US Pat. No. 10,999,060

DATA PROCESSING METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A data processing method, comprising:establishing a logic contract of a blockchain and one or more data contracts corresponding to the logic contract by:
separating a logic part of a smart contract of the blockchain to establish the logic contract, and
when a volume of data contracts in the blockchain reaches a preset threshold, establishing a new data contract, wherein the established one or more data contracts comprise the new data contract;
deploying the logic contract and the one or more data contracts on the blockchain;
storing data of a target block in the blockchain into the one or more data contracts;
computing a hash value of each of the one or more data contracts;
computing a hash value of the logic contract; and
determining a hash value of the target block in the blockchain based on the hash value of the logic contract and the hash value of each of the one or more data contracts.

US Pat. No. 10,909,223

COPYRIGHT PROTECTION BASED ON HIDDEN COPYRIGHT INFORMATION

Advanced New Technologies...

1. A computer-implemented method for hiding copyright information in a display screen, the method comprising:generating, by a computing device associated with the display screen, a unique identifier (ID) based on copyright information associated with digital content, wherein the copyright information and the digital content are recorded on a blockchain of a blockchain network, and
wherein the unique ID comprises a public key certificate issued by a certificate authority, the public key certificate comprising a digital signature of the certificate authority;
determining, by the computing device, one or more attributes associated with the display screen; and
embedding, by the computing device, the unique ID in content presented on the display screen by changing the one or more attributes associated with the display screen, the unique ID enabling retrieval of the copyright information from the blockchain based on the unique ID.

US Pat. No. 10,977,465

SERVICE PROCESSING USING A DIGITAL OBJECT IDENTIFIER

Advanced New Technologies...

1. A computer-implemented method for service processing, comprising:obtaining a digital object identifier (DOI) of a first user of a first user device, by a second user device, wherein the DOI is generated by the first user device based on basic user information and pre-authenticated identity type information of the first user, wherein both the first user device and the second user device are disconnected from a communication network;
determining, by the second user device, the basic user information and the identity type information included in the DOI;
obtaining calibration information, comprising a plurality of different identity types and validity periods of different identity types;
checking, based on the calibration information, a validity of the identity type information included in the DOI; and
performing, by the second user device, the service processing based on the basic user information and the identity type information included in the DOI.

US Pat. No. 10,977,126

SHARED BLOCKCHAIN DATA STORAGE BASED ON ERROR CORRECTION CODE

Advanced New Technologies...

1. A computer-implemented method for storing blockchain data, the computer-implemented method comprising:determining, by a blockchain node, one or more blocks that are visited less than a preset number of times within a threshold time, wherein the one or more blocks are stored on the blockchain node and created on a blockchain;
performing, by the blockchain node, error correction coding of the one or more blocks to generate one or more encoded blocks;
dividing, by the blockchain node based on one or more predetermined rules, each of the one or more encoded blocks to a plurality of data sets;
selecting, by the blockchain node, one or more data sets from the plurality of data sets of each of the one or more encoded blocks based on the one or more predetermined rules;
hashing, by the blockchain node, the one or more data sets to generate one or more hash values corresponding to the one or more data sets;
storing, by the blockchain node, the one or more hash values; and
deleting, by the blockchain node, the one or more data sets.

US Pat. No. 11,055,277

INTEGRITY VERIFICATION METHOD, APPARATUS, AND SYSTEM AND DEVICE FOR DATA IN A BLOCKCHAIN-TYPE LEDGER

Advanced New Technologies...


1. A computer-implemented method for data verification, comprising:receiving, by a coordinator node in a database system that stores data in blockchain-type ledgers in a centralized manner, a first verification instruction, wherein the database system comprises the coordinator node and one or more data nodes;
determining, by the coordinator node and based on the first verification instruction, a target ledger that is to be verified, wherein the target ledger comprises a blockchain-type ledger that stores a plurality of data blocks, wherein in the blockchain-type ledger, each data block of the plurality of data blocks comprises a corresponding block header used to store corresponding metadata and a corresponding block body used to store corresponding data records, wherein except an initial data block, each data block of the plurality of data blocks comprises at least one data record and a corresponding hash value that is determined by both the at least one data record and a hash value of a previous data block, and wherein block heights of the plurality of data blocks increase monotonically according to a block generation time sequence;
performing, by the coordinator node and based on block header information stored in the coordinator node, block header integrity verification on block headers of the plurality of data blocks in the target ledger, wherein the block header information comprises information of the corresponding block header of each data block of the plurality of data blocks in the target ledger, and wherein performing the block header integrity verification on the block headers of the plurality of data blocks in the target ledger comprises:for each data block of the plurality of data blocks in the target ledger,comparing the corresponding hash value of each data block of the plurality of data blocks in the block header information with a hash value generated using the corresponding data records associated with each data block of the plurality of data blocks;


determining, by the coordinator node, if the block header integrity verification succeeds;
if the block header integrity verification fails:refraining, by the coordinator node, from further integrity verification of the target ledger; and
generating, by the coordinator node, an indicator indicating that integrity of the target ledger has been compromised; and

if the block header integrity verification succeeds;determining, by the coordinator node and for each data block of the plurality of data blocks in the target ledger, a corresponding target data node in the database system based on routing information stored in the coordinator node, wherein the routing information comprises mapping relationship between each data block of the plurality of data blocks in the target ledger and a corresponding data node in the database system;
sending, by the coordinator node and to each target data node in the database system, a corresponding second verification instruction, wherein each target data node stores a corresponding data block of the plurality of data blocks in the target ledger, and wherein the corresponding second verification instruction comprises a corresponding data block identifier associated with the corresponding data block of the plurality of data blocks in the target ledger;
receiving, by the coordinator node and from each target data node, a corresponding verification result, wherein each target data node is associated with the corresponding second verification instruction, wherein the corresponding verification result is of block body integrity verification on a data block corresponding to a data block identifier comprised in the corresponding second verification instruction; and
determining, by the coordinator node, the integrity of the target ledger based on the corresponding verification result received from each target data node.


US Pat. No. 10,977,135

CONSENSUS SYSTEM DOWNTIME RECOVERY

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented consensus method to be implemented on a blockchain maintained by a number (N) of nodes, wherein one of the nodes acts as a primary node and the other (N?1) nodes act as backup nodes, and the method is performed by the primary node, the method comprising:multicasting a pre-prepare message to at least some of the backup nodes;
obtaining (Q?1) or more prepare messages respectively from (Q?1) or more of the backup nodes, wherein the prepare messages each indicate an acceptance of the pre-prepare message by the corresponding backup node, Q (quorum) is (N+F+1)/2 rounded up to the nearest integer, and F is (N?1)/3 rounded down to the nearest integer;
storing the pre-prepare message and the (Q?1) or more prepare messages;
multicasting a commit message to at least some of the backup nodes, the commit message indicating that the primary node agrees to the (Q?1) or more prepare messages; and
obtaining, respectively from Q or more nodes among the primary node and the backup nodes, Q or more commit messages each indicating that the corresponding node agrees to (Q?1) or more prepare messages received by the corresponding node.

US Pat. No. 10,924,273

DATA EXCHANGE FOR MULTI-PARTY COMPUTATION

Advanced New Technologies...

1. A computer-implemented method for secure multi-party computation (MPC), comprising:receiving, by a first electronic device from a server in communication with a second electronic device, a first random seed, a second random seed, and a first random number set;
generating, by the first electronic device, a second random number set and a third random number set based on the first random seed and the second random seed respectively; and
performing a secure MPC process with the second electronic device using the first random number set, the second random number set, and the third random number set,
wherein the server provides a third random seed, a fourth random seed, and a sixth random number set to the second electronic device, and
wherein random numbers in (i) the first random number set, (ii) the second random number set, (iii) the third random number set, (iv) a fourth random number set generated by the second electronic device based on the third random seed and the fourth random seed, (v) a fifth random number set generated by the second electronic device based on the third random seed and the fourth random seed, and (vi) the sixth random number set satisfy a predetermined condition.

US Pat. No. 10,977,103

AWAKENING AN APPLICATION BY MEANS OF A MOBILE BROWSER

Advanced New Technologies...

1. A computer-implemented method of invoking a third-party target application (app) from a mobile browser and automatically returning to the mobile browser upon completion without user intervention, the computer-implemented method comprising:receiving, by a mobile device platform of a mobile device, first call data of a service process submitted by the mobile browser of the mobile device when a service call for the third-party target app installed on the mobile device is initiated, wherein the first call data comprises a custom parameter used to invoke the third-party target app and identification information of the mobile browser, and wherein the identification information comprises package name information of the mobile browser;
invoking, by the mobile device platform based on the custom parameter, the third-party target app to execute a corresponding target service;
transferring, by the mobile device platform, the identification information of the mobile browser to the third-party target app to cause the third-party target app to execute the corresponding target service;
receiving, by the mobile device platform, second call data indicating that the third-party target app executed the corresponding target service, the second call data including the package name information of the mobile browser submitted by the third-party target app, wherein the second call data comprises an intent constructed, based on the package name information of the mobile browser, by the third-party target app and used to invoke the mobile browser;
receiving, by the mobile device platform, the intent;
querying, by the mobile device platform, a system server for an activity component corresponding to the package name information of the mobile browser; and
invoking, by the mobile device platform, the activity component to return to the mobile browser, wherein invoking the activity component to return to the mobile browser includes ensuring application compatibility and eliminating data security breach points by automatically returning to the mobile browser instead of requiring manual selection of the mobile browser.

US Pat. No. 10,929,628

QR CODE POSITIONING METHOD AND APPARATUS

Advanced New Technologies...

1. A computer-implemented method, comprising:determining, by a computing device, from a QR code image that comprises first-type pixels and second-type pixels, centers of candidate position detection patterns in the QR code image based on a predetermined pixel detection rule, wherein the predetermined pixel detection rule comprises that a consecutive arrangement ratio of the first-type pixels, the second-type pixels, and the first-type pixels satisfies a predetermined ratio;
identifying, by the computing device, the candidate position detection patterns based on the centers of the candidate position detection patterns;
determining, by the computing device, from the candidate position detection patterns, a set of patterns that satisfies a QR code image positioning rule; and
using, by the computing device, the set of patterns as position detection patterns of the QR code image.

US Pat. No. 10,924,549

METHOD AND DEVICE FOR DATA VERSION COMPARISON BETWEEN TRANS-TIME ZONE SITES

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a central server from a plurality of trans-time zone sites, target data and a corresponding time stamp from each trans-time zone site, wherein each of the time stamps are based on a respective time zone of a sending trans-time zone site from which the target data and the time stamp were received, wherein the target data comprises account data associated with a login account shared across each of the trans-time zone sites;
modifying, by the central server, each of the received time stamps based on the respective time zone of the sending trans-time zone site for the time stamp and a time zone of the central server;
comparing, by the central server, the received target data from each of the trans-time zone sites to stored target data based on the modified corresponding time stamp; and
storing, by the central server, a latest version of the target data having a modified corresponding time stamp that indicates a later time than each of the other modified corresponding time stamps.

US Pat. No. 11,055,279

ASSET MANAGEMENT METHOD AND APPARATUS, AND ELECTRONIC DEVICE

Advanced New Technologies...


1. A computer-implemented method for asset management, the method comprising:receiving, from a target user who accesses a distributed database of a blockchain network, a user input comprising a request to generate an asset object in the blockchain network, the blockchain network comprising an account object and a contract object, wherein the request is signed using a private key associated with the target user;
in response to receiving the user input, performing an identity authentication of the target user based on a public key corresponding to the private key;
determining, based on the user input, an asset type of the asset object;
initiating, in the blockchain network, the contract object to generate the asset object based on the asset type, the asset object comprising a digital asset corresponding to a physical asset associated with the target user;
receiving, from the target user, an asset transfer request associated with the asset object;
retrieving historical data of the target user associated with a feature of the asset object, wherein the historical data of the target user is associated with past blocked or allowed network communications;
determining based on processing the historical data of the target user that abnormal data is absent from the historical data of the target user, wherein the abnormal data comprises parameters that are different from user parameters and asset parameters defined by a predetermined transfer rule; and
in response to determining that the abnormal data is absent from the historical data of the target user, deleting address information of the asset object from a target object and adding the address information of the asset object to an asset-receiving object that corresponds to the asset object.

US Pat. No. 11,057,217

PERFORMING PARALLEL EXECUTION OF TRANSACTIONS IN A DISTRIBUTED LEDGER SYSTEM

Advanced New Technologies...


1. A method for executing a plurality of transactions in a blockchain network, wherein the blockchain network comprises a plurality of network nodes, the method comprising:receiving, by a network node of the blockchain network, a plurality of transactions to be executed in a blockchain network;
for each of the plurality of transactions, determining that the transaction is a first-type transaction or a second-type transaction;
dividing, by the network node, the plurality of transactions into one or more groups of transactions based on one or more accounts affected by executing the first-type transaction for each first-type transaction and one or more accounts affected by pre-executing the second-type transaction for each second-type transaction;
arranging, by the network node, each of the one or more groups of transactions that affect the one or more accounts by executing the first-type transactions into a first-type transaction group and each of the one or more groups of transactions that affect the one or more accounts by executing the second-type transactions into a second-type transaction group;
arranging, by the network node, the first-type transaction group and the second- type transaction group in a parallel execution order so that the one or more accounts affected by each of the plurality of transactions in the first-type transaction group are not affected by the one or more accounts affected by each of the plurality of transactions in the second-type transaction group; and
executing the plurality of transactions by executing, in parallel, the one or more groups of transactions.

US Pat. No. 10,956,704

NEURAL NETWORKS FOR BIOMETRIC RECOGNITION

Advanced New Technologies...

1. A method for training an encoder neural network having a plurality of encoder neural network parameters and being configured to process a biometric data sample in accordance with current values of encoder neural network parameters to generate as output an embedded representation of the biometric data sample, wherein the embedded representation of the biometric data sample defines a set of features representing the biometric data sample, the method comprising:obtaining a positive biometric data sample characterizing an identity of a first person and a negative biometric data sample characterizing an identity of a second person, wherein the identity of the first person is different than the identity of the second person;
processing the positive biometric data sample and the negative biometric data sample using the encoder neural network and in accordance with the current values of the encoder neural network parameters to generate: (i) an embedded representation of the positive biometric data sample that defines a set of features representing the positive biometric data sample, and (ii) an embedded representation of the negative biometric sample that defines a set of features representing the negative biometric data sample;
determining a gradient of a loss function with respect to the encoder neural network parameters, wherein the loss function includes a first term that encourages a similarity between: (i) a specified proper subset of the set of features defined by the embedded representation of the positive biometric data sample and (ii) a corresponding specified proper subset of the set of features defined by the embedded representation of the negative biometric data sample, to be less than a similarity between: (i) the set of features defined by the embedded representation of the positive biometric data sample and (ii) the set of features defined by the embedded representation of the negative biometric data sample; and
adjusting the current values of the encoder neural network parameters using the gradient of the loss function.

US Pat. No. 11,061,468

METHOD AND DEVICE FOR INPUTTING PASSWORD IN VIRTUAL REALITY SCENE

Advanced New Technologies...


1. A computer-implemented method, comprising:presenting an interactive input interface in a virtual reality (VR) scene for a user of a VR device, wherein the interactive input interface comprises a plurality of input units used for an overall input, and wherein each input unit of the plurality of input units comprises one or more input elements;
determining that a user scene focus in the VR scene is on a selected input unit of the plurality of input units;
determining that a movement track of the user scene focus on the selected input unit of the plurality of input units is a circular track around all the input elements in the selected input unit of the plurality of input units; and
in response to determining that the movement track of the user scene focus on the selected input unit of the plurality of input units is the circular track around all the input elements in the selected input unit of the plurality of input units, using the input elements in the selected input unit of the plurality of input units as a part of an input password.

US Pat. No. 10,965,781

METHOD AND SERVER FOR DISPLAYING ACCESS CONTENT

ADVANCED NEW TECHNOLOGIES...

1. A method for displaying webpage content, the method comprising:receiving an access request of a first user to access a webpage;
determining webpage content according to the access request of the first user;
determining a user identifier for identifying a second user comprised in the webpage content based on the webpage content;
determining key information of the second user according to the determined user identifier;
selecting a presentation identifier from one or more presentation identifiers corresponding to the second user according to the determined user identifier and the webpage content, wherein the one or more presentation identifiers include at least one picture for identifying the corresponding second user;
returning the webpage content including the determined key information and the selected presentation identifier to the first user;
displaying the key information to the first user and hiding the presentation identifier from display; and
when a touch position of the first user is on the displayed key information, displaying the presentation identifier to the first user.

US Pat. No. 10,966,052

METHOD AND APPARATUS FOR VERIFYING ENTITY INFORMATION

Advanced New Technologies...

1. A computer-implemented method, comprising:identifying location information of a particular entity;
determining, based on the location information, a candidate entity set having a location relationship with the particular entity that satisfies a predetermined candidate condition, wherein the candidate entity set includes a correct set including candidate entities that satisfy the predetermined candidate condition;
sending the candidate entity set to the particular entity;
receiving, from the particular entity, an identification of a plurality of candidate entities from the candidate entity set; and
verifying the location information of the particular entity based on a number of candidate entities received from the particular entity that occur in the correct set and that satisfy a location verification threshold.

US Pat. No. 10,958,443

CONFIDENTIAL BLOCKCHAIN TRANSACTIONS

Advanced New Technologies...

1. A computer-implemented method, comprising:obtaining, by a blockchain node of a blockchain, a linkable ring signature corresponding to a remittance transaction between a remitter and one or more payees, wherein the linkable ring signature comprises a plurality of key images, wherein a value of each key image is related to a remitter public key of the remitter, a remitter private key of the remitter, and an asset commitment value of a respective asset to be spent in the remittance transaction, and
wherein the linkable ring signature is generated based on the remitter public key, the remitter private key, a remitter pseudo private key, and a remitter pseudo public key,
wherein the remitter pseudo public key is based on the asset commitment values of the assets to be spent, transfer amount commitment values of transfer amounts corresponding to respective payees of the one or more payees, and a first set of one or more random numbers, and wherein the remitter pseudo private key is based on a second set of one or more random numbers;
determining, based on the linkable ring signature, that the remitter pseudo private key and the remitter pseudo public key satisfy a key pair relationship;
determining, based on the linkable ring signature, that a sum of asset amounts of the assets to be spent equals a sum of the transfer amounts;
determining, based on the linkable ring signature, that the plurality of key images are different from historical key images corresponding to previous remittance transactions; and
based on determining that the plurality of key images are different from historical key images corresponding to previous remittance transactions, executing the remittance transaction.

US Pat. No. 10,958,449

CERTIFICATE APPLICATION OPERATIONS

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, from a certificate server, gateway configuration information, wherein the gateway configuration information comprises a device identification code to identify a terminal device, and comprises a gateway key, a gateway address, and a subscription topic name;
establishing a link between the terminal device and a gateway based on the gateway key and the gateway address;
sending, from the terminal device, the device identification code and the subscription topic name to the gateway, so as to establish a data transmission channel between the terminal device and the gateway, the data transmission channel corresponding to the subscription topic name, wherein the data transmission channel is used to transmit, to the terminal device, message data corresponding to the subscription topic name;
receiving by the terminal device, via the data transmission channel, a certificate installation instruction from the certificate server;
generating, by the terminal device, a user certificate request based on the certificate installation instruction;
sending the user certificate request to the certificate server; and
receiving, via the data transmission channel, a user certificate from the certificate server.

US Pat. No. 10,956,021

METHOD AND DEVICE FOR HIDING MESSAGES IN A MESSAGING GROUP

Advanced New Technologies...

1. A computer-implemented method executed by one or more processors, the method comprising:displaying, by the one or more processors on a display interface, a plurality of messages posted adjacent to each other in a messaging group comprising a plurality of contacts;
receiving, by the one or more processors, a user input indicating a selected contact in the messaging group, the user input comprising a dragging by a predetermined distance of a display icon of the selected contact and indicating a maintenance request to maintain visibility of a first set of messages posted by the selected contact while others of the plurality of messages are hidden;
identifying, by the one or more processors and from among the plurality of messages, (i) the first set of messages corresponding to the maintenance request and (ii) a second set of messages of the plurality of messages posted in the messaging group, the second set of messages excluding the first set of messages; and
updating, by the one or more processors, the display interface to comprise the display icon at a predetermined location, the first set of messages, and one or more aggregation icons representing the second set of messages wherein the updating of the display interface includes hiding at least two of the second set of messages and representing the at least two of the second set of messages with one of the aggregation icons.

US Pat. No. 10,909,234

METHOD AND APPARATUS FOR UNLOCKING USER INTERFACE

Advanced New Technologies...

1. A method implemented by a computing device, the method comprising:selecting an unlocking password applicable to an unlocking interface from a plurality of passwords in response to the unlocking interface being triggered;
performing a corresponding prompt operation based on prompt information that corresponds to the unlocking password, different prompt operations being used for distinguishing different passwords of the plurality of passwords and comprising displaying different patterns of shapes or different colors of characters for the different passwords of the plurality of passwords; and
unlocking a locked state of the unlocking interface in response to receiving a user input password that matches the unlocking password, wherein the plurality of passwords are sequentially selected to be a valid password according to a preset order.

US Pat. No. 10,909,252

BLOCKCHAIN-BASED RELATIONSHIP BINDING METHOD, APPARATUS, AND DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A blockchain-based user binding method, comprising:receiving, by a blockchain node of a blockchain, a user binding request from a computing device of a first user, wherein the user binding request comprises user information of the first user, user information of a second user to be bound with the first user, and a binding tag, the binding tag comprising (1) a binding type of a binding relationship, and (2) role information of the second user in the binding relationship;
retrieving, by the blockchain node, information of a user terminal of the second user based on a mapping between the user information of the second user and the user terminal;
sending, by the blockchain node through a smart contract, a binding relationship confirmation request to the user terminal of the second user based on the information of the user terminal, the binding relationship confirmation request comprising the user information of the first user and the binding tag;
in response to receiving a confirming response from the second user, retrieving, by the blockchain node, a relationship table of the second user from a local database of the blockchain node, wherein the relationship table of the second user comprises a primary dimension comprising the user information of the second user, a secondary dimension comprising user information of one or more users that have been bounded with the second user, a tertiary dimension comprising one or more binding types of one or more historical binding relationships between the second user and the one or more users, and a quaternary dimension comprising the role information of the second user in the one or more historical binding relationships;
determining, by the blockchain node through the smart contract, attribute information of the binding type in the user binding request, wherein the smart contract stores a mapping relationship between the attribute information and the binding type;
in response to the attribute information indicating that the binding type in the user binding request comprises a one-to-one binding relationship:
determining whether the one or more binding types in the relationship table of the second user comprise the binding type in the user binding request, and
if yes, sending binding failure information to the first user and terminating the method;
in response to (1) the attribute information indicating that the binding type in the user binding request comprises a one-to-many binding relationship with a “one” aspect and a “many” aspect, and (2) the role information of the second user in the binding relationship corresponds to the “many” aspect of the one-to-many binding relationship:
determining whether the relationship table of the second user comprises a record with (1) the binding type in the user binding request in the tertiary dimension, and (2) the role information of the second user in the quaternary dimension; and
if yes, sending the binding failure information to the first user and terminating the method;
generating, by the blockchain node, a record of binding relationship between the first user and the second user by associating the user information of the first user, the user information of the second user, and the binding tag;
encrypting, by the blockchain node, the record of binding relationship into a ciphertext and storing the ciphertext on the blockchain, wherein the stored ciphertext is validated by a plurality of parties;
updating, by the blockchain node, the relationship table of the second user in the local database according to the user binding request, and
wherein one or more authorized users are allowed to query records of binding relationship stored on the blockchain.

US Pat. No. 10,885,035

METHOD AND SYSTEM FOR OUTER JOIN OF DATABASE TABLES

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for executing an OUTER JOIN command on a first table and a second table in a distributed database, wherein the method comprises:broadcasting the first table to a plurality of database nodes of a distributed database storing the second table, wherein the second table is a distributed database table, and each of the plurality of database nodes stores a portion of the second table;
dividing the plurality of database nodes storing the second table into a first subset and a second subset, wherein the first subset and the second subset each comprises less than all of the plurality of database nodes;
obtaining, by each database node of the first subset, an OUTER JOIN result by executing an OUTER JOIN operation based on the first table broadcasted to the each database node of the first subset and the portion of the second table stored in the each database node of the first subset;
obtaining, by each database node of the second subset, an INNER JOIN result by executing an INNER JOIN operation based on the first table broadcasted to the each database node of the second subset and the portion of the second table stored in the each database node of the second subset
identifying and removing a first row with a NULL value from the OUTER JOIN result when the INNER JOIN result comprises a second row sharing a same join key with the first row; and
returning a result to the OUTER JOIN command by aggregating the OUTER JOIN result from each database node of the first subset and the INNER JOIN result from each database node of the second subset.

