Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Zhou, Fan
Abrégé
The present specification provides a blockchain-based data verification system and method, a computing device, and a storage medium. The blockchain-based data verification system includes: a first verification system, a second verification system, and a first blockchain node and a second blockchain node on a blockchain network; the first verification system is configured to: collect first service data based on a predetermined condition and generate a first verification file including the first service data, and send a verification request to the second verification system; the second verification system is configured to: receive the verification request, verify the first service data with second service data in a local database of the second verification system, generate and send a verification result notification to the first verification system, and send successfully verified second service data in the local database to the first blockchain node on the blockchain network; wherein the first verification system is further configured to: receive the verification result notification, and send successfully verified first service data to the second blockchain node on the blockchain network.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
2.
DATA INTERACTION METHOD AND DEVICE, AND OFFLINE CREDIT PAYMENT METHOD AND DEVICE
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Xiu, Chao
Wang, Lei
Liu, Yingde
Abrégé
Implementations of the present application provide data interaction methods and devices. In one example implementation, authorization data for a current interaction are received from a remote server, wherein the authorization data comprises signature information, time information of current authorization, a random number of the current authorization, and a threshold. The authorization data are verified by performing at least one of: comparing the time information comprised in the authorization data with a current time; determining whether the random number comprises in the authorization data exists in a previous data interaction; or determining whether the data of the current interaction exceeds the threshold comprised in the authorization data. Whether to cancel the current interaction is determined based on the verification of the authorization data.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
3.
SYSTEM AND METHOD FOR FACILITATING ENHANCED OFFLINE PAYMENT
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Zhai, Fen
Gu, Chunlei
Zhang, Yi
Wang, Xiao
Wang, Yingyuan
Abrégé
Embodiments described herein provide a client system for facilitating enhanced offline payment. During operation, the system obtains a location indicator, which indicates the location of a service, from a charging system. The system then generates an offline code that allows access to the service and corresponds to the location indicator. The offline code can be readable by the charging system, and the client system and the charging system can both be offline. Subsequently, the system encodes the historical data associated with the service in a field of the offline code and sends a message comprising the offline code to the charging system.
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Fang, Fang
Li, Han
Abrégé
A method for implementing visualization of public welfare activities includes: displaying to a target user a map of a geographic region for carrying out a public welfare activity in response to the target user's selection, wherein the map comprises a first geographic location associated with a first icon indicating that the public welfare activity has been carried out at the first geographic location and a second geographic location associated with a second icon indicating that the public welfare activity is able to be carried out at the second geographic location; when a relationship exists between the target user and a public welfare activity participant user that has carried out the public welfare activity on the map, displaying on the map user information of the public welfare activity participant user; updating the second icon to be a first icon in response to the target user's selection on the second icon.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Jin, Huajing
Xu, Di
Li, Zhenhua
Bai, Xue
Abrégé
Behavior data associated with a user is obtained. The behavior data is generated when the user uses an Internet service and includes a user identification and identification information indicating the Internet service. At least one predefined carbon-saving quantity quantization algorithm is determined based on the identification information related to the Internet service. A carbon-saving quantity associated with the user is calculated based on the obtained behavior data and the determined at least one predefined carbon-saving quantity quantization algorithm. Based on the calculated carbon-saving quantity associated with the user and the user identification, user data is processed. The user data is related to the carbon-saving quantity associated with the user.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Tang, Yili
Yang, Zimo
Fang, Yuan
Abrégé
Multiple geographic grids are generated according to acquired location information of a service provider. Each geographic grid contains one or more service providers. The second region matching the target location information is a geographic grid for a region defined by the target location information. A presentation request for a search page is received. The presentation request includes target location information. A keyword is acquired that has a search popularity meeting a first condition in a first region matching the target location information, and the acquired keyword is used as a first keyword. The first keyword is provided for presentation in the search page.
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G06F 7/00 - Procédés ou dispositions pour le traitement de données en agissant sur l'ordre ou le contenu des données maniées
G06F 16/9537 - Recherche à dépendance spatiale ou temporelle, p.ex. requêtes spatio-temporelles
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Li, Jing
Feng, Chunpei
Yang, Wenbo
Huang, Mian
Abrégé
Implementations of the present specification disclose mobile payment methods, apparatuses, and devices. In one aspect, the method includes: monitoring, by a terminal device that is in lock screen mode, outputs of one or more sensors of the terminal device; determining that the outputs of the one or more sensors satisfy first specified criteria indicative of one or more particular body movements; in response to determining that the outputs of the one or more sensors satisfy the first specified criteria, displaying, on the terminal device, a payment processing interface; receiving an input through the payment processing interface; and executing a payment service based on the input.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/42 - Confirmation, p.ex. contrôle ou autorisation de paiement par le débiteur légal
H04W 4/02 - Services utilisant des informations de localisation
H04M 1/72454 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens permettant d’adapter la fonctionnalité du dispositif dans des circonstances spécifiques en tenant compte des contraintes imposées par le contexte ou par l’environnement
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Shen, Lingnan
Chen, Ge
Liu, Yanghui
Jin, Huifeng
Abrégé
This specification techniques for sharing service and identity information between devices. One example method include acquiring, by a first device, a digital object identifier (DOI) of a second device, the DOI including identity information associated with the second device; generating, by the first device, a service DOI based on the identity information from the DOI of the second device, the service DOI including the identity information of the second device and service information; and displaying, by the first device, the service DOI on a display of the first device, wherein the displayed service DOI is configured to cause the second device to perform service processing when the displayed service DOI is acquired by the second device, and wherein the service processing is based at least in part on the identity information and the service information included in the service DOI.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06K 17/00 - Méthodes ou dispositions pour faire travailler en coopération des équipements couverts par plusieurs des groupes principaux , p.ex. fichiers automatiques de cartes incluant les opérations de transport et de lecture
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Wu, Chao
Abrégé
Techniques for providing a service execution method and device are described. A request is received from a browser of a client device. A web page is determined from the received request. The web page is transmitted to the client device to wake up a designated application of the client device. A service execution request is received from the designated application of the client device. The received service execution request is determined to correspond to the received request. In response to determining that the received service execution request corresponds to the received request, a service is executed based on the received service execution request.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
G06F 16/958 - Organisation ou gestion de contenu de sites Web, p.ex. publication, conservation de pages ou liens automatiques
G06F 16/957 - Optimisation de la navigation, p.ex. mise en cache ou distillation de contenus
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
H04L 67/02 - Protocoles basés sur la technologie du Web, p.ex. protocole de transfert hypertexte [HTTP]
10.
TWO-DIMENSIONAL CODE IDENTIFICATION METHOD AND DEVICE, AND MOBILE TERMINAL
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Tong, Jun
Abrégé
This application discloses a two-dimensional code identification method, device and a mobile terminal. The two-dimensional code identification method comprises: sensing a capture operation performed by a user on an application interface, the application interface containing a two-dimensional code; in response to the sensed capture operation, capturing an image of the application interface; scanning the image to obtain two-dimensional code information of the two-dimensional code contained in the image.
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p.ex. lecture de la lumière blanche réfléchie
11.
Service control and user identity authentication based on virtual reality
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Wu, Jun
Yin, Huanmi
Lin, Feng
Abrégé
In an implementation, one or more user interactions from a virtual reality (VR) device user for initiating a service in a VR scenario of a VR application are detected. One or more eye physiological characteristics of the VR device user are obtained for user identity authentication. The obtained one or more eye physiological characteristics are compared with one or more pre-stored eye physiological characteristics samples. The VR device user is authenticated if the one or more eye physiological characteristics match at least a portion of the one or more pre-stored eye physiological characteristics samples, and a server that provides and performs the service is communicated with.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Zhong, Haojie
Zhao, Xiangyu
Zhang, Shuli
Abrégé
A service request is received by a terminal device. First biometric authentication information of a user associated with the service request is collected. The first biometric authentication information is compated with preset biometric authentication information. When the comparison shows that the first biometric authentication information and the preset biometric authentication information are consistent, a pre-stored digital signature certificate private key is read. The service request is digitally signed according to the digital signature certificate private key. A biometric information verification message is generated and sent message to a server. The server is configured to read a pre-stored digital signature certificate public key corresponding to the digital signature certificate private key. Authentication result information is receiving from the server after the server verifies and signs the biometric information verification message according to the digital signature certificate public key.
