US Pat. No. 9,408,106

METHOD AND DEVICE FOR LOADING READ CONTENT

TENCENT TECHNOLOGY (SHENZ...

1. A method for loading a read content, comprising:
acquiring a loading condition evaluation parameter including a network environment parameter;
determining a loading condition level of the mobile terminal according to the loading condition evaluation parameter;
adapting a loading strategy corresponding to the loading condition level; and
loading the read content according to the loading strategy,
wherein determining the loading condition level of the mobile terminal according to the loading condition evaluation parameter
comprises:

determining a weight of each loading condition evaluation parameter; and
determining the loading condition level of the mobile terminal by weighting the loading condition evaluation parameter,
wherein determining the loading condition level of the mobile terminal by weighting the loading condition evaluation parameter
comprises:

determining the loading condition level of the mobile terminal according to the formula:

where, ?, ?, ?, ? and ? are all constant, and ?+?=1, ?+?+?=1, Fc is the loading condition level, both of the NT and FNT represent the type of the network accessed by the mobile terminal, the NT and FNT have the same trend of increase and decrease but different values, Da is the average data amount of a single page of the type of the read content to be loaded currently, NSa is the historical average speed of the mobile terminal loading a single page of the read content, NSc is the current network speed of the mobile terminal, and DT is the type of the read content to be loaded currently by the
mobile terminal.

US Pat. No. 9,363,274

METHODS AND SYSTEMS FOR BROADCASTING PICTURES

TENCENT TECHNOLOGY (SHENZ...

1. A method for broadcasting a picture across multiple user terminals, comprising:
generating a user signature based on information associated with the picture;
receiving a request to broadcast the picture, the request including the user signature; and
broadcasting the picture if the user signature is valid;
wherein the method further comprises:
receiving a request to broadcast the picture from a user;
responding to the request by generating the user signature; and
sending the user signature to the user;
determining whether a user signature is stored in a storage unit;
retrieving the user signature after determining that it is in the storage unit;
matching the retrieved user signature to the user signature included in the broadcasting request;
determining the user signature in the broadcasting request is valid if it matches the retrieved user signature;
obtaining a user signature if the user signature in the broadcasting request is invalid;
matching the obtained user signature to the user signature included in the broadcasting request; and
determining the user signature in the broadcasting request is valid if it matches the obtained user signature.

US Pat. No. 9,407,584

INSTANT MESSAGING TERMINAL AND METHOD FOR DISPLAYING SESSION MESSAGE IN REAL TIME

Tencent Technology (Shenz...

1. A method for displaying a session message in real time, comprising:
obtaining user inputted literal contents and a font identifier of a user selected personalized font;
invoking a personalized font configuration file corresponding to the font identifier according to the font identifier; and
synthesizing the personalized font configuration file and the literal contents into a session message and displaying the session
message in real time;

wherein the step of synthesizing the personalized font configuration file and the literal contents into a session message
and displaying the session message in real time comprises: assigning values to parameters of the personalized font configuration
file to synthesize each character of the literal contents into a personalized font respectively, and displaying, by a session
message manager, the session message consisting of the personalized font in a session window by controlling an Object Linking
and Embedding (OLE) control; and

wherein the personalized font has a literal image with Alpha transparency; each synthesized personalized font is controlled
by the OLE control.

US Pat. No. 9,560,280

IMAGE ACQUISITION METHOD, ELECTRONIC APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. An image acquisition method, comprising:
receiving an image function enabling instruction and controlling, according to the image function enabling instruction, a
touch display apparatus to enter an image acquisition interface;

receiving a touch action on the image acquisition interface;
determining whether action acquisition duration of the touch action on one same area of the image acquisition interface is
greater than or equal to a preset action acquisition preparation time;

if the action acquisition duration of the touch action on the same area of the image acquisition interface is greater than
or equal to the action acquisition preparation time, determining whether image acquisition duration of the touch action on
the same area of the image acquisition interface is greater than or equal to a preset image acquisition preparation time;

controlling an image sensing apparatus to acquire a corresponding image if the image acquisition duration of the touch action
on the same area of the image acquisition interface is greater than or equal to the image acquisition preparation time; and

performing the receiving the touch action on the image acquisition interface of the touch display apparatus again if the image
acquisition duration of the touch action on the same area of the image acquisition interface is less than the image acquisition
preparation time.

US Pat. No. 9,264,502

DOWNLOAD RESOURCE RECOMMENDATION METHOD, SYSTEM AND STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. A method for recommending a download resource, comprising:
obtaining a download record of a target user, obtaining a target user group associated with the target user according to the
download record;

obtaining download records of the target user group and download records of a global user group;
processing the download records of the target user group and the download records of the global user group to generate, for
a download resource in the download records of the target user group, a differentiation degree between the download resource
in the download records of the target user group and the download resource in the download records of the global user group;
and

sorting download resources according to the differentiation degree, and recommending the top-ranking predetermined number
of download resources to the target user;

wherein the obtaining the target user group associated with the target user according to the download record comprises:
obtaining download records of recent users;
traversing the download records of the users, for one download record of each of the users, performing a following operation:
comparing the download record of the user with the download record of the target user, obtaining the user whose download record
matches with the download record of the target user, and adding the obtained user into the target user group.

US Pat. No. 9,113,002

METHOD AND SYSTEM FOR AUTOMATICALLY CAPTURING AN OBJECT USING A MOBILE TERMINAL

TENCENT TECHNOLOGY (SHENZ...

1. A method for identifying relevant information of an object using a mobile terminal that has a built-in camera, a processor,
and memory for storing programs to be executed by the processor, comprising the steps of:
automatically generating a plurality of image frames while the built-in camera pointing at the object;
automatically transmitting one or more of the plurality of image frames to a remote server, wherein different transmitted
image frames satisfy distinct predefined conditions;

receiving information from the remote server when at least one of the transmitted image frames matches an image stored at
the remote server, wherein the image corresponds to the object and is associated with information relevant to the object;

displaying the information relevant to the object at the mobile terminal; and
stopping transmitting any image frames to the remote server after receiving the information relevant to the object.

US Pat. No. 9,454,568

METHOD, APPARATUS AND COMPUTER STORAGE MEDIUM FOR ACQUIRING HOT CONTENT

TENCENT TECHNOLOGY (SHENZ...

1. A method for acquiring hot content, comprising:
acquiring N search requests and N search responses corresponding to the N search requests, wherein N is a natural number;
analyzing each of the N search request and each of the N search responses corresponding to the each of the N search requests
to obtain N initial hot content datum, wherein the initial hot content datum include search terms, popular broadcast information
and/or data trend information;

calculating a weight of each initial hot content data, and select M middle hot content datum from the N initial hot content
datum according to the weight of each initial hot content, wherein M is a natural number and is no more than N;

performing repetition elimination on the M middle hot content datum; and
selecting hot content from the M middle hot content datum after the repetition elimination.

US Pat. No. 9,436,768

SYSTEM AND METHOD FOR PUSHING AND DISTRIBUTING PROMOTION CONTENT

TENCENT TECHNOLOGY (SHENZ...

1. A method for pushing content items, comprising:
obtaining a target text and analyzing lexically the target text;
extracting features, comprising traffic feature, from the target text;
classifying hierarchically, the features extracted from the target text, based on a pre-trained hierarchical classification
model considering traffic feature to obtain a hierarchical classification of the target text;

selecting one or more among a plurality of content items based on the hierarchical classification of the target text;
obtaining the selected content items; and
pushing the obtained content items to a terminal;
wherein the target text comprises a webpage text which comprises a traffic feature identifying source of the webpage text;
wherein the plurality of content items comprise a plurality of promotion texts;
wherein for each of the plurality of promotion texts:
obtaining the promotion text and analyzing lexically the promotion text;
extracting features, comprising traffic feature, from the promotion text;
classifying hierarchically, the features extracted from the promotion text, based on a pre-trained hierarchical classification
model considering traffic feature to obtain a hierarchical classification of the promotion text; and

calculating similarity between the webpage text and the promotion text based on the hierarchical classification of the promotion
text and the hierarchical classification of the webpage text,

wherein the selecting one or more among the plurality of promotion texts is based on the similarity between the webpage text
and each of the plurality of promotion texts.

US Pat. No. 9,444,881

METHOD, SYSTEM, AND APPARATUS FOR EXCHANGING DATA BETWEEN CLIENT DEVICES

TENCENT TECHNOLOGY (SHENZ...

1. A method performed at a computer server having a processor and memory for storing one or more programs to be executed by
the processor for exchanging data between two client devices, comprising:
obtaining, from a first client device, a first data acquisition request, wherein the first data acquisition request includes
(i) a device identifier identifying a second client device distinct from the first client device, (ii) a search parameter
identifier identifying a type of the search parameter whose value is to be provided by the second client device, and (iii)
a search keyword;

identifying the second client device, from a plurality of client devices, in accordance with the device identifier;
issuing a second data acquisition request to the second client device, the second data acquisition request including the search
parameter identifier;

obtaining, from the second client device, the search parameter in accordance with the search parameter identifier, wherein
second client device determines the value of the search parameter based on the type of the search parameter;

obtaining one or more search results from a third device in accordance with the search parameter from the second client device
and the search keyword from the first client device; and

providing at least one search result in the one or more search results to the first client device for display to a user of
the first client device.

US Pat. No. 9,244,758

SYSTEMS AND METHODS FOR REPAIRING SYSTEM FILES WITH REMOTELY DETERMINED REPAIR STRATEGY

Tencent Technology (Shenz...

1. A method for repairing system files, the method comprising:
updating in real time a list of system files including file information of one or more first repairable system files;
receiving file information of a target file sent from a terminal;
detecting whether the target file is in need of repair based on at least information associated with the list of system files;
in response to the target file being in need of repair,
determining a first repair strategy for the target file based on at least information associated with a predetermined database
of repair strategies and a file type of the target file; and

repairing the target file based on at least information associated with the first repair strategy;
wherein:
the list of system files includes a predetermined database of scanning strategies and the database of repair strategies;
the predetermined database of scanning strategies classifies one or more second system files into three levels of importance:
highly risky, important and general, the second system files of different levels of importance corresponding to different
scanning strategies;

the database of repair strategies is used to determine a second repair strategy corresponding to a file type of a third system
file, the second repair strategy being used to determine one or more first processes or one or more first applications related
to the third system file based on at least information associated with the file type of the third system file; and

in response to the target file being repaired, one or more second processes or one or more second applications related to
the target file are restarted.

US Pat. No. 9,329,873

METHOD AND DEVICE, TERMINAL AND COMPUTER READABLE MEDIUM FOR ACCELERATING STARTUP OF OPERATING SYSTEM

TENCENT TECHNOLOGY (SHENZ...

3. A method for accelerating a startup of an operating system, comprising:
acquiring prefetch information corresponding to at least one process to be accelerated in a procedure of operating system
startup, wherein the prefetch information comprises a file path, a shift value and a length value of a data block required
by the process to be accelerated;

reading a corresponding data block into a system cache according to the acquired prefetch information;
completing a startup procedure of the process to be accelerated using the data block in the system cache;
the method further comprising generating the prefetch information, wherein the step of generating the prefetch information
comprises:

extracting input/output information and page fault information in the procedure of operating system startup;
acquiring a file path, a shift value and a length value of a data block required by respective processes during the procedure
of operating system startup according to the input/output information and the page fault information;

combining shift values and length values of contiguous data blocks with the same file path;
generating the prefetch information according to files paths, shift values and length values of the combined data blocks.

US Pat. No. 9,128,797

METHOD AND SYSTEM FOR SOFTWARE UPGRADE

TENCENT TECHNOLOGY (SHENZ...

1. A method of upgrading an application installed on a mobile device, comprising:
at a computer server having one or more processors and memory for storing programs to be executed by the one or more processors:
determining a current version of the application installed on the mobile device and a new version of the application to be
installed on the mobile device;

generating a binary incremental package by comparing the current version of the application and the new version of the application
using a binary file difference tool, wherein the binary incremental package includes one or more parameters derived from the
new version of the application, wherein at least one of the one or more parameters is dynamically determined;

in response to a upgrade request from the mobile device:
pushing the binary incremental package to the mobile device through a wireless network; and
receiving an application upgrade confirmation message from the mobile device,
wherein the mobile device is configured to:
reconstruct a version of the application by merging the current version of the application installed on the mobile device
and the binary incremental package;

compare the reconstructed version of the application with the one or more parameters derived from the new version of the application,
further including deriving a set of parameters from the reconstructed version of the application and comparing each of the
derived parameters with a corresponding parameter derived from the new version of the application; and

in accordance with a determination that the reconstructed version of the application matches the one or more parameters derived
from the new version of the application:

replace the current version of the application with the new version of the application using the reconstructed version of
the application; and

send the application upgrade confirmation message to the server.

US Pat. No. 9,402,172

MESSAGE COMBINATION METHOD AND DEVICE

TENCENT TECHNOLOGY (SHENZ...

1. A message combination method, comprising:
receiving, by a mobile terminal, a first message and determining a sub-message identifier carried in the first message, with
the sub-message identifier being configured for indicating that the first message is one of a plurality of sub-messages forming
a short message;

allocating, by the mobile terminal, a storage space to the short message according to the first message, with the number of
storage units contained in the storage space being equal to the number of the sub-messages contained in the short message,
and the storage units contained in the storage space having ordered positions;

storing, by the mobile terminal, the first message and the subsequently received at least one second message to corresponding
storage units in the storage space respectively according to sub-message identifiers of both the first message and the subsequently
received at least one second message; and

combining, by the mobile terminal, the sub-messages stored in all the storage units in the storage space.

US Pat. No. 9,354,919

METHOD AND DEVICE FOR LOADING ANDROID VIRTUAL MACHINE APPLICATION

TENCENT TECHNOLOGY (SHENZ...

