Alipay (Hangzhou) Information Technology Co., Ltd.

China

Back to Profile

1-100 of 1,302 for Alipay (Hangzhou) Information Technology Co., Ltd. Sort by
Query
Aggregations
Jurisdiction
        World 849
        United States 447
        Canada 6
Date
New (last 4 weeks) 12
2025 September (MTD) 12
2025 August 7
2025 July 18
2025 June 25
See more
IPC Class
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules 134
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system 106
G06Q 20/38 - Payment protocolsDetails thereof 93
G06F 21/60 - Protecting data 88
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists 75
See more
Status
Pending 241
Registered / In Force 1,061
Found results for  patents
  1     2     3     ...     14        Next Page

1.

METHODS AND APPARATUSES FOR AUTOMATICALLY COMPLETING QUERY STATEMENT FOR GRAPH DATABASE

      
Application Number 19225145
Status Pending
Filing Date 2025-06-02
First Publication Date 2025-09-18
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Li, Pengfei

Abstract

Automatically completing a query statement for a graph database, includes a current input character in a process where a user inputs a graph database query statement based on a target query language. Multiple syntax keywords for matching target keywords are queried based on at least the current input character when the current input character is not a predetermined character, where the predetermined character is a reserved character of the target query language. The matched target keywords are determined as auto-complete content corresponding to the current input character.

IPC Classes  ?

2.

DATA STORAGE METHODS AND APPARATUSES FOR GRAPH DATABASE

      
Application Number 19076391
Status Pending
Filing Date 2025-03-11
First Publication Date 2025-09-18
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Wu, Tao

Abstract

The specification provides computer-implemented methods, apparatuses and computer-readable media for data storage in a database. An example computer-implemented method includes: obtaining graph data to be stored, where the graph data include retrieval information and attribute information corresponding to a graph data object, and the retrieval information is used to perform retrieval query on the graph data; storing the attribute information into a disk managed by a storage engine corresponding to the graph database, and obtaining a storage location of the attribute information on the disk; and further storing the retrieval information corresponding to the graph data object and the storage location into a memory managed by the storage engine.

IPC Classes  ?

  • G06F 16/901 - IndexingData structures thereforStorage structures

3.

METHODS AND APPARATUSES FOR CONSTRUCTING DATASET FOR MODEL TRAINING

      
Application Number 19079792
Status Pending
Filing Date 2025-03-14
First Publication Date 2025-09-18
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Wang, Qing
  • Ren, Wang
  • Wang, Jian
  • Guo, Qingpei

Abstract

Implementations of this specification provide methods and apparatuses for model training. One example method includes: obtaining a first dataset that comprises a plurality of initial image-text pairs, calculating a similarity score between an initial image and an initial text comprised in each of the plurality of initial image-text pair, classifying each of the plurality of initial image-text pairs as one of high-quality data, medium-quality data, or low-quality data based on the similarity score and a predetermined score threshold, and adding updated image-text pairs classified as the medium-quality data and initial image-text pairs classified as the high-quality data to a second dataset for model training.

IPC Classes  ?

  • G06V 10/774 - Generating sets of training patternsBootstrap methods, e.g. bagging or boosting
  • G06F 40/279 - Recognition of textual entities
  • G06F 40/40 - Processing or translation of natural language
  • G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
  • G06V 10/77 - Processing image or video features in feature spacesArrangements for image or video recognition or understanding using pattern recognition or machine learning using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]Blind source separation

4.

PREPROCESSING METHODS AND APPARATUSES FOR REMOTE SENSING IMAGES, AND REPRESENTATION DETERMINING METHODS AND APPARATUSES FOR REMOTE SENSING IMAGES

      
Application Number 19079694
Status Pending
Filing Date 2025-03-14
First Publication Date 2025-09-18
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Guo, Xin
  • Lao, Jiangwei
  • Wang, Jian
  • Chen, Jingdong
  • Yang, Ming

Abstract

Implementations of this specification provide methods and apparatuses for remote sensing images. One example method comprises: dividing a global remote sensing image into sub-image regions in a predetermined manner, for each sub-image region of the sub-image regions: (1) determining image point features of image points in the sub-image region based on a feature extraction model, (2) identifying image points in the sub-image region based on the image point features, and (3) determining a cluster center for the identified image points, and adjusting a remote sensing model based on cluster centers determined for each of the sub-image regions.

IPC Classes  ?

  • G06V 20/10 - Terrestrial scenes
  • G06V 10/26 - Segmentation of patterns in the image fieldCutting or merging of image elements to establish the pattern region, e.g. clustering-based techniquesDetection of occlusion
  • G06V 10/40 - Extraction of image or video features
  • G06V 10/762 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using clustering, e.g. of similar faces in social networks

5.

DATA STORAGE BASED ON PERFECT HASHING

      
Application Number CN2025081570
Publication Number 2025/190209
Status In Force
Filing Date 2025-03-10
Publication Date 2025-09-18
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Huang, Hua
  • Qin, Bo

Abstract

Provided in the present specification are a data storage method based on perfect hashing, and a related device. The method comprises: dividing a target data set to be stored into a plurality of data segments that match the data volume of key-value data included in said target data set, wherein each data segment includes a portion of the key-value data in said target data set; calculating perfect hash slots respectively corresponding to a plurality of pieces of key-value data comprised in each data segment, and dividing each data segment into a plurality of data blocks that match the data volume of the key-value data included in the data segment, wherein each data block includes several perfect hash slots arranged in sequence, and each perfect hashing slot includes at least one piece of key-value data corresponding to the perfect hash slot; and sequentially storing the plurality of data segments in a disk, and when each data segment is stored, sequentially storing the plurality of data blocks in the data segment according to the arrangement order of the perfect hash slots.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

6.

CALL REQUEST VERIFICATION

      
Application Number CN2025080271
Publication Number 2025/185573
Status In Force
Filing Date 2025-03-03
Publication Date 2025-09-12
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Bian, Enze

Abstract

Disclosed in the embodiments of the present specification are a call request verification method and apparatus, and a storage medium and an electronic device. The method comprises: extracting identification information of a calling end from a call request by means of code injection, and verifying the identification information, so as to obtain a verification result; and if the verification result indicates that the identification information passes the verification, executing a call process on the basis of call information, so as to obtain a call result.

IPC Classes  ?

7.

ELECTRONIC INVOICE PROCESSING BASED ON VIRTUAL MAILBOX

      
Application Number CN2025080284
Publication Number 2025/185576
Status In Force
Filing Date 2025-03-03
Publication Date 2025-09-12
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Chen, Lijian

Abstract

Embodiments of the present description provide an electronic invoice processing method and apparatus based on a virtual mailbox. The electronic invoice processing method based on the virtual mailbox comprises: in a process of parsing electronic invoice mail, receiving, by means of the virtual mailbox, an electronic invoice mail sent by an invoice platform, the invoice platform creating the electronic invoice mail on the basis of a transaction bill, and sending the mail on the basis of a virtual mailbox address configured by an invoice service for the virtual mailbox; parsing the electronic invoice mail after receiving the electronic invoice mail, and determining an invoice acquisition type according to the parsing result; and performing invoice acquisition according to an invoice acquisition mode corresponding to the invoice acquisition type, thereby realizing acquisition of an electronic invoice by means of parsing the electronic invoice mail.

IPC Classes  ?

  • G06Q 30/04 - Billing or invoicing
  • G06Q 10/107 - Computer-aided management of electronic mailing [e-mailing]
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]

8.

FUND PROCESSING

      
Application Number CN2025080290
Publication Number 2025/185577
Status In Force
Filing Date 2025-03-03
Publication Date 2025-09-12
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Zha, Jinmin
  • Hou, Shuhu
  • Wang, Junwei

Abstract

Provided in the embodiments of the present disclosure are a fund processing method and apparatus. The fund processing method comprises: receiving an access request for a fund transfer-in identifier which is sent by a member terminal of an institution member; generating a fund transfer-in identifier of the institution member on the basis of member information of the institution member, and returning the fund transfer-in identifier to the member terminal; after a fund transfer-out party transfers a fund out by means of scanning the fund transfer-in identifier, transferring a transferred-out target fund into an institution account configured for an institution payment service; and creating a transfer-in record of the target fund, and associating the transfer-in record with the member identifier of the institution member.

IPC Classes  ?

  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
  • G06Q 40/04 - Trading Exchange, e.g. stocks, commodities, derivatives or currency exchange

9.

MAINTENANCE METHODS AND APPARATUSES FOR DATA DICTIONARY

      
Application Number 19069768
Status Pending
Filing Date 2025-03-04
First Publication Date 2025-09-04
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Wu, Tao

Abstract

One or more embodiments of this specification provide maintenance methods and apparatuses for a data dictionary. In an implementation, a method includes obtaining maintenance duration of a key-value pair maintained by a data dictionary, where a key of the key-value pair comprises a primary key comprised in a data record stored in a database, a value of the key-value pair comprises a primary key ID obtained by mapping the primary key. In response to determining that the maintenance duration reaches a predetermined duration threshold, deleting the key-value pair and writing the primary key ID into a list of IDs to be allocated.

IPC Classes  ?

  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/901 - IndexingData structures thereforStorage structures

10.

RESOURCE QUOTA PROCESSING

      
Application Number CN2025079785
Publication Number 2025/180479
Status In Force
Filing Date 2025-02-28
Publication Date 2025-09-04
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Wu, Wenbin

Abstract

Provided in the embodiments of the present specification are a resource quota processing method and apparatus. The resource quota processing method comprises: after an institutional member submits a resource quota transfer request, performing validity verification on a resource quota of the institutional member; after the verification is successful, detecting whether a resource quota relationship between the institutional member and a transferee satisfies a quota transfer condition; if the quota transfer condition is satisfied, on the basis of a transfer time carried in the resource quota transfer request, performing transfer time verification on the resource quota transfer request; and if the verification is successful, on the basis of a transferred resource quota carried in the resource quota transfer request, performing quota deduction on the resource quota of the institutional member, and on the basis of the deducted resource quota, updating the resource quota of the transferee.

IPC Classes  ?

11.

ORDER PAYMENT PROCESSING

      
Application Number CN2025079794
Publication Number 2025/180482
Status In Force
Filing Date 2025-02-28
Publication Date 2025-09-04
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Shu, Jie

Abstract

Embodiments in the present description provide an order payment processing method and apparatus. The order payment processing method comprises: in the process of performing order payment on the basis of a payment instruction, for an order to be paid, submitted after identifier acquisition performed in collaboration between an institutional user and a merchant, first performing location detection according to a location detection link on the basis of payment information carried by the payment instruction, and using object location information of a target location object obtained by the location detection as payment positioning information; and performing location matching processing on the payment positioning information and access locations configured in an institutional payment access policy of an institution to which the institutional user belongs, determining a payment account on the basis of an account type corresponding to the matching processing result, and performing order payment on the basis of the payment account.

IPC Classes  ?

  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices

12.

SEGMENTATION MODEL TRAINING METHOD AND APPARATUS AND IMAGE RECOGNITION METHOD AND APPARATUS

      
Application Number 18858198
Status Pending
Filing Date 2023-04-10
First Publication Date 2025-09-04
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Hu, Yongheng
  • Ma, Chenguang

Abstract

Embodiments of this specification provide a segmentation model training method and apparatus, and an image recognition method and apparatus. The training method includes: obtaining a sample image pair, the sample image pair includes an RGB image and a depth image that are obtained by photographing the same visual range; inputting the depth image into the first network model, to obtain a first depth feature extraction result; inputting a combined image of the depth image and the RGB image into the second network model, to obtain an edge feature of a target object; inputting the edge feature of the target object and the first depth feature extraction result into the third network model, to obtain a segmentation result of the target object; performing a parameter adjustment on the first network model, the second network model, the third network model based on a label and the segmentation result of the target object.

IPC Classes  ?

  • G06V 10/26 - Segmentation of patterns in the image fieldCutting or merging of image elements to establish the pattern region, e.g. clustering-based techniquesDetection of occlusion
  • G06T 7/174 - SegmentationEdge detection involving the use of two or more images
  • G06T 7/50 - Depth or shape recovery
  • G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersectionsConnectivity analysis, e.g. of connected components
  • G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks

13.

ACCESS CONTROL METHOD AND APPARATUS FOR LINUX FILE SYSTEM

      
Application Number 18856272
Status Pending
Filing Date 2023-04-06
First Publication Date 2025-08-21
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Liu, Shouye
  • Yu, Wang
  • Yan, Yan
  • Chen, Qingsong

Abstract

An access control method and apparatus for a Linux file system are provided. The method includes: registering a Linux security module in a procedure of starting a Linux operating system. The Linux security module is configured to perform the following operations: calling a signature verification module to obtain configuration information from a signature verification server, where the configuration information is used to record a protected file in the Linux file system and a protection policy for the protected file; and performing file protection on the protected file based on the protection policy. The signature verification module is configured to perform the following operations: verifying a signature of a first user in response to receiving a modification request of the first user for the configuration information; and modifying the configuration information if the verification on the signature of the first user succeeds.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

14.