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Hua, Jie
Abrégé
Systems and methods are provided for facilitating account login, wherein the method is implemented by a first server that is associated with a first account. In some embodiments, the method comprises receiving, from a terminal device, a request to log into a second account associated with a second server, wherein the request includes a first identifier associated with the first account and a second identifier associated with the second server. The method further comprises generating account information to be transmitted to the second server based on the first identifier; and transmitting the account information to the second server based on the second identifier; wherein the transmission of the account information enables the second account to be automatically logged into at the second server.
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Yang, Zhirong
Dai, Xin
Ma, Hai
Mei, Fangcheng
Liu, Mei
Wan, Qian
Liu, Qiaoyong
Dong, Hualiang
Wang, Zhixu
Ding, Weiwei
Abrégé
A resource processing method and apparatus. The method is achieved by a computer configured to execute the following steps: generating a resource allocation chart based on a resource allocation request; processing the resource allocation chart and generating an access entrance of the resource allocation chart; opening the access entrance to enable at least one third party resource supplier to respond to the resource allocation request via the access entrance. The method further comprises: when the resources are not available or not suitable for allocation, receiving a resource allocation chart, wherein the resource allocation chart is based on the resource allocation request; generating an access entrance of the resource allocation chart; opening the access entrance to at least one third party resource supplier; and receiving the allocated resources from the at least one third party resource supplier by responding to the resource allocation request through the access entrance.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Wu, Hao
Abrégé
The present disclosure relates to blockchain-based data processing methods and devices to achieve balance between a service need and system resource consumption. In one example method, an amount of service data processed by consensus in a blockchain in a specified time period is monitored. A determination is made as to whether the monitored amount of processed service data in the specified time period is less than a specified first threshold or more than a specified second threshold. In response to determining that the monitored amount of processed service data in the specified time period is less than the specified first threshold or more than the specified second threshold, a block generation time for the blockchain is dynamically adjusted. A new block in the blockchain is then dynamically adjusted based on the adjusted block generation time.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Chen, Xing
Wang, Lei
Lan, Jie
Abrégé
Technologies related to mobile credit payment are disclosed. In an implementation, a first SNEP Get Request Message is generated and sent to a mobile computing device, in response to a NFC signal received from the mobile computing device. A first SNEP Response Message is received from the mobile computing device and parsed to identify an APP public key license. A pre-stored credit authorization public key is used to verify the APP public key license and an APP public key is retrieved from the APP public key license if the verification is successful. A second SNEP Get Request Message is sent to the mobile computing device and a second SNEP Response Message is received from the mobile computing device. The APP public key is then used to decrypt the second SNEP Response Message, and a transaction log is recorded if the second SNEP Response Message is successfully decrypted.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/24 - Schémas de crédit, c. à d. de "paiement différé"
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
23.
Method and apparatus for generating blockchain transaction
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Zhu, Xiaofeng
Abrégé
One or more implementations of the present specification provide a data processing method and apparatus for a blockchain member node, where the blockchain member node includes a plurality of service servers, and at least one authentication module runs on each service server; and a public key of an authentication module of the at least one authentication module is authenticated by the blockchain. The method includes: obtaining, by a downstream service server of the plurality of service servers, a first service processing result and a first digital signature that are generated by an upstream service server of the plurality of service servers; verifying the first digital signature based on a public key of an authentication module running on the upstream service server; performing service processing based on the first service processing result after the verification succeeds, thereby generating a second service processing result; and generating a second digital signature by performing digital signing based on at least the second service processing result using an authentication module running on the downstream service server.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
24.
Narrow-strip 2-dimensional bar codes, methods, apparatuses, and devices for generating and identifying narrow-strip 2-dimensional bar codes
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Tu, Yinhai
Abrégé
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying a narrow-strip two-dimensional bar code. One of the methods includes obtaining an image of the narrow-strip two-dimensional bar code. A first positioning graph and a second positioning graph are detected in the image. A target region is determined from the image based on center positions of the first positioning graph and the second positioning graph, where the target region includes a rectangular region corresponding to the narrow-strip two-dimensional bar code. A data region is determined from the target region, and two-dimensional bar code data is determined from the data region.
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p.ex. lecture de la lumière blanche réfléchie
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p.ex. forme, nature, code
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Jin, Huajing
Xu, Di
Li, Zhenhua
Bai, Xue
Abrégé
Behavior data associated with a user is obtained. The behavior data is generated when the user uses an Internet service and includes a user identification and identification information indicating the Internet service. At least one predefined carbon-saving quantity quantization algorithm is determined based on the identification information related to the Internet service. A carbon-saving quantity associated with the user is calculated based on the obtained behavior data and the determined at least one predefined carbon-saving quantity quantization algorithm. Based on the calculated carbon-saving quantity associated with the user and the user identification, user data is processed. The user data is related to the carbon-saving quantity associated with the user.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Chen, Xing
Wang, Lei
Lan, Jie
Abrégé
Technologies related to mobile credit payment are disclosed. In an implementation, a first SNEP Get Request Message is generated and sent to a mobile computing device, in response to a NFC signal received from the mobile computing device. A first SNEP Response Message is received from the mobile computing device and parsed to identify an APP public key license. A pre-stored credit authorization public key is used to verify the APP public key license and an APP public key is retrieved from the APP public key license if the verification is successful. A second SNEP Get Request Message is sent to the mobile computing device and a second SNEP Response Message is received from the mobile computing device. The APP public key is then used to decrypt the second SNEP Response Message, and a transaction log is recorded if the second SNEP Response Message is successfully decrypted.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/24 - Schémas de crédit, c. à d. de "paiement différé"
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
27.
USER IDENTITY AUTHENTICATION USING VIRTUAL REALITY
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Wu, Jun
Zeng, Xiaodong
Yin, Huanmi
Lin, Feng
Abrégé
A method for user identity authentication using virtual reality includes presenting one or more virtual elements on a virtual reality (VR) scenario of a VR application for initiating a service, identifying, using one or more sensors communicably coupled to the VR device, one or more interactive operations of a user of the VR device with the one or more virtual elements, determining whether the one or more interactive operations match one or more predetermined operations for selecting the one or more virtual elements to initiate the service and trigger biometric authentication for user identity authentication, invoking biometric authentication if the one or more interactive operations match one or more predetermined operations, presenting a virtual guidance in the VR scenario for guiding the user to perform the biometric authentication, and presenting a service interface to the user if the biometric authentication is successful.
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Guo, Chunxiao
Zhang, He
Abrégé
A method for allocating virtual articles comprises: receiving at least two acquisition requests directed at a virtual article packet, and respectively recording receiving times of the acquisition requests, wherein the virtual article packet comprises one or more virtual article sub-packets; allocating acquisition sequence numbers respectively to the acquisition requests according to a sequential order of the receiving times of the acquisition requests; and allocating the virtual article sub-packets according to the acquisition sequence numbers for the acquisition requests corresponding to the acquisition sequence numbers, and sending virtual articles in the virtual article sub-packets to users corresponding to the acquisition requests.
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 30/0207 - Remises ou incitations, p.ex. coupons ou rabais
G06Q 30/0235 - Remises ou incitations, p.ex. coupons ou rabais limitées dans le temps ou par une date d’expiration
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
29.
PAYMENT COLLECTION DEVICE AND METHOD AND APPARATUS
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Zhao, Liansheng
Li, An
Jiao, Lei
Abrégé
Systems, methods, and storage media for payment collection are disclosed. An example method comprises: obtaining, at a code scanner, payment account information comprised in a payment code of a purchasing user by scanning the payment code; sending, at the code scanner, the payment account information to a processor; determining, at the processor, a payment amount due, to construct a payment request comprising the payment amount due, the payment account information, and the device identifier; sending, at the processor, the payment request to a communication module; and sending, at the communication module, the payment request to the target server for the target server to, according to the payment request, deduct the payment amount due from a payment account of the purchasing user corresponding to the payment account information, and add the payment amount due to the payment receiving account corresponding to the device identifier.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Qiu, Honglin
Abrégé
One or more embodiments of the present specification provides cross-blockchain interaction systems. One system includes: one or more anchor devices, wherein at least one of the one or more anchor devices comprises a first client terminal associated with a first blockchain network, and wherein the first client terminal is configured to monitor cross-blockchain requests sent from the first blockchain network; and one or more relay devices, wherein at least one of the one or more relay devices comprises a second client terminal associated with a second blockchain network that monitors cross-blockchain requests intended for the second blockchain network.
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Yuan, Leiming
Abrégé
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for allocating resources are provided. One of the methods includes receiving a first request from a first client for accessing a server, wherein the first request includes token information corresponding to resource information of a second client; determining, according to the token information included in the first request, the resource information of the second client corresponding to the token information; receiving resource allocation information from the first client; and allocating resource according to the resource allocation information from the first client and the resource information of the second client.
G06Q 40/00 - Finance; Assurance; Stratégies fiscales; Traitement des impôts sur les sociétés ou sur le revenu
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p.ex. forme, nature, code
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
32.
Method and apparatus for establishing trusted computing cluster
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Huang, Qunshan
Chen, Xingyu
Xie, Ling
Wang, Lei
Abrégé
The implementations provide a method and an apparatus for establishing a trusted cluster. The method is used to form a trusted computing cluster by using N trusted computing units, the method including: grouping the N trusted computing units into a plurality of groups; identifying a first trusted computing unit in each group, and causing first trusted computing units in the plurality of groups to each respectively perform inter-unit trust authentication with other trusted computing units in a same group in parallel; performing inter-group trust authentication between/among the plurality of groups in parallel to obtain the N trusted computing units on which trust authentication succeeds; and propagating secret information in the N trusted computing units on which trust authentication succeeds, so that the N trusted computing units obtain the same secret information to form the trusted computing cluster.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Ding, Liangzi
He, Xiaoguang
Abrégé
A system detects that a target service program is being executed by a computing device. The target service program is one of a plurality of pre-defined service programs to be suspended to complete an identity verification of a user using the target service program. Execution of the target service program is suspended on the computing device. An identity verification program is executed on the computing device. The identity verification program is configured to perform the identity verification of the user to obtain an identity verification result indicating whether an identity of the user is verified. The identity verification program is independent from the target service program.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Li, Zhiguo
Abrégé
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media. One method includes: at a blockchain-based application, receiving a request for resolving a dispute between at least a first party and a second party. A time that the request is received on the blockchain is recorded. One or more potential dispute resolutions is received from one or more dispute resolution providers that are registered on the blockchain-based application. A first selection is received from the first party and a second selection from the second party. At least one of (i) at least one common potential dispute resolution between the first set of the one or more potential dispute resolutions and the second set of the one or more potential dispute resolutions, or (ii) that none of the potential dispute resolutions are acceptable to the first and second parties is determined.
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Zhang, Huacheng
Wang, Wei
Abrégé
One or more implementations shown in the present specification provide an offline payment method. A communication connection between a collection device and a payment device is established, wherein both the collection device and the payment device are in an offline state. Payment data sent by the collection device is received by the payment device through the communication connection established to the collection device. Payment processing based on the payment data and account information of the payment device is performed by the payment device, to obtain a payment result. The payment result is returned, by the payment device to the collection device through the communication connection. Collection processing is performed, by the collection device, based on the payment result and obtained account information of the payment device, to obtain a collection result.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
G06Q 20/24 - Schémas de crédit, c. à d. de "paiement différé"
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Li, Yize
Yang, Xinying
Zhang, Yuan
Abrégé
Implementations of this specification provide service identifier-based data indexing. An example method performed by a data indexing apparatus of a centralized database service provider that stores data by using a blockchain-type ledger includes obtaining a service identifier and a service label of a data record, the service identifier uniquely identifying a service attribute of the data record, and the service label representing a type of the data record; determining location information of the data record in the blockchain-type ledger, the location information including a block height of a data block that includes the data record, and a positional offset of the data record in the data block that includes the data record; establishing a mapping relationship among the service identifier, the service label, and the location information; and writing the mapping relationship into an index for which a primary key is the service identifier.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Shi, Danxia
Guan, Weigang
Chen, Wenhong
Abrégé
A foundation framework resource of a first service function is loaded in a software application. A service request for starting the first service function in the software application is received. A page resource required by the first service function is loaded. The first service function is implemented based on the foundation framework resource of the first service function and the page resource.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Wei, Changzheng
Yan, Ying
Zhang, Hui
Peng, Yujun
Abrégé
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for providing blockchain-based data authorization. One of the methods includes receiving, by a blockchain node, a data acquisition transaction submitted by a data user for obtaining target data possessed by a data owner, determining, by the blockchain node, that the data user has obtained authorization of the target data, and executing, by the blockchain node, a smart contract invoked by the data acquisition transaction to issue an authorization token to the data user in response to determining that the data user has authorization of the target data, where the authorization token is sent to a privacy computing platform.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
39.
Method and apparatus for generating two-dimensional payment code
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Han, Zhe
Zheng, Mengxue
Wu, Jun
Abrégé
Embodiments of the present specification provide methods and apparatuses for generating two-dimensional codes. One method comprising: receiving, by a secure element chip comprised in a two-dimensional code display device, code information comprising an account identifier of an account associated with the two-dimensional code display device; in response to obtaining a digital certificate for a private key stored in the secure element chip, signing, by the security element chip, the code information by using the private key to generate signed code information; and providing, the signed code information to the two-dimensional code display device for the two-dimensional code display device to generate and display a two-dimensional code based on the code information, wherein the two-dimensional code comprises information associated with the account identifier and changes dynamically over time.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Zhao, Hang
Abrégé
A query is received from a user. A query event type and a query time range associated with the query are determined. An estimated amount of data to be queried associated with the determined query time range is determined based on at least a historical number of the query event type of the user. An allowable amount of data to be queried supported by a database for a single query is determined. One or more sub-queries for the received query are generated. Each sub-query is associated with a different time period within the determined query time range. A corresponding amount of data to be queried associated with each time period is less than, or equal to, the determined allowable amount of data to be queried. The database is queried with the generated one or more sub-queries.
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Zhu, Jinbiao
Abrégé
Disclosed are an identity authentication, number saving and sending, and number binding method, apparatus and device. The identity authentication method comprises: receiving a user identity authentication request sent by a data authentication platform client, wherein the user identity authentication request comprises user authentication information and user identification information, and a data authentication platform server pre-stores the user authentication information and a registration number and a password, which correspond to the user identification information; acquiring, according to the user identification information, the user authentication information pre-stored in the data authentication platform server; matching the user authentication information in the acquired user identity authentication request with the acquired user authentication information pre-stored in the data authentication platform server; when the matching is successful, receiving a result, sent by the data authentication platform client, of confirming the acquisition of the registration number by a user.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Zhou, Aihui
Huang, Qunshan
Yu, Chaofan
Cai, Weiwen
Wang, Lei
Abrégé
Some embodiments of the present specification provide a method and an apparatus for establishing a trusted channel between a user and a trusted computing cluster. According to the method, when a user wants to establish a trusted channel with a trusted computing cluster, the user only negotiates a session key with any first trusted computing unit in the cluster to establish the trusted channel. Then, the first trusted computing unit encrypts the session key using a cluster key common to the trusted computing cluster to which the first trusted computing unit belongs, and sends the encrypted session key to a cluster manager. The cluster manager transmits the encrypted session key in the trusted computing cluster, so that other trusted computing units in the cluster obtain the session key and join the trusted channel. Thus, the user establishes a trusted channel with the entire trusted computing cluster.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Li, Changqing
Zou, Yinchao
Wu, Peng
Kong, Jincan
Abrégé
Implementations of this disclosure provide data transmission operations and network interface controllers. An example method performed by a first RDMA network interface controller includes obtaining m data packets from a host memory of a first host; sending the m data packets to a second RDMA network interface controller of a second host; backing up the m data packets to a network interface controller memory integrated into the first RDMA network interface controller; determining that the second RDMA network interface controller does not receive n data packets of the m data packets; and in response, obtaining the n data packets from the m data packets that have been backed up to the network interface controller memory integrated into the first RDMA network interface controller, and retransmitting the n data packets to the second RDMA network interface controller.
