Patents Assigned to Tencent Technology (Shenzhen) Company
  • Patent number: 8654845
    Abstract: The invention provides a method and device for video predictive encoding.
    Type: Grant
    Filed: September 10, 2012
    Date of Patent: February 18, 2014
    Assignees: Tencent Technology (Shenzhen) Company Limited, Tsinghua University
    Inventors: Pin Tao, Wenting Wu, Mou Xiao, Jiangtao Wen, Chenchen Gu, Jing Lv, Fuzhong Sheng
  • Publication number: 20140046968
    Abstract: The present invention discloses a data acquisition method, including: receiving at least one first data acquisition request, wherein the first data acquisition request carries a data selection condition; acquiring all the data identifiers satisfying the data selection condition according to the data selection condition; and concurrently acquiring all the data corresponding to the data identifiers according to the data identifiers, and returning the acquired data. Also disclosed is a data acquisition apparatus, including: a data acquisition request receiving module, a data identifier acquiring module, and a first data acquiring module. According to the embodiments of the present invention, data identifiers are determined according to a data selection condition, and all the data corresponding to the data identifiers is concurrently acquired according to the data identifiers, thereby reducing a data feedback delay caused by successive acquisition of data in the prior art.
    Type: Application
    Filed: April 6, 2012
    Publication date: February 13, 2014
    Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventor: Qing Yuan
  • Publication number: 20140047264
    Abstract: The method is performed as a client device and includes receiving a first message that includes a first data usage value. The first message is formatted according to a respective format. After receiving the first message, the method further includes acquiring a data usage template corresponding to the respective format. The method further includes receiving a second message that includes a second data usage value. The second message is formatted according to the respective format. The method further includes parsing the second message according to the data usage template so as to obtain a second data usage value.
    Type: Application
    Filed: September 27, 2013
    Publication date: February 13, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventors: Xuxin WANG, Peng XUE
  • Publication number: 20140047051
    Abstract: A method for sending prompt information to Social Networking Services (SNS) community users comprises the following steps: acquiring the inactive users in an SNS community; acquiring the friend relationship chains of the inactive users; acquiring the active users in the friend relationship chains; acquiring the writing operations of the active users; sending prompt information related to the writing operations of the active users to the inactive users. The method described above for sending prompt information to SNS community users can increase the success rate for activating the inactive users, and thus effectively reducing the loss of the SNS community users. Besides, a system for sending prompt information to SNS community users is also provided.
    Type: Application
    Filed: July 10, 2012
    Publication date: February 13, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventors: Chun Li, Yu Chen
  • Publication number: 20140046850
    Abstract: A transaction payment method includes the following steps: acquiring payment information about a user, the payment information including a contact number; calling the contact number through an Interactive Voice Response platform to acquire the payment password input by the user; and verifying the payment password and payment information, and performing payment if the verification is passed. The transaction payment method above can be applied to improve payment security. Additionally, also provided is a transaction payment system.
    Type: Application
    Filed: October 18, 2013
    Publication date: February 13, 2014
    Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Tao XIANG, Shaobo LIAO, Tiehua LIU, Dapeng ZHAO, Yunxia FENG, Min CHENG
  • Publication number: 20140047374
    Abstract: Embodiments, relating to the field of virtual keyboard technologies, of the present invention provide a method for acquiring a virtual keyboard key. The method includes: receiving layout of a universal virtual keyboard and a mapping relationship between terminals and universal virtual keyboard key value mapping tables from a server; acquiring a corresponding universal virtual keyboard key value mapping table according to the identifier of the terminal and the mapping relationship between terminals and universal virtual keyboard key value mapping tables; and acquiring a universal virtual keyboard according to the layout of the universal virtual keyboard and the universal virtual keyboard key value mapping table of the terminal.
    Type: Application
    Filed: December 23, 2011
    Publication date: February 13, 2014
    Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Zhiqiang He, Chunhua Luo, Yuankun Zheng, Cheng Guo, Yu Tian, Liang Ma
  • Publication number: 20140041005
    Abstract: A method and system for login authentication is disclosed. The method comprises the steps of: sending, by a first client, a first login request to a login server and receiving a mapping relationship between original characters and post-mapping characters returned by the login server according to the first login request; and sending, by a second client, a second login request to the login server according to the mapping relationship, with the second login request including post-mapping information corresponding to user information determined according to the mapping relationship. The solution in the present invention is to realize joint login by two clients, such that even if one of the clients is infected with a computer virus, no particular user information can be obtained through the infected client. Thus, the security of login authentication and the security of user information can be improved.
