US Pat. No. 10,924,273

DATA EXCHANGE FOR MULTI-PARTY COMPUTATION

Advanced New Technologies...

1. A computer-implemented method for secure multi-party computation (MPC), comprising:receiving, by a first electronic device from a server in communication with a second electronic device, a first random seed, a second random seed, and a first random number set;
generating, by the first electronic device, a second random number set and a third random number set based on the first random seed and the second random seed respectively; and
performing a secure MPC process with the second electronic device using the first random number set, the second random number set, and the third random number set,
wherein the server provides a third random seed, a fourth random seed, and a sixth random number set to the second electronic device, and
wherein random numbers in (i) the first random number set, (ii) the second random number set, (iii) the third random number set, (iv) a fourth random number set generated by the second electronic device based on the third random seed and the fourth random seed, (v) a fifth random number set generated by the second electronic device based on the third random seed and the fourth random seed, and (vi) the sixth random number set satisfy a predetermined condition.

US Pat. No. 10,891,161

METHOD AND DEVICE FOR VIRTUAL RESOURCE ALLOCATION, MODELING, AND DATA PREDICTION

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, from a plurality of data providers, a plurality of user evaluation results of a plurality of users, generated by a plurality of user evaluation models, respectively, wherein each user evaluation model is trained on a corresponding training sample set by
generating, for a corresponding user data sample, a respective data feature vector comprising data feature values, wherein the data feature values correspond to data features of a plurality of dimensions that are extracted from the user data sample, and
constructing a target matrix based on the data feature vectors generated for the user data sample;
constructing a plurality of risk evaluation model training samples from the user evaluation results, wherein each risk evaluation model training sample of the plurality of risk evaluation model training samples comprises a respective subset of the user evaluation results corresponding to a first user of the plurality of users;
generating a label for each risk evaluation model training sample of the plurality of risk evaluation model training samples based on an actual service execution status of the first user to provide a plurality of labels;
training a risk evaluation model based on the plurality of risk evaluation model training samples and the plurality of labels, wherein training the risk evaluation model comprises setting a plurality of variable coefficients, each variable coefficient specifying a contribution level of a corresponding data provider of the plurality of data providers; and
allocating virtual resources to the plurality of data providers based on the plurality of variable coefficients.

US Pat. No. 10,885,363

SPOOF DETECTION USING STRUCTURED LIGHT ILLUMINATION

ADVANCED NEW TECHNOLOGIES...

1. A method for preventing access to a secure system based on determining a captured image to be of an alternative representation of a live person, the method comprising:illuminating a subject with structured light using a light source array comprising multiple light sources disposed in a predetermined pattern;
capturing an image of the subject as illuminated by the structured light;
detecting that the image includes a reflection of the predetermined pattern;
responsive to detecting that the image includes a reflection of the predetermined pattern, identifying the subject in the image to be an alternative representation of a live person comprising a photograph of the live person printed on paper or displayed on a screen: and responsive to identifying the subject in the image to be an alternative representation of a live person, preventing access to the secure system.

US Pat. No. 10,917,424

METHOD AND DEVICE FOR DETERMINING DATA ANOMALY

Advanced New Technologies...

1. A computer-implemented method for determination of anomalous data, the computer-implemented method comprising:retrieving, by one or more processors, a plurality of data packets within a predetermined time period, the plurality of data packets comprising a data structure;
determining, by the one or more processors, a historical distribution, wherein the historical distribution is of historical data comprising the data structure as the data packets;
determining, by the one or more processors, a data distribution state of the plurality of data packets as a current distribution;
determining, by the one or more processors, a first distribution state parameter of a randomly selected data packet in the current distribution;
determining, by the one or more processors, a second distribution state parameter of the randomly selected data packet in the historical distribution;
comparing, by the one or more processors, the plurality of data packets with the historical distribution by determining a difference value between the first distribution state parameter and the second distribution state parameter to generate a comparison result;
determining, by the one or more processors, that the difference value exceeds a predetermined difference threshold;
in response to determining that the difference value exceeds the predetermined difference threshold, determining, by the one or more processors, that a data anomaly exists in the plurality of data packets; and
in response to determining that the data anomaly exists in the plurality of data packets, generating, by the one or more processors, an alert indicating the data anomaly.

US Pat. No. 10,909,326

SOCIAL CONTENT RISK IDENTIFICATION

Advanced New Technologies...

1. A computer-implemented method for social content risk identification, comprising:obtaining, by a computer, social content data comprising at least one of social behavior records or social message records;
extracting, by the computer, original features of the social content data;
for each of the original features, generating, by the computer and using a tree structured machine learning model, dimension-extended features that include a set of extended sub-features corresponding to different dimensions of the original feature;
classifying, by the computer and using a deep machine learning model, that the social content data is risky social content data based on the dimension-extended features; and
transmitting, by the computer, a result of classifying that the social content data is risky social content data to a risk control platform.

US Pat. No. 10,909,337

ARTICLE PROCESSING METHOD, TERMINAL, SYSTEM AND LPWAN GATEWAY

Advanced New Technologies...

1. An article processing method performed by an article processing terminal, comprising:controlling, by a control unit of the article processing terminal, a radio frequency identification (RFID) reader of the article processing terminal to continually scan for signals generated by electronic tags of a plurality of short-range articles;
receiving, by the control unit and from the RFID reader, an article identifier of an article of the plurality of short-range articles, the article identifier being generated by the RFID reader in response to a detected status change of the article; and
controlling, by the control unit, a low-power wide-area network (LPWAN) module of the article processing terminal to send an article change message to a LPWAN gateway, wherein the article change message comprises the article identifier and an address of an application server, and wherein the LPWAN gateway instructs, based on the article change message and the address, the application server to record change status information representing one or more properties of the signals generated by the electronic tags.

US Pat. No. 10,909,085

BLOCKCHAIN-BASED DATA PROCESSING METHOD AND DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:receiving, by a node in a blockchain network, service data generated by a first service, wherein the service data comprises a data structure having a field a value of which indicates that the first service is associated with a first processing level;
storing, by the node based on the value of the field, the service data in a first data processing queue selected from a plurality of data processing queues, wherein the first data processing queue corresponds to the first processing level, and each of the plurality of data processing queues corresponds to a different processing level;
determining a first quantity of service data to be read from the first data processing queue;
determining a second quantity of service data to be read from a second data processing queue of the plurality of data processing queues; and
generating, by the node, a new block that stores the first quantity of service data from the first data processing queue and the second quantity of service data from the second data processing queue,
wherein a quantity of service data read from each of the one or more of the plurality of data processing queues is determined in accordance with a condition for prioritizing storage of content from the plurality of data processing queues in the new block.

US Pat. No. 10,909,101

UPDATING AND QUERYING A BITMAP INDEX

Advanced New Technologies...

1. A computer-implemented method, comprising:determining, based on update data, a to-be-updated row of a bitmap index that indexes data of a database using a bitmap data structure;
locking the to-be-updated row of the bitmap index including adding a row lock to the to-be-updated row, thereby preventing the to-be-updated row from being updated by other update operations, wherein at least one other row of the bitmap index remains unlocked for updating by other update operations; and
updating data in the to-be-updated row of the bitmap index based on the update data, wherein the updating comprises:
determining a column value of a main table primary key column and a column value of an index column of the update data; and
writing the column value of the main table primary key column and the column value of the index column of the update data into the to-be-updated row of the bitmap index.

US Pat. No. 10,909,644

BLOCKCHAIN-BASED JUDGMENT EXECUTION

Advanced New Technologies...

1. A computer-implemented system comprising:a blockchain-based judgement execution tool configured to execute court ordered judgements; and
a trusted service layer comprising a trusted timing module, a trusted identity module, and a trusted computing module, wherein the trusted computing module comprises one or more data processors,
wherein the judgement execution tool is configured to, upon receiving a court ordered judgement that specifies a debtor, a creditor, and an amount of debt owed by the debtor to the creditor,
invoke the trusted identity module to determine that the court ordered judgement is authentic based on matching with a hash value associated with the court ordered judgement recorded on a blockchain,
invoke the trusted identity module to verify an identity of a debtor and an identity of the creditor,
invoke the trusted timing module to generate a first verified time stamp representing a time when the court ordered judgement was received by the judgement execution tool,
identify one or more assets associated with the debtor,
collect, as a collected asset, at least a portion of the amount of debt from the one or more assets associated with the debtor,
send the collected asset to the creditor,
invoke the trusted timing module to generate a second verified time stamp representing a time when the collected asset was sent to the creditor, and
invoke the trusted computing module to process blockchain data to add a record in the blockchain, in which the record includes information about the identities of the debtor and creditor, the first and second verified time stamps, and an amount of the collected asset collected from the debtor and sent to the creditor.

US Pat. No. 10,908,893

PAGE UPDATE METHOD AND APPARATUS

Advanced New Technologies...

1. A computer-implemented method for page update, comprising:obtaining, at a server, a new page file of a progressive web application (PWA) page;
comparing, at the server, a current page file of the PWA page with the new page file, wherein the new page file and the current page file are stored at the server, and wherein the new page file and the current page file support display of the PWA page;
determining, at the server, that there is a difference between the current page file and the new page file; and
updating, at the server, a cache version in the new page file, wherein the new page file is used as the current page file, and wherein when a client accesses the PWA page, the cache version is used by the client to trigger a page style update of the PWA page in response to detecting that the cache version has been updated.

US Pat. No. 10,911,461

PARALLEL EXECUTION OF TRANSACTIONS IN A BLOCKCHAIN NETWORK BASED ON SMART CONTRACT WHITELISTS

Advanced New Technologies...

1. A computer-implemented method for parallel execution of transactions in a blockchain network, comprising:identifying, by one or more processors, a plurality of transactions to be executed in the blockchain network, wherein each of the plurality of transactions is digitally signed with a public encryption key and confirmed by decrypting using a private encryption key corresponding to the public encryption key;
arranging, by the one or more processors, the plurality of transactions in an execution order, wherein the plurality of transactions comprises one or more smart contract calls to one or more smart contracts;
identifying, by the one or more processors, one or more accounts to be affected by the plurality of transactions based upon a whitelist associated with each smart contract that comprises a list of accounts that are authorized to execute the smart contract;
determining, by the one or more processors, groups of transactions within the plurality of transactions based on an account dependency, wherein the account dependency is that transactions in a particular group do not affect any accounts in the blockchain network that are affected by transactions in a different group, and wherein a particular set of accounts associated with each of the one or more smart contract calls to be executed by the groups of transactions is determined based on the whitelists associated with the respective one or more smart contracts;
instructing, by the one or more processors, nodes of the blockchain network to execute each of the groups of transactions in parallel, wherein instructing nodes of the blockchain network to execute each of the groups of transactions in parallel comprises sending a message to the nodes over a network, and wherein executing the groups of transactions comprises executing the transactions within each group serially and according to the execution order;
determining by the one or more processors, that the nodes of the blockchain network have completed executing all of the groups of transactions, wherein determining that the nodes of the blockchain network have completed executing all of the groups of transactions comprises determining that all transactions in the plurality of transactions have been included in one or more blocks stored in a blockchain maintained by the blockchain network; and
in response to determining that the nodes of the blockchain network have completed executing all of the groups of transactions, instructing, by the one or more processors, the nodes of the blockchain network to execute a final smart contract call.

US Pat. No. 10,911,216

DATA ENCRYPTION AND DECRYPTION

Advanced New Technologies...

1. A computer-implemented method for data encryption, comprising:receiving, by a second peer end computing device, first data from a first peer end computing device;
generating, by the second peer end computing device, a random term R based on a result range pre-agreed upon with the first peer end computing device, wherein the result range comprises a minimum result value a and a maximum result value b, the random term R is a product of a random number r and an agreed upon constant c that is agreed upon between the first peer end computing device and the second peer end computing device, and the agreed upon constant c is greater than a first difference between the maximum result value b and the minimum result value a;
performing, by the second peer end computing device, a homomorphic operation based on the first data and local private second data thereby obtaining a first operation result;
obtaining, by the second peer end computing device, a second difference between the first operation result and the minimum result value a as a second operation result;
performing, by the second peer end computing device, homomorphic summation and encryption on the second operation result and the random term R thereby obtaining an encryption result; and
returning, by the second peer end computing device, the encryption result to the first peer end computing device.

US Pat. No. 10,911,220

SHARED BLOCKCHAIN DATA STORAGE BASED ON ERROR CORRECTION CODE

Advanced New Technologies...

1. A computer-implemented method for storing blockchain data, the computer-implemented method comprising:determining, by a blockchain node, block data associated with a current block of a blockchain;
performing, by the blockchain node, error correction coding of the block data to generate encoded data;
dividing, by the blockchain node based on one or more predetermined rules, the encoded data into a plurality of data sets, wherein the one or more predetermined rules comprise one or more instructions for dividing the encoded data to the plurality of data sets based on a quantity of blockchain nodes of a blockchain network and assignments of one or more data sets of the plurality of data sets to generate an equal distribution of data to be stored by each blockchain node of the quantity of blockchain nodes;
storing, by the blockchain node based on the one or more predetermined rules, one or more data sets of the plurality of data sets;
hashing, by the blockchain node, each data set of remaining data sets of the plurality of data sets to generate one or more hash values corresponding to the remaining data sets; and
storing, by the blockchain node, the one or more hash values.

US Pat. No. 10,911,231

METHOD FOR RESTORING PUBLIC KEY BASED ON SM2 SIGNATURE

Advanced New Technologies...

1. A computer-implemented method for recovering and verifying a public key, the computer-implemented method comprising:receiving information encoding parameters of an elliptic curve, a published public key, a hash value of a message, a digital signature, and an identification parameter;
generating a recovered public key based on the parameters of the elliptic curve, the hash value of the message, the digital signature, and the identification parameter, wherein generating the recovered public key comprises:
computing a first coordinate parameter based, at least, on the digital signature and the hash value, comprising:
subtracting the hash value from a first parameter included in the digital signature to generate a subtraction result, and
performing a modulo operation on the subtraction result to obtain the first coordinate parameter,
determining that the first coordinate parameter equals unity,
incrementing the first coordinate parameter by a specific prime number that characterizes an upper limit of a bounded range associated with the first parameter, and
computing modulo prime square roots of an elliptic equation characterized by the parameters of the elliptic curve to determine a second coordinate parameter, wherein the modulo prime square roots are computed for the elliptic equation instantiated by the first coordinate parameter; and
comparing the published public key and the recovered public key to verify the published public key.

US Pat. No. 10,911,244

RETRIEVING PUBLIC DATA FOR BLOCKCHAIN NETWORKS USING HIGHLY AVAILABLE TRUSTED EXECUTION ENVIRONMENTS

Advanced New Technologies...

1. A computer-implemented method for retrieving data from a data source that is external to a blockchain network, the method comprising:receiving, by a relay system smart contract executing within the blockchain network and from a client within the blockchain network, a request for data from the data source;
transmitting, by the relay system smart contract, the request to a relay system that is external to the blockchain network, the relay system comprising a multi-node cluster that comprises a plurality of relay system nodes, wherein a relay system controller periodically sends status queries to the plurality of relay system nodes in the multi-node cluster and receives status responses from the plurality of relay system nodes, the relay system controller recording a status of a relay system node in the multi-node cluster as available if receiving a status response from the relay system node within a predetermined time window, and the relay system controller recording the status of a relay system node of the multi-node cluster as unavailable if not receiving a status response from the relay system node within the predetermined time window;
receiving, by the relay system smart contract, a result provided from a relay system node of the multi-node cluster, the result being digitally signed with a digital signature using a private key of the relay system node, the result including the requested data from the data source;
verifying, by the relay system smart contract, that the relay system node is registered at the relay system smart contract;
in response to verifying that the relay system node is registered at the relay system smart contract, verifying, by the relay system smart contract, an integrity of the result based on a public key of the relay system node and the digital signature, wherein the relay system smart contract verifies the integrity of the result by comparing a first hash value to a second hash value, the first hash value being determined by decrypting the digital signature using the public key and the second hash value being calculated using the result and a hash function; and
in response to verifying the integrity of the result, transmitting the result to the client.

US Pat. No. 10,911,249

METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR COMMUNICATION BETWEEN BLOCKCHAIN NODES, AND METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR BLOCKCHAIN-BASED CERTIFICATE MANAGEMENT

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, at a first node in a blockchain, from a certificate authority distinct from the blockchain, a digital certificate of a second node in the blockchain and new validity status information of the digital certificate,
wherein the digital certificate comprises at least one of a certificate version number, certificate holder information, certificate authority information, and a certificate validity period;
storing, by the first node, the digital certificate in the blockchain;
accessing, by the first node, certificate validity information associated with each node in the blockchain, wherein the certificate validity information is stored in the blockchain, and wherein the certificate validity information reflects validity status information of digital certificates of each node in the blockchain;
determining, by the first node, that the new validity status information comprises certificate revocation information; and
in response to determining that the new validity status information comprises certificate revocation information, updating the certificate validity information to indicate that the digital certificate is invalid.

US Pat. No. 10,911,251

BLOCKCHAIN LEDGER AUTHENTICATION

Advanced New Technologies...

1. A computer-implemented method for performing authentication, comprising:determining, by a database server storing data in a blockchain ledger, a target ledger segment on which time service authentication is to be performed;
generating, by the database server, a Merkle tree corresponding to the target ledger segment, the Merkle tree being based on a set of one or more data blocks in the target ledger segment;
determining, by the database server, a root hash of the Merkle tree, the root hash of the Merkle tree being based on a block hash of each data block in the set of one or more data blocks;
executing, by the database server, a predetermined time capture process in a trusted execution environment to obtain a trusted time from an interface provided by a trusted time service organization;
generating, by the database server, a digital signature for the trusted time and the root hash in the trusted execution environment;
generating, by the database server, a time service certificate comprising the trusted time, the root hash, and the digital signature; and
storing, by the database server, the trusted time, the root hash, and the digital signature into a specified data block of the blockchain ledger;
the method further comprising: generating a new data block in the blockchain ledger, wherein generating the new data block in the blockchain ledger comprises:
receiving one or more data records, and determining a hash value of each data record;
determining that a predetermined block forming condition is satisfied;
determining that a sequence number of the new data block in the blockchain ledger is greater than 1; and
generating the new data block in the blockchain ledger, the new data block comprising the one or more data records and a hash value of the new data block,
wherein the hash value of the new data block is determined based on the one or more data records and a hash value of an adjacent previous block in the blockchain ledger.

US Pat. No. 10,909,223

COPYRIGHT PROTECTION BASED ON HIDDEN COPYRIGHT INFORMATION

Advanced New Technologies...

1. A computer-implemented method for hiding copyright information in a display screen, the method comprising:generating, by a computing device associated with the display screen, a unique identifier (ID) based on copyright information associated with digital content, wherein the copyright information and the digital content are recorded on a blockchain of a blockchain network, and
wherein the unique ID comprises a public key certificate issued by a certificate authority, the public key certificate comprising a digital signature of the certificate authority;
determining, by the computing device, one or more attributes associated with the display screen; and
embedding, by the computing device, the unique ID in content presented on the display screen by changing the one or more attributes associated with the display screen, the unique ID enabling retrieval of the copyright information from the blockchain based on the unique ID.

US Pat. No. 10,909,227

CERTIFICATE VERIFICATION

Advanced New Technologies...

1. A computer-implemented certificate verification method, comprising:obtaining, by a certificate verification module, at least two images of a certificate, wherein the at least two images are acquired under different acquisition conditions;
obtaining, from the at least two images, at least two target images that correspond to respective images of the at least two images and that each comprise an image of a light-reflective coating of the certificate;
extracting values corresponding to the light-reflective coating from the at least two target images;
dividing each of the at least two target images into areas;
comparing the extracted values from corresponding areas of the target images to obtain respective comparison scores for the areas;
aggregating the comparison scores to obtain an overall score; and
determining, based on the extracted values from the at least two target images, a probability that the certificate is an original including applying a decision policy to the overall score, wherein the decision policy maps aggregated overall scores computed from target images for a certificate to corresponding probabilities that the certificate is an original.

US Pat. No. 10,908,974

SYSTEM AND METHOD FOR BLOCKCHAIN-BASED NOTIFICATION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for blockchain-based notification, comprising:determining, by a server, a current state of a workflow by obtaining information in a block of a blockchain, wherein a blockchain contract deployed in the blockchain is executable to update the current state among a plurality of states of the workflow;
updating, by the server, a local state machine based on the determined current state, wherein:
the local state machine is maintained off the blockchain by the server,
the local state machine comprises a plurality of local states configured in a cycle,
the plurality of states of the workflow are configured in a different cycle, and
the plurality of local states are respectively mapped to the plurality of states of the workflow; and
in response to determining that the updated local state machine corresponds to one of the plurality of states, transmitting, by the server, a notification message to one or more computing devices of one or more subscribers subscribing to the one state.

US Pat. No. 10,910,000

METHOD AND DEVICE FOR AUDIO RECOGNITION USING A VOTING MATRIX

ADVANCED NEW TECHNOLOGIES...

1. A method for audio recognition, comprising:establishing an audio characteristic value comparison table based on audio variation trends among frames and within each of the frames of sample data, the sample data including multiple segments of sample audio;
obtaining, from a sound signal, audio data to be recognized;
dividing the audio data to be recognized to obtain a plurality of frames of the audio data;
calculating, based on audio variation trends among the plurality of frames and within each of the plurality of frames, a characteristic value for each frame of the audio data to be recognized;
establishing a voting matrix according to the number of segments of the sample audio and the number of frames of each segment of the sample audio;
determining, by looking up in the audio characteristic value comparison table, a first frame of a segment of the sample audio that has the same characteristic value as that of a first frame of the audio data to be recognized, and marking a voting label at a position in the voting matrix corresponding to the first frame of the segment of the sample audio;
in response to determining that one or more second frames of the segment of the sample audio have the same characteristic values as those of one or more second frames of the audio data to be recognized, respectively marking one or more voting labels at the position in the voting matrix corresponding to the first frame of the segment of the sample audio, the one or more second frames of the audio data to be recognized coming after the first frame in the audio data to be recognized and the one or more second frames of the segment of the sample audio coming alter the first frame of the segment of the sample audio; and
in response to determining that a sum of the voting labels at the position in the voting matrix corresponding to the first frame of the segment of the sample audio is higher than a threshold, using the first frame of the segment of the sample audio as a starting frame to match the characteristic values of the segment of the sample audio and the audio data to be recognized to obtain a recognition result.

US Pat. No. 10,909,233

PAYMENT PASSWORD RESET METHOD AND APPARATUS, AND ELECTRONIC DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A method for resetting a payment password, comprising:training, by one or more processors, a prediction model with sample data, wherein the sample data comprises user data of one of the following users:
(a) first users having historical payment behaviors indicating a frequency of using payment passwords greater than a threshold and having payment failure due to an incorrect or a locked payment password; and
(b) second users having historical payment behaviors indicating a frequency of using payment passwords greater than the threshold, who do not reset their respective payment passwords within a preset time period, and who made a successful payment with their respective payment passwords;
obtaining, by the one or more processors, user information of a user as an input feature to the trained prediction model;
predicting, by the one or more processors using the trained prediction model according to a set of determination conditions, whether the user has forgotten a payment password associated with a payment application; and
in response to the predicting that the user has forgotten the payment password associated with the payment application and detecting the user logging in the payment application with a login password different from the payment password associated with the payment application, displaying, by the one or more processors, a user interface for directing the user to a payment password resetting interface for resetting the payment password associated with the payment application.

US Pat. No. 10,909,234

METHOD AND APPARATUS FOR UNLOCKING USER INTERFACE

Advanced New Technologies...

1. A method implemented by a computing device, the method comprising:selecting an unlocking password applicable to an unlocking interface from a plurality of passwords in response to the unlocking interface being triggered;
performing a corresponding prompt operation based on prompt information that corresponds to the unlocking password, different prompt operations being used for distinguishing different passwords of the plurality of passwords and comprising displaying different patterns of shapes or different colors of characters for the different passwords of the plurality of passwords; and
unlocking a locked state of the unlocking interface in response to receiving a user input password that matches the unlocking password, wherein the plurality of passwords are sequentially selected to be a valid password according to a preset order.

US Pat. No. 10,911,541

DATA TRANSMISSION AND NETWORK INTERFACE CONTROLLER

Advanced New Technologies...

