Patents Assigned to Tencent Technology (Shenzhen) Company
-
Patent number: 8654845Abstract: The invention provides a method and device for video predictive encoding.Type: GrantFiled: September 10, 2012Date of Patent: February 18, 2014Assignees: Tencent Technology (Shenzhen) Company Limited, Tsinghua UniversityInventors: Pin Tao, Wenting Wu, Mou Xiao, Jiangtao Wen, Chenchen Gu, Jing Lv, Fuzhong Sheng
-
Publication number: 20140046968Abstract: The present invention discloses a data acquisition method, including: receiving at least one first data acquisition request, wherein the first data acquisition request carries a data selection condition; acquiring all the data identifiers satisfying the data selection condition according to the data selection condition; and concurrently acquiring all the data corresponding to the data identifiers according to the data identifiers, and returning the acquired data. Also disclosed is a data acquisition apparatus, including: a data acquisition request receiving module, a data identifier acquiring module, and a first data acquiring module. According to the embodiments of the present invention, data identifiers are determined according to a data selection condition, and all the data corresponding to the data identifiers is concurrently acquired according to the data identifiers, thereby reducing a data feedback delay caused by successive acquisition of data in the prior art.Type: ApplicationFiled: April 6, 2012Publication date: February 13, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: Qing Yuan
-
Publication number: 20140047264Abstract: The method is performed as a client device and includes receiving a first message that includes a first data usage value. The first message is formatted according to a respective format. After receiving the first message, the method further includes acquiring a data usage template corresponding to the respective format. The method further includes receiving a second message that includes a second data usage value. The second message is formatted according to the respective format. The method further includes parsing the second message according to the data usage template so as to obtain a second data usage value.Type: ApplicationFiled: September 27, 2013Publication date: February 13, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Xuxin WANG, Peng XUE
-
Publication number: 20140047051Abstract: A method for sending prompt information to Social Networking Services (SNS) community users comprises the following steps: acquiring the inactive users in an SNS community; acquiring the friend relationship chains of the inactive users; acquiring the active users in the friend relationship chains; acquiring the writing operations of the active users; sending prompt information related to the writing operations of the active users to the inactive users. The method described above for sending prompt information to SNS community users can increase the success rate for activating the inactive users, and thus effectively reducing the loss of the SNS community users. Besides, a system for sending prompt information to SNS community users is also provided.Type: ApplicationFiled: July 10, 2012Publication date: February 13, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Chun Li, Yu Chen
-
Publication number: 20140046850Abstract: A transaction payment method includes the following steps: acquiring payment information about a user, the payment information including a contact number; calling the contact number through an Interactive Voice Response platform to acquire the payment password input by the user; and verifying the payment password and payment information, and performing payment if the verification is passed. The transaction payment method above can be applied to improve payment security. Additionally, also provided is a transaction payment system.Type: ApplicationFiled: October 18, 2013Publication date: February 13, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Tao XIANG, Shaobo LIAO, Tiehua LIU, Dapeng ZHAO, Yunxia FENG, Min CHENG
-
Publication number: 20140047374Abstract: Embodiments, relating to the field of virtual keyboard technologies, of the present invention provide a method for acquiring a virtual keyboard key. The method includes: receiving layout of a universal virtual keyboard and a mapping relationship between terminals and universal virtual keyboard key value mapping tables from a server; acquiring a corresponding universal virtual keyboard key value mapping table according to the identifier of the terminal and the mapping relationship between terminals and universal virtual keyboard key value mapping tables; and acquiring a universal virtual keyboard according to the layout of the universal virtual keyboard and the universal virtual keyboard key value mapping table of the terminal.Type: ApplicationFiled: December 23, 2011Publication date: February 13, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Zhiqiang He, Chunhua Luo, Yuankun Zheng, Cheng Guo, Yu Tian, Liang Ma
-
Publication number: 20140041005Abstract: A method and system for login authentication is disclosed. The method comprises the steps of: sending, by a first client, a first login request to a login server and receiving a mapping relationship between original characters and post-mapping characters returned by the login server according to the first login request; and sending, by a second client, a second login request to the login server according to the mapping relationship, with the second login request including post-mapping information corresponding to user information determined according to the mapping relationship. The solution in the present invention is to realize joint login by two clients, such that even if one of the clients is infected with a computer virus, no particular user information can be obtained through the infected client. Thus, the security of login authentication and the security of user information can be improved.Type: ApplicationFiled: August 26, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventor: Chang HE
-
