Patents by Inventor Lizhong Li
Lizhong Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240103328Abstract: A displaying base plate and a manufacturing method thereof, and a displaying device. The displaying base plate includes a substrate, and a first electrode layer disposed on one side of the substrate, wherein the first electrode layer includes a first electrode pattern; a first planarization layer disposed on one side of the first electrode layer that is away from the substrate, wherein the first planarization layer is provided with a through hole, and the through hole penetrates the first planarization layer, to expose the first electrode pattern; and a second electrode layer, a second planarization layer and a third electrode layer that are disposed in stack on one side of the first planarization layer that is away from the substrate, wherein the second electrode layer is disposed closer to the substrate, the second electrode layer is connected to the first electrode pattern and the third electrode layer.Type: ApplicationFiled: June 29, 2021Publication date: March 28, 2024Applicant: BOE Technology Group Co., Ltd.Inventors: Zhen Zhang, Fuqiang Li, Zhenyu Zhang, Yunping Di, Lizhong Wang, Zheng Fang, Jiahui Han, Yawei Wang, Chenyang Zhang, Chengfu Xu, Ce Ning, Pengxia Liang, Feihu Zhou, Xianqin Meng, Weiting Peng, Qiuli Wang, Binbin Tong, Rui Huang, Tianmin Zhou, Wei Yang
-
Publication number: 20240097042Abstract: At least one embodiment of the present disclosure provides an oxide thin film transistor, a display device, and a preparation method of the oxide thin film transistor, and the oxide thin film transistor includes a base substrate; an oxide semiconductor layer provided on the base substrate, and an insulating layer provided on a side of the oxide semiconductor layer away from the base substrate; in which the insulating layer is made of oxide; the insulating layer includes a first insulating layer and a second insulating layer which are stacked; a density of the second insulating layer is greater than a density of the first insulating layer; and the second insulating layer is farther away from the base substrate than the first insulating layer.Type: ApplicationFiled: June 25, 2021Publication date: March 21, 2024Applicant: BOE TECHNOLOGY GROUP CO., LTD.Inventors: Lizhong WANG, Guangcai YUAN, Ce NING, Nianqi YAO, Hehe HU, Liping LEI, Dongfang WANG, Dapeng XUE, Shuilang DONG, Zhengliang LI
-
Patent number: 11925064Abstract: The present disclosure provides a display substrate including: a base substrate, and a thin film transistor, an oxygen supplementing functional layer and an oxygen containing layer formed on the base substrate. The thin film transistor includes: an active layer in direct contact with the oxygen containing layer, and the active layer includes an oxide semiconductor material. The oxygen supplementing functional layer includes a metal oxide material and serves as a first electrode of the display substrate. The oxygen containing layer is between the oxygen supplementing functional layer and the base substrate.Type: GrantFiled: September 7, 2021Date of Patent: March 5, 2024Assignees: FUZHOU BOE OPTOELECTRONICS TECHNOLOGY CO., LTD., BOE TECHNOLOGY GROUP CO., LTD.Inventors: Dapeng Xue, Guangcai Yuan, Xiaochun Xu, Zheng Liu, Liangliang Li, Shuilang Dong, Lizhong Wang, Niangi Yao
-
Patent number: 11533163Abstract: The embodiments of the invention relate to a mining method and device based on a blockchain, and a computer readable storage medium. The method comprises: acquiring behavior data of at least one user within a cycle; determining a value corresponding to each user in the at least one user within the cycle according to the behavior data of the at least one user and a value of a rated quantity within the cycle; and recording an identifier, the behavior data and the value of the at least one user within the cycle in the blockchain, so as to realize more reasonable and more resource-efficient mining.Type: GrantFiled: January 17, 2018Date of Patent: December 20, 2022Assignees: CHONGQING JINVOVO NETWORK TECHNOLOGY CO., LTD., LI ZHAN (SHANGHAI) TECHNOLOGY CO., LTD.Inventor: Lizhong Li
-
Publication number: 20220132846Abstract: This invention provides 1-pyridyl pyrazole amide compounds represented by Formula (I) and preparation and uses thereof, wherein each substituent is defined in the disclosure. The compounds of Formula (I) of this invention possess excellent insecticidal activities, especially very strong activities against pests such as aphids, armyworms and diamondback moths, etc., and can be used to control various pests. This invention also provides synthetic intermediates represented by Formula (II) for preparing compounds of Formula (I) wherein each substituent is defined in the specification.Type: ApplicationFiled: April 28, 2020Publication date: May 5, 2022Applicant: HUNAN RESEARCH INSTITUTE OF CHEMICAL INDUSTRY CO., LTD.Inventors: Aiping LIU, Yeguo REN, Weidong LIU, Chuyun LONG, Xiaoming OU, Chunge ZHOU, Lizhong LI, Li HU, Xingping LIU, Xuanqing KONG
-
Patent number: 10977648Abstract: Techniques for providing a risk control method and device for resolving the issue of low application software security are described. A transaction request is received from a first user, and the transaction request comprises transaction data, data identifying the first user, and data identifying a second user. An attribute of the first user is determined from the data identifying the first user. An attribute of the second user is identified using the data identifying the second user. In response to the attribute of the first user being determined and the attribute of the second user being identified, an attribute similarity between the first user and the second user is determined. The attribute similarity is compared to a threshold. In response to determining the attribute similarity is less than the threshold, a notification is transmitted to the first user requesting a confirmation of the identified attribute of the second user.Type: GrantFiled: July 27, 2018Date of Patent: April 13, 2021Assignee: Alibaba Group Holding LimitedInventor: Lizhong Li
-