WORKLOAD PREDICTION METHODS AND APPARATUSES FOR SERVICE IN SERVICE CLUSTER

      
Application Number 18969034
Status Pending
Filing Date 2024-12-04
First Publication Date 2025-08-21
Owner
  • Alipay (Hangzhou) Information Technology Co., Ltd. (China)
  • Shanghai Jiao Tong University (China)
Inventor
  • Luo, Yang
  • Gao, Mohan
  • Yu, Zhemeng
  • Ge, Haoyuan
  • Gao, Xiaofeng
  • Cai, Tengwei
  • Chen, Guihai

Abstract

Embodiments of this specification provide a workload prediction method and apparatus for a service in a service cluster. The method includes: obtaining n+1 indicator sequences respectively corresponding to services in a same historical time period, which include n status indicator sequences corresponding to n system status indicators and a load indicator sequence corresponding to a workload indicator; calculating a correlation coefficient of a same indicator between different services based on the n+1 indicator sequences corresponding to the services, and constructing a similarity graph corresponding to the same indicator, to obtain n+1 similarity graphs; processing the n+1 similarity graphs by using an attention mechanism, to obtain an aggregated similarity graph; performing, by using a first convolutional network, graph convolutional processing on an initial representation of each service in the aggregated similarity graph, to obtain an aggregated representation corresponding to each service; and performing workload prediction based on the aggregated representation.

IPC Classes  ?

  • G06F 11/30 - Monitoring
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

15.

PAYMENT INTERACTION PROCESSING

      
Application Number CN2025073497
Publication Number 2025/167569
Status In Force
Filing Date 2025-01-21
Publication Date 2025-08-14
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Yu, Qiulu
  • Shi, Ke
  • Chen, Zhiyuan

Abstract

Disclosed in the embodiments of the present description are a payment interaction processing method, apparatus and device, which are applicable to specified cash registers, and, which, for NFC payment modes or other similar payment modes, help to enhance the user's certainty while reducing the possibilities of user misjudgment and erroneous operations, thus further improving the user experience. A solution comprises: determining pending payment information, and, displaying the pending payment information on a cash register by means of a transfer-pending visual effect; and if a mobile terminal of a user for payment is successfully identified via a short-distance identification area contained in the cash register, transferring the pending payment information to the mobile terminal by means of a transfer in-progress visual effect, so that the mobile terminal receives the pending payment information by means of a transfer-receiving visual effect, so as to complete the payment.

IPC Classes  ?

  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices

16.

SDK INTEGRITY CHECK

      
Application Number CN2025073500
Publication Number 2025/167570
Status In Force
Filing Date 2025-01-21
Publication Date 2025-08-14
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Zhang, Wanqiao
  • Huang, Lin
  • Wang, Wenshuo

Abstract

An SDK integrity check method and apparatus, and a medium and a device. A first hash value is calculated for normative information of integrity-related files in an SDK, and the first hash value is then stored in a trusted execution environment on an electronic device, such that it can be ensured that the first hash value cannot be tampered with locally on the electronic device. In this way, the SDK then calls the trusted execution environment to perform secure and trusted integrity checking, that is, the trusted execution environment is called to determine, by means of comparison, whether the first hash value is consistent with a second hash value.

IPC Classes  ?

  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/60 - Protecting data
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

17.

DECISION MODEL TRAINING AND MINI PROGRAM INSPECTION

      
Application Number CN2025073502
Publication Number 2025/167571
Status In Force
Filing Date 2025-01-21
Publication Date 2025-08-14
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Wang, Ke
  • Meng, Changhua

Abstract

Disclosed in one or more embodiments in the present description is a decision model training method, comprising: acquiring an intent label of a user and an interaction action sequence in which the user interacts with a webpage on the basis of an intent described by the intent label; acquiring a webpage image sample that the user interacts with during the execution of the interaction action sequence; inputting the webpage image sample and the intent label into a generative model to obtain a decision result; and determining a loss function on the basis of the decision result and a decision label to update parameters of the generative model, to obtain a target decision model. The decision model provided by the method can perform automated decision-making for different mini programs so as to rapidly generate inspection paths. Accordingly, also disclosed in the description are a decision model training apparatus, and a mini program inspection method and apparatus.

IPC Classes  ?

18.

HOMOMORPHIC ENCRYPTION OPERATION METHOD AND APPARATUS, AND ELECTRONIC DEVICE

      
Application Number 18857120
Status Pending
Filing Date 2023-04-10
First Publication Date 2025-08-07
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Lu, Yufei
  • Yu, Chaofan
  • Wang, Lei
  • Zhang, Benyu
  • Zhou, Jingren

Abstract

Provided in the embodiments of the present description are a homomorphic encryption operation method and apparatus, and an electronic device. The homomorphic encryption operation method comprises: determining a homomorphic encryption operation which is to be executed on specified service data, and obtaining a base parameter and an exponent parameter of an exponentiation operation included in the homomorphic encryption operation; according to the exponent parameter, querying an exponentiation operation result cache table corresponding to the base parameter so as to obtain a result of the exponentiation operation; and according to the result of the exponentiation operation, completing the homomorphic encryption operation.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/08 - Key distribution

19.

MULTI-TASK LARGE MODEL TRAINING METHOD AND APPARATUS

      
Application Number 19041772
Status Pending
Filing Date 2025-01-30
First Publication Date 2025-08-07
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Wang, Haowen
  • Sun, Tao

Abstract

Embodiments of this specification relate to a multi-task large model training method and apparatus. The method includes: obtaining a first embedding vector corresponding to a first sample, where the first sample has a first task type; separately inputting the first embedding vector into the target network layer to perform target processing, and inputting the first embedding vector into the bypass task network to perform bypass processing, where the bypass processing includes: separately processing the first embedding vector by using the several universal adapters and a first dedicated adapter corresponding to the first task type, and performing weighted summation on processing results of the adapters, to obtain a second embedding vector; determining a prediction result based on the second embedding vector and a third embedding vector output through the target processing; and updating the bypass task network based on a loss corresponding to the prediction result.

IPC Classes  ?

  • G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
  • G06F 40/295 - Named entity recognition
  • G06F 40/30 - Semantic analysis
  • G06F 40/40 - Processing or translation of natural language
  • G06V 10/26 - Segmentation of patterns in the image fieldCutting or merging of image elements to establish the pattern region, e.g. clustering-based techniquesDetection of occlusion
  • G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
  • G06V 10/774 - Generating sets of training patternsBootstrap methods, e.g. bagging or boosting

20.

HIERARCHICAL CONTAINER ORCHESTRATION AND CONTAINER ORCHESTRATION

      
Application Number CN2025072503
Publication Number 2025/157049
Status In Force
Filing Date 2025-01-15
Publication Date 2025-07-31
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Li, Fabing
  • Liu, Weijie
  • Li, Xiang
  • Tian, Hongliang
  • Yan, Shoumeng

Abstract

Embodiments of the present description provide a hierarchical container orchestration system and a container orchestration method. In the hierarchical container orchestration system, a scheduler is removed from a general untrusted container orchestration cluster and an admission controller and a custom controller are added to generate a customized container orchestration cluster, the customized container orchestration cluster is placed in a trusted execution environment to obtain a trusted container orchestration cluster, functional modification is performed on a container runtime manager in the general untrusted container orchestration cluster to obtain an untrusted container orchestration cluster, and the trusted container orchestration cluster is superimposed on the untrusted container orchestration cluster to build the hierarchical container orchestration system. During container orchestration, the untrusted container orchestration cluster and the trusted container orchestration cluster work collaboratively to achieve secure orchestration for pods; in addition, during the collaborative work, privacy protection is performed on the interaction information between the untrusted container orchestration cluster and the trusted container orchestration cluster.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

21.

LARGE MODEL FEDERATED LEARNING METHODS AND APPARATUSES, STORAGE MEDIA, AND ELECTRONIC DEVICES

      
Application Number 19042287
Status Pending
Filing Date 2025-01-31
First Publication Date 2025-07-31
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Wu, Ruofan
  • Liu, Tengfei
  • Zhang, Tianyi
  • Wang, Weiqiang

Abstract

Described is large model federated learning applied to a server. For each participating client device, an incremental parameter is sent by the client device after the client device trains a target large model of the client device, where a model parameter of the client device includes an original parameter and an incremental parameter, a magnitude of the incremental parameter is less than a magnitude of the original parameter, the original parameter remains unchanged, and the incremental parameter changes. The incremental parameter of the client device is aggregated by using incremental parameters of all client devices to obtain an aggregation parameter returned to the client device and used to update the incremental parameter of the client device. Based on the original parameter and an updated incremental parameter, redetermining a model parameter, used until target large model convergence in retraining the target large model.

IPC Classes  ?

22.

SERVICE EXECUTION METHODS AND APPARATUSES, STORAGE MEDIA, AND ELECTRIC DEVICES

      
Application Number 19042311
Status Pending
Filing Date 2025-01-31
First Publication Date 2025-07-31
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Bao, Pengqing
  • Li, Jiani
  • Pan, Deng
  • Zhang, Tianyi

Abstract

Described is a computer-implemented method, non-transitory, computer-readable medium, and computer-implemented system for service execution. A question statement of a user determined based on a service result output by a service model is acquired. A query statement used to query, based on, which the service model outputs the service result, user data of the user is generated based on the question statement. A query result is determined. The question statement is input into a recognition model that is pre-trained, to determine an interpretation strategy used for the question statement. Based on the query result through the interpretation strategy, an association relationship is determined between at least part of the user data and the service result. A reply statement is generated for the question statement based on the association relationship, to execute a target service through the reply statement.

IPC Classes  ?

23.

MODEL TRAINING METHODS AND APPARATUSES AND TASK EXECUTION METHODS AND APPARATUSES

      
Application Number 19042469
Status Pending
Filing Date 2025-01-31
First Publication Date 2025-07-31
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Wang, Ningtao
  • Fu, Xing
  • Wang, Weiqiang

Abstract

This specification discloses methods and apparatuses for model training and a task execution. An example model training method includes: obtaining behavior sequence data; converting event data of each behavior event included in the obtained behavior sequence data into text data, to obtain behavior text data corresponding to the behavior sequence data; then, inputting the obtained behavior text data into a to-be-trained recognition model, so that the to-be-trained recognition model outputs a recognition result for the behavior sequence data as a to-be-verified result based on the input behavior text data; and training the to-be-trained recognition model with an optimization objective of minimizing a deviation between the to-be-verified result output by the recognition model and an actual recognition result corresponding to the behavior sequence data.

IPC Classes  ?

  • G06F 40/40 - Processing or translation of natural language

24.

MULTI-TASK MODEL TRAINING METHODS AND APPARATUSES, AND ELECTRONIC DEVICES

      
Application Number 19042814
Status Pending
Filing Date 2025-01-31
First Publication Date 2025-07-31
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Wang, Ningtao
  • Yang, Yang
  • Fu, Xing
  • Wang, Weiqiang

Abstract

Multi-task model training is described. Obtaining a trained multi-task model, where a parameter includes a basic parameter and a first branch parameter. Receiving an instruction for detecting output data of a question answering task branch. Adding a task detection branch to the multi-task model and obtaining a training corpus set. Training text is input into the multi-task model. Data corresponding to the first branch parameter of the question answering task branch is masked when data are generated at each neural network layer in the multi-task model and transferred to a next neural network layer to obtain a prediction result. A second branch parameter of the task detection branch is adjusted based on the label and the prediction result that corresponds to the training text to obtain a trained multi-task model.

IPC Classes  ?

25.

HIERARCHICAL CONTAINER ORCHESTRATION AND CONTAINER ORCHESTRATION

      
Application Number CN2025072500
Publication Number 2025/157048
Status In Force
Filing Date 2025-01-15
Publication Date 2025-07-31
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Liu, Weijie
  • Li, Fabing
  • Li, Xiang
  • Tian, Hongliang
  • Yan, Shoumeng

Abstract

Provided in the embodiments of the present specification are a hierarchical container orchestration system and a container orchestration method. In the hierarchical container orchestration system, a scheduler is removed from a generic untrusted container orchestration cluster and an admission controller and a custom controller are added to generate a customized container orchestration cluster, the customized container orchestration cluster is placed in a trusted execution environment to obtain a trusted container orchestration cluster, functional modifications are performed on a container runtime manager in the generic untrusted container orchestration cluster, so as to obtain an untrusted container orchestration cluster, and the trusted container orchestration cluster is superposed on the untrusted container orchestration cluster to construct the hierarchical container orchestration system. When container orchestration is performed, the untrusted container orchestration cluster and the trusted container orchestration cluster work collaboratively to realize secure orchestration for container groups while ensuring that the integrity of trusted container groups is not compromised; in addition, unified resource management is realized in the untrusted container orchestration cluster.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

26.