1. A computer-implemented method, comprising:communicating, by a second RDMA network interface controller of a second host with a first RDMA network interface controller of a first host, to receive m data packets from the first RDMA network interface controller, wherein the m data packets have been backed up by the first RDMA network interface controller to a first network interface controller memory integrated into the first RDMA network interface controller, m being a positive integer; and
in response to determining that n data packets of the m data packets have not been received, n being a positive integer:
storing, by the second RDMA network interface controller, received data packets of the m data packets into a second network interface controller memory integrated into the second RDMA network interface controller;
waiting, by the second RDMA network interface controller, to receive the n data packets having been retransmitted by the first RDMA network interface controller, wherein the retransmitted n data packets are obtained by the first RDMA network interface controller from the first network interface controller memory; and
after the retransmitted n data packets have been received by the second RDMA network interface controller, transmitting the received data packets together with the retransmitted n data packets to a host memory of the second host.

US Pat. No. 10,909,252

BLOCKCHAIN-BASED RELATIONSHIP BINDING METHOD, APPARATUS, AND DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A blockchain-based user binding method, comprising:receiving, by a blockchain node of a blockchain, a user binding request from a computing device of a first user, wherein the user binding request comprises user information of the first user, user information of a second user to be bound with the first user, and a binding tag, the binding tag comprising (1) a binding type of a binding relationship, and (2) role information of the second user in the binding relationship;
retrieving, by the blockchain node, information of a user terminal of the second user based on a mapping between the user information of the second user and the user terminal;
sending, by the blockchain node through a smart contract, a binding relationship confirmation request to the user terminal of the second user based on the information of the user terminal, the binding relationship confirmation request comprising the user information of the first user and the binding tag;
in response to receiving a confirming response from the second user, retrieving, by the blockchain node, a relationship table of the second user from a local database of the blockchain node, wherein the relationship table of the second user comprises a primary dimension comprising the user information of the second user, a secondary dimension comprising user information of one or more users that have been bounded with the second user, a tertiary dimension comprising one or more binding types of one or more historical binding relationships between the second user and the one or more users, and a quaternary dimension comprising the role information of the second user in the one or more historical binding relationships;
determining, by the blockchain node through the smart contract, attribute information of the binding type in the user binding request, wherein the smart contract stores a mapping relationship between the attribute information and the binding type;
in response to the attribute information indicating that the binding type in the user binding request comprises a one-to-one binding relationship:
determining whether the one or more binding types in the relationship table of the second user comprise the binding type in the user binding request, and
if yes, sending binding failure information to the first user and terminating the method;
in response to (1) the attribute information indicating that the binding type in the user binding request comprises a one-to-many binding relationship with a “one” aspect and a “many” aspect, and (2) the role information of the second user in the binding relationship corresponds to the “many” aspect of the one-to-many binding relationship:
determining whether the relationship table of the second user comprises a record with (1) the binding type in the user binding request in the tertiary dimension, and (2) the role information of the second user in the quaternary dimension; and
if yes, sending the binding failure information to the first user and terminating the method;
generating, by the blockchain node, a record of binding relationship between the first user and the second user by associating the user information of the first user, the user information of the second user, and the binding tag;
encrypting, by the blockchain node, the record of binding relationship into a ciphertext and storing the ciphertext on the blockchain, wherein the stored ciphertext is validated by a plurality of parties;
updating, by the blockchain node, the relationship table of the second user in the local database according to the user binding request, and
wherein one or more authorized users are allowed to query records of binding relationship stored on the blockchain.

US Pat. No. 10,909,262

DATA ISOLATION IN A BLOCKCHAIN NETWORK

Advanced New Technologies...

1. A computer-implemented method, comprising:repeatedly performing the following operations to process one or more transactions:
performing, by a node belonging to a first distributed ledger network, a transaction that is submitted by a user of the first distributed ledger network and that is associated with two or more respective transaction participants; and
generating, by the node belonging to the first distributed ledger network, a private representation of the transaction that is accessible only to the two or more respective transaction participants for storage in the first distributed ledger network, the private representation of the transaction comprising a hash of the transaction;
determining whether a condition for releasing information that relates to the one or more transactions has been satisfied;
in response to a positive determination, releasing information that relates to the one or more transactions including:
generating, by the node belonging to the first distributed ledger network and based on the one or more transactions that have been performed, a public representation accessible to at least one node belonging to a second distributed ledger network, the public representation specifying an account balance update of each of the two or more respective transaction participants as a result of the one or more transactions; and
broadcasting, by the node belonging to the first distributed ledger network, the public representation for inclusion in the second distributed ledger network.

US Pat. No. 10,909,519

FOOD ORDERING CONSOLE AND FOOD ORDERING DEVICE

Advanced New Technologies...

1. A food ordering system, comprising:an ordering machine console that comprises:
a housing that comprises:
a front cover; and
a rear cover attached to the front cover, wherein the rear cover comprises a main body and a protrusion that extends from the main body in a direction away from the front cover;
a display, disposed between the front cover and the main body of the rear cover; and
one or more of a printer and a scanner that are at least partially disposed between the front cover and the protrusion, wherein the printer corresponds to a first opening disposed in the front cover that makes room for output from the printer, and the scanner corresponds to a second opening disposed in the front cover that makes room for input to the scanner; and
a base that comprises a part holder, wherein the protrusion of the ordering machine console is insertable to the part holder to securely assemble the ordering machine console to the base.

US Pat. No. 10,909,775

METHOD AND DEVICE FOR IN-VEHICLE PAYMENT

Advanced New Technologies...

1. A computer-implemented method for in-vehicle payment, comprising:receiving, using a smart terminal device, a face image of a user and a geographic location of the user;
transmitting, from the smart terminal device to an image database, a request for an image set associated with the geographic location, wherein the request comprises one or more coordinates that correspond to the geographic location;
receiving, on the smart terminal device from the image database in response to the request, an image set associated with the one or more coordinates that correspond to the geographic location, wherein the image set comprises face images of a plurality of users; and
comparing, using the smart terminal device, the face image of the user with face images in the image set to determine an identity of the user.

US Pat. No. 10,909,269

SECURE COMMUNICATIONS IN A BLOCKCHAIN NETWORK

Advanced New Technologies...

1. A computer-implemented method for improving security of a blockchain network, comprising:obtaining, by a first node of the blockchain network, a first certificate authority (CA) trust list comprising a plurality of CA identifiers;
receiving, by the first node from a second node of the blockchain network, a communication request comprising a public key certificate of the second node;
determining, by the first node of the blockchain network, a first CA identifier from the received public key certificate of the second node of the blockchain network;
determining, by the first node of the blockchain network, that the first CA identifier matches one of the plurality of CA identifiers of the first CA trust list; and
in response to determining that the first CA identifier matches one of the plurality of CA identifiers of the first CA trust list, approving, by the first node of the blockchain network, the communication request, comprising transmitting, by the first node of the blockchain network and to the second node of the blockchain network, a verification request comprising a public key certificate of the first node, wherein the second node comprises a second CA trust list comprising a plurality of CA identifiers;
determining, by the second node, a second CA identifier from the received public key certificate of the first node;
determining that the second CA identifier matches one of the plurality of CA identifiers of the second CA trust list of the second node; and
in response to determining that the second CA identifier matches one of the plurality of CA identifiers of the second CA trust list, establishing a communication session with the first node.

US Pat. No. 10,908,770

PERFORMING VIRTUAL REALITY INPUT

Advanced New Technologies...

1. A computer-implemented method, comprising:generating, by a virtual reality (VR) device, a plurality of VR scenarios;
presenting, by a VR application operating on the VR device, one VR scenario of the plurality of VR scenarios that includes a polygonal shaped virtual element configured to interact with the VR application;
determining an effective interaction region (EIR) of the virtual element that the virtual element can effectively interact with, the EIR having a circular shape with a diameter not greater than a shortest side length of the virtual element;
determining a trajectory of an operational focus of the VR application based on a movement sensed by the VR device;
determining, by enabling a timer by the VR application operating on the VR device, a duration of time from when the operational focus enters the EIR to when an area of enclosure of the operational focus bound within the EIR is greater than a predetermined percentage of an area of the EIR;
selecting the virtual element when the duration of time is less than or equal to a predetermined time limit;
in response to selecting the virtual element, initiating a payment service associated with the VR application; and
presenting, by the VR device, an input interface in the one VR scenario to receive payment service information associated with the payment service.

US Pat. No. 10,909,795

SYSTEM AND METHOD FOR INFORMATION PROTECTION

ADVANCED NEW TECHNOLOGIES...

1. A non-transitory computer-readable storage medium of a recipient node associated with a recipient of a transaction, the storage medium storing instructions that, when executed by a processor, cause the processor to perform operations comprising:obtaining a transaction amount t of the transaction from a sender node associated with a sender of the transaction, a transaction blinding factor r_t, and a transaction commitment value T;
verifying the transaction by verifying the obtained transaction commitment value T based on the obtained transaction amount t and the obtained transaction blinding factor r_t;
in response to successfully verifying the transaction, generating an encrypted combination by encrypting the transaction blinding factor r_t and the transaction amount t with a public key PK_B of the recipient; and
transmitting the encrypted combination to the sender node.

US Pat. No. 10,909,314

CARD-BASED INFORMATION DISPLAYING METHOD AND APPARATUS, AND INFORMATION DISPLAYING SERVICE PROCESSING METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A card-based information displaying method for a client, wherein the method comprises:in response to a request for target information to be displayed on the client, obtaining, from a server, the target information to be displayed and a card type of a first card for displaying the target information, wherein the client contains a list which contains card types that are supported by a configuration version of the client;
obtaining, from the server, a second card supported by the configuration version of the client at the same time as obtaining the target information and the card type of the first card;
caching the second card;
matching the card type of the first card with the card types contained in the list;
according to a result of the matching, determining whether the configuration version of the client supports the card type of the first card;
when it is determined that the configuration version of the client does not support the card type of the first card, determining an association identifier corresponding to the first card, and associating the cached second card supported by the configuration version of the client with the association identifier; and
responsive to associating the cached second card with the association identifier, displaying the target information on the client using the cached second card.

US Pat. No. 10,909,317

BLOCKCHAIN-BASED TEXT SIMILARITY DETECTION METHOD, APPARATUS AND ELECTRONIC DEVICE

Advanced New Technologies...

1. A computer-implemented method for detecting text similarity, comprising:receiving, by a network node in a blockchain network, a first transaction comprising first text, wherein the first text is text whose similarity to a target original text is to be detected, wherein the first text comprises at least one first text unit of a predetermined length;
invoking, by the network node in the blockchain network, a smart contract deployed in the blockchain network for detecting a similarity to the target original text, wherein the smart contract stores several target text vectors, and each target text vector is generated based on a target text unit of the predetermined length comprised in the target original text;
executing, by the network node in the blockchain network, text similarity detection logic stated in the smart contract and obtaining a detection result of similarity between the first text and the target original text, wherein executing the text similarity detection logic stated in the smart contract comprises:
generating at least one first text vector for the at least one first text unit;
calculating a distance between the at least one first text vector and the each target text vector; and
comparing the distance with a predetermined distance threshold, wherein if the distance is less than the predetermined distance threshold, a similarity detection result of the at least one first text unit is “similar”, and wherein the detection result of similarity between the first text and the target original text comprises the similarity detection result of the at least one first text unit;
obtaining a second text comprising at least one similar first text unit, wherein the similar first text unit is a first text unit whose similarity detection result is “similar”;
dividing the second text into a plurality of second text units of the predetermined length;
sending a second transaction comprising the plurality of second text units to the blockchain network;
invoking the smart contract;
executing the text similarity detection logic stated in the smart contract and obtaining a detection result of similarity between each of the plurality of second text units and the target original text; and
calculating a similarity between the second text and the target original text based on a second text unit whose similarity detection result is “similar”.

US Pat. No. 10,892,888

SYSTEM AND METHOD FOR INFORMATION PROTECTION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method, comprising:obtaining, by one or more nodes, a plurality of commitment values corresponding to one or more data inputs and one or more data outputs of a transaction, a basepoint used to generate the plurality of commitment values, and a parameter, wherein the one or more data inputs respectively correspond to one or more input data types, the one or more data outputs respectively correspond to one or more output data types, and the plurality of commitment values are generated based at least on respectively committing, by a different node, hash values of the input data types and the output data types according to a commitment scheme based on the basepoint and a plurality of blinding factors;
generating, by the one or more nodes, a plurality of unverified differences based on the plurality of commitment values;
generating, by the one or more nodes, a hash value based on the plurality of unverified differences;
generating, by the one or more nodes, a plurality of polynomials based on the plurality of unverified differences and the hash value; and
determining, by the one or more nodes, that the one or more input data types are consistent with the one or more output data types by determining that a sum of the plurality of polynomials matches a product of the parameter and the basepoint, without receiving plaintexts of the one or more input data types and the one or more output data types; and
adding, by the one or more nodes, the transaction to a blockchain.

US Pat. No. 10,891,609

TRANSACTION CARD AND INFORMATION DISPLAYING METHOD

ADVANCED NEW TECHNOLOGIES...

1. A transaction card corresponding to a server that provides a transaction service, the transaction card comprising: a card body, a power supply, a communication circuit, a graphic code generation circuit, and a display device, wherein:the power supply, the graphic code generation circuit, and the display device are embedded within the card body, and the power supply is connected to the graphic code generation circuit and the display device;
the communication circuit is connected to the power supply, the graphic code generation circuit, and the display device, and configured to receive target information sent by the server for the transaction card and/or sending a target request message to the server, and the communication circuit includes a near field communication circuit configured to communicate with a user terminal via a near field communication connection;
the graphic code generation circuit is configured to:
generate, when the transaction card is not connected to the server, a first graphic payment code and a graphic payment collection code based on transaction account information of a user; and
periodically generate a new graphic payment code, and replace the first graphic payment code displayed by the display device with the new graphic payment code; and
the display device is configured to sequentially display the first graphic payment code and the new graphic payment code with a constant luminance, and display the graphic payment collection code with a gradual change of luminance.

US Pat. No. 10,892,898

SHARED BLOCKCHAIN DATA STORAGE

Advanced New Technologies...

1. A computer-implemented method for communicating shared blockchain data, the method comprising:obtaining, by a consensus node of a blockchain network, current state information corresponding to an account state associated with one or more transactions of a current block in a blockchain of the blockchain network;
sending, by the consensus node, the current state information associated with the current block of the blockchain to one or more shared storage nodes of the blockchain network, wherein the consensus node stores the current state information and the one or more shared storage nodes store historic state information associated with every block of the blockchain as a historic state tree, and wherein the historic state tree includes key-value pairs (KVPs) with values being account states of accounts associated with the blockchain network and keys being hash values of the corresponding account states;
obtaining, by the consensus node, a hash value corresponding to the account state stored in the historic state tree;
sending, by the consensus node, the hash value to the one of the one or more shared storage nodes for retrieving the account state stored in the historic state tree;
receiving, by the consensus node, the account state in response to sending the hash value; and
verifying, by the consensus node, that the account state is part of the blockchain based on the hash value and the historic state tree, and
wherein the one or more shared storage nodes are elected by receiving 2f+1 votes from all 3f+1, 3f+2, or 3f+3 nodes of the blockchain network, and wherein f is a maximum number of faulty shared storage nodes and consensus nodes that can be tolerated within the blockchain.

US Pat. No. 10,885,160

USER CLASSIFICATION

Advanced New Technologies...

1. A computer-implemented user classification method, comprising:obtaining, by a target terminal device, an initial user classification model from a server, wherein the initial user classification model is provided by the server to multiple terminal devices, the multiple terminal devices comprising the target terminal device;
obtaining first operation data of a registered user of the target terminal device during a first time period, the first operation data recording one or more operations performed by the registered user on the target terminal device;
delaying updating the initial user classification model for a predetermined amount of time after an occurrence time of the one or more operations during the first time period in order to prevent the initial user classification model from learning based on an operation of a user other than the registered user;
the predetermined amount of time after the occurrence time of the one or more operations, updating the initial user classification model based on the first operation data, to obtain an updated user classification model that is personalized for the registered user; and
classifying, based on the updated user classification model, an identity of a current user of the target terminal device.

US Pat. No. 10,885,171

AUTHENTICATION VERIFICATION USING SOFT BIOMETRIC TRAITS

Advanced New Technologies...

1. A method for verifying an authenticated state of a device, the method comprising:capturing, during a primary authentication process in which primary user identifying information is obtained for a subject using the device, first auxiliary user identifying information for short-term authentication verification of the subject, wherein the first auxiliary user identifying information comprises first eyebrow biometric information for the subject and first eyeglass frame information for the subject;
determining, after the primary authentication process, to perform a short-term authentication verification process to verify identify of the subject; and
performing the short-term authentication verification process, including:
capturing second auxiliary user identifying information for the subject, including second eyebrow biometric information for the subject and second eyeglass frame information for the subject;
comparing the first auxiliary user identifying information to the second auxiliary user identifying information including determining a match score that indicates a degree of match between the first auxiliary user identifying information and the second auxiliary user identifying information;
determining whether the match score meets or exceeds a predetermined threshold score;
in response to determining that the match score meets or exceeds the predetermined threshold score, verifying the authenticated state for the subject in which continued use of the device is allowed; and
in response to determining that the match score does not meet or exceed the predetermined threshold score, ending the authenticated state for the subject including disabling use of the device by the subject.

US Pat. No. 10,885,178

METHODS AND DEVICES FOR GENERATING SECURITY QUESTIONS AND VERIFYING IDENTITIES

Advanced New Technologies...

1. A computer-implemented method, comprising:identifying, by a server, an account to be verified by a security question;
sending, by the server, a security question generation instruction to a user device associated with the account;
receiving, at the server, a reference picture from the user device, wherein the reference picture is generated by the user device based on the security question generation instruction, the reference picture is one of: (i) a photograph captured by the user device, or (ii) a drawing generated by the user device based on user input;
determining, by the server, one or more feature values of the reference picture;
selecting, by the server from a pool of images and based on the one or more feature values, a plurality of confusion pictures corresponding to the reference picture, wherein corresponding one or more feature values for each of the confusion pictures are within corresponding ranges of the one or more feature values of the reference picture;
generating, by the server, a security question based on the reference picture and the plurality of confusion pictures, wherein the reference picture is a correct answer option and each of the confusion pictures is an incorrect answer option;
sending the security question comprising the reference picture and the confusion pictures the to the user device;
receiving, by the server, a selection result returned by the user device;
determining, by the server, that the selection result corresponds to the reference picture; and
in response to determining that the selection result corresponds to the reference picture, determining that a verification of the account has succeeded.

US Pat. No. 10,885,203

ENCRYPTED DATA EXCHANGE

Advanced New Technologies...

1. A computer-implemented method for a first data party and a second data party to jointly and securely compute an aggregated result from user data stored by the second data party for a set of users whose membership is maintained by the first data party without the second data party being exposed to the membership of the set and without the first data party being exposed to the user data, the method comprising:encrypting, by the first data party, identification data representing membership in the set of users, to generate a first identification data ciphertext;
sending, by the first data party to the second data party, the first identification data ciphertext representing membership in the set of users;
receiving, by the first data party from the second data party, a second identification data ciphertext obtained by the second data party encrypting the first identification data ciphertext;
performing, by the first data party, a homomorphic decryption process on the second identification data ciphertext to generate a third identification data ciphertext representing the membership of the set encrypted by the second data party but not by the first data party;
receiving, by the first data party, from the second data party, a ciphertext set, the ciphertext set comprising encrypted identification data stored by the second data party, homomorphically encrypted user data stored by the second data party, and mappings between identities in the encrypted identification data and corresponding encrypted user data;
calculating, by the first data party, an intersection set of the encrypted identification data and the third identification data ciphertext;
calculating, by the first data party, a homomorphic addition result of encrypted user data mapped to the intersection set; and
sending, by the first data party, the homomorphic addition result to the second data party, the homomorphic addition result being decryptable by the second data party to obtain the aggregated result.

US Pat. No. 10,885,207

METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR BLOCKCHAIN-BASED RECORDKEEPING

ADVANCED NEW TECHNOLOGIES...

1. A device comprising: one or more processors and one or more non-transitory computer-readable mediums coupled to the one or more processors and configured with instructions executable by the one or more processors to cause the device to perform operations comprising:capturing streaming target data comprising video data or audio data;
applying a hash algorithm to each of a plurality of fragments of the target data to respectively generate a plurality of hash values, each of the hash values corresponding to one of the plurality of fragments;
periodically extracting a key segment from the streaming target data by:
detecting an abnormal event in the video data, and extracting a video segment corresponding to an occurrence period of the abnormal event as the key segment; or
detecting a keyword in the audio data, and extracting an audio segment of a preset length comprising the preset keyword as the key segment;
digitally signing, in a trusted execution environment (TEE) of the device, the corresponding hash value and the extracted key segment by using a private key stored in the TEE to generate a signature;
generating a blockchain transaction comprising the corresponding hash value, the extracted key segment, and the signature; and
transmitting the blockchain transaction to a blockchain network for consensus processing and storage of the corresponding hash value and the extracted key segment to a blockchain on the blockchain network.

US Pat. No. 10,885,735

SYSTEM AND METHOD FOR INFORMATION PROTECTION

ADVANCED NEW TECHNOLOGIES...

1. A non-transitory computer-readable storage medium of a sender node associated with a sender of a transaction, the storage medium storing instructions that, when executed by a processor, cause the processor to perform operations comprising:generating a transaction commitment value T by committing a transaction amount t of the transaction according to a commitment scheme based at least on a transaction blinding factor r_t;
sending the transaction amount t, the transaction blinding factor r_t, and the transaction commitment value T to a recipient node associated with a recipient of the transaction for the recipient to verify the transaction and to encrypt the transaction blinding factor r_t and the transaction amount t with a public key PK_B of the recipient;
obtaining an encrypted combination of the transaction blinding factor r_t and the transaction amount t from the recipient node after the recipient successfully verifying the transaction; and
transmitting an updated version of the transaction to a plurality of nodes in a blockchain for the plurality of nodes to verify the transaction, the updated version of the transaction comprising the encrypted combination and the transaction commitment value T.

US Pat. No. 10,885,511

METHODS AND DEVICES FOR BARCODE BASED COMMUNICATION AND PAYMENT IMPLEMENTATION

Advanced New Technologies...

1. A computer-implemented method for barcode-based communication, the computer-implemented method comprising:determining, by one or more processors of a first device, first transmission information to send to a second device, the first transmission information comprising a service request, and a user account information;
generating, by the one or more processors of the first device, a first barcode based on the first transmission information;
displaying, by the first device, the first barcode for scanning by the second device during a predetermined display time;
determining, by the one or more processors of the first device, that the predetermined display time expired;
retrieving, by the first device using a near field communication method, a second barcode generated by the second device, the second barcode comprising second transmission information generated by the second device based on a processing result of the first transmission information, the second transmission information comprising a service result and a display adjustment request specifying a modification of a display parameter of the first device, wherein the display parameter comprises at least one of a screen brightness and a camera status;
retrieving, by the one or more processors of the first device, the second transmission information by processing the second barcode;
adjusting, by the one or more processors of the first device, the display parameter of the first device based on the display adjustment request of the second transmission information; and
in response to adjusting the display parameter, redisplaying, by the first device, the first barcode for scanning by the second device to complete a service without connecting to a remote server.

US Pat. No. 10,887,321

TECHNIQUES TO VERIFY MESSAGE AUTHENTICITY

Advanced New Technologies...

1. A computer-implemented method executed by one or more computers, the method comprising:receiving, by the one or more computers, one or more messages sent to one or more user computing devices;
for each message :of the one or more messages:
hashing, by the one or more computers, an identifier of the respective message and a time stamp to generate a numerical sequence;
extracting, by the one or more computers, a final portion of the numerical sequence to generate an anti-forgery code of the respective message, wherein the anti-forgery code of the respective message comprises the final portion of the numerical sequence and the time stamp;
generating, by the one or more computers, a respective entry comprising a user identifier and feature information of the respective message, wherein the feature information comprises a message content feature value of the respective message and the anti-forgery code;
receiving, by the one or more computers and from a user computing device, a verification request to verify authenticity of a first message received by the user computing device, the verification request comprising a first user identifier and verification information;
retrieving, by the one or more computers, a delivery message record comprising a plurality of entries associated with the one or more messages sent to the one or more user computing devices;
identifying, by the one or more computers, at least one entry of the plurality of entries that has a second user identifier that matches the first user identifier, and in response
determining, by the one or more computers, that the feature information of the at least one entry matches the verification information from the verification request by processing both the message content of the first message and the anti-forgery code of the first message; and
in response to determining that the feature information matches the verification information, providing, by the one or more computers, a verification message to the user computing device, the verification message indicating that authenticity of the first message is verified.

