-
公开(公告)号:US11587056B2
公开(公告)日:2023-02-21
申请号:US16026776
申请日:2018-07-03
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Chao Xiu , Lei Wang , Yingde Liu
Abstract: Implementations of the present application provide data interaction and offline credit payment methods and devices. In one implementation, a credit payment code generated by a server is obtained by scanning and parsing a two-dimensional code presented on a mobile computing device for making a payment. The credit payment code is then decrypted based on asymmetric key decryption to obtain a credit payment token. The credit payment token is parsed to obtain security content included in the credit payment token. The payment associated with the credit payment code is then determined to satisfy the security content and the payment is verified with the server that generates the credit payment code at a predetermined time.
-
公开(公告)号:US11063934B2
公开(公告)日:2021-07-13
申请号:US16152194
申请日:2018-10-04
Applicant: ADVANCED NEW TECHNOLOGIES CO., LTD.
Inventor: Jianbo Zhou , Yibin Xiong , Chao Xiu , Ming Wu
IPC: H04W4/06 , H04W68/00 , H04W12/06 , H04W76/14 , H04W4/80 , H04W84/12 , H04L29/06 , H04L29/08 , H04L29/12
Abstract: Disclosed in an embodiment of the present application is an information pushing method, comprising: a wireless network sharer client obtaining a first identifier of a wireless network selected from a wireless network list scanned/stored by a wireless network sharer terminal, and sending the same to a server; the server generating a second identifier and sending the same to the wireless network sharer client; the wireless network sharer changing the first identifier of the wireless network into a third identifier based on the second identifier; the wireless network sharer client obtaining a wireless network list updated by a wireless network sharer mobile terminal and sending the third identifier of the selected wireless network in the list to the server; and the server comparing the second identifier with the third identifier, and allowing successful authentication when the two identifiers are consistent, and registering information about the devices of the wireless network.
-
公开(公告)号:US11954190B2
公开(公告)日:2024-04-09
申请号:US16003503
申请日:2018-06-08
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Huifeng Jin , Yanghui Liu , Chao Xiu , Liyun Dong , Weijie Xiao
CPC classification number: G06F21/32 , G06Q20/40145 , G06V40/12 , G06V40/1365 , G06V40/16 , H04L63/0861 , G06V40/179 , G06V2201/10
Abstract: Biometric information is obtained from a user. A determination is made that the obtained biometric information matches at least one entry in a biometric database. In response to determining that the obtained biometric information matches the at least one entry in the biometric database, non-biometric verification information is obtained. A determination is made as to whether at least a portion of the non-biometric verification information matches at least a portion of preset non-biometric verification information associated with the user. In response to determining that the at least a portion of the non-biometric verification information matches, a determination is made that an identity of the user is verified. In response to determining that the at least a portion of the non-biometric verification information does not match, a determination is made that the identity of the user is not verified.
-
公开(公告)号:US20230196328A1
公开(公告)日:2023-06-22
申请号:US18168831
申请日:2013-02-14
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Chao Xiu , Lei WANG , Yingde Liu
CPC classification number: G06Q20/24 , G06Q20/08 , G06Q20/3276 , G06Q20/403 , G06Q20/3278 , G06Q20/3674 , G06Q20/409 , G06Q20/4093 , G06Q20/401 , G06Q20/20 , G06Q20/3274 , G06Q20/3829
Abstract: Implementations of the present application provide data interaction methods and devices. In one example implementation, authorization data for a current interaction are received from a remote server, wherein the authorization data comprises signature information, time information of current authorization, a random number of the current authorization, and a threshold. The authorization data are verified by performing at least one of: comparing the time information comprised in the authorization data with a current time; determining whether the random number comprises in the authorization data exists in a previous data interaction; or determining whether the data of the current interaction exceeds the threshold comprised in the authorization data. Whether to cancel the current interaction is determined based on the verification of the authorization data.
-
公开(公告)号:US11127019B2
公开(公告)日:2021-09-21
申请号:US16027083
申请日:2018-07-03
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Chao Xiu , Lei Wang , Chenjie Shi
IPC: G06Q20/00 , G06Q20/40 , G06F21/34 , G06Q20/32 , G06Q20/34 , H04W12/126 , H04W4/80 , G06F21/44 , H04W12/61 , H04W12/63
Abstract: The present application relates to the field of information security technologies, and in particular, to smart card security verification methods and devices. In one example method, in response to detecting processing associated with a particular service at a smart card application of an intelligent terminal, a set of data related to the particular service is obtained. A set of security parameters associated with the smart card application are identified. The obtained set of data related to the particular service is compared to the identified set of security parameters. In response to determining from the comparison that the obtained set of data related to the particular service satisfies the identified set of security parameters, the particular service to is allowed to execute. In response to determining that the obtained set of data related to the particular service does not satisfy the identified set of security parameters, the particular service is terminated.
-
-
-
-