ACCOUNT LOGIN

      
Application Number CN2025073530
Publication Number 2025/157120
Status In Force
Filing Date 2025-01-21
Publication Date 2025-07-31
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Zhang, Wanqiao
  • Huang, Lin
  • Chen, Weiting

Abstract

Embodiments of the present description disclose an account login method and apparatus, a storage medium, and an electronic device. User equipment has a trusted execution environment, and the trusted execution environment stores an encryption key agreed on by an application party and a communication operator. An application party client sends a token application request to a communication operator server in response to an account login request, so as to cause the communication operator server to return an authentication token, and an association between the authentication token and a communication identifier bound to the user equipment is established. The trusted execution environment is called to generate encrypted data, the encrypted data being obtained by encrypting the authentication token with the encryption key. An authorization request carrying the encrypted data is sent to an application party server, so that the application party server sends the encrypted data to the communication operator server, and the communication operator server decrypts the encrypted data on the basis of a decryption key, and returns the communication identifier associated with the authentication token, ultimately causing the application party server to determine an application account associated with the communication identifier and authorize login to the application account.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols

27.

OBJECT SIMILARITY DETERMINING METHODS AND APPARATUSES, AND OBJECT RECOMMENDATION METHODS AND APPARATUSES

      
Application Number 19034173
Status Pending
Filing Date 2025-01-22
First Publication Date 2025-07-24
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Zhou, Qixian

Abstract

Embodiments of this specification provide methods and apparatuses for object similarity determining and object recommendation. In an example object similarity determining method, object cipher state representations of a first object and a second object are obtained; a representation compensation factor of an object cipher state representation relative to an object plaintext representation in a cipher state representation mode is determined; and an object similarity between the first object and the second object is determined with reference to the representation compensation factor and the object cipher state representations of the first object and the second object.

IPC Classes  ?

  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

28.

DATA SECURITY EVALUATION PROCESSING

      
Application Number CN2025072450
Publication Number 2025/152955
Status In Force
Filing Date 2025-01-15
Publication Date 2025-07-24
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Shen, Xiaodong
  • Wang, Yiqing
  • Wang, Mingli
  • Zeng, Xi
  • Yang, Yanyun
  • Hu, Shixing
  • Li, Heng
  • Xie, Xinyan
  • Gong, Yangyang
  • Lin, Wensi
  • Liu, Wei

Abstract

Embodiments of the present description provide a data security evaluation processing method and apparatus. The data security evaluation processing method comprises: when receiving an evaluation request for performing data security evaluation sent by an institution terminal, generating question-answer interaction data for performing data security evaluation on an institution, and performing question-answer interaction processing on the basis of the question-answer interaction data and the institution terminal; on the basis of question-answer confirmation data obtained by question-answer interaction processing, performing secret data security evaluation processing on the institution to obtain an evaluation result; and generating an evaluation result display page for configuring a data security interface, and sending the evaluation result display page to the institution terminal, so as to perform secret data security processing by means of the data security interface.

IPC Classes  ?

29.

LANGUAGE MODEL TRAINING METHOD AND APPARATUS BASED ON CONTINUAL PRE-TRAINING

      
Application Number 19017071
Status Pending
Filing Date 2025-01-10
First Publication Date 2025-07-17
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Jiang, Gangwei
  • Wei, Ying
  • Jiang, Caigao
  • Xue, Siqiao
  • Zhang, James
  • Hao, Hongyan
  • Feng, Xiaoyun
  • Wang, Yan
  • Pan, Chen
  • Zhou, Jun

Abstract

Embodiments of this specification provide language model training methods and apparatuses based on continual pre-training. In one example method, a soft prompt feature corresponding to each current training sample in a current domain is obtained. A latent feature corresponding to each piece of text data in the current domain is obtained. A cross-domain loss value is determined based on a difference between the obtained latent feature and a latent feature obtained based on an initial current language model in a previous domain. When a training termination condition for the current domain is not satisfied, model parameters are adjusted based on the cross-domain loss value. When a training termination condition for the current domain is satisfied, the model training process is repeated by continuing using a training sample set in a next domain, until a training termination condition for continual pre-training is satisfied.

IPC Classes  ?

30.

METHODS AND APPARATUSES FOR DETERMINING SIMILARITY BETWEEN TEXT AND VIDEO

      
Application Number 19017116
Status Pending
Filing Date 2025-01-10
First Publication Date 2025-07-17
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Yu, Xuzheng
  • Jiang, Chen
  • Liu, Hong
  • Guo, Qingpei

Abstract

Methods and apparatuses for determining a similarity between text and a video are described. In an example, an initial text feature and an initial video feature that correspond to text and a video are respectively obtained by using a text feature extraction model and a video feature extraction model. The initial text feature is processed based on a syntactic level analysis result of the text, to obtain text features that correspond to elements in the syntactic level analysis result. A video level analysis result corresponding to the syntactic level analysis result is constructed based on a degree of matching between the text features and the initial video feature. Video features corresponding to elements in the video level analysis result are obtained. A similarity between the text and the video is determined based on a similarity between a text feature and a video feature corresponding to elements in a corresponding level.

IPC Classes  ?

  • G06V 20/40 - ScenesScene-specific elements in video content
  • G06F 40/211 - Syntactic parsing, e.g. based on context-free grammar [CFG] or unification grammars

31.

METHOD AND APPARATUS FOR DEVICE MANAGEMENT IN TARGET OPERATING SYSTEM

      
Application Number 19017148
Status Pending
Filing Date 2025-01-10
First Publication Date 2025-07-17
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Peng, Yuke
  • Tian, Hongliang
  • Yan, Shoumeng
  • Zhang, Yinqian

Abstract

Embodiments of this specification provide a method and an apparatus for device management in a target operating system. The target operating system is written in a Rust language. The Rust language includes an unsafe keyword. The method relates to a device driver of a peripheral device and a device management module. The method includes: receiving, by an interface module in the device management module, a target request sent by the device driver, where the target request is an operation request related to interrupt configuration or access of the peripheral device, and the interface module includes no code segment using the unsafe keyword; performing, by the interface module, a security check related to the operation request; and after the security check succeeds, performing, by a kernel code module in the device management module, a target operation corresponding to the operation request by using code that includes the unsafe keyword.

IPC Classes  ?

  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs

32.

METHOD AND APPARATUS FOR MEMORY MANAGEMENT IN TARGET OPERATING SYSTEM

      
Application Number 19017145
Status Pending
Filing Date 2025-01-10
First Publication Date 2025-07-17
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Peng, Yuke
  • Tian, Hongliang
  • Yan, Shoumeng
  • Zhang, Yinqian

Abstract

Embodiments of this specification provide a method and an apparatus for memory management in a target operating system. The target operating system is written in a Rust language. The Rust language includes an unsafe keyword. The method is performed by a memory management module. The memory management module includes a management interface module and a kernel code module. The method includes: receiving, by the management interface module, a memory request sent by program code, where neither the program code nor the management interface module includes a code segment using the unsafe keyword; and when target security assurance is ensured based on the management interface module, performing, by the kernel code module, a memory operation corresponding to the memory request by using code that includes the unsafe keyword, where the target security assurance is related to the memory operation.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory

33.

METHOD AND APPARATUS FOR MANAGING USER-MODE PROGRAM IN TARGET OPERATING SYSTEM

      
Application Number 19017158
Status Pending
Filing Date 2025-01-10
First Publication Date 2025-07-17
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Peng, Yuke
  • Tian, Hongliang
  • Yan, Shoumeng
  • Zhang, Yinqian

Abstract

Embodiments of this specification provide a method and an apparatus for managing a user-mode program in a target operating system. The target operating system is written in a Rust language. The Rust language includes an unsafe keyword. The method includes: in response to a kernel processing program requesting, by calling an interface function, to enter a user mode to execute a target program, confirming, by the user-mode interface module, security of a register access related to the request, where the kernel processing program is located at a non-privilege level and has no permission to use the unsafe keyword, and the user-mode interface module does not include the unsafe keyword; and activating, by the basic code module, a target page table corresponding to the target program through the register access by using first code that includes the unsafe keyword, and setting a mode of the operating system to the user mode.

IPC Classes  ?

  • G06F 8/30 - Creation or generation of source code

34.

DETECTION OF GENERATED IMAGE

      
Application Number CN2025070194
Publication Number 2025/146094
Status In Force
Filing Date 2025-01-02
Publication Date 2025-07-10
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Hong, Yan
  • Lan, Jun
  • Zhu, Huijia
  • Wang, Weiqiang

Abstract

One or more embodiments of the present description disclose a detection method and apparatus for a generated image. The method comprises: first, acquiring a target image; second, selecting a partial image of the target image, and reconstructing the partial image on the basis of the remaining image of the target image except the partial image, so as to acquire a reconstructed image consisting of the remaining image and the reconstructed partial image; then, inputting the reconstructed image into a pre-trained classification model to obtain a reconstruction effect category of the reconstructed image; and finally, on the basis of the reconstruction effect category of the reconstructed image, determining whether the target image is a real image or a generated image.

IPC Classes  ?

  • G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects

35.

NODE ELECTION VOTING METHODS AND APPARATUSES BASED ON CONSENSUS SYSTEM

      
Application Number 18852695
Status Pending
Filing Date 2023-03-31
First Publication Date 2025-07-10
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Liao, Xiaojun
  • Zhou, Meng
  • Zhang, Zigang
  • Fu, Zhisong
  • Hong, Chuntao

Abstract

Embodiments of this specification provide node election voting methods and apparatuses based on a consensus system. The consensus system includes a first node device and a second node device, and a master node device. When determining that the master node device is not in a working state, the first node device sends a first pre-election message. When receiving the first pre-election message, the second node device stores the first pre-election message in a cache. When determining that the master node device is still in the working state, the second node device maintains a waiting state of the first pre-election message in the cache; and when determining that the master node device is not in the working state, the second node device sends a pre-voting message to the corresponding first node device, so that the first node device sends a formal first election message to another node device.

IPC Classes  ?

  • H04L 41/00 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
  • H04L 43/0805 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability

36.

METHODS AND APPARATUSES FOR MULTI-PARTY JOINT DATA PROCESSING TO PROTECT DATA PRIVACY

      
Application Number 18871391
Status Pending
Filing Date 2023-08-09
First Publication Date 2025-07-10
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Pan, Wuqiong
  • Feng, Haonan
  • Qian, Zhongtian
  • Li, Tianyi
  • Hu, Yongtao

Abstract

Embodiments of this specification provide methods and apparatuses for multi-party joint data processing to protect data privacy. The method is performed by the ith party, and includes: acquiring two calculation fragments corresponding to the ith party from three calculation fragments obtained by dividing calculation data; determining a first result fragment of a product result of the target data and the calculation data based on the fragment sum value, the specified fragment, and the two calculation fragments, and sending the first result fragment to a next participating party of the ith party; and receiving a second result fragment of the product result from a previous participating party of the ith party, where the second result fragment is determined by the previous participating party based on a fragment sum value and a specified fragment that are held by the previous participating party, and two calculation fragments corresponding to the previous participating party.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

37.

Method and apparatus for calculating contrastive loss through multiple graphics processing units

      
Application Number 19009785
Status Pending
Filing Date 2025-01-03
First Publication Date 2025-07-10
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Xu, Furong
  • Zhang, Hanxiao
  • Guo, Qingpei
  • Yang, Ming

Abstract

Embodiments of this specification provide a method and apparatus for calculating contrastive loss through multiple graphics processing units. The method includes: processing a feature of a target batch of samples through N graphics processing units divided into M processing unit groups, where each processing unit group includes one or more graphics processing units; separately determining, by each processing unit group, a partial feature similarity between features processed by a graphics processing unit, and storing the partial feature similarity into a corresponding video memory of the graphics processing unit included in the processing unit group; separately determining, according to the partial feature similarity stored in the corresponding video memory of the graphics processing unit included in each processing unit group, group contrastive loss corresponding to each processing unit group; and determining overall contrastive loss according to the group contrastive loss corresponding to each processing unit group.

IPC Classes  ?

  • G06T 1/20 - Processor architecturesProcessor configuration, e.g. pipelining
  • G06V 10/74 - Image or video pattern matchingProximity measures in feature spaces

38.

DATA STORAGE METHOD AND APPARATUSE, AND DATA READING METHOD AND APPARATUSE

      
Application Number 18842724
Status Pending
Filing Date 2023-01-06
First Publication Date 2025-07-03
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Zhang, Da

Abstract

Embodiments of this specification provide a data storage method and apparatus, and a data reading method and apparatus. The data storage method is applied to a knowledge graph platform, and includes: splitting target knowledge graph data, to determine at least two pieces of to-be-stored target subgraph data, where the target knowledge graph data include a target entity node and at least one edge associated with the target entity node, and each piece of to-be-stored target subgraph data includes the target entity node and an edge with at least one target attribute; and storing the at least two pieces of to-be-stored target subgraph data in at least two consecutive data blocks based on an edge attribute, where an end entity identifier of to-be-stored target subgraph data stored in a previous data block is the same as a start entity identifier of to-be-stored target subgraph data stored in a current data block.

IPC Classes  ?

  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/901 - IndexingData structures thereforStorage structures

39.

METHOD AND APPARATUS FOR PERFORMING DATA FRAGMENTATION ON KNOWLEDGE GRAPH

      
Application Number 18850921
Status Pending
Filing Date 2023-01-04
First Publication Date 2025-07-03
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Wan, Xiaopei

Abstract

Embodiments of this specification provide methods and apparatuses for performing data fragmentation on a knowledge graph. The method is used to split a knowledge graph into a plurality of pieces of data respectively included in a plurality of devices. First, initial splitting is performed on a plurality of edges in the knowledge graph. Any first device selects a diffusion node from end nodes of a first part of edges; obtains, as a to-be-fragmented edge, an edge that is in the knowledge graph and that uses the diffusion node as an end node on one side; and adds a target edge in the to-be-fragmented edge to first fragmented data of the first device. Then, the first device obtains a fragmented node in fragmented data of another device; adjusts the first diffusion velocity; and continues to select a diffusion node based on an adjusted first diffusion velocity, and cyclically performs the step.

IPC Classes  ?

  • G06N 5/043 - Distributed expert systemsBlackboards

40.

MODEL OWNERSHIP VERIFICATION METHODS AND APPARATUSES, STORAGE MEDIA, AND ELECTRONIC DEVICES

      
Application Number 18871767
Status Pending
Filing Date 2023-08-02
First Publication Date 2025-07-03
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Li, Yiming
  • Liu, Yan
  • Zhu, Linghui
  • Weng, Haiqin
  • Jiang, Yong
  • Xia, Shutao

Abstract

This specification discloses model ownership verification methods and apparatuses, storage media, and electronic devices. The method includes: adding a specified feature to an original sample without adjusting an annotation of the original sample, to cause an annotation of an adjusted sample to be the same as the annotation of the original sample corresponding to the adjusted sample, and in a case that ownership of the model to be verified cannot be determined through the annotations, determining whether a sample for training a model to be verified comes from an edge node based on a gradient obtained by inputting the adjusted sample into the model to be verified and a gradient obtained by inputting the adjusted sample into a benign model trained through the original sample.

IPC Classes  ?

41.

MODEL SERVICE PROVIDING METHOD AND APPARATUS CAPABLE OF PROTECTING DATA PRIVACY

      
Application Number CN2024125976
Publication Number 2025/139250
Status In Force
Filing Date 2024-10-21
Publication Date 2025-07-03
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Lu, Wenjie
  • Huang, Zhicong
  • Hong, Cheng

Abstract

Embodiments of the present description provide a model service providing method and apparatus capable of protecting data privacy, and relates to a client and a server, wherein the server deploys a prediction model, and the prediction model comprises a first hidden layer provided with an activation function. The method comprises: on the basis of a first shard of a function input of an activation function, n-1 demarcation values of n segmentation intervals, and a second shard correspondingly hold by a client, a server performs MPC size comparison calculation n-1 times, so as to obtain n first shards of n hit results of the function input for the n segmentation intervals; on the basis of total n+1 first shards respectively corresponding to the function input and the n hit results, n interval functions corresponding to the n segmentation intervals, and n+1 second shards correspondingly hold by the client, the server performs MPC to obtain a first shard of a function output of a segmentation function formed by the n interval functions, wherein the segmentation function is used for fitting the activation function, and at least one of the n interval functions is in a high-order polynomial form.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

42.

COMPUTING TASK PROCESSING METHOD AND APPARATUS

      
Application Number 18936771
Status Pending
Filing Date 2024-11-04
First Publication Date 2025-07-03
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Qin, Wei
  • Wu, Xiabao
  • Liu, Yongchao

Abstract

Implementations of the present specification provide a computing task processing method and apparatus. In the computing task processing method, a first computing task can be obtained, and the first computing task includes a first operator execution logic graph used for task computing; operator reconstruction is performed on the first operator execution logic graph based on an operator dependency in the first operator execution logic graph and a data cache capacity for operator computing, to obtain a second operator execution logic graph; and a second computing task including the second operator execution logic graph is provided to a task execution apparatus for execution by the task execution apparatus.

IPC Classes  ?

  • G06F 9/52 - Program synchronisationMutual exclusion, e.g. by means of semaphores
  • G06N 3/08 - Learning methods

43.

METHOD AND APPARATUS FOR TRAINING RISK IDENTIFICATION MODEL

      
Application Number CN2024125980
Publication Number 2025/139251
Status In Force
Filing Date 2024-10-21
Publication Date 2025-07-03
Owner
  • TSINGHUA UNIVERISITY (China)
  • ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Li, Qi
  • Wang, Ningtao
  • Wang, Ye
  • Liu, Yunpeng
  • Li, Peiyang
  • Fu, Xing
  • Xu, Ke
  • Wang, Weiqiang

Abstract

The embodiments of the present specification relate to a method and apparatus for training a risk identification model. The method comprises: first, acquiring a first sample set having hard labels and a second sample set having no label, wherein any sample set comprises transaction samples, and each hard label indicates whether a transaction is a risk transaction; then, performing sample enhancement on the first sample set on the basis of an interpolation method, and using the enhanced first sample set to perform training, so as to obtain a first model; subsequently, inputting, into the first model, transaction samples in a complete sample set formed by the first sample set and the second sample set, so as to obtain soft labels concerning risk prediction; finally, inputting the transaction samples in the first sample set into a second model, and determining a first loss on the basis of the hard labels; inputting the transaction samples in the complete sample set into the second model, and determining a second loss on the basis of the soft labels; and training the second model on the basis of a total predicted loss determined by means of the first loss and the second loss, wherein the second model is used for predicting whether each transaction is a risky transaction.

IPC Classes  ?

  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting

44.

CODE ANALYSIS

      
Application Number CN2024128976
Publication Number 2025/139355
Status In Force
Filing Date 2024-10-31
Publication Date 2025-07-03
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Fan, Gang
  • Xie, Xiaoheng
  • Liang, Yinan
  • Li, Shijie
  • Li, Haokun
  • Chen, Xinyu
  • Di, Peng
  • Xiao, Xiao

Abstract

The embodiments of the present description provide a code analysis method and apparatus. The code analysis method comprises: in the process of performing code analysis on a program code, firstly acquiring an analysis task of performing code analysis on the program code; then, on the basis of a code structure type corresponding to the analysis task, determining from a relational database a data table storing code structure data of the program code under the code structure type; next, performing code structure data reading and data structure relationship reading in the data table, so as to obtain the code structure data and a data structure relationship; and finally, analyzing and processing the code structure data and the data structure relationship according to a code analysis mode of the analysis task, so as to obtain a code analysis result.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

45.

DATA QUERY METHOD AND QUERY ENGINE

      
Application Number 18971741
Status Pending
Filing Date 2024-12-06
First Publication Date 2025-06-26
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Lin, Litao

Abstract

A data query method is performed by a query engine, and includes: receiving a user query, wherein the user query includes an SQL query statement and a Gremlin graph query statement embedded into the SQL query statement, the Gremlin graph query statement indicates to perform matching on one or more types of graph elements in a target graph, and the one or more types of graph elements include at least one of a point type, an edge type, or a path type; parsing the user query, to determine an execution plan; and performing a data query based on the execution plan.

IPC Classes  ?

46.

METHOD AND APPARATUS FOR UPDATING KNOWLEDGE GRAPH

      
Application Number 18849346
Status Pending
Filing Date 2023-01-04
First Publication Date 2025-06-26
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Gui, Zhengke

Abstract

The disclosure provides a method and an apparatus for updating a knowledge graph. In a process of providing knowledge graph-based data support for a current service, a knowledge graph is updated by combining online and offline manners. The knowledge graph is constructed offline by using full service data, and full entity linking and entity normalization are performed to initialize the knowledge graph. An incremental update condition is set to perform a plurality of rounds of incremental update. During one round of incremental update, real-time linking is performed based on service data generated in real time, to provide online knowledge graph update; and when the preset incremental update condition is met, incremental linking is performed based on service data newly added in a current incremental update period, to provide offline knowledge graph update and use an updated knowledge graph as an initial knowledge graph in a next round of incremental update.

IPC Classes  ?

  • G06N 5/022 - Knowledge engineeringKnowledge acquisition

47.

METHOD FOR MANAGING DISTRIBUTED DATABASE, DEVICE, AND STORAGE MEDIUM

      
Application Number 18935220
Status Pending
Filing Date 2024-11-01
First Publication Date 2025-06-26
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Yuan, Xiaohua

Abstract

Implementations of the present specification provide a method for managing a distributed database, a device, and a storage medium. The distributed database includes a plurality of storage nodes, the plurality of storage nodes are divided into a plurality of node groups, and each node group includes at least one storage node configured to store a data copy corresponding to the data. The method includes: receiving a data access request for the data stored in the distributed database; and determining, in response to the data access request, whether a target node group on which an online operation or maintenance task is being executed exists in the plurality of node groups; and allocating the data access request to storage nodes in node groups other than the target node group for execution in response to that the target node group exists in the plurality of node groups. Through the above manner, the distributed database can also provide an external data access service while the operation or maintenance task is executed on the distributed database.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

48.

GRAPH DATA PARTITIONING METHODS AND APPARATUSES

      
Application Number 18946421
Status Pending
Filing Date 2024-11-13
First Publication Date 2025-06-26
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Li, Mingyao
  • Chen, Likang

Abstract

Method, apparatus and computer-readable media are provided. During graph data partitioning, graph nodes in graph data are partitioned based on degrees of the graph nodes according to a computing load balancing allocation algorithm, such that the graph nodes are partitioned as primary graph nodes into graph data partitions. Subsequently, edge data of associated edges of the primary graph nodes are allocated to corresponding graph data partitions, where the associated edges include outgoing edges and/or incoming edges. Additionally, for an associated edge of a primary graph node, a replica of another graph node that corresponds to the primary graph node for the associated edges is constructed to be stored as a mirror graph node in the graph data partition corresponding to the primary graph node.

IPC Classes  ?

  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
  • G06F 16/901 - IndexingData structures thereforStorage structures

49.

METHODS AND APPARATUSES FOR STORING GRAPH DATA OF A RELATIONSHIP NETWORK GRAPH

      
Application Number 18956847
Status Pending
Filing Date 2024-11-22
First Publication Date 2025-06-26
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Zeng, Xintan
  • Liu, Yongchao

Abstract

A computer implemented method for graph data storage includes acquiring connection relationship information between any two nodes in a relationship network graph including a directed connecting edge between nodes. Based on the connection relationship information, a first mapping relationship between an identifier of each node and a node identifier of an outgoing edge-connected node of the node in a compressed sparse row format is stored. A second mapping relationship between the identifier of each node and a node identifier of an incoming edge-connected node of the node in a compressed sparse column format is stored. A set of attribute information in the relationship network graph is acquired, where the set of attribute information comprises several node attributes, several edge attributes, and/or several pieces of temporary information. Using column storage, storing each attribute value of a same attribute in the set of attribute information in continuous space.

IPC Classes  ?

  • H03M 7/30 - CompressionExpansionSuppression of unnecessary data, e.g. redundancy reduction

50.

METHODS FOR ALLOCATING MEMORY OF DATABASE, COMPUTER-READABLE MEDIA, AND STORAGE ENGINES

      
Application Number 18980580
Status Pending
Filing Date 2024-12-13
First Publication Date 2025-06-26
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Huang, Hua
  • Zhu, Bingpeng

Abstract

Computer-implemented methods, devices and storage media are described for allocating a memory of a database. The database includes a storage engine for data storage based on a log-structured merge (LSM) tree, and at least one database instance. The memory is configured to store data in a MemTable and an immutable MemTable respectively corresponding to the at least one database instance. An example method includes: determining a quantity of data stored in each database instance in the database in a historical period; predicting a memory needed by each database instance in a next period, where the memory needed by the database instance in the next period is positively correlated with the quantity of data stored in the database instance in the historical period; and allocating the memory for each database instance in the next period based on the predicted memory needed by the database instance in the next period.

IPC Classes  ?

  • G06F 12/02 - Addressing or allocationRelocation
  • G06F 16/22 - IndexingData structures thereforStorage structures

51.