US Pat. No. 10,885,022

LOG-STRUCTURED STORAGE SYSTEMS

Advanced New Technologies...

1. A storage system comprising:a multi-tier storage subsystem comprising a plurality of tiers of storage devices;
an input/output (I/O) subsystem comprising:
one or more first processors; and
one or more first computer-readable memories coupled to the one or more first processors and having first instructions stored thereon that are executable by the one or more first processors to perform first operations comprising:
receiving blockchain data generated by a blockchain network, wherein the blockchain data comprise one or more types of data comprising blockchain block data, blockchain transaction data, and blockchain state data, wherein the blockchain block data comprise at least one block in a blockchain and a hash value of a previous block in the blockchain, and the blockchain state data comprise a world state of the blockchain network;
performing a write operation of the blockchain data into a data log file, wherein the data log file is an append-only file that stores the blockchain data and the data log file is stored in one of the plurality of tiers of storage devices, wherein performing the write operation comprises appending the blockchain data in a chronological order according to a time when the blockchain data are generated by the blockchain network; and
in response to determining a seal condition is met, sealing the data log file and refraining from writing additional blockchain data into the data log file, wherein the seal condition comprises a predetermined threshold of writing into the data log file; and
a back-end data management subsystem comprising:
one or more second processors; and
one or more second computer-readable memories coupled to the one or more second processors and having second instructions stored thereon that are executable by the one or more second processors to perform second operations comprising performing a management operation of the data log file that stores the blockchain data, wherein performing the management operation of the data log file comprises performing the management operation of the data log file by the back-end data management subsystem independently from performing the write operation by the I/O subsystem, by performing the management operation, by the back-end data management subsystem, of the data log file after the data log file is sealed,
wherein the first operations further comprise:
generating, by the I/O subsystem, an index that indicates a physical location of the data log file stored in the one of the plurality of tiers of storage devices;
storing, by the I/O subsystem, the index into an index log file that is stored in one of the plurality of tiers of storage devices that has a fastest access speed among the plurality of tiers of storage devices; and
in response to determining a second seal condition is met, sealing, by the I/O subsystem, the index log file and refraining from writing additional index data into the index log file, wherein the second seal condition comprises a second predetermined threshold of writing into the index log file; and
wherein the second operations further comprise:
performing, by the back-end data management subsystem, a management operation of the index log file after the index log file is sealed; and
generating, by the back-end data management subsystem, a second index log file indicating location information of the data log file after performing the management operation of the data log file after the data log file is sealed.

US Pat. No. 10,884,767

SERVICE PROCESSING METHODS AND DEVICES

Advanced New Technologies...

1. A method for providing uniform instructions for modifying presentation of data on a display, the method comprising:detecting a device type of an electronic device, wherein the device type comprises one of following: a virtual reality (VR) device, a device that supports a gravity sensing function, a device that supports a gesture recognition function, or a device that accesses a mouse;
receiving, from a development side device, an instruction need message defining a correspondence between the device type, a device interacting instruction, and a unified interaction instruction;
configuring an instruction processing rule by defining a process for converting a first device interaction instruction to the unified interaction instruction for the device type according to the instruction need message;
invoking the instruction processing rule;
obtaining, based on the instruction processing rule, the first device interaction instruction initiated in response to a user interacting with the electronic device, wherein the first device interaction instruction comprises an instruction generated in response to the user interacting with the electronic device;
converting, according to the instruction processing rule, the first device interaction instruction into a first unified interaction instruction corresponding to the first device interaction instruction; and
updating interaction data output to a display based on the first unified interaction instruction.

US Pat. No. 10,887,083

DATA STORAGE METHOD, DATA QUERY METHOD AND APPARATUSES

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:receiving, from a first blockchain node of a blockchain network, a query for encrypted data stored in a blockchain, wherein the encrypted data comprises an unencrypted part;
determining, through one or more smart contracts and based on the unencrypted part, first attribute information of the encrypted data;
determining whether the first blockchain node has permission to query data associated with the first attribute information;
in response to determining that the first blockchain node has the permission: sending the encrypted data to an encryption device to decrypt the encrypted data to obtain decrypted data and return the decrypted data to the first blockchain node, wherein the encryption device is a third-party device that is not a blockchain node;
after the decrypted data is returned to the first blockchain node, determining, through the one or more smart contracts, an expense to be deducted from an account of the first blockchain node for querying the encrypted data; and
sending a node identifier of the first blockchain node and the expense to other blockchain nodes of the blockchain network, enabling each of the other blockchain nodes to store the node identifier and the expense in the blockchain after the node identifier and the expense are successfully verified through at least a first consensus verification.

US Pat. No. 10,887,084

SYSTEM AND METHOD FOR IMPLEMENTING A RESOLVER SERVICE FOR DECENTRALIZED IDENTIFIERS

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for implementing a resolver service, comprising:obtaining, from a blockchain, event data of a plurality of blockchain transactions associated with a plurality of decentralized identifiers (DIDs);
storing the event data in a database;
receiving a request for information associated with the event data, wherein the request comprises one or more account identifiers;
identifying one or more DIDs respectively corresponding to the one or more account identifiers based on pre-stored mapping relationships between the one or more DIDs and the one or more account identifiers; and
providing, from the database, event data of one or more blockchain transactions associated with the identified one or more DIDs.

US Pat. No. 10,885,035

METHOD AND SYSTEM FOR OUTER JOIN OF DATABASE TABLES

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for executing an OUTER JOIN command on a first table and a second table in a distributed database, wherein the method comprises:broadcasting the first table to a plurality of database nodes of a distributed database storing the second table, wherein the second table is a distributed database table, and each of the plurality of database nodes stores a portion of the second table;
dividing the plurality of database nodes storing the second table into a first subset and a second subset, wherein the first subset and the second subset each comprises less than all of the plurality of database nodes;
obtaining, by each database node of the first subset, an OUTER JOIN result by executing an OUTER JOIN operation based on the first table broadcasted to the each database node of the first subset and the portion of the second table stored in the each database node of the first subset;
obtaining, by each database node of the second subset, an INNER JOIN result by executing an INNER JOIN operation based on the first table broadcasted to the each database node of the second subset and the portion of the second table stored in the each database node of the second subset
identifying and removing a first row with a NULL value from the OUTER JOIN result when the INNER JOIN result comprises a second row sharing a same join key with the first row; and
returning a result to the OUTER JOIN command by aggregating the OUTER JOIN result from each database node of the first subset and the INNER JOIN result from each database node of the second subset.

US Pat. No. 10,887,343

PROCESSING METHOD FOR PREVENTING COPY ATTACK, AND SERVER AND CLIENT

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a server and from a client computing device, service data, wherein the service data comprises a first unique identifier and a first variable identifier stored in a local secure storage of the client computing device;
parsing, by the server, the service data to obtain the first unique identifier and the first variable identifier as parsed data;
determining, by the server, whether the first unique identifier and the first variable identifier in the parsed data are respectively identical to a second unique identifier and a second variable identifier associated with the client computing device and recorded by the server as recorded data, wherein the second unique identifier is generated by the server and uniquely identifies the client computing device, wherein the second variable identifier is a random number updated by the server each time the client computing device is triggered to use a service related to the local secure storage; and
in response to determining that either of the first unique identifier and the first variable identifier in the parsed data is not identical to the second unique identifier and the second variable identifier, respectively:
indicating, by the server, that the local secure storage of the client computing device is under a copy attack, and
performing a predetermined response action; or
in response to determining that the first unique identifier and the first variable identifier in the parsed data are identical to the second unique identifier and the second variable identifier, respectively:
transmitting, by the server and to the client computing device, a new variable identifier to replace the first variable identifier, wherein the new variable identifier is included within next service data received from the client computing device.

US Pat. No. 10,887,108

CONSENSUS VERIFICATION METHOD, APPARATUS, AND DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a first node of a blockchain, service data;
performing first consensus verification on the service data and determining that the first consensus verification on the service data fails; and
in response to determining that the first consensus verification on the service data fails
determining that the service data satisfies a predetermined retry condition,
storing the service data as service data to be retried in response to determining that the predetermined retry condition is satisfied, and
after storing the service data as service data to be retried
determining that a reason for a failure of the first consensus verification on the service data is eliminated, and
performing the first consensus verification on the service data to be retried in response to determining that the reason for the failure of the first consensus verification on the service data is eliminated.

US Pat. No. 10,887,112

BLOCKCHAIN CONSENSUS METHOD AND DEVICE

Advanced New Technologies...

1. A blockchain consensus method, comprising:receiving, by a consensus node in a blockchain, first service data;
determining a handling time of the first service data;
storing, by the consensus node, the first service data that comprises the handling time, wherein storing the first service data that comprises the handling time comprises:
in response to determining that there is already a timestamp attribute in attributes of the first service data and that a content of the timestamp attribute is empty, writing the handling time of the first service data into the timestamp attribute; or
in response to determining that data has been written into an original timestamp attribute of the first service data or that the first service data does not have a timestamp attribute, generating a new timestamp attribute for the first service data and writing the handing time of the first service data into the new timestamp attribute;
in response to determining that service data consensus needs to be performed, selecting, by the consensus node based on the handling time, a particular service data on which consensus is to be performed; and
performing consensus on the selected particular service data on which consensus is to be performed.

US Pat. No. 10,887,114

MANAGING COMMUNICATIONS AMONG CONSENSUS NODES AND CLIENT NODES

Advanced New Technologies...

1. A computer-implemented method for isolating a first communication connection from a second communication connection via configuring two separate truststores, comprising:identifying, by a first consensus node, a first certificate authority (CA) group of one or more CAs;
generating, by the first consensus node, a first certificate signing request (CSR) corresponding to the first CA group;
sending, by the first consensus node, the first CSR to the first CA group;
receiving, by the first consensus node, a first set of public key certificates from the first CA group, wherein the first set of public key certificates comprises (i) a first public key certificate issued to the first consensus node in response to the first CSR, and (ii) a second public key certificate issued to a second consensus node;
configuring, on the first consensus node, a first truststore based on the first set of public key certificates;
identifying, by the first consensus node, a second CA group of one or more CAs, wherein the first CA and the second CA group are mutually exclusive;
generating, by the first consensus node, a second CSR corresponding to the second CA group;
sending, by the first consensus node, the second CSR to the second CA group;
receiving, by the first consensus node, a second set of public key certificates from the second CA group, wherein the second set of public key certificates data indicating comprises (i) a third public key certificate issued to the first consensus node in response to the second CSR, and (ii) a fourth public key certificate issued to a client node;
configuring, on the first consensus node, a second truststore based on the second set of public key certificates comprising the third public key certificate and the fourth public key certificate;
establishing the first communication connection between the first consensus node and the second consensus node using the first public key certificate and the second public key certificate of the first set of public key certificates stored within the first truststore, wherein communications through the first communication connection are encrypted using the first public key certificate and the second public key certificate; and
establishing the second communication connection between the first consensus node and the client node using the third public key certificate and the fourth public key certificate of the second set of public key certificates stored within the second truststore, wherein communications through the second communication connection are encrypted using the third public key certificate and the fourth public key certificate.

US Pat. No. 10,885,581

DATA AUDITING METHOD AND DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a proxy server and from a user device, a loan query request that specifies a total amount of loans requested by a user;
designating, by the proxy server, a serial number that is associated with the loan query request;
transmitting, by the proxy server, the loan query request to a plurality of service provider servers that are each associated with a different lender;
in response to transmitting the loan query request to the plurality of service provider servers that are each associated with a different lender, receiving, by the proxy server and from each of the service provider servers, a first query result that indicates an amount of a loan that is offered by the lender that is associated with the service provider server;
determining, by the proxy server, a total amount of the loans that are offered to the user by all of the different lenders;
transmitting, by the proxy server, a response to the loan query request to the user that indicates the total amount of the loans that are offered to the user by all of the different lenders;
after transmitting the response to the loan query request, receiving, by the proxy server, an audit request from the user device;
transmitting, by the proxy server and to a particular service provider server, the audit request and the serial number to the particular service provider server;
in response to transmitting the audit request, receiving, by the proxy server and from the particular service provider server, a second query result;
obtaining, by the proxy server, the first query result from a blockchain that is associated with the particular service provider server, wherein the first query result was previously stored by the particular service provider server in the blockchain contemporaneous with responding to the loan query request; and
comparing the second query result with the first query result that was obtained from the blockchain that is associated with the particular service provider server.

US Pat. No. 10,884,813

DISTRIBUTED RESOURCE ALLOCATION

Advanced New Technologies...

1. A computer-implemented method for performing resource allocation, the method comprising:using a distributed computing system that includes a number of individual computer-implemented solvers for performing resource allocation of M resources among N users into K pools by solving a knapsack problem (KP) subject to K global constraints and L local constraints:
receiving data representing the K global constraints and the L local constraints, wherein K is smaller than L, each of the K global constraints restricts a respective maximum per-pool cost of the M resources across two or more users, and each of the L local constraints restricts a per-user selection of the M resources;
decomposing the KP into N sub-problems using K dual multipliers, each of the N sub-problems corresponding to a respective one of the N users and subject to the L local constraints with respect to (w.r.t.) the corresponding user, wherein each of the K dual multipliers corresponds to a respective one of the K global constraints;
determining the number of individual computer-implemented solvers for solving the N sub-problems;
distributing the N sub-problems among the number of individual computer-implemented solvers by assigning each sub-problem to a respective computer-implemented solver; and
solving the KP by the distributed computing system by performing two or more iterations, and, in one iteration, the method comprising:
solving each of the N sub-problems by the computer-implemented solver to which the sub-problem was assigned independently, wherein solving each of the N sub-problems comprises computing an amount of each of the M resources to be allocated to the corresponding user of the N user,
computing, for each of the K pools, a per-pool cost of the M resources across the N users based on the amount of each of the M resources to be allocated to the corresponding user of the N user, and
updating each of the K dual multipliers w.r.t. a corresponding pool based on a difference between a maximum per-pool cost of the M resources across two or more users for the corresponding pool restricted by a corresponding global constraint and a per-pool cost of the M resources across the N users for the corresponding pool computed based on the amount of each of the M resources to be allocated to the corresponding user of the N user.

US Pat. No. 10,884,830

METHOD AND APPARATUS FOR MULTITHREADED DATA TRANSMISSION IN A TEE SYSTEM

Advanced New Technologies...

1. A computer-implemented method for data transmission in a trusted execution environment (TEE) system, wherein:the TEE system comprises a TEE side and a non-TEE side,
the non-TEE side comprises a shared memory, the shared memory comprises a first address, a second address, and a plurality of consecutive third addresses, wherein the first address stores a write offset address, the write offset address indicates a writeable start address in the plurality of consecutive third addresses, the second address stores a read offset address, the read offset address indicates a readable start address in the plurality of consecutive third addresses, the plurality of consecutive third addresses store data from the TEE side,
the non-TEE side is preconfigured with a non-TEE side thread lock corresponding to the shared memory, and
the computer-implemented method is executed by a thread on the non-TEE side, comprising:
obtaining the non-TEE side thread lock;
obtaining the write offset address and the read offset address respectively by reading the first address and the second address;
reading unread bytes in written data in the plurality of consecutive third addresses as second data, wherein the unread bytes are determined based on the write offset address and the read offset address, and each address corresponds to one byte;
updating the read offset address in the second address; and
releasing the non-TEE side thread lock.

US Pat. No. 10,885,625

RECOGNIZING DAMAGE THROUGH IMAGE ANALYSIS

Advanced New Technologies...

1. A computer-implemented method, comprising:obtaining a marked picture, wherein the marked picture comprises one or more damage mark boxes, each damage mark box framing a respective portion of the marked picture depicting a damaged object;
using a damage detection model to predict at least one damage prediction region in the marked picture, wherein the at least one damage prediction region comprises a first damage prediction region;
determining a location loss term related to a location deviation in a loss function for a current prediction, wherein determining the location loss term related to the location deviation comprises determining whether any of the one or more damage mark boxes fully encompasses the first damage prediction region; and
updating the damage detection model based on the loss function, such that the damage detection model is adjusted to reduce deviations between damage mark boxes and damage prediction regions.

US Pat. No. 10,884,862

METHOD AND APPARATUS FOR PROCESSING FAILURE OF CIPHER CHANGE OF CIPHERTEXT IN DATABASE

ADVANCED NEW TECHNOLOGIES...

1. A method for processing cipher change failure, comprising:storing a record's error information when a cipher change of ciphertext data in the record fails, the error information comprising an identifier of the record, a failure cause, an old key version number, and a new key version number;
determining a retry strategy based on the stored failure cause, the determining a retry strategy comprising determining whether to implement an automatic retry or a manual retry based on whether the failure cause comprises at least one of: database inaccessibility, database jitter, database read/write errors, a state anomaly of a field value access system that performs the cipher change, or an execution anomaly of a cipher change execution component that calls the field value access system; and
employing the retry strategy to reperform the cipher change of the ciphertext data in the record having the identifier by decrypting the ciphertext data with a key corresponding to the old key version number to obtain plaintext data, and encrypting the obtained plaintext data using a key corresponding to the new key version number.

US Pat. No. 10,885,638

HAND DETECTION AND TRACKING METHOD AND DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:determining, for each frame of a video, whether an image of a hand exists in the frame by
determining coordinates of a positioning block used to identify a location of the image of the hand in the frame,
adjusting the positioning block to a size determined during a hand training,
providing, to an image object classifier, a sub-image determined by the adjusted positioning block, the image object classifier configured to determine whether the sub-image is a hand, and
receiving, from the image object classifier, an indication of whether the sub-image determined by the adjusted positioning block identifies the hand;
when at least one frame of the video includes the image of the hand, tracking locations of the hand in the frames of the video to obtain a tracking result;
verifying whether the tracking result is valid in a current frame of the frames of the video; and
when the tracking result is valid in the current frame of the video, tracking a location of the hand in a next frame; or
when the tracking result is not valid in the current frame, performing localized hand image detection on the current frame.

US Pat. No. 10,885,639

HAND DETECTION AND TRACKING METHOD AND DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:determining, for each frame of a video, whether an image of a hand exists in the frame;
when at least one frame of the video includes the image of the hand, tracking locations of the hand in the frames of the video to obtain a tracking result;
verifying that the tracking result is not valid in a current frame of the frames of the video, and
performing localized hand image detection on the current frame by:
determining a center of a positioning block used to identify a location of the image of the hand in the frame,
defining a plurality of adjacent blocks by using a specified step size and a specified block size,
adjusting each of the plurality of adjacent blocks to a size determined during a hand training, and
providing, to an image object classifier, each adjusted adjacent block to determine a quantity of the plurality of adjacent blocks that include images of hands.

US Pat. No. 10,885,397

COMPUTER-EXECUTED METHOD AND APPARATUS FOR ASSESSING VEHICLE DAMAGE

Advanced New Technologies...

1. A computer-executed method for assessing vehicle damage, comprising:generating a first comprehensive feature for a first component of a vehicle based on damage object detection information and vehicle component information acquired from a vehicle damage image, the first comprehensive feature comprising a component feature and a fused damage feature of the first component, the fused damage feature being obtained by fusing damage features of at least one damage detection frame belonging to the first component among a plurality of damage detection frames;
determining a plurality of candidate prediction results for the first component, each of the candidate prediction results comprising a candidate component category and a candidate damage category;
inputting the first comprehensive feature and the plurality of candidate prediction results into a pre-trained first condition prediction model to obtain a first prediction result, the first prediction result comprising, for each of the candidate prediction results, a probability that the candidate damage category thereof is correct;
inputting the first comprehensive feature and the plurality of candidate prediction results into a pre-trained second condition prediction model to obtain a second prediction result, the second prediction result comprising, for each of the candidate prediction results, a probability that the candidate component category thereof is correct; and
determining a component category of the first component and a corresponding damage category thereof at least based on the first prediction result and the second prediction result.

US Pat. No. 10,871,979

METHODS AND DEVICES FOR ESTABLISHING COMMUNICATION BETWEEN BLOCKCHAIN NETWORKS

Advanced New Technologies...

1. A computer-implemented method for establishing communication between a first blockchain network and a second blockchain network, comprising:embedding a first library into a process;
executing the first library to create a first border node embedded into the process, wherein the first border node operates together with a first set of nodes in the first blockchain network, the first set of nodes not being embedded into the process;
embedding a second library into the process;
executing the second library to create a second border node embedded into the process, wherein the second border node operates together with a second set of nodes in the second blockchain network, the second set of nodes not being embedded into the process; and
establishing a communication interface within the process to allow the first border node and the second border node to communicate with each other to jointly establish communication between the first blockchain network and the second blockchain network through the first border node and the second border node, wherein the process causes a processor to allocate a trusted execution environment to the communication interface, and the first border node and the second border node communicate with each other utilizing one or more function calls.

US Pat. No. 10,872,070

DISTRIBUTED DATA PROCESSING

Advanced New Technologies...

1. A computer-implemented method, comprising:identifying an invocation frequency for each of a first number of candidate key-value pairs in a predetermined period of time, wherein the invocation frequency is a number of times the corresponding candidate key-value pair was called by a service system in the predetermined period of time;
selecting a second number of hot key-value pairs from the candidate key-value pairs, wherein the hot key-value pairs comprise at least one of: candidate key-value pairs that have invocation frequencies higher than a predetermined threshold, or candidate key-value pairs with key values within a key value interval;
mapping, as intermediate key-value pairs, the second number of hot key-value pairs; and
reducing, as resultant key-value pairs, the intermediate key-value pairs, wherein the resultant key-value pairs are to be called by the service system.

US Pat. No. 10,872,332

VIRTUAL CARD OPENING METHOD AND SYSTEM, PAYMENT SYSTEM, AND CARD ISSUING SYSTEM

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented virtual card opening method, comprising:sending, by a computing device of a payment system to each of a plurality of virtual card issuing systems, a request for acting an agent to open a virtual card on behalf of the each virtual card issuing system to reduce traffic load on the each virtual card issuing system;
obtaining, by the computing device of the payment system from the each virtual card issuing system, a rule for acting as the agent of the each virtual card issuing system and a condition to open a virtual card of the each virtual card issuing system;
storing, by the computing device of the payment system in a mapping relationship, the obtained rules and the obtained virtual card opening conditions mapped with type identifiers of the virtual cards;
receiving, by the computing device of the payment system through an online traffic entrance, a virtual card opening request from a user, the virtual card opening request comprising user information of the user and type identifier of a target virtual card;
redirecting, by the computing device of the payment system, the user from the online traffic entrance to a virtual card receiving page so that opening of the target virtual card is decoupled from the virtual card issuing system issuing the target virtual card;
searching and identifying, by the computing device of the payment system according to the type identifier of the target virtual card and the mapping relationship, a target virtual card issuing system, the rule for acting as the agent to open the target virtual card on behalf of the target virtual card issuing system, and the virtual card opening condition to open the target virtual card according to actual situations, wherein the virtual card opening condition comprises a protocol for receiving the target virtual card;
sending, by the computing device of the payment system through the virtual card receiving page, the protocol for receiving the target virtual card for the user to view;
in response to the user agreeing to the protocol, determining, by the computing device of the payment system, whether the user information in the virtual card opening request satisfies the virtual card opening condition for opening the target virtual card;
in response to the virtual card opening condition being satisfied, generating, by the computing device of the payment system, the target virtual card according to the user information and the rule for acting as the agent to open the target virtual card; and
asynchronously sending, by the computing device of the payment system, information of the target virtual card to the identified target virtual card issuing system so that real-time interaction between the payment system and the target virtual card issuing system is avoided.

US Pat. No. 10,872,402

SPECULAR REFLECTION REDUCTION USING POLARIZED LIGHT SOURCES

Advanced New Technologies...

1. A method for generating a composite image from multiple images, the method comprising:receiving, by one or more processing devices, a first image that includes an eyeglass lens, wherein the eyeglass lens is illuminated by a first illumination source radiating electromagnetic radiation in a first polarization state;
receiving, by the one or more processing devices, a second image that includes the eyeglass lens, wherein the eyeglass lens is illuminated by a second illumination source radiating electromagnetic radiation in a second polarization state, wherein:
the first illumination source radiates the electromagnetic radiation in the first polarization state during a first time period, and the second illumination source radiates the electromagnetic radiation in the second polarization state during a second time period that is at least partially non-overlapping with the first time period,
the second polarization state is different from the first polarization state, and
the second illumination source is spatially separated from the first illumination source;
identifying, by the one or more processing devices in the first image, a first portion that represents a reflection of the first illumination source on the eyeglass lens;
identifying, by the one or more processing devices in the second image, a second portion corresponding to the first portion of the first image, wherein:
the second portion does not represent a reflection of the second illumination source on the eyeglass lens, and
the first portion and the second portion represent a same portion of the eyeglass lens; and
generating, by the one or more processing devices, the composite image in which the first portion is replaced by the corresponding second portion from the second image.