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
H04L 41/12 - Découverte ou gestion des topologies de réseau
H04L 49/901 - Dispositions de mémoires tampon en utilisant un descripteur de stockage, p.ex. des pointeurs de lecture ou d'écriture
H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Cheng, Long
Li, Yanpeng
Abrégé
Implementations of this specification provide blockchain-based recording and querying methods and apparatuses. An example method includes operations performed by an access gateway, including receiving, from a first service system, user data including a user identifier of a user; transmitting, to an identifier hash system, a first hash request for the user identifier; receiving, from the identifier hash system, a hash digest of the user identifier; replacing the user identifier in the user data with the hash digest of the user identifier, and packaging the user data into a storage transaction; transmitting, to a blockchain, the storage transaction; receiving, from the blockchain, a result of the storage transaction having been performed by a smart contract published by the first service system on the blockchain; and providing, to the first service system, the result of the storage transaction.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 16/22 - Indexation; Structures de données à cet effet; Structures de stockage
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
46.
Invoice access method and apparatus based on blockchain, and electronic device
Advance New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Xiao, Hansong
Zhang, Ping
Kan, Wenhu
Liu, Qin
Lin, Liangrong
Deng, Fuxi
Zhang, Yixiang
Chen, Rui
Duan, Jinming
Abrégé
One or more implementations of the present specification provide an invoice access method and apparatus based on a blockchain, and an electronic device. The method includes: generating first ciphertext data by encrypting plaintext data of the target invoice based on a first key corresponding to an invoice issuer; generating second ciphertext data by encrypting the plaintext data of the target invoice based on a second key corresponding to an invoice receiver; adding the first ciphertext data and an user identifier of the invoice issuer to the blockchain as related to one another; and adding the second ciphertext data and an user identifier of the invoice receiver to the blockchain as related to one another.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/18 - Chiffrement par modification sérielle et continue du flux d'éléments de données, p.ex. systèmes de codage en continu
G06F 21/71 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
47.
Blockchain-based service data encryption methods and apparatuses
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Li, Shubo
Zhang, Yixiang
Abrégé
Blockchain-based service data encryption methods and apparatuses are provided wherein by a first derived key is obtained by a node device of a key receiver, the first derived key distributed by a node device of a key distributor, wherein the first derived key is derived from a derived key of the key distributor based on a service data permission type of the key receiver and service data is encrypted based on the first derived key to obtain encrypted service data. The encrypted service data is sent to a blockchain, so that the encrypted service data is recorded in a distributed database of the blockchain after the blockchain performs consensus verification on the encrypted service. Because the derived key of the key distributor can decrypt the service data encrypted by the first derived key, the key distributor can decrypt, monitor, and manage service data uploaded by the key receiver.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Cao, Shaosheng
Cui, Qing
Abrégé
Implementations of this disclosure provide for obtaining dynamic embedding vectors of nodes in relationship graphs. An example method includes determining N neighboring nodes of a first node of a plurality of nodes; obtaining respective input embedding vectors of the first node and the N neighboring nodes, the input embedding vector of each node being determined based on a respective static embedding vector and a respective positional embedding vector of the node; inputting the respective input embedding vectors of the first node and the N neighboring nodes into a pre-trained embedding model that includes one or more sequentially connected computing blocks, each computing block including a corresponding self-attention layer that outputs N+1 output vectors corresponding to N+1 input vectors; and receiving respective dynamic embedding vectors of the first node and the N neighboring nodes output by the pre-trained embedding model.
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G06F 16/901 - Indexation; Structures de données à cet effet; Structures de stockage
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Yang, Xinying
Abrégé
Storage devices are divided into subgroups and assigned to subsystems based on data input and data output frequencies of the subsystems. Each subgroup of storage devices is associated with a corresponding subsystem. A subsystem with higher data input and data output frequencies is assigned a higher number of solid state drives than a subsystem with lower data input and data output frequencies.
G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Shen, Chao
Zhang, Wenbin
Lu, Xuming
Abrégé
Implementations of this specification include receiving a synchronization request from a light-weight node of the blockchain network including an identity of the light-weight node; identifying one or more permissions associated with the identity of the light-weight node; determining an original world state structure associated with the block height and including a plurality of account records; identifying based on the one or more permissions, a subset of the plurality of account records that are authorized for access by the light-weight node; generating an isolated world state structure based on the original world state data structure including only the subset of the plurality of account records that are authorized for access by the light-weight node; sending a response to the light-weight node that includes the isolated world state data structure.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 16/22 - Indexation; Structures de données à cet effet; Structures de stockage
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
51.
Transaction consensus processing method and apparatus for blockchain and electronic device
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Liao, Xiaojun
Abrégé
A transaction consensus processing method for a blockchain is provided. A target node that initiates a proposition performs compression processing on proposed transaction data based on a compression algorithm, and fragments the compressed transaction data into a number of data fragments based on an erasure code algorithm. The method includes: receiving a data fragment of the transaction data that is sent by the target node in a unicast mode, data fragments sent by the target node to nodes in the unicast mode being different; broadcasting the received data fragment to other nodes, and receiving data fragments of the transaction data that are broadcast by the other nodes; performing data recovery on the received data fragment based on an erasure code reconstruction algorithm, performing decompression processing on the recovered transaction data based on a decompression algorithm to obtain original content of the transaction data, and completing the consensus.
G06F 16/00 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Zhang, Xingwen
Qi, Feng
Hua, Zhigang
Yang, Shuanghong
Abrégé
Disclosed methods, systems, and apparatus, include computer programs encoded on computer storage media, for performing allocation of M resources among N users into K pools by solving a knapsack problem (KP) using a distributed computing system. The method includes: receiving data representing K global constraints and L local constraints of the KP; transforming the KP into a dual problem using K dual multipliers; decomposing the dual problem into N sub-problems; performing two or more iterations in solving the dual problem, wherein in one iteration, for each dual multiplier corresponding to a global constraint corresponding to a pool: determining an updated dual multiplier for the global constraint corresponding to the pool to be a non-negative threshold; and computing M decision variables of each of the N users corresponding to the updated dual multiplier in solving each of the N sub-problems corresponding to the each of the N users.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Yu, Yirong
Abrégé
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for retrieving data from external data sources for processing within a blockchain network. One of the methods includes receiving a request for data that includes encrypted data, the encrypted data including access data that is encrypted using a service public key of a key management node; selecting a relay system node from a plurality of relay system nodes that share a service private key of the key management node; transmitting the request to the relay system node; receiving a response provided from the relay system node, the response including result data and a digital signature, wherein the digital signature is generated based on the result data and the service private key of the key management node; and transmitting the response to a client.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Li, Lichun
Lin, Wenzhen
Wang, Huazhong
Abrégé
This disclosure relates to data encryption and decryption. In one aspect, a method includes receiving, by a second peer end computing device, first data from a first peer end computing device. The second end computing device generates a random term based on a result range pre-agreed upon with the first peer end computing device. The result range includes a minimum result value and a maximum result value. The random term is a product of a random number and an agreed upon constant. The agreed upon constant is greater than a difference between the maximum result value and the minimum result value. The second peer end computing device performs a homomorphic operation based on the first data, local private second data, and the random term to obtain an encryption result. The second peer end computing device returns the encryption result to the first peer end computing device.