1. A method comprising:
loading a layer-booting object that is a Linux Kernel layer object;
loading a management object of a virtual machine by the loaded layer-booting object;
reading a configuration of the virtual machine by the loaded management object of the virtual machine;
invoking a creation function of the loaded management object of the virtual machine by the read configuration and thereby
creating a zygote process; and

creating an operational instance of the virtual machine based on Android Runtime layer by the zygote process.

US Pat. No. 9,264,852

METHOD AND SYSTEM FOR DISPLAYING A MESSAGE, AND TERMINAL AND SERVER THEREOF

TENCENT TECHNOLOGY (SHENZ...

1. A method for displaying a message, comprising:
receiving, by a server from a terminal, a message and Location Based Service (LBS) information associated with the message,
and assigning a message ID for the message;

storing the message and the LBS information associated with the message; and,
when receiving from a user of the terminal a request for viewing the message, displaying, through the terminal, the message
and the LBS information associated with the message to the user;

wherein the operation of storing the message and the LBS information associated with the message comprises:
storing the message and the message ID in a first storage medium; and,
storing the message ID, the LBS information, and a corresponding relationship between the message ID and the LBS information
in a second storage medium which is different from the first storage medium; and

the operation of displaying the message and the LBS information associated with the message to the user through the terminal
comprises:

sending the message and the message ID to the terminal;
receiving the message ID returned from the terminal;
obtaining the LBS information according to the message ID and the corresponding relationship between the message ID and the
LBS information; and,

sending the LBS information to the terminal.

US Pat. No. 9,130,948

METHOD AND APPARATUS FOR OPENING A BROWSER AND METHOD AND SERVER FOR SENDING A SPLASH SCREEN IMAGE

TENCENT TECHNOLOGY (SHENZ...

1. A method for opening a browser, comprising:
receiving, by a processor of an apparatus for opening the browser, a signal for starting up a browser and opening the browser;
and

judging, by the processor, whether a locally stored first splash screen image is valid at a current time and if yes, displaying,
by the processor, the first splash screen image, or if not, displaying, by the processor, a local default second splash screen
image;

after the opening the browser, further comprising:
sending, by the processor, first information to a server, wherein the first information comprises client basic information
and image information of the first splash screen image, wherein the client basic information comprises a screen size of the
client and a client attribute, wherein the client attribute comprises at least one of a location of the client, a browser
version, a unique user identifier and client type related information, wherein the image information of the first splash screen
image comprises at least one of splash screen image content, valid time, invalid time, splash screen display time length,
a splash screen image feature string and a control information feature string of the first splash screen image;

receiving, by the processor, second information returned by the server according to the first information; and
updating, by the processor, the locally stored first splash screen image according to the second information.

US Pat. No. 9,143,469

MICROBLOG CLIENT, METHOD FOR AGGREGATING MICROBLOG MESSAGES, AND INSTANT MESSAGING CLIENT

TENCENT TECHNOLOGY (SHENZ...

16. An Instant Messaging (IM) client, comprising:
a basic service module; and
a microblog module,
wherein the basic service module is to store a conversion table of location information and key value;
the microblog module is to convert the location information as aggregation dimension into a corresponding key value based
on the conversion table, send a message pulling message carrying the key value to an external network server, generate one
or more geography pages, and display a microblog message on a corresponding geography page, based on the location information
corresponding to the microblog message pulled; and

wherein a message pool monitors one or more geography pages, when a microblog message is displayed on a geography page, and
increases a reference count of the microblog message by one, and when a geography page is deconstructed, decreases the reference
count of each microblog message previously displayed on the geography page.

US Pat. No. 9,391,466

METHOD AND DEVICE FOR BATTERY-CHARGING MANAGEMENT

TENCENT TECHNOLOGY (SHENZ...

1. A method of battery-charging management, comprising:
at a device having one or more processors and memory:
recording a respective time that previous trickle charging of a device battery was carried out by a user;
based on the respective time for the previous trickle charging carried out by the user, creating, in a user calendar, a first
calendar entry for the previous trickle charging of the device battery carried out by the user and a second calendar entry
for next trickle charging of the device battery to be carried out by the user;

determining that a time interval between a current time and the respective time for the previous trickle charging has reached
a preset charging cycle; and

prompting the user to carry out the next trickle charging of the device battery in response to determining that the time interval
between the current time and the respective time for the previous trickle charging has reached the preset charging cycle.

US Pat. No. 9,391,983

METHOD AND SYSTEM FOR ACCESS CONTROL

Tencent Technology (Shenz...

1. An access control method comprising:
receiving at a communication platform, communication account information and identification information of a first terminal;
transmitting the communication account information to the first terminal based on the identification information of the first
terminal;

receiving from the first terminal identification information of the first terminal and the communication account information,
wherein the communication account information is read from an NFC device;

sending, by the communication platform, a hint message to a second terminal;
receiving from the second terminal a response for the hint message; and
allowing the first terminal to log in to the communication platform by the use of the communication account information based
on the communication account information and identification information, and based on the received response from the second
terminal for the hint message.

US Pat. No. 9,378,009

METHOD AND DEVICE FOR ACCELERATING RUNNING OF SOFTWARE

TENCENT TECHNOLOGY (SHENZ...

1. A method for accelerating execution of software, comprising:
determining, by a processor, whether the software accesses a specific scene of the software; and in the case where the software
accesses the specific scene of the software:

capturing, by the processor, at least two original I/O requests of the software for the specific scene and acquiring I/O data
of the original I/O requests as prefetch data;

creating, by the processor, an incorporated input/output (I/O) request corresponding to the specific scene, wherein the incorporated
I/O request incorporates the at least two original I/O requests;

associating, by the processor, together the incorporated I/O request and the prefetch data of the at least two original I/O
requests; and

sending, by the processor, the incorporated I/O request to a file system.

US Pat. No. 9,268,939

METHOD AND APPARATUS FOR DETERMINING VIRUS-INFECTED FILES

TENCENT TECHNOLOGY (SHENZ...

1. A method for determining a virus-infected file, comprising:
at a computer system including one or more processors and memory for storing program instruction to be executed by the computer
system:

loading an executable file being scanned from a storage device into the memory;
identifying a set of virus definitions for the executable file from a virus feature library, each virus definition including
a virus signature and a corresponding file offset address;

without decompiling the executable file, locating data in the executable file being scanned that has been loaded in the memory
according to a file offset address associated with each of the set of virus definitions, wherein the data has a predefined
length of a virus signature of the corresponding virus definition a virus;

making a comparison of the virus signature with the data located in the executable file being scanned; and
determining that the executable file being scanned is a virus-infected file when the virus signature of at least one of the
set of virus definitions matches the located data in the executable file being scanned.

US Pat. No. 9,472,165

METHOD AND SYSTEM FOR ACHIEVING MOVING SYNCHRONIZATION IN REMOTE CONTROL AND COMPUTER STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. A method for achieving moving synchronization in remote control, comprising:
obtaining a remote control instruction, and extracting a target speed and a remote moment from the remote control instruction;
obtaining a local moving state of the controlled object; wherein the local moving state comprises a local speed and a local
moment of the controlled object;

calculating a delay time according to the remote control moment and the local moment;
moving the controlled object according to the delay time, the target speed, the local speed and a preset synchronization time;
wherein the step of moving the controlled object according to the delay time, the target speed, the local speed and a preset
synchronization time comprises:

calculating a synchronization acceleration and a synchronization initial velocity according to the delay time, the target
speed, the local speed and the preset synchronization time;

moving the controlling object within the preset synchronization time according to the synchronization acceleration and the
synchronization initial velocity;

wherein the step of calculating a synchronization acceleration and a synchronization initial velocity according to the delay
time, the target speed, the local speed and the preset synchronization time comprises:

calculating the synchronization acceleration and the synchronization initial velocity according to a binary linear equation
group:


where, VT is the synchronization initial velocity, A is the synchronization acceleration, Tsync is the preset synchronization time, VM is the target speed, V0 is the local speed, and Tdelay is the delay time.

US Pat. No. 9,325,736

METHOD AND DEVICE FOR ANTI-VIRUS SCANNING

Tencent Technology (Shenz...

1. A method for anti-virus scanning, comprising:
recording, when performing an anti-virus scan operation on at least one file in a disk, information of the at least one file
and recording information of a disk section having a read/write operation during the anti-virus scan operation;

analyzing the information of the at least one file and the information of the disk section having the read/write operation,
and obtaining a cache reference section;

loading one or more files in the cache reference section into a memory, and reading the loaded one or more files in the memory
to scan when receiving an anti-virus scan request.

US Pat. No. 9,316,503

METHOD, SERVER, AND SYSTEM FOR OBTAINING NAVIGATION INFORMATION

TENCENT TECHNOLOGY (SHENZ...

1. A method for obtaining navigation information, comprising:
receiving, by a backend server, a public account ID registration, wherein the backend server supports instant communications
among a plurality of client devices;

corresponding, by the backend server, a public account database with the public account ID;
receiving, by the backend server, a first obtaining request of a client device, the first obtaining request at least containing
navigation key information and the public account ID;

according to the public account ID, determining, by the backend server, a target public account database, wherein the target
public account database is the public account database corresponding to the public account ID, the target public account database
comprising the navigation key information and corresponding navigation information;

according to the navigation key information, obtaining, by the backend server, navigation information corresponding to the
navigation key information from the target public account database; and

sending, by the backend server, the obtained navigation information to the client device to display the obtained navigation
information as an incoming communication message.

US Pat. No. 9,265,077

METHOD AND DEVICE FOR CONTROLLING PERIPHERAL DEVICES VIA A SOCIAL NETWORKING PLATFORM

TENCENT TECHNOLOGY (SHENZ...

1. A method for connecting a peripheral device to a user device via a Bluetooth protocol, comprising:
at the user device:
initiating a device scan process, comprising:
detecting a device discovery message from the peripheral device; and
determining whether the device discovery message includes a predetermined identifier designated for a social networking service
associated with a social networking application executing on the user device;

upon determining that the device discovery message includes the predetermined identifier designated for the social networking
service associated with a social networking application executing on the user device, sending, to the peripheral device, a
connection request corresponding to the device discovery message;

establishing a Bluetooth connection to the peripheral device; and
transmitting data to the peripheral device in a simulated data stream through the Bluetooth connection, the transmitting including:
dividing a data packet that is to be transmitted to the peripheral device into a sequence of data frames; and
sending a respective write request to write each of the sequence of data frames to a respective value of a respective Bluetooth
characteristic exposed by the peripheral device.

US Pat. No. 9,116,605

SYSTEM AND METHOD FOR GENERATING EVENT DISTRIBUTION INFORMATION

TENCENT TECHNOLOGY (SHENZ...

6. A computer system, comprising:
one or more processors;
memory;
a display; and
one or more programs stored in the memory and configured for execution by the one or more processors, the one or more programs
including instructions for:

extracting header data and soundtrack data from an audio file;
generating event distribution information based on the header data and the soundtrack data;
extracting a predefined number of event-triggering times from the event distribution information, wherein the event distribution
information is associated with the audio file currently played on the computer and the event-triggering times are arranged
in a sequential order;

determining a current play time for the audio file; and
controlling event locations corresponding to user inputs on the display of the computer based on a comparison of the current
play time and the extracted event-triggering times.

US Pat. No. 9,367,885

METHOD AND SYSTEM FOR ADDING AND DETECTING WATERMARK

TENCENT TECHNOLOGY (SHENZ...

1. A watermarking method configured to be used with a client for watermarking multimedia data, the watermarking method comprising:
sending a login request to a server which authenticates an access right of the client to access multimedia data to be played,
generates an identification code uniquely associated with the client according to the login request, and encrypts the identification
code;

receiving the encrypted identification code and the multimedia data to be played from the server;
generating an on-screen watermark according to the encrypted identification code uniquely associated with the client; and
adding the on-screen watermark onto the multimedia data to be played.

US Pat. No. 9,131,341

SYSTEM AND METHOD FOR LOCATING A MOBILE DEVICE

TENCENT TECHNOLOGY (SHENZ...

1. A method of locating a mobile device, the method comprising:
at a first mobile device having one or more processors and memory:
receiving a message from a second computing device using an instant messaging application;
extracting a source identifier and a location inquiry from the message;
determining whether the source identifier and the location inquiry satisfy pre-determined conditions;
in accordance with a determination that the pre-determined conditions are satisfied, retrieving current location information
from a location positioning module in the first mobile device;

generating a message, the message including the current location information; and
sending the message to the second computing device, wherein an instant messaging application of the second computing device
is configured to visualize the first mobile device's location on a map application in accordance with the current location
information extracted from the message.

US Pat. No. 9,256,736

METHOD AND SYSTEM FOR MONITORING WEBPAGE MALICIOUS ATTRIBUTES

TENCENT TECHNOLOGY (SHENZ...

1. A method for monitoring a malicious attribute of a webpage, comprising:
acquiring webpage query requests submitted by a plurality of clients;
crawling the webpage based on the acquired webpage query requests and acquiring crawled webpage contents;
counting up a referenced value of a uniform resource locator (URL) based on the crawled webpage contents; and
calling a predetermined detection program based on the referenced value of the URL to perform malicious attribute detection
of the URL.

US Pat. No. 9,137,530

VIDEO COMMUNICATION METHOD AND SYSTEM FOR DYNAMICALLY MODIFYING VIDEO ENCODING

TENCENT TECHNOLOGY (SHENZ...