US Pat. No. 10,873,449

KEY DATA PROCESSING METHOD AND APPARATUS, AND SERVER

Advanced New Technologies...

1. A computer-implemented method for managing shared ownership in a block chain network, the method comprising:obtaining a parent cryptographic key associated with a blockchain object and one or more assets owned by a number of parties; and
responsive to detecting a change in the one or more assets or a change in the number of parties that own the one or more assets,
generating N child cryptographic keys CX based on the parent cryptographic key by applying a predetermined algorithm to the parent cryptographic key, wherein N is an integer greater than or equal to 2 and corresponds to a current number of parties that own the one or more assets;
wherein applying the predetermined algorithm comprises
generating N?1 random numbers Ri, wherein i is an integer between 1 and N?1 and Ri is a non-negative integer, determining a prime number P greater than at least one of a value S of the parent cryptographic key or the random numbers Ri, wherein the random numbers Ri range from 0 to P?1, and
generating the N child cryptographic keys CX by performing a modulo operation on P using a summation of the value S and one or more terms that include Ri multiplied by a value from 1 to N to obtain the child cryptographic keys CX, wherein the one or more terms depend on the current number of parties N, and
wherein the N child cryptographic keys CX are collectively configured to enable reconstruction of the parent cryptographic key.

US Pat. No. 10,873,463

SYSTEM AND METHOD FOR DECENTRALIZED-IDENTIFIER AUTHENTICATION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for blockchain-based decentralized-identifier authentication, comprising:obtaining, by a server from a computing device, a request for authenticating a decentralized identifier (DID), wherein the request comprises the DID, a plaintext associated with a challenge for authenticating the DID, and a digital signature on the plaintext;
generating, by the server, a blockchain transaction for retrieving a DID document corresponding to the DID from a blockchain, wherein the blockchain transaction invokes a blockchain contract for managing relationships between a plurality of DIDs and a plurality of corresponding DID documents;
sending, by the server, the generated blockchain transaction to one or more blockchain nodes of the blockchain for adding to the blockchain, the one or more blockchain nodes being configured to, after the generated blockchain transaction is added to the blockchain, execute the blockchain contract based on the blockchain transaction to retrieve the DID document corresponding to the DID;
receiving, by the server from at least one of the one or more blockchain nodes, the DID document corresponding to the DID, wherein the DID document comprises information associated with one or more authentication service endpoints associated with the DID, the information identifying the server as one of the one or more authentication service endpoints;
retrieving, by the server, a public key associated with the DID from the received DID document;
determining, by the server based on the obtained public key and the plaintext, that the digital signature on the plaintext is created based on a private key corresponding to the DID;
generating, by the server based on the determination, a message confirming authentication of the DID; and
sending, by the server to the computing device, the message confirming authentication of the DID.

US Pat. No. 10,868,678

METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR COMMUNICATION BETWEEN BLOCKCHAIN NODES, AND METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR BLOCKCHAIN-BASED CERTIFICATE MANAGEMENT

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, at a first node in a blockchain, from a certificate authority distinct from the blockchain, a digital certificate of a second node in the blockchain and new validity status information of the digital certificate,
wherein the digital certificate comprises at least one of a certificate version number, certificate holder information, certificate authority information, and a certificate validity period;
storing, by the first node, the digital certificate in the blockchain;
accessing, by the first node, certificate validity information associated with each node in the blockchain, wherein the certificate validity information is stored in the blockchain, and wherein the certificate validity information reflects validity status information of digital certificates of each node in the blockchain;
determining, by the first node, that the new validity status information comprises certificate revocation information; and
in response to determining that the new validity status information comprises certificate revocation information, updating the certificate validity information to indicate that the digital certificate is invalid.

US Pat. No. 10,866,815

METHOD AND SYSTEM FOR STARTING APPLICATION

Advanced New Technologies...

1. A computer-implemented method, comprising:starting, by a first local application, a websocket;
attempting, by the first local application, to connect, with the websocket, to a local socket started by a second local application, and wherein the attempting comprising, during a predetermined time period:
iteratively using a set of ports in a predetermined port group to attempt to connect to the local socket;
determining whether the first local application connects, with the websocket, to the local socket during the predetermined time period;
in response to a negative determination, initiating a jump to a boot page for downloading the second local application; and
in response to a positive determination, stopping the jump to the boot page for downloading the second local application.

US Pat. No. 10,929,198

BLOCKCHAIN-BASED RESOURCE ALLOCATION METHOD AND APPARATUS

Advanced New Technologies...

1. A computer-implemented method, comprising:obtaining, by a first node device in a blockchain network, a target transaction from a distributed database of the blockchain network, wherein the blockchain network comprises a target user device of a target user and the first node device, wherein the target transaction comprises service behavior data of the target user, and the service behavior data of the target user is generated by the target user device associated with a target service;
determining, by the first node device and based on various attributes including a type and an amount of the service behavior data, that a performance of the service behavior data satisfies a predetermined threshold; and
upon determining that the performance of the service behavior data satisfies the predetermined threshold, invoking, by the first node device, a smart contract corresponding to an allocation of a resource, comprising:
executing, by the first node device, a resource allocation logic that is stored in the smart contract and that is related to the service behavior data of the target user, and
performing, by the first node device, the allocation of the resource to the target user.

US Pat. No. 10,929,717

ARTICLE DAMAGE DETECTION

Advanced New Technologies...

1. A method for evaluating damages to an article, comprising:obtaining at least two images that are time sequentially related and show the article at different angles;
providing the at least two images as input to a detection model in time order, wherein the detection model comprises a deep convolutional neural network and a long short-term memory (LSTM) network that have been jointly trained on a set of training samples, each training sample comprising multiple training images associated with labels indicating respective article damage degrees of an article shown in the multiple training images;
processing the at least two images using the deep convolutional neural network to output a feature processing result for each image based on respective features identified from the image;
processing the feature processing result using the long short-term memory (LSTM) network to receive the feature processing results and to output a damage detection result based on performing time series analysis on the feature processing results, wherein the damage detection result comprises a classification result of each of one or more types of damage; and
obtaining, as output from the detection model, the damage detection result.

US Pat. No. 10,931,814

SERVICE RECOMMENDATION

Advanced New Technologies...

1. A computer-implemented method comprising:receiving, at a terminal, a first signal transmitted by a service device using a first wireless communication technology;
obtaining, by an application client executing on the terminal, characteristic information of the service device from the first signal;
responsive to obtaining the characteristic information, selecting, based on the characteristic information, a target service corresponding to the service device in preparation for displaying the target service on the terminal,
wherein the target service is selected from a plurality of services provided by the application client on the terminal;
receiving, at the terminal, a second signal transmitted by the service device using a second wireless communication technology, wherein a maximum transmission range of the second signal is less than a maximum transmission range of the first signal, and wherein the second wireless communication technology is different from the first wireless communication technology; and
responsive to receiving the second signal, displaying the target service on the terminal.

US Pat. No. 10,929,755

OPTIMIZATION PROCESSING FOR NEURAL NETWORK MODEL

Advanced New Technologies...

1. A computer-implemented method for optimization processing of a neural network model, the method comprising:determining one or more target layers of the neural network model based on a number of neurons at each layer of the neural network model;
for each of the one or more target layers, adding a virtual layer between the target layer and a preceding layer of the target layer, wherein neurons at the virtual layer are separately connected to neurons at the target layer and neurons at the preceding layer of the target layer, and addition of the virtual layer reduces a number of connections between the target layer and the preceding layer of the target layer; and
training the neural network model after having added the virtual layers, to obtain an optimized neural network model.

US Pat. No. 10,930,026

METHOD AND APPARATUS FOR REALIZING COLOR TWEEN ANIMATION

Advanced New Technologies...

1. A computer-implemented method, comprising:displaying, on a display of a computing device, a start fill scheme in a first layer that is initially non-transparent, the start fill scheme comprising a first color corresponding to a first credit rating;
displaying, on the display, an end fill scheme in a different second layer that overlaps the first layer and is initially at least partially transparent, the end fill scheme comprising a second color corresponding to a second credit rating, the second credit rating being a credit rating of a user; and
gradually changing a first transparency value of the first layer to a value corresponding to transparency, and gradually changing a second transparency value of the second layer to a value corresponding to non-transparency, wherein both the first transparency value and the second transparency value are gradually changed during a particular time period, and wherein gradually changing the first transparency value and the second transparency value includes changing the values by a plurality of increments over the particular time period.

US Pat. No. 10,930,284

INFORMATION PROCESSING SYSTEM, METHOD, DEVICE AND EQUIPMENT

ADVANCED NEW TECHNOLOGIES...

1. A method of processing voice data, the method comprising:at a server:
receiving text data,
determining whether one or more risk control keywords are contained in the text data, wherein the risk control keywords are set according to predetermined laws and regulations,
in response to determining that the one or more risk control keywords are contained in the text data, processing the text data by deleting the risk control keyword from the text data, and
converting the processed text data to voice data; and
at an IoT device:
receiving the voice data from the server,
determining a content attribute associated with the voice data,
determining a content attribute type of the content attribute associated with the voice data,
determining a first play rule matching the content attribute type based on a matching relationship between content attribute types and respective first play rules, wherein the first play rule includes a play starting time and a play mode, and
automatically playing the voice data according to the play starting time and the play mode.

US Pat. No. 10,929,516

DYNAMIC GRIP SIGNATURE FOR PERSONAL AUTHENTICATION

Advanced New Technologies...

1. A computer-implemented method, comprising:vibrating a vibrating component of a mobile device;
detecting a vibration signal of the mobile device as a user's grip of the mobile device changes measurably over time during an authentication procedure;
determining a dynamic grip signature for the user based on the detected vibration signal, wherein the dynamic grip signature is associated with biomechanical properties of a hand-arm system of the user, and wherein the biomechanical properties of the hand-arm system of the user comprise a progression of grip force points as the user grips; and
authenticating the user based on a comparison of the dynamic grip signature to an initial grip template.

US Pat. No. 10,929,558

DATA SECRUITY ENHANCEMENT BY MODEL TRAINING

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, at a service device, a plurality sets of encrypted user data from a plurality of user devices, wherein each set of encrypted user data is generated from each set of user data that is encrypted in a trusted zone of each user device;
decrypting, in a plurality of trusted zones of the service device, the plurality sets of encrypted user data by a plurality of first central processing units (CPUs) to obtain a plurality sets of decrypted user data, wherein each trusted zone is located at each first CPU, and wherein the service device comprises the plurality of first CPU and a second CPU;
training, at the service device, a model by using the plurality sets of decrypted user data to determine a plurality of training intermediate values and a training effective representative value, wherein different first CPUs use different sets of first model parameters to train different first models, wherein each training intermediate value is determined based on each set of decrypted user data and each set of first model parameters that are trained on each first CPU, wherein the training effective representative value is determined based on the training intermediate values;
determining, whether the training effective representative value satisfies a specified condition;
in response to determining that the training effective representative value satisfies the specified condition, generating, by the second CPU, the trained model based on each set of first model parameters used by each first CPU; and
in response to determining that the training effective representative value does not satisfy the specified condition, iteratively adjusting each set of first model parameters used by each first CPU and training the model based on each set of adjusted first model parameters until the training effective representative value satisfies the specified condition, comprising:
sending, from the second CPU, the training effective representative value to each first CPU; and
calculating, in the trusted zone of each first CPU, updated first model parameters based on the received training effective representative value and the decrypted user data.

US Pat. No. 10,929,570

METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR BLOCKCHAIN-BASED INFRINGEMENT EVIDENCE STORAGE

ADVANCED NEW TECHNOLOGIES...

1. A method for blockchain-based evidence storage, comprising:obtaining, from a computing device of a requester, a request for collecting evidence of infringement by an online resource, wherein the request comprises an address of the online resource;
obtaining the evidence of infringement from the address of the online resource;
generating verification information of the evidence of infringement by encrypting the evidence of infringement using an encryption algorithm to obtain a digest of the evidence of infringement;
storing the verification information of the evidence of infringement in a block on a blockchain;
storing a packaged file comprising the evidence of infringement in a cloud storage space and obtaining an access address of the packaged file in the cloud storage space;
obtaining, from the blockchain, a certificate of trusted evidence for the evidence of infringement, the certificate comprising the address of the online resource and an address of the block on the blockchain storing the verification information; and
sending, to the computing device of the requester, the verification information, the packaged file, the access address of the packaged file, and the certificate of trusted evidence.

US Pat. No. 10,929,571

FPGA HARDWARE-BASED SECURE COMPUTING METHOD AND APPARATUS

Advanced New Technologies...

1. A method for processing data based on FPGA hardware, comprising:obtaining, at an FPGA hardware device, encrypted data of each participant of a secure computing system, wherein the FPGA hardware device stores a plurality of immutable first keys, wherein the plurality of immutable first keys are a plurality of immutable first keys of all participants in the secure computing system, wherein the FPGA hardware device comprises an FPGA chip, wherein the FPGA chip is configured based on running logic jointly determined by two or more participants to prevent tampering of the configuration of the FPGA chip, wherein each particular immutable first key of the plurality of immutable first keys is not disclosed to any participant other than a participant that provides the particular immutable first key;
decrypting, at the FPGA hardware device, the encrypted data of each participant by using a dynamic working key of each participant, to obtain plaintext data of each participant, wherein the dynamic working key of each participant is obtained based on a corresponding immutable first key of the plurality of immutable first keys;
performing, at the FPGA hardware device, computing based on the plaintext data of each participant to obtain a computing result; and
outputting, at the FPGA hardware device, the computing result.

US Pat. No. 10,930,098

OBJECT DISPLAY FRAME, DATA PROCESSING METHOD, DEVICE, EQUIPMENT AND SYSTEM

ADVANCED NEW TECHNOLOGIES...

1. A display frame, comprising a post and a plurality of lock assemblies attached to the post, wherein:the post comprises a circuit coupled to the plurality of lock assemblies and comprises a graphic code scanner coupled to the circuit;
each of the plurality of lock assemblies is configured to hang a physical object and lock the physical object on the display frame, wherein the physical object is touchable by a user;
the graphic code scanner is configured to scan a graphic code provided by the user, to perform resource transfer for the physical object;
the circuit is configured to send the scanned graphic code to a server for performing identity verification on the user, and in response to receiving a result indicating that the identity verification succeeds, initiate the resource transfer for the physical object;
for each of the plurality of lock assemblies, the circuit is further configured to send to the lock assembly an unlocking signal including an identification of the physical object for opening the lock assembly in response to receiving a notice indicating that the resource transfer has been successfully performed for the physical object;
in response to the unlocking signal, the lock assembly is configured to open and release the physical object from the display frame based on the identification of the physical object;
wherein the display frame further comprises a pressure sensor disposed on the lock assembly, wherein the pressure sensor is configured to detect a pressure applied by a weight of the physical object on the lock assembly; and
wherein the display frame further comprises an alarm device connected to the pressure sensor, wherein the pressure sensor is configured to send a pressure trimer signal to the alarm device in response to detecting that the pressure reaches a pressure threshold, and the alarm device is configured to receive the pressure trigger signal and output an alarm signal comprising an identification of the display frame and an identification of the lock assembly.

US Pat. No. 10,929,845

METHOD AND APPARATUS FOR CONSENSUS VERIFICATION

ADVANCED NEW TECHNOLOGIES...

1. One or more non-transitory computer-readable storage media storing instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising:before a consensus verification phase begins:
receiving, by a load-balancing device, a blockchain transaction from a client, wherein a first blockchain node of a consensus network comprises the load-balancing device, a plurality of servers, and a transaction memory, and the load-balancing device is coupled to each of the plurality of servers;
distributing, by the load-balancing device, the blockchain transaction to a first server of the plurality of servers according to load balancing among the plurality of servers;
performing, by the first server, a first security verification on the blockchain transaction before accepting the first blockchain transaction, wherein the first security verification comprises an asymmetric signature legality verification;
in response to the first server determining that the blockchain transaction passes the first security verification:
storing, by the first blockchain node, the blockchain transaction into the transaction memory; and
broadcasting, via the consensus network by the first blockchain node, the blockchain transaction to each of a plurality of second blockchain nodes of the consensus network, causing each of the second blockchain nodes to store the blockchain transaction in a memory corresponding to the each second blockchain node in response to the each second blockchain node determining that the blockchain transaction passes a second security verification, wherein the second security verification comprises the asymmetric signature legality verification;
in response to determining that a preset condition is satisfied, generating, by a second server of the plurality of servers, a pre-processed data block comprising a unique characteristic value, wherein the pre-processed data block comprises a queue of a plurality of identifiers of a plurality of blockchain transactions including an identifier of the blockchain transaction, and the unique characteristic value corresponds to an order of the queue; and
during a consensus verification phase:
selecting, by the load-balancing device, a third server according to load balancing among the plurality of servers; and
broadcasting, via the consensus network by the third server of the plurality of servers, the pre-processed block comprising the unique characteristic value to at least one of the plurality of second blockchain nodes, causing the at least one second blockchain node to verify the unique characteristic value based at least on the plurality of identifiers, including the identifier of the blockchain transaction that has passed the second security verification and has been stored in the at least one second blockchain node before the consensus verification phase began.

US Pat. No. 10,931,651

KEY MANAGEMENT

Advanced New Technologies...

1. A computer-implemented data encryption method, comprising:obtaining, by a data encryption device, at least one piece of data to be encrypted;
calculating, by the data encryption device, for each particular piece of data of the at least one piece of data, a data-specific key corresponding to the particular piece of data, the data-specific key being calculated based on a prestored root key and a data identifier of the particular piece of data using a one-way function, wherein:
the one-way function is such that the root key is not uniquely derivable from the data-specific key using the one-way function,
the particular piece of data corresponds to a particular node of a predetermined tree structure,
the data identifier of the particular piece of data represents a path between the particular node and a root node of the predetermined tree structure,
the path comprises a plurality of path segments,
the data-specific key is calculated based on one or more keys that are different from the root key, each key of the one or more keys being calculated based on a corresponding different path segment of the plurality of path segments, the path segment connecting a corresponding node of the path segment to its parent node; and
generating, by the data encryption device, encrypted data corresponding to the particular piece of data by encrypting the particular piece of data using the data-specific key corresponding to the piece of data.

US Pat. No. 10,931,684

DATA PROCESSING METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A data processing method, comprising:determining information to be hidden in transaction data;
determining pre-transaction data and post-transaction data in the transaction data;
obtaining, by using the pre-transaction data as an input of a first predetermined one-way function, an input transaction root that is output by the first predetermined one-way function;
obtaining, by using the post-transaction data as an input of a second predetermined one-way function, an output transaction root that is output by the second predetermined one-way function, wherein the output transaction root is obtained by:
constructing, according to the post-transaction data and a random number, a bottom layer of a predetermined one-way function tree, and
determining the output transaction root corresponding to a top layer of the predetermined one-way function tree; and
constructing, according to the input transaction root and the output transaction root, proof data of validity of the information to be hidden; and
initiating a transaction request to write the proof data and the input transaction root and the output transaction root carrying a signature of a transaction initiator on a blockchain, for a node in the blockchain to perform consensus verification on the input transaction root and the output transaction root and the proof data, and approve or reject the transaction request according to a verification result.

US Pat. No. 10,929,103

RANDOM NUMBER GENERATION AND ACQUISITION METHOD AND DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:generating, by a first hardware random number generator of an electronic device, a plurality of random numbers, wherein the plurality of random numbers are N different random numbers, N is a positive integer, and generating the plurality of random numbers includes generating a random number array including N storage units;
shuffling, by the electronic device, the plurality of random numbers based on one or more random values generated by a second hardware random number generator of the electronic device;
receiving a random number obtaining instruction;
obtaining a random number from the plurality of random numbers based on the random number obtaining instruction;
determining that each random number of the plurality of random numbers has been obtained; and
in response to determination that each random number of the plurality of random numbers has been obtained:
generating, by the first hardware random number generator of the electronic device, a second plurality of random numbers; and
shuffling, by the electronic device, the second plurality of random numbers.

US Pat. No. 10,929,628

QR CODE POSITIONING METHOD AND APPARATUS

Advanced New Technologies...

1. A computer-implemented method, comprising:determining, by a computing device, from a QR code image that comprises first-type pixels and second-type pixels, centers of candidate position detection patterns in the QR code image based on a predetermined pixel detection rule, wherein the predetermined pixel detection rule comprises that a consecutive arrangement ratio of the first-type pixels, the second-type pixels, and the first-type pixels satisfies a predetermined ratio;
identifying, by the computing device, the candidate position detection patterns based on the centers of the candidate position detection patterns;
determining, by the computing device, from the candidate position detection patterns, a set of patterns that satisfies a QR code image positioning rule; and
using, by the computing device, the set of patterns as position detection patterns of the QR code image.

US Pat. No. 10,929,630

GRAPHIC CODE DISPLAY METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A method for displaying a graphic code, comprising:determining, by a graphic code display device, a first tilted angle of an affine plane of the graphic code displayed by the graphic code display device relative to a horizontal plane;
obtaining, by the graphic code display device, a prestored second tilted angle of a scanning window plane of a scanning device relative to the horizontal plane, wherein the graphic code is displayed for the scanning device to scan; and
adjusting, by the graphic code display device according to the first tilted angle of the affine plane and the second tilted angle, the first tilted angle of the affine plane of the graphic code to reduce an angle between the affine plane of the graphic code and the scanning window plane of the scanning device, wherein adjusting the first tilted angle of the affine plane of the graphic code stretches the graphic code.

US Pat. No. 10,929,374

CONSTRUCTING BLOCKCHAIN WORLD STATE MERKLE PATRICIA TRIE SUBTREE

Advanced New Technologies...

1. A computer-implemented method for providing a sub-tree of a hash tree within a blockchain network, the method comprising:providing, by a consensus client of the blockchain network, the hash tree and an address list for storing addresses of nodes within the blockchain network, the address list being initially empty;
executing, by the consensus client, a traversal of at least a portion of the hash tree in a plurality of iterations to perform operations comprising:
marking a first node of the hash tree as an account node, and storing an address of the first node in the address list,
marking a second node of the hash tree as an extension node, and moving to a next iteration of the traversal setting referenced by the second node, and
marking a third node of the hash tree as a transition node, and storing an address of the third node in the address list;
generating, by the consensus client, the sub-tree of the hash tree based on the address list, a sub-tree root node of the sub-tree comprising a root node of the hash tree, and one or more of the first node, the second node, and the third node; and
transmitting, by the consensus client, the sub-tree of the hash tree to a non-consensus client of the blockchain network, the sub-tree providing a state of accounts associated with the non-consensus client.

US Pat. No. 10,931,439

DATA STORAGE METHOD, DATA QUERY METHOD AND APPARATUSES

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:receiving, from a first blockchain node of a blockchain network, a query for encrypted data stored in a blockchain, wherein the encrypted data comprises an unencrypted part;
determining, through one or more smart contracts and based on the unencrypted part, first attribute information of the encrypted data;
determining whether the first blockchain node has permission to query data associated with the first attribute information;
in response to determining that the first blockchain node has the permission: sending the encrypted data to an encryption device to decrypt the encrypted data to obtain decrypted data and return the decrypted data to the first blockchain node, wherein the encryption device is a third-party device that is not a blockchain node;
after the decrypted data is returned to the first blockchain node, determining, through the one or more smart contracts, an expense to be deducted from an account of the first blockchain node for querying the encrypted data; and
sending a node identifier of the first blockchain node and the expense to other blockchain nodes of the blockchain network, enabling each of the other blockchain nodes to store the node identifier and the expense in the blockchain after the node identifier and the expense are successfully verified through at least a first consensus verification.

US Pat. No. 10,931,440

TRANSACTION PROCESSING IN A SERVICE BLOCKCHAIN

Advanced New Technologies...

1. A computer-implemented method comprising:receiving, by a node device in a service blockchain, a target transaction, from a service system interlinked with the service blockchain, the service system having posted the target transaction to the service blockchain;
in response to receiving the target transaction, (i) triggering execution of a target service and (ii) determining a target asset-service-institution server corresponding to the target service from a plurality of asset-service-institution servers;
invoking, by the node device and through an Oracle machine, an asset exchange service deployed on the target asset-service-institution server, to complete asset exchange processing between service accounts related to the target transaction;
obtaining, by the node device and through the Oracle machine, an asset exchange credential between the service accounts related to the target transaction; and
after obtaining the asset exchange credential, performing further transaction processing on the target service,
wherein the service blockchain is interlinked with an asset service blockchain through a cross-chain relay so that the service blockchain and the asset service blockchain can read and authenticate data from each other, wherein the asset service blockchain is further interlinked with the plurality of asset-service-institution servers through the Oracle machine.