METHOD AND APPARATUS FOR TRAINING TEXT CLASSIFICATION MODEL, AND MEDIUM AND ELECTRONIC DEVICE

      
Application Number CN2024127362
Publication Number 2025/130342
Status In Force
Filing Date 2024-10-25
Publication Date 2025-06-26
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Lu, Jinxing
  • Chen, Huan
  • Zhao, Zhiyuan
  • Zhao, Jianying

Abstract

Disclosed in the present description are a method and apparatus for training a text classification model, and a medium and an electronic device. The method comprises: determining a text sample, and determining a plurality of pre-trained teacher models; then, according to an ascending order of parameter counts of the teacher models, sequentially for each teacher model, inputting the text sample into the teacher model to determine a pseudo-labeling result, inputting the text sample into a student model to be trained to determine a classification result, and training said student model at least on the basis of the pseudo-labeling result obtained on the basis of the teacher model, and the classification result; and then, using the trained student model as a text classification model. By means of teachers guiding the training of a student model, the text representation capability and classification accuracy of a text classification model are improved.

IPC Classes  ?

52.

METHODS AND APPARATUSES FOR EXECUTING GPU TASK IN CONFIDENTIAL COMPUTE ARCHITECTURE

      
Application Number 18980904
Status Pending
Filing Date 2024-12-13
First Publication Date 2025-06-19
Owner
  • Alipay (Hangzhou) Information Technology Co., Ltd. (China)
  • Southern University Of Science And Technology (China)
Inventor
  • Zhang, Fengwei
  • Wang, Chenxu
  • Deng, Yunjie
  • Yan, Shoumeng
  • He, Zhengyu

Abstract

A graphics processing unit (GPU) task is executed in a confidential compute architecture. GPU software in a non-secure world configures, based on task code and a cache description of a GPU task, a stub data structure including cache areas allocated based on the cache description and metadata indicating each cache area. In a realm segment in a memory, a root world root monitor configures a real data structure corresponding to the stub data structure, and stores to-be-processed confidential data. The root monitor updates a granule protection table (GPT) table so that based on an updated GPT table, a target segment storing the metadata and the task code is accessible to a GPU and has realm world permission for all other objects. The root monitor modifies a target mapping relationship so that the GPU executes the GPU task by using the target segment and the real data structure.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

53.

IDENTITY INFORMATION PROCESSING METHOD, APPARATUS AND DEVICE, AND MEDIUM

      
Application Number CN2024126117
Publication Number 2025/123928
Status In Force
Filing Date 2024-10-21
Publication Date 2025-06-19
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Xue, Shaojia

Abstract

Disclosed in embodiments of the present description are an identity information processing method, apparatus and device, and a medium. The method may comprise: acquiring an information acquisition request sent by a first application server and used for acquiring identity information of a target user in a first application; on the basis of the information acquisition request, searching for first identity information of the target user in a second application, the first identity information being identity information determined by a second application server during use of the second application by the target user; and sending the first identity information to the first application server, so that the first application server generates second identity information of the target user in the first application on the basis of the first identity information.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

54.

AUTHENTICATION METHOD AND APPARATUS, AND READABLE STORAGE MEDIUM AND ELECTRONIC DEVICE

      
Application Number CN2024128073
Publication Number 2025/123964
Status In Force
Filing Date 2024-10-29
Publication Date 2025-06-19
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Zhang, Rui

Abstract

The present invention relates to an authentication method and apparatus, and a readable storage medium and an electronic device. The authentication method is applied to a server, and a first aspect program is pre-injected at a first predefined pointcut of the server. The authentication method comprises: when a client accesses a server, receiving an access request which is sent by the client and is used for accessing the server, wherein the access request carries identity information of the client (S110); a first aspect program determining the identity of the client on the basis of the identity information of the client, determining an access permission of the client on the basis of the identity of the client, and then acquiring access data on the basis of the access permission of the client (S120); and sending the access data to the client (S130). In the authentication method and apparatus, and readable storage medium and electronic device in the present description, an authentication function is realized by means of aspect programs pre-injected at predefined pointcuts of a client and a server, so that the authentication function is decoupled from other functions of the server, thereby preventing the other functions from being interfered with, and privacy data leakage can be prevented by means of authentication.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

55.

ANOMALY DETECTION MODEL TRAINING METHOD AND DEVICE

      
Application Number CN2024128632
Publication Number 2025/123983
Status In Force
Filing Date 2024-10-30
Publication Date 2025-06-19
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor He, Dongyue

Abstract

Embodiments of the present description provide an anomaly detection model training method and device. The anomaly detection model training method comprises: after obtaining first institution description data for model training under a preset institution category, on the basis of the preset institution category and at least one of the data type and description type of the first institution description data, selecting an anomaly detection unit in an anomaly detection unit set, and on the basis of the anomaly detection unit, constructing a model to be trained; and on the basis of the first institution description data, performing model training on said model to obtain an anomaly detection model, so as to perform anomaly detection processing on second institution description data under the preset institution category by means of the anomaly detection model.

IPC Classes  ?

56.

MODEL TRAINING AND SERVICE EXECUTION

      
Application Number CN2024128662
Publication Number 2025/123985
Status In Force
Filing Date 2024-10-30
Publication Date 2025-06-19
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Liu, Fangqing

Abstract

Disclosed in the present description are a model training method and apparatus, a service execution method and apparatus, and a storage medium and a device. A server can obtain a second feature extraction model by means of two-stage training, so as to adjust, by means of the second feature extraction model, a structured feature representation, which is output by a first feature extraction model, thereby reducing the difference between the structured feature representation, which is output by the first feature extraction model, and a text feature representation corresponding to text data required by a text generation model, and thus the accuracy of a result of service execution performed by means of the text generation model can be improved.

IPC Classes  ?

  • G06F 18/213 - Feature extraction, e.g. by transforming the feature spaceSummarisationMappings, e.g. subspace methods
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting

57.

BLUETOOTH POSITIONING METHOD AND SYSTEM AND BLUETOOTH DEVICE

      
Application Number CN2024127008
Publication Number 2025/123946
Status In Force
Filing Date 2024-10-24
Publication Date 2025-06-19
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Liu, Fuhu

Abstract

Disclosed in embodiments of the present application is a Bluetooth positioning method, comprising: binding at least one second device in a positioning APP of a first device; the second device broadcasts a Bluetooth signal; in response to the scanned Bluetooth signal, the first device performs positioning to obtain location information; the first device uploads the location information to a distributed storage center; and in response to a search operation of a user on the second device in the positioning APP, the positioning APP obtains the location information from the distributed storage center by means of an APP server, and uses the location information as the location information of the second device. The present method provides an open positioning solution, which is not limited to a specific terminal or APP, so that the Bluetooth positioning method can be applicable to more scenarios. The system and the device in the embodiments of the present application also have the described beneficial effect.

IPC Classes  ?

  • H04W 4/02 - Services making use of location information

58.

INFORMATION SELF-VERIFICATION

      
Application Number CN2024127256
Publication Number 2025/123948
Status In Force
Filing Date 2024-10-25
Publication Date 2025-06-19
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Lu, Junyi

Abstract

Disclosed in the embodiments of the present description are an information self-verification method and system, and an electronic device and a medium. The information self-verification method comprises: acquiring user information; performing fraud risk detection on the user information to obtain a fraud risk degree corresponding to a user; on the basis of the fraud risk degree, extracting text information, image features and user behavior auxiliary information that correspond to the user information; and on the basis of a multi-modal large model, performing fusion processing on the text information, the image features and the user behavior auxiliary information to generate a self-verification result corresponding to the user. The embodiments of the present description improve the accuracy and effectiveness of a self-verification system.

IPC Classes  ?

  • G06Q 40/03 - CreditLoansProcessing thereof
  • G06V 10/80 - Fusion, i.e. combining data from various sources at the sensor level, preprocessing level, feature extraction level or classification level
  • G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
  • G06V 30/10 - Character recognition
  • G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism

59.

VIDEO BITRATE CALCULATION METHOD AND SYSTEM

      
Application Number CN2024128640
Publication Number 2025/123984
Status In Force
Filing Date 2024-10-30
Publication Date 2025-06-19
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Yang, Jianxing

Abstract

Disclosed in the embodiments of the present description are a video bitrate calculation method and system. The method comprises: acquiring a frame rate and a bitrate of a source video, and acquiring a frame rate of a target video; on the basis of the frame rate of the source video and the frame rate of the target video, obtaining a mapping frame rate of the target video by means of calculation; and on the basis of the mapping frame rate of the target video and the frame rate and bitrate of the source video, obtaining a first bitrate of the target video by means of calculation. The system comprises: a frame rate and bitrate acquisition module, which is used for acquiring a frame rate and a bitrate of a source video, and acquiring a frame rate of a target video; a mapping frame rate calculation module, which is used for obtaining, on the basis of the frame rate of the source video and the frame rate of the target video, a mapping frame rate of the target video by means of calculation; and a first bitrate calculation module, which is used for obtaining, on the basis of the mapping frame rate of the target video and the frame rate and bitrate of the source video, a first bitrate of the target video by means of calculation.

IPC Classes  ?

  • H04N 19/146 - Data rate or code amount at the encoder output
  • H04N 21/2662 - Controlling the complexity of the video stream, e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities

60.

REPLICA EXPANSION METHODS, APPARATUSES, AND SYSTEMS FOR DISTRIBUTED GRAPH DATABASE

      
Application Number 18943228
Status Pending
Filing Date 2024-11-11
First Publication Date 2025-06-12
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Yuan, Xiaohua

Abstract

A computer-implemented method for distributed graph database replica expansion and performed by a second data storage data node to be expanded includes, in response to reception of graph data migration information, entering a data copy-only mode and initiating graph data migration from a first data storage node to obtain a data snapshot of a first graph data shard. Following graph data migration, entering a data storage service mode and sending a graph data shard deletion notification to the first data storage node to delete the first graph data shard. In the data storage service mode, performing data synchronization with a corresponding first graph data shard of a primary replica based on a data point in the data snapshot. The first data storage node deletes a migrated graph data shard in response to the graph data shard deletion notification.

IPC Classes  ?

  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/901 - IndexingData structures thereforStorage structures

61.

DATA WRITING METHOD, RECOVERY METHOD, AND READING METHOD, AND CORRESPONDING APPARATUS

      
Application Number 18936791
Status Pending
Filing Date 2024-11-04
First Publication Date 2025-06-12
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Tian, Hongliang
  • Chen, Qingsong
  • Song, Shaowei
  • Yan, Shoumeng

Abstract

Implementations of the present specification provide a data writing, data recovery, and data reading method, and a corresponding secure disk apparatus. The data writing method includes following: User data blocks are first written into a write cache, and a plurality of user data blocks identified by LBAs are read from the write cache under a certain condition. For each user data block, an HBA is allocated to the user data block, authenticated encryption is performed on the user data block to generate an encrypted data block and authentication information, and first metadata corresponding to the user data block is generated, where the first metadata is organized in a form of a KV pair and includes the LBA, the HBA, and the authentication information. A plurality of write commands for the plurality of user data blocks are submitted to a host disk for the disk to store the encrypted data block based on the corresponding HBA. In addition, the first metadata corresponding to each user data block is further written into a first metadata table maintained by using an LSM tree. Then, a synchronization operation command is sent to the LSM tree and the host disk for the LSM tree and the host disk to complete data write persistence.

IPC Classes  ?

  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 21/60 - Protecting data
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

62.

USER AUTHENTICATION INFORMATION-BASED REGISTRATION METHOD AND APPARATUS AND USER AUTHENTICATION INFORMATION-BASED QUERY METHOD AND APPARATUS

      
Application Number 18975603
Status Pending
Filing Date 2024-12-10
First Publication Date 2025-06-12
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Wu, Zhenghao
  • Cui, Jinming
  • Liang, Xiaojian
  • Duan, Pu

Abstract

Embodiments of this specification provide a user authentication information-based registration method and apparatus and a user authentication information-based query method and apparatus. The registration method includes: User equipment receives authentication information submitted by a first user in a process of registering with a server; obtains a public-private key pair by using a key generation algorithm and based on the random number r and a public parameter pp; performs a hash operation based on at least the password pwd, to obtain a user key value user_key; obtains a registration ciphertext Cregister by using an encryption algorithm and based on the public key pk and the user key value user_key; obtains, based on the private key sk and the registration ciphertext Cregister, a determining trapdoor tdregister that matches the registration ciphertext Cregister; and uploads the registration ciphertext Cregister and the determining trapdoor tdregister to the server.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/08 - Key distribution
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

63.