US Pat. No. 10,872,332

VIRTUAL CARD OPENING METHOD AND SYSTEM, PAYMENT SYSTEM, AND CARD ISSUING SYSTEM

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented virtual card opening method, comprising:sending, by a computing device of a payment system to each of a plurality of virtual card issuing systems, a request for acting an agent to open a virtual card on behalf of the each virtual card issuing system to reduce traffic load on the each virtual card issuing system;
obtaining, by the computing device of the payment system from the each virtual card issuing system, a rule for acting as the agent of the each virtual card issuing system and a condition to open a virtual card of the each virtual card issuing system;
storing, by the computing device of the payment system in a mapping relationship, the obtained rules and the obtained virtual card opening conditions mapped with type identifiers of the virtual cards;
receiving, by the computing device of the payment system through an online traffic entrance, a virtual card opening request from a user, the virtual card opening request comprising user information of the user and type identifier of a target virtual card;
redirecting, by the computing device of the payment system, the user from the online traffic entrance to a virtual card receiving page so that opening of the target virtual card is decoupled from the virtual card issuing system issuing the target virtual card;
searching and identifying, by the computing device of the payment system according to the type identifier of the target virtual card and the mapping relationship, a target virtual card issuing system, the rule for acting as the agent to open the target virtual card on behalf of the target virtual card issuing system, and the virtual card opening condition to open the target virtual card according to actual situations, wherein the virtual card opening condition comprises a protocol for receiving the target virtual card;
sending, by the computing device of the payment system through the virtual card receiving page, the protocol for receiving the target virtual card for the user to view;
in response to the user agreeing to the protocol, determining, by the computing device of the payment system, whether the user information in the virtual card opening request satisfies the virtual card opening condition for opening the target virtual card;
in response to the virtual card opening condition being satisfied, generating, by the computing device of the payment system, the target virtual card according to the user information and the rule for acting as the agent to open the target virtual card; and
asynchronously sending, by the computing device of the payment system, information of the target virtual card to the identified target virtual card issuing system so that real-time interaction between the payment system and the target virtual card issuing system is avoided.

US Pat. No. 10,872,402

SPECULAR REFLECTION REDUCTION USING POLARIZED LIGHT SOURCES

Advanced New Technologies...

1. A method for generating a composite image from multiple images, the method comprising:receiving, by one or more processing devices, a first image that includes an eyeglass lens, wherein the eyeglass lens is illuminated by a first illumination source radiating electromagnetic radiation in a first polarization state;
receiving, by the one or more processing devices, a second image that includes the eyeglass lens, wherein the eyeglass lens is illuminated by a second illumination source radiating electromagnetic radiation in a second polarization state, wherein:
the first illumination source radiates the electromagnetic radiation in the first polarization state during a first time period, and the second illumination source radiates the electromagnetic radiation in the second polarization state during a second time period that is at least partially non-overlapping with the first time period,
the second polarization state is different from the first polarization state, and
the second illumination source is spatially separated from the first illumination source;
identifying, by the one or more processing devices in the first image, a first portion that represents a reflection of the first illumination source on the eyeglass lens;
identifying, by the one or more processing devices in the second image, a second portion corresponding to the first portion of the first image, wherein:
the second portion does not represent a reflection of the second illumination source on the eyeglass lens, and
the first portion and the second portion represent a same portion of the eyeglass lens; and
generating, by the one or more processing devices, the composite image in which the first portion is replaced by the corresponding second portion from the second image.

US Pat. No. 10,873,449

KEY DATA PROCESSING METHOD AND APPARATUS, AND SERVER

Advanced New Technologies...

1. A computer-implemented method for managing shared ownership in a block chain network, the method comprising:obtaining a parent cryptographic key associated with a blockchain object and one or more assets owned by a number of parties; and
responsive to detecting a change in the one or more assets or a change in the number of parties that own the one or more assets,
generating N child cryptographic keys CX based on the parent cryptographic key by applying a predetermined algorithm to the parent cryptographic key, wherein N is an integer greater than or equal to 2 and corresponds to a current number of parties that own the one or more assets;
wherein applying the predetermined algorithm comprises
generating N?1 random numbers Ri, wherein i is an integer between 1 and N?1 and Ri is a non-negative integer, determining a prime number P greater than at least one of a value S of the parent cryptographic key or the random numbers Ri, wherein the random numbers Ri range from 0 to P?1, and
generating the N child cryptographic keys CX by performing a modulo operation on P using a summation of the value S and one or more terms that include Ri multiplied by a value from 1 to N to obtain the child cryptographic keys CX, wherein the one or more terms depend on the current number of parties N, and
wherein the N child cryptographic keys CX are collectively configured to enable reconstruction of the parent cryptographic key.

US Pat. No. 10,873,463

SYSTEM AND METHOD FOR DECENTRALIZED-IDENTIFIER AUTHENTICATION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for blockchain-based decentralized-identifier authentication, comprising:obtaining, by a server from a computing device, a request for authenticating a decentralized identifier (DID), wherein the request comprises the DID, a plaintext associated with a challenge for authenticating the DID, and a digital signature on the plaintext;
generating, by the server, a blockchain transaction for retrieving a DID document corresponding to the DID from a blockchain, wherein the blockchain transaction invokes a blockchain contract for managing relationships between a plurality of DIDs and a plurality of corresponding DID documents;
sending, by the server, the generated blockchain transaction to one or more blockchain nodes of the blockchain for adding to the blockchain, the one or more blockchain nodes being configured to, after the generated blockchain transaction is added to the blockchain, execute the blockchain contract based on the blockchain transaction to retrieve the DID document corresponding to the DID;
receiving, by the server from at least one of the one or more blockchain nodes, the DID document corresponding to the DID, wherein the DID document comprises information associated with one or more authentication service endpoints associated with the DID, the information identifying the server as one of the one or more authentication service endpoints;
retrieving, by the server, a public key associated with the DID from the received DID document;
determining, by the server based on the obtained public key and the plaintext, that the digital signature on the plaintext is created based on a private key corresponding to the DID;
generating, by the server based on the determination, a message confirming authentication of the DID; and
sending, by the server to the computing device, the message confirming authentication of the DID.

US Pat. No. 10,991,106

ON-SHELF COMMODITY DETECTION METHOD AND SYSTEM

ADVANCED NEW TECHNOLOGIES...

1. A method for on-shelf merchandise detection, comprising:obtaining a plurality of depth images associated with a shelf from a first camera, wherein the shelf comprises a plurality of tiers;
obtaining a plurality of images from one or more second cameras associated with each of the plurality of tiers of the shelf, each of the plurality of tiers of the shelf holding merchandise, and the one or more second cameras associated with each of the plurality of tiers being disposed on each of the plurality of tiers;
detecting, based on one or more of the plurality of depth images, motions of a user's hand reaching into and moving away from the shelf;
determining, based on the one or more of the plurality of depth images and in response to detecting the motions of the user's hand reaching into and moving away from the shelf, a tier of the plurality of tiers of the shelf associated with the detected motions, a first point in time associated with the motion of the user's hand reaching into the shelf, and a second point in time associated with the motion of the user's hand moving away from the shelf;
in response to determining the tier of the shelf associated with the detected motions, identifying, from images obtained from one or more second cameras associated with the determined tier, one or more first images captured before the first point in time and one or more second images captured after the second point in time; and
determining one or more changes to merchandise on the determined tier of the shelf associated with the detected motions by comparing the one or more first images with the one or more second images.

US Pat. No. 10,986,101

METHOD AND DEVICE FOR PREVENTING SERVER FROM BEING ATTACKED

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a server, a page request from a browser;
obtaining, by the server, a page URL from the page request;
extracting, by the server and from a predetermined script library, a page script randomly from a plurality of page scripts corresponding to the page URL, wherein the page script comprises script execution parameter acquisition logic dynamically generated using a random number;
transmitting, by the server, identifier information corresponding to the page script and the page script to the browser for generation of a script execution parameter by execution of the page script by the browser; and
receiving, by the server, a page verification request from the browser, wherein the page verification request includes the script execution parameter and the identifier information corresponding to the page script transmitted by the server to the browser.

US Pat. No. 10,986,377

METHOD AND DEVICE FOR SENDING ACCESS TO RECOMMENDED INFORMATION IN LIVE STREAMING

ADVANCED NEW TECHNOLOGIES...

1. An information pushing method, comprising:receiving, by a live streaming server in a live streaming process, a push information presentation instruction from a live streaming terminal;
determining, by the live streaming server, one or more access addresses of push information based on the push information presentation instruction;
sending, by the live streaming server, the one or more access addresses of push information to the live streaming terminal for selection;
receiving, by the live streaming server, a push information identifier from the live streaming terminal, the push information identifier comprising a selected access address from the one or more access addresses of push information;
determining, by the live streaming server, the selected access address based on the push information identifier; and
sending, by the live streaming server, the selected access address to a play terminal for the play terminal to present the push information with the selected access address in a view layer independent of a play area of a live streaming interface, wherein the view layer includes a turn-off button configured to turn off the push information, and when detecting that the selected access address is triggered by a play terminal user, the play terminal displays a web page corresponding to the selected access address.

US Pat. No. 10,979,851

METHOD AND APPARATUS FOR DETERMINING RELATIVE LOCATION

Advanced New Technologies...

1. A computer-implemented method, comprising:generating, by a first terminal device, reference location information associated with the first terminal device;
determining, by the first terminal device, a group comprising the first terminal device and one or more second terminal devices;
sending, by the first terminal device, the reference location information to each second terminal device of the one or more second terminal devices in the group, wherein each second terminal device configures corresponding second terminal device location information based on the reference location information, and uses the corresponding second terminal device location information as corresponding marked location information;
receiving, by the first terminal device, the corresponding marked location information transmitted by each second terminal device;
determining, by the first terminal device, a relative location of the first terminal device and a relative location of each second terminal device based on the reference location information and based on the corresponding marked location information received from each second terminal device; and
sending, by the first terminal device, the relative location of each second terminal device to all second terminal devices in the group.

US Pat. No. 10,972,502

PROCESSING METHOD FOR PREVENTING COPY ATTACK, AND SERVER AND CLIENT

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a server and from a client computing device, service data, wherein the service data comprises a plurality of fields, wherein a first field of the plurality of fields comprises a unique identifier of the client computing device and a second field of the plurality of fields comprises a variable identifier of the client computing device, the unique identifier and the variable identifier being previously generated by the server and being stored in a local secure storage of the client computing device, and wherein the variable identifier of the client computing device is generated through successive integer accumulation and comprises a randomly generated integer comprising a plurality of digits, and wherein an asymmetric encryption or a symmetric encryption is used to exchange the unique identifier and the variable identifier between the client computing device and the server;
parsing, by the server, the service data to obtain the unique identifier and the variable identifier as parsed data;
determining, by the server, whether the unique identifier and the variable identifier in the parsed data are identical to a stored unique identifier and a stored variable identifier associated with the client computing device and recorded by the server as recorded data;
in response to determining that the unique identifier and the variable identifier in the parsed data are identical to the stored unique identifier and the stored variable identifier associated with the client computing device, generating, by the server, a new variable identifier by adding at least a digit to the stored variable identifier; and
transmitting, by the server and to the client computing device, the new variable identifier for storage.

US Pat. No. 10,958,440

BLOCKCHAIN LEDGER COMPRESSION

Advanced New Technologies...

1. A computer-implemented method, comprising:obtaining, by a server storing data in a blockchain ledger, compression point information of the blockchain ledger, wherein the compression point information comprises identification information of a specified data block, a server digital signature, and a user digital signature,
wherein the compression point information indicates that a specified portion of the blockchain ledger has passed an integrity verification, and wherein the specified portion of the blockchain ledger comprises data blocks in the blockchain ledger previous to the specified data block in the blockchain ledger; and
compressing data of the specified portion of the blockchain ledger.

US Pat. No. 10,958,749

METHOD AND DEVICE FOR PUSHING APPLICATION MESSAGE

Advanced New Technologies...

1. A computer-implemented method, comprising:detecting that a label of a message to be sent is a message label for a non-real-time transmission;
for a user device group associated with the message to be sent, dynamically determining, based on a timely-response rate and a correction scheme, an initial optimal time period to respond to a message for each device in the user device group;
dividing, based on a predetermined ratio, the user device group into a first user device group and a second user device group;
based on the initial optimal time period for each device in the first user device group, separately sending the message to be sent to a corresponding device in the first user device group;
randomly sending, to each device in the second user device group, the message to be sent;
collecting statistics on a timely-response rate of each device in the first user device group in the initial optimal time period and on a timely-response rate of each device in the second user device group; and
re-determining the initial optimal time period for each device in the user device group when determined that a difference between the timely-response rate of each device in the first user device group in the initial optimal time period and the timely-response rate of each device in the second user device group is less than or equal to a predetermined difference threshold.

US Pat. No. 10,956,844

METHOD AND APPARATUS FOR DETERMINING VEHICLE SCHEDULING STRATEGY

ADVANCED NEW TECHNOLOGIES...

1. A method comprising:obtaining a signal strength sequence of signals detected by a user terminal during a travel route, wherein the detected signals are originated from signal sources disposed at different locations in the travel route, wherein the different locations include one or more vehicles or one or more stops;
extracting, from the signal strength sequence, a first sequence fragment corresponding to a signal transmitted by a signal source disposed at a vehicle;
determining a travel time duration of a user riding on the vehicle according to a signal strength value and time stamp information of the first sequence fragment;
extracting, from the signal strength sequence, a second sequence fragment corresponding to a signal transmitted by a signal source disposed at a stop;
determining a travel departure stop, a waiting time duration the user spends until the vehicle arrives at the travel departure stop, and a travel destination stop of the user according to a signal strength value and time stamp information of the second sequence fragment, by:
extracting, from the second sequence fragment according to the signal strength value and the time stamp information of the second sequence fragment, a first target fragment having an end time and a maximum signal strength value greater than or equal to a first signal strength threshold, wherein a time duration between the end time of the first target fragment and a start time of the travel time duration is less than a first time duration threshold;
determining a stop corresponding to the first target fragment as the travel departure stop of the user;
determining a duration of the first target fragment as the waiting time duration of the user;
extracting, from the second sequence fragment according to the signal strength value and the time stamp information of the second sequence fragment, a second target fragment having a start time and a maximum signal strength value greater than or equal to a second signal strength threshold, wherein a time duration between the start time of the second target fragment and an end time of the travel time duration is less than a second time duration threshold; and
determining a stop corresponding to the second target fragment as the travel destination stop of the user.

US Pat. No. 10,956,597

LOSS FUNCTION VALUE DETERMINATION METHOD AND DEVICE AND ELECTRONIC EQUIPMENT

Advanced New Technologies...

1. A computer-implemented method for determining a value of a loss function based on secret sharing, the method comprising:receiving, by one or more processors of a first data party and from a second data party, a first share of data generated based on a first parameter, wherein the first share of data is calculated by the first data party based on a secret sharing algorithm performed between the first data party and the second data party, the first parameter is an intermediate result obtained by the first data party based on performing the secret sharing algorithm;
determining, by the one or more processors, a first term based on the first share of the data;
generating, by the one or more processors, a second share of the data based on a second parameter and a plurality of random numbers, wherein the second data is calculated by the second data party based on the secret sharing algorithm, the second parameter is an immediate result obtained by the second data party based on performing the secret sharing algorithm;
transmitting, by the one or more processors to the second data party, the second share of the data;
determining, by the one or more processors, a coefficient of a second term based on accumulatively multiply the plurality of random numbers;
determining, by the one or more processors, the second term based on the coefficient of the second term and the second share of the data; and
determining the value of the loss function based on the first term and the second term.

US Pat. No. 10,956,616

SECURE COMMUNICATIONS IN A BLOCKCHAIN NETWORK

Advanced New Technologies...

1. A computer-implemented method comprising:receiving, by a first blockchain node of a blockchain network and from a second blockchain node of the blockchain network, a communication request that comprises a second certificate;
determining, by the first blockchain node of the blockchain network, a certificate authority (CA) identifier that corresponds to the second certificate;
determining, by the first blockchain node of the blockchain network, that the determined CA identifier that corresponds to the second certificate is included in a trust list that is pre-configured and stored on the first blockchain node; and
in response to determining that the determined CA identifier that corresponds to the second certificate is included in the trust list that is pre-configured and stored on the first blockchain node, establishing, by the first blockchain node of the blockchain network, a communication connection with the second blockchain node, comprising:
transmitting, by the first blockchain node of the blockchain network, a verification request to the second blockchain node for the second blockchain node to determine whether a CA identifier corresponding to a first certificate of the first blockchain node is included in a CA trust list that is pre-configured in the second blockchain node, wherein the verification request comprises the first certificate of the first blockchain node; and
upon the second blockchain node determining that the CA identifier corresponding to the first certificate of the first blockchain node is included in the CA trust list that is pre-configured in the second blockchain node, establishing the communication connection with the second blockchain node.

US Pat. No. 10,924,806

VIDEO PLAYING CONTROL METHOD AND APPARATUS, AND VIDEO PLAYING SYSTEM

Advanced New Technologies...

1. A computer-implemented method, comprising:parsing content of a video to identify two or more topics of the content;
dividing the video into two or more video clips corresponding to a video playback of the two or more topics;
displaying two or more titles corresponding to, and descriptive of, the two or more video clips;
displaying two or more visual effects corresponding to the two or more titles and indicative of corresponding playback statuses of the two or more video clips;
displaying a depiction of a product, wherein the product comprises two or more parts, wherein the depiction of the product shows the two or more parts and two or more labels, wherein each label of the two or more labels refers to at least one part of the two or more parts, wherein each label of the two or more labels is associated with a corresponding title of the two or more titles; and
playing a video clip based on a particular title of the two or more titles selected from a time point determined based on a corresponding playback status of the video clip, wherein the particular title is selected based on selecting a particular label of the two or more labels in the depiction.

US Pat. No. 10,909,337

ARTICLE PROCESSING METHOD, TERMINAL, SYSTEM AND LPWAN GATEWAY

Advanced New Technologies...

1. An article processing method performed by an article processing terminal, comprising:controlling, by a control unit of the article processing terminal, a radio frequency identification (RFID) reader of the article processing terminal to continually scan for signals generated by electronic tags of a plurality of short-range articles;
receiving, by the control unit and from the RFID reader, an article identifier of an article of the plurality of short-range articles, the article identifier being generated by the RFID reader in response to a detected status change of the article; and
controlling, by the control unit, a low-power wide-area network (LPWAN) module of the article processing terminal to send an article change message to a LPWAN gateway, wherein the article change message comprises the article identifier and an address of an application server, and wherein the LPWAN gateway instructs, based on the article change message and the address, the application server to record change status information representing one or more properties of the signals generated by the electronic tags.

US Pat. No. 10,909,262

DATA ISOLATION IN A BLOCKCHAIN NETWORK

Advanced New Technologies...

1. A computer-implemented method, comprising:repeatedly performing the following operations to process one or more transactions:
performing, by a node belonging to a first distributed ledger network, a transaction that is submitted by a user of the first distributed ledger network and that is associated with two or more respective transaction participants; and
generating, by the node belonging to the first distributed ledger network, a private representation of the transaction that is accessible only to the two or more respective transaction participants for storage in the first distributed ledger network, the private representation of the transaction comprising a hash of the transaction;
determining whether a condition for releasing information that relates to the one or more transactions has been satisfied;
in response to a positive determination, releasing information that relates to the one or more transactions including:
generating, by the node belonging to the first distributed ledger network and based on the one or more transactions that have been performed, a public representation accessible to at least one node belonging to a second distributed ledger network, the public representation specifying an account balance update of each of the two or more respective transaction participants as a result of the one or more transactions; and
broadcasting, by the node belonging to the first distributed ledger network, the public representation for inclusion in the second distributed ledger network.

US Pat. No. 10,909,269

SECURE COMMUNICATIONS IN A BLOCKCHAIN NETWORK

Advanced New Technologies...

1. A computer-implemented method for improving security of a blockchain network, comprising:obtaining, by a first node of the blockchain network, a first certificate authority (CA) trust list comprising a plurality of CA identifiers;
receiving, by the first node from a second node of the blockchain network, a communication request comprising a public key certificate of the second node;
determining, by the first node of the blockchain network, a first CA identifier from the received public key certificate of the second node of the blockchain network;
determining, by the first node of the blockchain network, that the first CA identifier matches one of the plurality of CA identifiers of the first CA trust list; and
in response to determining that the first CA identifier matches one of the plurality of CA identifiers of the first CA trust list, approving, by the first node of the blockchain network, the communication request, comprising transmitting, by the first node of the blockchain network and to the second node of the blockchain network, a verification request comprising a public key certificate of the first node, wherein the second node comprises a second CA trust list comprising a plurality of CA identifiers;
determining, by the second node, a second CA identifier from the received public key certificate of the first node;
determining that the second CA identifier matches one of the plurality of CA identifiers of the second CA trust list of the second node; and
in response to determining that the second CA identifier matches one of the plurality of CA identifiers of the second CA trust list, establishing a communication session with the first node.

US Pat. No. 10,892,888

SYSTEM AND METHOD FOR INFORMATION PROTECTION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method, comprising:obtaining, by one or more nodes, a plurality of commitment values corresponding to one or more data inputs and one or more data outputs of a transaction, a basepoint used to generate the plurality of commitment values, and a parameter, wherein the one or more data inputs respectively correspond to one or more input data types, the one or more data outputs respectively correspond to one or more output data types, and the plurality of commitment values are generated based at least on respectively committing, by a different node, hash values of the input data types and the output data types according to a commitment scheme based on the basepoint and a plurality of blinding factors;
generating, by the one or more nodes, a plurality of unverified differences based on the plurality of commitment values;
generating, by the one or more nodes, a hash value based on the plurality of unverified differences;
generating, by the one or more nodes, a plurality of polynomials based on the plurality of unverified differences and the hash value; and
determining, by the one or more nodes, that the one or more input data types are consistent with the one or more output data types by determining that a sum of the plurality of polynomials matches a product of the parameter and the basepoint, without receiving plaintexts of the one or more input data types and the one or more output data types; and
adding, by the one or more nodes, the transaction to a blockchain.

US Pat. No. 10,885,363

SPOOF DETECTION USING STRUCTURED LIGHT ILLUMINATION

ADVANCED NEW TECHNOLOGIES...

1. A method for preventing access to a secure system based on determining a captured image to be of an alternative representation of a live person, the method comprising:illuminating a subject with structured light using a light source array comprising multiple light sources disposed in a predetermined pattern;
capturing an image of the subject as illuminated by the structured light;
detecting that the image includes a reflection of the predetermined pattern;
responsive to detecting that the image includes a reflection of the predetermined pattern, identifying the subject in the image to be an alternative representation of a live person comprising a photograph of the live person printed on paper or displayed on a screen: and responsive to identifying the subject in the image to be an alternative representation of a live person, preventing access to the secure system.

US Pat. No. 10,885,397

COMPUTER-EXECUTED METHOD AND APPARATUS FOR ASSESSING VEHICLE DAMAGE

Advanced New Technologies...

1. A computer-executed method for assessing vehicle damage, comprising:generating a first comprehensive feature for a first component of a vehicle based on damage object detection information and vehicle component information acquired from a vehicle damage image, the first comprehensive feature comprising a component feature and a fused damage feature of the first component, the fused damage feature being obtained by fusing damage features of at least one damage detection frame belonging to the first component among a plurality of damage detection frames;
determining a plurality of candidate prediction results for the first component, each of the candidate prediction results comprising a candidate component category and a candidate damage category;
inputting the first comprehensive feature and the plurality of candidate prediction results into a pre-trained first condition prediction model to obtain a first prediction result, the first prediction result comprising, for each of the candidate prediction results, a probability that the candidate damage category thereof is correct;
inputting the first comprehensive feature and the plurality of candidate prediction results into a pre-trained second condition prediction model to obtain a second prediction result, the second prediction result comprising, for each of the candidate prediction results, a probability that the candidate component category thereof is correct; and
determining a component category of the first component and a corresponding damage category thereof at least based on the first prediction result and the second prediction result.

US Pat. No. 10,872,070

DISTRIBUTED DATA PROCESSING

Advanced New Technologies...

1. A computer-implemented method, comprising:identifying an invocation frequency for each of a first number of candidate key-value pairs in a predetermined period of time, wherein the invocation frequency is a number of times the corresponding candidate key-value pair was called by a service system in the predetermined period of time;
selecting a second number of hot key-value pairs from the candidate key-value pairs, wherein the hot key-value pairs comprise at least one of: candidate key-value pairs that have invocation frequencies higher than a predetermined threshold, or candidate key-value pairs with key values within a key value interval;
mapping, as intermediate key-value pairs, the second number of hot key-value pairs; and
reducing, as resultant key-value pairs, the intermediate key-value pairs, wherein the resultant key-value pairs are to be called by the service system.

US Pat. No. 10,992,459

UPDATING A STATE MERKLE TREE

Advanced New Technologies...

1. A computer-implemented method for updating a blockchain network, the method comprising:accessing data related to a state Merkle tree, wherein the state Merkle tree stores a state of an account in the blockchain network;
determining to-be-updated nodes that need to be updated in the state Merkle tree due to a state change of the account;
extracting a first subtree and M second subtrees from the state Merkle tree based on the to-be-updated nodes, wherein the first subtree comprises a root node of the state Merkle tree, wherein there is no intersection between any two of the M second subtrees, wherein a root node of each second subtree is a to-be-updated node and is a child node of a bottom-layer node in the first subtree, and wherein M is an integer greater than 1;
allocating the M second subtrees to N worker threads, wherein two or more of the N worker threads process in parallel the M second subtrees to obtain M updated root hashes corresponding to the M second subtrees, wherein N is an integer greater than 1;
updating at least the first subtree from one or more leaf nodes of the first subtree to the root node of the state Merkle tree based on the M updated root hashes obtained from the N worker threads, to obtain an updated state Merkle tree; and
verifying a first block of the blockchain network by comparing a hash value of a root node of the updated state Merkle tree with a value of a state root recorded in the first block, wherein the first block comprises a transaction set.