1. A video communication method for dynamically modifying video encoding, the method comprising:
obtaining, by a video receiver, a video window size change signal generated in the video receiver and indicating a changing
of a video window size of a video being received by the video receiver;

generating, by the video receiver, an encoding modification signal according to the change signal, the encoding modification
signal indicating that at least one of an encoding rate, a bit rate, a resolution and a frame rate of an encoder of a video
sender sending the video that is being received by the video receiver, needs to be modified;

transmitting, by the video receiver, the encoding modification signal to the video sender in a same channel in which the video
sender sends the video that is being received by the video receiver;

receiving, by the video sender, the encoding modification signal; and
modifying, by the video sender, said at least one of the encoding rate, the bit rate, the resolution and the frame rate of
the encoder according to the encoding modification signal received by the video sender.

US Pat. No. 9,112,967

ANONYMOUS COMMUNICATION SYSTEM AND TRANSMISSION METHOD OF INFORMATION TRANSMISSION UNIT IN ANONYMOUS COMMUNICATION SYSTEM

TENCENT TECHNOLOGY (SHENZ...

1. A transmission method of information transmission unit in anonymous communication system, the method comprising:
after receiving an information transmission unit sent by a sending party, storing the information transmission unit in a storage
pool, inserting the information transmission unit into a preset ordering queue, and generating more than one piece of index
information according to content of the information transmission unit and information of the sending party;

setting more than one index matching information of a receiving party; inquiring index information of the storage pool according
to the index matching information of the receiving party, finding out an information transmission unit set which meets the
index matching information, selecting one information transmission unit from the set according to an ordering situation of
each information transmission unit in the set in the ordering queue and a preset delivery strategy, delivering the selected
information transmission unit to the receiving party, and then adjusting the ordering queue according to a delivery situation;

wherein the setting more than one index matching information of a receiving party specifically includes:
setting one corresponding index matching information according to the user's attribute information;
setting another corresponding index matching information according to historical record of the user for sending and receiving
information transmission units;

wherein the ordering queue comprises a delivery number queue; in the delivery number queue, information transmission units
are ordered according to delivery number of the information transmission units; after delivering one information transmission
unit every time, the delivery number queue is re-adjusted according to delivery number;

the delivery strategy specifically includes: according to an ordering situation of the delivery number queue, selecting one
information transmission unit with a minimum delivery number from the set and delivering the selected information transmission
unit to the receiving party.

US Pat. No. 9,472,190

METHOD AND SYSTEM FOR AUTOMATIC SPEECH RECOGNITION

TENCENT TECHNOLOGY (SHENZ...

1. A method of recognizing speech, comprising:
generating a decoding network for decoding speech input, the decoding network comprising a primary sub-network and one or
more classification sub-networks, wherein:

the primary sub-network includes a plurality of classification nodes, each classification node corresponding to a respective
classification sub-network of the one or more classification sub-networks, wherein each respective classification sub-network
is distinct from the primary sub-network; and

each classification sub-network of the one or more classification sub-networks corresponds to a group of uncommon words;
receiving a speech input; and
decoding the speech input by:
instantiating a token corresponding to the speech input in the primary sub-network;
passing the token through the primary sub-network;
when the token reaches a respective classification node of the plurality of classification nodes, transferring the token to
the corresponding classification sub-network;

passing the token through the corresponding classification sub-network;
when the token reaches an accept node of the classification sub-network, returning a result of the token passing through the
classification sub-network to the primary sub-network, wherein the result includes one or more words in the group of uncommon
words corresponding to the classification sub-network;

outputting a string corresponding to the speech input that includes the one or more words.

US Pat. No. 9,355,302

METHOD AND ELECTRONIC EQUIPMENT FOR IDENTIFYING FACIAL FEATURES

TENCENT TECHNOLOGY (SHENZ...

1. A method for identifying facial features, for executed by an electronic equipment, the method comprising:
receiving video data of a plurality of face images and to obtain a real-time background image from the video data by a video
tracing technique during a process for displaying the plurality of face images;

calculating a video data difference between a current face image and the real-time background image;
setting an iteration number according to the video data difference;
obtaining facial feature coordinates of a previous face image, the previous one of the current face image, serving as initial
facial feature coordinates; and

obtaining current facial feature coordinates of the current image, wherein an iterative calculation is conducted according
to the iteration number to localize the facial features of the current image based on the initial facial feature coordinates,
and the step of calculating the video data comprises:

receiving the current face image and the real-time background image that are both subjected to a gray degree treatment;
obtaining difference of the current face image and the real-time background image to form a prospective view image;
classifying pixels of the foreground image in at least two groups according to different criteria for evaluating the gray
degree of the pixels of the foreground image, and

giving a weight value to the pixels of the foreground image that are classified within the same group; and
obtaining the video data difference by calculating a ratio of a weighted sum of the pixels number to the pixels number of
the foreground image.

US Pat. No. 9,264,417

METHOD AND APPARATUS FOR GENERATING A SECURITY TOKEN CARRIER

TENCENT TECHNOLOGY (SHENZ...

1. A method for generating a security token carrier, comprising:
generating, by a server, multiple pieces of token information which include plural values, establishing a relation which associates
the token information with pre-set location information of an interactive security token carrier;

obtaining, by the server, security data which is set by a user for protecting the interactive security token carrier; and
generating, by the server, the interactive security token carrier by using the token information, the relation, the security
data and public information of the interactive security token carrier, the interactive security token carrier includes plural
faces, and each of the plural faces includes plural locations each of which is associated with one of the plural values according
to the relation;

sending, by the server, the interactive security token carrier to the user;
sending, by the server, an instruction to the user requesting login, the instruction specifying at least one procedures of
manipulating the interactive security token carrier to have one of the plural faces displayed and plural randomly-selected
locations for determining plural values on the face displayed after the interactive security token carrier is manipulated
through the at least one procedures;

receiving, by the server, multiple values inputted by the user;
comparing, by the server, the received values with locally generated values obtained using the interactive security token
carrier, the at least one procedures and the plural randomly-selected locations; and

determining, by the server, the user is an authorized user if the received values are consistent with the locally generated
values.

US Pat. No. 9,407,600

SERVICE ACCESS METHOD AND DEVICE FOR CONDUCTING THE SAME

TENCENT TECHNOLOGY (SHENZ...

1. A service access method executed by a network communication system, and comprising:
acquiring, by a user mode component, a physical address of a specified application service corresponding to a specified IP
segment in accordance with an IP-segment information of the specified IP segment, wherein the IP-segment information is included
in a virtual network interface card configured in a system container;

transmitting an address information including the physical address to a router module of a machine kernel;
establishing, by the router module, a routing table in accordance with the address information;
acquiring, by the router module, a network data packet; and
forwarding, by the router module, the network data packet to a destination service site in accordance with the routing table;
wherein the physical address of the application service is acquired by sub-steps of:
acquiring, from an authentication service, at least one name of application service that is accessible with the specified
IP segment in accordance with the IP-segment information, thereby locating the specified application service; and

acquiring, from a name service, the physical address corresponding to the name of the specified application service.

US Pat. No. 9,224,002

METHOD AND APPARATUS FOR FILE ENCRYPTION/DECRYPTION

TENCENT TECHNOLOGY (SHENZ...

1. A file encrypting method, comprising a step of creating a virtual disk, the virtual disk being visible in a kernel mode
and having an identifier, the method further comprising:
receiving, in the virtual disk, a writing request from a file system;
encrypting data in the writing request by a driver of the virtual disk; and
notifying the file system to write the encrypted data into a corresponding physical disk thereby controlling the file system
to write the encrypted data into the corresponding physical disk after the file system receiving a notification from the virtual
disk;

wherein after creating the virtual disk and before the virtual disk receiving the writing request from the file system, the
method further comprises:

notifying the virtual disk to a disk management module of an operating system; and/or
notifying the virtual disk to a resource management module of the operating system using a broadcasting message to re-enumerate
the virtual disk in the resource management module.

US Pat. No. 9,471,782

FILE SCANNING METHOD AND SYSTEM, CLIENT AND SERVER

Tencent Technology (Shenz...

1. A computer implemented file scanning method, comprising:
determining by a server computer, a property indicator of a file according to attribute information of the file for a set
of at least one attribute each reported by a plurality of separate client computers, wherein the property indicator is a function
of a corresponding set of at least one maliciousness indicator each being separately determined based on the reported attribute
information for each of the set of at least one attribute, and wherein the property indicator is indicative of a probability
of the file being a malicious program;

sending the property indicator to the client computers; and
generating a scanning strategy according to the property indicator, and sending the scanning strategy to the client computers,
wherein the scanning strategy indicates whether to scan the file.

US Pat. No. 9,448,914

METHOD AND SYSTEM FOR IMPLEMENTING REMOTE DEBUGGING

TENCENT TECHNOLOGY (SHENZ...

1. A method for implementing remote debugging by a remote debugging system, the remote debugging system comprising a remote
debugging client, a debugger agent, a transit agent, a debuggee agent, and a remote debugging server, the remote debugging
client and the debugger agent both belonging to a first local area network (LAN), the debuggee agent and the remote debugging
server both belonging to a second LAN, the second LAN and the first LAN being different communication networks, and the transit
agent belonging to an external communication network excluding the first LAN and the second LAN; and the method comprising:
sending, by the remote debugging client, debugging information to the debugger agent;
acquiring, by the debugger agent, a process identifier corresponding to the remote debugging client, a receive port identifier,
and keyword information corresponding to the debugger agent; and encapsulating the process identifier corresponding to the
remote debugging client, the receive port identifier, the keyword information corresponding to the debugger agent, and the
debugging information in a packet, and sending the packet to the transit agent;

performing, by the transit agent, decapsulation processing on the packet to obtain the keyword information corresponding to
the debugger agent, determining, according to a stored mapping table, the debuggee agent that has a correspondence to the
debugger agent, and forwarding the packet to the debuggee agent that has the correspondence to the debugger agent;

performing, by the debuggee agent, decapsulation processing on the packet to obtain the debugging information, the process
identifier corresponding to the remote debugging client, and the receive port identifier, and sending, according to the receive
port identifier, the debugging information to a corresponding port of the remote debugging server corresponding to the process
identifier; and

performing, by the remote debugging server, debugging according to the debugging information.

US Pat. No. 9,237,144

METHOD, DEVICE AND SYSTEM FOR VERIFYING BASED ON VERIFICATION DIAGRAM, AND STORAGE MEDIUM

Tencent Technology (Shenz...

1. A method for verifying based on a verification diagram, wherein the method is performed on a server and comprises:
generating an input interface diagram according to a verification diagram, wherein the verification diagram includes a basic
information element and verification information, and the input interface diagram includes the basic information element of
the verification diagram except for the verification information, comprising:

generating at least more than one identified area on the input interface diagram, wherein the number of the more than one
identified area is greater than or equal to that of sub-elements in the basic information element of the verification diagram,
and the more than one identified area is arranged and displayed in an L×N matrix, wherein L and N are integers more than 1,
respectively;

presetting randomly a sliding trace on the input interface diagram according to the verification diagram to generate the sliding
path information, wherein the sliding trace is continuous, the number of identified areas passed through by the sliding trace
is the same as that of the sub-elements in the basic information element of the verification diagram, and the sliding path
information comprises a sequence of identified areas passed through successively by the sliding trace randomly preset;

displaying the sub-elements of the basic information element in the identified areas passed through by the sliding trace according
to the verification information of the verification diagram, wherein each identified area displays one sub-element accordingly;
and

randomly displaying other sub-elements at identified areas not passed through by the sliding trace;
transmitting the verification diagram and the input interface diagram to a terminal;
receiving sliding path information inputted on the input interface diagram presented on the terminal; and
determining whether the sliding path information matches the verification information, and if so, then the verification is
successful.

US Pat. No. 9,336,197

LANGUAGE RECOGNITION BASED ON VOCABULARY LISTS

TENCENT TECHNOLOGY (SHENZ...

1. A computer-implemented method of recognizing a first language used in information content, comprising:
at a computer having one or more processors and memory for storing programs to be executed by the one or more processors:
integrating a first vocabulary list and a second vocabulary list that are built based on a first language and a second language,
respectively, into a comprehensive vocabulary list, wherein the integrating includes analyzing the first vocabulary list in
view of the second vocabulary list to at least identify a first vocabulary sub-list, in the comprehensive vocabulary list,
that is used in the first language, but not in the second language;

identifying, within the information content, a plurality of expressions that are included in the comprehensive vocabulary
list;

identifying, within the plurality of expressions, a subset of expressions that are included in the first vocabulary sub-list;
determining that a total frequency of occurrence of the subset of expressions within the information content meets predetermined
occurrence criteria; and

in accordance with the determination, determining that the information content is composed in the first language.

US Pat. No. 9,332,406

METHOD, APPARATUS, AND SYSTEM FOR UPDATING CONTACT INFORMATION

TENCENT TECHNOLOGY (SHENZ...

1. A method for updating contact information in an address book, implemented on a terminal device, the terminal device comprising
one or more processors and a storage device on which one or more program modules are stored, the one or more program modules
being executable by the one or more processors, the method comprising:
establishing a communication connection with an information sending terminal;
receiving a short message sent from the information sending terminal;
displaying the short message on a display page provided by the terminal device;
analyzing the short message to identify whether a contact information field is in the short message by using a contact information
determination condition;

extracting the contact information field from the short message when an identification result shows that the contact information
field is in the short message;

displaying a box on the display page on which the short message is displayed to prompt a user of the terminal device to make
a selection from function items to process the contact information field; and

updating the address book of the terminal device by using the contact information field based on a function item selected
by the user;

wherein identifying whether the contact information field is in the short message by using the contact information determination
condition comprises:

identifying whether a number combination is in the short message;
detecting whether a length of the number combination is the same with a telephone number length when the number combination
is in the short message, wherein the telephone number length comprises a mobile phone number length and a fixed telephone
number length; and

determining that a telephone number is in the short message when the length of the number combination is the same with the
telephone number length.