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
G06F 7/72 - Méthodes ou dispositions pour effectuer des calculs en utilisant une représentation numérique non codée, c. à d. une représentation de nombres sans base; Dispositifs de calcul utilisant une combinaison de représentations de nombres codées et non codées utilisant l'arithmétique des résidus
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Zou, Qimeng
Sun, Jiankang
Qin, Yao
Wang, Linqing
Abrégé
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for broadcasting audio. In one aspect, the method includes receiving, from a server by a smart broadcasting device associated with a service client, an audio broadcast instruction; in response to receiving the audio broadcast instruction, downloading an audio file corresponding to the audio broadcast instruction, wherein the audio file comprises a marketing content related to services provided by the server to the service client associated with the smart broadcasting device; and broadcasting, by the smart broadcasting device, the audio file by using a speaker of the smart broadcasting device.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
G10L 25/51 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour comparaison ou différentiation
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Zou, Xueqing
Abrégé
Embodiments of the present application provide a blockchain-based data evidence storage method, a blockchain-based data check method, and relevant apparatuses. The data evidence storage method comprises: performing irreversible encryption on data content of a target file to obtain irreversibly encrypted data of the target file; storing the irreversibly encrypted data in a blockchain and obtaining on-chain evidence storage information of the irreversibly encrypted data; generating a digital watermark of the on-chain evidence storage information; embedding the digital watermark into the target file; and storing the target file embedded with the digital watermark of the on-chain evidence storage information.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
G06F 21/16 - Traçabilité de programme ou de contenu, p.ex. par filigranage
57.
Retrieving values of digital tickets using smart contracts in blockchain networks
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Feng, Zhiyuan
Li, Yanpeng
Cheng, Long
Abrégé
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for retrieval of values of digital tickets. One of the methods includes receiving a request from a client device for a current value of a digital ticket by a distributing node. The request includes the digital ticket and one or more value changing rules for determining the current value of the digital ticket. The distributing node retrieves a smart contract from a blockchain network in response to the request from the client device. The smart contract includes the one or more value changing rules for determining the current value of the digital ticket. The distributing node determines the current value of the digital ticket based on an original value of the digital ticket and the one or more value changing rules by executing the smart contract, and associates the current value with the digital ticket.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Ying, Pengfei
Abrégé
A query request is forwarded to a plurality of service provider servers by a proxy server that determines a serial number based on the query request. An encrypted query result corresponding to the query request is received from each service provider server, and a copy of the encrypted query result is stored as a result to be audited in a blockchain that associated with each service provider server. An audit request is sent to at least one service provider server. The result to be audited is obtained from the blockchain corresponding to the service provider server. As a standard result, an encrypted query result is received from the service provider server. As an audit, the standard result received from the service provider server is compared with the result to be audited that obtained from the blockchain that associated with the service provider server.
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
G06Q 40/00 - Finance; Assurance; Stratégies fiscales; Traitement des impôts sur les sociétés ou sur le revenu
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Zhuo, Haizhen
Abrégé
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for communicating and sharing blockchain data. One of the methods includes sending current state information associated with a current block of a blockchain to one or more shared storage nodes of the blockchain network; sending a hash value to the one of the one or more shared storage nodes for retrieving an account state stored in the historic state tree; receiving the account state in response to sending the hash value; and verifying, by the consensus node, that the account state is part of the blockchain based on the hash value.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 16/901 - Indexation; Structures de données à cet effet; Structures de stockage
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
60.
Retrieving public data for blockchain networks using highly available trusted execution environments
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Yu, Yirong
Abrégé
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for enhancing blockchain network security. Implementations include receiving a request for data from the data source, transmitting the request to a relay system that is external to the blockchain network and that includes a multi-node cluster including a plurality of relay system nodes, receiving a result provided from a relay system node, the result being digitally signed using a private key of the relay system node, verifying that the relay system node is registered, verifying an integrity of the result based on a public key of the relay system node and a digital signature of the result in response to verifying that the relay system node is registered, and transmitting the result to a client in response to verifying the integrity of the result.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/71 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Guo, Mingyu
Abrégé
A computer-implemented certificate verification method includes: obtaining, by a certificate verification module, at least two images of a certificate, in which the at least two images are acquired under different acquisition conditions; obtaining, from the at least two images, at least two target images that correspond to respective images of the at least two images and that each include an image of a light-reflective coating of the certificate; and determining, based on the at least two target images, a probability that the certificate is an original.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Li, Na
Abrégé
The present specification provides a method for identifying risky vertices, including: constructing multiple medium networks, each of the multiple medium networks being constructed from one or more black seeds of the same type and including vertices and media connected to the vertices; determining a first risk value of each vertex based on a quantity of upper-layer media connected to the vertex and a quantity of risk conditions that the vertex meets; determining a final risk value of each vertex based on a quantity of overlapping times of the vertex in a stacked medium network structure and the first risk value; and determining a high-risk vertex based on the final risk value.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 16/901 - Indexation; Structures de données à cet effet; Structures de stockage
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Liao, Hui
Huang, Qi
Zhao, Shengbo
Abrégé
In an embodiment, a server receives—a digital key request for a digital key to unlock a smart lock. A biometric feature request for collecting a biometric feature from the mobile device is generated and sent to the mobile device. A biometric feature corresponding to the biometric feature request is received. Identity information and a device identifier of the smart lock is received from another server. Based on the identity information, a matching biometric feature stored in a biometric feature database is determined. An identity of a user corresponding to the received biometric feature is verified based on the matching biometric feature. After the identity of the user is verified, smart lock information is identified. A digital key for unlocking the smart lock is generated based on the digital key request and the smart lock information and sent to the mobile device.
G07C 9/26 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p.ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix utilisant un capteur biométrique intégré au laissez-passer
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
64.
Data storage, data check, and data linkage method and apparatus
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Li, Yi
Zhao, Zunkui
Abrégé
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for data tracing are provided. One of the methods includes: receiving a data backtracking request, the data backtracking request comprising a version identifier of a first data version of a target object; obtaining, from the blockchain, version identifiers of a plurality of second data versions of the target object and a plurality of data blocks in the blockchain, wherein the second data versions comprise an initial data version of the target object, and at least one of the obtained data blocks comprises a version identifier of the initial data version; and determining, based on the version identifier of the initial data version, data content corresponding to the initial data version of the target object.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
G06F 16/00 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Zhang, Wenbin
Abrégé
A computer-implemented method includes: determining assets held by a remitter, the assets to be spent in a remittance transaction between the remitter and one or more payees, in which each asset corresponds to a respective asset identifier, a respective asset amount, and a respective asset commitment value; determining a remitter pseudo public key and a remitter pseudo private key; determining a cover party pseudo public key, in which the cover party pseudo public key is obtained based on asset commitment values of assets held by the cover party; and generating a linkable ring signature for the remittance transaction.
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Yang, Xinying
Abrégé
This disclosure relates to recording blockchain ledger data. In one aspect, a method includes capturing, by a first evidence-capturing node of multiple evidence-capturing nodes of a blockchain network comprising multiple nodes, network evidence from a target evidence source. A first evidence hash of the captured network evidence is calculated. The first evidence hash is sent to other evidence-capturing nodes. Additional evidence hashes are received from the other evidence-capturing nodes. For each set of matching evidence hashes, an evidence hash group that includes the set of matching evidence hashes is generated. A count number of evidence hashes in the evidence hash group is determined for each evidence hash group. A given evidence hash group having a largest count number is identified. A given evidence hash corresponding to the matching evidence hashes of the given evidence hash group is determined as a trusted evidence hash.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 16/958 - Organisation ou gestion de contenu de sites Web, p.ex. publication, conservation de pages ou liens automatiques
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
67.