RISK CONTROL METHOD AND SYSTEM BASED ON DIFFERENTIAL PRIVACY, ELECTRONIC DEVICE, AND STORAGE MEDIUM

      
Application Number CN2024127761
Publication Number 2025/118873
Status In Force
Filing Date 2024-10-28
Publication Date 2025-06-12
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Wang, Fengping
  • Wang, Kai
  • Fei, Binjie

Abstract

One or more embodiments of the present description provide a risk control method and system based on differential privacy, an electronic device, and a storage medium. The risk control method comprises: generating or receiving a risk control strategy, and obtaining a credit limit of a user on the basis of the risk control strategy; receiving a query request of a risk control data demander, wherein the query request comprises a user identifier and a credit limit to be granted; generating a confusion value and an associated probability, and obtaining a confusion credit limit for the corresponding user on the basis of the query request, the credit limit, the confusion value, and the associated probability; and comparing the confusion credit limit with the credit limit to be granted, and generating a response to the query request on the basis of the comparison result. The risk control system comprises a strategy component, a query receiving component, a privacy protection component, and a response component.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

64.

KNOWLEDGE GRAPH CONSTRUCTION AND GRAPH COMPUTING

      
Application Number 18842582
Status Pending
Filing Date 2023-01-10
First Publication Date 2025-06-05
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Tang, Kun
  • Yi, Peng

Abstract

According to an example, each piece of first-type service data is modeled as a vertex in a graph; each piece of second-type service data is modeled as an edge in the graph; a structural feature value corresponding to each vertex is obtained based on a predetermined structural feature corresponding to the first-type service data; a structural feature value corresponding to each edge is obtained based on a predetermined structural feature corresponding to the second-type service data, where the structural feature is a feature commonly used in at least two application scenarios; and modeling is performed by using each vertex, the structural feature value of the vertex, each edge, and the structural feature value of the edge, to obtain a structural graph, where each vertex and each edge in the structural graph are mounted with corresponding structural feature values.

IPC Classes  ?

  • G06N 5/022 - Knowledge engineeringKnowledge acquisition

65.

SHARD STORAGE METHOD AND APPARATUS FOR GRAPH AND SUBGRAPH SAMPLING METHOD AND APPARATUS FOR GRAPH

      
Application Number 18966490
Status Pending
Filing Date 2024-12-03
First Publication Date 2025-06-05
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Zhu, Zhongshu

Abstract

Embodiments of this specification provide a shard storage method and apparatus for a graph and a subgraph sampling method and apparatus for a graph. In a distributed storage process of a graph, local identifiers of a vertex and an edge are implicitly stored, and data is stored in an ordered manner, so that the local identifiers of the vertex and the edge can be implicitly calculated. A connecting edge is stored in a CSR format, to ensure that a first-order neighbor of a node is contiguously stored in a memory. In this way, there can be a higher data loading speed and lower memory occupation.

IPC Classes  ?

  • G06N 3/04 - Architecture, e.g. interconnection topology

66.

TIME SERIES MODEL TRAINING METHODS AND APPARATUSES, AND MEMORY MANAGEMENT METHODS AND APPARATUSES

      
Application Number 18968464
Status Pending
Filing Date 2024-12-04
First Publication Date 2025-06-05
Owner Alipay ( Hangzhou ) Information Technology Co., Ltd. (China)
Inventor Zheng, Guangjie

Abstract

A time series model training method, includes: obtaining a historical memory sequence collected by using a memory management module, wherein the historical memory sequence includes a plurality of memory use amounts arranged in a time sequence, each memory use amount is a maximum memory use amount in a corresponding time period, and the maximum memory use amount is obtained through collection for an off-heap memory of a Java virtual machine; and training a time series model based on the historical memory sequence, to obtain the trained time series model to forecast a memory use amount in a future time period.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

67.

PAN-IDENTITY AUTHENTICATION METHOD AND SYSTEM

      
Application Number CN2024126012
Publication Number 2025/112970
Status In Force
Filing Date 2024-10-21
Publication Date 2025-06-05
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Ren, Xiang

Abstract

In a pan-identity authentication method and system provided by the present description, after receiving a pan-identity authentication request corresponding to a target user, a computing device may determine at least one authentication question corresponding to a target pan-identity, and obtain an answer of the target user to the at least one authentication question, so as to authenticate whether the target user has the target pan-identity on the basis of the answer. The present description achieves effective pan-identity authentication in a question and answer mode, thereby improving the accuracy of authentication results. Furthermore, the target user can only publish content related to the pan-identity thereof that has passed the authentication, thereby improving the content publishing quality.

IPC Classes  ?

68.

LARGE LANGUAGE MODEL-BASED KNOWLEDGE MINING METHOD AND APPARATUS

      
Application Number 18968606
Status Pending
Filing Date 2024-12-04
First Publication Date 2025-06-05
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Gan, Chunjing
  • Hu, Binbin
  • Yang, Dan
  • Liu, Ziqi
  • Shen, Yue
  • Zhang, Zhiqiang
  • Gu, Jinjie
  • Zhou, Jun
  • Zhang, Guannan

Abstract

Embodiments of this specification provide a large language model-based knowledge mining method and apparatus. In the large language model-based knowledge mining method, structural knowledge for a source entity is obtained based on a predetermined entity graph; a candidate relation set is determined based on a target property of the source entity in the predetermined entity graph; a corresponding target relation set and inheritable knowledge are output by using a large language model and based on the structural knowledge, the candidate relation set, and additional knowledge for the source entity; a candidate entity word set corresponding to the provided relation is output by using the large language model and based on the source entity, the relation in the target relation set, and at least one of the structural knowledge, the additional knowledge, and the inheritable knowledge; and then an entity related to the source entity and a corresponding relation are obtained.

IPC Classes  ?

  • G06N 5/022 - Knowledge engineeringKnowledge acquisition

69.

BIOMETRIC ATTACK DETECTION METHOD AND APPARATUS

      
Application Number CN2024126717
Publication Number 2025/113002
Status In Force
Filing Date 2024-10-23
Publication Date 2025-06-05
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Wu, Wenqi

Abstract

Disclosed in one or more embodiments of the present description are a biometric attack detection method and apparatus. The method comprises: acquiring a biometric video which is captured in a preset illumination mode and used for biometric attack detection, and extracting multiple lighting frames from the acquired biometric video and a non-lighting frame corresponding to each lighting frame; respectively calculating a video frame difference feature between each lighting frame and a corresponding non-lighting frame; performing feature fusion processing on multiple video frame difference features to obtain a fused video frame difference feature; and inputting the fused video frame difference feature into a pre-trained biometric attack detection model to obtain a biometric attack detection result, wherein the biometric attack detection model is a model obtained by training on the basis of a biometric image, a non-biometric image, and a preset loss function.

IPC Classes  ?

  • G06V 40/40 - Spoof detection, e.g. liveness detection

70.

SPEECH SYNTHESIS

      
Application Number CN2024128380
Publication Number 2025/108021
Status In Force
Filing Date 2024-10-30
Publication Date 2025-05-30
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Wang, Tao
  • Wang, Zhiming

Abstract

Embodiments of the present application provide a voice synthesis method and apparatus, a device, and a storage medium. The method comprises: inputting a text sequence of a speech to be synthesized into a phoneme prediction model to obtain a phoneme sequence corresponding to the text sequence; splitting the phoneme sequence into a multi-dimensional sequence, wherein the multi-dimensional sequence comprises a letter sequence and a tone sequence, the letter sequence consists of letter symbols in the phoneme sequence, and the tone sequence consists of tone symbols in the phoneme sequence; inputting the multi-dimensional sequence into an acoustic model to predict a speech feature corresponding to the phoneme sequence, wherein the acoustic model is used for predicting, on the basis of the multi-dimensional sequence, the speech feature corresponding to the phoneme sequence and is pre-trained on the basis of a multi-dimensional sequence obtained by splitting a phoneme sequence sample; and inputting the speech feature corresponding to the phoneme sequence into a vocoder to obtain a speech corresponding to the text sequence.

IPC Classes  ?

  • G10L 13/10 - Prosody rules derived from textStress or intonation
  • G10L 19/16 - Vocoder architecture

71.

ANTI-THEFT DETECTION FOR MODEL

      
Application Number CN2024128417
Publication Number 2025/108022
Status In Force
Filing Date 2024-10-30
Publication Date 2025-05-30
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Xia, Tianyu
  • Fu, Xinyi
  • Shen, Shuheng
  • Fu, Xing
  • Wang, Weiqiang

Abstract

Disclosed in the present description are an anti-theft detection method and apparatus for a model, and a storage medium and an electronic device. An anti-theft detection model comprises a cloner and a generator, wherein the cloner is used for cloning a pre-trained service model, and the generator is used for generating simulation service data to be input into the cloner. The method comprises: first, inputting noise into a generator, so as to obtain first simulation service data, and obtaining a first service result of the first simulation service data by means of a cloner; then, on the basis of the first service result and the first simulation service data, training the generator by taking as a training target an improvement in the error rate of the result output by the cloner; next, inputting the noise into the trained generator, so as to obtain second simulation service data, and obtaining a second service result of the second simulation service data and a label by means of the cloner and a service model; and finally, training the cloner on the basis of the second service result and the label, and detecting the anti-theft capability of the service model by using the number of iterations of the cloner during training.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 3/0475 - Generative networks
  • G06N 3/0464 - Convolutional networks [CNN, ConvNet]
  • G06N 3/09 - Supervised learning

72.

THIRD-PARTY PAYMENT

      
Application Number CN2024128447
Publication Number 2025/108025
Status In Force
Filing Date 2024-10-30
Publication Date 2025-05-30
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Shi, Shangcheng
  • Wang, Yue

Abstract

Disclosed in embodiments of the present application are a third-party payment method and system. In the method, a payment request generated by a third-party server contains user information parameters and is associated with current ordering user identity information; upon receiving the payment request, a payment platform writes payment user identity information into the user information parameters, so that the third-party server can verify the consistency of the payment user identity information and the ordering user identity information on the basis of the user information parameters; and the payment platform performs a payment operation only when the third-party server verifies that the payment user identity information is consistent with the ordering user identity information. On the basis of the mechanism, during third-party payment, potential attack risks can be automatically detected, potential external phishing attacks can be defended against, user fund loss can be avoided, and a personal data protection capability can be provided. The system of the embodiments of the present application also has the described beneficial effects.

IPC Classes  ?

  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
  • G06Q 20/08 - Payment architectures
  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices

73.

SERVICE EXECUTION

      
Application Number CN2024128493
Publication Number 2025/108032
Status In Force
Filing Date 2024-10-30
Publication Date 2025-05-30
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Pu, Meixu

Abstract

Disclosed in the present description are a service execution method and apparatus, a storage medium and an electronic device, used for privacy protection. The method comprises determining a process number of a target process and determining a target injection point in the target process; on the basis of the process number and the target injection point, injecting a preset byte code program into the target injection point of the target process; and by means of the byte code program, acquiring original service data at the target injection point in the target process and calling a data security component to process the original service data to obtain processed service data, so as to continue to execute the remaining service corresponding to the process on the basis of the processed service data. According to the method, the data security component can be called by means of the byte code program to process the original service data at the target injection point in a service link, and then the process can continue to execute the service on the basis of the processed service data, such that compared with the prior art, the efficiency of adding a security processing policy in the service link is improved to a certain extent.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 9/448 - Execution paradigms, e.g. implementations of programming paradigms

74.

RISK CONTROL

      
Application Number CN2024128438
Publication Number 2025/108023
Status In Force
Filing Date 2024-10-30
Publication Date 2025-05-30
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Zheng, Kaiyuan

Abstract

A risk control method. The method comprises: determining each user to be subjected to risk control, and obtaining user data of said users; on the basis of specified attributes of the users to be subjected to risk control, grouping said users to obtain each user group, separately inputting user data corresponding to the user groups into a risk control model, and obtaining first features corresponding to the user groups; inputting the user data of the users to be subjected to risk control into the risk control model, and obtaining initial features corresponding to said users; on the basis of attribute intervals corresponding to the specified attributes, performing feature scaling on the initial features, and obtaining second features corresponding to the users to be subjected to risk control; fusing the obtained first features and second features to obtain fused features; inputting the fused features into the risk control model, and obtaining a risk control result outputted by the risk control model; and, on the basis of the risk control result, performing risk control on the users to be subjected to risk control.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06F 18/24 - Classification techniques
  • G06F 18/213 - Feature extraction, e.g. by transforming the feature spaceSummarisationMappings, e.g. subspace methods
  • G06F 18/25 - Fusion techniques

75.