    Type: Application
    Filed: August 26, 2013
    Publication date: February 6, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventor: Chang HE
  • Publication number: 20140041034
    Abstract: Disclosed in the present invention are a method and apparatus for checking a process of decompressing an application installation package. The present invention belongs to the technical field of security. The method comprises: decompressing a sub-portion of data in an application installation package to acquire decompressed data, the sub-portion of data being not greater than a threshold size; checking the decompressed data according to the virus samples in a virus feature library; and determining that the application installation package is a virus-infected file or rogue software when the decompressed data includes any of the virus samples. The technical solution of the present invention can effectively save the internal memory, shorten the checking time, and improve the checking efficiency in determining whether an application installation package is a virus-infected file or rogue software.
    Type: Application
    Filed: August 26, 2013
    Publication date: February 6, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventors: Wei LI, Jingwei HAN
  • Publication number: 20140041035
    Abstract: The invention relates to method and system for file scanning The method includes performing specified scanning on files of terminal equipment to determine suspicious files infected by viruses; repairing the suspicious files infected by the viruses and recording repair actions; and checking the recorded repair actions after the specified scanning is finished. The system includes a scanning module, a repairing module, and a checking module. According to the invention, repair actions performed during the repair procedure are recorded when suspicious files infected by viruses are repaired, and these recorded repair actions are checked after the repairs are finished so as to confirm the repair effect and reinforce the repair, thereby preventing suspicious files infected by various viruses from damaging and infecting the system.
    Type: Application
    Filed: September 9, 2013
    Publication date: February 6, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventor: Zi-Xiao Nie
  • Publication number: 20140038650
    Abstract: The present invention discloses a short message backup method, mobile terminal, server, and system, and belongs to the field of communications. The method includes: obtaining a local short message of a mobile terminal, and storing the local short message of the mobile terminal in a local short message backup database file according to a preset format supported by a remote server; and sending the short message backup database file to the server, so that the server stores the short message backup database file and a user account, so as to complete short message backup. In the present invention, by storing a short message of a mobile terminal of a user as a short message backup database file of a preset format supported by a remote server, and sending it to the server for storage, the reliability and compatibility of short message backup are improved, and an operation is simple.
    Type: Application
    Filed: August 20, 2013
    Publication date: February 6, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventors: Qing WANG, Haoran Guo, Yixia Yuan, Xunchang Zhan, Chunyou Lin, Pengtao Li, Jiashun Song
  • Publication number: 20140040394
    Abstract: Disclosed are a method and device for processing messages. The method includes: determining, when a message sent by software is intercepted, whether the message is a spam message; when the message is not a spam message, having the message displayed in a notification toolbar; and when the message is a spam message, prompting a user in the notification toolbar that the software may be implanted with a malicious plug-in, and providing an option label for the user to judge and select whether to inhibit displaying all messages sent by the software, including the message.
    Type: Application
    Filed: August 20, 2013
    Publication date: February 6, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventors: Wenliang TANG, Tianming Xiao, Zhaohua Lu, Xing Zeng
  • Publication number: 20140040823
    Abstract: Multi-window browsing methods and devices are disclosed. A target-object selection control command can be received by a multi-window browsing device. The target-object selection control command can be issued according to each of one or more target objects selected to be added to a multi-window browsing interface. The multi-window browsing device can determine whether a number of the one or more target objects reaches a preset value and can start the multi-window browsing interface to simultaneously display the one or more target objects on the multi-window browsing interface, when the number of the one or more target objects is determined that reaches the preset value. An exemplary multi-window browsing device can include a receiving unit, a determining unit, and a display unit.
    Type: Application
    Filed: September 24, 2013
    Publication date: February 6, 2014
    Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: YUEWEI FAN, MENG ZHOU, DING XIANG
  • Publication number: 20140038561
    Abstract: The present invention discloses a method and a mobile terminal for displaying an event notification. While running an application on a display of the mobile terminal, the terminal receives an event notification. If the event notification is compatible with the application, the terminal generates a user-interactive icon for the event notification on the display. In response to a user selection of the user-interactive icon, the terminal determines whether the event notification corresponds to a public or private event. If the event notification corresponds to a public event, the terminal replaces the application with a display of a list of public events including the public event. If the event notification corresponds to a private event, the terminal prompts a user to enter identity information for accessing private events and replaces the application with a display of a list of private events including the private event after verifying the user-entered identity information.
    Type: Application
    Filed: September 27, 2013
    Publication date: February 6, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventors: Qing WANG, Haoran GUO, Yixia YUAN, Xunchang ZHAN, Chunyou LIN, Pengtao LI, Jiashun SONG
  • Publication number: 20140040242
    Abstract: An electronic device is configured to exchange data with a mobile storage device. The device monitors for a first event corresponding to the storage device being unmounted. In response to detecting the first event, the device records a first time. After the first event, the device monitors for a second event corresponding to the storage device being mounted. In response to detecting the second event, the device records a second time. After the second event, the device performs a scan of the storage device, stores the scanned data in a database, and records a storage path corresponding to the scanned data in the database. The device monitors for a third event corresponding to completion of the scan, and records a third time. The device retrieves a dataset with a timestamp between the first time and the third time and displays the dataset and the timestamp.