Data transmission method, data transmitter, data receiver, and system
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Liu, Yanghui
Wang, Lei
Chen, Ge
Shen, Lingnan
Abrégé
The present application discloses systems and methods in which sound wave information associated with a data transmission is monitored within a predetermined distance from the client device, where the sound wave information including predetermined security information. In response to detecting sound wave information associated with a data transmission, the sound wave information is parsed to obtain the predetermined security information included in the detected sound wave information. Pattern information is generated based on the predetermined security information and data information to be sent. The generated pattern information is then displayed so that a second device can obtain the generated pattern information.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Yang, Xinying
Abrégé
A method and an apparatus for creating an index in a blockchain-type ledger, and a device are disclosed. According to one implementation, a method may include obtaining, by a centralized database server, a data record, wherein the data record is stored in a blockchain-type ledger, and wherein the data record comprises a service attribute and a sequence number; determining location information of the data record in the blockchain-type ledger, wherein the location information comprises a block height of a data block comprising the data record, and an offset of the data record in the data block; establishing a mapping relationship between the service attribute, the location information, and the sequence number; and based on the sequence number, writing the mapping relationship to an index.
G06F 16/20 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet de données structurées, p.ex. de données relationnelles
G06F 16/22 - Indexation; Structures de données à cet effet; Structures de stockage
G06Q 50/26 - Services gouvernementaux ou services publics
G06F 16/248 - Présentation des résultats de requêtes
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Yang, Xinying
Abrégé
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for training a musical work adaptation quality evaluation model. One of the methods includes: obtaining a plurality of adapted musical work samples; separating audio tracks of each of the plurality of adapted musical work samples; determining instrument information identifying instruments played in each of the audio tracks; performing originality analysis on each of the audio tracks to obtain an originality value corresponding to each audio track; for each of the audio tracks, using a combination of the instrument information and the originality value corresponding to the particular audio track of the adapted musical work samples as a sample feature; and training a musical work adaptation quality evaluation model by using sample features of corresponding adapted musical work samples as input, and a predetermined evaluation score of the corresponding adapted musical work sample as output.
G10H 1/00 - INSTRUMENTS DE MUSIQUE ÉLECTROPHONIQUES; INSTRUMENTS DANS LESQUELS LES SONS SONT PRODUITS PAR DES MOYENS ÉLECTROMÉCANIQUES OU DES GÉNÉRATEURS ÉLECTRONIQUES, OU DANS LESQUELS LES SONS SONT SYNTHÉTISÉS À PARTIR D'UNE MÉMOIRE DE DONNÉES Éléments d'instruments de musique électrophoniques
70.
Integrity of communications between blockchain networks and external data sources
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Yu, Yirong
Abrégé
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for enhancing blockchain network security. Embodiments include generating a request for data from a data source, the request including plaintext data and encrypted data, the encrypted data including access data and a hash of the plaintext data, transmitting the request to a relay system component external to the blockchain network, receiving a result from the relay system component that is digitally signed using a private key of the relay system component, and verifying an integrity of the result based on a public key of the relay system component and a digital signature of the result.
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Yang, Renhui
Liu, Jiawei
Chen, Yuan
Lin, Yuqi
Abrégé
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for verifiable-claim issuance. One of the methods includes: receiving, from a first entity, a request for creating a verifiable claim (VC) for a decentralized identifier (DID) associated with a second entity; obtaining, in response to receiving the request, a digital signature associated with the first entity; and generating the VC based on the received request and the obtained digital signature.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
72.
Anti-replay device based on memory space interchange
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Lv, Hong
Abrégé
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting and disabling replay attacks. One of the methods includes receiving a transaction to be completed in a blockchain. A current working section of memory storing transaction information that is designated for use in identifying past transactions already processed is determined, where the memory also stores a backup section providing, when used in combination with the current working section, an alternating memory section storage scheme for the transaction information. From the current working section, whether the transaction has previously been processed is determined. When it is determined that the transaction has previously been processed, the transaction is bypassed. When it is determined that the transaction has not previously been processed the transaction is processed and transaction information for the transaction is written into the current working section.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Guo, Wei
Abrégé
An instruction to generate target information is received by a server and from a first user. The instruction includes two or more pieces of user identity information associated with two or more different users. The two or more pieces of user identity information are combined, by the server and in a predetermined method, into continuous text information. The two or more pieces of user identity information in the continuous text information are separated by one or more separation strings. The target information is generated, by the server, based on at least a predetermined algorithm and the continuous text information.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p.ex. forme, nature, code
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p.ex. lecture de la lumière blanche réfléchie
74.
Blockchain-based data authorization method and apparatus
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Wei, Changzheng
Yan, Ying
Zhang, Hui
Peng, Yujun
Abrégé
One or more implementations of the present specification provide a blockchain-based data authorization method and apparatus. The method can include receiving, by a blockchain node, an authentication transaction submitted by a privacy computing platform, where the authentication transaction queries whether a data user has obtained authorization of target data possessed by a data owner, and in response to determining that the data user has obtained authorization of the target data, executing, by the blockchain node, a smart contract invoked by the authentication transaction to provide an authorization token to the privacy computing platform that instructs the privacy computing platform to obtain the target data, and send a computational result of one or more predetermined computational operations based on the target data to the data user.
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/28 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant un algorithme de chiffrement particulier
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Zhang, Hong
Wu, Jun
Sun, Jiankang
Abrégé
Some embodiments of the application disclose a method and apparatus for paying a fare. When a user takes a public transit means, the user terminal establishes an NFC connection with the fare-collecting device of the public transit means, the user terminal transmits the encrypted account ID of the user to the fare-collecting device, and the fare-collecting device may request a server to deduct the fare from the account of the user.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/14 - Architectures de paiement spécialement adaptées aux systèmes de facturation
G06Q 20/28 - Schémas de prépaiement, c. à d. de "paiement préalable"
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Li, Zhiguo
Abrégé
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for enabling blockchain-based service of process. One method includes: receiving a request generated based on a blockchain-based application for delivering a notice associated with a legal action from a serving party to another party. The serving party is determined to be a registered user of the blockchain-based application. A time that the request is received is recorded on the blockchain. If the party to be served is determined to be a registered user of the blockchain-based application, identifying one or more manners of delivering the notice based on available communication methods included in the registration information of the serving party and registration information of the party to be served. The notice to the party to be served is determined based on at least one of the one or more manners.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Pan, Guozhen
Xu, Jianguo
Liu, Yongchao
Zhang, Haitao
Huang, Qiyin
Zhu, Guanyin
Abrégé
Embodiments of the present specification provide chips and chip-based data processing methods. In an embodiment, a method comprises: obtaining data associated with one or more neural networks transmitted from a server; for each layer of a neural network of the one or more neural networks, configuring, based on the data, a plurality of operator units based on a type of computation each operator unit performs; and invoking the plurality of operator units to perform computations, based on neurons of a layer of the neural network immediately above, of the data for each neuron to produce a value of the neuron.
G06F 9/06 - Dispositions pour la commande par programme, p.ex. unités de commande utilisant des programmes stockés, c. à d. utilisant un moyen de stockage interne à l'équipement de traitement de données pour recevoir ou conserver les programmes
G06N 3/063 - Réalisation physique, c. à d. mise en œuvre matérielle de réseaux neuronaux, de neurones ou de parties de neurone utilisant des moyens électroniques
G06F 9/30 - Dispositions pour exécuter des instructions machines, p.ex. décodage d'instructions
G06F 13/28 - Gestion de demandes d'interconnexion ou de transfert pour l'accès au bus d'entrée/sortie utilisant le transfert par rafale, p.ex. acces direct à la mémoire, vol de cycle
78.
System and method for training a damage identification model
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Xu, Juan
Abrégé
A system is provided for identifying damages of a vehicle. During operation, the system can obtain a set of digital images associated with a set of tagged digital images as training data. Each tagged digital image in the set of tagged digital images may include at least one damage object. Based on the training data, the system can train a damage identification model by reducing noise associated with the damage object; generating a set of feature vectors for the training data; and using the set of feature vectors to optimize a set of parameters associated with the damage identification model to obtain a trained damage identification model. The system can then apply the trained damage identification model to obtain a damage category prediction result and determine a repair solution based on the damage category prediction result.