US Pat. No. 9,280,802

METHOD AND APPARATUS FOR STORING INFORMATION OF A PICTURE

TENCENT TECHNOLOGY (SHENZ...

1. A method for storing information of a picture, comprising:
presenting a file of the picture to be edited, wherein the picture file to be edited at least comprises original data of the
picture;

editing the picture file to be edited with an interface engine, and integrating rendering information of the edited picture
file according to a preset picture file format; and

storing the original picture data and the rendering information of the picture,
wherein the rendering information comprises at least rendering texture mode information, blend rendering mode information
and picture data offset information, and the preset picture file format comprises at least a rendering texture mode information
field, a blend rendering mode information field, and a picture data offset information field; and

wherein the integrating of the rendering information of the edited picture file according to the preset picture file format
comprises sequentially adding the rendering texture mode information, the blend rendering mode information and the picture
data offset information of the edited picture file according to a field sequence in the preset picture file format.

US Pat. No. 9,183,214

METHOD AND APPARATUS FOR DATA STORAGE AND DOWNLOADING

TENCENT TECHNOLOGY (SHENZ...

1. A method for data storage, comprising:
receiving a storage request containing a uniform resource locator (URL) for a storage operation;
acquiring the URL in the storage request;
determining whether a URL schema corresponding to the URL is in a storage, the URL schema corresponding to different URLs
for a same file under a same domain name;

when it is determined that the URL schema is in the storage, completing the storage operation without storing the URL in a
URL index database;

when it is determined that the URL schema is not in the storage, determining a hash value of a file corresponding to the URL
and a hash value of the URL schema, and storing mapping relationship information between the hash value of the file and the
hash value of the URL schema in the URL index database,

wherein determining the hash value of the file corresponding to the URL includes:
if the storage request is a storage request sent from a downloading client terminal, acquiring a file hash value in the storage
request as the hash value;

if the storage request is a storage request sent from a resource crawler system, downloading the file corresponding to the
URL in the storage request, and determining the hash value of the downloaded file.

US Pat. No. 9,137,245

LOGIN METHOD, APPARATUS, AND SYSTEM

TENCENT TECHNOLOGY (SHENZ...

1. A login method for a server, comprising:
receiving a request for logging in an application account sent from a first terminal, wherein the request for logging in the
application account contains login information and an ID of the first terminal, the login information including at least a
unique login name for the application account and a login password;

detecting if the first terminal is included in identified terminals corresponding to the application account;
sending first verification information to a second terminal bound with the application account, if it is detected the first
terminal is not included in the identified terminals corresponding to the application account;

receiving second verification information from the first terminal to detect if the second verification information matches
the first verification information; and

responding to the request for logging in the application account on the first terminal, if it is detected the second verification
information matches the first verification information;

wherein detecting if the first terminal is included in the identified terminals corresponding to the application account comprises:
inquiring an ID list of the identified terminals corresponding to the application account; and
determining if the ID of the first terminal is on the ID list of the identified terminals by checking the ID of the first
terminal against the ID list of the identified terminals.

US Pat. No. 9,378,727

METHOD AND APPARATUS FOR AUDIO PLAYING

TENCENT TECHNOLOGY (SHENZ...

1. A method for audio playing having a correspondence between characters and pre-stored audio data in a non-transitory storage
unit, comprising:
receiving an audio conversion request carrying a first text identifier and obtaining a first electronic text corresponding
to the first text identifier, by a receiving unit using a processor;

obtaining, by a obtaining unit using a processor, the audio data corresponding to the characters in the first electronic text
according to the stored correspondence between characters and audio data; and

playing, by a playing unit using a processor, the audio data in an order of corresponding characters in the first electronic
text,

wherein the audio conversion request is triggered by a first control signal, and the audio playing request is triggered by
a second control signal,

wherein the first control signal is a signal generated by clicking an earphone play button for a time duration larger than
or equal to a preset threshold, and the second control signal is a signal generated by clicking the earphone play button for
a time duration smaller than the preset threshold; or the first control signal is a signal generated by clicking an earphone
play button for a time duration smaller than a preset threshold, and the second control signal is a signal generated by clicking
the earphone play button for a time duration larger than or equal to the preset threshold.

US Pat. No. 9,215,195

METHOD AND APPARATUS FOR MESSAGE SYNCHRONIZATION IN INSTANT MESSAGING APPLICATIONS

TENCENT TECHNOLOGY (SHENZ...

1. A method for message synchronization in instant messaging applications, comprising:
at a server system having one or more processors and memory storing programs to be executed by the one or more processors:
detecting a log-in status corresponding to an instant messaging account currently logged-in through an instant messaging application
at a first terminal;

determining if the log-in status is a multi-terminal log-in status, wherein the multi-terminal log-in status indicates that
the instant messaging account is simultaneously logged-in from the first terminal and a second terminal, further including
detecting previously recorded information identifying the instant messaging account by a unique account identifier and identifying
the second terminal by a unique terminal identifier corresponding to the second terminal;

receiving a request to update an application state of the instant messaging application;
upon receiving the request to update the application state of the instant messaging application:
in accordance with a determination that the log-in status is the multi-terminal log-in status, initiating a message synchronization
operation between the first and second terminals; and

setting the log-in status to indicate that the instant messaging account is logged-in from the first terminal, further including:
recording information corresponding to the instant messaging account, wherein the information includes the unique account
identifier and a unique terminal identifier corresponding to the first terminal.

US Pat. No. 9,141,774

METHOD AND SYSTEM FOR CONTROLLING ACCESS TO APPLICATIONS ON MOBILE TERMINAL

TENCENT TECHNOLOGY (SHENZ...

1. A method for controlling an access to an application on a mobile terminal, comprising:
opening a thread in a back-stage by a processor of the mobile terminal when the mobile terminal starts up;
continuously scanning a currently opened application and obtaining an application identification of the currently opened application
at a scheduled time interval by looping the thread as a back-stage activity, wherein the currently opened application is associated
with one or more view interfaces including a current view interface, and the thread is configured to scan a stack top of a
stack of view interfaces on the mobile terminal to obtain the current view interface, and to obtain the application identification
from the current view interface;

comparing the application identification with a pre-stored target application identification, wherein the pre-stored target
application identification is stored in a memory list in the mobile terminal;

displaying an unlock interface for inputting an unlock action, when the application identification is compared to be consistent
with the pre-stored target application identification; and

obtaining an unlock command to access the currently opened application on the mobile terminal, wherein the unlock command
is generated when the unlock action is accepted.

US Pat. No. 9,083,693

MANAGING PRIVATE INFORMATION IN INSTANT MESSAGING

Tencent Technology (Shenz...

1. A computer-implemented method for managing private information in instant messaging, comprising:
storing first private information, wherein the first private information comprises details of a first instant messaging user;
maintaining access authority of the first private information;
determining whether a second instant messaging user initiating a private information request has the access authority; and
providing the first private information to the second instant messaging user when the second instant messaging user has the
access authority;

wherein
maintaining the access authority of the first private information comprises:
receiving a share command from the first instant messaging user for sharing the first private information, wherein the share
command comprises a group chat identifier for indicating a group chat in which the first private information is shared;

providing the first private information to the second instant messaging user comprises:
comparing a time stamp contained in the share command with one or more time stamps of the first private information;
when the first private information with a first time stamp later than the time stamp contained in the share command is available,
providing the first private information with the first time stamp to a member of the group chat contained in the contact list
of the first instant messaging user; and

providing the first private information with a second time stamp no later than the time stamp contained in the share command
to a member of the group chat not contained in the contact list of the first instant messaging user.

US Pat. No. 9,357,347

METHOD AND SYSTEM FOR AGGREGATING MESSAGES BASED ON A POINT OF INTEREST AND STORAGE MEDIUM

Tencent Technology (Shenz...

1. A method for aggregating messages based on a point of interest, comprising:
acquiring an instruction to trigger a point of interest loaded to a micro-blog message, wherein the point of interest is stored
within an electronic map;

acquiring a region unit in which the point of interest is located from the electronic map which is divided into a plurality
of region units in advance, and acquiring a predetermined number of region units including the region unit in which the point
of interest is located by taking the region unit in which the point of interest is located as a center;

acquiring the micro-blog messages issued within the predetermined number of region units; and
generating a message aggregating page including a map indicative of the point of interest based on the acquired micro-blog
messages and displaying the acquired micro-blog messages on the message aggregating page.

US Pat. No. 9,311,920

VOICE PROCESSING METHOD, APPARATUS, AND SYSTEM

TENCENT TECHNOLOGY (SHENZ...

1. A voice processing method, implemented by a terminal, comprising:
obtaining a voice bit stream to be sent;
obtaining voice control information corresponding to the voice bit stream to be sent, wherein the voice control information
is used for a voice server to determine a voice-mixing strategy;

sending the voice bit stream and the voice control information to the voice server;
receiving at least one voice bit stream returned by the voice server based on the voice-mixing strategy; and
outputting the at least one voice bit stream;
wherein
the voice control information includes a first voice control information directly extracted from the voice bit stream and
a second voice control information related to a current user or a current voice session; and

the second voice control information includes information about whether a voice mixing process is to be performed on the voice
server or on the terminal.

US Pat. No. 9,047,682

METHOD AND SYSTEM FOR IMAGE PROCESSING

TENCENT TECHNOLOGY (SHENZ...

1. A method for image processing, comprising:
loading and decrypting an image file to obtain an original image, and saving the original image;
shrinking the original image to obtain a pending image with a preset resolution, and saving the pending image;
editing the pending image and previewing the pending image in real time; and
editing the original image after the real-time preview of the pending image,
wherein editing the pending image and previewing the pending image in real-time comprises:
adjusting, by a foreground thread, an image editing parameter and triggering a first background thread to perform a corresponding
editing operation on the pending image according to the adjusted image editing a parameter; and

obtaining an effect image after the editing operation is completed, and notifying, by the first background thread, the foreground
thread to show the effect image on a user interface for real-time preview.

US Pat. No. 9,454,540

SYSTEMS AND METHODS FOR SHARING FILES AMONG MULTIPLE TERMINALS

TENCENT TECHNOLOGY (SHENZ...

1. A data-sharing method comprising:
starting data-sharing application on a first terminal,
placing a file to be shared from the first terminal in a webpage of the data-sharing application and generating a link address
for the file in the data-sharing application,

broadcasting, by the data-sharing application on the first terminal, the link to at least one other terminal so that the at
least one other terminal can share the file via the link address,

the data-sharing application on the first terminal generating a first password string, transmitting the first password string
to a file-receiving terminal, the first password string including a random number, an encrypted network address of the file-receiving
terminal, and an encrypted link address of the file,

the file-receiving terminal receiving the first password string, encrypting a local network address of the file-receiving
terminal using the random number in the first password string, and generating a second password string comprising: the encrypted
local network address generated by the file-receiving terminal, and the link address of the file from the first password string,

the file receiving terminal transmitting, to the first terminal, the second password string to request the first terminal
to transmit the file,

the first terminal receiving the second password string returned from the file-receiving terminal,
the data-sharing application of the first terminal decrypting to obtain the local network address from the second password
string, determining whether the local network address in the second password string is the same as the network address of
the file-receiving terminal in the first password string, if they are determined to be the same, start transmitting the file
to the file-receiving terminal, and

when the file-receiving terminal does not receive the file right away, or when a file-transmitting process is interrupted
between the first terminal and the file-receiving terminal,

the file-receiving terminal transmitting the second password string to the first terminal again to request that the file be
transmitted or that the interrupted transmission be renewed, and

the first terminal directly sending the file to the file-receiving terminal if the local network address in the second password
string is determined to be the same as the network address of the file-receiving terminal in the first password string, without
conducting a specific communication to request and determine the file after the second password string is transmitted.

US Pat. No. 9,407,570

METHOD, APPARATUS, AND SYSTEM FOR ALLOCATING CDN VOLUME

TENCENT TECHNOLOGY (SHENZ...

1. A method for allocating content delivery network (CDN) volume, comprising:
receiving a business visit request; and
dispatching the business visit request to a plurality of CDN servers for handling the business visit request based on a time
allocation strategy,

wherein:
the time allocation strategy comprises pre-allocating a time length of an allocation cycle into a plurality of time slices
having a total number comparable to a number of the plurality of CDN servers,

one time slice of the plurality of time slices corresponds to one CDN server of the plurality of CDN servers, and each time
slice of the plurality of time slices has a length proportional to a weight of the each CDN server, and

the method further comprising determining a time slice at a current moment in a current allocation cycle and determining a
corresponding CDN server for handling the business visit request, after receiving the business visit request.

US Pat. No. 9,100,170

FILE PACKING AND UNPACKING METHOD, AND DEVICE THEREOF

TENCENT TECHNOLOGY (SHENZ...

1. A file packing method, comprising:
encrypting a target file using an encryption/decryption algorithm to obtain an encrypted target file, dividing the encryption/decryption
algorithm into a first part encryption/decryption algorithm and a second part encryption/decryption algorithm;

obtaining a packed target file according to the first part encryption/decryption algorithm and the encrypted target file;
and

informing an unpacking apparatus of the packed target file and the second part encryption/decryption algorithm;
wherein the informing the unpacking apparatus of the second part encryption/decryption algorithm comprises: obtaining an MD5
value corresponding to the first part encryption/decryption algorithm, recording a relationship between the MD5 value corresponding
to the first part encryption/decryption algorithm and the second part encryption/decryption algorithm in an algorithm library;
and informing the unpacking apparatus of the algorithm library.

US Pat. No. 9,454,234

INSTRUCTION TRIGGERING METHOD AND DEVICE, USER INFORMATION ACQUISITION METHOD AND SYSTEM, TERMINAL, AND SERVER

TENCENT TECHNOLOGY (SHENZ...