US Pat. No. 10,963,888

PAYMENT COMPLAINT METHOD, DEVICE, SERVER AND READABLE STORAGE MEDIUM

ADVANCED NEW TECHNOLOGIES...

1. A method for processing a payment complaint, comprising:creating, by a server, a target payment card identification model with historical transaction data of users;
receiving, by the server from a user terminal, a complaint query request of a user;
querying, by the server in response to the complaint query request, a transaction database according to user information of the user;
acquiring, by the server, at least one target payment card corresponding to the payment complaint of the user, by invoking the target payment card identification model to perform operations including:
querying the transaction database to determine whether a first number of high-risk cards used by the user is equal to or greater than a preset threshold, wherein the high-risk cards are blacklisted payment cards used by the user in transactions;
in response to determining that the first number is equal to or greater than the preset threshold, selecting at least one of the high-risk cards as the at least one target payment card;
in response to determining that the first number is less than the preset threshold, querying the transaction database to determine whether a sum of a second number of abnormal cards used by the user and the first number is equal to or greater than the preset threshold, wherein the abnormal cards include at least one of payment cards used in the transactions where an address of a payment terminal does not match a shipping address or payment cards used in the transactions where an amount of payment does not match an amount of transaction; and
in response to determining that the sum of the first number and the second number is equal to or greater than the preset threshold, selecting the high-risk cards and at least one of the abnormal cards as the at least one target payment card;
generating, by the server according to the user information and the at least one target payment card, complaint voucher information of the user and returning to the user terminal the complaint voucher information;
receiving, by the server, a complaint creation request from the user terminal, wherein the complaint creation request is created by the user terminal based on the complaint voucher information; and
creating, by the server in response to the complaint creation request, a corresponding complaint task of the user.

US Pat. No. 10,965,689

METHOD AND DEVICE FOR PREVENTING SERVER FROM BEING ATTACKED

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a server, a page request from a browser;
allocating, by the server, a page script corresponding to the page request from a plurality of page scripts corresponding to the page request;
transmitting, by the server, identifier information corresponding to the page script and the page script to the browser for generation of a script execution parameter by execution of the page script by the browser;
receiving, by the server, a page verification request from the browser, wherein the page verification request includes the script execution parameter and the identifier information corresponding to the page script transmitted by the server to the browser; and
determining, by the server, whether the page verification request is expired, wherein:
if expired, generating, by the server, error prompt information indicating a page expiration; or
if not expired:
determining, by the server, whether the script execution parameter is valid, wherein:
if valid, indicating, by the server, that the script execution parameter is valid; or
if not valid, rejecting, by the server, the page request.

US Pat. No. 10,963,452

ASSET MANAGEMENT METHOD AND APPARATUS, AND ELECTRONIC DEVICE

Advanced New Technologies...

1. A computer-implemented method for asset management, the method comprising:receiving, from a target user recorded in a distributed database of a blockchain network, a user input comprising a request to transfer a plurality of asset objects of a plurality of different asset types, the plurality of asset objects being created by invoking of a plurality of smart contract objects and comprising digital assets corresponding to physical assets associated with the target user, wherein the physical assets comprise at least two items selected from a list consisting of a fund, a house property, a stock, a loan contract, a bill, and a receivable item, and wherein each smart contract object of the plurality of smart contract objects corresponds to a respective asset type of the plurality of different asset types;
in response to receiving the request, combining the plurality of asset objects of the plurality of different asset types in a target object, the target object comprising an address field used to maintain address information of the plurality of asset objects and corresponding to an asset type specified in the request;
retrieving historical data associated with a predetermined feature of the plurality of asset objects, wherein the historical data is to be validated by a predetermined transfer rule and the predetermined transfer rule is configured to protect a security and a confidentiality of the target user;
determining based on processing the historical data that the request satisfies the predetermined transfer rule;
in response to determining that the request satisfies the predetermined transfer rule, deleting the address information corresponding to the plurality of asset objects from the target object; and
adding the address information to asset receiving objects corresponding to the plurality of asset objects.

US Pat. No. 10,963,551

METHOD AND APPARATUS FOR USER AUTHENTICATION BASED ON FEATURE INFORMATION

Advanced New Technologies...

1. A method for user authentication based on feature information, comprising:judging whether a user to be authenticated belongs to a similar user group, wherein the similar user group comprises at least two similar users, and the similar users are users whose reference feature information meets a preset similarity condition and a preset distinguishability condition; and
authenticating the user to be authenticated according to reference feature information in the similar user group when the user to be authenticated belongs to the similar user group,
wherein the preset distinguishability condition comprises: based on comparisons of similarity degrees between sample feature information of a similar user and each piece of reference feature information in the similar user group to which the similar user belongs, a ratio of a number of successful similarity degree comparisons is greater than a preset ratio value.

US Pat. No. 10,958,438

METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR BLOCKCHAIN-BASED RECORDKEEPING

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:capturing, at a device, a data stream, wherein the data stream comprises a video stream or an audio stream;
applying, at the device, a hash algorithm to each of a plurality of fragments of the data stream to respectively generate a plurality of hash values, each of the hash values corresponding to one of the plurality of fragments;
obtaining, at the device, an acquisition timestamp of each of the fragments;
recording description data of each of the fragments of the data stream;
for each of the hash values, digitally signing as a whole, in a trusted execution environment (TEE) of the device, the hash value and the description data of the fragment corresponding to the hash value by using a private key stored in the TEE to generate a signature;
generating, at the device, a plurality of blockchain transactions each comprising a respective one of the hash values and the description data of the fragment corresponding to the respective one of the hash values, the signature generated from digitally signing the hash value and the description data of the fragment corresponding to the hash value, and the acquisition timestamp of the fragment associated with the hash value of the blockchain transaction; and
transmitting, by the device, the plurality of blockchain transactions to a blockchain network for consensus verification of the plurality of blockchain transactions and storage of the plurality of hash values and the description data of the fragments corresponding to the hash values, to a blockchain on the blockchain network.

US Pat. No. 10,958,441

SIGNATURE VERIFICATION FOR A BLOCKCHAIN LEDGER

Advanced New Technologies...

1. A computer-implemented method comprising:sending, by a client and to a server, signature verification instructions for verifying multiple types of digital signatures, the signature verification instructions comprising third-party parameters, platform parameters, and time service certificate parameters, wherein each signature verification instruction comprises a verification object parameter and a hash value, wherein the verification object parameter comprises a third-party parameter, a platform parameter, or a time service certificate parameter, wherein the verification object parameter indicates a type of a to-be-verified object;
receiving, by the server and from the client, a signature verification instruction, wherein the server is configured to store data by using a blockchain ledger;
obtaining, by the server, the to-be-verified object based on the verification object parameter and the hash value, wherein the type of the to-be-verified object comprises a third-party digital signature, a server digital signature, or a time service certificate;
wherein when the verification object parameter is the third-party parameter, the server determines that the type of the to-be-verified object is the third-party digital signature, and obtaining the to-be-verified object based on the hash value further comprises:
determining, by the server, a data record or a data block corresponding to the hash value;
sending the data record or the data block to a third party of the blockchain ledger for digital signing by the third party; and
receiving encrypted data from the third party, wherein the encrypted data is obtained by the third party by digitally signing the data record or the data block;
wherein when the verification object parameter is the platform parameter, the server determines that the type of the to-be-verified object is the server digital signature, and obtaining the to-be-verified object based on the hash value further comprises:
determining, by the server, a data record or a data block corresponding to the hash value; and
digitally signing, by the server, the data record or the data block to generate encrypted data that comprises the server digital signature;
wherein when the verification object parameter is the time service certificate parameter, the server determines that the type of the to-be-verified object is the time service certificate, and obtaining the to-be-verified object based on the hash value further comprises:
determining, by the server, a block height of a data block in which a data record corresponding to the hash value is located, or determining a block height of a data block corresponding to the hash value; and
obtaining a time service certificate corresponding to the data block, wherein the time service certificate corresponds to a part of the blockchain ledger, wherein the time service certificate comprises a starting data block height, an ending data block height, a trusted timestamp, and a root hash of the part of the blockchain ledger, so as to determine a generation time of the part of the blockchain ledger, and wherein the time service certificate comprises a digital signature of a trusted time service authority;
sending, by the server and to the client, the to-be-verified object and one or more of the following: the encrypted data from the third party, the encrypted data generated by the server, and the time service certificate; and
verifying, by the client, the to-be-verified object to generate a verification result.

US Pat. No. 10,956,696

TWO-DIMENSIONAL CODE IDENTIFICATION AND POSITIONING

Advanced New Technologies...

1. A computer-implemented method, comprising:obtaining an image of a reference two-dimensional code;
obtaining a first resolution of the image of the reference two-dimensional code;
obtaining a sample two-dimensional code based on a predetermined environment condition;
obtaining a second resolution of the sample two-dimensional code;
determining that the second resolution of the sample two-dimensional code matches the first resolution of the reference two-dimensional code;
positioning global features of the reference two-dimensional code based on the sample two-dimensional code and identifier information of the sample two-dimensional code, wherein the identifier information comprises one or more global features of the sample two-dimensional code;
providing the reference two-dimensional code and the global features of the reference two-dimensional code as training data to train a two-dimensional code positioning and identification model;
detecting a third two-dimensional code within a second obtained image by performing global feature positioning detection using the two-dimensional code positioning and identification model;
subsequent to detecting the third two-dimensional code, obtaining a focus-adjusted image of the third two-dimensional code based on a predetermined image resolution; and
decoding the third two-dimensional code from the focus-adjusted image of the third two-dimensional code.

US Pat. No. 10,956,847

RISK IDENTIFICATION BASED ON HISTORICAL BEHAVIORAL DATA

Advanced New Technologies...

1. A computer-implemented method, comprising:obtaining, by a computer system of an online service site accessible to a plurality of users, a first type of the plurality of users' historical behavior data of a first time period in which the users interacted with the online service site, wherein the first type of the plurality of users' historical behavior data represents respective time durations between when a user sends an instant message and when the user provides a request for a service of the online service site;
calculating, by the computer system of the online service site for each user of the plurality of users, a first metric value for the first type of the plurality of users' historical behavior data over the first time period;
obtaining, by the computer system of the online service site, a second type of the plurality of users' historical behavior data of a second time period that is shorter than the first time period;
calculating, by the computer system of the online service site for each user of the plurality of users, a second metric value for the second type of the plurality of users' historical behavior data over the second time period that is shorter than the first time period;
generating a respective user-specific risk model for each user of the plurality of users who accessed the online service site over the first time period, wherein each respective risk model for each user is based on first historical behavior data of the first type by the user over the first time period and second historical behavior data of the second type of the user over the second time period, wherein generating the user-specific risk model comprises generating a user-specific safety threshold based on historical behavior data of the first type over the first time period that represents a time duration within which the user must initiate the request for the service after sending the online service site the instant message in order for the request for the service to be approved;
receiving, from a particular user of the plurality of users, a request for the service provided by the online service site;
computing a first value for the first type of behavior data by the particular user, including computing a time duration between which the particular user sent the online service site an instant message and when the user provided a request for the service;
computing a second value for the second type of the behavior data by the particular user;
obtaining, by the computer system of the online service site, a user-specific risk model for the particular user, wherein the user-specific risk model for the particular user comprises the user-specific safety threshold computed for the particular user from the first type of the particular user's historical behavior data;
determining, based on the first value for the first type of the behavior data by the particular user, that the particular user did not initiate the request for the service within the time duration specified by the user-specific safety threshold generated for the particular user; and
in response to determining that the particular user did not initiate the request for the service within the time duration specified by the user-specific safety threshold generated for the particular user, rejecting the request for the service.

US Pat. No. 10,945,114

QUICK ENABLING METHOD AND APPARATUS FOR SERVICE IN APPLICATION PROGRAM AND ELECTRONIC DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method, the method comprising:receiving, by a client device, tag content transmitted by a near field communication (NFC) tag, wherein the tag content comprises data indicating a service source and a service type;
enabling, by an operating system of the client device, an application program that has registered NFC and is associated with the NFC tag;
determining, by the client device, whether the enabled application program matches the service source;
decoding, by the enabled application program, the tag content to obtain the service type;
sending, by the enabled application program, a service request of the service type to a hosting server of the enabled application program; and
executing, by the enabled application program, a service routed by the hosting server according to the service request.

US Pat. No. 10,943,160

DYNAMIC GRAPHIC CODE IMPLEMENTATION METHOD AND APPARATUS

Advanced New Technologies...

1. A dynamic graphic code implementation method, comprising:invoking a distance sensor of a device to detect a distance between the device and a blocking object when displaying a graphic code on the device, wherein refreshing the graphic code is scheduled for a first refresh time;
if the distance between the device and the blocking object is within a preset distance range, stopping refreshing the graphic code scheduled for the first refresh time; and
after stopping refreshing the graphic code, if it is detected that the distance between the device and the blocking object is not within the preset distance range, restoring the refreshing of the graphic code when a next refresh time for refreshing the graphic code arrives.

US Pat. No. 10,929,374

CONSTRUCTING BLOCKCHAIN WORLD STATE MERKLE PATRICIA TRIE SUBTREE

Advanced New Technologies...

1. A computer-implemented method for providing a sub-tree of a hash tree within a blockchain network, the method comprising:providing, by a consensus client of the blockchain network, the hash tree and an address list for storing addresses of nodes within the blockchain network, the address list being initially empty;
executing, by the consensus client, a traversal of at least a portion of the hash tree in a plurality of iterations to perform operations comprising:
marking a first node of the hash tree as an account node, and storing an address of the first node in the address list,
marking a second node of the hash tree as an extension node, and moving to a next iteration of the traversal setting referenced by the second node, and
marking a third node of the hash tree as a transition node, and storing an address of the third node in the address list;
generating, by the consensus client, the sub-tree of the hash tree based on the address list, a sub-tree root node of the sub-tree comprising a root node of the hash tree, and one or more of the first node, the second node, and the third node; and
transmitting, by the consensus client, the sub-tree of the hash tree to a non-consensus client of the blockchain network, the sub-tree providing a state of accounts associated with the non-consensus client.

US Pat. No. 10,909,326

SOCIAL CONTENT RISK IDENTIFICATION

Advanced New Technologies...

1. A computer-implemented method for social content risk identification, comprising:obtaining, by a computer, social content data comprising at least one of social behavior records or social message records;
extracting, by the computer, original features of the social content data;
for each of the original features, generating, by the computer and using a tree structured machine learning model, dimension-extended features that include a set of extended sub-features corresponding to different dimensions of the original feature;
classifying, by the computer and using a deep machine learning model, that the social content data is risky social content data based on the dimension-extended features; and
transmitting, by the computer, a result of classifying that the social content data is risky social content data to a risk control platform.

US Pat. No. 10,909,101

UPDATING AND QUERYING A BITMAP INDEX

Advanced New Technologies...

1. A computer-implemented method, comprising:determining, based on update data, a to-be-updated row of a bitmap index that indexes data of a database using a bitmap data structure;
locking the to-be-updated row of the bitmap index including adding a row lock to the to-be-updated row, thereby preventing the to-be-updated row from being updated by other update operations, wherein at least one other row of the bitmap index remains unlocked for updating by other update operations; and
updating data in the to-be-updated row of the bitmap index based on the update data, wherein the updating comprises:
determining a column value of a main table primary key column and a column value of an index column of the update data; and
writing the column value of the main table primary key column and the column value of the index column of the update data into the to-be-updated row of the bitmap index.

US Pat. No. 10,885,160

USER CLASSIFICATION

Advanced New Technologies...

1. A computer-implemented user classification method, comprising:obtaining, by a target terminal device, an initial user classification model from a server, wherein the initial user classification model is provided by the server to multiple terminal devices, the multiple terminal devices comprising the target terminal device;
obtaining first operation data of a registered user of the target terminal device during a first time period, the first operation data recording one or more operations performed by the registered user on the target terminal device;
delaying updating the initial user classification model for a predetermined amount of time after an occurrence time of the one or more operations during the first time period in order to prevent the initial user classification model from learning based on an operation of a user other than the registered user;
the predetermined amount of time after the occurrence time of the one or more operations, updating the initial user classification model based on the first operation data, to obtain an updated user classification model that is personalized for the registered user; and
classifying, based on the updated user classification model, an identity of a current user of the target terminal device.

US Pat. No. 10,884,862

METHOD AND APPARATUS FOR PROCESSING FAILURE OF CIPHER CHANGE OF CIPHERTEXT IN DATABASE

ADVANCED NEW TECHNOLOGIES...

1. A method for processing cipher change failure, comprising:storing a record's error information when a cipher change of ciphertext data in the record fails, the error information comprising an identifier of the record, a failure cause, an old key version number, and a new key version number;
determining a retry strategy based on the stored failure cause, the determining a retry strategy comprising determining whether to implement an automatic retry or a manual retry based on whether the failure cause comprises at least one of: database inaccessibility, database jitter, database read/write errors, a state anomaly of a field value access system that performs the cipher change, or an execution anomaly of a cipher change execution component that calls the field value access system; and
employing the retry strategy to reperform the cipher change of the ciphertext data in the record having the identifier by decrypting the ciphertext data with a key corresponding to the old key version number to obtain plaintext data, and encrypting the obtained plaintext data using a key corresponding to the new key version number.

US Pat. No. 10,885,639

HAND DETECTION AND TRACKING METHOD AND DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:determining, for each frame of a video, whether an image of a hand exists in the frame;
when at least one frame of the video includes the image of the hand, tracking locations of the hand in the frames of the video to obtain a tracking result;
verifying that the tracking result is not valid in a current frame of the frames of the video, and
performing localized hand image detection on the current frame by:
determining a center of a positioning block used to identify a location of the image of the hand in the frame,
defining a plurality of adjacent blocks by using a specified step size and a specified block size,
adjusting each of the plurality of adjacent blocks to a size determined during a hand training, and
providing, to an image object classifier, each adjusted adjacent block to determine a quantity of the plurality of adjacent blocks that include images of hands.

US Pat. No. 10,970,818

SUB-IMAGE BASED IMAGE GENERATION

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving an image generation request, wherein the image generation request comprises an image format of an image for generation;
obtaining a static image corresponding to the received image generation request;
determining, based on the image format, a plurality of sub-images for generation and corresponding to the image awaiting generation based on the image format;
obtaining description information for each sub-image of the plurality of sub-images;
sorting, based on the description information for each sub-image, the plurality of sub-images as a plurality of sorted sub-images; and
generating the image by generating, pre-processing, and adding each particular sub-image of the plurality of sub-images to an image file corresponding to the image format, wherein generating the image comprises:
generating a particular sub-image based on description information associated with a particular sub-image for generation of the plurality of sorted sub-images, a predetermined image generation algorithm, and the static image;
pre-processing the particular sub-image; and
adding the particular sub-image to the image file corresponding to the image format.

US Pat. No. 10,972,529

PAGE JUMP METHOD AND APPARATUS

Advanced New Technologies...

1. A computer-implemented method executed by one or more processors, the method comprising:receiving, by the one or more processors, a request for a first service;
determining, by the one or more processors, a first jump page associated with the first service, wherein the first jump page is associated with a page identifier;
retrieving, based on the page identifier and by the one or more processors, a first jump route from a page routing table, wherein the first jump route is associated with the first service, and wherein the first jump route includes the page identifier and represents a route for retrieving the first jump page;
in response to retrieving the first jump route, loading, by the one or more processors, the first jump page based on the first jump route;
receiving, by the one or more processors, a second jump route from a jump route server, wherein the second jump route includes the page identifier and represents a route for retrieving a second jump page, the second jump route being associated with a deployed second service that is different from the first service; and
updating, by the one or more processors, the page routing table based on the second jump route.

US Pat. No. 10,970,482

ASSISTED DATA INPUT

Advanced New Technologies...

1. A computer-implemented method, comprising:saving a piece of text for security verification on a computing device;
generating one or more pieces of related text corresponding to the piece of saved text, wherein each text element of the one or more pieces of related text is generated based on its proximity to a corresponding text element of the piece of saved text on one or more keyboards on the computing device;
receiving a piece of input text for information verification;
comparing the piece of input text with the piece of saved text and the one or more pieces of related text;
determining that the piece of input text matches one of the one or more pieces of related text; and
providing input guidance for re-entering a piece of text for security authentication,
wherein the piece of re-entered text is masked for security after showing as plaintext for a predetermined period of time, wherein the input guidance is an extension of the predetermined period of time for showing the piece of re-entered text in plaintext before masking, and wherein the extension of the predetermined period of time for showing the piece of re-entered text includes showing one or more text elements of the piece of input text that do not match corresponding text elements of the piece of saved text, but match corresponding text elements of the one of the one or more pieces of related text with an extension of time and showing other text elements of the piece of re-entered text with the predetermined period of time.

US Pat. No. 10,956,444

BLOCK CHAIN STATE DATA SYNCHRONIZATION METHOD, APPARATUS, AND ELECTRONIC DEVICE

Advanced New Technologies...

1. A computer-implemented method of synchronizing blockchain state data, comprising:receiving, at a blockchain node device in a blockchain, a data synchronization instruction, wherein the blockchain node device is in recovery from a crash or is a new node in the blockchain;
in response to receiving the data synchronization instruction, obtaining in real time, at the blockchain node device, a current Merkle state tree of a latest block stored in a database of another blockchain node device in the blockchain,
wherein the database of the other blockchain node device stores the current Merkle state tree of the latest block and a history Merkle state tree, wherein the current Merkle state tree and the history Merkle state tree are distinct Merkle state trees that store respective non-identical sets of data, wherein at least some data stored in the history Merkle state tree is blockchain account data not stored in the current Merkle state tree, and wherein a storage size of the current Merkle state tree is less than a storage size of the history Merkle state tree, and
wherein the current Merkle state tree of the latest block stored in the database of the other blockchain node device is formed by a latest account state of blockchain accounts of the blockchain, and wherein the history Merkle state tree stored in the database of the other blockchain node device is formed by historical account states of the blockchain accounts of the blockchain;
storing the obtained current Merkle state tree of the latest block to a local database of the blockchain node device to complete real-time data synchronization;
at a later time, subsequent to storing the obtained current Merkle state tree of the latest block, obtaining, at the blockchain node device, the history Merkle state tree stored in the database of the other blockchain node device; and
storing the obtained history Merkle state tree in the local database of the blockchain node device.

US Pat. No. 10,951,617

SYSTEM AND METHOD FOR DECENTRALIZED-IDENTIFIER CREATION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for blockchain-based decentralized-identifier creation, comprising:obtaining, by a server, a request for creating a decentralized identifier (DID) for a subject, wherein the request comprises a public key of a cryptographic key pair;
creating, by the server based on the public key, a blockchain account associated with a blockchain;
creating, by the server, the DID based on information associated with the blockchain account;
determining, by the server, that the DID is not duplicative of any existing DID associated with the blockchain;
generating, by the server, a DID document corresponding to the DID, the DID document comprising a status associated with the DID indicating that an authentication of the subject's real-world identity is pending, wherein the determining that the DID is not duplicative of any existing DID associated with the blockchain is a precondition for obtaining the DID document;
storing, by the server, a mapping relationship between the DID and a dummy account identifier;
generating, by the server, a blockchain transaction for adding the DID document to the blockchain;
sending, by the server, the generated blockchain transaction to one or more blockchain nodes associated with the blockchain for adding the generated blockchain transaction to the blockchain;
receiving, by the server from an external system, a proof of a real-world identity authentication for the subject;
in response to receiving the proof of the real-world identity authentication:
updating, by the server, the status associated with the DID to indicate that authentication of the subject's real-world identity is complete; and
storing, by the server, a mapping relationship between the DID and an account identifier associated with the subject, wherein the account identifier corresponds to an account of the subject maintained by a business entity.

US Pat. No. 10,951,397

SYSTEM AND METHOD FOR BLOCKCHAIN-BASED CROSS-ENTITY AUTHENTICATION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method, comprising:obtaining, at a first computing system from a first entity, an authentication request for authenticating a user, wherein the authentication request comprises a decentralized identifier (DID) of the user;
generating, at the first computing system, a digital signature on the obtained authentication request based on a private key of the first entity;
generating, at the first computing system, an authorization encrypted with a private key of the user indicating a permission for the first entity to access an authentication result of the user endorsed by a second entity, wherein the encrypted authorization comprises the digital signature and the DID of the user;
adding, to a blockchain, a blockchain transaction for obtaining the authentication result endorsed by the second entity, wherein the authentication result indicates whether the DID in the authentication request is registered with the second entity, and the blockchain transaction comprises the encrypted authorization;
obtaining, at the first computing system from the blockchain, the authentication result endorsed by the second entity; and
transmitting the obtained authentication result to the first entity for the first entity to authenticate the user based on the obtained authentication result.

US Pat. No. 10,951,417

BLOCKCHAIN-BASED TRANSACTION VERIFICATION

Advanced New Technologies...