US Pat. No. 10,931,441

DATA STORAGE, DATA CHECK, AND DATA LINKAGE METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A data storage method comprising:determining, by a data storage apparatus, a first check value of a first data version of a target object that is stored in a database external to a blockchain and different from the data storage apparatus;
searching, by the data storage apparatus, for a second check value of a second data version of the target object that is adjacent to and previous to the first data version;
creating, by the data storage apparatus, a data block that comprises the first check value and the second check value;
storing, by the data storage apparatus, the data block in a blockchain;
receiving, by the data storage apparatus, a data authentication request comprising a version identifier of the first data version of the target object and a third check value that is based on content of the target object;
obtaining, by the data storage apparatus, the data block from the blockchain based on a mapping relationship between the version identifier of the first version and a block identifier of the data block; and
authenticating, by the data storage apparatus, the content of the target object by comparing the third check value and the first check value in the data block obtained from the blockchain.

US Pat. No. 10,931,449

SYSTEM AND METHOD FOR UPDATING DATA IN BLOCKCHAIN

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for updating data in blockchain, the method comprising:obtaining, at a server-end computing system from a user-end computing device, one or more requests for updating a plurality of pieces of data in one or more blockchains, wherein the user-end computing device corresponds to one or more local accounts in the server-end computing system, and the one or more requests comprise one or more unsigned blockchain transactions;
obtaining, at the server-end computing system, one or more blockchain addresses associated with the one or more local accounts;
adding, at the server-end computing system, the one or more blockchain addresses respectively to the one or more unsigned blockchain transactions to obtain one or more updated blockchain transactions;
obtaining, at the server-end computing system, one or more private keys respectively associated with the one or more blockchain addresses by retrieving, from the server-end computing system, the one or more private keys in an encrypted form, and decrypting, at the server-end computing system, the retrieved one or more private keys in the encrypted form;
signing, at the server-end computing system, the one or more updated blockchain transactions respectively with the one or more private keys; and
transmitting, by the server-end computing system, the signed one or more blockchain transactions to one or more blockchain nodes of each of the one or more blockchains for execution.

US Pat. No. 10,931,462

DOMAIN NAME MANAGEMENT SCHEME FOR CROSS-CHAIN INTERACTIONS IN BLOCKCHAIN SYSTEMS

Advanced New Technologies...

1. A computer-implemented method of an owner of a unified blockchain domain name (UBCDN) of a blockchain instance comprising:obtaining, from a trusted certificate authority (CA) by an owner of a UBCDN of a blockchain instance (a UBCDN owner) in a unified blockchain network comprising a plurality of blockchain instances that are communicatively linked by two or more relays, a domain certificate of the UBCDN of the blockchain instance, wherein the UBCDN of the blockchain instance is globally recognizable by the plurality of blockchain instances in the unified blockchain network, and the UBCDN of the blockchain instance comprises:
a blockchain domain name of the blockchain instance, wherein the blockchain domain name is a unique identifier of the blockchain instance in the unified blockchain network, and wherein the blockchain domain name comprises a human-readable label, and
a chain identifier of the blockchain instance uniquely corresponding to the blockchain domain name, wherein the chain identifier indicates a blockchain network configuration of the blockchain instance;
wherein the domain certificate of the UBCDN comprises:
the blockchain domain name of the blockchain instance;
a public key of the UBCDN owner; and
a digital signature of the CA on the blockchain domain name of the blockchain instance and the public key of the UBCDN owner;
signing, by the UBCDN owner, the UBCDN of the blockchain instance; and
publishing, by the UBCDN owner, a UBCDN message of the blockchain instance, wherein the UBCDN message comprises:
the UBCDN of the blockchain instance;
a digital signature of the UBCDN owner resulting from the signing the UBCDN; and
the domain certificate of the UBCDN.

US Pat. No. 10,931,466

CERTIFICATE APPLICATION OPERATIONS

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, from a certificate server, gateway configuration information, wherein the gateway configuration information comprises a device identification code to identify a terminal device, and comprises a gateway key, a gateway address, and a subscription topic name;
establishing a link between the terminal device and a gateway based on the gateway key and the gateway address;
sending, from the terminal device, the device identification code and the subscription topic name to the gateway, so as to establish a data transmission channel between the terminal device and the gateway, the data transmission channel corresponding to the subscription topic name, wherein the data transmission channel is used to transmit, to the terminal device, message data corresponding to the subscription topic name;
receiving by the terminal device, via the data transmission channel, a certificate installation instruction from the certificate server;
generating, by the terminal device, a user certificate request based on the certificate installation instruction;
sending the user certificate request to the certificate server; and
receiving, via the data transmission channel, a user certificate from the certificate server.

US Pat. No. 10,929,191

LOADING MODELS ON NODES HAVING MULTIPLE MODEL SERVICE FRAMEWORKS

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by an execution node from a control node, a loading request comprising loading tasks corresponding to execution nodes, wherein the loading tasks are determined by the control node based on a preset execution script and resource information for each of a plurality of execution nodes, and wherein different execution nodes are deployed on different cluster nodes; and
starting, by the execution node, multiple execution processes based on the loading request, wherein the multiple execution processes start multiple model service frameworks and multiple models are loaded onto each of the model service frameworks.

US Pat. No. 10,929,710

METHODS AND DEVICES FOR QUANTIFYING TEXT SIMILARITY

Advanced New Technologies...

1. A computer-implemented device for quantifying text similarity, the device comprising:at least one processor; and
a memory including computer program code for execution by the at least one processor,
the computer program code configured to cause the at least one processor to:
obtain a plurality of shortest operation paths for correcting an optical correction recognition (OCR) text string with an edit text string, wherein each of the plurality of shortest operation paths includes one or more edit pairs, each of the one or more edit pairs denoting an operation performable to a character of the OCR text string during correction by the edit text string;
determine a plurality of similarity scores, each of the plurality of similarity scores corresponding to one of the plurality of shortest operation paths, wherein each of the plurality of similarity scores is determined by summing historical similarity scores of the one or more edit pairs of each of the plurality of shortest operation paths, wherein when summing the historical similarity scores of the one or more edit pairs, the computer program code further instruct the device to:
retrieve the historical similarity scores of the one or more edit pairs from a history data library;
collect edit pairs into the history data library;
calculate frequencies of the edit pairs in the history data library; and
determine the historical similarity scores for the edit pairs in the history data library, wherein when determining the historical similarity scores, the computer program code further instruct the device to:
perform a log frequency calculation for each of the edit pairs in the history data library; and
normalize the log frequency calculations to a range of 0.0 to 1.0; and
select a minimum one of the plurality of similarity scores to quantify text similarity between the OCR text string and the edit text string.

US Pat. No. 10,922,389

IDENTIFYING COPYRIGHTED MATERIAL USING COPYRIGHT INFORMATION EMBEDDED IN ELECTRONIC FILES

Advanced New Technologies...

1. A computer-implemented method for embedding copyright information in one or more pages for presenting digital content, the method comprising:generating, by a computing device, a unique identifier (ID) based on copyright information associated with the digital content, wherein the copyright information and the digital content are recorded on a blockchain of a blockchain network, and wherein the copyright information associated with the digital content includes one or more of at least a portion of the digital content or identity information of a copyright holder of the digital content,
and wherein the digital content is recorded on the blockchain as a first transaction associated with a first blockchain transaction ID and the identity information is associated with a second transaction associated with a second blockchain transaction ID, and wherein the first blockchain transaction ID or the second blockchain transaction ID is associated with one or more transaction records associated with the digital content;
identifying, by the computing device, one or more visual attributes associated with a page design of one or more blank pages of an electronic file;
embedding, by the computing device, the unique ID in the one or more blank pages by changing the one or more visual attributes to be representative of the unique ID, wherein the embedding produces one or more unique ID-embedded pages that each enables retrieval of the copyright information from the blockchain based on the unique ID, and wherein a difference between the one or more blank pages and the one or more unique ID-embedded pages is not apparent to an unaided human eye;
allocating, by the computing device, the digital content to at least one of the one or more unique ID-embedded pages, to produce one or more unique ID-embedded pages allocated with the digital content; and
distributing, by the computing device, the one or more unique ID-embedded pages allocated with the digital content to the blockchain network.

US Pat. No. 10,922,652

BLOCKCHAIN-BASED PROGRAM REVIEW SYSTEM, METHOD, COMPUTING DEVICE AND STORAGE MEDIUM

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for blockchain-based product-purchasing application review, wherein the application review comprises automatically underwriting a product to be purchased by a user, comprising:obtaining, by a blockchain node of a blockchain network providing a distributed data storage and comprising a plurality of blockchain nodes, a plurality of underwriting rules associated with a plurality of products offered for sale by a plurality of product providers, each underwriting rule comprising a user score required for user eligibility to purchase a corresponding product, wherein each blockchain node of the blockchain network comprises a data structure for storing and validating transactions associated with users of the network, wherein the blockchain node is in electronic communication with one or more transaction end computing devices associated with one or more providers which in turn is in electronic communication with a computing device associated with the user;
constructing, by the blockchain node, a first smart contract based on the plurality of underwriting rules associated with the plurality of products and the plurality of providers;
obtaining, by the blockchain node, a plurality of assessment rules associated with the plurality of providers to calculate an initial user score of the user based on historical transaction data of the user;
constructing, by the blockchain node, a second smart contract based on the plurality of assessment rules;
signing, by the blockchain node, the first smart contract and the second smart contract respectively with a private key of the blockchain node and submitting the signed first smart contract and the signed second smart contract to the blockchain network;
after the first smart contract and the second smart contract are validated based on a public key of the blockchain node, broadcasting, by the blockchain node, the first smart contract and the second smart contract to the blockchain network;
receiving, by the blockchain node, transaction data of the user from a third party service provider, wherein the receiving comprises receiving a request from the third party service provider to update the initial user score based on the received transaction data, wherein the user's transaction data is different at least in part from the user's historical transaction data;
determining, by the blockchain node executing the second smart contract, an updated user score for the user based on the user's transaction data;
storing, by the blockchain node, the updated user score of the user in the blockchain network, wherein the user score of the user is indexed based on identification information of the user, wherein the user score is continually updated and stored as new transaction data is received by the blockchain node from a third party service provider;
receiving, by the blockchain node, from the transaction end, a first product-purchasing application review request comprising the identification information of the user and first product information of a first target product offered for sale by a first provider, wherein the first product-purchasing application review request is received by the transaction end from the user computing device;
retrieving, by the blockchain node, the updated user score of the user based on the identification information of the user in the first product-purchasing application review request;
generating, by the blockchain node executing the first smart contract, a first review result based on the retrieved updated user score of the user and the first product information of the first target product in the first product-purchasing application review request;
communicating the first review result to the transaction end which in turn notifies the user computing device;
receiving, by the blockchain node, a second product-purchasing application review request comprising the identification information of the user and second product information of a second target product, wherein the second target product is offered for sale by a second provider different from the first provider;
retrieving, by the blockchain node, the updated user score based on the identification information of the user in the second product-purchasing application review request;
generating, by the blockchain node executing the first smart contract, a second review result based on the retrieved updated user score of the user and the second product information of the second target product in the second product-purchasing application review request; and
communicating the second review result to the transaction end which in turn notifies the user computing device.

US Pat. No. 10,922,399

AUTHENTICATION VERIFICATION USING SOFT BIOMETRIC TRAITS

Advanced New Technologies...

1. A method for verifying an authenticated state of a device, the method comprising:capturing, during a primary authentication process in which primary user identifying information is obtained for a subject using a device, first auxiliary user identifying information for a secondary authentication verification of the subject, wherein the first auxiliary user identifying information includes first clothing characteristics of clothing worn on an upper torso;
determining, after the primary authentication process, to perform a secondary authentication verification process to verify identify of the subject; and
performing the secondary authentication verification process, including:
capturing second auxiliary user identifying information for the subject, wherein the second auxiliary user identifying information includes second clothing characteristics of clothing worn on an upper torso;
comparing the first auxiliary user identifying information to the second auxiliary user identifying information, comprising comparing the first clothing characteristics to the second clothing characteristics; and
determining whether the authenticated state of the device is valid based on comparing the first auxiliary user identifying information to the second auxiliary user identifying information.

US Pat. No. 10,922,667

TRANSACTION INTERACTIONS BETWEEN NODE GROUPS

Advanced New Technologies...

1. A computer-implemented method for transaction processing, comprising:receiving, by a server, a group establishment request from an initial node for establishing an online social networking group, the group establishment request comprising a condition of acquiring a predetermined resource from each member of the online social networking group;
receiving, by the server, the predetermined resource from the initial node, the predetermined resource being placed into a shared resource pool that is accessible to each member of the online social networking group;
generating, by the server, the online social networking group that includes the initial node as a first member;
receiving, by the server, a correlation request from an object node to join the online social networking group;
initiating, by the server, a resource acquisition request preset by the condition of joining the online social networking group to the object node;
querying, by the server, creditable resources of the object node, and verifying whether the creditable resources comprise the predetermined resource required by the resource acquisition request to provide a verification result; and
when the verification result is yes,
extracting, by the server, the predetermined resource from the creditable resources of the object node,
injecting, by the server, the predetermined resource extracted from the creditable resources of the object node into the shared resource pool of the online social networking group, and
adding, by the server, the object node to the online social networking group as a second member, wherein after joining the online social networking group, the object node is capable of accessing resources in the shared resource pool.

US Pat. No. 10,922,421

REGULATING BLOCKCHAIN CONFIDENTIAL TRANSACTIONS

Advanced New Technologies...

1. A system comprising:one or more computers; and
one or more computer-readable memories coupled to the one or more computers and having instructions stored thereon which are executable by the one or more computers to perform operations comprising:
generating, by a regulator node of a blockchain network, a pair of a public key and a private key;
publishing, by the regulator node, the public key to a plurality of client nodes of the blockchain network;
obtaining, by the regulator node from a consensus node of the blockchain network, a content of a confidential transaction of a client node, wherein the content of the confidential transaction comprises:
one or more commitment values of the confidential transaction generated by the client node by applying a cryptographic commitment scheme to transaction data of the confidential transaction;
one or more zero-knowledge proofs of the transaction data; and
encrypted regulatory information generated by the client node by encrypting the transaction data using the public key of the regulator node;
obtaining the transaction data by decrypting the encrypted regulatory information using the private key of the regulator node; and
verifying, by the regulator node, that the confidential transaction is legitimate based on the content of the confidential transaction and the transaction data.

US Pat. No. 10,922,677

SERVICE IMPLEMENTATION USING A GRAPHIC CODE INCLUDING A BIOMETRIC IDENTIFIER

Advanced New Technologies...

1. A computer-implemented method, comprising:determining, by a first client computing device, that an authorized user is logged in using a user account to an application server executed on the first client computing device;
receiving, by the first client computing device, a biometric feature of an the authorized user of the first client computing device;
sending, by the first client computing device, to a terminal system the biometric feature;
receiving, by the terminal system, the biometric feature and verifying the biometric feature;
in response to verifying the biometric feature by the terminal system, generating a biometric feature identifier of the biometric feature;
receiving, by the first client computing device, from the terminal system, the biometric feature identifier;
sending, from the first client computing device, a binding request to the application server, wherein the binding request includes a request to bind the biometric feature identifier generated by the terminal system to the user account;
sending, from the first client computing device, and to a second client computing device, a request to complete a service without the authorized user being logged in to the application server;
receiving, at the first client computing device, and from the second client computing device, an instruction to display a graphic code;
in response to receiving the instruction to display the graphic code, receiving, by the first client computing device, the biometric feature of the authorized user of the first client computing device;
verifying, by the terminal system, the biometric feature;
in response to verifying the biometric feature, providing, by the terminal system, the biometric feature identifier associated with the biometric feature to the first client computing device;
generating, by the first client computing device, a code string that comprises the biometric feature identifier, wherein the code string does not include any user account information; and
displaying, at the first client computing device, a generated graphic code that comprises the code string.

US Pat. No. 10,922,422

BLOCKCHAIN-BASED IMAGE PROCESSING METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A blockchain-based image processing method, comprising:obtaining, by a computing device, copyright-related information corresponding to an original image;
sending, by the computing device, the copyright-related information to one or more blockchain nodes configured to obtain ciphertext information by encrypting the copyright-related information and to store the ciphertext information in the blockchain;
obtaining, by the computing device, the ciphertext information from the blockchain; and
performing, by the computing device, obfuscation on a pixel matrix of the original image based on the ciphertext information to generate a target image carrying the copyright-related information, by:
encoding the ciphertext information to obtain a binary string corresponding to the ciphertext information;
inserting at least one character of the binary string into the pixel matrix according to a set character spacing; and
dividing the pixel matrix into a plurality of pixel regions according to a set dividing rule, and inserting the binary string into at least one of the pixel regions; or
dividing the pixel matrix into a plurality of pixel regions according to a set dividing rule, and inserting a portion of the binary string into each of the pixel regions.

US Pat. No. 10,922,195

CONSENSUS SYSTEM DOWNTIME RECOVERY

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented consensus method to be implemented on a blockchain maintained by a number (N) of nodes, wherein one of the nodes acts as a primary node and the other (N?1) nodes act as backup nodes, and the method is performed by one of the backup nodes, the method comprising:obtaining a pre-prepare message from the primary node;
multicasting a prepare message to at least some of the primary node and the other (N?2) backup nodes, the prepare message indicating an acceptance of the pre-prepare message;
obtaining (Q?1) or more prepare messages respectively from (Q?1) or more of the backup nodes, wherein Q (quorum) is (N+F+1)/2 rounded up to the nearest integer, and F is (N?1)/3 rounded down to the nearest integer;
storing at least a minimal amount of consensus messages for recovery after one or more of the N nodes crash, wherein the minimal amount of consensus messages comprise the pre-prepare message and at least (Q?1) of the (Q?1) or more prepare messages;
after the one or more of the N nodes crash, loading at least the stored minimal amount of consensus messages;
based on the loaded at least the stored minimal amount of consensus messages,
multicasting a commit message to at least some of the primary node and the other backup nodes, the commit message indicating that the one backup node agrees to the (Q?1) or more prepare messages; and
obtaining, respectively from Q or more nodes among the primary node and the backup nodes, Q or more commit messages each indicating that the corresponding node a corresponding node of the Q or more nodes agrees to (Q?1) or more prepare messages received by the corresponding node.

US Pat. No. 10,924,806

VIDEO PLAYING CONTROL METHOD AND APPARATUS, AND VIDEO PLAYING SYSTEM

Advanced New Technologies...

1. A computer-implemented method, comprising:parsing content of a video to identify two or more topics of the content;
dividing the video into two or more video clips corresponding to a video playback of the two or more topics;
displaying two or more titles corresponding to, and descriptive of, the two or more video clips;
displaying two or more visual effects corresponding to the two or more titles and indicative of corresponding playback statuses of the two or more video clips;
displaying a depiction of a product, wherein the product comprises two or more parts, wherein the depiction of the product shows the two or more parts and two or more labels, wherein each label of the two or more labels refers to at least one part of the two or more parts, wherein each label of the two or more labels is associated with a corresponding title of the two or more titles; and
playing a video clip based on a particular title of the two or more titles selected from a time point determined based on a corresponding playback status of the video clip, wherein the particular title is selected based on selecting a particular label of the two or more labels in the depiction.

US Pat. No. 10,924,498

SYSTEM AND METHOD FOR REGISTERING SUBSCRIBABLE STATES IN BLOCKCHAIN

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method, comprising:obtaining, by one or more servers, a request for registering a workflow;
deploying in a blockchain, by the one or more servers, a blockchain contract comprising the workflow, wherein the deployed blockchain contract is executable to update a current state of the workflow among one or more states of the workflow; and
creating, by the one or more servers, one or more local states of a state machine off the blockchain, the created one or more local states respectively mapped to the one or more states of the workflow in the blockchain.

US Pat. No. 10,922,236

CASCADE CACHE REFRESHING

Advanced New Technologies...

1. A computer-implemented method for refreshing a cascade cache, the method comprising:obtaining a dependency relationship between a plurality of caches in the cascade cache;
determining, based on the dependency relationship, one or more cache priorities, wherein a particular cache that does not depend on any other cache has a higher priority than another cache that depends on a different cache;
determining, based on the cache priorities, a cache refreshing sequence associated with the plurality of caches in the cascade cache;
determining, based on the cache refreshing sequence, that a first cache of the plurality of caches is to be refreshed; and
responsive to determining that the first cache is to be refreshed, refreshing the first cache; and determining whether a second cache of the plurality of caches, the second cache following the first cache in the cache refreshing sequence, is to be refreshed after the first cache is refreshed.

US Pat. No. 10,922,757

BLOCKCHAIN-BASED COMMODITY CLAIM METHOD AND APPARATUS, AND ELECTRONIC DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:collecting, from an optical sensor of a blockchain node device, current appearance data associated with a target commodity;
querying, by the blockchain node device, original appearance data associated with the target commodity, wherein the original appearance data is stored in a distributed database of a blockchain;
obtaining, by the blockchain node device, the original appearance data associated with the target commodity from the distributed database of the blockchain;
comparing, by the blockchain node device, the current appearance data and the original appearance data;
determining, by the blockchain node device, that a damage event has occurred on the target commodity based on a comparison of the current appearance data and the original appearance data;
in response to the determination that the damage event has occurred on the target commodity, invoking, by the blockchain node device, a smart contract corresponding to the target commodity;
executing, by the blockchain node device, commodity damage claim logic stated in the smart contract; and
completing a commodity damage claim for the target commodity.

US Pat. No. 10,924,281

METHOD AND APPARATUS FOR INTER-BLOCKCHAIN TRANSMISSION OF AUTHENTICABLE MESSAGE

Advanced New Technologies...

1. A computer-implemented method for inter-blockchain, authenticable-message transmission, comprising:receiving, by a relay from a first blockchain, first data and first location information that indicate the relay to provide authenticable message to a second account in a second blockchain, wherein:
the relay is connected to the first blockchain and the second blockchain,
the first data is stored in the first blockchain,
a consensus is reached on the first data in the first blockchain by using a first account,
the first data comprises an authenticable message,
the authenticable message satisfies a predetermined protocol stack,
the predetermined protocol stack comprises a layer 1 protocol, a layer 2 protocol, and a layer 3 protocol,
the layer 1 protocol comprises a sending blockchain identifier field, a receiving blockchain identifier field, and the layer 2 protocol,
the layer 2 protocol comprises a sending account field, a receiving account field, and the layer 3 protocol,
the layer 3 protocol comprises a message content field,
the sending blockchain identifier field, the sending account field, the receiving blockchain identifier field, and the receiving account field respectively correspond to a first blockchain identifier identifying the first blockchain, the first account, a second blockchain identifier identifying the second blockchain, and the second account, and
the first location information indicates a location of the first data in the first blockchain; and
sending, by the relay to the second blockchain, the first data and the first location information based on the second blockchain identifier in the authenticable message.

US Pat. No. 10,924,284

SYSTEM AND METHOD FOR DECENTRALIZED-IDENTIFIER AUTHENTICATION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for blockchain-based decentralized-identifier authentication, comprising:obtaining, by a server from a computing device, a request for authenticating a decentralized identifier (DID), wherein the request comprises the DID, a plaintext associated with a challenge for authenticating the DID, and a digital signature on the plaintext;
generating, by the server, a blockchain transaction for retrieving a DID document corresponding to the DID from a blockchain, wherein the blockchain transaction invokes a blockchain contract for managing relationships between a plurality of DIDs and a plurality of corresponding DID documents;
sending, by the server, the generated blockchain transaction to one or more blockchain nodes of the blockchain for adding to the blockchain, the one or more blockchain nodes being configured to, after the generated blockchain transaction is added to the blockchain, execute the blockchain contract based on the blockchain transaction to retrieve the DID document corresponding to the DID;
receiving, by the server from at least one of the one or more blockchain nodes, the DID document corresponding to the DID, wherein the DID document comprises information associated with one or more authentication service endpoints associated with the DID, the information identifying the server as one of the one or more authentication service endpoints;
retrieving, by the server, a public key associated with the DID from the received DID document;
determining, by the server based on the obtained public key and the plaintext, that the digital signature on the plaintext is created based on a private key corresponding to the DID;
generating, by the server based on the determination, a message confirming authentication of the DID; and
sending, by the server to the computing device, the message confirming authentication of the DID.