1. An instruction triggering method, comprising:
detecting a shaking operation of a mobile terminal;
starting to count time in response to determining that the mobile terminal detects the shaking operation, and in response
to determining that counted time is up to a specified length, determining whether the shaking operation is continuously received
during the counted time; and

triggering a preset input instruction according to the detected shaking operation in response to determining that the shaking
operation is continuously received during the counted time.

US Pat. No. 9,313,289

METHOD AND DEVICE FOR CONTROLLING PERIPHERAL DEVICES VIA A SOCIAL NETWORKING PLATFORM

TENCENT TECHNOLOGY (SHENZ...

1. A method for transmitting data between a peripheral device and a user device via a Bluetooth Low Energy protocol, comprising:
at the user device:
transmitting data to the peripheral device in a simulated data stream, the transmitting comprising:
identifying a first Bluetooth characteristic for sending data to the peripheral device, the first Bluetooth characteristic
having been exposed by the peripheral device to the user device in a current connection event;

dividing a first data packet that is to be transmitted to the peripheral device into a sequence of data frames plus zero or
one remainder, each data frame having a respective size equal to a predetermined data size of the identified first Bluetooth
characteristic, and the remainder having a respective size smaller than the predetermined data size of the identified first
Bluetooth characteristic;

for each of the sequence of data frames, sending a respective write request to writing the data frame to a respective value
of the identified first Bluetooth characteristic;

padding the reminder to obtain a padded remainder have a respective size equal to the predetermined data size of the identified
first Bluetooth characteristic; and

sending a respective write request to write the padded remainder to the respective value of the identified first Bluetooth
characteristic.

US Pat. No. 9,170,977

METHOD AND SYSTEM FOR MANAGING SERVER INFORMATION DATA BASED ON POSITION INFORMATION OF A SERVER BASEBOARD

TENCENT TECHNOLOGY (SHENZ...

1. A method for managing server information data, comprising:
obtaining, by an information data management system, position information of a server baseboard from a controller storing
the position information of the server baseboard inserted in a rack of a rack server; wherein the position information of
the server baseboard comprises position information of the rack and slot information of the server baseboard in the rack;

wherein the slot information is configured for the server baseboard by: configuring the slot information for the server baseboard
through a Dual In-line Package (DIP) switch on the rack of the rack server, and

establishing a corresponding relationship between the position information of the server baseboard and an information data
index of the rack server; and

obtaining, by an information data configuring system, the position information of the server baseboard, the information data
index and the corresponding relationship between the position information of the server baseboard and the information data
index from the information data management system.

US Pat. No. 9,166,987

PREVENTING IDENTITY FRAUD FOR INSTANT MESSAGING

Tencent Technology (Shenz...

1. A computer-implemented method for preventing identity fraud in instant messaging, comprising:
receiving an instant message;
determining relationship between a sender and a receiver of the instant message;
determining whether key identifier of the sender has changed, wherein the key identifier of the sender is personal information
for indicating the sender; and

informing the receiver about the change of the key identifier of the sender when the sender and the receiver have a preset
type of relationship.

US Pat. No. 9,355,230

METHOD AND SYSTEM FOR CONTROLLING ACCESS TO APPLICATIONS ON MOBILE TERMINAL

TENCENT TECHNOLOGY (SHENZ...

1. A method for controlling an access to an opened application on a mobile terminal, comprising:
scanning the opened application and obtaining an application identification at a scheduled time based on a set time interval
for scanning;

comparing the application identification with a plurality of pre-stored target application identifications stored in a memory
list, wherein each pre-stored target application identification includes at least one of a name of a target application and
a target application ID, and pre-stored target applications refer to applications that require application security and confidentiality;

displaying an unlock interface, when the application identification is consistent with one of the pre-stored target application
identifications;

obtaining an unlock command to access the opened application on the mobile terminal; and
stopping scanning of the opened application on the mobile terminal to save power when detecting a screen of the mobile terminal
is off or the mobile terminal is on a standby mode.

US Pat. No. 9,319,630

METHOD AND DEVICE FOR VIDEO PROCESSING

TENCENT TECHNOLOGY (SHENZ...

1. A method for processing a video in a network device that comprises a processor, the method comprising:
fetching, by the processor, from a buffer queue, a current image frame of the video;
calculating, by the processor, a sampling interval of the current image frame, wherein the sampling interval is a temporal
difference between a first time point at which the current image frame is sampled and a second time point at which a previous
image frame of the video is sampled, wherein the previous image frame is an image frame of the video that was fetched from
the buffer queue immediately before the current image frame;

calculating, by the processor, a waiting time of the current image frame, wherein the waiting time is a time period between
the current image frame being added into the buffer queue and the current image frame being fetched from the buffer queue;

calculating, by the processor, a regulated waiting time of the current image frame based on the waiting time of the current
image frame and a previous regulated waiting time, the previous regulated waiting time equal to the regulated waiting time
of the previous image frame, wherein the previous regulated waiting time for a first image frame that is fetched from the
buffer queue earliest is an assigned value and the regulated waiting time of the first frame is calculated based on the assigned
regulated waiting time and the waiting time of the first image frame;

determining, by the processor, a playing interval of the current image frame based on the regulated waiting time of the current
image frame, the sampling interval of the current image frame, and a preset waiting delay;

determining, by the processor, whether time elapsed since start of playback of the previous image frame is shorter than the
playing interval of the current image frame; and

playing, by the processor, the current image frame at a current time point if the time elapsed since the start of playback
of the previous image frame is not shorter than the playing interval of the current image frame.

US Pat. No. 9,292,169

METHOD AND DEVICE FOR DISPLAYING INTERFACE

Tencent Technology (Shenz...

7. A device for displaying an interface, comprising a processor and a screen; wherein the processor is configured to:
display an icon of at least one first object in a first area of a display interface on the screen;
display an icon of a second object in a second area of the display interface on the screen, the second object and the first
object belong to a same level and different categories;

wherein one of the at least one first object is selected, the processor is further configured to:
hide an icon of a first object which is not selected in the first area of the screen;
display an icon of each sub-object of the selected first object in the second area of the screen;
display an icon of a first object in the first area which is not selected in a third area of the display interface on the
screen; and

display the icon of the second object in a fourth area of the display interface on the screen,
and wherein the first area, second area, third area and fourth area are displayed together on the interface simultaneously.

US Pat. No. 9,164,780

METHOD AND DEVICE FOR AN INTELLIGENT CONTROL OF PORTABLE ELECTRONIC DEVICES

TENCENT TECHNOLOGY (SHENZ...

1. A method performed by a portable electronic device with memory storing a plurality of application programs, the method
comprising:
detecting a selection of a respective application program of the plurality of application programs;
in response to detecting the selection of the respective application program of the plurality of application programs:
identifying a first set of one or more predefined hardware operations that do not correspond to one or more hardware operations
associated with the respective application program;

identifying one or more background application programs of the plurality of application programs including identifying a predefined
number of most active application programs, other than the respective application program, as the one more background application
programs based on one or more of: an amount of time during which an application program is played on the device, a number
of times that the application program is invoked within a predefined time window, and a specific time period during which
the application program is played;

identifying one or more hardware operations associated with the one or more background application programs; and
identifying a second set of one or more predefined hardware operations that do not correspond to the one or more hardware
operations associated with the one or more background application programs;

conditionally deactivating a third set of one or more predefined hardware operations that is a subset of the first set of
one or more predefined hardware operations or the second set of one or more predefined hardware operations; and

launching the respective application program.

US Pat. No. 9,117,130

INFORMATION OBTAINING METHOD AND APPARATUS

TENCENT TECHNOLOGY (SHENZ...

1. An information obtaining method implemented by an electronic device, the method comprising:
obtaining a first two-dimensional (2D) barcode;
performing an image transformation on the first 2D barcode to obtain a virtual 2D barcode; and
according to validity of the virtual 2D barcode, obtaining relationship information of the first 2D barcode, wherein the relationship
information is obtained based on a mapping relationship of the virtual 2D barcode in a database,

wherein the obtaining of the relationship information of the first 2D barcode according to the validity of the virtual 2D
barcode comprises:

determining whether the virtual 2D barcode has a mapping relationship with a second 2D barcode;
when the virtual 2D barcode is determined to have the mapping relationship with the second 2D barcode, the virtual 2D barcode
is valid and the first 2D barcode is determined to have the relationship information corresponding to the image transformation,
and

when the virtual 2D barcode is not determined to have the mapping relationship with the second 2D barcode, the virtual 2D
barcode is invalid and the first 2D barcode is not determined to have the relationship information corresponding to the image
transformation.

US Pat. No. 9,106,449

METHOD, APPARATUS AND SYSTEM FOR OBTAINING LOGON INFORMATION

TENCENT TECHNOLOGY (SHENZ...

1. A method for obtaining logon information, comprising:
obtaining, by an Instant Messaging (IM) client of a user, logon information which comprises a user account of the user when
the user logs on the IM client;

sending, by a value-added service client of the user, a request for logon information when the user started the value-added
service client;

receiving, by a function plug-in, the request for logon information from the value-added service client;
sending, by the function plug-in, the request for the logon information to the IM client;
returning, by the IM client, the logon information of the user to the function plug-in;
receiving, by the function plug-in, the logon information from the IM client;
sending, by the function plug-in, the logon information to the value-added service client; and
sending, by the value-added service client, the logon information of the user obtained from the IM client to a value-added
service server to log on the value-added service server.

US Pat. No. 9,164,748

INFORMATION BACKUP METHOD AND APPARATUS

TENCENT TECHNOLOGY (SHENZ...

1. An information backup method, comprising:
at an electronic device that comprises a local memory, while monitoring a log file that contains information denoting a queue
of jobs that comprises a plurality of operations, the queue of jobs further including a first action of uninstalling a user-selected
application and a second action of reinstalling the user-selected application:

determining that a first part of the log file is associated with a first subset of the plurality of operations, the first
subset of operations comprising the first action of uninstalling the user-selected application;

in accordance with a determination of the first action of uninstalling the user-selected application, storing in the local
memory user-selected information that is associated with the user-selected application, the user-selected information comprising
a user database, a configuration file and a private file generated and updated when a user uses the user-selected application,
wherein the log file, the user database, the configuration file and the private file are distinct from each other;

determining that a second part of the log file is associated with a second subset of the plurality of operations, the second
subset of operations comprising the second action of reinstalling the user-selected application; and

in accordance with a determination of the second action of installing the user-selected application, extracting the user-selected
information that is stored in the local memory for use in the second action of reinstalling the user-selected application.

US Pat. No. 9,313,250

AUDIO PLAYBACK METHOD, APPARATUS AND SYSTEM

TENCENT TECHNOLOGY (SHENZ...

1. An audio playback method, comprising:
identifying, by an audio sending end, a captured audio data frame according to a type of the audio data frame;
sending, by the audio sending end, the identified audio data frame to an audio receiving end;
receiving, by the audio receiving end, the audio data frame that is identified according to the type of the audio data frame;
based on the identification, determining, by the audio receiving end, the type of the audio data frame and an evaluation result
of network transmission status; and

when the type of the audio data frame is a music frame and evaluation result of the network transmission status does not meet
a preset transmission baseline condition, adjusting, by the audio receiving end, a threshold value of a jitter buffer that
is used to cache the audio data frame;

wherein identifying the captured audio data frame according to the type of the audio data frame further includes:
calculating frame energy of the audio data frame; and
comparing the frame energy of the audio data frame with a preset frame energy threshold value, wherein:
when the frame energy is lower than the preset frame energy threshold value, the audio data frame is identified as a mute
frame;

when the frame energy is higher than the preset frame energy threshold value, the speech probability density Ps and the music
probability density Pm of the audio data frame are further calculated; and

when Ps/Pm is higher than a preset threshold value, the audio data frame is identified as a speech frame.

US Pat. No. 9,473,619

SYSTEMS AND METHODS FOR CONTACTS MANAGEMENT

Tencent Technology (Shenz...

1. A method for contacts management, comprising:
receiving one or more first contacts included in a communication log, wherein the communication log includes a call log or
a Short Messaging Services (SMS) log;

calculating contact frequencies of the first contacts based on at least information associated with the communication log;
selecting one or more second contacts to be managed from the first contacts based on at least information associated with
the contact frequencies, comprising:

sorting the first contacts in a descending order based on at least information associated with the contact frequencies and
selecting the second contacts from the sorted first contacts, the second contacts corresponding to one or more largest contact
frequencies; or

selecting, from the first contacts, the one or more second contacts corresponding to the contact frequencies larger than a
predetermined threshold;

determining when the second contacts exist in an address book;
in response to the second contacts existing in the address book, extracting the second contacts in the address book as frequent
contacts;

generating a list of frequent contacts based on at least information associated with the frequent contacts, comprising sorting
the frequent contacts based on at least information associated with the contact frequencies (k) in a descending order to generate
the list of frequent contacts;

in response to one or more operating instructions related to the frequent contacts, outputting an identification of an application
shared with or recommended to the frequent contacts;

filtering the frequent contacts in the list of frequent contacts from the address book to obtain one or more third contacts;
and

combining the list of frequent contacts as a subgroup and the one or more third contacts, comprising adding the list of frequent
contacts as a subgroup to a place above the one or more third contacts in the address book.

US Pat. No. 9,465,626

METHOD AND APPARATUS FOR ACQUIRING TIME SPENT ON SYSTEM SHUTDOWN

Tencent Technology (Shenz...

1. A computer implemented method for determining time spent on system shutdown, comprising:
presetting a first program to receive a shutdown instruction the earliest during the system shutdown, a second program to
receive the shutdown instruction the last during the system shutdown;

determining a time at which the first program receives the shutdown instruction;
determining an exit time of the second program; and
determining the time spent on the system shutdown based on the time at which the first program receives the shutdown instruction
and the exit time of the second program.

