BEIJING QIHOO TECHNOLOGY COMPANY LIMITED Patent applications |
Patent application number | Title | Published |
20160132706 | METHOD AND APPARATUS FOR MOBILE TERMINAL TO PROCESS VISUAL GRAPHICS CODE - The present invention discloses a method and apparatus for a mobile terminal to process a visual graphics code. The method mainly comprises: obtaining a digital image recorded by the mobile terminal; analyzing the digital image to obtain a visual graphics code in the digital image; decoding the visual graphics code and classifying decoded information obtained after decoding; and processing the decoded information according to the classification of the decoded information. The present invention can achieve an effect that the mobile terminal can adaptively recognize and process various types of visual graphics codes, and greatly enhance the ability for the mobile terminal to intelligently process a visual graphics code, thereby improving the function of the mobile terminal, and causing the mobile terminal to meet the need of a user better. | 05-12-2016 |
20150381645 | Method, Device And System For Intercepting Web Address - Disclosed are a method, device and system for intercepting a web address. The method comprises: triggering an interception program pre-injected in a browser process; the interception program obtaining web address information of a network connection upon detecting a network connection operation, and determining whether the web address information is malicious web address information; and if the web address information is malicious web address information, the interception program instructing the browser process to stop accessing the malicious web address information. The present disclosure can interrupt a connection of a malicious URL in time. | 12-31-2015 |
20150371040 | Method, Device And System For Processing Notification Bar Message - Disclosed are a method, device and system for processing notification bar message, the method comprising: triggering an interception program pre-injected in a notification bar message process; and the interception program, when capturing a notification bar message satisfying a preset rule, intercepting the notification bar message satisfying the preset rule, and sending a prompt message. The disclosure can timely recognize and block a notification bar advertisement. | 12-24-2015 |
20150356298 | METHOD AND SYSTEM FOR UNLOCKING AND DELETING FILE AND FOLDER - A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder. The embodiments of the present invention relieves layer by layer the protections arranged by files infected with a virus by employing a plurality of means such as removing the read-only lock, removing the routine lock, adding the authority and closing the handle, thereby increasing the confrontation capacity of a security software against a malignant program. | 12-10-2015 |
20150326564 | Method And Browser For Online Banking Login - The present disclosure discloses method and browser for online banking login, solving the problems of complex and trivial steps and insecurity of online banking login via web navigation websites. The method comprises: pre-storing and managing online banking website addresses on a browser side and managing the certificates and/or online banking plugins corresponding to the online banking in the form of NPAPI; judging whether the current website address accessed by a user in the browser is an online banking website address, based on the stored online banking website addresses; when it is one of the stored online banking website addresses, using the NPAPI to call the corresponding online banking certificate and/or online banking plugin to perform online banking login. The embodiments of the present disclosure decrease steps and enhance security to log in to online banking. | 11-12-2015 |
20150310113 | Mobile Terminal, Server, System And Method For Realizing Search - The invention discloses a mobile terminal, server, system and method for realizing search, the mobile terminal including: an input module configured to receive a keyword for a search; a transmitting module configured to transmit the keyword to a server; a receiving module configured to receive a recommended search engine and/or application selected by the server according to the keyword; a search module configured to use the recommended search engine to search for the keyword to obtain search results after receiving the recommended search engine; and a presenting module configured to present a page of the search results for the search using the search engine recommended by the server and/or to present the application recommended by the server, when the input module receives the instruction to select the recommended application, instructing the search module to use the application indicated in the instruction to search for the keyword, and after the search results are obtained, presenting the search results. The invention can achieve an advantageous effect of obtaining better search results for a keyword. | 10-29-2015 |
20150309851 | Method and Device for Browsing Webpage - The present invention discloses a method and device for browsing webpage, wherein the method including: creating a plugin/control process independent from a page process for a plugin/control object when a page thread creates the plugin/control object; and placing the independent plugin/control process into a sandbox to run; browsing a webpage by implementing inter-process communication between the plugin/control process and the page process; wherein the page process running outside the sandbox. According to the invention, the web browsing security is guaranteed, and meanwhile the running stability of the browser is enhanced. | 10-29-2015 |
20150309724 | Method and apparatus for setting keyboard - The disclosure discloses a method and apparatus for setting a virtual keyboard which may adjust individual buttons in the virtual keyboard to prevent password cracking software from cracking a password by the approach of continuously trying to input a command sequence. The method comprises: in a current keyboard layout, receiving a character string constituted by selected button key values for password check; when it is detected that the character string matches a preset password, passing the password check of the character string; when it is detected that the character string does not match the preset password, resetting the keyboard layout, and changing the button positions corresponding to the button key values in the virtual keyboard; and in the reset keyboard layout, receiving the character string constituted by selected button key values to continue to perform the password check. | 10-29-2015 |
