Hangzhou, China
Hangzhou, China

Time filter

Source Type

Patent
Alibaba | Date: 2017-01-24

Embodiments of the present application relate to a method, apparatus, and system for managing confidential information. The method includes accessing stored target information comprising a public part and a confidential part, wherein an identifier corresponds to the confidential part of the target information, outputting the public part of the target information and the corresponding identifier, wherein the public part of the target information comprises at least first address information, receiving location information and a to-be-recognized identifier, wherein the location information is associated with a current location of a mobile terminal, determining whether the location information is consistent with the first address information, and in the event that the location information is consistent with the first address information, sending the confidential part of the target information associated with the to-be-recognized identifier to the mobile terminal.


Embodiments of the present application relate to a method and system for managing user accounts. The method includes receiving a registration request from a current user, wherein the registration request comprises a login name main part, determining, in a database, whether a conflicting old user exists, wherein a conflicting old user corresponds to another user that has a conflicting login name main part that is the same as the login name main part received in connection with the registration request, in the event that a conflicting old user exists, executing a login password differentiation process that requires a user to register a different login password that is different from a login password associated with the conflicting old user, and storing the different login password to the database in connection with a registration of the current user. Embodiments relate also to checking password rules. Further embodiments relate to a login name main part revising interface. Other embodiments relate to password retrieval. Some embodiments relate to creating sub-accounts.


Patent
Alibaba | Date: 2017-02-15

Generating a screenshot is disclosed, including: receiving a screenshot command from an application, wherein the screenshot command includes an application scenario parameter corresponding to the application; generating a screenshot object based at least in part on a screenshot class corresponding to the application scenario parameter; generating a screenshot from content displayed by the application using the screenshot object; and sending the screenshot to the application to be displayed.


Embodiments of the present application relate to a method, apparatus, and system for determining a location of a terminal. The method includes acquiring a Media Access Control (MAC) address of a network equipment used by a terminal to access a network, determining whether a database indicating locations associated with respective MAC addresses includes the acquired MAC address, and in the event that the database indicating locations associated with respective MAC addresses includes the acquired MAC address, determining that a current location of the terminal corresponds to a location associated with the acquired MAC address that is stored in the database, and outputting the current location of the terminal.


The present application discloses methods, apparatuses, and systems for acquiring local information to solve the problems of browser instability and difficulty in website maintenance due to the acquisition of local information by using a browser plug-in technology in the prior art. An exemplary method may include sending a first request for information acquisition to a network apparatus through a script in a browser. The first request for information acquisition may be used for instructing a local application tool to acquire local information. The method may also include monitoring, through the local application tool, a random number, sent by the network apparatus, corresponding to the first request for information acquisition. Moreover, the method may include acquiring, through the local application tool, the first request for information acquisition corresponding to the random number stored in the network apparatus, the correspondence between the random number and the first request for information acquisition being established and stored by the network apparatus. Furthermore, the method may include acquiring, through the local application tool, local information corresponding to the first request for information acquisition, and sending, through the local application tool, the local information to the network apparatus.


Embodiments of the present application relate to a method, apparatus, and system for operating an electronic account or displaying a payment page. The method includes receiving, from a first client terminal, a payment platform display page acquisition request, providing, to the first client terminal, a payment platform display page, wherein the payment platform display page includes a first script code, wherein in the event that the first script code is executed, the first script code causes the first client terminal to obtain a payment page including a digital object unique identifier from a payment server and to display the payment page, wherein the digital object unique identifier indicates an upcoming payment sum, receiving verification information, and sending the verification information to the payment server to instruct the payment server to execute a deduction operation on an electronic account.


Embodiments of the present application relate to a method, apparatus, and system for providing a security check. The method includes receiving a security verification request sent from a terminal, obtaining first verification element information based at least in part on the security verification request, generating a digital object unique identifier based at least in part on the first verification element information, sending the digital object unique identifier to the terminal, receiving second verification element information from the terminal, and in the event that the first verification element information and the second verification element information are consistent, sending security check pass information to the terminal.


Patent
Alibaba | Date: 2017-05-24

A method and a server of remote information query are disclosed. The method includes receiving a query request sent by a client side and acquiring content of a type field of the query request; acquiring a type of the query request based on the content of the type field; adding a type identifier corresponding to the type and a domain name of a preset authorized DNS (Domain Name System) to the query request to acquire a target query request; and sending the target query request to a local DNS to enable the local DNS to send the target query request to the preset authorized DNS according to the domain name of the preset authorized DNS in the target query request, and receiving a response message corresponding to the type of the query request from the preset authorized DNS. Thus, a simpler and highly efficient recognition of user security can be realized.


An embodiment of the present application discloses a method for using an exhaustible network resource. An exemplary method may include determining a type of the current service operation environment. The type may include a trustable environment and an untrustable environment. The current service operation may be able to influence the resource value of the exhaustible network resource. When the type of the current service operation environment is an untrustable environment, the method may also include limiting the resource value of the exhaustible network resource of the current service operation within a first-grade resource value. When the type of the current service operation environment is a trustable environment, the method may further include limiting the resource value of the exhaustible network resource of the current service operation within a second-grade resource value. The second-grade resource value may be larger than the first-grade resource value. Another embodiment of the present application also discloses an apparatus for using an exhaustible network resource. The implementation of the present application may reduce or avoid the impact on normal service operations caused by malicious consumption of exhaustible network resources.


Apparatus and method are disclosed for controlling wireless network access and wireless data traffic. The method may include obtaining a recognition identifier of a Wireless Fidelity (Wi-Fi) hotspot device. The method may also include determining a type of the Wi-Fi hotspot device according to the recognition identifier. In addition, the method may include controlling information downloading or wireless data traffic of an information processing device according to the type of the Wi-Fi hotspot device.

Loading Alibaba collaborators
Loading Alibaba collaborators