Patents Assigned to BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
  • Publication number: 20140317733
    Abstract: A method and client for ensuring user network security, the method comprising: detecting whether a user opens a login operation mode or payment operation mode via a client; and when detecting that the user opens the login operation mode or payment operation mode, performing security monitoring for the login procedure or payment procedure of the user according to a preset security strategy. By applying the embodiment of the present invention, when a client user is in a login procedure or online payment procedure, security protection can be implemented for the login procedure or payment procedure via multiple security strategies specially used for ensuring the login procedure or payment procedure, and network security is ensured for the user during the login procedure or payment procedure via risky process interception, executable file prompt and browser invoke monitoring.
    Type: Application
    Filed: April 17, 2012
    Publication date: October 23, 2014
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Ningyi Chen, Wenbin Zheng, Peng Xiao, Yipeng Zhu
  • Publication number: 20140310807
    Abstract: The invention provides a cloud-based secure download method. A download terminal carries out an information interaction with a cloud security server via the Internet, comprising the following steps of: acquiring, by the download terminal, a URL address of a file to be downloaded by a user; comparing the URL address of the file to be downloaded with a malicious URL list in the cloud security server; and prompting a comparison result to the user by the download terminal.
    Type: Application
    Filed: November 16, 2011
    Publication date: October 16, 2014
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Xiangdong Qi, Chenxi Zhao
  • Publication number: 20140310560
    Abstract: The present application relates to a method and apparatus for module repair in software. In the method, when a module in the software has an error, correct content corresponding to the erroneous content is obtained by way of accessing a web page address; then the correct content obtained is directly loaded into a system memory and the corresponding correct content is invoked directly from the memory when the module is used. The method of the present application results in the software possessing a self-repairing function and self-detection function, and can be applied in any software device.
    Type: Application
    Filed: February 27, 2012
    Publication date: October 16, 2014
    Applicant: Beijing Qihoo Technology Company Limited
    Inventors: Yuanzhen Ma, Baosheng Li, Weihua Tao
  • Publication number: 20140236902
    Abstract: The invention discloses a user data backup method, comprising: searching a local computer of a user for an editable document; according to a search result, marking the editable document as data with backup requirement; and backing up the data with backup requirement in a storage device on a network side. Also disclosed is another user data backup method, comprising: monitoring a removable storage device connection status of a local computer of a user; if it is detected that a removable storage device is connected to the local computer, marking data in the device as data with backup requirement; and backing up the data with backup requirement in a storage device on a network side.
    Type: Application
    Filed: September 25, 2012
    Publication date: August 21, 2014
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Yipeng Zhu, Hongyi Zhou
  • Publication number: 20140149995
    Abstract: The present invention provides a browser kernel switching method, which enables a browser to switch between different browser kernels when browsering different web pages, and comprises the following steps: detecting, by the browser, whether a kernel switch is needed; and transferring a post data in a previous kernel of the browser to the kernel which is to be switched when loading a page that requires to switch kernel.
    Type: Application
    Filed: November 16, 2011
    Publication date: May 29, 2014
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventor: Liang Tian
  • Publication number: 20140123290
    Abstract: A method, an apparatus and a system for processing a computer virus. The method comprises: obtaining the file type of a file which is infected with a computer virus and the process information of a process which is used by the virus when accessing the file; monitoring whether a malicious event occurs in s system, wherein the malicious event is an event which is triggered when the process corresponding to the process information accesses the file of the file type; and refusing the process to access the file of the file type when it is monitored that the malicious event occurs.
    Type: Application
    Filed: June 1, 2012
    Publication date: May 1, 2014
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Bo Li, Guiqiang Zou
  • Publication number: 20140006558
    Abstract: The present invention relates to a method and a device for resuming download. The method for resuming download comprises: converting a file incompletely downloaded by a first download tool to a file identifiable to a second download tool, so that the second download tool resumes downloading the incompletely-downloaded file, wherein the first download tool and the second download tool are different download tools. The present invention implements relay download of different download tools, and can be applied to file download, so as to avoid wasting network resources and time of users.
    Type: Application
    Filed: March 5, 2012
    Publication date: January 2, 2014
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Chenxi Zhao, Jinwei Li, Zhenyu Xie
  • Publication number: 20140006619
    Abstract: The present provides a method for logging in by multi-account and the client. A user uses a second account to log into a website or web page and authority request information of the second account is saved in the client separately from the authority request information of the first account that has logged into the same website or web page; after receiving identification information returned from said website or web page for identifying said second account, said identification information is saved in the client separately from the corresponding identification information of the first account. The method of the present application is simple and practical, and it can easily realize the function of logging in by multi-account. The method of the present application can be applied to various software such as a browser.
    Type: Application
    Filed: February 20, 2012
    Publication date: January 2, 2014
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Cheng Hang, Kuan Jiang, Yong Wan
  • Publication number: 20140007126
    Abstract: The present invention relates to a method and device for allocating a browser process. The method comprises: first, obtaining data related to a current system operating environment, and then allocating a browser process based on the data. The present invention allocates the browser process intelligently according to the current system operating environment, maximally improving the performance in use of the browser, and can be applied in any kind of electronic devices.
    Type: Application
    Filed: February 6, 2012
    Publication date: January 2, 2014
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongwei Liu, Chenxi Zhao, Zhenyu Xie
  • Publication number: 20130298116
    Abstract: The present provides a method and system for intelligent installation/upgrading of software. Said method first detects, at a client, softwares that have been installed on the client, generates a list of softwares to be installed/upgraded, and provides a corresponding installation/upgrading prompt for each software to be installed/upgraded; then, upon detecting, by the client, that a user selects an installation/upgrading operation of a software according to said installation/upgrading prompt, it downloads a corresponding target software installation/upgrading package from a server according to a name and version number of said software to be installed/upgraded; next, it runs an installation/upgrading file in said target software installation/upgrading package at the client to finish installation/upgrading of said software.
    Type: Application
    Filed: November 17, 2011
    Publication date: November 7, 2013
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Sheng Ou, Lixin Wan
  • Publication number: 20130298121
    Abstract: The present invention provides a method for isolated use of browser comprising: establishing a virtual environment in a user's computer system by a browser; arranging content loaded by the browser in the virtual environment; processing operation results in the virtual environment.
    Type: Application
    Filed: November 16, 2011
    Publication date: November 7, 2013
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi Zhou, Hongwei Liu
  • Publication number: 20130291111
    Abstract: The invention discloses a method and device for programidentification based on machine learning. The method comprises: analyzing an inputted unknown program, and extracting a feature of the unknown program; coarsely classifying the unknown program according to the extracted feature; judging by inputting the unknown program into a corresponding decision-making machine generated by training according to a result of the coarse classification; and outputting an identification result of the unknown program, wherein the identification result is a malicious program or a non-malicious program.
    Type: Application
    Filed: November 18, 2011
    Publication date: October 31, 2013
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi Zhou, Yi Dong, Hui Zhou
  • Publication number: 20130185797
    Abstract: A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective.
    Type: Application
    Filed: August 16, 2011
    Publication date: July 18, 2013
    Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi Zhou, Xiangdong Qi
  • Publication number: 20130174257
    Abstract: The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security.
    Type: Application
    Filed: August 8, 2011
    Publication date: July 4, 2013
    Applicants: QIZHI SOFTWARE (BEIJING) COMPANY LIMITED, BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi Zhou, Wenbin Zheng, He Yu, Paul Fan