20150242222 | Method and client for using an embedded ActiveX plug-in in a browser - The invention discloses a method and client for using an embedded ActiveX plug-in in a browser. The method comprises: detecting that the browser is to load an ActiveX plug-in; judging whether the ActiveX plug-in has already been installed in a computer system where the browser is currently located; if it is determined that the ActiveX plug-in has already been installed in the computer system, intercepting the loading information about the ActiveX plug-in and loading the ActiveX plug-in embedded in the browser; and if it is determined that the ActiveX plug-in has not been installed in the computer system, generating a specific registry key value related to the embedded ActiveX plug-in, and loading the ActiveX plug-in embedded in the browser according to the specific registry key value. | 08-27-2015 |
20150205960 | METHOD OF DETECTING A MALWARE BASED ON A WHITE LIST - A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective. | 07-23-2015 |
20150154313 | A METHOD, DEVICE, BROWSER AND PROGRAM FOR ACCESSING WEB PAGE - The present invention disclosed a method, a device and a browser for accessing to webpage to solve a problem of no cache at first access of the browser. The method comprises: creating an optimized cache area locally in advance, and preloading all webpage data required to be accessed in the optimized cache area; and when a webpage access request is initiated, querying whether the webpage data corresponding to the webpage access request is stored in the optimized cache area, if stored, reading the webpage data directly from the optimized cache area; if not stored, triggering a defaulted cache mechanism of a browser to query whether the webpage data is stored in a default cache area of the browser. The present invention may increase the access speed to webpage (especially having complex webpage script), and avoid the cache from being cleaned automatically by the browser. | 06-04-2015 |
20150089512 | Method and Device for Browsing Webpage - The present invention discloses a method and device for browsing webpage, wherein the method including: creating a plugin/control process independent from a page process for a plugin/control object when a page thread creates the plugin/control object; and placing the independent plugin/control process into a sandbox to run; browsing a webpage by implementing inter-process communication between the plugin/control process and the page process; wherein the page process running outside the sandbox. According to the invention, the web browsing security is guaranteed, and meanwhile the running stability of the browser is enhanced. | 03-26-2015 |
20150058978 | METHOD AND DEVICE FOR PROMPTING INFORMATION ABOUT E-MAIL - The present invention discloses a method and a device for prompting information about an e-mail. The method comprises: extracting information from a currently opened e-mail; according to the extracted information, determining whether an unsafe webpage link is contained in content of the currently opened e-mail; and if yes, providing security prompting information to a user. By means of the present invention, security is ensured when a person uses an e-mail box. | 02-26-2015 |
20150012923 | MESSAGE PROCESSING METHOD AND DEVICE - The present invention provides a message processing method and device, wherein the method comprises: creating a message queue by an application; taking out all current messages from a message queue created by an operating system; performing order adjustment for the taken-out messages and placing them in the message queue created by the application; performing delivery-processing for each message according to an order of messages in the message queue created by the application. Through the present invention, the messages in the message queue may be processed more flexibly. | 01-08-2015 |
20140351935 | METHOD, APPARATUS AND VIRTUAL MACHINE FOR DETECTING MALICIOUS PROGRAM - A method, an apparatus and a virtual machine for detecting a malicious program(s) are disclosed. The method comprises: setting a virtual memory ( | 11-27-2014 |
20140317733 | METHOD AND CLIENT FOR ENSURING USER NETWORK SECURITY - A method and client for ensuring user network security, the method comprising: detecting whether a user opens a login operation mode or payment operation mode via a client; and when detecting that the user opens the login operation mode or payment operation mode, performing security monitoring for the login procedure or payment procedure of the user according to a preset security strategy. By applying the embodiment of the present invention, when a client user is in a login procedure or online payment procedure, security protection can be implemented for the login procedure or payment procedure via multiple security strategies specially used for ensuring the login procedure or payment procedure, and network security is ensured for the user during the login procedure or payment procedure via risky process interception, executable file prompt and browser invoke monitoring. | 10-23-2014 |
20140310807 | Cloud-based secure download method - The invention provides a cloud-based secure download method. A download terminal carries out an information interaction with a cloud security server via the Internet, comprising the following steps of: acquiring, by the download terminal, a URL address of a file to be downloaded by a user; comparing the URL address of the file to be downloaded with a malicious URL list in the cloud security server; and prompting a comparison result to the user by the download terminal. | 10-16-2014 |