Publication number: 20140041034Abstract: Disclosed in the present invention are a method and apparatus for checking a process of decompressing an application installation package. The present invention belongs to the technical field of security. The method comprises: decompressing a sub-portion of data in an application installation package to acquire decompressed data, the sub-portion of data being not greater than a threshold size; checking the decompressed data according to the virus samples in a virus feature library; and determining that the application installation package is a virus-infected file or rogue software when the decompressed data includes any of the virus samples. The technical solution of the present invention can effectively save the internal memory, shorten the checking time, and improve the checking efficiency in determining whether an application installation package is a virus-infected file or rogue software.Type: ApplicationFiled: August 26, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Wei LI, Jingwei HAN
-
Publication number: 20140041035Abstract: The invention relates to method and system for file scanning The method includes performing specified scanning on files of terminal equipment to determine suspicious files infected by viruses; repairing the suspicious files infected by the viruses and recording repair actions; and checking the recorded repair actions after the specified scanning is finished. The system includes a scanning module, a repairing module, and a checking module. According to the invention, repair actions performed during the repair procedure are recorded when suspicious files infected by viruses are repaired, and these recorded repair actions are checked after the repairs are finished so as to confirm the repair effect and reinforce the repair, thereby preventing suspicious files infected by various viruses from damaging and infecting the system.Type: ApplicationFiled: September 9, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventor: Zi-Xiao Nie
-
Publication number: 20140038650Abstract: The present invention discloses a short message backup method, mobile terminal, server, and system, and belongs to the field of communications. The method includes: obtaining a local short message of a mobile terminal, and storing the local short message of the mobile terminal in a local short message backup database file according to a preset format supported by a remote server; and sending the short message backup database file to the server, so that the server stores the short message backup database file and a user account, so as to complete short message backup. In the present invention, by storing a short message of a mobile terminal of a user as a short message backup database file of a preset format supported by a remote server, and sending it to the server for storage, the reliability and compatibility of short message backup are improved, and an operation is simple.Type: ApplicationFiled: August 20, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Qing WANG, Haoran Guo, Yixia Yuan, Xunchang Zhan, Chunyou Lin, Pengtao Li, Jiashun Song
-
Publication number: 20140040394Abstract: Disclosed are a method and device for processing messages. The method includes: determining, when a message sent by software is intercepted, whether the message is a spam message; when the message is not a spam message, having the message displayed in a notification toolbar; and when the message is a spam message, prompting a user in the notification toolbar that the software may be implanted with a malicious plug-in, and providing an option label for the user to judge and select whether to inhibit displaying all messages sent by the software, including the message.Type: ApplicationFiled: August 20, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Wenliang TANG, Tianming Xiao, Zhaohua Lu, Xing Zeng
-
Publication number: 20140040823Abstract: Multi-window browsing methods and devices are disclosed. A target-object selection control command can be received by a multi-window browsing device. The target-object selection control command can be issued according to each of one or more target objects selected to be added to a multi-window browsing interface. The multi-window browsing device can determine whether a number of the one or more target objects reaches a preset value and can start the multi-window browsing interface to simultaneously display the one or more target objects on the multi-window browsing interface, when the number of the one or more target objects is determined that reaches the preset value. An exemplary multi-window browsing device can include a receiving unit, a determining unit, and a display unit.Type: ApplicationFiled: September 24, 2013Publication date: February 6, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: YUEWEI FAN, MENG ZHOU, DING XIANG
-
Publication number: 20140038561Abstract: The present invention discloses a method and a mobile terminal for displaying an event notification. While running an application on a display of the mobile terminal, the terminal receives an event notification. If the event notification is compatible with the application, the terminal generates a user-interactive icon for the event notification on the display. In response to a user selection of the user-interactive icon, the terminal determines whether the event notification corresponds to a public or private event. If the event notification corresponds to a public event, the terminal replaces the application with a display of a list of public events including the public event. If the event notification corresponds to a private event, the terminal prompts a user to enter identity information for accessing private events and replaces the application with a display of a list of private events including the private event after verifying the user-entered identity information.Type: ApplicationFiled: September 27, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Qing WANG, Haoran GUO, Yixia YUAN, Xunchang ZHAN, Chunyou LIN, Pengtao LI, Jiashun SONG
-
