Patent application number | Description | Published |
20140082088 | METHOD AND APPARATUS FOR IMPLEMENTING USER RELATIONSHIP IN SOCIAL NETWORK APPLICATION - The present invention provides a method and an apparatus for establishing a user relationship in a social networking application to improve the information security. The method includes: receiving a user addition request; determining whether the user addition request is initiated from a predefined trustworthy relationship scenario, and if not, performing verification on a user initiating the request; and establishing a user relationship according to a verification result. The apparatus includes: a request acquisition module, configured to receive the user addition request; a scenario determining module, configured to determine whether there is a predefined trustworthy relationship scenario associated with the request, and if not, inform a verification module; the verification module, configured to perform verification on a user initiating the request, and inform a relationship establishing module of a verification result; and the relationship establishing module, configured to establish the user relationship. | 03-20-2014 |
20140148137 | CONVERSATION METHOD AND TERMINAL - A conversation method is performed at a first mobile communication terminal. The method includes: receiving a conversation request from a second mobile communication terminal, the conversation request containing a call invitation request that expires after a first time period; displaying the call invitation request; establishing a call connection with the second terminal in response to detecting a first predefined user operation on the call invitation request within the first time period; replacing the display of the call invitation request with the display of the conversation request after the first time period, the conversation request further including a call initiation command that expires after a second time period; and initiating a call to the second terminal if detecting a second predefined user operation on the call initiation command after the first time period and within the second time period, the second time period being longer than the first time period. | 05-29-2014 |
20140156757 | METHODS AND DEVICES FOR ADDING NEW MEMBER TO GROUP THROUGH BARCODE SCANNING - The current invention discloses methods and devices for adding a new member to a group, e.g. a chat group associated with a chat program. The new member may be added through a barcode-scanning process or an existing-member-invitation process. After the new member is added to the chat group, a server may send notification messages to mobile devices associated with the existing members of the group. The contents of the notification messages may vary based on the processes by which the new member is added, the number of existing members, and the direct-contact relationships the new member has with the existing members. The current invention provides simplified methods and devices for adding the new member, avoiding cumbersome operations and protecting member privacy at the same time. | 06-05-2014 |
20140258281 | Method And Server For Searching For Nearby User In Social Networking Services - When location information and a user Identification (ID) is received from a client terminal device of a user X, a grid Y, to which the location information belongs, is determined. The user ID and the location information of the user X is stored in a list of the grid Y. The grid Y is in a grid array obtained by dividing a surface of the earth into the grids and areas of the grids are the same. Users in the grid Y and other grids are searched. The grid Y and the other grids form an N-grid and the grid Y is a center of the N-grid. The users are ranked in an ascending order of distances between the users and the user X. The ranked user IDs and distances between the users and the user X are sent to the client terminal device of the user X. | 09-11-2014 |
20140325628 | LOGIN METHOD, APPARATUS, AND SYSTEM - Various embodiments provide methods, apparatus, and systems for logging in an application account. A request for logging in an application account sent from a first terminal can be received. It is detected if the first terminal can be included in frequently used terminals corresponding to the application account. First verification information can be sent to a second terminal bound with the application account, when it is detected the first terminal is not included in the frequently used terminals corresponding to the application account. Second verification information can be received from the first terminal to detect if the second verification information matches the first verification information. When it is detected that the second verification information matches the first verification information, the request for logging in the application account can be responded. | 10-30-2014 |
20150096004 | METHOD AND APPARATUS FOR SERVICE LOGIN BASED ON THIRD PARTY'S INFORMATION - A method and apparatus for service login to a service provider sites have been disclosed. The method including: receiving a login request from a user, wherein the login request comprises at least both terminal's login information input by the user and third party account information pertaining to the user; after successful verification on the third party account information, determining by the service provider, whether the terminal's login information input by the user matches to reference login information, wherein the reference login information comprises specific information of the user to further identify user's identity; if the terminal's login information matches to at least a portion of the reference login information, delivering service to the terminal according to the third party account information. | 04-02-2015 |
20150143216 | METHOD, DEVICE, AND SYSTEM FOR ACCESSING THIRD PARTY PLATFORMS VIA A MESSAGING APPLICATION - Provided herein are methods, devices, and systems for use in social networking and messaging applications. In particular, methods, devices, and systems for providing a user with access to a third party platform (e.g., a Public Number) in a messaging application are disclosed. Provided herein is a “My Apps” feature providing a stable and intuitive point of entry for a user to view, access, and manage Public Numbers. Also provided herein is a “Connector” feature that facilitates forwarding and saving information in a Public Number for processing. Additionally provided herein is a “Historic Messages” feature allowing a user to view a Public Number's historic messages without following the Public Number. | 05-21-2015 |
Patent application number | Description | Published |
20140114613 | METHOD AND APPARATUS FOR DIAGNOSIS AND RECOVERY OF SYSTEM PROBLEMS - Embodiments of the present invention relate to method and apparatus for system problem diagnosis and recovery. According to embodiments of the present invention, problem symptom information in a system can be automatically monitored and collected BY a monitoring apparatus (or referred as to “agent”) deployed at the system side. Upon after receiving such information, the diagnosis apparatus, for example, may automatically determine a root cause of the problem by querying a backend knowledge repository, and possibly generate an executable software package for recovering the problem. If the diagnosis apparatus determines that the currently available information is insufficient to determine a creditable enough root cause and/or is insufficient to generate the software package for recovering the problem, the diagnosis apparatus may interactively control the monitoring apparatus to collect desired additional information. In this way, the efficiency and accuracy of problem diagnosis and recovery may be improved. | 04-24-2014 |