20140310560 | METHOD AND APPARATUS FOR MODULE REPAIR IN SOFTWARE - The present application relates to a method and apparatus for module repair in software. In the method, when a module in the software has an error, correct content corresponding to the erroneous content is obtained by way of accessing a web page address; then the correct content obtained is directly loaded into a system memory and the corresponding correct content is invoked directly from the memory when the module is used. The method of the present application results in the software possessing a self-repairing function and self-detection function, and can be applied in any software device. | 10-16-2014 |
20140236902 | User Data Backup Method and Apparatus - The invention discloses a user data backup method, comprising: searching a local computer of a user for an editable document; according to a search result, marking the editable document as data with backup requirement; and backing up the data with backup requirement in a storage device on a network side. Also disclosed is another user data backup method, comprising: monitoring a removable storage device connection status of a local computer of a user; if it is detected that a removable storage device is connected to the local computer, marking data in the device as data with backup requirement; and backing up the data with backup requirement in a storage device on a network side. Further disclosed is yet another user data backup method, comprising: monitoring a resource class temporary file generated in a local system; uploading the resource class temporary file to a storage device on a network side; and according to an access requirement of the local system, providing the local system with download of the uploaded resource class temporary file. | 08-21-2014 |
20140149995 | Browser Kernel Switching Method - The present invention provides a browser kernel switching method, which enables a browser to switch between different browser kernels when browsering different web pages, and comprises the following steps: detecting, by the browser, whether a kernel switch is needed; and transferring a post data in a previous kernel of the browser to the kernel which is to be switched when loading a page that requires to switch kernel. | 05-29-2014 |
20140123290 | METHOD, DEVICE AND SYSTEM FOR PROCESSING COMPUTER VIRUS - A method, an apparatus and a system for processing a computer virus. The method comprises: obtaining the file type of a file which is infected with a computer virus and the process information of a process which is used by the virus when accessing the file; monitoring whether a malicious event occurs in s system, wherein the malicious event is an event which is triggered when the process corresponding to the process information accesses the file of the file type; and refusing the process to access the file of the file type when it is monitored that the malicious event occurs. | 05-01-2014 |
20140007126 | METHOD AND DEVICE FOR ALLOCATING BROWSER PROCESS | 01-02-2014 |
20140006619 | Method for Logging in by Multi-account and the Client | 01-02-2014 |
20140006558 | METHOD AND DEVICE FOR RESUMING FILE DOWNLOAD | 01-02-2014 |
20130298121 | Method for Isolated Use of Browser - The present invention provides a method for isolated use of browser comprising: establishing a virtual environment in a user's computer system by a browser; arranging content loaded by the browser in the virtual environment; processing operation results in the virtual environment. | 11-07-2013 |
20130298116 | Method and System for Intelligent Installation/Upgrading of Software - The present provides a method and system for intelligent installation/upgrading of software. Said method first detects, at a client, softwares that have been installed on the client, generates a list of softwares to be installed/upgraded, and provides a corresponding installation/upgrading prompt for each software to be installed/upgraded; then, upon detecting, by the client, that a user selects an installation/upgrading operation of a software according to said installation/upgrading prompt, it downloads a corresponding target software installation/upgrading package from a server according to a name and version number of said software to be installed/upgraded; next, it runs an installation/upgrading file in said target software installation/upgrading package at the client to finish installation/upgrading of said software. The present invention makes the user no longer need to worry about the irrelevant and harmful contents bound to the software to be installed, so it can realize convenient installation, meanwhile, it can enable the user to learn about new versions of softwares installed in the client in time and can upgrade several softwares at one time. | 11-07-2013 |
20130291111 | Method and Device for Program Identification Based on Machine Learning - The invention discloses a method and device for programidentification based on machine learning. The method comprises: analyzing an inputted unknown program, and extracting a feature of the unknown program; coarsely classifying the unknown program according to the extracted feature; judging by inputting the unknown program into a corresponding decision-making machine generated by training according to a result of the coarse classification; and outputting an identification result of the unknown program, wherein the identification result is a malicious program or a non-malicious program. The embodiments of the invention adopt the machine learning technology, achieve the decision-making machine for identifying a malicious program by analyzing a large number of program samples, and can save a lot of manpower and improve the identification efficiency for a malicious program by using the decision-making machine; and furthermore, can find an inherent law of programs based on data mining for massive programs, prevent a malicious program that has not happened and make it difficult for a malicious program to avoid killing. | 10-31-2013 |
20130185797 | WHITELIST-BASED INSPECTION METHOD FOR MALICIOUS PROCESS - A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective. | 07-18-2013 |
20130174257 | Active Defense Method on The Basis of Cloud Security - The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security. | 07-04-2013 |