THIRD-PARTY AUTHORIZED LOGIN

      
Application Number CN2024128459
Publication Number 2025/108029
Status In Force
Filing Date 2024-10-30
Publication Date 2025-05-30
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Shi, Shangcheng

Abstract

Disclosed in embodiments of the present application are a third-party authorized login method and system. In the method, during third-party authorized login for a fast application (APP), an engine APP identifies identity information of a target quick APP, and transmits the identity information to a mobile APP together with an authorization request; and subsequently, the mobile application further needs to collect identity information of the engine APP, and transmits the identity information of the engine APP and the identity information of the target quick APP to an application server for security detection. Thus, the mobile APP can ensure the legitimacy of the target quick APP interacting with the mobile APP, that is, it is ensured that an authorization credential of a user is transmitted to a legitimate third party, thereby ensuring execution of a third-party authorized login process in a secure execution environment. The system in the embodiments of the present application also has the beneficial effects.

IPC Classes  ?

76.

MODEL TRAINING

      
Application Number CN2024128484
Publication Number 2025/108030
Status In Force
Filing Date 2024-10-30
Publication Date 2025-05-30
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Yang, Xin
  • Lv, Le
  • Fu, Xing
  • Wang, Weiqiang

Abstract

A model training method and apparatus, a storage medium, and an electronic device. The method comprises acquiring sample data (S100); for a feature value of each dimension comprised in the sample data, determining, as the degree of association corresponding to the dimension, the degree of association between the feature value of the dimension and a deviation obtained by a target model for the sample data during pre-training, wherein the deviation is a deviation between an output result of the target model for the sample data during pre-training and an actual result corresponding to the sample data, and the greater the degree of association, the greater the degree of influence of the change in the feature value of the dimension on the output result of the target model (S102); on the basis of the degree of association corresponding to each dimension, adjusting feature values of at least some of dimensions comprised in the sample data to obtain supplementary sample data (S104); and training the target model by means of the supplementary sample data to obtain a trained target model, so as to execute a target service by means of the trained target model (S106).

IPC Classes  ?

77.

VIDEO EDITING METHODS AND APPARATUSES

      
Application Number 18949360
Status Pending
Filing Date 2024-11-15
First Publication Date 2025-05-29
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Dong, Xingning
  • Chen, Yutao
  • Wang, Qing
  • Guo, Qingpei

Abstract

A computer-implemented method includes determination of n noised codes corresponding to n video frames of an original video. A text code corresponding to a description text guiding video editing is determined. Denoising processing, using n Unet models obtained by using the text code and copying a Unet model, is performed on the n noised codes, where a pre-trained text-to-image model includes the Unet model, which includes a self-attention layer connected after a target network layer, and where the denoising processing includes performing, in a self-attention layer of any ith Unet model, attention calculation based on an output of a target network layer of the ith Unet model and an output of a target network layer in a predetermined target Unet model. Decoding processing is separately performed on the n denoised codes by an image decoder to obtain n target images to form an edited target video.

IPC Classes  ?

  • G06T 5/70 - DenoisingSmoothing
  • G06T 5/50 - Image enhancement or restoration using two or more images, e.g. averaging or subtraction
  • G06T 7/13 - Edge detection
  • G06T 7/20 - Analysis of motion
  • G06T 7/50 - Depth or shape recovery
  • H04N 19/172 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object the region being a picture, frame or field

78.

META LEARNING METHOD OF DEEP LEARNING MODEL AND META LEARNING SYSTEM OF DEEP LEARNING MODEL

      
Application Number 18920400
Status Pending
Filing Date 2024-10-18
First Publication Date 2025-05-22
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Xiao, Youshao
  • Zhao, Shangchun
  • Zhou, Zhenglei
  • Huan, Zhaoxin
  • Ju, Lin
  • Zhang, Xiaolu
  • Wang, Lin
  • Zhou, Jun

Abstract

This specification provides a meta learning method of a deep learning model and a meta learning system of a deep learning model, and relates to the field of deep learning technologies. The meta learning method of a deep learning model is applied to a cluster including N processing nodes, and the method includes: obtaining a training dataset, where the training dataset includes training samples corresponding to a plurality of tasks; and performing a plurality of times of iterative training on the deep learning model based on the training dataset in parallel by using the N processing nodes in the cluster, to obtain a meta learning parameter of the deep learning model, In each time of iterative training, each of the N processing nodes learns some parameters of the deep learning model by using some training samples in the training dataset, and the some training samples correspond to a same task.

IPC Classes  ?

  • G06N 3/0985 - Hyperparameter optimisationMeta-learningLearning-to-learn
  • G06N 3/084 - Backpropagation, e.g. using gradient descent

79.

DATA PROCESSING METHODS AND SYSTEMS FOR ENCRYPTED DATABASE

      
Application Number 18947659
Status Pending
Filing Date 2024-11-14
First Publication Date 2025-05-22
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Song, Yixuan
  • Zou, Yinchao

Abstract

A data processing method for an encrypted database is performed by a heterogeneous processing platform including a first computing unit implemented by a general processing unit and a second computing unit implemented by a dedicated acceleration unit. The method includes: obtaining, by the first computing unit, a ciphertext parameter and a database instruction from a user end device, where the database instruction instructs to perform a target operation on the encrypted database; converting the database instruction into a computing instruction to be executed by the second computing unit, and transmitting the computing instruction to the second computing unit; performing, by the second computing unit according to the computing instruction, a cryptographic operation corresponding to the target operation on ciphertext data in the encrypted database and the ciphertext parameter, to obtain a ciphertext result; and transmitting, by the second computing unit, the ciphertext result to the first computing unit.

IPC Classes  ?

  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

80.

METHODS AND APPARATUSES FOR TRAINING CONTENT UNDERSTANDING MODEL AND CONTENT GENERATION MODEL

      
Application Number 18940207
Status Pending
Filing Date 2024-11-07
First Publication Date 2025-05-15
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Ma, Ziping
  • Guo, Qingpei

Abstract

Separately training a content understanding model and a content generation model with an image-text pair formed by an image and a text in a target training set. Sample processing is performed on a noise-containing sample set, including: inputting a first image in any first image-text pair in the noise-containing sample set into the content understanding model to obtain several candidate texts; separately inputting a first text in the first image-text pair and the several candidate texts into the content generation model to obtain multiple candidate images; performing similarity matching between the multiple candidate images and the first image to determine a target text; and continuing to train the content understanding model and the content generation model by forming a second image-text pair by using the first image and the target text and adding the second image-text pair to the target training set.

IPC Classes  ?

  • G06V 10/774 - Generating sets of training patternsBootstrap methods, e.g. bagging or boosting
  • G06V 10/72 - Data preparation, e.g. statistical preprocessing of image or video features
  • G06V 10/74 - Image or video pattern matchingProximity measures in feature spaces

81.

HYPERGRAPH DATA STORAGE METHOD AND APPARATUS WITH TEMPORAL CHARACTERISTIC AND HYPERGRAPH DATA QUERY METHOD AND APPARATUS WITH TEMPORAL CHARACTERISTIC

      
Application Number 18941091
Status Pending
Filing Date 2024-11-08
First Publication Date 2025-05-15
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Zhang, Da

Abstract

Embodiments of this specification relate to a hypergraph data storage method and apparatus with a temporal characteristic and a hypergraph data query method and apparatus with a temporal characteristic. The storage method includes: obtaining raw edge data of a first hyperedge; storing first target data of the N nodes in a second storage table in a first file, and determining first storage location information of the N nodes in the second storage table; forming first hyperedge data based on the first number and the first storage location information, and storing the first hyperedge data in a first storage table in the first file; and storing the first file in a first file directory in a file system based on the first time, where the first file directory corresponds to a first time window, and the first time falls within the first time window.

IPC Classes  ?

  • G06F 16/13 - File access structures, e.g. distributed indices
  • G06F 16/14 - Details of searching files based on file metadata

82.

DATA PROCESSING

      
Application Number CN2024127659
Publication Number 2025/092641
Status In Force
Filing Date 2024-10-28
Publication Date 2025-05-08
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Zhu, Junhao
  • Wang, Wei
  • Yang, Ruyao
  • Li, Xiaolin

Abstract

Embodiments of the present specification provide a data processing method and apparatus, a terminal, a computer-readable storage medium, and a computer program product. The method comprises: a feature checking system generating a probe factor on the basis of offline full features and a table association corresponding thereto; an online feature extraction system performing feature extraction on online incremental data on the basis of the probe factor, so as to obtain online incremental features; and the feature checking system performing feature matching between the offline full features and the online incremental features to obtain a matching result, determining an abnormal feature from the online incremental features on the basis of the matching result, and outputting alarm information regarding the abnormal feature.

IPC Classes  ?

  • G06F 18/2433 - Single-class perspective, e.g. one-against-all classificationNovelty detectionOutlier detection

83.

Method and apparatus for generating prompt data based on knowledge graph

      
Application Number 18905401
Status Pending
Filing Date 2024-10-03
First Publication Date 2025-05-08
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Zhao, Deng
  • Shi, Lei
  • Hu, Bin
  • He, Jianshan

Abstract

Embodiments of this specification provide a method and an apparatus for generating a prompt based on a knowledge graph. In the method, a reasoning rule and an instance subgraph from the knowledge graph that match each other can be obtained in a plurality of manners. A question and answer template is constructed based on the reasoning rule. The question and answer template includes a question template and an answer template, and the answer template includes a cause template and a result template. A target text can be generated based on a combination of the question and answer template and the instance subgraph. The target text includes a question text and an answer text, and the answer text includes a cause text and a result text. The target text is used as a prompt to adjust a language model.

IPC Classes  ?

  • G06N 5/04 - Inference or reasoning models
  • G06N 5/02 - Knowledge representationSymbolic representation

84.

SERVICE PROCESSING METHODS AND APPARATUSES, STORAGE MEDIA, AND ELECTRONIC DEVICES

      
Application Number 18979813
Status Pending
Filing Date 2024-12-13
First Publication Date 2025-05-01
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Gu, Wanyu
  • Xin, Zhi

Abstract

This specification discloses service processing methods, apparatuses, and storage media. In an implementation, a method comprises obtaining a data processing request from a client device deployed at an application layer in a terminal device, transmitting service data comprised in the data processing request to a system layer of the terminal device to determine, in the system layer, system data that match the service data, inputting the service data and the system data into a data processing model for performing data processing on the service data and the system data to obtain a data processing result, wherein the data processing model is pre-deployed in the system layer in the terminal device, and performing, by the client device, service processing based on data processing result obtained from the system layer.

IPC Classes  ?

  • H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

85.

QUERY OF ENCRYPTED DATA

      
Application Number CN2024127603
Publication Number 2025/087428
Status In Force
Filing Date 2024-10-28
Publication Date 2025-05-01
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Pan, Wuqiong
  • Li, Hongyu
  • Li, Tingting
  • Gu, Jinqiang
  • Mei, Dong
  • Wu, Yuduo

Abstract

Disclosed in the present description are an encrypted data querying method and apparatus, a storage medium and an electronic device. The method is applied to a terminal, and comprises: acquiring a plurality of pieces of encrypted data comprising encrypted keys and encrypted values; sorting the plurality of pieces of encrypted data to obtain an encrypted data sequence; segmenting the encrypted data sequence to determine a plurality of segmentation sequences; for each segmentation sequence, determining an encrypted access address of the segmentation sequence and storing a correspondence; receiving a range of encrypted keys to be queried sent by other terminals; determining an encrypted access address range corresponding to the range of the encrypted keys to be queried; and obtaining a query result on the basis of the encrypted access address range and the correspondence, and returning the query result to the other terminals. According to the method, when encrypted data is queried, only encrypted data in the encrypted access address range needs to be queried, such that the resource waste caused by querying encrypted data on the basis of an encrypted access address is reduced, and the query efficiency is improved.

IPC Classes  ?

86.

PAIRING FOR DIGITAL KEY

      
Application Number CN2024127614
Publication Number 2025/087429
Status In Force
Filing Date 2024-10-28
Publication Date 2025-05-01
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Liu, Fuhu

Abstract

Disclosed in the embodiments of the present description is a pairing method for a digital key, which method is applied to a client. The pairing method comprises: on the basis of a unique identifier of a target in-vehicle terminal, completing binding with the target in-vehicle terminal; in response to an activation operation of a user, on the basis of an initial physical address of the target in-vehicle terminal, establishing a communication connection with the target in-vehicle terminal; acquiring a digital certificate and a public key, which digital certificate is signed and issued by the target in-vehicle terminal, so as to obtain a digital key; synchronizing the public key and the digital certificate to a server, and acquiring a reset physical address issued by the server; and sending the reset physical address to the target in-vehicle terminal, and on the basis of the reset physical address, re-establishing a communication connection with the target in-vehicle terminal, so as to complete pairing between the digital key and the target in-vehicle terminal. Correspondingly, disclosed in the present invention are a pairing system for a digital key, and an electronic device.

IPC Classes  ?

87.