US Pat. No. 9,215,277

RESOURCE SHARING METHOD AND DEVICE, AND STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. A resource sharing method, comprising:
receiving a resource sharing indication message from a user;
acquiring relationship chain information of the user from a sharing server;
generating a resource download link according to information of a shared resource corresponding to the resource sharing indication
message and the acquired relationship chain information of the user; and

transmitting the resource download link to another client via the sharing server to enable another user matching with the
relationship chain information of the user to download the shared resource corresponding to the resource sharing indication
message under a corresponding sharing rule.

US Pat. No. 9,826,664

APPARATUS FOR COOLING SERVER CABINET, SERVER CABINET APPARATUS, AND INTERNET DATA CENTER

TENCENT TECHNOLOGY (SHENZ...

1. An apparatus for cooling a server cabinet, comprising: a bracket and a cooling device; wherein
the bracket is positioned below one or a plurality of server cabinets, and the cooling device is positioned in the bracket,
and cools the server cabinet on the bracket;

the cooling device comprises a heat exchanger, a blower, and a first air-ducting plate; the heat exchanger, the blower, and
the first air-ducting plate are sequentially arranged in parallel, the heat exchanger and the blower is positioned below the
server cabinet, and the first air-ducting plate is positioned on an outer side of the server cabinet;

the bracket comprises a first bracket and a second bracket; wherein
one end surface of the first bracket is connected to one end surface of the second bracket, the server cabinet is positioned
on the first bracket, the heat exchanger and the blower are installed in the first bracket, and the first air-ducting plate
is installed in the second bracket.

US Pat. No. 9,178,874

METHOD, DEVICE AND SYSTEM FOR LOGGING IN THROUGH A BROWSER APPLICATION AT A CLIENT TERMINAL

TENCENT TECHNOLOGY (SHENZ...

1. A method performed at a main server having one or more processors and memory storing programs executed by the one or more
processors, wherein the main server is communicatively connected to a client terminal and a third party server, respectively:
receiving a validation request from the third party server, wherein the validation request is triggered by a data access request
from a browser application at the client terminal to the third party server and the validation request comprises a third party
identifier, a user identifier, and a session key;

determining whether there is an active communication session between the main server and the client terminal corresponding
to the session key; and

in accordance with a determination that the communication session is an active session, sending an authorization request to
the third party server based on the third party identifier, the authorization request including the session key, wherein the
third party server is configured to allow the client terminal to access a predefined portion of data associated with the user
identifier through the browser application without further validating the data access request and require further authentication
by the main server from the client terminal when the browser application requests to access sensitive data outside the predefine
portion in the third party server.

US Pat. No. 9,374,682

METHOD AND SYSTEM FOR MANAGING REAL-TIME AUDIO BROADCASTS AMONG A GROUP OF USERS

TENCENT TECHNOLOGY (SHENZ...

1. An information exchange method performed at a mobile device having one or more processors and memory for storing program
modules to be executed by the one or more processors, wherein the mobile device is communicatively coupled to a remote server,
the method comprising:
displaying within an instant messaging application running on the mobile device a first affordance allowing a user of the
mobile device to initiate a real-time audio broadcast among a group of users, wherein the user is a member of the group;

detecting a selection of the first affordance by the user;
in response to detecting the user selection of the first affordance, sending a real-time audio broadcast initiation request
to the remote server, wherein the remote server is configured to start a periodically updated countdown timer for initiating
a real-time audio broadcast and that

the countdown timer corresponds to a predetermined time period during which the real-time audio broadcast is initiated before
another user joins the real-time audio broadcast, wherein the real-time audio broadcast is automatically terminated by the
remote server in accordance with a determination that no other user joins the real-time audio broadcast after the predetermined
time period,

wherein the remote server, after receiving the real-time audio broadcast initiation request from the mobile device,
detects states of other mobile devices in the group; and
in response to detecting the other mobile devices in an intercom on state, notifies the mobile device of direct transmission
paths, wherein each of the direct transmission paths is a direct wireless connection between the mobile device and a respective
one of the other mobile devices without through the remote server;

enabling a second affordance to allow the user to activate the real-time audio broadcast after another member of the group
joins the real-time audio broadcast before the timer expires;

detecting a first instruction from a user of the mobile device to start the real-time audio broadcast to a plurality of client
devices associated with the group of users, wherein the first instruction is received in response to detecting a first user
selection of the second affordance;

in response to the first instruction, sending an audio broadcast start request to the remote server, wherein the remote server
is configured to instruct the plurality of client devices to enter a broadcast-disable mode such that only the user of the
mobile device can generate the real-time audio broadcast while the group of users can only listen to the real-time audio broadcast;

capturing and streaming audio signals from the user of the mobile device to the remote server and changing appearance of the
second affordance indicating the audio signals are being transmitted from the mobile device to the remote server, wherein
the remote server is configured to transmit the audio signals to the plurality of client devices;

detecting a second instruction from the user of the mobile device to stop the real-time audio broadcast to the plurality of
client devices, wherein the second instruction is received in response to detecting a second user selection of the second
affordance; and

in response to the second instruction, sending an audio broadcast stop request to the remote server and restoring the appearance
of the second affordance, wherein the remote server is configured to instruct the plurality of client devices to enter a broadcast-enable
mode such that any user of the plurality of client devices can start a new real-time audio broadcast.

US Pat. No. 9,158,918

METHOD AND APPARATUS FOR DETERMINING MALICIOUS PROGRAM

TENCENT TECHNOLOGY (SHENZ...

1. A method for determining a malicious program, comprising:
decompiling an application program to obtain a decompiled code of the application program, wherein the application program
is installed on a terminal device of a user;

scanning the decompiled code to determine a specific application programming interface (API) from the decompiled code;
obtaining the API within the decompiled code of the application program;
determining a call logic for calling the specific API, wherein the call logic comprises a triggering event to trigger the
specific API to be called, a feedback path provided after the specific API is called, or a combination of the trigger event
and the feedback path; and

determining whether the application program is a malicious program according to the call logic;
wherein the application program is determined to be a malicious program when:
the specific API is a function of connecting to a network to access a business for fee deductions, and the call logic is calling
the specific API when the terminal device is powered on to self-start without being authorized by the user; or

the specific API is a function of intercepting and replying a message for fee deductions; and the call logic is that after
the specific API is called and the message for fee deductions is replied, a fee is charged to the terminal device of the user.

US Pat. No. 9,158,531

SOFTWARE DOWNLOAD METHOD AND SOFTWARE DOWNLOAD APPARATUS

TENCENT TECHNOLOGY (SHENZ...

1. A method for updating game software at a first client device having one or more processors and memory for storing one or
more programs to be executed by the one or more processors, the method comprising:
while a game session related to the game software is running at the first client device:
receiving an updating notification received from a gaming server, the updating notification identifying updating data for
the game software and specifying predefined criteria for locating one or more other client devices that possess the identified
updating data;

locating at least one second client device in accordance with the predefined criteria;
sending an outgoing downloading request to the located at least one second client device;
upon acceptance of the outgoing downloading request by the at least one second client device, downloading the updating data
from the located at least one second client device,

and dynamically adjusting respective bandwidth allocated to the downloading;
upon downloading at least part of the updating data, registering with the gaming server as a device possessing the downloaded
updating data;

receiving an incoming downloading request for the downloaded updating data from a third client device; and
upon receiving the incoming downloading request for the downloaded updating data from the third client device, uploading the
downloaded updating data to the third client device.

US Pat. No. 9,251,344

METHOD, DEVICE AND STORAGE MEDIUM FOR PROCESSING VIRUS

TENCENT TECHNOLOGY (SHENZ...

1. A method for processing virus in an electronic apparatus, the method comprising:
detecting a virus scan operation;
in response to the virus scan operation, determining whether conditions (i) and (ii) are true, wherein the condition (i) is
true when a time interval between a last time of processing virus using a first virus processing mode and the current time
is larger than a preset interval, the condition (ii) is true when at least one of risk situations exist during a time period
between the last time of processing virus using the first virus processing mode and the current time, wherein the risk situations
comprise:

during the time period between the last time of processing virus using the first virus processing mode and the current time,
the first virus processing mode of processing virus is never used,

during the time period between the last time of processing virus using the first virus processing mode and the current time,
a database of virus has been updated, but no virus processing operation is detected,

during the time period between the last time of processing virus using the first virus processing mode and the current time,
at least one risk site is visited via a browser or a client; or the current time is in the peak of virus outbreak; and

if one of conditions (i) and (ii) being true, calling the first virus processing mode to scan files in the electronic apparatus
to obtain a scanning result.

US Pat. No. 9,349,062

CHARACTER RECOGNITION METHOD AND DEVICE

Tencent Technology (Shenz...

1. A character recognition method implemented on a processor and a memory, the memory including instructions to configure
the processor to perform the method comprising:
acquiring an image and locating a character region in the image by the processor, wherein the character region comprises a
character and a local background;

calculating, by the processor, a first ratio comprising a ratio of number of pixels corresponding to a main color of the local
background and a total number of pixels of the local background;

determining, by the processor, that the local background is a complex background in response to the first ratio being less
than a first threshold;

calculating, by the processor, a second ratio comprising a ratio of number of pixels corresponding to a main color of a whole
background of the image and a total number of pixels of the whole background in response to the first ratio not being less
than the first threshold;

determining, by the processor, that the local background is a complex background in response to the second ratio being less
than another threshold;

determining, by the processor, a color of the character in response to the local background being a complex background;
constructing, by the processor, a mask for the character by combining the color of the character and a color of the character
region;

extracting, by the processor, the character from the character region by using the mask; and
recognizing the character and outputting the recognition result by the processor.

US Pat. No. 9,467,413

METHOD AND SYSTEM FOR REPLYING TO WEBSITE UPDATE EVENT

TENCENT TECHNOLOGY (SHENZ...

1. A method for replying to a website update event, which is executed by a digital data processing device, comprising steps
of:
receiving, at an instant-messaging client end, prompting information about an update event of personal dynamic information
of a user account associated with a user at the instant-messaging client end in a social networking site (SNS), wherein the
prompting information includes information of prompting the user to conduct a reply;

loading and rendering, at the instant-messaging client end, the updated personal dynamic information when the instant-messaging
client end receives command information corresponding to the information of prompting the user to conduct a reply;

bundling setting window attributes and notifying completeness of window setting at the instant-messaging client by an external
software program;

generating the reply window by setting attributes of an updated page resulted from an update event in the social networking
site according to setting window attributes bundled by the external software program; and

outputting the reply window according to notifying completeness of window setting bundled by the external software program,
thereby enabling the user at the instant-messaging client to conduct a reply through the reply window.

US Pat. No. 9,449,310

CHECK-IN METHOD AND SYSTEM BASED ON TWO-DIMENSIONAL CODE, SCANNING TERMINAL, AND DISPLAY TERMINAL

TENCENT TECHNOLOGY (SHENZ...

1. A check-in method based on a two-dimensional barcode performed by a check-in system including a check-in management server
that is communicatively connected to a display terminal and a scanning terminal, respectively, the method comprising:
the check-in management server generating a two-dimensional barcode and sending the two-dimensional barcode to the display
terminal, the two-dimensional barcode comprising a check-in identifier;

the display terminal displaying the two-dimensional barcode;
the scanning terminal scanning the two-dimensional barcode, obtaining a scanning timestamp and the check-in identifier, and
sending a check-in request including a user identifier, the scanning timestamp, and the check-in identifier to the check-in
management server via a wireless communication channel; and

the check-in management server confirming the check-in request according to the check-in identifier and the user identifier,
and recording a check-in timestamp of the user according to the scanning timestamp by generating a check-in record including
the check-in identifier, the user identifier, and the check-in timestamp.

US Pat. No. 9,317,707

METHOD AND SYSTEM FOR PROTECTING A DRIVER

TENCENT TECHNOLOGY (SHENZ...

1. A method for protecting a driver on a computer, the method comprising:
receiving an Input/Output Request Package (IRP) and an encrypted program file from an application, wherein the encrypted program
file is contained in the IRP, wherein the IRP defines how the application accesses the driver, and wherein the encrypted program
file is to identify the application;

decrypting the encrypted program file; verifying the decrypted program file; and,
if verification is passed, returning a handle to the application, or otherwise, not returning the handle to the application.

US Pat. No. 9,246,925

METHOD AND SYSTEM FOR THIRD-PARTY SERVICE PLATFORM LOGIN

TENCENT TECHNOLOGY (SHENZ...

1. A third-party service platform login method for a public platform containing information of a plurality of third-party
service platforms, comprising:
accepting a user logging onto the public platform from a client terminal;
obtaining a third-party service platform selected by the user on the public platform;
obtaining a user identification number (UIN) of the user and a UIN of the selected third-party service platform, wherein the
user's UIN corresponds to a user account of the user on the public platform and the selected third-party service platform's
UIN corresponds to a public account of the third-party service platform on the public platform;

combining, by the public platform, the UIN of the user and the UIN of the selected third-party service platform to generate
a new combined user account for the user to log onto the selected third-party service platform; and

logging onto the selected third-party service platform using the combined user account, wherein the user account of the user
on the public platform is not provided to the selected third-party service platform.

US Pat. No. 9,189,699

AUGMENTED REALITY INTERACTION IMPLEMENTATION METHOD AND SYSTEM

Tencent Technology (Shenz...

1. A method for realizing interaction in augmented reality, comprising the following steps:
collecting a frame image and uploads the frame image;
recognizing a template image that matches the frame image and returning the template image;
detecting a marker area of the frame image according to the template image; and
superposing media data corresponding to the template image on the marker area and displaying the superposed image;
wherein the step of detecting the marker area of the frame image according to the template image comprises:
obtaining feature points in the frame image according to training data corresponding to the template image; and
obtaining a contour location of the marker area in the frame image according to the feature points; and
wherein before the step of detecting the marker area of the frame image according to the template image, the method further
comprises;

detecting the stored template image to obtain the feature points and determining whether the number of the feature points
is smaller than a threshold, and if it is not, then obtaining a sample image corresponding to the template image, and detecting
feature points in the sample image; and

processing the feature points in the template image and in the sample image to generate the training data recording the feature
points.