Patent number: 10915903Abstract: Techniques for providing a risk control method and device for resolving the issue of low application software security are described. A transaction request is received from a first user, and the transaction request comprises transaction data, data identifying the first user, and data identifying a second user. An attribute of the first user is determined from the data identifying the first user. An attribute of the second user is identified using the data identifying the second user. In response to the attribute of the first user being determined and the attribute of the second user being identified, an attribute similarity between the first user and the second user is determined. The attribute similarity is compared to a threshold. In response to determining the attribute similarity is less than the threshold, a notification is transmitted to the first user requesting a confirmation of the identified attribute of the second user.Type: GrantFiled: July 27, 2018Date of Patent: February 9, 2021Assignee: Alibaba Group Holding LimitedInventor: Lizhong Li
-
Publication number: 20200366748Abstract: The embodiments of the invention relate to a mining method and device based on a blockchain, and a computer readable storage medium. The method comprises: acquiring behavior data of at least one user within a cycle; determining a value corresponding to each user in the at least one user within the cycle according to the behavior data of the at least one user and a value of a rated quantity within the cycle; and recording an identifier, the behavior data and the value of the at least one user within the cycle in the blockchain, so as to realize more reasonable and more resource-efficient mining.Type: ApplicationFiled: January 17, 2018Publication date: November 19, 2020Applicants: CHONGQING JINVOVO NETWORK TECHNOLOGY CO., LTD.Inventor: Lizhong LI
-
Patent number: 10789592Abstract: Techniques for providing a risk control method and device for resolving the issue of low application software security are described. A transaction request is received from a first user, and the transaction request comprises transaction data, data identifying the first user, and data identifying a second user. An attribute of the first user is determined from the data identifying the first user. An attribute of the second user is identified using the data identifying the second user. In response to the attribute of the first user being determined and the attribute of the second user being identified, an attribute similarity between the first user and the second user is determined. The attribute similarity is compared to a threshold. In response to determining the attribute similarity is less than the threshold, a notification is transmitted to the first user requesting a confirmation of the identified attribute of the second user.Type: GrantFiled: December 18, 2019Date of Patent: September 29, 2020Assignee: Alibaba Group Holding LimitedInventor: Lizhong Li
-
Patent number: 10748054Abstract: A two-dimensional code query method includes receiving a two-dimensional code query request from a first client, the two-dimensional code query request containing a first two-dimensional code, obtaining at least one two-dimensional codes that are bound to the first two-dimensional code, and returning the obtained two-dimensional codes to the first client for the first client to extract information from at least one of the obtained two-dimensional codes with a corresponding application on the first client.Type: GrantFiled: January 4, 2019Date of Patent: August 18, 2020Assignee: Alibaba Group Holding LimitedInventors: Lizhong Li, Xuanpeng Zhang
-
Patent number: 10715550Abstract: Target application information for validation is received at a network device from user equipment. The received target application information is validated. Risk information associated with the validated target application information is determined. Based on the determined risk information, prompt information is returned to the user equipment.Type: GrantFiled: May 4, 2018Date of Patent: July 14, 2020Assignee: Alibaba Group Holding LimitedInventors: Lizhong Li, Yanan Zhang
-
Patent number: 10664289Abstract: A first instruction for triggering a starting action on a main application (app) installed on a terminal and including at least one sub-app is received. In response to the first instruction, application loading information corresponding to the main app and including identifier information for a to-be-loaded sub-app is acquired. Based on the identifier information for the to-be-loaded sub-app, the to-be-loaded sub-app is determined and loaded during a process of starting the main app.Type: GrantFiled: March 20, 2018Date of Patent: May 26, 2020Assignee: Alibaba Group Holding LimitedInventors: Lizhong Li, Guanghui Zhou
-
Publication number: 20200126083Abstract: Techniques for providing a risk control method and device for resolving the issue of low application software security are described. A transaction request is received from a first user, and the transaction request comprises transaction data, data identifying the first user, and data identifying a second user. An attribute of the first user is determined from the data identifying the first user. An attribute of the second user is identified using the data identifying the second user. In response to the attribute of the first user being determined and the attribute of the second user being identified, an attribute similarity between the first user and the second user is determined. The attribute similarity is compared to a threshold. In response to determining the attribute similarity is less than the threshold, a notification is transmitted to the first user requesting a confirmation of the identified attribute of the second user.Type: ApplicationFiled: December 18, 2019Publication date: April 23, 2020Applicant: Alibaba Group Holding LimitedInventor: Lizhong LI
-
