Patents Assigned to QIZHI SOFTWARE (BEIJING) COMPANY LIMITED
  • Publication number: 20150371040
    Abstract: Disclosed are a method, device and system for processing notification bar message, the method comprising: triggering an interception program pre-injected in a notification bar message process; and the interception program, when capturing a notification bar message satisfying a preset rule, intercepting the notification bar message satisfying the preset rule, and sending a prompt message. The disclosure can timely recognize and block a notification bar advertisement.
    Type: Application
    Filed: January 27, 2014
    Publication date: December 24, 2015
    Applicants: Beijing Qihoo Technology Company Limited, Qizhi Software (Beijing) Company Limited
    Inventors: Yi DING, Yuan LI
  • Publication number: 20150365514
    Abstract: The embodiment of the present invention discloses a method for real-time displaying information and a mobile communication terminal. The method includes: searching multiple kinds of attribute information of a current communication object in the mobile communication terminal upon communication of the mobile communication terminal; determining at least one kind of attribute information of the multiple kinds of attribute information changed in a server; acquiring the changed attribute information from the server, so as to update the multiple kinds of attribute information; and displaying the updated multiple kinds of attribute information on a communication interface of the mobile communication terminal according to a preset display format. The embodiment of the present invention may reduce the user's operations, make the display of the information more consistent and facilitate browsing information for a user.
    Type: Application
    Filed: January 7, 2014
    Publication date: December 17, 2015
    Applicant: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED
    Inventors: Tao Li, Tao Wang, Hongliang Wu, Sun Dali
  • Publication number: 20150317232
    Abstract: Disclosed are a method and an apparatus for positioning crash, for solving the problem of the prior art that the positioning of the cause of the crash cannot be ensured. The method includes: setting monitoring points in a terminal and a test target in advance; monitoring the operation of the test target, and when the test target crashes, acquiring parameters of the monitoring points and parameter values thereof to generate a mirror file, the parameters of the monitoring points including the parameters of the monitoring points in the test target and in the terminal; acquiring the mirror file and viewing the parameters of the monitoring points in the mirror file and the parameter values thereof; analyzing the parameters of the monitoring points and the parameter values thereof and positioning the cause of the crash of the test target.
    Type: Application
    Filed: September 27, 2013
    Publication date: November 5, 2015
    Applicant: Qizhi Software (Beijing) Company Limited
    Inventors: Guotao WANG, Qingping LIU
  • Patent number: 9177141
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Grant
    Filed: August 8, 2011
    Date of Patent: November 3, 2015
    Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE(BEIJING) COMPANY LIMITED
    Inventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
  • Publication number: 20150310113
    Abstract: The invention discloses a mobile terminal, server, system and method for realizing search, the mobile terminal including: an input module configured to receive a keyword for a search; a transmitting module configured to transmit the keyword to a server; a receiving module configured to receive a recommended search engine and/or application selected by the server according to the keyword; a search module configured to use the recommended search engine to search for the keyword to obtain search results after receiving the recommended search engine; and a presenting module configured to present a page of the search results for the search using the search engine recommended by the server and/or to present the application recommended by the server, when the input module receives the instruction to select the recommended application, instructing the search module to use the application indicated in the instruction to search for the keyword, and after the search results are obtained, presenting the search results.
    Type: Application
    Filed: September 26, 2013
    Publication date: October 29, 2015
    Applicants: Beijing Qihoo Technology Company Limited, Qizhi Software (Beijing) Company Limited
    Inventor: Lingyun YI
  • Publication number: 20150205960
    Abstract: A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective.
    Type: Application
    Filed: March 31, 2015
    Publication date: July 23, 2015
    Applicants: Beijing Qihoo Technology Company Limited, Qizhi Software (Beijing) Company Limited
    Inventors: HONGYI ZHOU, XIANGDONG QI
  • Patent number: 9047466
    Abstract: A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective.
    Type: Grant
    Filed: August 16, 2011
    Date of Patent: June 2, 2015
    Assignees: Beijing Qihoo Technology Company Limited, Qizhi Software (Beijing) Company Limited
    Inventors: Hongyi Zhou, Xiangdong Qi
  • Publication number: 20130185797
    Abstract: A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective.
    Type: Application
    Filed: August 16, 2011
    Publication date: July 18, 2013
    Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi Zhou, Xiangdong Qi
  • Publication number: 20130174257
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Application
    Filed: August 8, 2011
    Publication date: July 4, 2013
    Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan