Patents Assigned to QIZHI SOFTWARE (BEIJING) COMPANY LIMITED
-
Publication number: 20150371040Abstract: Disclosed are a method, device and system for processing notification bar message, the method comprising: triggering an interception program pre-injected in a notification bar message process; and the interception program, when capturing a notification bar message satisfying a preset rule, intercepting the notification bar message satisfying the preset rule, and sending a prompt message. The disclosure can timely recognize and block a notification bar advertisement.Type: ApplicationFiled: January 27, 2014Publication date: December 24, 2015Applicants: Beijing Qihoo Technology Company Limited, Qizhi Software (Beijing) Company LimitedInventors: Yi DING, Yuan LI
-
Publication number: 20150365514Abstract: The embodiment of the present invention discloses a method for real-time displaying information and a mobile communication terminal. The method includes: searching multiple kinds of attribute information of a current communication object in the mobile communication terminal upon communication of the mobile communication terminal; determining at least one kind of attribute information of the multiple kinds of attribute information changed in a server; acquiring the changed attribute information from the server, so as to update the multiple kinds of attribute information; and displaying the updated multiple kinds of attribute information on a communication interface of the mobile communication terminal according to a preset display format. The embodiment of the present invention may reduce the user's operations, make the display of the information more consistent and facilitate browsing information for a user.Type: ApplicationFiled: January 7, 2014Publication date: December 17, 2015Applicant: QIZHI SOFTWARE (BEIJING) COMPANY LIMITEDInventors: Tao Li, Tao Wang, Hongliang Wu, Sun Dali
-
Publication number: 20150317232Abstract: Disclosed are a method and an apparatus for positioning crash, for solving the problem of the prior art that the positioning of the cause of the crash cannot be ensured. The method includes: setting monitoring points in a terminal and a test target in advance; monitoring the operation of the test target, and when the test target crashes, acquiring parameters of the monitoring points and parameter values thereof to generate a mirror file, the parameters of the monitoring points including the parameters of the monitoring points in the test target and in the terminal; acquiring the mirror file and viewing the parameters of the monitoring points in the mirror file and the parameter values thereof; analyzing the parameters of the monitoring points and the parameter values thereof and positioning the cause of the crash of the test target.Type: ApplicationFiled: September 27, 2013Publication date: November 5, 2015Applicant: Qizhi Software (Beijing) Company LimitedInventors: Guotao WANG, Qingping LIU
-
Patent number: 9177141Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: GrantFiled: August 8, 2011Date of Patent: November 3, 2015Assignees: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, QIZHI SOFTWARE(BEIJING) COMPANY LIMITEDInventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan
-
Publication number: 20150310113Abstract: The invention discloses a mobile terminal, server, system and method for realizing search, the mobile terminal including: an input module configured to receive a keyword for a search; a transmitting module configured to transmit the keyword to a server; a receiving module configured to receive a recommended search engine and/or application selected by the server according to the keyword; a search module configured to use the recommended search engine to search for the keyword to obtain search results after receiving the recommended search engine; and a presenting module configured to present a page of the search results for the search using the search engine recommended by the server and/or to present the application recommended by the server, when the input module receives the instruction to select the recommended application, instructing the search module to use the application indicated in the instruction to search for the keyword, and after the search results are obtained, presenting the search results.Type: ApplicationFiled: September 26, 2013Publication date: October 29, 2015Applicants: Beijing Qihoo Technology Company Limited, Qizhi Software (Beijing) Company LimitedInventor: Lingyun YI
-
Publication number: 20150205960Abstract: A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective.Type: ApplicationFiled: March 31, 2015Publication date: July 23, 2015Applicants: Beijing Qihoo Technology Company Limited, Qizhi Software (Beijing) Company LimitedInventors: HONGYI ZHOU, XIANGDONG QI
-
Patent number: 9047466Abstract: A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective.Type: GrantFiled: August 16, 2011Date of Patent: June 2, 2015Assignees: Beijing Qihoo Technology Company Limited, Qizhi Software (Beijing) Company LimitedInventors: Hongyi Zhou, Xiangdong Qi
-
Publication number: 20130185797Abstract: A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective.Type: ApplicationFiled: August 16, 2011Publication date: July 18, 2013Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Hongyi Zhou, Xiangdong Qi
-
Publication number: 20130174257Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.Type: ApplicationFiled: August 8, 2011Publication date: July 4, 2013Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan