Patents Assigned to TENCENT TECHNOLOGY (SHENZHEN)
-
Publication number: 20140041035Abstract: The invention relates to method and system for file scanning The method includes performing specified scanning on files of terminal equipment to determine suspicious files infected by viruses; repairing the suspicious files infected by the viruses and recording repair actions; and checking the recorded repair actions after the specified scanning is finished. The system includes a scanning module, a repairing module, and a checking module. According to the invention, repair actions performed during the repair procedure are recorded when suspicious files infected by viruses are repaired, and these recorded repair actions are checked after the repairs are finished so as to confirm the repair effect and reinforce the repair, thereby preventing suspicious files infected by various viruses from damaging and infecting the system.Type: ApplicationFiled: September 9, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventor: Zi-Xiao Nie
-
Publication number: 20140041005Abstract: A method and system for login authentication is disclosed. The method comprises the steps of: sending, by a first client, a first login request to a login server and receiving a mapping relationship between original characters and post-mapping characters returned by the login server according to the first login request; and sending, by a second client, a second login request to the login server according to the mapping relationship, with the second login request including post-mapping information corresponding to user information determined according to the mapping relationship. The solution in the present invention is to realize joint login by two clients, such that even if one of the clients is infected with a computer virus, no particular user information can be obtained through the infected client. Thus, the security of login authentication and the security of user information can be improved.Type: ApplicationFiled: August 26, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventor: Chang HE
-
Publication number: 20140041034Abstract: Disclosed in the present invention are a method and apparatus for checking a process of decompressing an application installation package. The present invention belongs to the technical field of security. The method comprises: decompressing a sub-portion of data in an application installation package to acquire decompressed data, the sub-portion of data being not greater than a threshold size; checking the decompressed data according to the virus samples in a virus feature library; and determining that the application installation package is a virus-infected file or rogue software when the decompressed data includes any of the virus samples. The technical solution of the present invention can effectively save the internal memory, shorten the checking time, and improve the checking efficiency in determining whether an application installation package is a virus-infected file or rogue software.Type: ApplicationFiled: August 26, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Wei LI, Jingwei HAN
-
Publication number: 20140040242Abstract: An electronic device is configured to exchange data with a mobile storage device. The device monitors for a first event corresponding to the storage device being unmounted. In response to detecting the first event, the device records a first time. After the first event, the device monitors for a second event corresponding to the storage device being mounted. In response to detecting the second event, the device records a second time. After the second event, the device performs a scan of the storage device, stores the scanned data in a database, and records a storage path corresponding to the scanned data in the database. The device monitors for a third event corresponding to completion of the scan, and records a third time. The device retrieves a dataset with a timestamp between the first time and the third time and displays the dataset and the timestamp.Type: ApplicationFiled: September 10, 2013Publication date: February 6, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Xing ZHOU, BIN YU, QIAO REN, SHIZHU HUANG
-
Publication number: 20140038650Abstract: The present invention discloses a short message backup method, mobile terminal, server, and system, and belongs to the field of communications. The method includes: obtaining a local short message of a mobile terminal, and storing the local short message of the mobile terminal in a local short message backup database file according to a preset format supported by a remote server; and sending the short message backup database file to the server, so that the server stores the short message backup database file and a user account, so as to complete short message backup. In the present invention, by storing a short message of a mobile terminal of a user as a short message backup database file of a preset format supported by a remote server, and sending it to the server for storage, the reliability and compatibility of short message backup are improved, and an operation is simple.Type: ApplicationFiled: August 20, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Qing WANG, Haoran Guo, Yixia Yuan, Xunchang Zhan, Chunyou Lin, Pengtao Li, Jiashun Song
-
Publication number: 20140038561Abstract: The present invention discloses a method and a mobile terminal for displaying an event notification. While running an application on a display of the mobile terminal, the terminal receives an event notification. If the event notification is compatible with the application, the terminal generates a user-interactive icon for the event notification on the display. In response to a user selection of the user-interactive icon, the terminal determines whether the event notification corresponds to a public or private event. If the event notification corresponds to a public event, the terminal replaces the application with a display of a list of public events including the public event. If the event notification corresponds to a private event, the terminal prompts a user to enter identity information for accessing private events and replaces the application with a display of a list of private events including the private event after verifying the user-entered identity information.Type: ApplicationFiled: September 27, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Qing WANG, Haoran GUO, Yixia YUAN, Xunchang ZHAN, Chunyou LIN, Pengtao LI, Jiashun SONG
-
Publication number: 20140040394Abstract: Disclosed are a method and device for processing messages. The method includes: determining, when a message sent by software is intercepted, whether the message is a spam message; when the message is not a spam message, having the message displayed in a notification toolbar; and when the message is a spam message, prompting a user in the notification toolbar that the software may be implanted with a malicious plug-in, and providing an option label for the user to judge and select whether to inhibit displaying all messages sent by the software, including the message.Type: ApplicationFiled: August 20, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Wenliang TANG, Tianming Xiao, Zhaohua Lu, Xing Zeng
-
Publication number: 20140040823Abstract: Multi-window browsing methods and devices are disclosed. A target-object selection control command can be received by a multi-window browsing device. The target-object selection control command can be issued according to each of one or more target objects selected to be added to a multi-window browsing interface. The multi-window browsing device can determine whether a number of the one or more target objects reaches a preset value and can start the multi-window browsing interface to simultaneously display the one or more target objects on the multi-window browsing interface, when the number of the one or more target objects is determined that reaches the preset value. An exemplary multi-window browsing device can include a receiving unit, a determining unit, and a display unit.Type: ApplicationFiled: September 24, 2013Publication date: February 6, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: YUEWEI FAN, MENG ZHOU, DING XIANG
-
Publication number: 20140035514Abstract: A method, a computer-readable medium, and a system for battery-charging management are provided. The method comprises: recording a respective time that previous trickle charging was carried out by a user; determining that a time interval between a current time and the respective time for the previous trickle charging has reached a preset charging cycle; and prompting the user to carry out next trickle charging in response to determining that the time interval between the current time and the respective time for the previous trickle charging has reached the preset charging cycle. The charging cycle is managed according to recorded charging actions of a user; therefore, the user can be prompted and guided in an intuitive and clear way to carry out charging cycle management, and be prompted intelligently and regularly, so as to extend the service life of a battery.Type: ApplicationFiled: August 26, 2013Publication date: February 6, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Qing WANG, Haoran GUO, Yixia YUAN, Xunchang ZHAN, Chunyou LIN, Pengtao LI, Jiashun SONG
-
Publication number: 20140041029Abstract: Disclosed are a method and a device for processing URL risk detection, which belong to the field of computer technologies. The method comprises: querying a risk type of a URL for detection; querying a configuration file according to the risk type of the URL for detection, to obtain a corresponding risk level and processing policy, the configuration file including a correspondence relation between a risk type, a risk level and the processing policy; and processing the URL for detection according to the risk level and the processing policy.Type: ApplicationFiled: October 8, 2013Publication date: February 6, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: Yanying ZHOU
-
Patent number: 8645479Abstract: Embodiments of the present invention provides a chatting system for a virtual pet, including a pet client, configured to receive a natural language sentence of a pet master, and send the natural language sentence to a virtual pet server; the virtual pet server, configured to forward the natural language sentence to a questioning and answering server, and return a natural language response to the pet client; the questioning and answering server, configured to perform processing of natural language understanding on the natural language sentence, obtain language characteristics of the pet master, generate the natural language response according to a natural language understanding result and the language characteristics of the pet master, and return the natural language response to the virtual pet server. Embodiments of the present invention further provide a chatting method for a virtual pet and a questioning and answering server.Type: GrantFiled: December 28, 2009Date of Patent: February 4, 2014Assignee: Tencent Technology (Shenzhen) Company LimitedInventors: Yunfeng Liu, Haisong Yang, Zhiyuan Liu, Rongling Yu
-
Patent number: 8645418Abstract: A method and an apparatus for word quality mining and evaluating are disclosed. The method includes: calculating a Document Frequency (DF) of a word in mass categorized data; evaluating the word in multiple single-aspects according to the DF of the word; and evaluating the word in multiple aspects according to the multiple single aspect evaluations to obtain an importance weight of the word. According to the solution of the present invention, the importance of the word in the mass categorized data may be evaluated, and words with high quality may be obtained through an integrated evaluation.Type: GrantFiled: May 7, 2012Date of Patent: February 4, 2014Assignee: Tencent Technology (Shenzhen) Company LimitedInventors: Huaijun Liu, Zhongbo Jiang, Gaolin Fang
-
Publication number: 20140032652Abstract: A browser operation and control method is provided for a server and a client having a browser. The server receives a query request message from the client, and the query request message contains a character string converted by the client from voice information inputted by a user of the client. The server obtains control information for operating the browser based on the character string in the query request message, and the control information indicating one of a plurality results provided by the server including a direct URL based on the character string, a direct operation command based on the character string, and a search result page based on the character string. The server sends a query response message containing the control information to the client such that the client operates the browser based on the control information in response to the voice information inputted by the user.Type: ApplicationFiled: August 29, 2013Publication date: January 30, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: BO HU, SHA MO, TINGYONG TANG, YING HUANG, XI WANG, CHENG FENG
-