PAYMENT METHODS, APPARATUSES, AND DEVICES BASED ON NEAR FIELD COMMUNICATION, AND MEDIA

      
Application Number 18938034
Status Pending
Filing Date 2024-11-05
First Publication Date 2025-04-24
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Zhang, Senyan
  • Xu, Jianji
  • Zheng, Kai
  • Luo, Hao

Abstract

Embodiments of this specification disclose payment methods, apparatuses, and devices based on near field communication, and media. The solution includes: sending, by a mobile terminal with a near field communication function, an electromagnetic signal used to trigger an NFC tag; obtaining tag information in the NFC tag in response to the electromagnetic signal, where the tag information includes payment link information; displaying, based on the payment link information, a payment page including user information of a first transaction party; obtaining payment information provided by a second transaction party based on the payment page; and sending a payment processing request including the payment information to a server, where the server is configured to complete payment based on the payment processing request.

IPC Classes  ?

  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

88.

VIDEO GENERATION

      
Application Number CN2024125198
Publication Number 2025/082380
Status In Force
Filing Date 2024-10-16
Publication Date 2025-04-24
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Teng, Jiajie
  • Hu, Yongheng

Abstract

Disclosed in embodiments of the present description are a video generation method and apparatus. According to the video generation method, incremental learning training is performed on a neural radiance field model of a target scene by collecting a supplementary sample image, and view information is continuously supplemented to learn and optimize the representation ability for the target scene.

IPC Classes  ?

89.

DIGITAL-AVATAR PROCESSING

      
Application Number CN2024125193
Publication Number 2025/082379
Status In Force
Filing Date 2024-10-16
Publication Date 2025-04-24
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Lai, Honghuan
  • Zhang, Tianwei
  • Qin, Huayun

Abstract

Provided in the embodiments of the present description are a digital-avatar processing method and apparatus. The digital-avatar processing method comprises: with the aid of the user identifier of a user accessing a digital avatar by means of a target service, querying a digital-avatar identifier of the user on the target service; on this basis, on one hand, performing, for the digital-avatar identifier, a trigger detection of a cache condition of a static hotspot avatar set of the target service, and on the other hand, performing, for the digital-avatar identifier, a match detection of a dynamic cached avatar set of the target service; and in the case where either of the trigger detection and the match detection is passed, on the basis of a digital-avatar address corresponding to the digital-avatar identifier, acquiring first avatar information of a matched static hotspot avatar or second avatar information of a matched dynamic cached avatar, and performing digital-avatar rendering.

IPC Classes  ?

  • G06F 21/33 - User authentication using certificates

90.

GRAPH DATA GENERATION METHOD AND APPARATUS

      
Application Number 18568506
Status Pending
Filing Date 2022-05-19
First Publication Date 2025-04-17
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Huang, Ke

Abstract

Embodiments of this specification provide a method and an apparatus for generating graph data to be applied to a benchmark test. A plurality of entity vertices and corresponding entity account vertices of the entity vertices are created by using a vertex generation framework, and an owning relationship is created between the entity vertices and the corresponding entity account vertices. A start point entity account vertex set and an endpoint entity account vertex set are determined based on the created entity account vertices by using a vertex block framework, where there is no overlapping entity account vertex between the start point entity account vertex set and the endpoint entity account vertex set. Then, an account association relationship between the entity account vertices is created based on the start point entity account vertex set and the endpoint entity account vertex set by using a vertex relationship generation framework.

IPC Classes  ?

91.

SERVICE EXECUTION METHOD AND APPARATUS, STORAGE MEDIUM, AND ELECTRONIC DEVICE

      
Application Number CN2024123030
Publication Number 2025/077658
Status In Force
Filing Date 2024-09-30
Publication Date 2025-04-17
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Zhang, Wanqiao
  • Huang, Lin
  • Li, Wenjie

Abstract

The present specification discloses a service execution method and apparatus, a storage medium, and an electronic device. The service execution method comprises: a client sending to a server corresponding to the client an information acquisition request for a third-party server side, so that the server sends to the client pre-stored first verification information corresponding to the third-party server side, wherein the first verification information is generated by the server on the basis of a digital certificate of the third-party server side after a trust relationship has been established between a service party corresponding to the server and the third-party server side; sending to the third-party server side a verification request used to verify service compliance of the third-party server side, so that the third-party server side sends the digital certificate to the client; on the basis of the received digital certificate, generating second verification information corresponding to the third-party server side; and on the basis of the first verification information and the second verification information, performing service compliance verification on the third-party server side, and on the basis of the verification result, executing a target service.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

92.

RISK IDENTIFICATION

      
Application Number CN2024124553
Publication Number 2025/077903
Status In Force
Filing Date 2024-10-12
Publication Date 2025-04-17
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor
  • Zhao, Yinglong
  • Sun, Guandong
  • Zhao, Feng
  • Kang, Yulin

Abstract

Provided in the embodiments of the present description are a risk identification method and apparatus, and a device and a storage medium. The method comprises: on the basis of relationship data of first entities in a first entity set, constructing a first entity relationship graph corresponding to the first entity set; determining a sample risk entity set from the first entity set; on the basis of nodes and edge relationships therebetween in the first entity relationship graph, determining a set of connected paths between sample risk entities in the sample risk entity set; on the basis of nodes passed through by the set of connected paths and edge relationships thereof, generating a graph risk entity search policy; and using the graph risk entity search policy to determine a target risk entity set from a second entity relationship graph corresponding to a second entity set.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 40/00 - FinanceInsuranceTax strategiesProcessing of corporate or income taxes
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/2455 - Query execution
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition

93.

CREDIT-BASED TRANSACTION PROCESSING METHOD AND DEVICE

      
Application Number CN2024123028
Publication Number 2025/077657
Status In Force
Filing Date 2024-09-30
Publication Date 2025-04-17
Owner ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD. (China)
Inventor Shi, Xiangjian

Abstract

Embodiments of the present description provide a credit-based transaction processing method and device. The credit-based transaction processing method comprises: on the basis of a credit payment channel selected by an institution member of an institution for a commodity order, querying a payment configuration of the credit payment channel configured by a merchant; determining a payment type of the institution member under the credit payment channel on the basis of the payment configuration and credit data; when a payment condition under the payment type is triggered, sending a payment request for the commodity order to a payment platform; and acquiring a settlement pending bill generated by the payment platform on the basis of a credit payment result, so that the institution settles the settlement pending bill by means of an institution account.

IPC Classes  ?

  • G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems

94.

DATA QUERY METHODS AND APPARATUSES, STORAGE MEDIA, AND ELECTRONIC DEVICES

      
Application Number 18962567
Status Pending
Filing Date 2024-11-27
First Publication Date 2025-04-10
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Wang, Tao
  • Ge, Lincheng

Abstract

This specification discloses data query methods and apparatuses, storage media, and electronic devices. In an example method, a query statement input by a user is obtained, where the query statement is used to query data from a database. Based on the query statement, an execution plan corresponding to the query statement is generated. Based on the execution plan, each query operation involved in the execution plan and an execution order of query operations are; determined. A target operation from the query operations is determined based on the execution order of the query operations, where the target operation is an operation other than a last query operation to be executed among the query operations. When executing the execution plan, deduplication is performed on duplicate results included in query results obtained by executing the target operation. Based on deduplicated query results, query data corresponding to the query statement is obtained.

IPC Classes  ?

  • G06F 16/2455 - Query execution
  • G06F 40/211 - Syntactic parsing, e.g. based on context-free grammar [CFG] or unification grammars

95.

RECEIPT PROCESSING METHOD AND APPARATUS FOR TRANSACTION BILL

      
Application Number 18982118
Status Pending
Filing Date 2024-12-16
First Publication Date 2025-04-10
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Ma, Shuo
  • Meng, Chaofeng

Abstract

A receipt processing method for a transaction bill includes: obtaining at least one transaction bill, the at least one transaction bill being obtained after transaction processing is performed with a merchant based on a payment voucher of an institution; classifying the at least one transaction bill based on a merchant identifier if a receipt generation policy of the institution is a periodic generation policy, to obtain a bill subset corresponding to each merchant; sending a receipt application to a receipt service platform of each merchant, to perform receipt issuance for the bill subset; and receiving a receipt that is of each bill subset and that is returned by the receipt service platform, reading receipt additional information of the receipt, and associating the receipt additional information with the receipt.

IPC Classes  ?

96.

SERVICE PROCESSING METHODS AND APPARATUSES

      
Application Number 18982202
Status Pending
Filing Date 2024-12-16
First Publication Date 2025-04-10
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Shi, Xiangjian

Abstract

A service processing method includes: based on an access instruction of a user for a target service, generating a service code creation request including service access information and a user identity identifier and sending the service code creation request to a service platform; performing service code rendering based on service code information returned after the service platform performs service code creation, and sending a rendered service code corresponding to the access instruction to the user; performing payment processing based on a payment request submitted after a merchant terminal scans the service code, and reading invoice application information associated with a service code identifier included in the payment request after payment succeeds; and sending the invoice application information to the merchant terminal to perform invoice issuance.

IPC Classes  ?

  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices

97.

Credit-based transaction processing method and apparatus

      
Application Number 18904603
Status Pending
Filing Date 2024-10-02
First Publication Date 2025-04-10
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor Shi, Xiangjian

Abstract

Embodiments of this specification provide a credit-based transaction processing method and apparatus. The credit-based transaction processing method includes: querying, based on a credit payment channel selected by an institutional member of an institution for a commodity order, a payment configuration of the credit payment channel configured by a merchant; determining a payment type of the institutional member in the credit payment channel by using the payment configuration and credit data; sending a payment request for the commodity order to a payment platform if a payment condition in the payment type is triggered; and obtaining a to-be-settled bill generated by the payment platform based on a credit payment result, so that the institution settles the to-be-settled bill by using an institutional account.

IPC Classes  ?

  • G06Q 20/24 - Credit schemes, i.e. "pay after"
  • G06Q 30/04 - Billing or invoicing
  • G06Q 40/02 - Banking, e.g. interest calculation or account maintenance

98.

SERVICE EXECUTION METHODS AND APPARATUSES, STORAGE MEDIA, AND DEVICES

      
Application Number 18979356
Status Pending
Filing Date 2024-12-12
First Publication Date 2025-04-03
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Li, Nan
  • Wang, Zhaoyang
  • Liang, Shiwei
  • Lou, Yin
  • Qian, Chen
  • Li, Yan
  • Zhang, Qiang
  • Li, Jiayue
  • Xu, Jingli

Abstract

This specification discloses methods, computer-readable media and apparatuses for service execution. In an example, each condition used to construct a rule and an evaluation indicator corresponding to each condition are displayed. Conditions selected by a user from candidate conditions are determined in response to a selection operation of the user. For each candidate condition, a temporary rule is determined based on the candidate condition and the conditions already selected by the user. A degree of reasonableness of each temporary rule is tested based on historical service data, and an evaluation indicator corresponding to each candidate condition is determined based on the degree of reasonableness of each temporary rule and displayed. A target rule is determined in response to a determining operation of the user. A service is executed based on the target rule and service data corresponding to an invocation instruction for invoking the target rule.

IPC Classes  ?

  • G06Q 10/0635 - Risk analysis of enterprise or organisation activities

99.

SIGNATURE AUTHENTICATION METHODS AND APPARATUSES

      
Application Number 18979840
Status Pending
Filing Date 2024-12-13
First Publication Date 2025-04-03
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor
  • Zhang, Wanqiao
  • Huang, Lin
  • Liu, Yujia

Abstract

Embodiments of this specification provide signature authentication methods and apparatuses. A service private key for signature authentication is embedded in a trusted execution environment (TEE) of a terminal device in which a client device is located. In an implementation, a method includes the following. The client device sends a signature authentication request to a server. The client device receives authentication data information sent from the server. The client device encrypts the authentication data information by using a key that is pre-synchronized with the TEE. The client device sends encrypted authentication data information to the TEE. The client device then receives the signature data sent from the TEE and sends the signature data to the server.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution

100.

MAINBOARDS FOR SECURITY VERIFICATION, SECURITY VERIFICATION METHODS AND APPARATUSES, AND MEDIA

      
Application Number 18979984
Status Pending
Filing Date 2024-12-13
First Publication Date 2025-04-03
Owner Alipay (Hangzhou) Information Technology Co., Ltd. (China)
Inventor An, Wei

Abstract

This specification discloses methods, apparatuses, and storage media for security verification. In an implementation, a verification unit in an electronic device sends a verification instruction for a device to be verified to a channel management unit in the electronic device, configuration information of the device is obtained based on verification instruction by using the channel management unit, and the configuration information is sent to the verification unit. The verification unit verifies the received configuration information based on stored verification information. After verification succeeds, the electronic device starts. The configuration information of the device is sent by using the channel management unit to the verification unit for verification, so as to implement security verification in a start process of the electronic device, thereby ensuring information security.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  1     2     3     ...     14        Next Page