US Pat. No. 10,924,288

MANAGING BLOCKCHAIN-BASED CENTRALIZED LEDGER SYSTEMS

Advanced New Technologies...

1. A computer-implemented method for managing a blockchain-based centralized ledger system, the computer-implemented method comprising:receiving a request for determining time information of a block in a blockchain of the centralized ledger system by a computing device of the centralized ledger system, the blockchain having a plurality of blocks that include timestamped blocks and non-timestamped blocks, each of the timestamped blocks storing trust timestamp information from a trust time server, each of the non-timestamped blocks storing transaction data and including no trust timestamp information from the trust time server, the trust time server being associated with a trust time authority and independent from the centralized ledger system, any adjacent two of the timestamped blocks in the blockchain being anchored with each other;
determining whether the block in the blockchain is a timestamped block or a non-timestamped block by the computing device;
in response to determining that the block is a non-timestamped block in the blockchain, identifying a first timestamped block preceding the block and a second timestamped block following the block in the blockchain by the computing device; and
determining the time information of the block based on first trust timestamp information in the first timestamped block and second trust timestamp information in the second timestamped block by the computing device.

US Pat. No. 10,924,549

METHOD AND DEVICE FOR DATA VERSION COMPARISON BETWEEN TRANS-TIME ZONE SITES

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a central server from a plurality of trans-time zone sites, target data and a corresponding time stamp from each trans-time zone site, wherein each of the time stamps are based on a respective time zone of a sending trans-time zone site from which the target data and the time stamp were received, wherein the target data comprises account data associated with a login account shared across each of the trans-time zone sites;
modifying, by the central server, each of the received time stamps based on the respective time zone of the sending trans-time zone site for the time stamp and a time zone of the central server;
comparing, by the central server, the received target data from each of the trans-time zone sites to stored target data based on the modified corresponding time stamp; and
storing, by the central server, a latest version of the target data having a modified corresponding time stamp that indicates a later time than each of the other modified corresponding time stamps.

US Pat. No. 10,915,720

SERVICE PROCESSING METHOD, DEVICE AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:broadcasting, by an electronic device, a first message comprising an apparatus type through near field communication;
scanning, by the electronic device, a digital object identifier (DOI) that is displayed by a mobile terminal according to the first message and that matches the apparatus type, to obtain service information and identity information of the mobile terminal included in the DOI;
broadcasting, by the electronic device, a second message generated based on the identity information;
obtaining, by the electronic device from the mobile terminal, a request for a near field communication connection, wherein the request is generated by the mobile terminal after the mobile terminal determines the second message includes information consistent with the identity information of the mobile terminal;
verifying, by the electronic device, the request based on the identity information of the mobile terminal;
in response to that the verification succeeds, establishing, by the electronic device, the near field communication connection to the mobile terminal; and
executing, by the electronic device, a service through the near field communication connection according to the service information, by:
obtaining, by the electronic device, a plurality of DOIs from the mobile terminal via the near field communication connection; and
selecting, by the electronic device, one of the DOIs that is consistent with the service provided by the electronic device; and
executing, by the electronic device, the service based on the selected DOI.

US Pat. No. 10,917,367

MITIGATING ACTIVITY PROCESSING REQUESTS

Advanced New Technologies...

1. A computer-implemented method, comprising:storing, by a server, a mapping relationship table between activity IDs and types of activity information;
receiving, by the server, an activity processing request from a first user account of a social network, wherein the activity processing request comprises sending a gift from the first user account to a second user account of the social network;
determining, by the server, an activity ID corresponding to the activity processing request;
querying, by the server and based on the activity ID, the mapping relationship table to obtain one or more type of to-be-acquired activity information corresponding to the activity processing request;
determining, by the server and based on the one or more type of to-be-acquired activity information, one or more type of to-be-acquired first activity information;
receiving, by the server, first activity information determined by the first user account, the first activity information corresponding to the one or more type of to-be-acquired first activity information;
determining, by the server and based on the first activity information and the one or more type of to-be-acquired activity information, one or more type of to-be-acquired second activity information that is excluded from the first activity information;
transmitting, by the server, the one or more type of to-be-acquired second activity information to the second user account;
receiving, by the server, content of the one or more type of to-be-acquired second activity information from the second user account; and
processing, by the server, an activity associated with the activity processing request based on the first activity information from the first user account and the content of the one or more type of to-be-acquired second activity information from the second user account.

US Pat. No. 10,917,397

ESTABLISHING A TRUSTED LOGIN PROCEDURE

Advanced New Technologies...

1. A computer-implemented method for a trusted login procedure, comprising:receiving, from a terminal and at a first server that provides a first service, a first login request for the first service;
generating, by the first server, device identifier information of the terminal;
associating, by the first server, the device identifier information of the terminal with first login state information, wherein the first login state information indicates that the terminal was verified and has logged into the first server successfully;
transmitting, by the first server and to a second server, the device identifier information and the first login state information, wherein the device identifier information and the first login state information is transmitted to the second server in response to a redirect operation, wherein the second server provides a second service that has a trusted login relationship with the first service, wherein the second server establishes second login state information for the second service based on the first login state information, and wherein the second server associates the device identifier information of the terminal with the second login state information;
recording, by the first server, that the first login state information has been shared with the second server by associating an identifier of the second server with the first login state information;
receiving, by the second server from a device, an application access request for the second service;
determining, by the second server, that an identifier information of the device sending the application access request matches the device identifier information of the terminal associated with the second login state information; and
in response, returning, by the second server, an application access response to the terminal.

US Pat. No. 10,917,399

METHOD AND DEVICE FOR DISTRIBUTING SERVICE OBJECTS

Advanced New Technologies...

1. A method comprising:acquiring an object set corresponding to a primary password when receiving a first extraction request that includes a primary password and is initiated by a first user;
binding the first user to the object set;
generating a secondary password corresponding to the object set;
returning a request response including the secondary password to the first user, the request response being operative to cause a first client terminal of the first user to display the secondary password;
counting a received plurality of second extraction requests according to a result of processing the second extraction request, the plurality of second extraction requests each including the secondary password acquired by the respective second client terminal from the secondary password displayed by the first client terminal, and the plurality of second extraction requests being initiated by respective second users;
determining that a preset condition is satisfied based on counting the plurality of second extraction requests; and
distributing the object set to each respective second user;
wherein each respective second client terminal acquires the secondary password from a respective second user viewing the secondary password displayed on the first client terminal and inputting the secondary password at an input interface of the second client terminal.

US Pat. No. 10,915,619

VIRTUAL REALITY IDENTITY VERIFICATION

Advanced New Technologies...

1. A method for verifying user identity, comprising:obtaining, at a virtual reality (VR) terminal, an action performed by a user when interacting with the VR terminal, wherein the action is one of a set of pre-defined actions each associated with a pre-defined motion track for verifying user identity;
calculating respective values of motion parameters that define at least an amount of rotation or translation of a part of user body when the user is performing the action when interacting with the VR terminal;
determining, from the motion parameters and based on using computer graphics modeling techniques, an estimated motion track of the action performed by the user;
determining a measure of similarity between the estimated motion track of the action performed by the user and the pre-defined motion track associated with the action, including determining whether the respective values of one or more of the motion parameters are within similarity tolerances associated with respective values of the one or more of the motion parameters derived from the pre-defined motion track; and
when the measure of similarity satisfies a pre-defined similarity threshold:
verifying identity of the user of the VR terminal.

US Pat. No. 10,917,425

GRAPH STRUCTURE MODEL TRAINING AND JUNK ACCOUNT IDENTIFICATION

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:obtaining an account medium network including a plurality of nodes and at least one edge, at least one node of the plurality of nodes representing an account, at least one node of the plurality of nodes representing a medium, an edge of the at least one edge indicating a login behavior relationship between nodes of the plurality of nodes connected by the edge;
obtaining a feature data and a risk labeling data of a node of the plurality of nodes, the feature data reflecting a login behavior of the node in a period of time, the risk labeling data indicating a first possibility of the node being a target node;
training a graph structure model based on the account medium network, the feature data, and the risk labeling data; and
estimating a second possibility of the node being a target node by calculating an embedded vector of the node in a hidden features space using the graph structure model and based on the feature data of the node and a graph topology corresponding to the node in the account medium network, wherein the calculating the embedded vector of the node in the hidden feature space includes a plurality of iterations, the embedded vector of the node in the hidden feature space after a tth iteration being calculated based on the feature data of the node, the graph topology and the embedded vector of the node in the hidden features space after a (t?1)th iteration of the plurality of iterations.

US Pat. No. 10,917,426

METHOD AND DEVICE FOR DETERMINING DATA ANOMALY

Advanced New Technologies...

1. A computer-implemented method for determination of anomalous data, the computer-implemented method comprising:processing, by one or more processors, data packets comprising a data structure to determine a historical distribution of historical data based on the data structure and a current distribution corresponding to a data distribution state of the data packets;
determining, by the one or more processors, a first distribution state parameter of a randomly selected data packet in the current distribution;
determining, by the one or more processors, a second distribution state parameter of the randomly selected data packet in the historical distribution;
comparing, by the one or more processors, the current distribution of the data packets with the historical distribution by determining a difference value between the first distribution state parameter and the second distribution state parameter to generate a comparison result;
determining, by the one or more processors, that the difference value exceeds a predetermined difference threshold;
in response to determining that the difference value exceeds the predetermined difference threshold determining, by the one or more processors, that a data anomaly exists in the data packets; and
in response to determining that the data anomaly exists in the data packets, generating, by the one or more processors, an alert indicating the data anomaly.

US Pat. No. 10,915,901

METHOD AND APPARATUS FOR PROCESSING TRANSACTION REQUESTS

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:initiating, by a first transaction node, a target transaction that a plurality of transaction nodes participate in, wherein the plurality of transaction nodes comprise the first transaction node and one or more second transaction nodes, and wherein the plurality of transaction nodes are blockchain nodes of a blockchain network;
acquiring transaction data of the target transaction;
generating, by the first transaction node, a data abstract according to the transaction data, wherein the transaction data cannot be obtained reversely through the data abstract;
determining, at the first transaction node, a transaction abstract according to the data abstract after the data abstract is digitally signed by every one of the plurality of transaction nodes, wherein determining the transaction abstract comprises:
digitally signing, at the first transaction node, the data abstract to obtain a first signed data abstract;
obtaining one or more second signed data abstracts signed respectively by the one or more second transaction nodes; and
combining at least the first signed data abstract and the one or more second signed data abstracts to obtain the transaction abstract;
generating a transaction request that comprises the transaction abstract and does not comprise the transaction data, the transaction abstract enabling consensus verification without the transaction data; and
broadcasting, via the blockchain network, the transaction request to a plurality of consensus nodes of the blockchain network, causing the consensus nodes to each save the transaction abstract in the transaction request into a blockchain after the transaction abstract passes the consensus verification.

US Pat. No. 10,916,160

PROCESSING ELECTRONIC PAYMENTS USING AT LEAST TWO PAYMENT TOOLS FOR A TRANSACTION

Advanced New Technologies...

1. A method, comprising:providing, by one or more processors, a payment tool selection page to a terminal, wherein the providing the payment tool selection page comprises pushing the payment tool selection page to the terminal;
receiving, by the one or more processors associated with one or more servers, an indication that a plurality of payment tools is to be used for payment in connection with online order, wherein:
the indication is received from the terminal; and
a selection of the plurality of payment tools is received in connection with a submission to the payment tool selection page;
sending, by the one or more processors, one or more funds deduction commands to a plurality of payment servers associated with corresponding ones of the plurality of payment tools;
in response to a determination that a funds deduction is unsuccessful at one or more of the plurality of payment servers, causing a funds deduction to be rolled back for at least one of the plurality of payment servers for which the corresponding funds deduction is determined to be successful; and
in response to a determination that the funds deduction is successful at the plurality of payment servers, causing payment for the online order to be completed.

US Pat. No. 10,917,230

MANAGING SENSITIVE DATA ELEMENTS IN A BLOCKCHAIN NETWORK

Advanced New Technologies...

1. A computer-implemented method for managing sensitive data elements that are stored in a blockchain network, the method comprising:receiving, by a consensus node of the blockchain network, a request from a client device to perform a modification to a watch list that is stored in the blockchain network, wherein the watch list comprises a plurality of sensitive data elements, and wherein the request comprises a digital signature generated using a private key of the client device;
determining, by the consensus node, that the client device is authorized to modify the watch list based on the digital signature;
performing, by the consensus node, a consensus procedure on the request within the blockchain network, wherein the consensus procedure comprises:
transmitting, to a plurality of other consensus nodes of the blockchain network, a request verification message, wherein each consensus node is on a server of a first entity, the first entity and the consensus nodes having authorization to modify the watch list, and
receiving reply messages from the plurality of other consensus nodes;
determining, based on the reply messages, that a consensus is achieved;
performing, by the consensus node, the modification to the watch list; and
sending, by the consensus node, to a non-consensus node of the blockchain network, the modified watch list, wherein the non-consensus node is on a server of a second entity, the second entity and the non-consensus node having authorization to obtain the modified watch list and not having authorization to modify the modified watch list.

US Pat. No. 10,917,231

DATA STORAGE METHOD, APPARATUS, SYSTEM AND DEVICE

Advanced New Technologies...

1. A computer-implemented method for data storage, comprising:obtaining, by a coordinator node, a data block, wherein the coordinator node is in a database system that stores data in blockchain-type ledgers, and wherein the database system comprises the coordinator node and one or more data nodes;
determining, by the coordinator node, a data node corresponding to the data block based on a block hash value of the data block;
allocating, by the coordinator node, the data block to the data node;
creating, by the coordinator node, routing information between the data block and the data node;
saving, by the coordinator node, the routing information and block header information of the data block; and
sending, by the coordinator node to the data node, the data block to be stored by the data node in a blockchain-type ledger that stores a plurality of data blocks in a blockchain data structure, wherein:
in the blockchain-type ledger, each of the plurality of data blocks comprises a respective block header used to store metadata and a respective block body used to store a respective data record; and
except for an initial data block, each of the plurality of data blocks comprises at least one data record and its own block hash value that is determined by both the at least one data record comprised in the each of the plurality of data blocks and a hash value of a previous data block, and block heights of the plurality of data blocks are increased monotonically according to a block generation time sequence.

US Pat. No. 10,915,950

RECOMMENDING SHARED PRODUCTS

Advanced New Technologies...

1. A computer-implemented method for shared product recommendation, wherein the method comprises:obtaining, by an electronic device, credit information of a user, wherein the credit information of the user is derived at least in part from a usage history of the user for a first shared product, wherein the usage history of the user comprises a history of whether the user has returned the first shared product on time or whether the user has damaged the first shared product;
inputting, by the electronic device, the credit information of the user to a recommendation model for calculation, wherein the recommendation model is a machine learning model, wherein the recommendation model is trained based on credit information of a plurality of sample users, wherein the credit information of the plurality of sample users is derived from usage history of the plurality of sample users for one or more shared products;
deriving, by the electronic device and based on the recommendation model, a shared product use probability; and
recommending, by the electronic device, a second shared product to the user based on the shared product use probability.

US Pat. No. 10,917,498

SERVICE PROCESSING METHOD AND APPARATUS, AND SERVICE SERVER

ADVANCED NEW TECHNOLOGIES...

1. A payment processing method, comprising:receiving at a server from a merchant device a payment request for requesting a customer device to perform a payment operation, wherein the payment request includes merchant account information and location information of the merchant device indicating a location of the merchant device;
sending a target payment random code for the merchant account information to the merchant device to enable the merchant device to convey to the customer device;
receiving from the customer device a payment response, wherein the payment response includes a check payment random code corresponding to the target payment random code and location information of the customer device indicating a location of the customer device;
determining whether the location of the customer device is within a predetermined range of the location of the merchant device;
in response to determining that the location of the customer device is within the predetermined range of the location of the merchant device:
obtaining payment random codes from a binding relationship list that includes binding relationships between merchant accounts and payment random codes generated for the merchant accounts, and
identifying a matched payment random code by matching the check payment random code with the payment random codes obtained from the binding relationship list, the payment random codes corresponding to merchant devices that are within the predetermined range of the location of the merchant device;
obtaining the merchant account information according to the matched payment random code; and
sending the merchant account information to the customer device to enable the customer device to perform the payment operation.

US Pat. No. 10,915,706

SORTING TEXT REPORT CATEGORIES

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a computing device, a text report request from a user device associated with a user;
obtaining a behavior history and personal information of the user;
inputting the behavior history and the personal information of the user into a model, to obtain, as an output of the model, a plurality of personalized evaluation results, each personalized evaluation result corresponding to a respective text report category of a plurality of text report categories,
wherein each personalized evaluation result indicates a predicted relevance of the corresponding text report category to a problem faced by the user, and
wherein the model comprises a classification model trained using one or more supervised learning techniques on a plurality of user behavior history samples and a plurality of personal information samples, each sample associated with a respective label indicating a category of a text report selected by a user corresponding to the sample;
determining that a predetermined first number of text report categories of the plurality of text report categories are each selected more frequently than each other text report category by all users during a first predetermined time period;
determining that a predetermined second number of text report categories of the plurality of text report categories, excluding the predetermined first number of text report categories, are selected more frequently than each other text report category, except for the predetermined first number of text report categories, by users in a particular region during a second predetermined time period; and
determining, based on the plurality of personalized evaluation results, an order in which the plurality of text report categories are to be presented to the user, comprising sorting the plurality of text report categories in an order in which
the predetermined first number of text report categories are ordered in descending order based on respective quantities of user selections,
the predetermined second number of text report categories are ordered after the predetermined first number of text report categories, in descending order based on respective quantities of user selections, and
remaining text report categories of the plurality of text report categories are ordered in descending order after the predetermined second number of text report categories, sorted in an order based on respective personalized evaluation results corresponding to each remaining text report category.

US Pat. No. 10,917,246

SYSTEM AND METHOD FOR BLOCKCHAIN-BASED CROSS-ENTITY AUTHENTICATION

ADVANCED NEW TECHNOLOGIES...

20. A system comprising one or more processors and one or more non-transitory computer-readable memories coupled to the one or more processors and configured with instructions executable by the one or more processors to cause the system to perform operations comprising:obtaining, from a blockchain, a first blockchain transaction comprising an authentication request sent by a first entity for authenticating a user, wherein the authentication request comprises a DID (decentralized identifier) corresponding to the user;
determining that the first entity is permitted to access authentication information of the user corresponding to the DID, wherein the authentication information is endorsed by a second entity;
obtaining an authentication result of whether the DID is registered with the second entity;
generating a second blockchain transaction comprising the authentication result; and
notifying the first entity of the authentication result by adding the second blockchain transaction to the blockchain.

US Pat. No. 10,917,247

CONFIDENTIAL BLOCKCHAIN TRANSACTIONS

Advanced New Technologies...

1. A computer-implemented method, comprising:obtaining, by a blockchain node of a blockchain, a linkable ring signature corresponding to a remittance transaction between a remitter and one or more payees, wherein the linkable ring signature comprises a plurality of key images, wherein a value of each key image is related to a remitter public key of the remitter, a remitter private key of the remitter, and an asset commitment value of a respective asset to be spent in the remittance transaction, and
wherein the linkable ring signature is generated based on the remitter public key, the remitter private key, a remitter pseudo private key, and a remitter pseudo public key,
wherein the remitter pseudo public key is based on the asset commitment values of the assets to be spent, transfer amount commitment values of transfer amounts corresponding to respective payees of the one or more payees, and a first set of one or more random numbers, and wherein the remitter pseudo private key is based on a second set of one or more random numbers;
determining, based on the linkable ring signature, that the remitter pseudo private key and the remitter pseudo public key satisfy a key pair relationship;
determining, based on the linkable ring signature, that a sum of asset amounts of the assets to be spent equals a sum of the transfer amounts;
determining, based on the linkable ring signature, that the plurality of key images are different from historical key images corresponding to previous remittance transactions; and
based on determining that the plurality of key images are different from historical key images corresponding to previous remittance transactions, executing the remittance transaction.

US Pat. No. 10,917,249

PROCESSING DATA ELEMENTS STORED IN BLOCKCHAIN NETWORKS

Advanced New Technologies...

1. A computer-implemented method for blockchain network data element processing and storage, the computer-implemented method comprising:receiving, by a blockchain data element processing server and from a client computing device, a request to store a data element into a blockchain network, the request comprising identity information of the client computing device, wherein the blockchain data element processing server stores a black library;
determining, by the blockchain data element processing server, whether the client computing device is authorized to store the data element in the blockchain network based on the identity information of the client computing device;
in response to determining that the client computing device is authorized to store the data element in the blockchain network, determining, by the blockchain data element processing server and using the black library, whether the data element is a sensitive data element;
in response to determining that the data element is not a sensitive data element, transmitting, by the blockchain data element processing server and to the blockchain network, a blockchain data element generated based on the data element and that is signed using a private key of the blockchain data element processing server, wherein the blockchain data element comprises an encrypted data element and a hash value of the data element, the encrypted data element comprising the data element that is encrypted using an encryption algorithm;
receiving, by the blockchain data element processing server and from the client computing device, a request to obtain the data element in the encrypted data element, wherein the request comprises the encrypted data element, and wherein the encrypted data element is retrieved by the client computing device from the blockchain network bypassing the blockchain data element processing server; and
sending, by the blockchain data element processing server, the data element to the client computing device.

US Pat. No. 10,902,332

RECOMMENDATION SYSTEM CONSTRUCTION METHOD AND APPARATUS

Advanced New Technologies...

1. A computer implemented method for generating recommendations, the method comprising:determining, by a client device, a local user gradient value based on a current user preference vector, wherein the client device is associated with a user in a recommendation system, wherein the current user preference vector is determined by scores that users in the recommendation system assign to items in the recommendation system, wherein each of the scores represents a preference degree that each of the users has toward each of the items, wherein the recommendation system recommends the items to the users based on the scores, and wherein two users in the recommendation system can assign their respective scores to an item in the recommendation system at two different times;
determining, by the client device, a local item gradient value based on a current item feature vector, wherein the current item feature vector is determined by the scores that the users in the recommendation system assign to the items in the recommendation system;
updating, by the client device, a user preference vector by using the local user gradient value;
updating, by the client device, an item feature vector by using the local item gradient value;
determining, by the client device, a neighboring client device based on a predetermined adjacency relationship, wherein the predetermined adjacency relationship comprises an adjacency relationship determined based on a geographical location distance between client devices;
sending, by the client device to the neighboring client device, the local item gradient value;
receiving, by the client device, a neighboring item gradient value sent by the neighboring client device, wherein the neighboring item gradient value is a local item gradient value of the neighboring client device calculated at the neighboring client device;
updating, by the client device, the item feature vector by using the neighboring item gradient value; and
in response to determining, by the client device, that a predetermined iteration stop condition is satisfied, wherein each iteration step comprises updating the user preference vector using the local user gradient value, updating the item feature vector using the local item gradient value, and updating the item feature vector using the neighboring item gradient value, outputting, by the client device, recommendations of the items to the users based on the user preference vector and the item feature vector.

US Pat. No. 10,902,106

AUTHENTICATION AND AUTHENTICATION MODE DETERMINATION METHOD, APPARATUS, AND ELECTRONIC DEVICE

Advanced New Technologies...

1. An authentication mode determination method, comprising:acquiring user information of a user in response to a request for activating a face authentication mode from the user; and
determining an authentication mode for the user based on first user information of users with similar front face features and non-similar side face features in a list of users of multiple births, second user information of users with similar front face features and similar side face features in the list of users of multiple births, and the user information of the user.

US Pat. No. 10,902,393

METHOD, APPARATUS, AND SYSTEM FOR OPERATING AN ELECTRONIC ACCOUNT IN CONNECTION WITH AN ELECTRONIC TRANSACTION

Advanced New Technologies...