Publication number: 20140033291Abstract: A system and a method for visiting a third party application through a cloud platform are disclosed. The method includes: receiving a cloud platform account and cloud platform password information inputted by a user; searching a stored binding information mapping table according to a third party application selected by the user to obtain the third party application and obtain access information not comprising cleartext password corresponding to the cloud platform account information, and transmitting the access information to the third party application server; and receiving authentication succeed information returned by the third party application server. According to the present disclosure, complexity of user's operations may be reduced when the user logs on frequently and security level of the user for visiting the third party application may be improved.Type: ApplicationFiled: February 2, 2012Publication date: January 30, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: Yang Liu
-
Publication number: 20140032559Abstract: The present invention discloses a method and a device for displaying process information, which belongs to the field of computer technologies. The method may include: scanning a memory of a device for running processes; categorizing and ranking the scanned running processes according to a preset process display format; and displaying each process category after categorization and running processes within each process category, and displaying information related to the process category and the running processes within the process category; and/or displaying ranked running processes, and displaying related information corresponding to the ranked running processes.Type: ApplicationFiled: August 2, 2013Publication date: January 30, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Qing Wang, Haoran Guo, Quanhao Xiao, Yixia Yuan, Xunchang Zhan, Chunyou Lin, Pengtao Li, Jiashun Song
-
Publication number: 20140032929Abstract: The present invention relates to the field of computers, and disclosed are a method, device, and system for encrypting and decrypting an image. The method for encrypting an image includes: encrypting a preset size of header data of a to-be-encrypted image, and obtaining an encrypted data corresponding to the header data; determining a storage location for saving the encrypted data, saving the encrypted data in the storage location, and acquiring an offset for saving the encrypted data; and placing the encryption identifier and the offset in a storage area of the preset size of the to-be-encrypted image, so as to encrypt the to-be-encrypted image. The system includes: a device for encrypting an image and a device for decrypting an image. The present invention is capable of improving the speed and efficiency of encrypting and decrypting an image.Type: ApplicationFiled: September 27, 2013Publication date: January 30, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Jianming CHEN, I, Xiaosheng ZHENG
-
Publication number: 20140033216Abstract: The present invention relates to the field of computer technologies, and disclosed are a task processing method and an associated mobile terminal for performing the method. The method includes: scanning an application program, so as to obtain a list of predefined tasks corresponding to the application program; comparing the list of predefined tasks with a preset white list of tasks; removing a matched task from the list of predefined tasks, so as to obtain a new task list, so that a user selects a task according to a need from the new task list for execution; detecting one or more user selections of members of the new task list; updating the new task list and the preset white list of tasks according to the user selections; and performing the updated new task list using the application program.Type: ApplicationFiled: October 1, 2013Publication date: January 30, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Qing WANG, Haoran GUO, Yixia YUAN, Xunchang ZHAN, Chunyou LIN, Pengtao LI, Jiashun SONG
-
Publication number: 20140032675Abstract: The present invention provides a method for pushing an associated user in a Social Networking Service (SNS) network and an SNS network system. The method comprises: respectively collecting a plurality of pieces of user data created by each SNS user in an SNS network; extracting, from the plurality of pieces of user data created by each SNS user, at least one label and attribute belonging to the SNS user; generating a user list consisting of a plurality of SNS users having the same label and the same attribute; and pushing, in a bidirectional manner, user lists having the same label and associated attributes. In the present invention, based on user data created by a user, the SNS system automatically searches for associated users thereof, thereby implementing mutual pushing of the associated users, so that communication between SNS users becomes more efficient and convenient.Type: ApplicationFiled: September 27, 2013Publication date: January 30, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Jianwei Zhao, Xin Feng
-
Publication number: 20140032687Abstract: The method is performed as a client device and includes receiving a first message that includes a first data usage value. The first message is formatted according to a respective format. After receiving the first message, the method further includes acquiring a data usage template corresponding to the respective format. The method further includes receiving a second message that includes a second data usage value. The second message is formatted according to the respective format. The method further includes parsing the second message according to the data usage template so as to obtain a second data usage value.Type: ApplicationFiled: July 29, 2013Publication date: January 30, 2014Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Feijun LI, Shengrong Chen, Chuhao Chen
-
Publication number: 20140033072Abstract: A method for notifying a friend includes configuring a friend notifying input box in a text editing interface; initiating a friend association based on a keyword input by a user and a friend list of the user, according to the keyword input in the friend notifying input box by the user; determining at least one friend to be selected from the friend list of the user according to the keyword; determining at least one friend selected by the user from the at least one friend as at least one target friend; sending a friend notification to the at least one target friend after the user finishes editing a text and posts the text. An apparatus for notifying a friend is provided.Type: ApplicationFiled: September 30, 2013Publication date: January 30, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Zhihao ZHENG, Zhu LIANG, Yingbin LI