US Pat. No. 9,178,845

METHOD, CLIENT DEVICE, SERVER SYSTEM FOR PARSING A DATA USAGE VALUE

TENCENT TECHNOLOGY (SHENZ...

1. A computer-implemented method, comprising:
at a client device:
receiving a first message that includes a first data usage value, wherein the first message is formatted according to a respective
format;

after receiving the first message:
acquiring a data usage template corresponding to the respective format further comprising analyzing the first message to obtain
the data usage template, the analyzing further comprising:

determining whether an existing data usage template that corresponds to the respective format is stored in memory on the client
device;

in accordance with a determination that an existing data usage template corresponding to the respective format is stored in
memory on the client device, using the existing data usage template as the data usage template corresponding to the respective
format; and

in accordance with a determination that no existing data usage template corresponding to the respective format is stored in
memory on the client device, generating the data usage template corresponding to the respective format;

receiving a second message that includes a second data usage value, wherein the second message is formatted according to the
respective format; and

parsing the second message according to the data usage template so as to obtain the second data usage value;
wherein generating the data usage template corresponding to the respective format comprises:
identifying a string within the first message that indicates the presence of the first data usage value;
acquiring a location of the string within the first message; and
identifying within the string one or more of the group consisting of: a template prefix, a template suffix, a template unit
and a template type;

wherein the template prefix is a first portion of the string that is located before the data usage value, the template suffix
is a second portion of the string that is located after the data usage value, the template unit is a unit of measurement by
which the data usage value is measured, and the template type comprises one of: an amount of data remaining, an amount of
data used, and a total amount of data.

US Pat. No. 9,355,244

SYSTEMS AND METHODS FOR PASSWORD RESET

Tencent Technology (Shenz...

7. A system for password reset, comprising:
a first server comprising one or more data microprocessors; and
one or more non-transitory computer-readable storage media encoded with instructions for commanding the one or more data microprocessors
of the first server to execute operations including:

receiving, by the first server, a request operation instruction from a user terminal, wherein the request operation instruction
is associated with a payment and includes account information of an account and identity information;

determining, by the first server in response to receiving the request operation instruction, whether to permit password reset
for the account indicated by the account information;

in response to the password reset for the account being permitted, authenticating, by the first server, the account information
and the identity information based on determining whether the identity information matches pre-stored identity information
associated with the first account;

in response to the authentication of the account information and the identity information being successful,
processing, by the first server, the request operation instruction, wherein processing the request operation instruction comprises
sending, by the first server, a password reset prompt to the user terminal;

receiving password information set by the user terminal in response to the password reset prompt after the user terminal receives
the password reset prompt; and

sending to a second server a password reset request that carries the password information so that the server responds to the
password reset request and sets a new password for the account according to the password information;

in response to the password reset for the account being forbidden, authenticating, by the first server, the account information
and the identity information; and

in response to the authentication of the account information and the identity information being successful, performing the
processing, by the first server, of the request operation instruction.

US Pat. No. 9,355,637

METHOD AND APPARATUS FOR PERFORMING SPEECH KEYWORD RETRIEVAL

Tencent Technology (Shenz...

1. A method for retrieving keyword from speech, comprising:
configuring, by an apparatus comprising a processor circuitry, language models, wherein at least two of the language models
each comprises a recognition model and a decoding model that corresponds to the recognition model;

extracting a speech feature, by the apparatus, from to-be-processed speech data;
determining, by the apparatus, which of the recognition models has a highest language matching rate by performing, using the
recognition models, language matching on the extracted speech feature;

identifying, by the apparatus, the decoding model which corresponds to the determined recognition model;
decoding, by the apparatus, the extracted speech feature by using the identified decoding model, and obtaining a word recognition
result; and

matching, by the apparatus, a keyword in a keyword dictionary and the word recognition result with each other, and outputting
a matched keyword on a display of the apparatus.

US Pat. No. 9,237,210

INTERNET ACCESS METHOD, TERMINAL AND STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. A terminal, comprising:
at least one processor;
at least one memory, the memory comprising a webpage access-request module, a domain access failure management module, and
a webpage access-request processing module, wherein

the webpage access-request module is configured to transmit a first webpage access-request to a second server via a first
server, the first webpage access-request comprising address information of a webpage to be accessed;

the domain access failure management module is configured to package the address information of a webpage to be accessed into
a second webpage access-request whose destination address is an address of a proxy server when the terminal confirms the webpage
access has failed and transmit the second webpage access-request to the second server via the first server and the proxy server;
and

the webpage access-request processing module is configured to receive a by the second server via the proxy server and the
first server and present the returned webpage content,

wherein,
the domain access failure management module is further configured to store the domain information of destination website included
in the first webpage access-request after the first webpage access-request is transmitted through a direct connection way
and a prompt message that a service is not available is received;

the webpage access-request processing module is further configured to, when the first webpage access-request is issued, query
whether or not the domain access failure management module stores domain information corresponding to the first webpage access-request,
and if the domain access failure management module stores the domain information, the webpage access-request processing module
packages the address information of the webpage to be accessed into the second webpage access-request whose destination address
is the address of the proxy server; otherwise, the webpage access-request processing module packages the address information
of the webpage to be accessed, as destination address information, into the first webpage access-request.

US Pat. No. 9,256,421

METHOD, DEVICE AND TERMINAL FOR IMPROVING RUNNING SPEED OF APPLICATION

TENCENT TECHNOLOGY (SHENZ...

1. A method for improving running speed of an application, comprising:
running an application stored in a terminal;
collecting local data information corresponding to a missing-page interruption of running the application, wherein the local
data information comprises a name of a file in which local data is contained, an offset of the local data in the file and
a size of the local data; and

acquiring the local data according to the local data information, and loading the local data after an instruction to improve
the running speed of the application is acquired;

wherein the acquiring the local data according to the local data information comprises:
parsing the local data information to obtain the name of the file in which the local data is contained, the offset of the
local data in the file and the size of the local data;

aggregating the local data information according to the name of the file in which the local data is contained;
merging the aggregated local data information if a distance between offsets of the local data information is within a preset
range, and selecting local data information meeting a prefetch condition from the merged local data information as prefetch
data information; and

acquiring the local data according to the selected prefetch data information.

US Pat. No. 9,177,131

USER AUTHENTICATION METHOD AND APPARATUS BASED ON AUDIO AND VIDEO DATA

TENCENT TECHNOLOGY (SHENZ...

1. A computer-implemented method, comprising:
at a server having one or more processors and memory storing programs executed by the one or more processors:
receiving a login request from a mobile device, the login request including video data and audio data;
extracting a group of facial features from the video data;
extracting a group of audio features from the audio data and recognizing a sequence of words in the audio data;
identifying, in a user account database, a first user account whose respective facial features match the group of facial features
according to first predefined criteria;

identifying, in the user account database, a second user account whose respective audio features match the group of audio
features according to second predefined criteria;

if the first user account is the same as the second user account:
comparing the recognized sequence of words with a predefined sequence of words associated with the first user account;
authenticating the login request if the recognized sequence of words matches the predefined sequence of words according to
third predefined criteria; and

if the recognized sequence of words does not match the predefined sequence of words according to the third predefined criteria,
returning a first response to the mobile device, indicative of the denial of the login request; and

if the first user account is different from the second user account:
returning a second response to the mobile device, indicative of the denial of the login request.

US Pat. No. 9,466,147

THREE-DIMENSIONAL PROJECTION BINDING POINT RENDERING METHOD AND DEVICE

TENCENT TECHNOLOGY (SHENZ...

1. A method for three-dimensional projection binding point rendering, comprising:
obtaining a 3D coordinate of a binding point on a three-dimensional character model, and calculating a 2D coordinate of the
binding point in a 2D picture which is projected in the same projection manner as the three-dimensional character model according
to the 3D coordinate of the binding point;

calculating a binding point coordinate for each frame of a 2D projection picture in a character animation series to obtain
all binding point coordinates corresponding to the character animation series;

judging the correct position of all the binding point coordinates in the character animation series and modifying a binding
point coordinate with incorrect position; and,

outputting all the binding point coordinates in a textual manner to obtain a binding point information text corresponding
to the character animation series.

US Pat. No. 9,208,049

METHOD AND DEVICE FOR MANAGING DESKTOP WITH AN ADDITIONAL MIRROR DESKTOP IN THE SAME OPERATION INTERFACE

TENCENT TECHNOLOGY (SHENZ...

1. A desktop management method, comprising:
acquiring desktop icons of an operation object desktop to generate a mirror desktop;
adjusting the desktop icons of the mirror desktop according to the desktop icons of the operation object desktop to make the
desktop icons of the mirror desktop the same as the operation object desktop thereof;

displaying the desktop icons of the adjusted mirror desktop according to an arranging manner for a saved mirror desktop, the
desktop icons of the adjusted mirror desktop being displayed in accordance with a saved arrangement manner of the mirror desktop
without affecting an original arrangement mode of the operation object desktop;

monitoring the operation object desktop to edit the mirror desktop according to an adding, deleting or modifying operation
occurred on the operation object desktop; and

monitoring the mirror desktop to edit the operation object desktop according to an adding, deleting or modifying operation
occurred on the mirror desktop,

wherein the desktop icons of the operation object desktop are acquired by an application program interface (API) of the operation
object desktop and the desktop icons of the mirror desktop are the same as the desktop icons of the operation object desktop;
and

wherein the step of monitoring the operation object desktop to edit the mirror desktop according to an adding, deleting or
modifying operation occurred on the operation object desktop comprises monitoring a failure of the adding, deleting or modifying
operation on the operation object desktop; and stopping editing the mirror desktop in response to the failure.

US Pat. No. 9,179,312

REGISTRATION AND LOGIN METHOD AND MOBILE TERMINAL

TENCENT TECHNOLOGY (SHENZ...

1. A registration and login method executed by a mobile terminal, comprising steps of:
the mobile terminal acquiring a mobile phone number of the mobile terminal through a server in response to a registration
operation of a user, and encrypting the mobile phone number into a register file stored in the mobile terminal;

inputting the mobile phone number as a username to register to the server; and
acquiring the mobile phone number from the register file in response to a login operation and logging into the server by using
the mobile phone number as the username;

wherein the step of acquiring the mobile phone number of the mobile terminal through the server comprises:
the mobile terminal sending a default message to the server in response to the registration operation if the mobile terminal
judges that no register file is stored in the mobile terminal, to enable the server to acquire the mobile phone number of
the mobile terminal after receiving the default message; and

receiving a reply message from the server and acquires the mobile phone number in the reply message.

US Pat. No. 9,465,466

METHOD AND APPARATUS FOR SENSING GESTURE TOWARD TOUCH INPUT DEVICE

Tencent Technology (Shenz...

1. A method for sensing a gesture towards a touch input device, the method comprising:
detecting, by each of a plurality of heat sensing spots on the touch input device, a heat intensity from a finger, wherein
the finger is not in contact with the touch input device, and the heat intensity is detected at a variable frequency by a
heat sensing spot of the plurality of heat sensing spots, wherein the variable frequency for the detecting is associated with
a distance of the finger from the heat sensing spot;

calculating, by a processor, a distance of the finger from each of the plurality of heat sensing spots, based on the heat
intensity detected by each of the heat sensing spots;

determining, by the processor, a shortest distance among the calculated distances by comparing the calculated distances;
identifying, by the processor, the gesture of the finger toward the touch input device, in response to the shortest distance
being less than a predetermined distance threshold,

comparing, by the processor, a first distance of the finger from a first heat sensing spot with a second distance threshold;
increasing, by the processor, the variable frequency of the first heat sensing spot in response to the distance of the finger
from the first heat sensing spot being less than the second distance threshold; and

decreasing, by the processor, the variable frequency of the first heat sensing spot in response to the distance of the finger
from the first heat sensing spot being greater than the second distance threshold.

US Pat. No. 9,323,685

DATA STORAGE SPACE PROCESSING METHOD AND PROCESSING SYSTEM, AND DATA STORAGE SERVER

Tencent Technology (Shenz...

1. A data storage space processing method, comprising:
dividing a disk and memory resource into tablets;
dividing memory space of each tablet into different logical objects; and
dividing, according to a fixed size, disk space of each tablet into multiple data blocks that are of a same size; wherein
the logical objects obtained by dividing the memory space of the tablet comprise: a record index cache, a write cache, and
a block cache; the record index cache is used to store index information of a record; the write cache is used to record a
write buffer; and the block cache is formed by a block structure descriptor and used to collect statistics on block status
information;

the record index cache comprises a bucket index and a large record index; the large record index is used for a record larger
than a set record size threshold, and in the large record index, an independent index is used for the record larger than the
set record size threshold; and the bucket index is used for a record smaller than the set record size threshold, and a bucket
is packetized into the record smaller than the set record size threshold and stored;

the data storage space processing method comprises record reading, record modifying, block write combining, and block recycling,
and the block write combining comprises: obtaining a record from the write cache every preset time interval; for each record,
reading a keyword cache and the disk, and determining a record write scenario; collecting statistics on a result set, and
determining whether written data is able to form one data block; if the written data is able to form one data block, sorting
out a record in the result set to form one data block; and if the written data is not able to form one data block, continuing
processing a remaining record.

US Pat. No. 9,591,622

CHANNEL ASSIGNMENT, ACQUISITION METHOD AND APPARATUS

TENCENT TECHNOLOGY (SHENZ...