1. A method, comprising:receiving, by one or more merchant servers, a payment platform display page acquisition request from a first client terminal via one or more networks, the payment platform display page acquisition request being provided by the first client terminal in connection with an online transaction with an e-commerce platform;
providing, by the one or more merchant servers, a payment platform display page to the first client terminal, wherein:
the payment platform display page includes first script code;
in response to the first client terminal executing the first script code, the first script code causes the first client terminal to obtain second script code from a payment server, and to execute the second script code to obtain a payment page including a digital object unique identifier from the payment server and to display the payment page;
the digital object unique identifier indicates an upcoming payment sum;
the payment server is different from the one or more merchant servers; and
the digital object unique identifier is generated in response to information pertaining to the upcoming payment sum being provided to the payment server by the first client terminal;
receiving, by the one or more merchant servers, verification information in connection with an authorization for the online transaction being communicated by a second client terminal, wherein:
the second client terminal obtains the verification information based at least in part on obtaining the digital object unique identifier from the first client terminal in response to the first client terminal obtaining the digital unique identifier from the payment server; and
the verification information includes a payment sum, information pertaining to the payment server identity, and an identifier corresponding to the online transaction; and
in response to receiving the verification information, sending, by the one or more merchant servers, the verification information to the payment server to instruct the payment server to execute a deduction operation on an electronic account in connection with completion of the online transaction, the verification information being sent to the payment server via one or more networks.

US Pat. No. 10,902,410

ELECTRONIC PAYMENT DEVICE

Advanced New Technologies...

1. An electronic payment device, comprising:a console comprising:
a housing comprising:
a first sidewall; and
a second sidewall that extends obliquely from the first sidewall and forms a covered space with the first sidewall, wherein the covered space comprises a hollow space; and
a speaker inside the housing, wherein the speaker is disposed at an orientation facing the hollow space;
a material plate detachably assembled to the housing;
a scanning window located on the first sidewall;
a camera facing the scanning window; and
a sensor that faces the scanning window, wherein the sensor is configured to sense a user in proximity to the electronic payment device.

US Pat. No. 10,902,412

METHOD AND DEVICE FOR ACCOUNT CREATION, ACCOUNT REFILLING AND DATA SYNCHRONIZATION

Advanced New Technologies...

1. A computer-implemented method for data synchronization, comprising:establishing, by a terminal device, a data channel to an integrated circuit (IC) device through near field communication (NFC), wherein the IC device comprises an NFC module;
obtaining, by the terminal device and through the data channel, an account identifier of a first account and first transaction data corresponding to the first account from the IC device, wherein the account identifier of the first account and the first transaction data are stored in the IC device;
determining, by the terminal device, second transaction data corresponding to a second account associated with the first account, wherein the second transaction data is stored in the terminal device; and
performing, by the terminal device, data synchronization between the first account and the second account based on the first transaction data and the second transaction data, wherein the data synchronization is performed through the data channel established between the terminal device and the IC device, wherein performing data synchronization between the first account and the second account based on the first transaction data and the second transaction data comprises:
determining at least one piece of collection or payment data generated in the second account and a balance in the second account, wherein the collection or payment data comprise at least one of a consumption or refilling amount;
determining an updated balance based on a balance in the first account and the at least one piece of collection or payment data generated in the second account; and
updating the balance in the first account and the balance in the second account to the updated balance.

US Pat. No. 10,902,415

PAYMENT CARD BINDING METHOD, TRUST EVALUATION METHOD, APPARATUS, AND ELECTRONIC DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method, comprising:receiving, at a server, a payment card binding request from a digital wallet client installed on a computing device of a user to bind a new payment card of the user with a digital wallet account, wherein the payment card binding request comprises account data of the digital wallet account, device data of the computing device, environment data of the computing device, and account information of the payment card, wherein:
the account data comprises: an account identifier, a registration time, or personal information of an account owner;
the device data comprises: a device identifier of the computing device or a media access control (MAC) address of the computing device; and
the environment data comprises: a name of a wireless network connected to the computing device, an IP address of the computing device, or location information of the computing device;
sending a micro charge payment request from the server to a payment system according to the account information of the payment card, wherein the micro charge payment request is to verify the validity of the payment card;
in response to the micro charge payment request being successfully processed by the payment system, sending from the server to a risk control system associated with the server a request to determine (1) an account trust level based on the account data, (2) a device trust level based on the device data, and (3) an environment trust level based on the environment data, wherein the risk control system is configured to:
input the determined account trust level, the device trust level, and the environment trust level into a trained new card trust level (NCTL) model to determine a NCTL, wherein the NCTL model is trained to provide a plurality of weights respectively corresponding to the account trust level, the device trust level, and the environment trust level, and wherein the NCTL model is trained based on a plurality of historical payment card binding requests of a plurality of wallet accounts, and historical transaction data of the plurality of wallet accounts; and
determine, based on the NCTL, a payment limit restriction for the digital wallet account using the payment card on the computing device;
binding, at the server, based on the NCTL and the payment limit restriction, the digital wallet account with the payment card for the digital wallet account to use the payment card for future payments;
receiving, at the server, a subsequent payment request to make a payment with the digital wallet account using the payment card;
sending, from the server to the risk control system, a verification request to perform verification to determine whether to allow the subsequent payment request, wherein the verification is based on a payment amount of the subsequent payment request and the NCTL and the payment limit restriction at the time of the subsequent payment request;
receiving, at the server, from the risk control system, a response to the verification request; and
wherein the risk control system is configured to adjust the NCTL and the payment limit restriction based on transaction records or payment refusal records generated after the payment card is bound to the digital wallet account.

US Pat. No. 10,901,971

RANDOM WALKING AND CLUSTER-BASED RANDOM WALKING METHOD, APPARATUS AND DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A cluster-based random walking method, comprising:obtaining, by a cluster that includes a server cluster and a worker machine cluster, information about each node included in graph data by reading, by the worker machine cluster from a database, an identifier of an adjacent node of each node included in the graph data, wherein the worker machine cluster includes a plurality of worker machines, and each of the worker machines reads at least one identifier of adjacent nodes of respective nodes;
generating a hash table according to the information about each node, wherein a key of the hash table comprises an identifier of a respective node, and a value of the hash table comprises an identifier of an adjacent node of the respective node; and
generating a random sequence according to the hash table, wherein the random sequence reflects random walks in the graph data, and the random sequence is generated by:
randomly determining, by a worker machine, an identifier of a node in the graph data as an identifier of a target node;
retrieving a corresponding value in the hash table using the identifier of the target node as a key, wherein the corresponding value comprises identifiers of adjacent nodes of the target node;
determining a quantity of the identifiers of the adjacent nodes of the target node included in the corresponding value;
randomly determining a non-negative integer less than the quantity, and obtaining an identifier of a (non-negative integer)th adjacent node included in the corresponding value;
by using the (non-negative integer)th adjacent node as the target node, iterating, until a total quantity of target nodes obtained in sequence reaches a preset quantity of random walking steps, the steps of the retrieving, the determining a quantity of the identifiers of the adjacent nodes, the randomly determining a non-negative integer less than the quantity, and the using the (non-negative integer)th adjacent node as the target node, to generate the random sequence comprising identifiers of the target nodes obtained in sequence; and
performing the random walks on nodes of the graph data according to the generated random sequence.

US Pat. No. 10,902,232

SERVICE PROCESS STARTING METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A method for starting an operation process, implemented by a server, comprising:receiving an operation request message from a terminal device in response to the terminal device scanning a barcode to obtain barcode information and determining an address of the server based on the barcode information, the operation request message comprising an identifier of a barcode provider of the barcode, an image of text associated with the barcode scanned by the terminal device, and the image of text specifying an operation function;
determining text content based on the image of text;
searching a correspondence relationship between different text content and respective operation access information to obtain operation access information corresponding to the determined text content; and
returning the operation access information to the terminal device, for the terminal device to start an operation process by using the operation access information, the operation process having the operation function specified by the received image of text.

US Pat. No. 10,902,233

SERVICE PROCESSING USING A DIGITAL OBJECT IDENTIFIER

Advanced New Technologies...

1. A computer-implemented method for service processing, comprising:obtaining a digital object identifier (DOI) of a first user of a first user device, by a second user device, wherein the DOI is generated by the first user device based on basic user information and pre-authenticated identity type information of the first user;
determining, by the second user device, the basic user information and the identity type information included in the DOI;
determining that the identity type information matches a service type of a service to be processed; and
performing, by the second user device, service processing based on the basic user information and the identity type information included in the DOI.

US Pat. No. 10,901,985

BLOCKCHAIN-BASED DATA STORAGE AND QUERY METHOD AND DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a blockchain node, a service request, the service request comprising one or more data types and respective service data corresponding to the one or more data types that are stored in a blockchain;
determining a service type corresponding to the service request;
parsing the service request to obtain each data type of the service request and service data corresponding to each data type;
determining that no relational database has been created to correspond to the service type;
creating a relational database to correspond to the service type; and
storing the service data that is obtained through parsing in the relational database.

US Pat. No. 10,901,498

METHOD AND DEVICE FOR INPUTTING PASSWORD IN VIRTUAL REALITY SCENE

Advanced New Technologies...

1. A computer-implemented method, comprising:presenting an interactive input interface in a virtual reality (VR) scene for a user of a VR device, wherein the interactive input interface comprises a plurality of input units used for an overall input, and wherein each input unit of the plurality of input units comprises one or more input elements;
in a password input process, identifying that the user selects at least two input units of the plurality of input units;
obtaining input elements in the at least two input units of the plurality of input units; and
combining, based on an order of obtaining the at least two input units of the plurality of input units, the input elements in the at least two input units of the plurality of input units to obtain an input password.

US Pat. No. 10,893,110

COMMUNICATION TOOL FOR INITIATION OF SERVICES

Advanced New Technologies...

1. A computer-implemented method, comprising:sending, by one or more processors of a client computing device to a server, a group member selection request, the group member selection request comprising a service identifier of a service operation, a rule for selecting by the server a group member from a communication group, and a communication group identifier, wherein the rule for selecting the group member from the communication group comprises at least one of:
randomly determining at least one piece of group member information of the group member from the communication group,
sequentially determining the at least one piece of the group member information according to a descending order of degrees of activeness of group members in the communication group, and
sequentially determining the at least one piece of the group member information according to time points when the group members join in the communication group from early to late;
receiving, by the one or more processors of the client computing device, the group member information of the group member selected from the communication group by the server based on the rule; and
responding, by the one or more processors of the client computing device, to execution of the service operation by the group member associated with the group member information, or by a group member other than the group member corresponding to the group member information, wherein the service operation comprises a transfer of funds from a first group member from the communication group to a second group member from the communication group.

US Pat. No. 10,891,612

BLOCKCHAIN MEMBER MANAGEMENT DATA PROCESSING METHODS, APPARATUSES, SERVERS, AND SYSTEMS

Advanced New Technologies...

1. A computer-implemented method, comprising:storing a contract rule, wherein the contract rule comprises a rule that is agreed upon by blockchain members and is used for determining registration conditions of registering users for joining a blockchain;
receiving a registration transaction message from a registering user based on the contract rule, wherein the registration transaction message comprises identification information of at least one certification authority and a signature certificate of each of the certification authorities identified in the identification information;
generating a new public key for one or more of the at least one certification authority, wherein generating the new public key comprises
determining updated key information of a certification authority to update an expired public key to the new public key,
cryptographically signing, by the certification authority, the new public key using an expired private key, and
verifying, by one or more of the blockchain members, the new public key using the expired public key,
verifying the signature certificate for each of the at least one certification authorities based on the identification information by using the new public keys of the one or more of the at least one certification authorities in a blockchain node; and
in response to determining that the at least one signature certificate are successfully verified, registering, as a new blockchain member, the registering user.

US Pat. No. 10,892,896

USING BIOMETRIC FEATURES FOR USER AUTHENTICATION

Advanced New Technologies...

1. A computer-implemented method comprising:sending, to a server, an enable request for enabling a biometric feature;
receiving, from the server and in response to the enable request, an enable request reply message;
verifying the enable request reply message using an agreed-to first public key, wherein the enable request reply message is signed by the server using an agreed-to first private key;
receiving, during a biometric feature verification enabling process, the biometric feature input by a user, the biometric feature being provided for verification of the user;
acquiring a biometric feature template identifier (ID) corresponding to the received biometric feature;
sending an authentication request to the server;
generating and saving an enable record that comprises the biometric feature template ID;
generating an enable response message that comprises the biometric feature template ID, and sending the enable response message to the server for generation and saving of a user record, the user record comprising the biometric feature template ID which is used for biometric feature verification;
receiving, from the server and in response to the authentication request, an authentication request reply message;
verifying the received authentication request reply message using the agreed-to first public key, wherein the authentication request reply message is signed by the server using the agreed-to first private key;
acquiring, using the received biometric feature, the biometric feature template ID corresponding to the received biometric feature;
determining that the acquired biometric feature template ID is consistent with a stored biometric feature template ID included in the enable record; and
in response to determining that the acquired biometric feature template ID and the stored biometric feature template ID are consistent, generating an authentication response message.

US Pat. No. 10,892,900

VERIFICATION-BASED SERVICE AUTHORIZATION

Advanced New Technologies...

1. A service authorization method, comprising:obtaining, by a first execution unit and through a service application, information to be verified, wherein the first execution unit and the service application are running in a first security environment;
generating, by the first execution unit, a verification result of the information to be verified;
obtaining, by the first execution unit and through the service application, a dynamic parameter;
signing, by the first execution unit, the verification result and the dynamic parameter using a signature verification private key to generate signature information;
obtaining, by a second execution unit and through the service application, the signature information, wherein the second execution unit is running in a second security environment that is different from the first security environment;
verifying, by the second execution unit that runs in the second security environment, the signature information using a signature verification public key corresponding to the signature verification private key;
verifying, by the second execution unit that runs in the second security environment, the dynamic parameter, wherein the dynamic parameter is associated with a validity time, and wherein verifying the dynamic parameter comprises comparing, within the validity time, the dynamic parameter to a pre-stored copy of the dynamic parameter; and
in response to verifying the signature information and the dynamic parameter, performing service authorization based on the verification result.

US Pat. No. 10,892,901

FACIAL DATA COLLECTION AND VERIFICATION

Advanced New Technologies...

1. A computer-implemented method comprising:obtaining, by a collection device, a random number that is generated by a facial recognition server responsive to a request initiated by a user, wherein the random number corresponds to current facial data collection and is stored on the facial recognition server;
obtaining, by the collection device from a local service terminal, a collection invoking instruction corresponding to the current facial data collection, wherein the collection invoking instruction is generated by the local service terminal after the local service terminal obtains a facial recognition service request initiated by the user, and wherein the local service terminal performs facial verification and facial registration;
collecting, by the collection device, a face sample of the user based on the collection invoking instruction;
generating, based on the face sample of the user, a first set of data, wherein the first set of data comprises a device identifier corresponding to the collection device and the random number;
encrypting, by the collection device using a device private key allocated to the collection device, the first set of data to generate a facial data signature;
generating, by the collection device, a digital certificate, wherein the digital certificate comprises a device public key allocated to the collection device, the first set of data, and a digital signature, wherein the digital signature is generated by encrypting the first set of data using a private key of a trusted management server;
generating, by the collection device, trusted facial data, wherein the trusted facial data comprises the first set of data, the facial data signature, and the digital certificate; and
providing the trusted facial data to the facial recognition server, wherein the facial recognition server performs verification on the trusted facial data.

US Pat. No. 10,891,364

IDENTITY VERIFICATION METHOD AND SYSTEM, AND INTELLIGENT WEARABLE DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by an intelligent wearable device that includes an embedded algorithm chip that implements a one-time password algorithm, a request from an intelligent terminal for enabling a one-time password function;
after receiving the request from the intelligent terminal, generating, by the intelligent wearable device, a public key and a private key from the embedded algorithm chip;
transmitting, by the intelligent wearable device, the public key to the intelligent terminal;
receiving, by the intelligent wearable device and from a provisioning server, encrypted provisional data that has been encrypted by the intelligent terminal using the public key;
decrypting, by the embedded algorithm chip of the intelligent wearable device, the encrypted provisional data using the generated private key to generate decrypted provisional data;
verifying the decrypted provisional data;
after verifying the decrypted provisional data, invoking, using a micro operating system of the intelligent wearable device, the embedded algorithm chip to generate, based on the one-time password algorithm and the decrypted provisional data, a one-time password; and
providing, for output by the intelligent wearable device, the one-time password for use by a verification server in verifying the intelligent wearable device.

US Pat. No. 10,891,457

MANAGING SERVICES ASSOCIATED WITH URL-BASED TWO-DIMENSIONAL CODES

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, based upon a uniform resource locator (URL) that is encoded in a a two-dimensional (2D) code by a second service institution, a request for service information, wherein the URL is sent by a mobile device and is obtained by the mobile device from scanning the 2D code when the 2D code is provided by a service provider;
parsing the URL to identify one or more data elements including a service network identifier corresponding to a service network, a service institution identifier corresponding to the second service institution that encoded the URL in the 2D code, a service type identifier corresponding to a service type, or a payload including a service object identifier corresponding to a service object of the service network;
sending the one or more data elements to the second service institution based on the service institution identifier;
receiving, by a first service institution, the service information associated with the service object and the service type from the second service institution based on the service object identifier and the service type identifier; and
sending the service information from the first service institution for presenting on the mobile device.

US Pat. No. 10,893,044

BIOMETRIC IDENTITY REGISTRATION AND AUTHENTICATION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method, comprising:receiving, at an authentication server and from a service server, a first registration information request packet of a user equipment, wherein the first registration information request packet includes an identity of a service account;
generating, by the authentication server, a virtual account identity corresponding to the identity of the service account;
encapsulating, by the authentication server, the virtual account identity into a registration information response packet;
signing, by the authentication server, the registration information response packet using an authentication server private key;
forwarding, by the authentication server through the service server, the registration information response packet to the user equipment;
performing, by the user equipment, a first signature verification on the registration information response packet using a registered authentication server public key, wherein the registered authentication server public key corresponds to the authentication server private key;
determining that the first signature verification is successful;
in response to determining that the first signature verification is successful, receiving, by the authentication server, from the user equipment through the service server, a second registration request packet signed by the user equipment using a user equipment private key, wherein the second registration request packet includes a device identity of the user equipment, the virtual account identity, a biometric authentication type, a biometric feature token, and a service public key, wherein the service public key and a corresponding service private key are generated by the user equipment and are used to perform identity authentication of the user equipment;
obtaining, a registered user equipment public key based on the device identity of the user equipment, wherein the registered user equipment public key corresponds to the user equipment private key;
performing a second signature verification on the second registration request packet using the registered user equipment public key;
performing, by the authentication server, a verification of the second registration request packet based on a registration verification code and a time interval between a transmission of the registration information response packet and a receiving the second registration request packet;
determining that the second signature verification is successful and the verification of the second registration request packet is successful; and
in response to determining that the second signature verification is successful and the verification of the second registration request packet is successful, saving, by the authentication server, a mapping relationship among the device identity of the user equipment, the virtual account identity, the biometric authentication type, the biometric feature token, and the service public key, to perform an identity authentication on the service account.

US Pat. No. 10,893,048

MULTI-BLOCKCHAIN NETWORK DATA PROCESSING

Advanced New Technologies...

1. A computer-implemented method, comprising:obtaining a data processing request at a blockchain node that is operating as a blockchain node in both a public blockchain network and an alliance-specific blockchain network, the data processing request containing an identifier used to identify the public blockchain network or the alliance-specific blockchain network as a blockchain network to which the data processing request belongs, wherein the blockchain node comprises a ledger for the public blockchain network and a ledger for the alliance-specific blockchain network;
extracting the identifier from the data processing request; and
executing, based on the identifier, corresponding processing logic associated with the data processing request.

US Pat. No. 10,891,510

METHOD AND SYSTEM FOR EVALUATING AN OBJECT DETECTION MODEL

Advanced New Technologies...

1. A computer-implemented method for evaluating performance of an object detection model, comprising:generating a predicted bounding box representing an object based on the object detection model, wherein the object is positioned proximate to one or more adjacent objects;
determining an area of intersection between the predicted bounding box and a groundtruth bounding box of the object;
determining a modified area of union between the predicted bounding box and the groundtruth bounding box of the object, wherein determining the modified area of union comprises determining, based on one or more weights, a weighted area of union between the predicted bounding box and the groundtruth bounding box, wherein the one or more weights comprises:
a predetermined first weight associated with a portion of the predicted bounding box not intersecting with the groundtruth bounding box of the object; and
a predetermined second weight associated with a portion of the groundtruth bounding box of the object not intersecting with the predicted bounding box, wherein the predetermined first weight is less than the predetermined second weight; and
determining a score equal to the area of intersection between the predicted bounding box and the groundtruth bounding box of the object divided by the modified area of union, wherein the score represents the performance of the object detection model.

US Pat. No. 10,891,515

VEHICLE ACCIDENT IMAGE PROCESSING METHOD AND APPARATUS

Advanced New Technologies...

1. A computer-implemented method for vehicle accident image processing, comprising:obtaining a group of N vehicle accident images, wherein N is a natural number greater than or equal to 2;
obtaining N feature vectors respectively corresponding to the vehicle accident images by inputting the vehicle accident images into a trained convolutional neural network;
calculating respective distances between pairs of feature vectors among the N feature vectors, the pairs of feature vectors corresponding respectively to pairs of images among the N vehicle accident images;
determining that a pair of images of the N vehicle accident images corresponding to the distance are abnormal when the distance is greater than a first predetermined threshold;
determining a number of pairs of images that are abnormal, wherein the number of pairs of images that are abnormal is equal to B;
calculating a first probability based on B and N;
determining that the first probability is greater than a second predetermined threshold; and
in response, classifying the group of the N vehicle accident images as abnormal.

US Pat. No. 10,891,517

VEHICLE ACCIDENT IMAGE PROCESSING METHOD AND APPARATUS

Advanced New Technologies...

1. A computer-implemented method for vehicle accident image processing, comprising:obtaining a group of N vehicle accident images, wherein N is a natural number greater than or equal to 2;
obtaining N feature vectors respectively corresponding to the vehicle accident images by inputting the vehicle accident images into a trained convolutional neural network;
calculating respective distances between pairs of feature vectors among the N feature vectors, the pairs of feature vectors corresponding respectively to pairs of images among the N vehicle accident images;
determining that a pair of images of the N vehicle accident images corresponding to the distance are abnormal when the distance is greater than a first predetermined threshold;
determining a number of the vehicle accident images that are abnormal, wherein the number of the vehicle accident images that are abnormal is equal to M;
calculating a first probability based on M and N;
determining that the first probability is greater than a second predetermined threshold; and
in response, classifying the group of the N vehicle accident images as abnormal.

US Pat. No. 10,877,829

SYSTEM AND METHOD FOR ENDING VIEW CHANGE PROTOCOL

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method, comprising:obtaining, by a second node of a number (N) of nodes, a view change message from a first node of the N nodes, wherein:
N is an integer greater than or equal to four,
the N nodes maintain a blockchain by executing a Practical Byzantine Fault Tolerance-based consensus algorithm,
one of the N nodes is designated as a primary node,
(N?1) of the N nodes other than the designated primary node are designated as backup nodes,
the second node of the N nodes is in a normal operation protocol of the Practical Byzantine Fault Tolerance-based consensus algorithm, and
the first node of the N nodes is in a view change protocol of the Practical Byzantine Fault Tolerance-based consensus algorithm;
in response to the view change message, determining, by the second node, a current status of the second node; and
in response to determining that the current status is the normal operation protocol, transmitting, by the second node, to the first node an echo message for the first node to exit the view change protocol based on receiving Q consistent echo messages from Q second nodes,
the echo message comprising (1) a current view known to the second node indicating the primary node designated among the N nodes and (2) a current sequence number known to the second node,
the current sequence number corresponding to a newest block of the blockchain or a newest transaction committed by the second node in the execution of the Practical Byzantine Fault Tolerance-based consensus algorithm,
wherein a number (F) of tolerable non-functioning nodes is (N?1)/3 rounded down to the nearest integer, and Q is (N+F+1)/2 rounded up to the nearest integer.

US Pat. No. 10,880,323

METHOD AND DEVICE FOR DETERMINING DATA ANOMALY

Advanced New Technologies...

1. A computer-implemented method for determination of anomalous data, the computer-implemented method comprising:retrieving, by one or more processors, a plurality of data packets within a predetermined time period, the plurality of data packets comprising a data structure;
determining, by the one or more processors, a historical distribution, wherein the historical distribution is of historical data comprising the data structure as the data packets;
determining, by the one or more processors, a data distribution state of the plurality of data packets as a current distribution;
determining, by the one or more processors, a first distribution state parameter of a randomly selected data packet in the current distribution;
determining, by the one or more processors, a second distribution state parameter of the randomly selected data packet in the historical distribution;
comparing, by the one or more processors, the plurality of data packets with the historical distribution by determining a difference value between the first distribution state parameter and the second distribution state parameter to generate a comparison result;
determining, by the one or more processors, that the difference value exceeds a predetermined difference threshold;
in response to determining that the difference value exceeds the predetermined difference threshold, determining, by the one or more processors, that a data anomaly exists in the plurality of data packets; and
in response to determining that the data anomaly exists in the plurality of data packets, generating, by the one or more processors, an alert indicating the data anomaly.