G06F 16/58 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
G06N 5/04 - Modèles d’inférence ou de raisonnement
G06F 18/214 - Génération de motifs d'entraînement; Procédés de Bootstrapping, p.ex. ”bagging” ou ”boosting”
G06F 18/2113 - Sélection du sous-ensemble de caractéristiques le plus significatif en classant ou en filtrant l'ensemble des caractéristiques, p.ex. en utilisant une mesure de la variance ou de la corrélation croisée des caractéristiques
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p.ex. des objets vidéo
G06V 10/774 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p.ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]; Séparation aveugle de source méthodes de Bootstrap, p.ex. "bagging” ou “boosting”
G06V 10/40 - Extraction de caractéristiques d’images ou de vidéos
G06V 20/00 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène
G06V 20/20 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans les scènes de réalité augmentée
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Wu, Yuncheng
Wang, Wenxiang
Zhang, Le
Lin, Li
Abrégé
A method, implementable by a data processing server comprising a trusted execution environment, includes: obtaining a ciphertext of target data from an external system; obtaining one or more parameters of a model for processing the target data; obtaining, via a data transmission channel between the trusted execution environment and the external system, an encryption key associated with the ciphertext of the target data; inputting the ciphertext of the target data and the one or more parameters of the model to the trusted execution environment; decrypting, in the trusted execution environment, the ciphertext using the encryption key to obtain the target data; processing, in the trusted execution environment, the obtained target data using the model with the one or more parameters to obtain a result; encrypting, in the trusted execution environment, the result using the encryption key; and sending the encrypted result to the external system.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Liu, Zheng
Li, Lichun
Yin, Shan
Abrégé
Implementations of the present disclosure include obtaining a secret key, by a client node, according to a threshold secret sharing scheme agreed to by a number of client nodes; generating one or more commitment values of a confidential transaction of the client node by applying a cryptographic commitment scheme to transaction data; generating encrypted transaction information of the confidential transaction by encrypting the transaction data using the secret key; and transmitting, to a consensus node of a blockchain network, a content of the confidential transaction for execution, wherein the content of the confidential transaction includes: the one or more commitment values; the encrypted transaction information; and one or more zero-knowledge proofs of the transaction data.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Zhuo, Haizhen
Abrégé
A method includes sending, by a consensus node of a blockchain network, current state information and one or more transactions associated with a current block of a blockchain to one or more shared storage nodes of the blockchain network, wherein the consensus node stores block header associated with every block of the blockchain and the current state information, the one or more shared storage nodes store block body and historic state information associated with every block of the blockchain, and wherein the historic state information is stored as key-value pairs (KVPs) of a historic state tree with values being account states of accounts associated with the blockchain network and keys being hash values of the corresponding account states; verifying that the one or more transactions are stored by the one or more shared storage nodes; and receiving a notification of a transaction associated with the consensus node.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 16/901 - Indexation; Structures de données à cet effet; Structures de stockage
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
82.
Digital certificate management method and apparatus, and electronic device
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Qiu, Honglin
Abrégé
Implementations of the present disclosure provide techniques to improve security in blockchain networks. In some implementations, a linking request is received from a node. The node requests to be linked to a blockchain network. The linking request includes a digital code. One or more consensus verification messages are received from one or more blockchain nodes of the blockchain network. Each consensus verification message indicates whether a respective blockchain node approves or denies the linking request. A consensus verification result is determined based on the one or more consensus verification messages. In response to determining that the linking request is approved by the one or more blockchain nodes, the digital code is stored into the blockchain network as a digital certificate of the node.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
83.
Digital certificate management method and apparatus, and electronic device
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Qiu, Honglin
Abrégé
Implementations of the present disclosure provide techniques to improve security in blockchain networks. In some implementations, a linking request is received from a node. The node requests to be linked to a blockchain network. The linking request includes a digital code. One or more consensus verification messages are received from one or more blockchain nodes of the blockchain network. Each consensus verification message indicates whether a respective blockchain node approves or denies the linking request. A consensus verification result is determined based on the one or more consensus verification messages. In response to determining that the linking request is approved by the one or more blockchain nodes, the digital code is stored into the blockchain network as a digital certificate of the node.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
84.
Method and device for allocating augmented reality-based virtual objects
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Duan, Qinglong
Chen, Guanhua
Ji, Jing
Cheng, Jiahui
Yuan, Lu
Abrégé
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a virtual objection distribution method are provided. One of the methods includes: performing an image scanning to a local environment of a user; conducting image identification to an acquired image; acquiring an electronic certificate from a server if an image identifier is identified in the image; saving the electronic certificate; and, in response to a determination that a category count of the received electronic certificates reaches the threshold, sending to the server a virtual object distribution request to cause the server to distribute a virtual object to the user. This method significantly increases interactivity and entertainingness of a virtual object distribution process.
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Guo, Zhiyou
Abrégé
Implementations of the present specification disclose a vehicle damage assessment method, apparatus, and device. The method includes: collecting a first video image including an identification of a target vehicle under damage assessment; in response to that the first video image meets the determined requirement for capturing an identification, collecting a second video image including a damage to the target vehicle; and assessing the damage to the target vehicle based on the first video image and the second video image in response to that the second video image meets the determined requirement for capturing a vehicle damage feature.
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G06K 9/46 - Extraction d'éléments ou de caractéristiques de l'image
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Li, Zhiguo
Abrégé
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for enabling paperless documentation. One method includes identifying one or more electronic forms to be filled out and submitted. At each step of a plurality of steps: generating a unique identifier (ID) based on a time that the step is performed and digital content on the electronic form at the time; recording the unique ID, the time, and the digital content on the blockchain; embedding the unique ID in the digital content at the time by changing one or more attributes associated with the digital content to be representative of the unique ID, where the embedding produces information-embedded digital content that enables retrieval of the time and the digital content from the blockchain based on the unique ID; and recording the information-embedded digital content to the blockchain.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/16 - Traçabilité de programme ou de contenu, p.ex. par filigranage
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06Q 50/18 - Services juridiques; Maniement de documents juridiques
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
87.
Digital certificate management method, apparatus, and system
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Qiu, Honglin
Abrégé
Techniques for providing a digital certificate management for blockchain technologies are described. One example method includes a transaction request including a digital certificate is received from a certificate authority at a node in a blockchain network, and the transaction request is a request to write the digital certificate into a blockchain associated with the blockchain network, and the digital certificate is issued to a node in the blockchain network. A consensus verification result is determined for the transaction request, and the consensus verification result is produced by nodes in the blockchain network. The consensus verification result is compared to a predetermined threshold value. In response to determining the consensus verification result is greater than or equal to the predetermined threshold value, the digital certificate is stored in the blockchain associated with the blockchain network.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Yang, Wenxue
Abrégé
Technologies related to trusted user account login are disclosed. In one implementation, a temporary trusted login token request for accessing a service page from an originating application is received. A temporary trusted login token based on the temporary trusted login token request is generated. The temporary trusted login token is sent to the originating application. A service page access request is received for accessing the service page generated based on the temporary trusted login token. The temporary trusted login token including the service authorization from the service page access request is identified. Whether the service page is included in the one or more service pages that are identified by the service authorization is determined, and trusted login to the service page from the originating application is allowed if the service page is included in the one or more service pages.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/41 - Authentification de l’utilisateur par une seule ouverture de session qui donne accès à plusieurs ordinateurs
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Yang, Xinying
Yu, Benquan
Zhang, Yuan
Li, Yize
Abrégé
Implementations of this specification provide signature verification methods and apparatuses for a blockchain ledger. An example method includes receiving by a server, a signature verification instruction that comprises a verification object parameter and a hash value. The verification object parameter includes a third-party parameter, a platform parameter, or a time service certificate parameter, the verification object parameter indicates a type of a to-be-verified object, and the server is configured to store data by using the blockchain ledger. The server obtains the to-be-verified object based on the verification object parameter and the hash value. The type of the to-be-verified object includes a third-party digital signature, a server digital signature, or a time service certificate. The server sends the to-be-verified object to a client for verification by the client.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
90.