1. A computer-implemented transaction verification method, comprising:receiving, by a blockchain system, transaction data to be verified, wherein:
the transaction data comprises plaintext transaction information and a plurality of pieces of verifier signature data, wherein,
each piece of verifier signature data of the plurality of pieces of verifier signature data comprises a digital signature generated by a respective verifier using one of a plurality of private keys of the respective verifier;
each private key of each verifier corresponds to a public key of the verifier; and
each public key of each verifier comprises a weight and the weight of each public key of the verifier is different from the weight of each other public key of the verifier;
the plaintext transaction information comprises a designated-verifier information set that identifies designated verifiers that have been designated to verify the plaintext transaction information and comprises, for each of one or more of the designated verifiers, a piece of designated-verifier information;
obtaining, by the blockchain system, an authenticated information set by verifying each digital signature in the transaction data using the public key corresponding to the private key used to generate the digital signature, wherein the authenticated information set comprises the piece of designated-verifier information for each verifier for which the digital signature is successfully verified;
determining, for each verified digital signature, the weight of the public key used to verify the digital signature;
determining a sum of the weights of the public keys used to verify the digital signatures; and
determining, by the blockchain system, that the transaction data is verified successfully when the authenticated information set comprises a pre-determined quantity of pieces of designated-verifier information and the sum of the weights satisfies a pre-determined value.

US Pat. No. 10,949,936

IDENTIFYING COPYRIGHTED MATERIAL USING COPYRIGHT INFORMATION EMBEDDED IN TABLES

Advanced New Technologies...

1. A computer-implemented method for embedding copyright information in tables that hold digital content, the method comprising:generating, by a computing device, a unique identifier (ID) based on copyright information associated with the digital content, wherein the copyright information and the digital content are stored on a blockchain of a blockchain network;
identifying, by the computing device, a set of one or more attributes associated with an online table defined using a markup language of a webpage and rendered by a browser program displaying the webpage, wherein the set of one or more attributes associated with the online table comprise one or more of table size, cell size, row height, column width, or border style;
embedding, by the computing device, the unique ID in the online table by changing one or more attributes from the set of one or more attributes for the online table to be representative of the unique ID, wherein the embedding produces an information-embedded table that enables retrieval of the copyright information from the blockchain based on the unique ID, and wherein a visual difference between the online table and the information-embedded table is not apparent to an unaided human eye;
allocating, by the computer device, the digital content to the information-embedded table; and
distributing, by the computer device, the information-embedded table allocated with the digital content to the blockchain network.

US Pat. No. 10,943,126

METHOD AND APPARATUS FOR PROCESSING VIDEO STREAM

Advanced New Technologies...

1. A computer-implemented method for processing a video stream, comprising:obtaining, from a user, a video stream captured for an object;
extracting features of S image frames in the video stream;
generating S N-dimensional feature vectors by generating a respective N-dimensional feature vector for each image frame of the S image frames;
arranging the S N-dimensional feature vectors in a chronological order corresponding to the order in which the image frames occur in the video stream to generate a feature matrix, wherein the feature matrix has N rows and M columns, wherein S is smaller than M, wherein the arranging comprises inserting each N-dimensional feature vector of the S N-dimensional feature vectors into a respective column of the feature matrix;
generating, based on an interpolation method and at least a part of the S N-dimensional feature vectors, M-S N-dimensional feature vectors;
inserting each N-dimensional feature vector of the M-S N-dimensional feature vectors into a respective column of the feature matrix; and
processing the feature matrix by using a pre-trained convolutional neural network, to obtain a processing result for the object captured in the video stream.

US Pat. No. 10,943,186

MACHINE LEARNING MODEL TRAINING METHOD AND DEVICE, AND ELECTRONIC DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A machine learning model training method, comprising:classifying samples having risk labels in a training sample set as positive samples and classifying samples without risk labels in the training sample set as negative samples;
training a risk model with a machine learning method based on the positive samples and the negative samples;
obtaining a risk score for each of the negative samples based on the trained risk model;
identifying one or more negative samples in the training sample set that have a risk score greater than a preset threshold value;
re-classifying the one or more negative samples in the training sample set as re-classified positive samples to generate an updated training sample set from the training sample set;
configuring weights for loss functions corresponding to the re-classified positive samples and the positive samples in the training sample set, respectively, wherein a weight of the loss function corresponding to the re-classified positive samples is smaller than a weight of the loss function corresponding to the positive samples; and
re-training the risk model with the machine learning method based on the updated training sample set including the re-classified positive samples, the positive samples in the training sample set, and remaining negative samples in the training sample set,
wherein the risk scores represent probabilities at which a risk occurs, and the method further comprises:
after re-classifying the negative samples that have a risk score greater than the preset threshold value as the re-classified positive samples, configuring the risk scores of the re-classified positive samples as the weights of the loss function corresponding to the re-classified positive samples, and setting the weight of the loss function corresponding to original negative samples to be one.

US Pat. No. 10,942,756

SYSTEM AND METHOD FOR EXECUTING DIFFERENT TYPES OF BLOCKCHAIN CONTRACTS

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method, comprising:generating a bytecode of a blockchain contract, wherein:
the bytecode comprises a first indicator indicating a virtual machine type for executing the blockchain contract and a second indicator indicating a virtual machine version for executing the blockchain contract,
the first indicator corresponds to a first byte of the bytecode,
the second indicator corresponds to a second byte of the bytecode,
a third to an nth byte of the bytecode correspond to code for executing the blockchain contract, and
the first to the nth byte of the bytecode specify an application binary interface (ABI) format, n being a natural number no less than three; and
transmitting the bytecode to a blockchain node for the blockchain node to trigger a virtual machine of the virtual machine type corresponding to the first indicator to execute the blockchain contract.

US Pat. No. 10,929,717

ARTICLE DAMAGE DETECTION

Advanced New Technologies...

1. A method for evaluating damages to an article, comprising:obtaining at least two images that are time sequentially related and show the article at different angles;
providing the at least two images as input to a detection model in time order, wherein the detection model comprises a deep convolutional neural network and a long short-term memory (LSTM) network that have been jointly trained on a set of training samples, each training sample comprising multiple training images associated with labels indicating respective article damage degrees of an article shown in the multiple training images;
processing the at least two images using the deep convolutional neural network to output a feature processing result for each image based on respective features identified from the image;
processing the feature processing result using the long short-term memory (LSTM) network to receive the feature processing results and to output a damage detection result based on performing time series analysis on the feature processing results, wherein the damage detection result comprises a classification result of each of one or more types of damage; and
obtaining, as output from the detection model, the damage detection result.

US Pat. No. 10,931,814

SERVICE RECOMMENDATION

Advanced New Technologies...

1. A computer-implemented method comprising:receiving, at a terminal, a first signal transmitted by a service device using a first wireless communication technology;
obtaining, by an application client executing on the terminal, characteristic information of the service device from the first signal;
responsive to obtaining the characteristic information, selecting, based on the characteristic information, a target service corresponding to the service device in preparation for displaying the target service on the terminal,
wherein the target service is selected from a plurality of services provided by the application client on the terminal;
receiving, at the terminal, a second signal transmitted by the service device using a second wireless communication technology, wherein a maximum transmission range of the second signal is less than a maximum transmission range of the first signal, and wherein the second wireless communication technology is different from the first wireless communication technology; and
responsive to receiving the second signal, displaying the target service on the terminal.

US Pat. No. 10,922,195

CONSENSUS SYSTEM DOWNTIME RECOVERY

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented consensus method to be implemented on a blockchain maintained by a number (N) of nodes, wherein one of the nodes acts as a primary node and the other (N?1) nodes act as backup nodes, and the method is performed by one of the backup nodes, the method comprising:obtaining a pre-prepare message from the primary node;
multicasting a prepare message to at least some of the primary node and the other (N?2) backup nodes, the prepare message indicating an acceptance of the pre-prepare message;
obtaining (Q?1) or more prepare messages respectively from (Q?1) or more of the backup nodes, wherein Q (quorum) is (N+F+1)/2 rounded up to the nearest integer, and F is (N?1)/3 rounded down to the nearest integer;
storing at least a minimal amount of consensus messages for recovery after one or more of the N nodes crash, wherein the minimal amount of consensus messages comprise the pre-prepare message and at least (Q?1) of the (Q?1) or more prepare messages;
after the one or more of the N nodes crash, loading at least the stored minimal amount of consensus messages;
based on the loaded at least the stored minimal amount of consensus messages,
multicasting a commit message to at least some of the primary node and the other backup nodes, the commit message indicating that the one backup node agrees to the (Q?1) or more prepare messages; and
obtaining, respectively from Q or more nodes among the primary node and the backup nodes, Q or more commit messages each indicating that the corresponding node a corresponding node of the Q or more nodes agrees to (Q?1) or more prepare messages received by the corresponding node.

US Pat. No. 10,909,085

BLOCKCHAIN-BASED DATA PROCESSING METHOD AND DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:receiving, by a node in a blockchain network, service data generated by a first service, wherein the service data comprises a data structure having a field a value of which indicates that the first service is associated with a first processing level;
storing, by the node based on the value of the field, the service data in a first data processing queue selected from a plurality of data processing queues, wherein the first data processing queue corresponds to the first processing level, and each of the plurality of data processing queues corresponds to a different processing level;
determining a first quantity of service data to be read from the first data processing queue;
determining a second quantity of service data to be read from a second data processing queue of the plurality of data processing queues; and
generating, by the node, a new block that stores the first quantity of service data from the first data processing queue and the second quantity of service data from the second data processing queue,
wherein a quantity of service data read from each of the one or more of the plurality of data processing queues is determined in accordance with a condition for prioritizing storage of content from the plurality of data processing queues in the new block.

US Pat. No. 10,909,644

BLOCKCHAIN-BASED JUDGMENT EXECUTION

Advanced New Technologies...

1. A computer-implemented system comprising:a blockchain-based judgement execution tool configured to execute court ordered judgements; and
a trusted service layer comprising a trusted timing module, a trusted identity module, and a trusted computing module, wherein the trusted computing module comprises one or more data processors,
wherein the judgement execution tool is configured to, upon receiving a court ordered judgement that specifies a debtor, a creditor, and an amount of debt owed by the debtor to the creditor,
invoke the trusted identity module to determine that the court ordered judgement is authentic based on matching with a hash value associated with the court ordered judgement recorded on a blockchain,
invoke the trusted identity module to verify an identity of a debtor and an identity of the creditor,
invoke the trusted timing module to generate a first verified time stamp representing a time when the court ordered judgement was received by the judgement execution tool,
identify one or more assets associated with the debtor,
collect, as a collected asset, at least a portion of the amount of debt from the one or more assets associated with the debtor,
send the collected asset to the creditor,
invoke the trusted timing module to generate a second verified time stamp representing a time when the collected asset was sent to the creditor, and
invoke the trusted computing module to process blockchain data to add a record in the blockchain, in which the record includes information about the identities of the debtor and creditor, the first and second verified time stamps, and an amount of the collected asset collected from the debtor and sent to the creditor.

US Pat. No. 10,910,000

METHOD AND DEVICE FOR AUDIO RECOGNITION USING A VOTING MATRIX

ADVANCED NEW TECHNOLOGIES...

1. A method for audio recognition, comprising:establishing an audio characteristic value comparison table based on audio variation trends among frames and within each of the frames of sample data, the sample data including multiple segments of sample audio;
obtaining, from a sound signal, audio data to be recognized;
dividing the audio data to be recognized to obtain a plurality of frames of the audio data;
calculating, based on audio variation trends among the plurality of frames and within each of the plurality of frames, a characteristic value for each frame of the audio data to be recognized;
establishing a voting matrix according to the number of segments of the sample audio and the number of frames of each segment of the sample audio;
determining, by looking up in the audio characteristic value comparison table, a first frame of a segment of the sample audio that has the same characteristic value as that of a first frame of the audio data to be recognized, and marking a voting label at a position in the voting matrix corresponding to the first frame of the segment of the sample audio;
in response to determining that one or more second frames of the segment of the sample audio have the same characteristic values as those of one or more second frames of the audio data to be recognized, respectively marking one or more voting labels at the position in the voting matrix corresponding to the first frame of the segment of the sample audio, the one or more second frames of the audio data to be recognized coming after the first frame in the audio data to be recognized and the one or more second frames of the segment of the sample audio coming alter the first frame of the segment of the sample audio; and
in response to determining that a sum of the voting labels at the position in the voting matrix corresponding to the first frame of the segment of the sample audio is higher than a threshold, using the first frame of the segment of the sample audio as a starting frame to match the characteristic values of the segment of the sample audio and the audio data to be recognized to obtain a recognition result.

US Pat. No. 10,911,541

DATA TRANSMISSION AND NETWORK INTERFACE CONTROLLER

Advanced New Technologies...

1. A computer-implemented method, comprising:communicating, by a second RDMA network interface controller of a second host with a first RDMA network interface controller of a first host, to receive m data packets from the first RDMA network interface controller, wherein the m data packets have been backed up by the first RDMA network interface controller to a first network interface controller memory integrated into the first RDMA network interface controller, m being a positive integer; and
in response to determining that n data packets of the m data packets have not been received, n being a positive integer:
storing, by the second RDMA network interface controller, received data packets of the m data packets into a second network interface controller memory integrated into the second RDMA network interface controller;
waiting, by the second RDMA network interface controller, to receive the n data packets having been retransmitted by the first RDMA network interface controller, wherein the retransmitted n data packets are obtained by the first RDMA network interface controller from the first network interface controller memory; and
after the retransmitted n data packets have been received by the second RDMA network interface controller, transmitting the received data packets together with the retransmitted n data packets to a host memory of the second host.

US Pat. No. 10,909,775

METHOD AND DEVICE FOR IN-VEHICLE PAYMENT

Advanced New Technologies...

1. A computer-implemented method for in-vehicle payment, comprising:receiving, using a smart terminal device, a face image of a user and a geographic location of the user;
transmitting, from the smart terminal device to an image database, a request for an image set associated with the geographic location, wherein the request comprises one or more coordinates that correspond to the geographic location;
receiving, on the smart terminal device from the image database in response to the request, an image set associated with the one or more coordinates that correspond to the geographic location, wherein the image set comprises face images of a plurality of users; and
comparing, using the smart terminal device, the face image of the user with face images in the image set to determine an identity of the user.

US Pat. No. 10,891,609

TRANSACTION CARD AND INFORMATION DISPLAYING METHOD

ADVANCED NEW TECHNOLOGIES...

1. A transaction card corresponding to a server that provides a transaction service, the transaction card comprising: a card body, a power supply, a communication circuit, a graphic code generation circuit, and a display device, wherein:the power supply, the graphic code generation circuit, and the display device are embedded within the card body, and the power supply is connected to the graphic code generation circuit and the display device;
the communication circuit is connected to the power supply, the graphic code generation circuit, and the display device, and configured to receive target information sent by the server for the transaction card and/or sending a target request message to the server, and the communication circuit includes a near field communication circuit configured to communicate with a user terminal via a near field communication connection;
the graphic code generation circuit is configured to:
generate, when the transaction card is not connected to the server, a first graphic payment code and a graphic payment collection code based on transaction account information of a user; and
periodically generate a new graphic payment code, and replace the first graphic payment code displayed by the display device with the new graphic payment code; and
the display device is configured to sequentially display the first graphic payment code and the new graphic payment code with a constant luminance, and display the graphic payment collection code with a gradual change of luminance.

US Pat. No. 10,892,898

SHARED BLOCKCHAIN DATA STORAGE

Advanced New Technologies...

1. A computer-implemented method for communicating shared blockchain data, the method comprising:obtaining, by a consensus node of a blockchain network, current state information corresponding to an account state associated with one or more transactions of a current block in a blockchain of the blockchain network;
sending, by the consensus node, the current state information associated with the current block of the blockchain to one or more shared storage nodes of the blockchain network, wherein the consensus node stores the current state information and the one or more shared storage nodes store historic state information associated with every block of the blockchain as a historic state tree, and wherein the historic state tree includes key-value pairs (KVPs) with values being account states of accounts associated with the blockchain network and keys being hash values of the corresponding account states;
obtaining, by the consensus node, a hash value corresponding to the account state stored in the historic state tree;
sending, by the consensus node, the hash value to the one of the one or more shared storage nodes for retrieving the account state stored in the historic state tree;
receiving, by the consensus node, the account state in response to sending the hash value; and
verifying, by the consensus node, that the account state is part of the blockchain based on the hash value and the historic state tree, and
wherein the one or more shared storage nodes are elected by receiving 2f+1 votes from all 3f+1, 3f+2, or 3f+3 nodes of the blockchain network, and wherein f is a maximum number of faulty shared storage nodes and consensus nodes that can be tolerated within the blockchain.

US Pat. No. 10,891,161

METHOD AND DEVICE FOR VIRTUAL RESOURCE ALLOCATION, MODELING, AND DATA PREDICTION

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, from a plurality of data providers, a plurality of user evaluation results of a plurality of users, generated by a plurality of user evaluation models, respectively, wherein each user evaluation model is trained on a corresponding training sample set by
generating, for a corresponding user data sample, a respective data feature vector comprising data feature values, wherein the data feature values correspond to data features of a plurality of dimensions that are extracted from the user data sample, and
constructing a target matrix based on the data feature vectors generated for the user data sample;
constructing a plurality of risk evaluation model training samples from the user evaluation results, wherein each risk evaluation model training sample of the plurality of risk evaluation model training samples comprises a respective subset of the user evaluation results corresponding to a first user of the plurality of users;
generating a label for each risk evaluation model training sample of the plurality of risk evaluation model training samples based on an actual service execution status of the first user to provide a plurality of labels;
training a risk evaluation model based on the plurality of risk evaluation model training samples and the plurality of labels, wherein training the risk evaluation model comprises setting a plurality of variable coefficients, each variable coefficient specifying a contribution level of a corresponding data provider of the plurality of data providers; and
allocating virtual resources to the plurality of data providers based on the plurality of variable coefficients.

US Pat. No. 10,885,178

METHODS AND DEVICES FOR GENERATING SECURITY QUESTIONS AND VERIFYING IDENTITIES

Advanced New Technologies...

1. A computer-implemented method, comprising:identifying, by a server, an account to be verified by a security question;
sending, by the server, a security question generation instruction to a user device associated with the account;
receiving, at the server, a reference picture from the user device, wherein the reference picture is generated by the user device based on the security question generation instruction, the reference picture is one of: (i) a photograph captured by the user device, or (ii) a drawing generated by the user device based on user input;
determining, by the server, one or more feature values of the reference picture;
selecting, by the server from a pool of images and based on the one or more feature values, a plurality of confusion pictures corresponding to the reference picture, wherein corresponding one or more feature values for each of the confusion pictures are within corresponding ranges of the one or more feature values of the reference picture;
generating, by the server, a security question based on the reference picture and the plurality of confusion pictures, wherein the reference picture is a correct answer option and each of the confusion pictures is an incorrect answer option;
sending the security question comprising the reference picture and the confusion pictures the to the user device;
receiving, by the server, a selection result returned by the user device;
determining, by the server, that the selection result corresponds to the reference picture; and
in response to determining that the selection result corresponds to the reference picture, determining that a verification of the account has succeeded.

US Pat. No. 10,885,207

METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR BLOCKCHAIN-BASED RECORDKEEPING

ADVANCED NEW TECHNOLOGIES...

1. A device comprising: one or more processors and one or more non-transitory computer-readable mediums coupled to the one or more processors and configured with instructions executable by the one or more processors to cause the device to perform operations comprising:capturing streaming target data comprising video data or audio data;
applying a hash algorithm to each of a plurality of fragments of the target data to respectively generate a plurality of hash values, each of the hash values corresponding to one of the plurality of fragments;
periodically extracting a key segment from the streaming target data by:
detecting an abnormal event in the video data, and extracting a video segment corresponding to an occurrence period of the abnormal event as the key segment; or
detecting a keyword in the audio data, and extracting an audio segment of a preset length comprising the preset keyword as the key segment;
digitally signing, in a trusted execution environment (TEE) of the device, the corresponding hash value and the extracted key segment by using a private key stored in the TEE to generate a signature;
generating a blockchain transaction comprising the corresponding hash value, the extracted key segment, and the signature; and
transmitting the blockchain transaction to a blockchain network for consensus processing and storage of the corresponding hash value and the extracted key segment to a blockchain on the blockchain network.

US Pat. No. 10,885,735

SYSTEM AND METHOD FOR INFORMATION PROTECTION

ADVANCED NEW TECHNOLOGIES...

1. A non-transitory computer-readable storage medium of a sender node associated with a sender of a transaction, the storage medium storing instructions that, when executed by a processor, cause the processor to perform operations comprising:generating a transaction commitment value T by committing a transaction amount t of the transaction according to a commitment scheme based at least on a transaction blinding factor r_t;
sending the transaction amount t, the transaction blinding factor r_t, and the transaction commitment value T to a recipient node associated with a recipient of the transaction for the recipient to verify the transaction and to encrypt the transaction blinding factor r_t and the transaction amount t with a public key PK_B of the recipient;
obtaining an encrypted combination of the transaction blinding factor r_t and the transaction amount t from the recipient node after the recipient successfully verifying the transaction; and
transmitting an updated version of the transaction to a plurality of nodes in a blockchain for the plurality of nodes to verify the transaction, the updated version of the transaction comprising the encrypted combination and the transaction commitment value T.

US Pat. No. 10,884,767

SERVICE PROCESSING METHODS AND DEVICES

Advanced New Technologies...

1. A method for providing uniform instructions for modifying presentation of data on a display, the method comprising:detecting a device type of an electronic device, wherein the device type comprises one of following: a virtual reality (VR) device, a device that supports a gravity sensing function, a device that supports a gesture recognition function, or a device that accesses a mouse;
receiving, from a development side device, an instruction need message defining a correspondence between the device type, a device interacting instruction, and a unified interaction instruction;
configuring an instruction processing rule by defining a process for converting a first device interaction instruction to the unified interaction instruction for the device type according to the instruction need message;
invoking the instruction processing rule;
obtaining, based on the instruction processing rule, the first device interaction instruction initiated in response to a user interacting with the electronic device, wherein the first device interaction instruction comprises an instruction generated in response to the user interacting with the electronic device;
converting, according to the instruction processing rule, the first device interaction instruction into a first unified interaction instruction corresponding to the first device interaction instruction; and
updating interaction data output to a display based on the first unified interaction instruction.

US Pat. No. 10,887,084

SYSTEM AND METHOD FOR IMPLEMENTING A RESOLVER SERVICE FOR DECENTRALIZED IDENTIFIERS

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for implementing a resolver service, comprising:obtaining, from a blockchain, event data of a plurality of blockchain transactions associated with a plurality of decentralized identifiers (DIDs);
storing the event data in a database;
receiving a request for information associated with the event data, wherein the request comprises one or more account identifiers;
identifying one or more DIDs respectively corresponding to the one or more account identifiers based on pre-stored mapping relationships between the one or more DIDs and the one or more account identifiers; and
providing, from the database, event data of one or more blockchain transactions associated with the identified one or more DIDs.

US Pat. No. 10,887,108

CONSENSUS VERIFICATION METHOD, APPARATUS, AND DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a first node of a blockchain, service data;
performing first consensus verification on the service data and determining that the first consensus verification on the service data fails; and
in response to determining that the first consensus verification on the service data fails
determining that the service data satisfies a predetermined retry condition,
storing the service data as service data to be retried in response to determining that the predetermined retry condition is satisfied, and
after storing the service data as service data to be retried
determining that a reason for a failure of the first consensus verification on the service data is eliminated, and
performing the first consensus verification on the service data to be retried in response to determining that the reason for the failure of the first consensus verification on the service data is eliminated.

US Pat. No. 10,887,112

BLOCKCHAIN CONSENSUS METHOD AND DEVICE

Advanced New Technologies...

1. A blockchain consensus method, comprising:receiving, by a consensus node in a blockchain, first service data;
determining a handling time of the first service data;
storing, by the consensus node, the first service data that comprises the handling time, wherein storing the first service data that comprises the handling time comprises:
in response to determining that there is already a timestamp attribute in attributes of the first service data and that a content of the timestamp attribute is empty, writing the handling time of the first service data into the timestamp attribute; or
in response to determining that data has been written into an original timestamp attribute of the first service data or that the first service data does not have a timestamp attribute, generating a new timestamp attribute for the first service data and writing the handing time of the first service data into the new timestamp attribute;
in response to determining that service data consensus needs to be performed, selecting, by the consensus node based on the handling time, a particular service data on which consensus is to be performed; and
performing consensus on the selected particular service data on which consensus is to be performed.

US Pat. No. 10,887,114

MANAGING COMMUNICATIONS AMONG CONSENSUS NODES AND CLIENT NODES

Advanced New Technologies...

1. A computer-implemented method for isolating a first communication connection from a second communication connection via configuring two separate truststores, comprising:identifying, by a first consensus node, a first certificate authority (CA) group of one or more CAs;
generating, by the first consensus node, a first certificate signing request (CSR) corresponding to the first CA group;
sending, by the first consensus node, the first CSR to the first CA group;
receiving, by the first consensus node, a first set of public key certificates from the first CA group, wherein the first set of public key certificates comprises (i) a first public key certificate issued to the first consensus node in response to the first CSR, and (ii) a second public key certificate issued to a second consensus node;
configuring, on the first consensus node, a first truststore based on the first set of public key certificates;
identifying, by the first consensus node, a second CA group of one or more CAs, wherein the first CA and the second CA group are mutually exclusive;
generating, by the first consensus node, a second CSR corresponding to the second CA group;
sending, by the first consensus node, the second CSR to the second CA group;
receiving, by the first consensus node, a second set of public key certificates from the second CA group, wherein the second set of public key certificates data indicating comprises (i) a third public key certificate issued to the first consensus node in response to the second CSR, and (ii) a fourth public key certificate issued to a client node;
configuring, on the first consensus node, a second truststore based on the second set of public key certificates comprising the third public key certificate and the fourth public key certificate;
establishing the first communication connection between the first consensus node and the second consensus node using the first public key certificate and the second public key certificate of the first set of public key certificates stored within the first truststore, wherein communications through the first communication connection are encrypted using the first public key certificate and the second public key certificate; and
establishing the second communication connection between the first consensus node and the client node using the third public key certificate and the fourth public key certificate of the second set of public key certificates stored within the second truststore, wherein communications through the second communication connection are encrypted using the third public key certificate and the fourth public key certificate.

US Pat. No. 10,885,581

DATA AUDITING METHOD AND DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a proxy server and from a user device, a loan query request that specifies a total amount of loans requested by a user;
designating, by the proxy server, a serial number that is associated with the loan query request;
transmitting, by the proxy server, the loan query request to a plurality of service provider servers that are each associated with a different lender;
in response to transmitting the loan query request to the plurality of service provider servers that are each associated with a different lender, receiving, by the proxy server and from each of the service provider servers, a first query result that indicates an amount of a loan that is offered by the lender that is associated with the service provider server;
determining, by the proxy server, a total amount of the loans that are offered to the user by all of the different lenders;
transmitting, by the proxy server, a response to the loan query request to the user that indicates the total amount of the loans that are offered to the user by all of the different lenders;
after transmitting the response to the loan query request, receiving, by the proxy server, an audit request from the user device;
transmitting, by the proxy server and to a particular service provider server, the audit request and the serial number to the particular service provider server;
in response to transmitting the audit request, receiving, by the proxy server and from the particular service provider server, a second query result;
obtaining, by the proxy server, the first query result from a blockchain that is associated with the particular service provider server, wherein the first query result was previously stored by the particular service provider server in the blockchain contemporaneous with responding to the loan query request; and
comparing the second query result with the first query result that was obtained from the blockchain that is associated with the particular service provider server.

US Pat. No. 10,884,830

METHOD AND APPARATUS FOR MULTITHREADED DATA TRANSMISSION IN A TEE SYSTEM

Advanced New Technologies...

1. A computer-implemented method for data transmission in a trusted execution environment (TEE) system, wherein:the TEE system comprises a TEE side and a non-TEE side,
the non-TEE side comprises a shared memory, the shared memory comprises a first address, a second address, and a plurality of consecutive third addresses, wherein the first address stores a write offset address, the write offset address indicates a writeable start address in the plurality of consecutive third addresses, the second address stores a read offset address, the read offset address indicates a readable start address in the plurality of consecutive third addresses, the plurality of consecutive third addresses store data from the TEE side,
the non-TEE side is preconfigured with a non-TEE side thread lock corresponding to the shared memory, and
the computer-implemented method is executed by a thread on the non-TEE side, comprising:
obtaining the non-TEE side thread lock;
obtaining the write offset address and the read offset address respectively by reading the first address and the second address;
reading unread bytes in written data in the plurality of consecutive third addresses as second data, wherein the unread bytes are determined based on the write offset address and the read offset address, and each address corresponds to one byte;
updating the read offset address in the second address; and
releasing the non-TEE side thread lock.

US Pat. No. 10,885,638

HAND DETECTION AND TRACKING METHOD AND DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:determining, for each frame of a video, whether an image of a hand exists in the frame by
determining coordinates of a positioning block used to identify a location of the image of the hand in the frame,
adjusting the positioning block to a size determined during a hand training,
providing, to an image object classifier, a sub-image determined by the adjusted positioning block, the image object classifier configured to determine whether the sub-image is a hand, and
receiving, from the image object classifier, an indication of whether the sub-image determined by the adjusted positioning block identifies the hand;
when at least one frame of the video includes the image of the hand, tracking locations of the hand in the frames of the video to obtain a tracking result;
verifying whether the tracking result is valid in a current frame of the frames of the video; and
when the tracking result is valid in the current frame of the video, tracking a location of the hand in a next frame; or
when the tracking result is not valid in the current frame, performing localized hand image detection on the current frame.

US Pat. No. 10,871,870

INFORMATION PROCESSING METHOD AND DEVICE FOR DISPLAYING SERVICE COMPLETION STATUS

Advanced New Technologies...

1. A computer-implemented method, comprising:displaying, by a display device, a form in a user interface with a number of items for a user to complete in the user interface;
determining a first number representing a total of the number of items;
receiving user input completing at least one of the number of items in the user interface;
in response to the received user input, determining a second number representing a number of completed items in the user interface;
displaying, in the user interface, both the first number and the second number on a button, wherein the displayed first number and the displayed second number are non-negative integers, the displayed first number is a fixed number, the displayed second number changes based on how many items of the number of items has been completed in the user interface, the button is disabled while the user is filling the form, and the button is enabled after the user has finished filling in the form with the displayed second number equal to the displayed first number;
obtaining an attribute information of the button, wherein the attribute information of the button corresponds to a display appearance of the button including at least one of transparency, hue, brightness, purity, size, and shape of the button;
changing a value of the attribute information based on the second number and a predetermined rule, wherein changing the value of the attribute information causes a change in the displayed appearance of the button;
when the button is enabled, in response to a user clicking input on the button, submitting the completed number of items displayed in the user interface for data verification;
in response to determining that one or more mandatory items of the completed number of items displayed in the user interface do not satisfy one or more operation requirements associated with the one or more mandatory items:
updating the displayed second number by subtracting the number of mandatory items that do not satisfy the one or more operation requirements from the displayed second number; and
after updating the displayed second number, disabling the button in the user interface.

US Pat. No. 10,873,452

SECRET SHARING DATA EXCHANGE FOR GENERATING A DATA PROCESSING MODEL

Advanced New Technologies...

1. A computer-implemented data exchange method, comprising:determining, by a first data party device, respective values of first coefficients based on a first share of service data, wherein the first coefficients are corresponding coefficients of respective target variables in different terms of a polynomial expression, and the target variables are variables that are in the polynomial expression and associated with the first share of the service data;
determining, by a second data party device, respective values of second coefficients based on a second share of the service data, wherein the second coefficients comprise coefficients of the target variables other than the first coefficients in the different terms of the polynomial expression, wherein the first coefficients are expressed in terms of multiple orders of the second coefficients and the second coefficients are expressed in terms of multiple orders of the first coefficients;
secretly sharing, by the first data party device, respective values of the different terms in the polynomial expression in parallel based on the respective values of the first coefficients, and secretly sharing, by the second data party, the respective values of the different terms in the polynomial expression in parallel based on the respective values of the second coefficients, so that the first data party obtains first shares of the respective values of the different terms, and the second data party obtains second shares of the respective values of the different terms;
determining, by the first data party device a first share of a value of the polynomial expression based on the first shares of the respective values of the different terms; and
determining, by the second data party device, a second share of the value of the polynomial expression based on the second shares of the respective values of the different terms
determining by at least one of the first party device or the second party device, the value of the polynomial expression based on the first share of the value of the polynomial expression and the second share of the value of the polynomial expression; and
constructing a machine learning model by fitting an activation function of the machine learning model using the value of the polynomial expression.

US Pat. No. 10,866,933

BLOCKCHAIN-BASED DATA PROCESSING METHOD AND DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:receiving, by a node in a blockchain network, service data generated by a first service, wherein the service data comprises a data structure having a field a value of which indicates that the first service is associated with a first processing level;
storing, by the node based on the value of the field, the service data in a first data processing queue selected from a plurality of data processing queues, wherein the first data processing queue corresponds to the first processing level, and each of the plurality of data processing queues corresponds to a different processing level;
determining a first quantity of service data to be read from the first data processing queue;
determining a second quantity of service data to be read from a second data processing queue of the plurality of data processing queues; and
generating, by the node, a new block that stores the first quantity of service data from the first data processing queue and the second quantity of service data from the second data processing queue,
wherein a quantity of service data read from each of the one or more of the plurality of data processing queues is determined in accordance with a condition for prioritizing storage of content from the plurality of data processing queues in the new block.

US Pat. No. 10,834,187

METHOD AND DEVICE FOR DATA VERSION COMPARISON BETWEEN TRANS-TIME ZONE SITES

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method, comprising:receiving, by a central server from a plurality of trans-time zone sites, target data and a corresponding time stamp from each trans-time zone site, wherein each of the time stamps is based on a respective time zone of a sending trans-time zone site from which the target data and the time stamp were received, wherein the trans-time zone sites are international sites of a cross-border payment service;
modifying, by the central server, each of the received time stamps based on the respective time zone of the sending trans-time zone for the time stamp and a time zone of the central server;
subsequent to receiving the target data and the corresponding time stamps, comparing, by the central server, the received target data from each trans-time zone site to the received target data from another trans-time zone site of the plurality of trans-time zone sites based on the modified corresponding time stamps;
aggregating the received target data from each of the trans-time zone sites in a version order corresponding to an order of the modified corresponding time stamps; and
storing, by the central server, a latest version of the target data having a modified corresponding time stamp that indicates a later time than each of the other modified corresponding time stamps.

US Pat. No. 11,050,550

METHODS AND SYSTEMS FOR READING DATA BASED ON PLURALITY OF BLOCKCHAIN NETWORKS

Advanced New Technologies...


1. A computer-implemented method for retrieving data, comprising:receiving, by a node in a second-type blockchain network, a first-type transaction hash sent by a user, wherein the first-type transaction hash is a hash value of a first-type blockchain transaction associated with a first-type blockchain network;
identifying, by the node based on querying a blockchain of the second-type blockchain network, a second-type blockchain transaction that comprises the first-type transaction hash;
identifying, by the node, a first network identifier from the second-type blockchain transaction;
sending the first-type transaction hash to a first-type blockchain network corresponding to the first network identifier to obtain the first-type blockchain transaction;
providing the first-type blockchain transaction to the user;
receiving, by a node in the second-type blockchain network, a third-type transaction hash sent by the user, wherein the third-type transaction hash is a transaction hash of a third-type blockchain transaction to be retrieved;

identifying, based on querying a blockchain of the second-type blockchain network, a third-type blockchain transaction that comprises the third-type transaction hash;
retrieving a second network identifier from the third-type blockchain transaction;
sending the first-type transaction hash to a third-type blockchain network corresponding to the second network identifier, obtaining a third-type blockchain transaction corresponding to the third-type transaction hash; and
providing the third-type blockchain transaction to the user.

US Pat. No. 11,050,561

MULTI-PARTY SECURITY COMPUTING METHOD AND APPARATUS, AND ELECTRONIC DEVICE

ADVANCED NEW TECHNOLOGIES...


1. A secure multi-party computation method, applicable to one computing node of a plurality of computing nodes deployed in a distributed network, the plurality of computing nodes jointly participating in a secure multi-party computation based on data held on each of the plurality of computing nodes, the method comprising:generating, by the one computing node and based on a secure multi-party computation algorithm, a computing parameter related to the data held by the one computing node, wherein the computing parameter comprises a random number participating in the secure multi-party computation;
transmitting, by the one computing node, the computing parameter to other computing nodes of the plurality of computing nodes participating in the secure multi-party computation for the other computing nodes to perform the secure multi-party computation based on computing parameters transmitted by the computing nodes participating in the secure multi-party computation;
creating, by the one computing node, an audit log corresponding to the computing parameter generated by the one computing node, the audit log recording description information related to the computing parameter, wherein the description information comprises a random number generation rule corresponding to the random number participating in the secure multi-party computation; and
performing, based on the audit log corresponding to the computing parameter generated by the one computing node, a privacy audit on the computing parameter transmitted by the computing node participating in the secure multi-party computation, to determine whether the computing parameter transmitted by the computing node contains a risk of privacy leakage, by:determining, based on the random number generation rule recorded in the audit log and corresponding to the random number transmitted by the computing node participating in the secure multi-party computation, whether the random number is constructed based on the data held by the other computing nodes; anddetermining, in response to a determination that the random number is constructed based on the data held by the other computing nodes, that the computing parameter transmitted by the computing node contains the risk of privacy leakage, or
determining, in response to a determination that the random number is not construed based on the data held by the other computing nodes, that the computing parameter transmitted by the computing node does not contain the risk of privacy leakage.



US Pat. No. 11,049,099

METHODS FOR IMPLEMENTING PRIVACY PROTECTION IN BLOCKCHAIN

Advanced New Technologies...


1. A computer-implemented method, comprising:receiving, by a first blockchain node, an encrypted transaction comprising a smart contract that includes code, wherein the code of the smart contract comprises a contract state indicated by a privacy identifier;
decrypting, by the first blockchain node, the encrypted transaction to obtain the code of the smart contract in plaintext;
executing, by the first blockchain node, the code of the smart contract in plaintext in a trusted execution environment;
encrypting, by the first blockchain node using a key, the contract state indicated by the privacy identifier; and
writing, by the first blockchain node, the encrypted contract state indicated by the privacy identifier to a database.

US Pat. No. 11,049,188

BLOCKCHAIN-BASED SERVICE EXECUTION METHOD AND APPARATUS, AND ELECTRONIC DEVICE

Advanced New Technologies...


1. A computer-implemented method for a blockchain-based service, comprising:collecting appearance data of a vehicle as collected appearance data, the vehicle capable of accessing, as a member, a blockchain;
generating, by generation hardware of the vehicle, a private key;
generating a digital signature of a transaction using the private key, wherein the transaction is used to initiate registration of the vehicle in the blockchain;
verifying the digital signature using the collected appearance data as a public key;
registering, in a distributed database associated with the blockchain, the appearance data as an identity of the vehicle;
detecting, by a member node device in the blockchain, a vehicle violation event that is related to the vehicle;
receiving a target transaction initiated by the member node device in the blockchain, wherein the target transaction comprises the appearance data of the vehicle that is collected by the member node device and vehicle violation event information that is related to the vehicle violation event;
invoking a smart contract that corresponds to the vehicle violation event information; and
executing, based on the identity indicated by the appearance data of the vehicle, violation processing logic stated in the smart contract.

US Pat. No. 11,042,528

DATA UNIQUENESS CONTROL AND INFORMATION STORAGE

Advanced New Technologies...


1. A method, executable by one or more processors, for data uniqueness control, the method comprising:determining control information according to specific data mapped by a data storage space of a database;
combining the control information and data to be written into the data storage space to obtain a combination result;
determining that there is another combination result that is the same as the combination result, the another combination result combining another data stored in another data storage space of the database and another control information mapped by the another data storage space;
ensuring data uniqueness of the data to be written into the database by:modifying the stored another data of the another combination result in the another data storage space of the database so that there is not another combination result that is the same as the combination result;
writing into the data storage space the data to be written into the data storage space of the database;
establishing a mapping relationship between the data to be written into the data storage space of the database and a conflict identifier;
establishing a mapping relationship between the modified data in the database and the conflict identifier; and
mapping different data storage spaces of the database having data of different contents to the same control information, the modifying including changing the conflict identifier of the stored another data to indicate a co-existence of the data and the stored another data, the data and the stored another data having a same login name; and

receiving a data access request sent by a terminal;
querying data in the database according to the data access request;
instructing the terminal to prompt a user to input an instruction for indicating whether to modify the queried data in response to determining that the conflict identifier having the mapping relationship with the queried data exists; andin response to receiving an instruction sent by the terminal for indicating modification of the queried data, updating the queried data, the updating the queried data including performing a reversible modification on the queried data in the database; and
in response to receiving an instruction sent by a terminal for indicating not to modify queried data,determining that the queried data is the data undergone the reversible modification;
executing a reverse operation of the reversible modification on the queried data to obtain modified data; and
executing the reversible modification on data in the database that is the same as the modified data.



US Pat. No. 11,042,535

ACCELERATING TRANSACTION DELIVERIES IN BLOCKCHAIN NETWORKS USING ACCELERATION NODES

Advanced New Technologies...


1. A computer-implemented method, the method comprising:selecting an acceleration node for sending a transaction from a first node to a second node, wherein the acceleration node is selected based on determining that a transaction delivery time using the acceleration node is expected to be faster than a transaction delivery time that is expected by sending the transaction directly to the second node;
sending, using a blockchain transaction acceleration system, the transaction to the acceleration node in a blockchain, wherein the transaction is sent to the acceleration node instead of being sent directly to the second node that is an intended recipient of the transaction, and wherein the first node, the second node, and the acceleration node are different nodes;
forwarding, using the blockchain transaction acceleration system, the transaction from the acceleration node to the second node; and
executing the transaction by the second node.

US Pat. No. 11,042,276

INSTANT-MESSAGING-BASED PICTURE SENDING METHOD AND DEVICE

Advanced New Technologies...


1. A computer-implemented method, comprising:displaying, on a first computing device, an instant messaging conversation between a first user using the first computing device and a second user using a second computing device in a communication area of an instant messaging application;
receiving, at the first computing device, a target image from the second computing device, wherein the target image comprises an instant-messaging-based emoji or photograph;
displaying the target image in the communication area;
editing, within the communication area of the instant messaging application, the target image based on attribute information of the first user;
sending, by the first computing device, the edited target image to the second computing device; and
updating the communication area to display the target image and the edited target image.

US Pat. No. 11,042,461

MONITORING MULTIPLE SYSTEM INDICATORS

Advanced New Technologies...


1. A computer-implemented method arranged to monitor operation of an insurance system, comprising:storing, by the insurance system, multiple system indicators in an indicator library, wherein at least one system indicator in the multiple system indicators is used to indicate a state or level of the insurance system, wherein the multiple system indicators include a number of sold insurance policies, a billing amount of sold insurance policies, a number of filed claims, a number of denied claims, and a total settlement amount, and wherein the insurance system performs multi-indicator joint monitoring using a long short-term memory (LSTM) model;
storing, by the insurance system, historical data of the multiple system indicators in a database of the insurance system;
determining, by the insurance system, a plurality of system indicators from the multiple system indicators to be monitored by the insurance system, wherein a first system indicator x of the plurality of system indicators is correlated with one or more second system indicators of the plurality of system indicators, and wherein the plurality of system indicators are selected by a user of the insurance system and from the indicator library using a graphical user interface (GUI) of the insurance system;
after determining the plurality of system indicators to be monitored by the insurance system, obtaining, by the insurance system, training data based on historical data of the plurality of system indicators, wherein a historical time period is selected by the user of the insurance system using the GUI of the insurance system, and wherein a portion of the historical data of the plurality of system indicators that is within the historical time period is obtained as the training data;
after obtaining the training data based on the historical data of the plurality of system indicators, arranging, by the insurance system, the training data in a chronological order, wherein arranging the training data in the chronological order is performed for one system indicator at a time;
after arranging the training data in the chronological order, storing, by the insurance system, the training data in the database of the insurance system;
training, by the insurance system, the LSTM model as a trained LSTM model using the training data;
simultaneously monitoring, by the insurance system, the plurality of system indicators based on the trained LSTM model, wherein simultaneously monitoring the plurality of system indicators based on the trained LSTM model comprises:automatically obtaining real-time data of the plurality of system indicators;
automatically obtaining a second portion of the historical data of the plurality of system indicators within a second historical time period;
automatically inputting the second portion of the historical data of the plurality of system indicators within the second historical time period into the trained LSTM model;
automatically obtaining predicted data of the plurality of system indicators from the trained LSTM model; and
automatically comparing the real-time data of the plurality of system indicators with the predicted data of the plurality of system indicators; and

raising, by the insurance system, an alarm in response to detecting one or more co-movement anomalies between the first system indicator x and the one or more second system indicators, wherein a co-movement anomaly is detected when an anomaly has occurred in one of the one or more second system indicators and has not occurred in the first system indicator x.

US Pat. No. 11,036,562

STREAMING DATA DISTRIBUTED PROCESSING METHOD AND DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A streaming data distributed processing method, comprising: obtaining service data identifier information of a data record of streaming data, a to-be-processed real-time value of the data record, and a time sequence characteristic of the to-be-processed real-time value of the data record, the service data identifier information representing service data;obtaining a time sequence characteristic of a processed real-time value of the service data based on a correspondence relationship between the service data identifier information and the time sequence characteristic of the processed real-time value;
comparing the time sequence characteristic of the to-be-processed real-time value and the time sequence characteristic of the processed real-time value, and in response to that the time sequence characteristic of the to-be-processed real-time value is later than the time sequence characteristic of the processed real-time value, updating the time sequence characteristic of the processed real-time value to the time sequence characteristic of the to-be-processed real-time value;
employing the to-be-processed real-time value of the service data in service computations before the time sequence characteristic of the processed real-time value of the service data has been stored;
using the time sequence characteristic of the to-be-processed value of the service data as the time sequence characteristic of the processed real-time value; and
saving the correspondence relationship between the service data identifier information and the time sequence characteristic of the processed real-time value, wherein:
the service data identifier information comprises: an identifier characteristic and at least one identifier field;
a combination of all identifier fields represents one piece or one set of the service data; and
the identifier characteristic is generated based on a predetermined portion of the combination of all identifier fields.

US Pat. No. 11,036,834

IDENTIFYING COPYRIGHTED MATERIAL USING EMBEDDED TIMESTAMPED COPYRIGHT INFORMATION

Advanced New Technologies...

1. A computer-implemented method for embedding copyright information in textual content, the method comprising:generating, by a computing device, a timestamp indicating a time at which an update to a text segment within the textual content is performed to provide an updated text segment;
generating, by the computing device, a unique identifier (ID) including the timestamp and based on copyright information associated with the textual content, wherein the unique ID indicates one or more blockchain transactions in a blockchain of a blockchain network, the one or more blockchain transactions storing the copyright information and the timestamp; and
embedding, by the computing device, the unique ID including the timestamp in additional text interspersed into the updated text segment, to provide an information-embedded updated text segment that enables a) a determination of the time of the update based on the timestamp included in the unique ID, b) retrieval of the copyright information associated with the updated text segment from the blockchain based on the unique ID, and c) verification of authorship of the updated text segment based on a comparison between the timestamp included in the unique ID and the timestamp stored in the one or more blockchain transactions.

US Pat. No. 11,038,883

SYSTEM AND METHOD FOR DECENTRALIZED-IDENTIFIER CREATION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for blockchain-based decentralized-identifier creation, comprising:obtaining, by a server, a request for creating a decentralized identifier (DID) for a subject, wherein the request comprises a public key of a cryptographic key pair;
creating, by the server based on the public key, a blockchain account associated with a blockchain;
creating, by the server, the DID based on information associated with the blockchain account;
determining, by the server, that the DID is not duplicative of any existing DID associated with the blockchain;
generating, by the server, a DID document corresponding to the DID, the DID document comprising a status associated with the DID indicating that an authentication of the subject's real-world identity is pending, wherein the determining that the DID is not duplicative of any existing DID associated with the blockchain is a precondition for obtaining the DID document;
storing, by the server, a mapping relationship between the DID and a dummy account identifier;
generating, by the server, a blockchain transaction for adding the DID document to the blockchain;
sending, by the server, the generated blockchain transaction to one or more blockchain nodes associated with the blockchain for adding the generated blockchain transaction to the blockchain;
receiving, by the server from an external system, a proof of a real-world identity authentication for the subject;
in response to receiving the proof of the real-world identity authentication:
updating, by the server, the status associated with the DID to indicate that authentication of the subject's real-world identity is complete; and
storing, by the server, a mapping relationship between the DID and an account identifier associated with the subject, wherein the account identifier corresponds to an account of the subject maintained by a business entity.

US Pat. No. 11,038,884

BLOCKCHAIN-BASED COPYRIGHT PROTECTION METHOD AND APPARATUS, AND ELECTRONIC DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:receiving, by a blockchain system from a terminal device, a verification request for a digital product, wherein the verification request comprises eligibility information of a user;
storing, by the blockchain system in a blockchain associated with the blockchain system, a transaction corresponding to the verification request;
performing, by the blockchain system, eligibility verification based on the eligibility information;
determining, by the blockchain system, a data type corresponding to the digital product, wherein the determining comprises determining that the digital product comprises data of an audio type or data of a video type;
generating, by the blockchain system, identification information for tracing the user based on the eligibility information in the verification request, wherein the generating comprises:
when it is determined that the digital product comprises data of the audio type, embedding information of the user into an audio identifier, and
when it is determined that the digital product comprises data of the video type, embedding information of the user into a graphic identifier for insertion in one or more portions of the digital product each having a frequency coefficient within a range; and
sending, by the blockchain system to the terminal device, a result of the eligibility verification and the generated identification information.

US Pat. No. 11,038,670

SYSTEM AND METHOD FOR BLOCKCHAIN-BASED CROSS-ENTITY AUTHENTICATION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method, comprising:obtaining, at a first computing system from a first entity, an authentication request for authenticating a user, wherein the authentication request comprises a decentralized identifier (DID) of the user;
generating, at the first computing system, a digital signature on the obtained authentication request based on a private key of the first entity;
generating, at the first computing system, an authorization encrypted with a private key of the user indicating a permission for the first entity to access an authentication result of the user endorsed by a second entity, wherein the encrypted authorization comprises the digital signature and the DID of the user;
adding, to a blockchain, a blockchain transaction for obtaining the authentication result endorsed by the second entity, wherein the authentication result indicates whether the DID in the authentication request is registered with the second entity, and the blockchain transaction comprises the encrypted authorization;
obtaining, at the first computing system from the blockchain, the authentication result endorsed by the second entity; and
transmitting the obtained authentication result to the first entity for the first entity to authenticate the user based on the obtained authentication result.

US Pat. No. 11,038,673

DATA PROCESSING METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A data processing method, comprising:obtaining, by a data provider, first encrypted data associated with first plaintext data, a first key used to decrypt the first encrypted data, and authorization information about the first plaintext data, wherein the authorization information includes at least one code hash value corresponding to at least one program allowed to use the first plaintext data and at least one piece of access permission information corresponding to the at least one code hash value, and wherein the access permission information is applicable to a calculation result of a corresponding program;
sending a verification request from the data provider to a data manager, the data manager including a first trusted execution environment;
receiving, by the data provider and from the data manager, authentication information generated by the first trusted execution environment;
performing, by the data provider, verification of the first trusted execution environment based on the authentication information;
responsive to a success of the verification, securely transmitting the first key and the authorization information from the data provider to the first trusted execution environment; and
causing the first encrypted data to be provided to the data manager.

US Pat. No. 11,037,143

PLATFORM FOR ATOMIC TRANSFER OF SMART ASSETS WITHIN BLOCKCHAIN NETWORKS

Advanced New Technologies...

1. A computer-implemented method for transfer of a smart asset in a blockchain network, the method being executed by one or more processors and comprising:generating, from a real-world asset, a smart asset within a blockchain network, the smart asset being representative of the real-world asset, wherein the blockchain network is a consortium blockchain network;
receiving a transfer request from a member of the consortium blockchain network comprising a first identifier of a first node within the blockchain network sending the transfer request, the first node being hosted by a first interface layer for a first transaction management system of a first member of the blockchain network, a second identifier of a second node within the blockchain network receiving the transfer request, the second node being hosted by a second interface layer for a second transaction management system of a second member of the blockchain network, a unique identifier [IA] assigned to the smart asset within the blockchain network comprising address information associated with a database, a type identifier associated with the smart asset within the blockchain network identifying a type of the smart asset, and a transfer request value amount of the smart asset for transfer from the first node to the second node within the blockchain network, wherein the smart asset is a data object comprising multiple fields including a field storing an original value amount of the smart asset, the smart asset is associated with a computer-executable smart contract deployed within the blockchain network, and the first interface layer and the second interface layer each provide a communication connection between their respective transaction management systems and the blockchain network;
determining, by executing the computer-executable smart contract, that the smart asset is capable of transfer from the first node to the second node within the blockchain network at least partially based on the unique identifier of the smart asset, the transfer request value amount, and that the type identifier of the smart asset is a type that can be divided;
in response to determining that the smart asset is capable of being transferred, transferring, by further executing the computer-executable smart contract, the smart asset from the first node to the second node within the blockchain network by:
generating, by division of the smart asset, a first smart asset of the smart asset and a second smart asset of the smart asset, wherein the first smart asset being assigned a first identifier, a first smart asset value representing a remainder of the original value amount of the smart asset less the transfer request value amount, and properties of the smart asset, and the second smart asset being assigned a second identifier, the transfer request value amount, and the properties of the smart asset,
recording the first smart asset to the first node within the blockchain network and the second smart asset to the second node within the blockchain network,
upon recording the first smart asset to the first node within the blockchain network and the second smart asset to the second node within the blockchain network, removing the smart asset from within the blockchain network;
determining, upon receiving an automatic merger request after the second smart asset has been recorded to the second node, that the second smart asset is capable of merging with a third asset associated with a third node within the blockchain network based on the second identifier of the second smart asset and a third identifier of the third asset; and
in response to determining that the second smart asset is capable of merging with the third asset, merging the second smart asset with the third asset at the third node within the blockchain network.

US Pat. No. 11,038,695

MANAGING BLOCKCHAIN-BASED CENTRALIZED LEDGER SYSTEMS

Advanced New Technologies...

1. A computer-implemented method for managing a blockchain-based centralized ledger system, the computer-implemented method comprising:receiving a trust timestamp and an associated signature from a trust time server by a centralized ledger server in the centralized ledger system, the trust time server being associated with a trust time authority and independent from the centralized ledger system, the centralized ledger system storing data in a plurality of data blockchains, each of the plurality of data blockchains comprising a plurality of data blocks storing transaction data;
storing the trust timestamp and the associated signature from the trust time server in a centralized trust timestamp blockchain by the centralized ledger server, the centralized trust timestamp blockchain comprising a plurality of timestamp blocks storing trust timestamp information of the trust time server for the centralized ledger system; and
maintaining the centralized trust timestamp blockchain by the centralized ledger server, wherein the centralized ledger server is configured to sequentially store trust timestamps and associated signatures received from the trust time server in respective timestamp blocks according to a chronological order of receiving the trust timestamps and associated signatures from the trust time server.

US Pat. No. 11,038,699

METHOD AND APPARATUS FOR PERFORMING MULTI-PARTY SECURE COMPUTING BASED-ON ISSUING CERTIFICATE

Advanced New Technologies...

1. A computer-implemented method for authentication, comprising:receiving, from a first trusted computing unit included in a plurality of trusted computing units performing a distributed computing process, a certificate request, wherein the certificate request comprises a group identifier of a group of computing tasks to be performed by the plurality of trusted computing units during the distributed computing process, authentication information, and a hash value of programming instructions associated with a first computing task of the group of computing tasks;
authenticating the first trusted computing unit based on the authentication information;
in response to authenticating the first trusted computing unit determining, based on the hash value, that that the first computing task is included in the group of computing tasks;
obtaining a certificate chain and a private key, wherein the private key is pre-generated for the group of computing tasks, wherein the certificate chain comprises a root certificate and a corresponding public key certificate, and wherein the corresponding public key certificate and the private key form a certificate pair,
wherein the corresponding public key certificate comprises a first public key generated for the group of computing tasks and a first signature of a trusted certificate generator, and wherein the first public key and the private key form an asymmetric key pair; and
sending a certificate report to the first trusted computing unit, wherein the certificate report comprises the root certificate and the certificate pair.

US Pat. No. 11,038,700

DISTRIBUTED KEY MANAGEMENT FOR TRUSTED EXECUTION ENVIRONMENTS

Advanced New Technologies...

1. A computer-implemented method for verifying authenticity of trusted execution environments (TEEs), the method comprising:determining, by a key management center, that a trust relationship has been established among multiple knowledge management (KM) trusted execution environments (TEEs) based on a successful completion of a mutual attestation process by the KM TEEs;
after determining that the trust relationship has been established among the multiple KM TEEs, determining, by the key management center, that the KM TEEs have reached a consensus based on a successful completion of a consensus process by the KM TEEs;
after determining that the KM TEEs have reached the consensus, determining, by the key management center, to transmit one or more encryption keys that are specified by the consensus to a particular service TEE based on a successful completion of a local attestation process by a particular KM TEE that is implemented on a same blockchain node as the particular service TEE; and
after determining to transmit the one or more encryption keys that are specified by the consensus to the particular service TEE, transmitting, by the key management center, the one or more encryption keys that are specified by the consensus to the particular service TEE that is implemented on the same blockchain node as the particular KM TEE.

US Pat. No. 11,039,217

COMPUTERIZED SYSTEM AND METHOD FOR PUSHING INFORMATION BETWEEN DEVICES

Advanced New Technologies...

1. A method comprising:displaying, on a display connected to a smart device, a two-dimensional (2D) code, said display enabling a mobile terminal device to scan the displayed 2D code;
receiving, at the smart device, an identifier (ID) associated with the mobile terminal device when the mobile terminal scans the 2D code, the ID comprising network connection information of the mobile terminal device;
transmitting, by the smart device, the ID to a content provider;
receiving, via the smart device, content to render on the smart device from the content provider, said content associated with the ID and comprising media content and push information, said push information comprising a push time representing a time point in the media content and digital item information associated with a digital item appearing in the media content at said push time;
detecting, by the smart device during playback of the media content on the smart device, that a current playback position of the media content equals the push time;
establishing, via the smart device, a network connection with the mobile terminal device using the ID at said push time; and
communicating, by the smart device, the digital item information to the mobile terminal device using the network connection, said communication causing the mobile terminal device to display the digital item information in a mobile application executing on the mobile terminal when the digital item appears in the media content displayed on the smart device, while the smart device plays the media content.

US Pat. No. 11,037,469

COPYRIGHT PROTECTION BASED ON HIDDEN COPYRIGHT INFORMATION

Advanced New Technologies...

1. A computer-implemented method for hiding copyright information in printable materials, the method comprising:generating, by a computing device, a unique identifier (ID) based on copyright information associated with digital content, wherein the copyright information and the digital content are recorded on a blockchain of a blockchain network, and wherein the copyright information comprises one or more of a change in copyright ownership associated with the digital content, a modification to the digital content, an update to the digital content, and a change in licensing associated with the digital content;
determining, by the computing device, one or more features associated with one or more printable materials; and
converting, by the computing device, the unique ID to a digital watermark based on the one or more features; and
printing, to the one or more printable materials, a printed version of the digital content, including printing the digital watermark, the printed digital watermark not being apparent to an unaided human eye, wherein the printed digital watermark enables retrieval of the copyright information from the blockchain based on the unique ID.

US Pat. No. 11,036,967

METHOD AND DEVICE FOR FACE SELECTION, RECOGNITION AND COMPARISON

ADVANCED NEW TECHNOLOGIES...

1. A method for selecting a target face, comprising:obtaining at least one facial area including multiple faces in an image taken by a camera;
determining, based on the image, a spatial distance between each of the multiple faces and the camera, wherein the spatial distance comprises a first dimension distance and a second dimension distance;
selecting faces having the smallest and the second smallest first dimension distances from the multiple faces as two candidate faces;
determining a difference in the first dimension distances of the two candidate faces;
in response to the difference being greater than a first threshold, selecting the face having the smallest first dimension distance from the two candidate faces as the target face; and
in response to the difference being not greater than the first threshold, selecting a face having the smallest second dimension distance from the two candidate faces as the target face.

US Pat. No. 11,036,720

BLOCKCHAIN-BASED HIERARCHICAL DATA STORAGE

Advanced New Technologies...

1. A blockchain-based hierarchical storage method comprising:determining target data storage of a storage level in a database satisfies a data migration condition, wherein the database comprises multi-level storage, wherein the database is a Merkle tree that stores account state data of a blockchain in key-value pairs, and wherein each key of the key-value pairs comprises a node identifier (ID) of a data node and a block number;
responsive to determining the target data storage in the database satisfies the data migration condition, determining a block number interval, wherein the block number interval comprises two or more numbers representing two or more blocks of the blockchain that are to be migrated;
determining a migration threshold based on an endpoint of the block number interval, wherein the migration threshold is a block number of the blockchain;
traversing one or more key-value pairs of the target data storage to identify a target data node associated with a block number smaller than the migration threshold;
traversing the target data storage to determine that the target data storage comprises a second data node having the same node ID as that of the target data node, wherein the second data node comprises a block number greater than a block number of the target data node and smaller than the migration threshold; and
in response to determining that the target data storage comprises the second data node, migrating the target data node to a lower level of storage.

US Pat. No. 11,036,721

FACILITATING PRACTICAL BYZANTINE FAULT TOLERANCE BLOCKCHAIN CONSENSUS AND NODE SYNCHRONIZATION

Advanced New Technologies...

1. A computer-implemented method for facilitating a consensus process in a blockchain network based on practical Byzantine fault tolerance (PBFT), comprising:setting, by a first consensus node, a first timer that initiates a view change upon expiration;
setting, by the first consensus node, a second timer that expires before the first timer;
in response to the second timer expiring, sending, to a second consensus node, a request for one or more missing consensus messages, wherein the one or more missing consensus messages were previously transmitted to the first consensus node, but not received by the first consensus node;
receiving, from the second consensus node, the one or more missing consensus messages each digitally signed by a private key of a corresponding consensus node that generates the one or more missing consensus messages;
combining the one or more missing consensus messages with one or more received consensus messages to create a set of consensus messages; and
determining that a block of transactions is valid, if a quantity of commit messages included in the set of consensus messages is greater than or equal to 2f+1, where f is a maximum number of faulty nodes that is tolerable by the blockchain network based on PBFT, and wherein n is a total number of consensus nodes in the blockchain network and f is a largest integer less than or equal to (n?1)/3.

US Pat. No. 11,032,057

BLOCKCHAIN TRANSACTION SPEEDS USING GLOBAL ACCELERATION NODES

Advanced New Technologies...

1. A computer-implemented method, comprising:providing, in a blockchain transaction acceleration system, access to a multiple blockchain acceleration network accessible to a plurality of blockchains;
receiving, at a first acceleration node of the multiple blockchain acceleration network and from a first node in a first blockchain of the plurality of blockchains, a transaction to be forwarded, wherein a transaction delivery time using the first acceleration node is expected to be faster than a transaction delivery time that is expected by sending the transaction directly to an intended recipient of the transaction; and
forwarding, by the first acceleration node, the transaction to a second node.

US Pat. No. 11,032,077

BLOCKCHAIN-BASED TRANSACTION METHOD AND APPARATUS, AND REMITTER DEVICE

Advanced New Technologies...

1. A blockchain-based transaction method, comprising:calculating a transaction amount commitment based on a commitment random number and a transaction amount involving a remitter account and a remitter account with respect to a blockchain;
obtaining a first commitment random number ciphertext and a first transaction amount ciphertext by encrypting the commitment random number and the transaction amount separately based on a homomorphic encryption public key of the remitter account using a homomorphic encryption algorithm;
obtaining a second commitment random number ciphertext and a second transaction amount ciphertext by encrypting the commitment random number and the transaction amount separately based on a homomorphic encryption public key of the remittee account using the homomorphic encryption algorithm; and
submitting transaction data to the blockchain, the transaction data including the transaction amount commitment, the first commitment random number ciphertext, the first transaction amount ciphertext, the second commitment random number ciphertext, and the second transaction amount ciphertext, for the transaction amount commitment, the first commitment random number ciphertext, and the first transaction amount ciphertext to be recorded into the remitter account, and the transaction amount commitment, the second commitment random number ciphertext, and the second transaction amount ciphertext to be recorded into the remittee account.

US Pat. No. 11,032,082

METHOD AND SYSTEM OF STORING RECORD OF COPYRIGHT EVENT IN BLOCKCHAIN THROUGH AGENT

Advanced New Technologies...

1. A method, comprising:constructing a consortium blockchain network through acts including:
invoking, by a to-be-connected node, a smart contract;
determining, by the to-be-connected node, through the smart contract, whether a member node exists in the consortium blockchain network;
in response to no member node existing in the consortium blockchain network, activating, by the to-be-connected node, a membership right of the to-be-connected node through the smart contract to become a member node of the consortium blockchain network;
in response to at least one member node existing in the consortium blockchain network, sending, by the to-be-connected node, a connection request to the at least one existing member node in the consortium blockchain network by using the smart contract;
invoking, by each of the at least one existing member node in the consortium blockchain network, the smart contract, to determine, through the smart contract, whether a connection condition in the smart contract is satisfied with respect to the to-be-connected node; and
in response to determining, through the smart contract, that each of the at least one existing member node reaches a consensus that the connection condition is satisfied, activating, by the to-be-connected node, the membership right of the to-be-connected node to become a member node of the consortium blockchain network;
receiving, by a target agenting member node of the consortium blockchain network, a copyright event record-storing request initiated by a target non-member node corresponding to the target agenting member node for storing a record for a target copyright event on a blockchain, the target copyright event being generated based on a work-related service on a work of authorship performed by a server of a work service provider that controls the target non-member node;
constructing a copyright event-related transaction based on the copyright event record-storing request;
broadcasting the copyright event-related transaction to the consortium blockchain network for each member node to add the copyright event-related transaction to a respective copy of the blockchain based on a consensus mechanism of the consortium blockchain network; and
adding the copyright event-related transaction to a copy of the blockchain of the target agenting member node.

US Pat. No. 11,017,056

ABNORMAL DATA DETECTION

Advanced New Technologies...

1. A computer-implemented method, comprising:obtaining, by a data processing platform and from a second data platform, a to-be-validated data group including to-be-validated data corresponding to a predetermined feature, wherein the second data platform collects initial data and modifies the initial data by an encryption process that encrypts the initial data to generate the to-be-validated data;
performing, by the data processing platform, a data preprocessing operation on the to-be-validated data group, comprising
dividing the to-be-validated data group into a plurality of to-be-validated sub data groups each having a smaller size than that of the to-be-validated data group, and using one of the to-be-validated sub data group as the to-be-validated data group, or
transforming data in the to-be-validated data group to have a predefined distribution by performing a corresponding data transformation on the data based on a distribution feature of the data;
obtaining, by the data processing platform, a comparison data group including historical data associated with the to-be-validated data group, wherein the historical data and the to-be-validated data are from a same data source;
performing, by the data processing platform, a two-group significance test on the to-be-validated data group and the comparison data group to generate a test result that is indicative of a degree of difference between the to-be-validated data group and the comparison data group;
determining, by the data processing platform, that there is abnormal data in the to-be-validated data group based on the test result;
in response, dividing, by the data processing platform and according to a predetermined data division rule, the to-be-validated data group into a plurality of to-be-validated sub data groups;
performing, by the data processing platform, the two-group significance test on each to-be-validated sub data group of the plurality of to-be-validated sub data groups and the comparison data group to generate new test results; and
determining, by the data processing platform, whether each to-be-validated sub data group includes abnormal data based on the new test results.

US Pat. No. 11,016,293

VIRTUAL REALITY HEAD-MOUNTED APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A virtual reality (VR) head-mounted apparatus, comprising:an apparatus body;
a convex lens; and
an electronic device, the convex lens located between the electronic device and a user, wherein the apparatus body comprises an accommodating space and a plurality of heat dissipating channels each having a non-straight-line structure, the electronic device is placed in the accommodating space, and each of the plurality of heat dissipating channels has a first end in connection with the accommodating space and a second end in connection with an exterior of the apparatus body, wherein the plurality of heat dissipating channels are formed on a top and a bottom of the apparatus body and each of the heat dissipating channels has an empty interior, with the first ends of the heat dissipating channels located between the convex lens and the electronic device,
wherein the plurality of heat dissipating channels each include a plurality of straight channel sections including a first straight channel section and a last straight channel section, the plurality of straight channel sections each having straight sidewalls along a propagation direction of a corresponding straight channel section, and serially connected with one another at an angle, the first straight channel section having the first end, the last straight channel section having the second end, and there being no direct straight pathway between the first end and the second end.

US Pat. No. 11,017,061

IDENTIFYING COPYRIGHTED MATERIAL USING COPYRIGHT INFORMATION EMBEDDED IN ELECTRONIC FILES

Advanced New Technologies...

1. A computer-implemented method for embedding copyright information in one or more pages for presenting digital content, the method comprising:storing, by a computing device, in a blockchain transaction of a blockchain of a blockchain network, copyright information associated with digital content, wherein the copyright information includes at least a portion of the digital content, identity information of a copyright holder of the digital content, or a combination thereof;
storing, in the blockchain transaction, by the computing device, an association between the blockchain transaction and a chain-of-records of one or more other blockchain transactions, the chain-of-records providing a history of updates associated with the digital content;
generating, by the computing device, a unique identifier (ID) that points to the blockchain transaction, wherein the unique ID is generated based on the copyright information, and wherein the digital content is recorded on the blockchain
identifying, by the computing device, one or more visual attributes associated with a page design of one or more blank pages of an electronic file, wherein the one or more visual attributes associated with the page design include one or more of color, texture, pattern, theme, and border style, and
wherein the one or more blank pages comprise a blank text page, a blank slide presentation page, a blank spreadsheet page, or a combination thereof;
embedding, by the computing device, the unique ID in the one or more blank pages by changing the one or more visual attributes to be representative of the unique ID, wherein the embedding produces one or more unique ID-embedded pages that each enables retrieval of the copyright information from the blockchain based on the unique ID pointing to the blockchain transaction, and wherein there is a difference between the one or more blank pages and the one or more unique ID-embedded pages;
allocating, by the computing device, the digital content to at least one of the one or more unique ID-embedded pages, to produce one or more unique ID-embedded pages allocated with the digital content; and
distributing, by the computing device, the one or more unique ID-embedded pages allocated with the digital content to the blockchain network.

US Pat. No. 11,016,809

RESOURCE LOADING AND A SERVICE FUNCTION FOR A SOFTWARE APPLICATION

Advanced New Technologies...

1. A computer-implemented method, comprising:loading a foundation framework resource that provides a running environment for implementing a first service function of a plurality of service functions included in a software application, wherein an operating system running the software application loads service resources needed for starting the first service function, wherein the service resources include a page resource and the foundation framework resource, wherein the foundation framework resource provides the running environment for implementing the first service function, and wherein the foundation framework resource is a library for creating a plurality of software applications including the software application;
receiving, after the loading of the foundation framework resource, a service request for starting the first service function in the software application;
loading the page resource required by the first service function; and
implementing the first service function based on a loaded running environment and the page resource.

US Pat. No. 11,017,065

AUTHORITY REVOKING METHOD AND DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by an authorizing party and from an application, a plurality of first access requests to a service provided by the authorizing party, wherein the plurality of first access requests correspond to a plurality of users;
determining, by the authorizing party, that the plurality of first access requests are granted;
issuing, by the authorizing party and to the application, a plurality of tokens;
storing, by the authorizing party, a plurality of authorization records that correspond to the plurality of tokens, wherein each authorization record includes a validation date of the authorization record;
determining, by the authorizing party, an authorization record set that needs to be revoked, wherein the authorization record set comprises the plurality of authorization records;
modifying a time validity attribute value of the authorization record set to revoke authorization records in the authorization record set in batches, comprising:
determining a latest authorization validation date associated with the authorization records in the authorization record set that needs to be revoked;
determining a next earliest authorization validation date associated with the authorization records in the authorization record set that needs to be revoked; and
setting the time validity attribute value to a future date, wherein the future date is set to a range between the latest authorization validation date and the next earliest authorization validation date;
receiving a second access request from the application for accessing the service provided by the authorizing party, wherein the second access request corresponds to a particular user among the plurality of users;
determining, by the authorizing party, a particular authorization record to be verified that corresponds to the particular user;
obtaining, the validation date of the authorization record to be verified;
obtaining, the time validity attribute value of the authorization record set that includes the particular authorization record to be verified;
determining that the particular authorization record to be verified is revoked if the validation date of the authorization record is earlier than the time validity attribute value of the authorization record set; and
in response, rejecting the second access request from the application for accessing the service.

US Pat. No. 11,018,878

DIGITAL CERTIFICATE MANAGEMENT METHOD, APPARATUS, AND SYSTEM

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving a transaction request including a digital certificate at a node in a blockchain network, wherein the transaction request is a request to write the digital certificate into a blockchain associated with the blockchain network, and wherein the digital certificate is issued to the node in the blockchain network;
determining a consensus verification result for the transaction request, wherein the consensus verification result is produced by nodes in the blockchain network; and
storing, based on the consensus verification result, the digital certificate in the blockchain associated with the blockchain network.

US Pat. No. 11,019,180

GOODS ORDER PROCESSING METHOD AND APPARATUS, SERVER, SHOPPING TERMINAL, AND SYSTEM

Advanced New Technologies...

1. A computer-implemented method for processing an order of goods, comprising:receiving a notification of a user engaging a client device;
in response to receiving the notification, associating a user ID of the user with the client device;
receiving at least one associated image uploaded by the client device, wherein the at least one associated image is obtained in response to detecting, by the client device based on an image recognition method, an occurrence of a change of goods in a storage container;
identifying, based on the at least one associated image, difference information pertaining to a difference in the goods in the storage container;
in response to determining that a goods in the at least one associated image fails to be identified, generating an operation task for a detection failure of the at least one associated image, wherein the operation task comprises the user ID;
placing the operation task in a task scheduling queue;
retrieving the user ID from the operation task;
determining, from a plurality of network cashiers in a network cashier list, that a network cashier of the plurality of network cashiers is associated with the user ID;
in response to determining that the network cashier of the plurality of network cashiers is associated with the user ID, pushing the operation task in the task scheduling queue to a cashier node associated with the network cashier, wherein the network cashier list records task operation statuses of cashier nodes;
generating, using the difference information, corresponding goods order change information;
updating user order information corresponding to the client device based on the goods order change information; and
sending updated user order information to the client device.