20140122637 | METHOD AND APPARATUS FOR PROVIDING CACHING SERVICE IN NETWORK INFRASTRUCTURE - A method and apparatus for providing caching service in network infrastructure. In an embodiment, there is provided a method for providing caching service in network infrastructure, comprising: in response to at least one application node accessing data in a storage node, caching a copy of the data in a cache server; in response to the at least one application node accessing the data in the storage node, obtaining an identifier indicating whether the data in the storage node is valid or not; and in response to the identifier indicating the data in the storage node is valid, returning the copy; wherein the at least one application node and the storage node are connected via the network infrastructure, and the cache server is coupled to a switch in the network infrastructure. In another embodiment of the present invention, there is provided an apparatus for providing caching service in network infrastructure. | 05-01-2014 |
20140181982 | METHOD AND SYSTEM FOR DATA PROTECTION - Embodiments of the present invention relate to a method and system for data protection. A data protection method comprises: receiving at least one event prediction message from at least one message source, the at least one event prediction message being associated with an event that is predicted to occur in a future period of time; analyzing information, which is relevant to the event, included in the at least one event prediction message, so as to determine a risk level of the event with respect to the data to be protected; and determining a data protection operation at least based on the risk level and a predetermined event handling policy. There is further disclosed a corresponding data protection system. According to the embodiments of the present invention, it is enabled to voluntarily, dynamically, and flexibly handle high-risk events potentially damaging data, thereby better guaranteeing data security. | 06-26-2014 |
20140189857 | METHOD, SYSTEM, AND APPARATUS FOR SECURELY OPERATING COMPUTER - The present invention provides a method, system and apparatus for securely operating a computer. The method comprises: obtaining presence status of an authenticated user, the presence status indicating whether the authenticated user is present in the vicinity of the computer; and triggering security operation in response to that the presence status indicates the authenticated user is absent in the vicinity of the computer. By means of the method, current status of an authenticated user who has logged in can be easily learned, and in turn, corresponding security operation is performed; in addition, when a user is performing sensitive operation, it can be confirmed in real time whether the user is an authenticated user who previously logged in, so that security of operating the computer is improved. | 07-03-2014 |
20140258987 | DETERMINING CORRECTNESS OF AN APPLICATION - The present invention provides a method for determining correctness of an application, comprising: obtaining a dataset and a reference running result for the application; and determining correctness of the application based on a comparison between the reference running result and an actual running result of the dataset on the application. Through the method, the users can connect to a standard task tool repository, thereby using a data-driven testing method as a complement to the existing quality assurance framework. | 09-11-2014 |
20150089309 | TROUBLESHOOTING BASED ON LOG SIMILARITY - The present disclosure relates to a method and apparatus for troubleshooting based on log similarity. In one embodiment, there is provided a method for troubleshooting based on log similarity, comprising: extracting log patterns from multiple log files in response to having collected the multiple log files from at least one system with troubles, the log pattern describing a regular expression to which a log message in a log file among the multiple log files conforms; building a pattern repository using the log patterns; mapping each of the multiple log files to an n-dimensional vector based on the pattern repository; and clustering multiple n-dimensional vectors to which each of the multiple log files is mapped into at least one group, wherein each of the at least one group indicates one trouble type of the at least one system. In another embodiment, there is provided a corresponding apparatus. | 03-26-2015 |
20150186520 | FACILITATING ACCESS TO DATA IN DISTRIBUTED STORAGE SYSTEM - Embodiments of the present disclosure relate to an apparatus and method for facilitating access to data in a distributed storage system by using a processing unit configured to collect information related to running status of the distributed storage system; obtain metadata related to data stored in the distributed storage system; in response to a request from a client, provide to the client the information related to running status and metadata related to data to be accessed; and extend storage nodes in the distributed storage system so that the client can directly access the storage nodes by using the information related to running status and the metadata related to data to be accessed. Other embodiments are also disclosed. | 07-02-2015 |
20150186907 | DATA MINING - Embodiments of the present disclosure relate to a method and apparatus for data mining by obtaining product-related data from at least one data source; preprocessing the data to determine at least one attribute of the data; analyzing the preprocessed data with respect to product-related characteristics and at least partially based on the at least one attribute; and generating an event according to the analysis and based on a predefined rule associated with the product-related characteristics, the event predicting possible customer demands. | 07-02-2015 |
20150189019 | MANAGING NETWORK ATTACHED STORAGE - A method and apparatus for managing network attached storage that includes detecting frequency of access from a client to a data item that is in a first server in the network attached storage, a global namespace of the network attached storage indicating an access address for accessing the data item, the access address including a first address of the data item in the first server; in response to the frequency being higher than a predetermined threshold, copying the data item from the first server to a second server in the network attached storage which is proximate to the client, so as to form a data image; and updating the global namespace so as to add to the access address a second address of the data image in the second server whereby the data access efficiency of the network attached storage can be considerably improved. | 07-02-2015 |
20150205624 | CONFIGURING A DATA CENTER - Embodiments of the present disclosure disclose a method and an apparatus for configuring a data center. The method comprises obtaining a function call corresponding to data to be configured based on a template for configuring the data center; obtaining a vendor driver corresponding to the data based on the template for configuring the data center. The method further comprises configuring the data by the vendor driver executing the function call. Based on the embodiments of the present disclosure, the way of automatically configuring the data center based on the template may improve the efficiency and security for configuration of the data center. | 07-23-2015 |