Publication number: 20200065801Abstract: A method and device for determining transaction legitimacy based on a blockchain includes determining transaction information of at least one transaction in the blockchain, wherein the transaction information of each transaction in the at least one transaction comprises account information and the number of digital currencies, the digital currencies corresponding to the transaction information that correspond to at least one identifier, and each identifier uniquely identifies a certain number of digital currencies of a one-level statistical unit; determining the number of digital currencies with the same identifier included in different pieces of transaction information corresponding to the same account according to the account information and the at least one identifier; and when the number of digital currencies with the same identifier included in different pieces of transaction information corresponding to the same account exceeds a threshold value, determining that illegal transactions exist in the accounType: ApplicationFiled: March 22, 2018Publication date: February 27, 2020Applicant: SHANGHAI RUIQIWEI NETWORK TECHNOLOGY CO., LTD.Inventor: Lizhong LI
-
Patent number: 10387680Abstract: Embodiments of the present application relate to a method, apparatus, and system for managing confidential information. The method includes accessing stored target information comprising a public part and a confidential part, wherein an identifier corresponds to the confidential part of the target information, outputting the public part of the target information and the corresponding identifier, wherein the public part of the target information comprises at least first address information, receiving location information and a to-be-recognized identifier, wherein the location information is associated with a current location of a mobile terminal, determining whether the location information is consistent with the first address information, and in the event that the location information is consistent with the first address information, sending the confidential part of the target information associated with the to-be-recognized identifier to the mobile terminal.Type: GrantFiled: January 17, 2018Date of Patent: August 20, 2019Assignee: Alibaba Group Holding LimitedInventor: Lizhong Li
-
Patent number: 10375048Abstract: A user identity verification method is disclosed. The method includes receiving an identity verification request sent by a user through a client terminal; determining a user communication number according to the identity verification request and generating a corresponding temporary communication number for the user communication number; recording the user communication number and the temporary communication number as first data; returning the temporary communication number to the client terminal; receiving a call request initiated by the user to the temporary communication number; determining a respective user communication number and a respective temporary communication number corresponding to the call request as second data; verifying whether the first data matches with the second data; and returning a verification result to the client terminal. The method can improve security and reliability of identity verification, reduce a user's waiting time, and enhance user experience.Type: GrantFiled: July 27, 2016Date of Patent: August 6, 2019Assignee: Alibaba Group Holding LimitedInventors: Xiaofeng Wang, Hui Dong, Yang Yu, Daocheng Xie, Weiqin Wan, Lizhong Li
-
Publication number: 20190138877Abstract: A two-dimensional code query method includes receiving a two-dimensional code query request from a first client, the two-dimensional code query request containing a first two-dimensional code, obtaining at least one two-dimensional codes that are bound to the first two-dimensional code, and returning the obtained two-dimensional codes to the first client for the first client to extract information from at least one of the obtained two-dimensional codes with a corresponding application on the first client.Type: ApplicationFiled: January 4, 2019Publication date: May 9, 2019Inventors: LIZHONG LI, XUANPENG ZHANG
-
Publication number: 20180349905Abstract: Techniques for providing a risk control method and device for resolving the issue of low application software security are described. A transaction request is received from a first user, and the transaction request comprises transaction data, data identifying the first user, and data identifying a second user. An attribute of the first user is determined from the data identifying the first user. An attribute of the second user is identified using the data identifying the second user. In response to the attribute of the first user being determined and the attribute of the second user being identified, an attribute similarity between the first user and the second user is determined. The attribute similarity is compared to a threshold. In response to determining the attribute similarity is less than the threshold, a notification is transmitted to the first user requesting a confirmation of the identified attribute of the second user.Type: ApplicationFiled: July 27, 2018Publication date: December 6, 2018Applicant: Alibaba Group Holding LimitedInventor: Lizhong LI
-
Publication number: 20180255097Abstract: Target application information for validation is received at a network device from user equipment. The received target application information is validated. Risk information associated with the validated target application information is determined. Based on the determined risk information, prompt information is returned to the user equipment.Type: ApplicationFiled: May 4, 2018Publication date: September 6, 2018Applicant: Alibaba Group Holding LimitedInventors: Lizhong LI, Yanan ZHANG
-
Publication number: 20180217853Abstract: A first instruction for triggering a starting action on a main application (app) installed on a terminal and including at least one sub-app is received. In response to the first instruction, application loading information corresponding to the main app and including identifier information for a to-be-loaded sub-app is acquired. Based on the identifier information for the to-be-loaded sub-app, the to-be-loaded sub-app is determined and loaded during a process of starting the main app.Type: ApplicationFiled: March 20, 2018Publication date: August 2, 2018Applicant: Alibaba Group Holding LimitedInventors: Lizhong Li, Guanghui Zhou