US Pat. No. 10,880,324

METHOD AND DEVICE FOR DETERMINING DATA ANOMALY

Advanced New Technologies...

1. A computer-implemented method for determination of anomalous data, the computer-implemented method comprising:processing, by one or more processors, data packets comprising a data structure to determine a historical distribution of historical data based on the data structure and a current distribution corresponding to a data distribution state of the data packets;
determining, by the one or more processors, a first distribution state parameter of a randomly selected data packet in the current distribution;
determining, by the one or more processors, a second distribution state parameter of the randomly selected data packet in the historical distribution;
comparing, by the one or more processors, the current distribution of the data packets with the historical distribution by determining a difference value between the first distribution state parameter and the second distribution state parameter to generate a comparison result;
determining, by the one or more processors, that the difference value exceeds a predetermined difference threshold;
in response to determining that the difference value exceeds the predetermined difference threshold determining, by the one or more processors, that a data anomaly exists in the data packets; and
in response to determining that the data anomaly exists in the data packets, generating, by the one or more processors, an alert indicating the data anomaly.

US Pat. No. 10,880,583

METHOD, APPARATUS, TERMINAL, AND READABLE STORAGE MEDIUM FOR OFFLINE CACHING

ADVANCED NEW TECHNOLOGIES...

1. A method for performing offline resource caching on a terminal having an operating system, wherein the operating system comprises a framework layer and an application layer, the method comprising:modifying a data source module of a media player component on the framework layer to create a cache data source module on the framework layer for downloading streaming media and a media cache module on the framework layer for writing the streaming media to a media player database external to the media player component such that when the data source module is destroyed, the streaming media remain at the media player database;
downloading, by the cache data source module, a media resource from a storage, and writing the media resource into the media cache module to generate an offline cache file;
storing the offline cache file at the media player database; and
providing the stored offline cache file to the application layer for access.

US Pat. No. 10,880,077

PROCESSING BLOCKCHAIN DATA BASED ON SMART CONTRACT OPERATIONS EXECUTED IN A TRUSTED EXECUTION ENVIRONMENT

Advanced New Technologies...

1. A computer-implemented method for processing blockchain data under a trusted execution environment (TEE), the method comprising:receiving, by a blockchain node, a request to execute one or more software instructions in a TEE executing on the blockchain node;
identifying, by a virtual machine in the TEE based on the request, data associated with one or more blockchain accounts related to the execution of the one or more software instructions;
in response to identifying the data associated with the one or more blockchain accounts, traversing, by the virtual machine, a global state of a blockchain stored in the TEE to locate the data associated with the one or more blockchain accounts;
executing, by the virtual machine, the one or more software instructions based on the data, wherein the global state of the blockchain stored in the TEE is updated during execution of the one or more software instructions to produce an updated global state;
in response to executing the one or more software instructions, generating, by the blockchain node, an encrypted representation of the updated global state; and
storing, by the blockchain node, the encrypted representation of the updated global state in a storage location separate from the TEE.

US Pat. No. 10,880,078

DATA STORAGE, DATA CHECK, AND DATA LINKAGE METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A method comprising:calculating, by a data storage apparatus, a first check value of a first version of data content of a target object stored in a database external to a blockchain and different from the data storage apparatus, the target object comprising data content of a plurality of versions that comprise the first version and a second version that is adjacent to and previous to the first version;
determining a version identifier of the second version of data content of the target object;
searching the blockchain, by the data storage apparatus based on a mapping relationship stored in the database between the version identifier of the second version and a block identifier of an existing data block in the blockchain, to obtain a second check value of the second version of data content of the target object from the existing data block in the blockchain;
creating, by the data storage apparatus, a new data block comprising the first check value, the second check value, a version identifier of the first version, and the version identifier of the second version;
storing, by the data storage apparatus, the new data block in the blockchain; and
storing, by the data storage apparatus in the database, a mapping relationship between the identifier of the first version and a block identifier of the new data block.

US Pat. No. 10,878,109

BLOCKCHAIN-BASED IMAGE PROCESSING METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A blockchain-based image processing method, comprising:obtaining, by a computing device, copyright-related information corresponding to an original image;
sending, by the computing device, the copyright-related information to one or more blockchain nodes configured to obtain ciphertext information by encrypting the copyright-related information and to store the ciphertext information in the blockchain;
obtaining, by the computing device, the ciphertext information from the blockchain; and
performing, by the computing device, obfuscation on a pixel matrix of the original image based on the ciphertext information to generate a target image carrying the copyright-related information, by:
encoding the ciphertext information to obtain a binary string corresponding to the ciphertext information;
inserting at least one character of the binary string into the pixel matrix according to a set character spacing; and
dividing the pixel matrix into a plurality of pixel regions according to a set dividing rule, and inserting the binary string into at least one of the pixel regions; or
dividing the pixel matrix into a plurality of pixel regions according to a set dividing rule, and inserting a portion of the binary string into each of the pixel regions.

US Pat. No. 10,878,125

PRIVACY PROTECTION BASED TRAINING SAMPLE GENERATION METHOD AND DEVICE

Advanced New Technologies...

1. A privacy protection based training method, comprising:generating, by a processor, n d-dimensional transform vectors from original data to be mined, wherein the original data is generated from Internet-based activities and comprises m original samples, each original sample comprises a d-dimensional original vector x and an output tag value y, m and d being natural numbers, and each transform vector ? is determined by a sum of yx of a plurality of original samples randomly selected from the m original samples, wherein the generating the n d-dimensional transform vectors ? comprises one of:
in a first process, generating an m-dimensional vector ?, randomly determining ?v or v as a value of each dimension of ?, wherein the value of y is ?v or v, and v is a real number, and determining ½?i=1m(yi+?i)xi as a transform vector ?, wherein yi is an output tag value of an i-th original sample, xi is an original vector of the i-th original sample, and ?1 is the i-th dimension of the vector ?; and repeating the first process n times to obtain n transform vectors ?; or
in a second process, generating an m-dimensional vector w, randomly determining 0 or 1 as a value of each dimension of w, and determining ?i=1m wiyixi as a transform vector ?, wherein wi is an i-th dimension of the vector w, yi is an output tag value of an i-th original sample, xi is an original vector of the i-th original sample; and repeating the second process n times to obtain n transform vectors ?;
determining, by the processor, the n d-dimensional transform vectors ? as training samples of a binary classification model; and
training, by the processor, the binary classification model based on the training samples to obtain an outcome model for further data mining from the Internet-based activities.

US Pat. No. 10,880,096

SYSTEM AND METHOD FOR BLOCKCHAIN-BASED CROSS-ENTITY AUTHENTICATION

ADVANCED NEW TECHNOLOGIES...

20. A system comprising one or more processors and one or more non-transitory computer-readable memories coupled to the one or more processors and configured with instructions executable by the one or more processors to cause the system to perform operations comprising:obtaining, from a blockchain, a first blockchain transaction comprising an authentication request sent by a first entity for authenticating a user, wherein the authentication request comprises a DID (decentralized identifier) corresponding to the user;
determining that the first entity is permitted to access authentication information of the user corresponding to the DID, wherein the authentication information is endorsed by a second entity;
obtaining an authentication result of whether the DID is registered with the second entity;
generating a second blockchain transaction comprising the authentication result; and
notifying the first entity of the authentication result by adding the second blockchain transaction to the blockchain.

US Pat. No. 10,878,130

SECURE DATA TRANSACTIONS

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a receiver of a data exchange platform and from a first device associated with a first user, data information associated with first data;
publishing, by the data exchange platform, the data information associated with the first data;
receiving, by the receiver of the data exchange platform and from a second device associated with a second user, an order to acquire the first data;
writing, by one or more hardware processors of the data exchange platform, a data exchange agreement between the first user and the second user into a block chain, wherein the data exchange agreement includes feature information of the first data and the order; and
receiving, by the receiver of the data exchange platform and from the first device associated with the first user, a first key, wherein the first key is used for decrypting encrypted first data and the encrypted first data is generated by the first device and transmitted to the second device without passing through the data exchange platform;
after receiving, from the second device, an amount of payment defined in the data exchange agreement, transmitting, by a transmitter of the data exchange platform and to the second device associated with the second user, the received first key, the second device configured to decrypt the encrypted first data using the received first key to obtain the first data;
receiving, by the receiver of the data exchange platform from the second device, confirmation information indicating that the obtained first data conforms to the data exchange agreement; and
transmitting, by the transmitter of the data exchange platform, the amount of payment to the first device.

US Pat. No. 10,880,105

MANAGING BLOCKCHAIN-BASED CENTRALIZED LEDGER SYSTEMS

Advanced New Technologies...

1. A computer-implemented method for managing a blockchain-based centralized ledger system, the computer-implemented method comprising:maintaining a plurality of blockchains in the blockchain-based centralized ledger system by a computing system, each of the plurality of blockchains comprising a plurality of blocks storing transaction data;
maintaining a centralized trust timestamp blockchain by the computing system, the centralized trust timestamp blockchain comprising a plurality of timestamp blocks storing trust timestamp information of a trust time server for the plurality of blockchains, the trust time server being associated with a trust time authority and independent from the blockchain-based centralized ledger system, the centralized trust timestamp blockchain being different from each of the plurality of blockchains;
receiving a plurality of timestamp requests for a plurality of to-be-timestamped blocks in the plurality of blockchains by the computing system, each of the plurality of timestamp requests including information of a respective to-be-timestamped block of the plurality of to-be-timestamped blocks in the plurality of blockchains;
transmitting a centralized server timestamp request for the plurality of timestamp requests for the plurality of to-be-timestamped blocks to the trust time server by the computing system;
in response to transmitting the centralized server timestamp request, receiving a timestamp and associated signature of the trust time server for the plurality of to-be-timestamped blocks from the trust time server by the computing system; and
storing information of the timestamp and the associated signature of the trust time server and the information of the plurality of to-be-timestamped blocks in a timestamp block of the centralized trust timestamp blockchain by the computing system.

US Pat. No. 10,877,640

APPLICATION INTERFACE MANAGEMENT METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. An application interface management method, comprising:obtaining interface layout parameters from an interface layout server, the interface layout parameters comprising layout parameters of a plurality of functional areas and layout parameters of a plurality of functional icons, wherein:
the layout parameters of functional areas comprise: an ID and one or more location parameters of each of the functional areas, and
the layout parameters of functional icons comprise: an ID of each of the functional icons, an ID of one of the functional areas in which each of the functional icons is located, and one or more location parameters of each of the functional icons within the functional area in which the functional icon is located;
generating an application interface for a mobile terminal according to the obtained layout parameters of functional areas and obtained layout parameters of functional icons, wherein:
the application interface comprises a first functional area and a second functional area each comprising one or more functional icons,
the first functional area and the second functional area are arranged to occupy different vertical locations of the application interface;
in response to a change operation by a user on the application interface, changing an interface layout of the application interface, wherein:
the change operation by the user comprises pressing and holding on one of the functional icons to trigger the change and, in response to the application interface displaying a button on each of the functional icons for deleting the corresponding functional icon, clicking the button on a target functional icon in the first functional area to delete the target functional icon, and
the changing an interface layout of the application interface comprises, responsive to the user clicking the button for deleting the target functional icon and without further user intervention, automatically changing one or more location parameters of the first functional area to decrease dimensions of the first functional area by scaling the first functional area and, following the scaling of the first functional area, automatically changing one or more location parameters of the second functional area to move the second functional area such that the second functional area occupies at least part of a region in the application interface that was occupied by the first functional area prior to the scaling and not occupied by the first functional area subsequent to the scaling; and
storing layout parameters of one or more functional areas and layout parameters of one or more functional icons corresponding to the changed application interface, to the interface layout server.

US Pat. No. 10,877,899

SYSTEM AND METHOD FOR DATA PROCESSING

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for data processing, comprising:obtaining, by a virtual machine, bytecode compiled from source code, wherein the source code includes one or more input parameters and an encoding function configured to encode the one or more input parameters, save the encoded one or more input parameters in a memory segment, and provide a memory location of the memory segment, and wherein the memory location comprises an address corresponding to the memory segment;
at the virtual machine, encoding the one or more input parameters, saving the encoded one or more input parameters in the memory segment, and obtaining the memory location of the memory segment storing the encoded one or more input parameters by executing the encoding function according to the bytecode; and
providing, by the virtual machine, the memory location to a function configured to retrieve and decode the encoded one or more input parameters to obtain the one or more input parameters.

US Pat. No. 10,880,383

METHODS AND DEVICES FOR ESTABLISHING COMMUNICATION BETWEEN NODES IN BLOCKCHAIN SYSTEM

Advanced New Technologies...

1. A computer-implemented method for establishing communication between a first node and a second node in a blockchain system, the method comprising:providing, by the first node, a node identifier of the first node to the second node and receiving, by the first node, a node identifier of the second node from the second node, to cause a first communication session to be established between the first node and the second node, the first node and the second node participating in the blockchain system to manage one or more blockchains;
determining, by the first node, based the node identifier of the second node, whether a second communication session exists between the first node and the second node; and
in response to a determination that the second communication session exists between the first node and the second node, terminating, by the first node, one of the first communication session and the second communication session based on the node identifier of the first node and the node identifier of the second node, the terminating comprising:
determining a node by one of: determining a node of the first node and the second node that has a greater node identifier, or determining a node of the first node and the second node that has a smaller node identifier;
determining a communication session of the first communication session and the second communication session that is established based on a connection request sent from the determined node; and
selecting the determined communication session of the first communication session and the second communication session for termination.

US Pat. No. 10,878,417

METHOD AND APPARATUS FOR CONSENSUS VERIFICATION

ADVANCED NEW TECHNOLOGIES...

1. One or more non-transitory computer-readable storage media storing instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising:before a consensus verification phase begins:
receiving, by a load-balancing device, a blockchain transaction from a client, wherein a first blockchain node of a consensus network comprises the load-balancing device, a plurality of servers, and a transaction memory, and the load-balancing device is coupled to each of the plurality of servers;
distributing, by the load-balancing device, the blockchain transaction to a first server of the plurality of servers according to load balancing among the plurality of servers;
performing, by the first server, a first security verification on the blockchain transaction before accepting the first blockchain transaction, wherein the first security verification comprises an asymmetric signature legality verification;
in response to the first server determining that the blockchain transaction passes the first security verification:
storing, by the first blockchain node, the blockchain transaction into the transaction memory; and
broadcasting, via the consensus network by the first blockchain node, the blockchain transaction to each of a plurality of second blockchain nodes of the consensus network, causing each of the second blockchain nodes to store the blockchain transaction in a memory corresponding to the each second blockchain node in response to the each second blockchain node determining that the blockchain transaction passes a second security verification, wherein the second security verification comprises the asymmetric signature legality verification;
in response to determining that a preset condition is satisfied, generating, by a second server of the plurality of servers, a pre-processed data block comprising a unique characteristic value, wherein the pre-processed data block comprises a queue of a plurality of identifiers of a plurality of blockchain transactions including an identifier of the blockchain transaction, and the unique characteristic value corresponds to an order of the queue; and
during a consensus verification phase:
selecting, by the load-balancing device, a third server according to load balancing among the plurality of servers; and
broadcasting, via the consensus network by the third server of the plurality of servers, the pre-processed block comprising the unique characteristic value to at least one of the plurality of second blockchain nodes, causing the at least one second blockchain node to verify the unique characteristic value based at least on the plurality of identifiers, including the identifier of the blockchain transaction that has passed the second security verification and has been stored in the at least one second blockchain node before the consensus verification phase began.

US Pat. No. 10,878,423

BLOCKCHAIN-BASED TRANSACTION PROCESSING METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:receiving, at a computing device from an account, account information of a different account in need of administrative supervision and a first operation content, the account having one or more administrative supervision capabilities over the different account through different smart contracts corresponding to the account;
generating, at the computing device, an operation instruction comprising the account information and the first operation content;
sending, at the computing device, the operation instruction to one or more nodes in a blockchain network;
selecting, at the one or more nodes, based on a first mapping relationship between different operation contents of the account and the different smart contracts corresponding to the account, a first smart contract of the different smart contracts that corresponds to the first operation content; and
executing, by invoking the first smart contract at the one or more nodes, an operation according to the first operation content on the different account corresponding to the account information.

US Pat. No. 10,878,609

EFFICIENT IMAGE SYNTHESIS

Advanced New Technologies...

1. A computer-implemented method for providing multiple distinct, synthesized images that each include a same background image and a same foreground element, the method comprising:selecting a background image and quantity n foreground elements that are both to be used to generate each of multiple, distinct synthesized images;
selecting a sub-region of the background image in which the foreground element is to be synthesized in each of the multiple, distinct synthesized images;
for each of the multiple, distinct synthesized images that are to be generated:
selecting a parameter that is unique to the synthesized image that is to be generated,
selecting, from among multiple pre-determined curve functions that are each associated with displaying foreground elements in synthesized images, a particular curve function based at least on the parameter that is unique to the synthesized image that is to be generated,
generating a curve based on the selected, particular curve function,
dividing the curve into n line segments,
for each of the foreground elements, aligning the foreground element with a starting point of a different line segment,
and
generating a distinct, synthesized image that comprises the background image overlaid within the sub-region by the foreground elements that are each aligned with a starting point of a different line segment; and
providing one or more of the multiple, distinct synthesized images in response to a request for a synthesized image.

US Pat. No. 10,877,930

BLOCKCHAIN-BASED CROSS-CHAIN DATA ACCESS METHOD AND APPARATUS

Advanced New Technologies...

1. A computer-implemented method for blockchain-based cross-chain data access, the computer-implemented method comprising:receiving, from a node of a first blockchain of a multi-chain system comprising a plurality of different blockchains and including the first blockchain and a target blockchain, an access request for accessing target data stored in a target node of the target blockchain,
wherein the access request comprises an indication of the target blockchain that stores the target data and an access path in the multi-chain system to the target data,
wherein the access path comprises immutable content stored by an access path node of the target blockchain,
wherein the immutable content is used as an address for accessing the access path node,
wherein the access path node comprises an access link that corresponds to the target data,
 wherein the access link is used to point to the target node from the access path node, and
wherein the access path further comprises an instance name of an instance of the target blockchain supporting a blockchain protocol;
obtaining the target data from the target blockchain based on the access path; and
transmitting the target data to the node of the first blockchain.

US Pat. No. 10,878,199

WORD VECTOR PROCESSING FOR FOREIGN LANGUAGES

Advanced New Technologies...

1. A word vector processing method, comprising:performing word segmentation on a corpus to obtain words;
determining n-gram strokes corresponding to the words, the n-gram stroke representing n successive strokes of a corresponding word;
initializing word vectors of the words and stroke vectors of the n-gram strokes corresponding to the words; and
after performing the word segmentation, determining the n-gram strokes, and initializing the word vectors and stroke vectors, performing operations comprising:
determining a designated word in the corpus and a context word of the designated word in the corpus,
determining a degree of similarity between the designated word and the context word according to a vector dot product of stroke vectors of n-gram strokes corresponding to the designated word and a word vector of the context word, and
updating the word vector of the context word and the stroke vectors of the n-gram strokes corresponding to the designated word according to the degree of similarity between the designated word and the context word.

US Pat. No. 10,878,212

TWO-DIMENSIONAL CODE SCANNING INTERACTION METHODS AND APPARATUSES

Advanced New Technologies...

1. A method of interacting with two-dimensional (2D) codes, the method comprising:acquiring, by an apparatus, a first 2D-code value corresponding to a scanned 2D code;
determining, by the apparatus, an application associated with the first 2D-code value by querying a local storage of the apparatus; and
responsive to determining the application associated with the first 2D-code value:
obtaining a second 2D-code value corresponding to the first 2D-code value; and
calling the application to open the second 2D-code value.

US Pat. No. 10,878,239

RECOGNIZING CARBON-SAVING BEHAVIORS FROM IMAGES

Advanced New Technologies...

1. A method, comprising:obtaining an image sent by a user, wherein the image is collected by the user for a merchant;
attempting to identify one or more behaviors of the merchant that relate to reducing carbon footprint, comprising processing the image using a trained image recognition model;
in response to determining that the attempt to identify the one or more behaviors of the merchant that relate to reducing carbon footprint is successful;
determining, based on the one or more behaviors that relate to reducing carbon footprint, a numeric value that is an estimate of a change in carbon footprint of the merchant; or
in response to determining that the attempt to identify the one or more behaviors of the merchant that relate to reducing carbon footprint is unsuccessful;
prompting the user to enter labeling information for the image that identifies respective user-specified types of the one or more behaviors of the merchant that relate to reducing carbon footprint;
determining, based on the labeling information entered by the user, the numeric value that is the estimate of the change in carbon footprint of the merchant; and
adjusting, using the labeling information entered by the user, the trained image recognition model; and
crediting an account associated with the merchant by an amount corresponding to the numeric value.

US Pat. No. 10,877,990

REMOTE DATABASE SYNCHRONIZATION

Advanced New Technologies...

1. A computer-implemented method, comprising:instructing, by a service application executed by a computer-implemented system, a local database of the service application to perform one or more database operations corresponding to a data update event to update service data stored in the local database;
determining, by the service application, that the one or more database operations are completed;
acquiring, by the service application, the service data updated by the one or more database operations in the data update event;
generating, by the service application, an event version corresponding to the data update event;
encapsulating, by the service application, the service data and the event version into an event object; and
transmitting, by the service application, the event object to a peer-end service application for synchronizing corresponding service data in a peer-end database of the peer-end service application;
receiving, by the service application and from the peer-end service application, an additional event object, wherein the additional event object comprises a service main key and an additional event version;
identifying, by the service application, a plurality of locally-recorded data update events associated with the service main key;
identifying, by the service application and based on a plurality of event versions associated with the plurality of locally-recorded data update events, a particular locally-recorded data update event among the plurality of locally-recorded data update events, wherein the particular locally-recorded data update event is associated with a particular event version and occurs the latest among the plurality of locally-recorded data update events chronologically; and
determining, by the service application and based on comparing the additional event version with the particular event version, that an additional data update event associated with the additional event object is valid.

US Pat. No. 10,877,738

ONE CLICK APPLICATION ASSET DISTRIBUTION

Advanced New Technologies...

1. A computer-implemented method comprising:receiving, at a remote computer device, a download request from a second device, the download request indicating that the second device has received a first file package from a first device over a local communication link between the first device and the second device, wherein the first file package is associated with an application installed on the first device and comprises a first portion of information usable for installation of the application on the second device;
sending, by the remote computer device to the first device, a verification request, wherein the verification request comprises a request to verify that a user of the first device has authorized the download request;
receiving, at the remote computer device from the first device, verification information corresponding to the verification request;
authenticating, by the remote computer device, the received verification information to determine whether the user of the first device has authorized the download request; and
in response to determining that the user of the first device has authorized the download request, providing, by the remote computer device to the second device, a second file package, the second file package being supplementary to the first file package and comprising a second portion of information usable for installation of the application on the second device, wherein a size of the second file package is smaller than a size of a file package that is independently usable for installing the application on the second device, and wherein the first file package is encrypted, and the second file package comprises a decryption key usable for decrypting the first file package.

US Pat. No. 10,878,548

SPECULAR REFLECTION REDUCTION USING POLARIZED LIGHT SOURCES

Advanced New Technologies...

1. A method for generating a composite image from multiple images, the method comprising:receiving, by one or more processing devices, a first image that includes an eyeglass lens, wherein the eyeglass lens is illuminated by a first illumination source radiating electromagnetic radiation in a first polarization state;
receiving, by the one or more processing devices, a second image that includes the eyeglass lens, wherein the eyeglass lens is illuminated by a second illumination source radiating electromagnetic radiation in a second polarization state, wherein:
a reflection of the second illumination source on the eyeglass lens and a reflection of the first illumination source on the eyeglass lens are at different locations,
the second polarization state is different from the first polarization state and
the second illumination source is spatially separated from the first illumination source;
identifying, by the one or more processing devices in the first image, a first portion that represents the reflection of the first illumination source on the eyeglass lens;
identifying, by the one or more processing devices in the second image, a second portion corresponding to the first portion of the first image, wherein:
the second portion does not represent the reflection of the second illumination source on the eyeglass lens, and
the first portion and the second portion represent a same portion of the eyeglass lens; and
generating, by the one or more processing devices, the composite image in which the first portion is replaced by the corresponding second portion from the second image.