Publication number: 20140040242Abstract: An electronic device is configured to exchange data with a mobile storage device. The device monitors for a first event corresponding to the storage device being unmounted. In response to detecting the first event, the device records a first time. After the first event, the device monitors for a second event corresponding to the storage device being mounted. In response to detecting the second event, the device records a second time. After the second event, the device performs a scan of the storage device, stores the scanned data in a database, and records a storage path corresponding to the scanned data in the database. The device monitors for a third event corresponding to completion of the scan, and records a third time. The device retrieves a dataset with a timestamp between the first time and the third time and displays the dataset and the timestamp.Type: ApplicationFiled: September 10, 2013Publication date: February 6, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Xing ZHOU, BIN YU, QIAO REN, SHIZHU HUANG
-
Publication number: 20140035514Abstract: A method, a computer-readable medium, and a system for battery-charging management are provided. The method comprises: recording a respective time that previous trickle charging was carried out by a user; determining that a time interval between a current time and the respective time for the previous trickle charging has reached a preset charging cycle; and prompting the user to carry out next trickle charging in response to determining that the time interval between the current time and the respective time for the previous trickle charging has reached the preset charging cycle. The charging cycle is managed according to recorded charging actions of a user; therefore, the user can be prompted and guided in an intuitive and clear way to carry out charging cycle management, and be prompted intelligently and regularly, so as to extend the service life of a battery.Type: ApplicationFiled: August 26, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Qing WANG, Haoran GUO, Yixia YUAN, Xunchang ZHAN, Chunyou LIN, Pengtao LI, Jiashun SONG
-
Publication number: 20140041029Abstract: Disclosed are a method and a device for processing URL risk detection, which belong to the field of computer technologies. The method comprises: querying a risk type of a URL for detection; querying a configuration file according to the risk type of the URL for detection, to obtain a corresponding risk level and processing policy, the configuration file including a correspondence relation between a risk type, a risk level and the processing policy; and processing the URL for detection according to the risk level and the processing policy.Type: ApplicationFiled: October 8, 2013Publication date: February 6, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: Yanying ZHOU
-
Patent number: 8645479Abstract: Embodiments of the present invention provides a chatting system for a virtual pet, including a pet client, configured to receive a natural language sentence of a pet master, and send the natural language sentence to a virtual pet server; the virtual pet server, configured to forward the natural language sentence to a questioning and answering server, and return a natural language response to the pet client; the questioning and answering server, configured to perform processing of natural language understanding on the natural language sentence, obtain language characteristics of the pet master, generate the natural language response according to a natural language understanding result and the language characteristics of the pet master, and return the natural language response to the virtual pet server. Embodiments of the present invention further provide a chatting method for a virtual pet and a questioning and answering server.Type: GrantFiled: December 28, 2009Date of Patent: February 4, 2014Assignee: Tencent Technology (Shenzhen) Company LimitedInventors: Yunfeng Liu, Haisong Yang, Zhiyuan Liu, Rongling Yu
-
Patent number: 8645418Abstract: A method and an apparatus for word quality mining and evaluating are disclosed. The method includes: calculating a Document Frequency (DF) of a word in mass categorized data; evaluating the word in multiple single-aspects according to the DF of the word; and evaluating the word in multiple aspects according to the multiple single aspect evaluations to obtain an importance weight of the word. According to the solution of the present invention, the importance of the word in the mass categorized data may be evaluated, and words with high quality may be obtained through an integrated evaluation.Type: GrantFiled: May 7, 2012Date of Patent: February 4, 2014Assignee: Tencent Technology (Shenzhen) Company LimitedInventors: Huaijun Liu, Zhongbo Jiang, Gaolin Fang
-
Publication number: 20140032929Abstract: The present invention relates to the field of computers, and disclosed are a method, device, and system for encrypting and decrypting an image. The method for encrypting an image includes: encrypting a preset size of header data of a to-be-encrypted image, and obtaining an encrypted data corresponding to the header data; determining a storage location for saving the encrypted data, saving the encrypted data in the storage location, and acquiring an offset for saving the encrypted data; and placing the encryption identifier and the offset in a storage area of the preset size of the to-be-encrypted image, so as to encrypt the to-be-encrypted image. The system includes: a device for encrypting an image and a device for decrypting an image. The present invention is capable of improving the speed and efficiency of encrypting and decrypting an image.Type: ApplicationFiled: September 27, 2013Publication date: January 30, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Jianming CHEN, I, Xiaosheng ZHENG
-
Publication number: 20140032559Abstract: The present invention discloses a method and a device for displaying process information, which belongs to the field of computer technologies. The method may include: scanning a memory of a device for running processes; categorizing and ranking the scanned running processes according to a preset process display format; and displaying each process category after categorization and running processes within each process category, and displaying information related to the process category and the running processes within the process category; and/or displaying ranked running processes, and displaying related information corresponding to the ranked running processes.Type: ApplicationFiled: August 2, 2013Publication date: January 30, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Qing Wang, Haoran Guo, Quanhao Xiao, Yixia Yuan, Xunchang Zhan, Chunyou Lin, Pengtao Li, Jiashun Song