In response to determining the attribute similarity is less than the threshold, a notification is transmitted to the first user requesting a confirmation of the identified attribute of the second user.
    Type: Grant
    Filed: December 18, 2019
    Date of Patent: September 29, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Lizhong Li
  • Patent number: 10748054
    Abstract: A two-dimensional code query method includes receiving a two-dimensional code query request from a first client, the two-dimensional code query request containing a first two-dimensional code, obtaining at least one two-dimensional codes that are bound to the first two-dimensional code, and returning the obtained two-dimensional codes to the first client for the first client to extract information from at least one of the obtained two-dimensional codes with a corresponding application on the first client.
    Type: Grant
    Filed: January 4, 2019
    Date of Patent: August 18, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Lizhong Li, Xuanpeng Zhang
  • Patent number: 10715550
    Abstract: Target application information for validation is received at a network device from user equipment. The received target application information is validated. Risk information associated with the validated target application information is determined. Based on the determined risk information, prompt information is returned to the user equipment.
    Type: Grant
    Filed: May 4, 2018
    Date of Patent: July 14, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Lizhong Li, Yanan Zhang
  • Patent number: 10664289
    Abstract: A first instruction for triggering a starting action on a main application (app) installed on a terminal and including at least one sub-app is received. In response to the first instruction, application loading information corresponding to the main app and including identifier information for a to-be-loaded sub-app is acquired. Based on the identifier information for the to-be-loaded sub-app, the to-be-loaded sub-app is determined and loaded during a process of starting the main app.
    Type: Grant
    Filed: March 20, 2018
    Date of Patent: May 26, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Lizhong Li, Guanghui Zhou
  • Publication number: 20200126083
    Abstract: Techniques for providing a risk control method and device for resolving the issue of low application software security are described. A transaction request is received from a first user, and the transaction request comprises transaction data, data identifying the first user, and data identifying a second user. An attribute of the first user is determined from the data identifying the first user. An attribute of the second user is identified using the data identifying the second user. In response to the attribute of the first user being determined and the attribute of the second user being identified, an attribute similarity between the first user and the second user is determined. The attribute similarity is compared to a threshold. In response to determining the attribute similarity is less than the threshold, a notification is transmitted to the first user requesting a confirmation of the identified attribute of the second user.
    Type: Application
    Filed: December 18, 2019
    Publication date: April 23, 2020
    Applicant: Alibaba Group Holding Limited
    Inventor: Lizhong LI
  • Publication number: 20200065801
    Abstract: A method and device for determining transaction legitimacy based on a blockchain includes determining transaction information of at least one transaction in the blockchain, wherein the transaction information of each transaction in the at least one transaction comprises account information and the number of digital currencies, the digital currencies corresponding to the transaction information that correspond to at least one identifier, and each identifier uniquely identifies a certain number of digital currencies of a one-level statistical unit; determining the number of digital currencies with the same identifier included in different pieces of transaction information corresponding to the same account according to the account information and the at least one identifier; and when the number of digital currencies with the same identifier included in different pieces of transaction information corresponding to the same account exceeds a threshold value, determining that illegal transactions exist in the accoun
    Type: Application
    Filed: March 22, 2018
    Publication date: February 27, 2020
    Applicant: SHANGHAI RUIQIWEI NETWORK TECHNOLOGY CO., LTD.
    Inventor: Lizhong LI
  • Patent number: 10387680
    Abstract: Embodiments of the present application relate to a method, apparatus, and system for managing confidential information. The method includes accessing stored target information comprising a public part and a confidential part, wherein an identifier corresponds to the confidential part of the target information, outputting the public part of the target information and the corresponding identifier, wherein the public part of the target information comprises at least first address information, receiving location information and a to-be-recognized identifier, wherein the location information is associated with a current location of a mobile terminal, determining whether the location information is consistent with the first address information, and in the event that the location information is consistent with the first address information, sending the confidential part of the target information associated with the to-be-recognized identifier to the mobile terminal.
    Type: Grant
    Filed: January 17, 2018
    Date of Patent: August 20, 2019
    Assignee: Alibaba Group Holding Limited
    Inventor: Lizhong Li
  • Patent number: 10375048
    Abstract: A user identity verification method is disclosed. The method includes receiving an identity verification request sent by a user through a client terminal; determining a user communication number according to the identity verification request and generating a corresponding temporary communication number for the user communication number; recording the user communication number and the temporary communication number as first data; returning the temporary communication number to the client terminal; receiving a call request initiated by the user to the temporary communication number; determining a respective user communication number and a respective temporary communication number corresponding to the call request as second data; verifying whether the first data matches with the second data; and returning a verification result to the client terminal. The method can improve security and reliability of identity verification, reduce a user's waiting time, and enhance user experience.
    Type: Grant
    Filed: July 27, 2016
    Date of Patent: August 6, 2019
    Assignee: Alibaba Group Holding Limited
    Inventors: Xiaofeng Wang, Hui Dong, Yang Yu, Daocheng Xie, Weiqin Wan, Lizhong Li
  • Publication number: 20190138877
    Abstract: A two-dimensional code query method includes receiving a two-dimensional code query request from a first client, the two-dimensional code query request containing a first two-dimensional code, obtaining at least one two-dimensional codes that are bound to the first two-dimensional code, and returning the obtained two-dimensional codes to the first client for the first client to extract information from at least one of the obtained two-dimensional codes with a corresponding application on the first client.
    Type: Application
    Filed: January 4, 2019
    Publication date: May 9, 2019
    Inventors: LIZHONG LI, XUANPENG ZHANG
  • Publication number: 20180349905
    Abstract: Techniques for providing a risk control method and device for resolving the issue of low application software security are described. A transaction request is received from a first user, and the transaction request comprises transaction data, data identifying the first user, and data identifying a second user. An attribute of the first user is determined from the data identifying the first user. An attribute of the second user is identified using the data identifying the second user. In response to the attribute of the first user being determined and the attribute of the second user being identified, an attribute similarity between the first user and the second user is determined. The attribute similarity is compared to a threshold. In response to determining the attribute similarity is less than the threshold, a notification is transmitted to the first user requesting a confirmation of the identified attribute of the second user.
    Type: Application
    Filed: July 27, 2018
    Publication date: December 6, 2018
    Applicant: Alibaba Group Holding Limited
    Inventor: Lizhong LI
  • Publication number: 20180255097
    Abstract: Target application information for validation is received at a network device from user equipment. The received target application information is validated. Risk information associated with the validated target application information is determined. Based on the determined risk information, prompt information is returned to the user equipment.
    Type: Application
    Filed: May 4, 2018
    Publication date: September 6, 2018
    Applicant: Alibaba Group Holding Limited
    Inventors: Lizhong LI, Yanan ZHANG
  • Publication number: 20180217853
    Abstract: A first instruction for triggering a starting action on a main application (app) installed on a terminal and including at least one sub-app is received. In response to the first instruction, application loading information corresponding to the main app and including identifier information for a to-be-loaded sub-app is acquired. Based on the identifier information for the to-be-loaded sub-app, the to-be-loaded sub-app is determined and loaded during a process of starting the main app.
    Type: Application
    Filed: March 20, 2018
    Publication date: August 2, 2018
    Applicant: Alibaba Group Holding Limited
    Inventors: Lizhong Li, Guanghui Zhou