    Type: Application
    Filed: September 10, 2013
    Publication date: February 6, 2014
    Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Xing ZHOU, BIN YU, QIAO REN, SHIZHU HUANG
  • Publication number: 20140035514
    Abstract: A method, a computer-readable medium, and a system for battery-charging management are provided. The method comprises: recording a respective time that previous trickle charging was carried out by a user; determining that a time interval between a current time and the respective time for the previous trickle charging has reached a preset charging cycle; and prompting the user to carry out next trickle charging in response to determining that the time interval between the current time and the respective time for the previous trickle charging has reached the preset charging cycle. The charging cycle is managed according to recorded charging actions of a user; therefore, the user can be prompted and guided in an intuitive and clear way to carry out charging cycle management, and be prompted intelligently and regularly, so as to extend the service life of a battery.
    Type: Application
    Filed: August 26, 2013
    Publication date: February 6, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventors: Qing WANG, Haoran GUO, Yixia YUAN, Xunchang ZHAN, Chunyou LIN, Pengtao LI, Jiashun SONG
  • Publication number: 20140041029
    Abstract: Disclosed are a method and a device for processing URL risk detection, which belong to the field of computer technologies. The method comprises: querying a risk type of a URL for detection; querying a configuration file according to the risk type of the URL for detection, to obtain a corresponding risk level and processing policy, the configuration file including a correspondence relation between a risk type, a risk level and the processing policy; and processing the URL for detection according to the risk level and the processing policy.
    Type: Application
    Filed: October 8, 2013
    Publication date: February 6, 2014
    Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventor: Yanying ZHOU
  • Patent number: 8645479
    Abstract: Embodiments of the present invention provides a chatting system for a virtual pet, including a pet client, configured to receive a natural language sentence of a pet master, and send the natural language sentence to a virtual pet server; the virtual pet server, configured to forward the natural language sentence to a questioning and answering server, and return a natural language response to the pet client; the questioning and answering server, configured to perform processing of natural language understanding on the natural language sentence, obtain language characteristics of the pet master, generate the natural language response according to a natural language understanding result and the language characteristics of the pet master, and return the natural language response to the virtual pet server. Embodiments of the present invention further provide a chatting method for a virtual pet and a questioning and answering server.
    Type: Grant
    Filed: December 28, 2009
    Date of Patent: February 4, 2014
    Assignee: Tencent Technology (Shenzhen) Company Limited
    Inventors: Yunfeng Liu, Haisong Yang, Zhiyuan Liu, Rongling Yu
  • Patent number: 8645418
    Abstract: A method and an apparatus for word quality mining and evaluating are disclosed. The method includes: calculating a Document Frequency (DF) of a word in mass categorized data; evaluating the word in multiple single-aspects according to the DF of the word; and evaluating the word in multiple aspects according to the multiple single aspect evaluations to obtain an importance weight of the word. According to the solution of the present invention, the importance of the word in the mass categorized data may be evaluated, and words with high quality may be obtained through an integrated evaluation.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: February 4, 2014
    Assignee: Tencent Technology (Shenzhen) Company Limited
    Inventors: Huaijun Liu, Zhongbo Jiang, Gaolin Fang
  • Publication number: 20140032929
    Abstract: The present invention relates to the field of computers, and disclosed are a method, device, and system for encrypting and decrypting an image. The method for encrypting an image includes: encrypting a preset size of header data of a to-be-encrypted image, and obtaining an encrypted data corresponding to the header data; determining a storage location for saving the encrypted data, saving the encrypted data in the storage location, and acquiring an offset for saving the encrypted data; and placing the encryption identifier and the offset in a storage area of the preset size of the to-be-encrypted image, so as to encrypt the to-be-encrypted image. The system includes: a device for encrypting an image and a device for decrypting an image. The present invention is capable of improving the speed and efficiency of encrypting and decrypting an image.
    Type: Application
    Filed: September 27, 2013
    Publication date: January 30, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventors: Jianming CHEN, I, Xiaosheng ZHENG
  • Publication number: 20140032559
    Abstract: The present invention discloses a method and a device for displaying process information, which belongs to the field of computer technologies. The method may include: scanning a memory of a device for running processes; categorizing and ranking the scanned running processes according to a preset process display format; and displaying each process category after categorization and running processes within each process category, and displaying information related to the process category and the running processes within the process category; and/or displaying ranked running processes, and displaying related information corresponding to the ranked running processes.
    Type: Application
    Filed: August 2, 2013
    Publication date: January 30, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventors: Qing Wang, Haoran Guo, Quanhao Xiao, Yixia Yuan, Xunchang Zhan, Chunyou Lin, Pengtao Li, Jiashun Song