US Pat. No. 11,017,392

METHOD, APPARATUS AND ELECTRONIC DEVICE FOR BLOCKCHAIN TRANSACTIONS

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:determining, by invoking a smart contract at a first computing device of a remitter, a remittance path involving some of a plurality of blockchain nodes of a blockchain computer network, wherein the remittance path effectuates a remittance transaction from the remitter to a receiver through a relay party, each of the remitter, receiver, and relay party corresponds to one of the some blockchain nodes, and the smart contract is stored in a blockchain that is on the blockchain computer network;
determining, at the first computing device, based on the remittance path and a remittance fee charged by the relay party, a first transaction amount to be remitted from a blockchain account of the remitter to a blockchain account of the relay party, and a second transaction amount to be remitted from the blockchain account of the relay party to a blockchain account of the receiver, the remittance fee being less than or equal to a difference between the first transaction amount and the second transaction amount, and the blockchain accounts of the remitter, relay party, and receiver corresponding to the blockchain computer network;
generating, at the first computing device, a first ciphertext of the first transaction amount by applying a homomorphic encryption algorithm to the first transaction amount according to a first random number;
generating, at the first computing device, a second ciphertext of the second transaction amount by applying the homomorphic encryption algorithm to the second transaction amount according to a second random number;
sending, at the first computing device, based on the remittance path via a first non-blockchain computer network, to a second computing device of the relay party, the first transaction amount, the first random number, the first ciphertext, the second transaction amount, the second random number, and the second ciphertext;
receiving, at the first computing device via the first non-blockchain computer network from the second computing device, a third ciphertext of a blockchain account address corresponding to the blockchain account of the relay party, and a first digital signature corresponding to the relay party and indicating that the relay party endorses the first ciphertext, the second ciphertext, and the third ciphertext, wherein the first digital signature is generated by a computing device associated with the relay party using a first temporary private key;
sending, at the first computing device, based on the remittance path via a second non-blockchain computer network, to a third computing device of the receiver, the second transaction amount, the second random number, and the second ciphertext;
receiving, at the first computing device via the second non-blockchain computer network from the third computing device, a fourth ciphertext of a blockchain account address corresponding to the blockchain account of the receiver, and a second digital signature corresponding to the receiver and indicating that the receiver endorses the second ciphertext and the fourth ciphertext, wherein the second digital signature is generated by a computing device associated with the receiver using a second temporary private key, wherein the first and second temporary private keys are generated by blockchain nodes of the blockchain for the remittance transaction;
generating, at the first computing device, a fifth ciphertext of a blockchain address of the blockchain account of the remitter by applying the homomorphic encryption algorithm to the blockchain address according to a third random number;
generating, at the first computing device, a consolidated blockchain transaction comprising: the first ciphertext, the second ciphertext, the third ciphertext, the fourth ciphertext, the fifth ciphertext, the first digital signature, and the second digital signature; and
submitting for verification, at the first computing device, the consolidated blockchain transaction to one or more nodes of the blockchain computer network.

US Pat. No. 11,017,451

INFORMATION RECOMMENDATION BASED ON RULE MATCHING

Advanced New Technologies...

1. A computer-implemented method comprising:retrieving, by one or more processors of an information recommendation client and from a first server, text data provided by a user as chat content in a graphical user interface of a chat application and transmitted to the first server by the chat application to be processed before receiving a user input that is configured to transmit the text data to a member of a chat group, and wherein the text data is prefiltered based on a feature of a recommendation information before receiving the user input that is configured to transmit the text data to the member of the chat group;
processing, by the one or more processors of the information recommendation client, the text data to determine a plurality of keywords and a subject, wherein each of the plurality of keywords comprises a noun;
retrieving, by the one or more processors of the information recommendation client, an information recommendation rule set corresponding to the subject, wherein the information recommendation rule set comprises a plurality of rules;
determining, by the one or more processors of the information recommendation client, for each of the plurality of rules a relevance score defined based a score and a weight corresponding to the plurality of keywords and the subject of the text data;
selecting, by the one or more processors of the information recommendation client, an information recommendation rule from the plurality of rules based on ranking the plurality of rules using the relevance score of each of the plurality of rules;
in response to selecting the information recommendation rule matching the text data, retrieving, by the one or more processors of the information recommendation client, the recommendation information from a second server;
transmitting, by the one or more processors of the information recommendation client, a recommendation based on the recommendation information to the graphical user interface of the chat application; and
displaying, by the graphical user interface of the chat application, the recommendation for the user of the chat group.

US Pat. No. 11,016,961

BLOCKCHAIN-BASED SMART CONTRACT INVOCATION METHOD AND APPARATUS, AND ELECTRONIC DEVICE

Advanced New Technologies...

1. A computer-implemented method for invocating a smart contract, comprising:receiving a target transaction that is used to initiate an invocation of the smart contract, wherein the target transaction comprises invocation data, wherein the invocation data comprises a data digest associated with target data, wherein the target data is stored in a third-party storage system interconnected with a first blockchain, and wherein the third-party storage system is a second blockchain that has a cross-chain data reference relationship that maps a relationship between the data digest and the target data;
querying the target data associated with the data digest from the third-party storage system with a query request, wherein the query request comprises a block number identifying a block of the second blockchain that stores the target data;
receiving a query result returned by the second blockchain, wherein the query result comprises the target data;
performing a content verification on the target data;
determining that the content verification on the target data succeeds;
in response to determining that the content verification on the target data succeeds, invoking the smart contract to perform a smart contract computation on the target data and the invocation data included in the target transaction; and
storing a computation result from the smart contract computation in a distributed database associated with the first blockchain after the smart contract computation is completed.

US Pat. No. 10,997,443

USER IDENTITY VERIFICATION METHOD, APPARATUS AND SYSTEM

ADVANCED NEW TECHNOLOGIES...

1. A non-transitory computer readable storage medium configured with instructions executable by one or more processors to cause the one or more processors to perform operations comprising:receiving a facial quality score threshold and a number of eye-print collection steps;
obtaining a facial image of a user based on the received facial quality score threshold;
obtaining one or more eye-print pair images of the user, a number of the obtained one or more eye-print pair images corresponding to the received number of eye-print collection steps; and
sending the facial image and the one or more eye-print pair images to a server to perform identity verification of the user.

US Pat. No. 10,999,283

ADDRESSING TRANSACTION CONFLICT IN BLOCKCHAIN SYSTEMS

Advanced New Technologies...

1. A computer-implemented method, comprising:applying for permission to submit first transaction data to a blockchain maintained by a blockchain node by sending a first token acquisition request by a blockchain client to the blockchain node, wherein the blockchain node is configured to communicate with the blockchain client and a second blockchain client, the blockchain client and the second blockchain client shares an institution account in the blockchain, and the first token acquisition request indicates a first location of a first data block in the blockchain to submit the first transaction data;
receiving a commit token fed back from the blockchain node by the blockchain client, wherein the commit token is allocated by the blockchain node based on a smart contract deployed on the blockchain and the commit token indicates that the blockchain client has permission to submit the first transaction data to the first data block in the blockchain;
sending the first transaction data by the blockchain client to the blockchain node;
applying for permission to submit second transaction data to the blockchain by sending a second token acquisition request by the blockchain client to the blockchain node, wherein the second token acquisition request indicates a second location of a second data block in the blockchain to submit the second transaction data; and
receiving, by the blockchain client, failure information fed back from the blockchain node based on the smart contract, wherein the failure information indicates that the blockchain client has no permission to submit the second transaction data to the second data block in the blockchain, wherein the blockchain client refrains from sending the second transaction data to the blockchain node based on the failure information.

US Pat. No. 10,999,075

BLOCKCHAIN-BASED PATROL INSPECTION PROOF STORAGE METHOD, APPARATUS, AND ELECTRONIC DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for blockchain-based storage of patrol inspection proof, comprising:receiving, by a mobile terminal, an attendance recording instruction to record attendance of a patrol inspection;
synchronously obtaining, by the mobile terminal, (1) biometric recognition information of a patrol inspection person conducting a patrol inspection, (2) proof information of a labeled position at a patrol inspection site, and (3) one or more operating environment parameters of the mobile terminal at a time of the patrol inspection, wherein the one or more operating environment parameters comprises sensor data of the mobile terminal;
receiving, by a server from the mobile terminal, the obtained proof information, the obtained biometric recognition information, and the obtained one or more operating environment parameters;
performing, by the server, credibility verification on the patrol inspection by:
verifying the proof information and the one or more operating environment parameters using an algorithm model based on labeled identification information, labeled operating environment parameters, and historical attendance information stored in a blockchain;
verifying the biometric recognition information according to pre-stored biometric recognition information and the one or more operating environment parameters; and
verifying that the biometric recognition information is obtained by the mobile terminal synchronously with the proof information; and
in response to the credibility verification being successful, uploading, by the server, verification information associated with the proof information, the biometric recognition information, and the one or more operating environment parameters for storing in the blockchain.

US Pat. No. 10,997,808

SECURE SMART UNLOCKING

Advanced New Technologies...

1. A computer-implemented method comprising:obtaining, by a smart door lock server, an application request sent by a user mobile device, wherein the application request comprises user identity information and a user public key;
generating, by the smart door lock server, a digital key seed corresponding to the user identity information and the user public key of the application request, including:
obtaining, by the smart door lock server, a server private key,
generating, by the smart door lock server, to-be-signed data, wherein the to-be-signed data comprises second check data and a dynamic parameter related to the user identity information and the user public key,
generating, by the smart door lock server, a digital signature by signing the to-be-signed data using the server private key, and
generating, by the smart door lock server, the digital key seed based on the digital signature and the to-be-signed data; and
sending the digital key seed to the user mobile device, wherein the user mobile device generates a digital key based on the digital key seed and first check data corresponding to a current unlocking operation, and sends the digital key to a smart door lock, and the smart door lock performs verification on the digital key seed and the first check data in the digital key, and performs unlocking after the verification succeeds.

US Pat. No. 10,999,386

METHODS, APPARATUS, AND SYSTEMS FOR SENDING INFORMATION

Advanced New Technologies...

1. An information sending method performed by an apparatus, the method comprising:determining, by the apparatus, an interaction setting between a first terminal device and a second terminal device;
determining a relational score based on the interaction setting between the first terminal device and the second terminal device, the second terminal device being one or more second terminal devices;
determining a service index of the first terminal device based on the relational score;
determining information to send based on the service index; and
sending the determined information to the first terminal device.

US Pat. No. 10,997,384

SERVICE PROCESS STARTING METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A device, comprising:one or more processors; and
one or more non-transitory computer-readable mediums coupled to the one or more processors and configured with instructions executable by the one or more processors to perform operations, comprising:
scanning a barcode to obtain barcode information and an image of text associated with the barcode, the image of text specifying an operation function;
determining, based on the barcode information, an address of a server;
recognizing the image of text to determine text content;
sending to the server according to the address of the server an operation request message comprising the text content, for the server to determine operation access information according to a correspondence relationship between the text content and the operation access information;
receiving the operation access information from the server; and
starting an operation process by using the operation access information received from the server, the operation process having the operation function specified by the image of text.

US Pat. No. 10,997,651

METHOD AND APPARATUS FOR OFFLINE INTERACTION BASED ON AUGMENTED REALITY

Advanced New Technologies...

1. A computer-implemented method for providing virtual resource information to an augmented reality (AR) client device, the method comprising:providing, by the AR client device of a user to an AR server, consumption data of the user at a real-world target place;
computing, by the AR server, a first quantity of virtual resources corresponding to a consumption amount represented in the consumption data of the user;
updating, by the AR server, virtual data maintained by the AR server for the real-world target place including adding the first quantity of virtual resources corresponding to the consumption amount to an overall quantity of virtual resources for the real-world target place to generate an updated overall quantity of virtual resources contributed by a plurality of users to a virtual resource pool maintained by the AR server for the real-world target place, the plurality of users including the user of the AR client device and a plurality of other users;
obtaining, by the AR client device, an image of the real-world target place;
performing, by the AR client device, an image scanning operation on the image of the real-world target place;
determining, by the AR client device, an identifier of the real-world target place based on the image scanning operation;
providing, by the AR client device to the AR server over a network, the determined identifier of the real-world target place;
obtaining, by the AR server from the virtual data maintained by the AR server for the real-world target place and based on the determined identifier of the real-world target place, the updated overall quantity of virtual resources contributed by the plurality of users including the user of the AR client device and the plurality of other users to the virtual resource pool maintained by the AR server for the real-world target place;
delivering, from the AR server to the AR client device, virtual data representing the updated overall quantity of virtual resources contributed by the plurality of users to the virtual resource pool maintained by the AR server for the real-world target place; and
displaying, by the AR client device, a graphical representation of the delivered virtual data representing the updated overall quantity of virtual resources contributed by the plurality of users to the virtual resource pool maintained by the AR server for the real-world target place, including overlaying and combining one or more elements of the delivered virtual data with image information of the image of the real-world target place corresponding to the identifier determined from the image of the real-world target place.

US Pat. No. 10,990,813

METHOD AND APPARATUS FOR RECOGNIZING ILLEGAL BEHAVIOR IN UNATTENDED SCENARIO

ADVANCED NEW TECHNOLOGIES...

1. A device for recognizing an unauthorized object damaging behavior, comprising:one or more processors; and
a non-transitory computer-readable memory coupled to the one or more processors and configured with instructions executable by the one or more processors to perform operations comprising:
obtaining body position data of a user;
obtaining limb behavior data of the user;
obtaining feature data of an object, the feature data comprising:
position data of the object, and
vibration data of the object;
comparing the limb behavior data with a preset limb movement pattern;
determining whether the object vibrates based on the vibration data;
determining a distance between the user's body and the object based on the body position data of the user and the position data of the object; and
determining that behavior of the user is unauthorized in response to determining that:
the distance between the user's body and the object is within a distance threshold over a preset length of time,
the limb behavior data matches the preset limb movement pattern, and
the object vibrates.

US Pat. No. 10,989,559

METHODS, SYSTEMS, AND DEVICES FOR DISPLAYING MAPS

Advanced New Technologies...

1. A computer-implemented method executed by one or more processors, the method comprising:receiving, by a mobile device, user input selecting a current location within a map displayed on a screen of the mobile device, the user input comprising a user press and hold operation to request a location relationship between a selected current location and a target location;
generating, by the mobile device, a request message indicating a request for the location relationship between the selected current location and the target location, the request message comprising an identifier of the current location, the target location being a location currently or previously displayed on the map;
transmitting, by the mobile device, the request message to a map server configured to determine a geographical location of the current location and a geographical location of the target location;
receiving, by the mobile device and from the map server, the location relationship between the current location and the target location, wherein the location relationship is determined based on the identifier of the current location and the geographical location of the target location;
detecting, by the mobile device, a predetermined operation used to trigger a request for a modification from a first map view that displays the current location and a graphical indicator, to a second map view corresponding to the target location, wherein the modification comprises a repositioning of the first map view; and
in response to detecting the predetermined operation, displaying, by the mobile device, the second map view corresponding to the target location and the graphical indicator representing the location relationship between the target location and the current location of the user press and hold operation, the graphical indicator comprising an indicator line and a distance value that are determined based on the location relationship, the indicator line comprising a straight line connecting a representation of the current location to a representation of the target location and a plurality of coverage circles between the current location and the target location based on the distance value, the distance value representing a distance between the current location and the target location depicted by the indicator line.

US Pat. No. 10,990,353

ADDRESS INFORMATION-BASED ACCOUNT MAPPING METHOD AND APPARATUS

Advanced New Technologies...

1. A computer-implemented method, comprising:identifying, by a server associated with a first service provider, a plurality of items of first physical address information, wherein each item of first physical address information is identified from a corresponding item of first account information provided by the first service provider;
identifying, by the server, a plurality of items of second physical address information, wherein each item of second physical address information is identified from a corresponding item of second account information provided by a second service provider to the first service provider; and
for each item of first physical address information:
determining, by the server, that an item of second physical address information matches a particular item of first physical address information; and
in response to determining that the item of second physical address information matches the particular item of first physical address information, establishing, by the server, a mapping relationship between an item of first account information, corresponding to the particular item of first physical address information, and an item of second account information, corresponding to the item of second physical address information, wherein a first account with the first service provider is associated with the item of first account information, a second account with the second service provider is associated with the item of second account information, and the first account and the second account belong to a same user.

US Pat. No. 10,992,673

SYSTEM AND METHOD FOR DECENTRALIZED-IDENTIFIER CREATION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for blockchain-based decentralized-identifier creation, comprising:obtaining, by a server, a request for creating a decentralized identifier (DID) for a subject, wherein the request comprises a public key of a cryptographic key pair;
creating, by the server based on the public key, a blockchain account associated with a blockchain;
creating, by the server, the DID based on information associated with the blockchain account;
determining, by the server, that the DID is not duplicative of any existing DID associated with the blockchain;
generating, by the server, a DID document corresponding to the DID, the DID document comprising a status associated with the DID indicating that an authentication of the subject's real-world identity is pending, wherein the determining that the DID is not duplicative of any existing DID associated with the blockchain is a precondition for obtaining the DID document;
storing, by the server, a mapping relationship between the DID and a dummy account identifier;
generating, by the server, a blockchain transaction for adding the DID document to the blockchain;
sending, by the server, the generated blockchain transaction to one or more blockchain nodes associated with the blockchain for adding the generated blockchain transaction to the blockchain;
receiving, by the server from an external system, a proof of a real-world identity authentication for the subject;
in response to receiving the proof of the real-world identity authentication:
updating, by the server, the status associated with the DID to indicate that authentication of the subject's real-world identity is complete; and
storing, by the server, a mapping relationship between the DID and an account identifier associated with the subject, wherein the account identifier corresponds to an account of the subject maintained by a business entity.

US Pat. No. 10,992,460

BLOCKCHAIN-BASED ADVERTISEMENT MONITORING METHOD AND APPARATUS, AND ELECTRONIC DEVICE

ADVANCED NEW TECHNOLOGIES...

1. A blockchain-based advertisement monitoring method comprising:obtaining blockchain verification information of a target advertisement from a blockchain, the blockchain verification information comprising:
identification information of an online or offline playing device configured to play the target advertisement,
a first signature generated by the playing device encrypting unverified digest information of a screenshot image of the target advertisement with a private key of the playing device,
a second signature generated by the playing device encrypting unverified identification information of the playing device with the private key of the playing device,
a length and a width of the screenshot image, and
a third signature generated by the playing device encrypting an unverified length-and-width pair of the screenshot image with the private key of the playing device;
decrypting the first signature, the second signature, and the third signature based on a public key of the playing device to obtain the unverified digest information, the unverified identification information, and the unverified length-and-width pair respectively;
performing a first verification of whether the unverified identification information is consistent with the identification information of the playing device;
performing a second verification of whether the unverified length-and-width pair matches the length and the width of the screenshot image; and
when both the first verification and the second verification are successful:
obtaining an advertisement resource corresponding to the identification information of the playing device;
performing a simulation playing operation on the advertisement resource and obtaining a plurality of images of the advertisement resource during the simulation playing;
determining digest information for each of the plurality of images;
determining whether the unverified digest information matches with the digest information of any of the plurality of images by performing fuzzy matching between the unverified digest information and the digest information of each of the plurality of images; and
in response to a match being found, confirming that a non-tampered advertisement resource has been played on the playing device.

US Pat. No. 10,992,465

BLOCKCHAIN AUTHORIZATION INFORMATION GENERATION

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, from a client device by a platform comprising one or more computing devices, a request to become a blockchain node in a target blockchain, wherein the request comprises a target blockchain identifier and user information;
identifying, by the platform, based on the target blockchain identifier, the target blockchain;
determining, by the platform, a blockchain parameter of the target blockchain, wherein the blockchain parameter indicates one or more requirements for authorization information to satisfy the request to become a blockchain node in the target blockchain;
selecting, by the platform, a password generation algorithm, wherein an output of the password generation algorithm conforms to the one or more requirements;
generating, by the platform and using the password generation algorithm, blockchain authorization information based on the blockchain parameter and the user information, wherein the blockchain authorization information comprises a blockchain identity certificate; and
sending the generated blockchain authorization information to at least one of the client device or an administrator of the target blockchain.

US Pat. No. 10,990,939

METHOD AND DEVICE FOR VOICE BROADCAST

ADVANCED NEW TECHNOLOGIES...

1. A voice broadcast method, comprising:acquiring, by a server, at least one piece of voice information, wherein the at least one piece of voice information includes a voice message and a voice identifier that identifies the voice message;
delivering, by the server, the at least one piece of voice information to a voice broadcast device such that the voice broadcast device stores the at least one piece of voice information;
determining, by the server, that the voice message is to be broadcast by the voice broadcast device; and
sending, by the server to the voice broadcast device, the voice identifier without sending the voice message to enable the voice broadcast device to obtain the voice message stored at the voice broadcast device according to the voice identifier, and to broadcast the voice message to a user associated with the voice broadcast device when a preset voice broadcast condition is met.

US Pat. No. 10,990,705

INDEX CREATION FOR DATA RECORDS

Advanced New Technologies...

1. A computer-implemented index creation method comprising:obtaining, by a server storing data in a blockchain ledger, an identifier, wherein the identifier identifies an attribute value of a data record;
determining location information of the data record in the blockchain ledger, wherein the location information comprises a block height of a data block in which the data record is located and an offset of the data record in the data block; and
writing the location information into an index, wherein the index stores a correspondence between the location information and the attribute value, the attribute value being used as a primary key in the index, wherein writing the location information into the index comprises
determining whether the attribute value is used as a pre-existing primary key in the index, and
creating a first index record in the index, wherein the first index record uses the attribute value as the primary key, responsive to determining that the attribute value is not used as the pre-existing primary key, or
writing the location information into a second index record in the index, wherein the second index record corresponds to the attribute value, responsive to determining that the attribute value is used as the pre-existing primary key,
wherein each data block in the blockchain ledger after an initial block comprises at least one data record,
wherein each data block in the blockchain ledger after the initial block comprises a hash value of the data block, wherein the hash value of the data block is based on a hash value of a previous data block to the data block and on a data record included in the data block, and
wherein block heights of all data blocks in the blockchain ledger increase monotonically based on an order of times of the data blocks being written into the blockchain ledger.

US Pat. No. 10,985,908

DATA STORAGE METHOD, DATA QUERY METHOD AND APPARATUSES

ADVANCED NEW TECHNOLOGIES...

1. A method, comprising:sending, by a blockchain node associated with a blockchain network, first data to an encryption device to cause the encryption device to encrypt the first data to form first encrypted data and return the first encrypted data to the blockchain node;
receiving the first encrypted data returned by the encryption device;
sending the first encrypted data to other blockchain nodes associated with the blockchain network to cause each of the other blockchain nodes to store the first encrypted data in a blockchain of the blockchain network after successfully performing consensus verification on the first encrypted data;
querying, by the blockchain node, second encrypted data stored in the blockchain;
determining, through one or more smart contracts stored in the blockchain, whether the blockchain node has a permission to decrypt the second encrypted data;
if the blockchain node has the permission, sending the second encrypted data to the encryption device through the one or more smart contracts to cause the encryption device to decrypt the second encrypted data and return second data obtained from the decryption to the blockchain node; and
if the blockchain node does not have the permission, refusing to send the second encrypted data to the encryption device.

US Pat. No. 10,984,371

EXPRESS PACKAGE DELIVERY

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, from a courier terminal, an express package delivery request that indicates identifier information of a courier and first positioning information corresponding to a location of the courier;
retrieving, at a database, express package delivery content information corresponding to a recipient address;
determining the identifier information of the courier and the first positioning information corresponding to the location of the courier is within proximity to the recipient address, wherein the recipient address is associated with more than one account;
determining more than one user device that is logged in the more than one account;
constantly updating second positioning information of more than one recipient that can receive an express package based on positioning information of the more than one user device;
providing, to the courier terminal, a notification to deliver the express package identified in the express package delivery request in response to determining that the recipient address is within a preset range of the second positioning information of at least one of the more than one recipient;
determining one recipient of the more than one recipient with a geographical position closest to the recipient address based on the second positioning information of the more than one recipient; and
transmitting a notification of home delivery of the express package to a user device associated with the one recipient of the more than one recipient.

US Pat. No. 10,985,923

CONSENSUS VERIFICATION METHOD, APPARATUS, AND DEVICE

Advanced New Technologies...

1. A computer-implemented method, comprising:receiving, by a first node of a blockchain, service data;
performing first consensus verification on the service data;
in response to determining that the first consensus verification on the service data fails,
determining that the service data satisfies a predetermined retry condition;
storing the service data as service data to be retried in response to determining that the predetermined retry condition is satisfied;
after storing the service data as service data to be retried,
determining that a predetermined retry execution condition is triggered; and
performing the first consensus verification on the service data to be retried in response to determining that the predetermined retry execution condition is triggered.

US Pat. No. 10,984,395

BLOCKCHAIN SERVICE DATA PROCESSING

Advanced New Technologies...

1. A computer-implemented method executed by one or more processors, the method comprising:receiving, by the one or more processors, from each of a first plurality of blockchain nodes in a blockchain network a respective first service data, wherein each of the respective first service data is associated with a respective first source address and a respective first destination address;
determining, by the one or more processors, information equivalences within a plurality of first service data received from the first plurality of blockchain nodes;
forming, by the one or more processors, second service data comprising a second source address corresponding to the first plurality of blockchain nodes and a second destination address corresponding to a second plurality of blockchain nodes, wherein the second source address is formed based on the information equivalences determined within the plurality of first service data corresponding to a plurality of first source addresses and based on a plurality of first destination addresses associated with the plurality of first service data;
sending, by the one or more processors, the second service data to a blockchain node of the first plurality of blockchain nodes with a verification request to verify that the second service data comprises at least a part of the first service data provided by the blockchain node;
receiving, by the one or more processors, a fault message from the blockchain node indicating that the second service data lacks at least the part of the first service data provided by the blockchain node; and
in response to receiving the fault message from the blockchain node, updating, by the one or more processors, the second service data to comprise the at least the part of the first service data.

US Pat. No. 10,984,206

DATA STORING AND SHARING USING TWO-DIMENSIONAL CODES

Advanced New Technologies...

1. A computer-implemented method comprising:obtaining, by a shared device from a first application running on a first device of a first user, data to be shared with a second application running on a second device of a second user;
obtaining first data corresponding to the data to be shared;
determining, by the shared device, that pre-existing shared data on the shared device matches the data to be shared using the first data;
responsive to determining that the pre-existing shared data on the shared device matches the data to be shared, generating, by the shared device, a two-dimensional code based on the pre-existing shared data;
providing, by the shared device, the two-dimensional code to the first application;
receiving, by the shared device, a data obtaining request from the second application running on the second device of the second user, wherein the data obtaining request is generated in response to the second application scanning the two-dimensional code presented by the first application on the first device; and
sending, by the shared device to the second application of the second device, the data to be shared corresponding to the two-dimensional code provided to the first application on the first device.

US Pat. No. 10,984,223

REDUCTION OF SEARCH SPACE IN BIOMETRIC AUTHENTICATION SYSTEMS

Advanced New Technologies...

1. A computer-implemented method of authentication, the method comprising:receiving, at one or more server devices, from each of a plurality of mobile devices, a transmission that includes a kiosk identifier, the kiosk identifier identifying a kiosk device remote from the one or more server devices and within a threshold distance of each of the plurality of mobile devices;
receiving, at the one or more server devices, from each of the plurality of mobile devices, over a connection that bypasses the kiosk device, signal characteristics of respective wireless signals received by each of the plurality of mobile devices from a transceiver associated with the kiosk device, wherein the signal characteristics comprise signal strength, elapsed time, directional data, or a combination thereof;
identifying, for each of the plurality of mobile devices, a reference image associated with a corresponding user, wherein the identified reference images form a subset of references images in a database of reference images captured for various users during corresponding enrollment processes, the database being stored in the one or more server devices;
transmitting the signal characteristics, by the one or more server devices, to the kiosk device over a connection that bypasses the plurality of mobile devices; and
transmitting, by the one or more server devices, to the kiosk device, the identified reference image corresponding to each of the plurality of mobile devices, the identified reference images being usable by the kiosk device to perform an authentication process comprising comparing one or more of the identified reference images to a user image captured by the kiosk device, a number of the identified reference images searched during the authentication process being smaller than a number of the reference images in the database.

US Pat. No. 10,984,228

INTERACTION BEHAVIOR DETECTION METHOD, APPARATUS, SYSTEM, AND DEVICE

Advanced New Technologies...

1. A computer-implemented method for interaction behavior detection, comprising:obtaining a depth image from a depth camera, wherein the depth camera is disposed above a rack, and a filming range of the depth camera covers an outer edge of each shelf in the rack and an aisle;
extracting a foreground image associated with a moving object from the depth image;
obtaining spatial coordinates of the moving object based on the foreground image; and
determining an object on a shelf in the rack that is physically contacted by the moving object based on comparing the spatial coordinates of the moving object with spatial coordinates of the shelf, wherein the spatial coordinates of the shelf are determined by:
obtaining a background depth image set photographed by the depth camera at a predetermined angle unobstructed by the moving object;
determining a shelf edge of the shelf based on the background depth image set, wherein determining the shelf edge of the shelf comprises:
preprocessing the background depth image set to generate preprocessed images, wherein the preprocessing is performed based on image averaging and image denoising;
performing edge detection on the preprocessed images to obtain edge detected images;
performing straight line detection from the predetermined angle on the edge detected images to obtain one or more straight lines, wherein the predetermined angle is determined based on a relative position between the depth camera and the rack; and
filtering out straight lines of the one or more straight lines that are shorter than a predetermined length threshold to obtain the shelf edge;
converting pixel coordinates of pixels corresponding to the shelf edge in the background depth image set to first-dimension coordinates and second-dimension coordinates of the spatial coordinates of the shelf based on calibrating the depth camera; and obtaining third-dimension coordinates of the spatial coordinates of the shelf based on depths of the pixels corresponding to the shelf edge.

US Pat. No. 10,984,270

SPOOF DETECTION BY ESTIMATING SUBJECT MOTION FROM CAPTURED IMAGE FRAMES

Advanced New Technologies...

1. A method comprising:receiving, at one or more processing devices, a first image and a second image, wherein the first image represents a first relative location of an image acquisition device with respect to a first subject, and the second image represents a second relative location, different from the first relative location, of the image acquisition device with respect to the first subject;
determining, by the one or more processing devices and using the first image and the second image, a first total relative displacement of the first subject with respect to the image acquisition device between a time of capture of the first image and a time of capture of the second image;
determining, based on sensor data associated with one or more sensors associated with the image acquisition device, a component of the first total relative displacement associated with a first motion of the image acquisition device;
calculating a difference between the first total relative displacement and the component of the first total relative displacement associated with the first motion of the image acquisition device;
in response to determining that the calculated difference between the first total relative displacement and the component of the first total relative displacement associated with the first motion of the image acquisition device is below a threshold difference, determining that the first subject is an alternative representation of a live person; and
responsive to determining that the first subject is an alternative representation of a live person, preventing access to a secure system.

US Pat. No. 10,984,293

IMAGE PROCESSING METHOD AND APPARATUS

Advanced New Technologies...

1. An image processing method for use in a mobile device, comprising:obtaining an image corresponding to a frame in a video stream of a vehicle;
inputting the image into a classification model and determining, based on a classification result, whether the image meets a predetermined criterion, the classification model comprising a first convolutional neural network for use in the mobile device;
in response to the image meeting the predetermined criterion, adding at least one of a target box or target segmentation information to the image, the at least one of the target box or the target segmentation information corresponding to at least one of a vehicle part or vehicle damage of the vehicle; and
displaying to a user the at least one of the target box or the target segmentation information.

US Pat. No. 10,979,233

MONITORING TIME CERTIFICATE GENERATION REQUESTS

Advanced New Technologies...

1. A computer-implemented method, comprising:in response to receiving a time certificate generation request, determining, by a database service that stores data in a blockchain, a starting block height H1 and an ending block height H2 of a target ledger of the blockchain corresponding to the time certificate generation request, wherein the target ledger comprises at least one data block or multiple data blocks with consecutive block heights;
in response to determining, by the database service, that the starting block height H1 of the target ledger is greater than a block height H of time authenticated data blocks maintained by the database service, requesting, by the database service and from a time authentication service, a time certificate that corresponds to the target ledger, wherein requesting the time certificate comprises:
generating a Merkle tree corresponding to the target ledger based on a block height sequence of the data blocks in the target ledger;
determining a root hash of the Merkle tree based on a block hash of each data block; and
sending, to the time authentication service, the root hash of the Merkle tree and related information of the data blocks, wherein the related information of the data blocks comprises the starting block height H1 and the ending block height H2, or a quantity of the data blocks;
receiving, by the database service and from the time authentication service, the time certificate that corresponds to the target ledger, wherein the time certificate comprises the root hash of the Merkle tree, the related information of the data blocks, a trusted timestamp, and a time authority signature; and
in response to receiving, by the database service, the time certificate from the time authentication service for the time certificate generation request, changing a value of the block height H of time authenticated data blocks maintained by the database service to the ending block height H2 of the target ledger, wherein block heights of data blocks in the target ledger are increased monotonically based on a block generation time sequence.

US Pat. No. 10,977,758

TRAFFIC SECTION FEE PAYMENT METHOD, FEE SYSTEM, AND PAYMENT SYSTEM

Advanced New Technologies...

1. A computer-implemented method for traffic section fee payment, comprising:obtaining, by a client device, inbound station information;
recording, by the client device, the inbound station information;
generating, by the client device and based on first electronic credential information and an inbound timestamp, an inbound barcode, wherein the first electronic credential information comprises a code randomly generated by a payment system, wherein the code comprises a user identity stored by the client device, and wherein the inbound timestamp is added to the inbound barcode and limits validity of the inbound barcode to a predetermined period of time;
displaying, by the client device, the inbound barcode to an inbound charging apparatus, wherein the inbound charging apparatus generates, based on the inbound barcode, inbound information; and
sending, by the client device, second electronic credential information and the inbound station information to an outbound charging apparatus, wherein the second electronic credential information comprises authentication information generated by the payment system, wherein the authentication information comprises the user identity, wherein the second electronic credential information is different from the first electronic credential information, wherein the outbound charging apparatus generates, based on the second electronic credential information, outbound information, and wherein the payment system pays, based on the inbound information and the outbound information, a traffic fee by using a payment account that corresponds to at least one of the first electronic credential information or the second electronic credential information.

US Pat. No. 10,977,362

PROGRAM EXECUTION AND DATA PROOF SCHEME USING MULTIPLE KEY PAIR SIGNATURES

Advanced New Technologies...

1. A computer-implemented method, the method comprising:transmitting, by a client device, a request to a node, the node executing a trusted program within a trusted execution environment (TEE), the request comprising an identifier and one or more request parameters, the identifier identifying a sub-logic code, the sub-logic code comprising computer-executable code for execution by the trusted program, wherein the sub-logic code is one of a plurality of sub-logic codes stored in the node, and wherein each sub-logic code of the plurality of sub-logic codes is associated with a respective code key pair comprising a private code key and a public code key;
receiving, by the client device, a response to the request, the response comprising result data and a digital signature of the sub-logic code, the result data being generated by processing of the one or more request parameters using the sub-logic code within the TEE, and the digital signature of the sub-logic code being generated using a first private code key of the sub-logic code; and
verifying, by the client device, the result data using the digital signature of the sub-logic code and a first public code key of the sub-logic code that is paired with the first private code key.

US Pat. No. 10,970,756

NON-STOP CHARGING METHODS, APPARATUSES, AND ELECTRONIC DEVICES

Advanced New Technologies...

1. A computer-implemented method for charging toll fees performed by a tolling system, comprising:receiving, by a first Internet of Things (IoT) device, a message triggered by a second IoT device detecting that a vehicle is traveling on a road;
in response to receiving the message, obtaining, by the first IoT device, information of the vehicle, wherein the vehicle is associated with a user account on a payment platform; and
in response to determining that a distance the vehicle is driven on the road reaches a predetermined distance, initiating, by the first IoT device, a toll fee charging request for the vehicle to the payment platform to charge a toll fee corresponding to the predetermined distance.

US Pat. No. 10,970,309

DATA STORAGE METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A data storage method, comprising:setting, by a computer, at least two service domains each having a service domain identifier;
configuring, by the computer based on parameter information of each of the at least two service domains, at least two storage resources corresponding to the at least two service domains;
receiving, by the computer, a data storage request including identification information for to-be-stored data, wherein the to-be-stored data carries a first service domain identifier of the service domain identifiers of the at least two service domains;
acquiring, by the computer based on the identification information for the to-be-stored data, the to-be-stored data, and obtaining the first service domain identifier carried by the to-be-stored data;
determining, by the computer according to the first service domain identifier of the to-be-stored data, a target storage resource corresponding to the to-be-stored data from the at least two storage resources;
storing, by the computer, the to-be-stored data to the target storage resource;
receiving, by the computer, a data reading request carrying the first service domain identifier;
in response to receiving the data reading request, reading, by the computer based on the first service domain identifier, the data stored at the target storage resource; and
transmitting, by the computer, the data read from the target storage resource to a requester that sends the data reading request.

US Pat. No. 10,970,574

SPOOF DETECTION USING DUAL-BAND NEAR-INFRARED (NIR) IMAGING

Advanced New Technologies...

1. A method for preventing access to a secure system based on determining that a subject is an alternative representation of a live person, the method comprising:illuminating a first subject with electromagnetic radiation in a first wavelength range;
capturing a first image of the first subject under illumination of the first wavelength range;
illuminating the first subject with electromagnetic radiation in a second wavelength range, wherein a difference between (i) absorption of the second wavelength range by live human tissue, and (ii) absorption of the first wavelength range by live human tissue satisfies a threshold condition;
capturing a second image of the first subject under illumination of the second wavelength range;
calculating pixel-wise differences in intensity values between corresponding pixels of the first image and the second image;
calculating an aggregated measure of the pixel-wise differences in intensity values;
calculating a difference between the aggregated measure of the pixel-wise differences and a target value; and
identifying, based at least on the difference between the aggregated measure and the target value, the first subject as an alternative representation of a live person; and
preventing access to the secure system responsive to identifying the first subject as an alternative representation of a live person.

US Pat. No. 10,970,718

PAYMENT METHOD, APPARATUS AND DEVICE

Advanced New Technologies...

6. A method, comprising:at a server,
receiving, from a first client, payment information and a first geographical location of a terminal device that is used to access the first client;
encoding the first geographical location and the payment information using a first algorithm to generate a payment password corresponding to the first geographical location and the payment information;
sending the payment password to the first client;
receiving, from a second client, the payment password and a second geographical location of a terminal device that is used to access the second client;
decoding the payment password received from the second client using a second algorithm that corresponds to the first algorithm to obtain the payment information and the first geographical location;
determining that a distance between the first geographical location obtained from the decoding and the second geographical location meets a threshold distance; and
executing a payment operation according to the payment information in response to the determining that the distance between the first geographical location and the second geographical location meets the threshold distance.

US Pat. No. 10,970,719

FRAUDULENT TRANSACTION IDENTIFICATION METHOD AND APPARATUS, SERVER, AND STORAGE MEDIUM

Advanced New Technologies...

1. A computer-implemented method for identifying fraudulent transactions, comprising:identifying, by a server, an operation sequence and time difference information associated with a transaction, wherein the operation sequence comprises a plurality of operations at a plurality of time points, and wherein the time difference information comprises a time difference between the time points of each two adjacent operations included in the transaction; and
predicting, by the server, a probability that the transaction is a fraudulent transaction based on a result provided by a deep learning network, wherein the deep learning network comprises a feature embedding subnetwork and a classifier subnetwork, comprising:
obtaining an operation embedding representation of each time point of the operation sequence, wherein the operation embedding representation of each time point of the operation sequence is an output at each corresponding time point of the feature embedding subnetwork, wherein an input to the feature embedding subnetwork is the operation sequence associated with the transaction;
obtaining a time difference embedding representation of each corresponding time point of the operation sequence, wherein the time difference embedding representation of each corresponding time point of the operation sequence is an output at each corresponding time point of the same feature embedding subnetwork, wherein an input to the feature embedding subnetwork is the time difference information associated with the transaction;
obtaining a combined embedding representation of the transaction by combining the operation embedding representation of each time point of the operation sequence and the time difference embedding representation of each corresponding time point of the operation sequence, comprising:
calculating a similarity between each pair of the operation embedding representation and the time difference embedding representation that corresponds to a specific time point; and
combining more than one operation features based on the calculated similarity to obtain the combined embedding representation of the transaction; and
predicting, by the classifier subnetwork, the probability that the transaction is a fraudulent transaction based on the combined embedding representation of the transaction.

US Pat. No. 10,965,656

RETRIEVING ACCESS DATA FOR BLOCKCHAIN NETWORKS USING HIGHLY AVAILABLE TRUSTED EXECUTION ENVIRONMENTS

Advanced New Technologies...

1. A computer-implemented method for retrieving data from an external data source that is external to a blockchain network, the method comprising:receiving, from a client smart contract and by a relay system smart contract executing within the blockchain network, a request for retrieving the data from the external data source, the request comprising encrypted data, the encrypted data comprising access data for accessing the external data source that is encrypted using a service public key of a key management node that is external to the blockchain network;
selecting, by the relay system smart contract, a relay system node from a plurality of relay system nodes that are external to the blockchain network, wherein the plurality of relay system nodes are distributed with a service private key of the key management node;
transmitting, by the relay system smart contract, the request to the relay system node;
receiving, from the relay system node and by the relay system smart contract, a return result in response to the request, the return result comprising the data retrieved from the external data source obtained by the relay system node and a digital signature, wherein the digital signature is generated based on the data retrieved from the external data source and the service private key of the key management node; and
transmitting, by the relay system smart contract, the return result to the client smart contract.

US Pat. No. 10,963,152

MAP INTERFACE INTERACTION

Advanced New Technologies...

1. A computer-implemented method for map interaction, the method comprising:receiving user input specifying a map search operation from a visual map interface, the map search operation including a first location and a distance determining point, each of the first location and the distance determining point representing a first physical location and a second physical location, respectively;
determining a physical distance between the first location and the distance determining point;
generating a demarcated range comprising an area having the first location as a center and the distance determining point as a vertex of the area, the demarcated range representing a subset of the area; and
displaying one or more target objects in the demarcated range on the visual map interface, each target object associated with a physical location in the subset of the area.

US Pat. No. 10,963,542

BLOCKCHAIN-BASED IMAGE PROCESSING METHOD AND APPARATUS

ADVANCED NEW TECHNOLOGIES...

1. A blockchain-based image processing method, comprising:displaying, by a terminal device, a target image;
obtaining, by the terminal device, information of a copyright owner of the target image and a current display environment of the target image;
sending, by the terminal device, the obtained information to one or more blockchain nodes configured to obtain ciphertext information by encrypting the obtained information and to store the ciphertext information in a blockchain;
obtaining, by the terminal device, the ciphertext information from the blockchain; and
updating, by the terminal device, historical information in a pixel matrix of the target image based on the ciphertext information by:
encoding the ciphertext information to obtain a binary string corresponding to the ciphertext information;
determining a plurality of positions in the pixel matrix respectively associated with a plurality of characters of the historical information; and
replacing the character at each of the positions with a character of the binary string.

US Pat. No. 10,956,900

CROSS-ASSET TRADING WITHIN BLOCKCHAIN NETWORKS

Advanced New Technologies...

1. A computer-implemented method for private cross-asset trading in a blockchain network, the method being executed by one or more processors and comprising:receiving, by a first node in a blockchain network from a second node in the blockchain network via a sub-channel outside of the blockchain network, a private currency exchange rate;
generating, by the first node in the blockchain network and using Boneh-Goh-Nissim (BGN) encryption, first ciphertexts based on a first value and a second value, the second value being determined based on a product of the first value and the private currency exchange rate;
transmitting, by the first node to the second node via the sub-channel outside of the blockchain network, the first value and the first ciphertexts;
receiving, by the first node and from the second node via the sub-channel outside of the blockchain network, a first evidence set comprising a first set of data that includes evidence of the private currency exchange rate and evidence of the first ciphertexts;
verifying the private currency exchange rate in a zero-knowledge proof (ZKP) routine using the first evidence set comprising the first set of data without revealing the private currency exchange rate;
generating, by the first node, a second evidence set comprising a second set of data that includes second ciphertexts;
verifying, using the second evidence set comprising the second set of data and the ZKP routine, that the second ciphertexts are encrypted by a BGN public key of the first node;
defining, by the first node, a transaction comprising a first transaction between the first node and the second node for transfer of the first value from the first node to the second node, and a second transaction between the second node and a third node for transfer of the second value from the second node to the third node;
transmitting, by the first node via the blockchain network, the transaction to at least one consensus node of the blockchain network for verification and execution of the transaction, the transaction being verified based on the first evidence set and the second evidence set; and
in response to verifying the transaction, executing the first transaction between the first node and the second node to decrease a balance of the first node by the first value and increase a first balance of the second node by the first value, and executing the second transaction, based upon the private currency exchange rate, between the second node and the third node to decrease a second balance of the second node by the second value and increase a balance of the third node by the second value.

US Pat. No. 10,956,903

OBTAINING A BLOCKCHAIN-BASED, REAL-NAME, ELECTRONIC BILL

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for obtaining a real-name electronic bill, comprising:storing, by a network node on a blockchain, a target electronic bill, wherein the target electronic bill comprises an identifier of the target electronic bill and identity information of a payment user in the target electronic bill;
receiving, by a bill management terminal, an input of a user, wherein the input of the user comprises a first request to associate the user with the target electronic bill and the identifier of the target electronic bill;
sending, by the bill management terminal and to the network node on the blockchain, a second request to associate the user with the target electronic bill stored in the blockchain, wherein the second request comprises the identifier of the target electronic bill;
receiving, by the network node on the blockchain, the second request;
in response to receiving the second request, searching, by the network node on the blockchain, for the target electronic bill in the blockchain based on the identifier of the target electronic bill comprised in the second request;
determining, by the network node on the blockchain, that the target electronic bill stored in the blockchain is not associated with user identity information of the user;
in response to determining that the target electronic bill stored in the blockchain is not associated with the user identity information of the user, sending, by the network node on the blockchain and to the bill management terminal, a third request for user information;
in response to receiving the third request for user information, displaying, by the bill management terminal, a prompt for user identity information;
collecting, by the bill management terminal, the user identity information of the user from user identity information collecting hardware of the bill management terminal, wherein the collecting the user identity information of the user comprises:
activating, by the bill management terminal, the user identity information collecting hardware; and
obtaining, by the bill management terminal via the prompt, the user identity information of the user by using the user identity information collecting hardware;
sending, by the bill management terminal, the user identity information of the user to the network node on the blockchain;
receiving, by the network node on the blockchain and from the bill management terminal, the user identity information of the user;
verifying, by the network node on the blockchain, whether the user identity information of the user matches the identity information of the payment user in the target electronic bill;
determining, by the network node on the blockchain, that the user identity information of the user matches the identity information of the payment user in the target electronic bill; and
in response to determining that the user identity information of the user matches the identity information of the payment user in the target electronic bill, publishing, by the network node on the blockchain, the matched determination on the blockchain.

US Pat. No. 10,956,405

LOG-STRUCTURED STORAGE SYSTEMS

Advanced New Technologies...

1. A computer-implemented method comprising:receiving, by a storage system, a processing request of first data generated by a distributive ledger system, wherein the distributive ledger system stores data in one or more blocks in a blockchain, and generates two or more types of data of the distributive ledger system comprising block data and state data, wherein the block data comprise at least one block in the blockchain, and the at least one block comprises a hash value of a previous block in the blockchain, wherein the state data comprise a world state of the distributive ledger system, and wherein the state data comprise current state data and history state data;
in response to determining a type of the first data generated by the distributive ledger system to be the block data among the two or more types of the data of the distributive ledger system, applying, by the storage system, a corresponding type of a processing engine specified for processing the block data, wherein the corresponding type of the processing engine specified for processing the block data is configured with one or more first functions based on a characteristic of the block data;
receiving, by the storage system, a processing request of second data generated by the distributive ledger system;
in response to determining a type of the second data generated by the distributive ledger system to be the current state data among the two or more types of the data of the distributive ledger system, applying, by the storage system, a corresponding type of a processing engine specified for processing the current state data, wherein the corresponding type of the processing engine specified for processing the current state data is configured with one or more second functions based on a characteristic of the current state data, and the one or more first functions are different from the one or more second functions; and
in response to determining the type of the second data generated by the distributive ledger system to be the history state data among the two or more types of the data of the distributive ledger system, applying, by the storage system, a corresponding type of a processing engine specified for processing the history state data, wherein the corresponding type of the processing engine specified for processing the history state data is configured with one or more third functions based on a characteristic of the history state data.

US Pat. No. 10,956,976

RECOMMENDING SHARED PRODUCTS

Advanced New Technologies...

1. A computer-implemented method for shared product recommendation, wherein the method comprises:obtaining, by an electronic device, credit information of a user, wherein the credit information of the user is derived at least in part from a usage history of the user for a first shared product, wherein the usage history of the user comprises a history of whether the user has returned the first shared product on time or whether the user has damaged the first shared product;
inputting, by the electronic device, the credit information of the user to a recommendation model for calculation, wherein the recommendation model is a machine learning model, wherein the recommendation model is trained based on credit information of a plurality of sample users, wherein the credit information of the plurality of sample users is derived from usage history of the plurality of sample users for one or more shared products;
deriving, by the electronic device and based on the recommendation model, a shared product use probability; and
recommending, by the electronic device, a second shared product to the user based on the shared product use probability.

US Pat. No. 10,956,762

SPOOF DETECTION VIA 3D RECONSTRUCTION

Advanced New Technologies...

1. A method comprising:receiving, at one or more processing devices, a first sequence of images of a first subject captured by an image acquisition device over a time period in which relative locations of the image acquisition device with respect to the first subject varies;
selecting, by the one or more processing devices, a first image and a second image from the first sequence of images, wherein the first image represents a first relative location of the image acquisition device with respect to the first subject, and the second image represents a second relative location, different from the first relative location, of the image acquisition device with respect to the first subject;
generating, by the one or more processing devices and using the first image and the second image as a stereo pair, a first three-dimensional representation of the first subject;
determining, based on the first three-dimensional representation, that the first subject is an alternative representation of a live person;
responsive to determining that the first subject is an alternative representation of a live person, preventing access to a secure system;
receiving, at the one or more processing devices, a second sequence of images of a second subject captured by the image acquisition device over a time period in which relative locations of the image acquisition device with respect to the second subject varies;
selecting, by the one or more processing devices, a third image and a fourth image from the second sequence of images, wherein the third image represents a first relative location of the image acquisition device with respect to the second subject, and the fourth image represents a second relative location, different from the first relative location, of the image acquisition device with respect to the second subject;
generating, by the one or more processing devices and using the third image and the fourth image as a stereo pair, a second three-dimensional representation of the second subject;
determining, based on the second three-dimensional representation, that the second subject is a live person; and
responsive to determining that the second subject is a live person, initiating an authentication process for determining if the live person is authorized to access the secure system.

US Pat. No. 10,956,769

METHOD AND SYSTEM FOR EVALUATING AN OBJECT DETECTION MODEL

Advanced New Technologies...

1. A computer-implemented method for evaluating performance of an object detection model, comprising:generating a predicted bounding box representing an object based on the object detection model, wherein the object is positioned proximate to one or more adjacent objects;
determining an area of intersection between the predicted bounding box and a ground truth bounding box of the object;
determining a modified area of union between the predicted bounding box and the ground truth bounding box of the object, wherein determining the modified area of union comprises:
determining, based on one or more weights, a weighted area of union between the predicted bounding box and the ground truth bounding box; and
adding to the weighted area of union an area of intersection between the predicted bounding box and at least one ground truth bounding box of the one or more adjacent objects; and
determining a score equal to the area of intersection between the predicted bounding box and the ground truth bounding box of the object divided by the modified area of union, wherein the score represents the performance of the object detection model.