Multi-server node service processing and consensus method and device based on heartbeat detection messages
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Li, Yi
Abrégé
One example method performed by a registration center includes obtaining addresses of a first plurality of servers of a first blockchain node in a consensus network, where the consensus network further includes a plurality of additional blockchain nodes, where each blockchain node of the plurality of additional blockchain nodes includes a corresponding plurality of servers; sending the addresses of the first plurality of servers to each blockchain node of the plurality of additional blockchain nodes and a client for storage; sending a heartbeat detection message to a first server of the first plurality of servers; determining that a response message to the heartbeat detection message is not returned by the first server in a predetermined time period; determining that the first server is offline; and instructing each blockchain node of the plurality of additional blockchain nodes to delete an address of the first server.
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
H04L 41/085 - Récupération de la configuration du réseau; Suivi de l’historique de configuration du réseau
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04L 67/1004 - Sélection du serveur pour la répartition de charge
H04L 67/1008 - Sélection du serveur pour la répartition de charge basée sur les paramètres des serveurs, p.ex. la mémoire disponible ou la charge de travail
H04L 67/1061 - Réseaux de pairs [P2P] en utilisant des mécanismes de découverte de pairs basés sur les nœuds
91.
Blockchain-based bill write-off method, apparatus, electronic device, and storage medium
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Yang, Xueqing
Qing, Longsheng
Sun, Zhen
Jin, Ge
Meng, Zhenzhong
Chu, Yu
Abrégé
A target transaction to write off a target e-bill is received. In response to the target transaction, a write-off logic declared in a smart contract published on a blockchain is invoked. A bill number of the target e-bill is obtained, and whether the bill number matches an e-bill number segment maintained in a blockchain account corresponding to a bill issuer of the target e-bill is checked. In response to determining that the bill number matches the e-bill number segment maintained in the blockchain account corresponding to the bill issuer of the target e-bill, a validity check is performed on bill content of the target e-bill. After the validity check succeeds, generating a write-off completion event corresponding to the target e-bill is generated and published to the blockchain for storage.
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Wang, Fengwei
He, Dijun
He, Huimei
Mao, Renxin
Abrégé
A method and an apparatus for identifying a transaction risk are disclosed. The method includes obtaining risk identification information of a sub-network to which a node relating to a transaction to be identified belongs; and identifying a risk of the transaction to be identified based on the risk identification information of the sub-network to which the node relating to the transaction to be identified belongs, wherein the sub-network is a network acquired by partitioning a relationship network based on connectivity, the relationship network is a network built up with entities and activities relating to a plurality of transactions. Embodiments of the present disclosure build up entities and activities relating to a transaction to be identified into a relationship network, and identify whether a risk exists in the transaction to be identified using risk identification information of the network which is difficult to be found or changed, and thus are able to identify a transaction risk in a more effective manner.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
93.
INTEGRITY VERIFICATION METHOD, APPARATUS, AND SYSTEM AND DEVICE FOR DATA IN A BLOCKCHAIN-TYPE LEDGER
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Yang, Xinying
Abrégé
Computer-implemented methods, non-transitory, computer-readable media, and computer-implemented systems for data verification are provided. When a blockchain-type ledger needs to be verified, integrity verification can be first performed on block headers in a coordinator node only. After the verification succeeds, a second verification instruction can be further distributed to data nodes, so that the data nodes perform data block internal verification in parallel.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
G06F 16/28 - Bases de données caractérisées par leurs modèles, p.ex. des modèles relationnels ou objet
94.
Asset management method and apparatus, and electronic device
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Yan, Xuebing
Abrégé
This specification describes techniques for managing assets in a blockchain. One example method includes receiving, from a target user recorded in a distributed database of the blockchain network, a user input including a request to generate an asset object in the blockchain network, the blockchain network including an account object and a contract object, determining, based on the user input, an asset type of the asset object, initiating, in the blockchain network, the contract object corresponding to generate the asset object based on the asset type, the asset object including a digital asset corresponding to a physical asset associated with the target user, assigning the asset object to a target object of the target user, and adding address information of the asset object to the target object.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 40/04 - Transactions; Opérations boursières, p.ex. actions, marchandises, produits dérivés ou change de devises
95.
Blockchain-based transaction processing method and apparatus, and electronic device
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Wang, Jiyuan
Du, Huabing
Yan, Xuebing
Abrégé
A computer-implemented method for processing blockchain-based transactions, the computer-implemented method including: receiving a target transaction initiated by a member node device in a blockchain, wherein the target transaction comprises a unique identifier of the target transaction; querying a transaction idempotent table on the block chain to determine whether the transaction idempotent table has stored a transaction idempotent record corresponding to the unique identifier of the target transaction; and in response to determining that the transaction idempotent table has not stored the transaction idempotent record corresponding to the unique identifier of the target transaction, recording the target transaction in a candidate block on the blockchain.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Lu, Zhonghao
Yu, Benquan
Zhuo, Haizhen
Abrégé
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for blockchain-based hierarchical data storage. One of the methods includes: determining, based on a blockchain stored in a database that includes multiple levels of storage, a block number interval that includes one or more block numbers associated with data nodes to be migrated to a lower level of storage in response to the data nodes meeting a data migration condition, wherein each of the data nodes is included in a state Merkle tree and is associated with a block number of a block of the blockchain where the corresponding data node was last updated, and the lower level of storage corresponds to a storage media with lower storage cost.
G06F 16/21 - Conception, administration ou maintenance des bases de données
G06F 16/22 - Indexation; Structures de données à cet effet; Structures de stockage
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Feng, Zhiyuan
Li, Yanpeng
Cheng, Long
Abrégé
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing cryptographic keys based on user identity information. One of the methods includes receiving a request to store identity information and a user key pair to a memory on a chip, the request being digitally signed with a digital signature, the identity information uniquely identifying the user, and the user key pair being assigned to the user; determining that the digital signature is authentic based on a public key pre-stored in the memory; encrypting the identity information and the user key pair; and storing the identity information and the user key pair to the memory.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
ADVANCED NEW TECHNOLOGIES CO., LTD. (Îles Caïmanes)
Inventeur(s)
Yin, Xiaohua
Abrégé
A method for identifying a risk merchant comprises: determining, for each of at least one marked merchant cluster based on a user correlation degree of a merchant to be identified and the each marked merchant cluster, a degree of similarity between the merchant to be identified and the marked merchant cluster, wherein each marked merchant in the each marked merchant cluster is marked with a corresponding risk category by a trained classification model, and the user correlation degree of the merchant to be identified and the marked merchant cluster comprises a user correlation coefficient of the merchant to be identified and the marked merchant cluster and a number of same users of the merchant to be identified and the marked merchant cluster; and determining whether the merchant to be identified is a risk merchant based on the degree of similarity between the merchant to be identified and the each marked merchant cluster.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Wu, Hao
Abrégé
A parent cryptographic key associated with a blockchain object is obtained. A number of parties (N) to share control over the blockchain object is obtained. N child cryptographic keys are generated based on the parent cryptographic key by applying a predetermined algorithm to the parent cryptographic key, wherein N is an integer greater than or equal to 2, and wherein the N child cryptographic keys are collectively configured to enable reconstruction of the parent cryptographic key.
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
G06F 9/30 - Dispositions pour exécuter des instructions machines, p.ex. décodage d'instructions
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
100.
Identifying copyrighted material using embedded copyright information
Advanced New Technologies Co., Ltd. (Îles Caïmanes)
Inventeur(s)
Li, Zhiguo
Abrégé
A method includes generating, by a computing device, a unique identifier (ID) based on copyright information associated with digital content, wherein the copyright information and the digital content are recorded on a blockchain of a blockchain network; identifying a plurality of color values associated with one or more color attributes of at least a portion of the digital content; and embedding the unique ID in the digital content by changing one or more color values of the plurality of color values to be representative of the unique ID, wherein the embedding produces information-embedded digital content that enables retrieval of the copyright information from the blockchain based on the unique ID, and wherein a visual difference between the digital content and the information-embedded digital content is not apparent to an unaided human eye.
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
G06F 21/16 - Traçabilité de programme ou de contenu, p.ex. par filigranage
G06F 21/10 - Protection de programmes ou contenus distribués, p.ex. vente ou concession de licence de matériel soumis à droit de reproduction