1. A channel assignment method, the method comprising:
at a multi-channel sharing system that is communicatively coupled to a plurality of customer premise equipments:
selecting at least one idle channel from idle channels of the multi-channel sharing system as a control channel;
sending an idle signal to the control channel, the idle signal identifying that the control channel is a control channel for
a customer premise equipment (CPE) to be positioned therein in a preset positioning manner; and

upon receipt of a communication request from a CPE positioned to the control channel, assigning the control channel to the
CPE, the assigning further comprising:

when the communication request is a called request:
sending a selective call signal to the control channel;
matching the selective call signal with the CPE positioned to the control channel;
receiving an acknowledgement signal returned by the CPE after successful matching; and
assigning the control channel to the CPE that returns the acknowledgement signal; and
when the communication request is a calling request sent by the CPE positioned to the control channel, assigning the control
channel to the CPE that sends the calling request.

US Pat. No. 9,491,225

OFFLINE DOWNLOAD METHOD AND SYSTEM

TENCENT TECHNOLOGY (SHENZ...

1. An offline download method adapted to be used with an offline download system comprising a cloud storage storing pre-downloaded
files, the offline download method comprising steps of:
receiving an offline download request for a requested file from a client,
selecting at least one substitute file from the pre-downloaded files stored in the cloud storage when the requested file is
not found m the cloud storage, wherein the at least one substitute file is determined to be similar to the requested file
according to a similarity between the at least one substitute file and the requested file,

sending first information comprising at least one filename of the at least one substitute file and at least one associated
download link to the cloud storage, and

the client downloading one of the at least one substitute file from the cloud storage by connecting to the at least one associated
download link.

US Pat. No. 9,414,162

SYSTEMS AND METHODS FOR ECHO REDUCTION

Tencent Technology (Shenz...

1. A method for echo reduction, the method comprising:
obtaining first audio data associated with a current time unit generated by an audio-acquisition device of a receiver based
on at least information associated with a first audio signal acquired by the audio-acquisition device and a second audio signal
output from an audio-playback device of the receiver, the second audio signal being output from the audio-playback device
of the receiver based on at least information associated with second audio data transmitted previously by a sender before
the current time unit;

obtaining third audio data transmitted by the sender during a second time unit preceding the current time unit;
obtaining fourth audio data by performing echo reduction on the first audio data based on at least information associated
with the third audio data; and

in response to a residue-echo coefficient associated with the current time unit being larger than a predetermined threshold,
obtaining fifth audio data generated by the audio-acquisition device of the receiver during a next time unit;
obtaining sixth audio data associated with a third time unit from a circular queue for remote-audio-frame-similarity-alignment-and-computation,
the sixth audio data having a largest degree of similarity with the fifth audio data; and

using a position of the sixth audio data in the circular queue for remote-audio-frame-similarity-alignment-and-computation
as a remote-input position of an echo-reduction algorithm;

wherein the obtaining fourth audio data by performing echo reduction on the first audio data based on at least information
associated with the third audio data includes: obtaining the fourth audio data by performing echo reduction through the echo-reduction
algorithm on the first audio data based on at least information associated with the third audio data.

US Pat. No. 9,489,248

METHOD, APPARATUS AND SYSTEM FOR ACQUIRING INPUT EVENTS

TENCENT TECHNOLOGY (SHENZ...

1. A method for acquiring an input event in a computer system comprising different priorities for processes, the method comprising:
executing a servant process and a master process, including:
initiating an installation program with a high priority;
displaying a prompt window for a user of the computer system to set the high priority of the installation program;
installing the servant process through the installation program;
setting, by the installation program, a priority of the servant process to be higher than the priority of the master process;
and

after the installation is complete and when the master process determines to initiate the servant process, executing the servant
process;

setting up an input event list in the servant process; and
upon the servant process acquiring an input event and determining that the input event is in the input event list, the servant
process transmitting the input event to the master process.

US Pat. No. 9,466,315

SYSTEM AND METHOD FOR CALCULATING SIMILARITY OF AUDIO FILE

Tencent Technology (Shenz...

1. A method for calculating a similarity of audio files, comprising:
constituting a pitch sequence of a first audio file and a pitch sequence of a second audio file;
calculating an eigenvector of the first audio file according to the pitch sequence of the first audio file, which comprises:
calculating characteristic parameters of the first audio file according to the pitch sequence of the first audio file; storing
the characteristic parameters of the first audio file in the form of an array, to generate the eigenvector of the first audio
file; and calculating an eigenvector of the second audio file according to the pitch sequence of the second audio file, which
comprises: calculating characteristic parameters of the second audio file according to the pitch sequence of the second audio
file; storing the characteristic parameters of the second audio file in the form of an array, to generate the eigenvector
of the second audio file; wherein, the characteristic parameters comprise at least one of a proportion of the pitch ascending,
a proportion of the pitch descending, an average rate of the pitch ascending, and an average rate of the pitch descending;
and

calculating a similarity between the first audio file and the second audio file according to the eigenvector of the first
audio file and the eigenvector of the second audio file.

US Pat. No. 9,357,027

DATA PROCESSING METHOD AND SYSTEM

TENCENT TECHNOLOGY (SHENZ...

1. A data processing method, the method comprising:
receiving, by a data buffering layer, an operation request of a follower of a user, having a long relation chain, of a client,
and pushing the operation request to a service layer;

receiving, by the service layer, the operation request pushed by the data buffering layer, and caching the operation request
according to a minimum storage unit, the minimum storage unit being divided by using the user having a long relation chain
as a unit; and

finding, by the service layer according to a preset routing configuration when data cached in the minimum storage unit reaches
a preset condition, a specified database that belongs to the user having a long relation chain, and performing an operation
on the specified database according to the operation request;

wherein the pushing the operation request to a service layer comprises:
calculating, by the data buffering layer, a minimum operating unit of the user having a long relation chain, and routing the
operation request to the minimum operating unit of the service layer;

wherein the receiving, by the service layer, the operation request pushed by the data buffering layer, and caching the operation
request according to a minimum storage unit comprises:

receiving, by a receiving process at the service layer, the operation request pushed by the data buffering layer, and caching
a log of the operation request to the minimum operating unit; and

reading, by a storage process at the service layer, the minimum operating unit to obtain the operation request in the minimum
operating unit, calculating the minimum storage unit of the operation request, and caching the operation request to the minimum
storage unit.

US Pat. No. 9,330,075

METHOD AND APPARATUS FOR IDENTIFYING GARBAGE TEMPLATE ARTICLE

Tencent Technology (Shenz...

1. A method for identifying garbage template article, comprising:
extracting, by a processor, a feature from an eligible microblog article to generate an article feature, wherein the article
feature comprises at least a punctuation feature, a topic feature, a bracket feature, a link feature and an account name feature;

acquiring, by the processor, a garbage template list which comprises garbage template feature, the garbage template feature
being an article feature whose frequency reaches a preset threshold, and the way to extract the garbage template feature being
the same as the way to extract the article feature; and

identifying, by the processor, the microblog article as a garbage template article when the article feature is the same as
the garbage template feature in the garbage template list,

wherein the eligible microblog article is a microblog article which is in an original form and contains link and picture,
and before extracting a feature, by the processor, from an eligible microblog article, the method further comprises:

removing, by the processor, numbers and letters from the eligible microblog article, and removing the contents in various
brackets from the microblog article while retaining the brackets;

wherein extracting, by the processor, a feature from the eligible microblog article comprises:
segmenting, by the processor, the eligible microblog article with punctuations to generate segment numbers in order;
extracting, by the processor, the punctuation of each segment, using the extracted punctuations to constitute a string, and
generating the punctuation feature;

extracting, by the processor, the topic and the corresponding segment number of the segment which has a topic for each segment,
using the extracted topics and segment numbers to constitute a string, and generating the topic feature;

extracting, by the processor, the segment number and the corresponding type of brackets of the segment which has brackets
for each segment, using the extracted segment numbers and type of brackets to constitute a string, and generating the bracket
feature;

generating, by the processor, a sequence as the link feature according to whether there is a link in each segment; and
generating, by the processor, a sequence as the account name feature according to whether there is an account name identity
in each segment.

US Pat. No. 9,317,280

METHOD, EQUIPMENT AND SYSTEM OF INCREMENTAL UPDATE

Tencent Technology (Shenz...

1. A method for updating software, comprising:
unpacking, by a device with one or more processors, a new version installation package of the software to get a new version
unpacked folder having at least one new version unpacked file;

obtaining, by the device, header file information of the at least one new version unpacked file in the new version unpacked
folder, and converting a format of the header file information of the at least one new version unpacked file and getting a
new version convert folder, wherein the header file information comprises a file length, a file name length, a calibration
value, a file name and data content in a second preset format;

extracting, by the device, the file length, the file name length, the calibration value, the file name and the data content
from the header file information; and

converting, by the device, the file length, the file name length, the calibration value, the file name and that data content
that are extracted from the second preset format to a first preset format;

packing, by the device, the new version convert folder to a new version archive package and obtaining at least one historical
version archive package;

according to the new version archive package and the at least one historical version archive package, generating and obtaining,
by the device, at least one differential file; and

releasing, by the device, the at least one differential file wherein the at least one differential file that is released is
selected by a client that has memory and at least one processor to download and form a second new version installation package
according to the at least one differential file that is downloaded.

US Pat. No. 9,300,700

METHOD AND TERMINAL FOR EDITING INFORMATION IN SOCIAL NETWORK SERVICE APPLICATIONS

TENCENT TECHNOLOGY (SHENZ...

1. A social network service (“SNS”) application information editing method comprising:
sending a multimedia information obtaining command from a command terminal to an execution terminal associated with the command
terminal when the command terminal is executing an editing operation in an editing area of the SNS application;

obtaining multimedia information by the execution terminal in accordance with the multimedia information obtaining command;
sending the multimedia information from the execution terminal to the command terminal;
and entering the multimedia information into the editing area of the SNS application by the command terminal;
wherein obtaining the multimedia information by the execution terminal in accordance with the multimedia information obtaining
command and sending the multimedia information from the execution terminal to the command terminal comprise:

starting a recording application in the execution terminal by the execution terminal to execute a recording operation in accordance
with the multimedia information obtaining command;

obtaining by the execution terminal multimedia information currently being recorded;
sending the multimedia information currently being recorded from the execution terminal to the command terminal;
sending notification that recording is complete from the execution terminal to the command terminal when the execution terminal
detects that the recording is complete;

receiving and caching by the command terminal the multimedia information sent from the execution terminal;
and combining the cached multimedia information by the command terminal when the command terminal receives the notification
that the recording is complete sent from the execution terminal, thereby generating complete multimedia information;

wherein the recording application comprises at least one application selected from a group consisting of:
an audio recording application, a video recording application, and a camera shooting application;
and the multimedia information comprises at least one type of information selected from a group consisting of: audio information,
image information, and video information.

US Pat. No. 9,258,378

METHOD AND DEVICE FOR PUSHING INFORMATION

TENCENT TECHNOLOGY (SHENZ...

12. A storage medium, storing machine readable instructions, wherein the machine readable instructions are executable by a
processor to perform a method for pushing information, the method comprises:
obtaining a currently updated message in an information source;
determining whether the currently updated message is a message meeting a preconfigured condition; wherein the message meeting
the preconfigured condition is a message including an identifier of a third party cooperating with the information source
or is a message from the third party;

if the currently updated message is not a message meeting the preconfigured condition, discarding the currently updated message;
if the currently updated message is a message meeting the preconfigured condition,
obtaining the message meeting the preconfigured condition in the currently updated message;
determining whether the message meeting the preconfigured condition is a non-subject message or a subject message; wherein
if the message meeting the preconfigured condition is a non-subject message, obtaining user information and a subject message
which are correlated with the non-subject message from a server, pushing contents or an identifier or a link corresponding
to the non-subject message, the correlated user information and the subject message to the third party; and

if the message meeting the preconfigured condition is a subject message, obtaining user information correlated with the subject
message, pushing the subject message and the correlated user information to the third party.

US Pat. No. 9,064,349

COMPUTER-IMPLEMENTED IMAGE COMPOSITION METHOD AND APPARATUS USING THE SAME

TENCENT TECHNOLOGY (SHENZ...

1. A computer-implemented image composition method for compositing sequential images, comprising:
process A of: receiving a first image composition instruction from a user, by a receiving module having a processor, the first
image composition instruction comprising an image identifier of a base image and information on a pre-specified modification
area, wherein the image identifier of the base image indicating the base image selected from a plurality of sequential images;

process B of: selecting a second image from the plurality of sequential images other than the base image, and if the selection
fails, ending the image composition, otherwise, replacing the content of the pre-specified modification area in the base image
with the content in a corresponding pre-specified modification area of the second image, and outputting the base image after
the replacement;

process C of: receiving a second operation instruction from a user, and if the second operation instruction is a non-ACK instruction,
returning to the process B, but if the second operation instruction is a ACK instruction, saving the base image after the
replacement.

US Pat. No. 9,411,849

METHOD, SYSTEM AND COMPUTER STORAGE MEDIUM FOR VISUAL SEARCHING BASED ON CLOUD SERVICE

TENCENT TECHNOLOGY (SHENZ...

1. A method for visual searching based on cloud service, comprising:
receiving, from a client, an image recognition request of cloud service, the request containing image data;
forwarding, according to a set classified forwarding rule, the image data to a corresponding classified visual search service,
wherein the forwarding comprises: detecting classified type information contained in the image data, and forwarding the image
data to the classified visual search service corresponding to the detected image data;

detecting, by the respective corresponding classified visual search service, whether the image data contains the corresponding
classified type information; if yes, detect the position information of the classified type information in the image data,
and recognize according to the position information a corresponding name;

recognizing, by the respective corresponding classified visual search services, the corresponding classified type information
in the image data, and determining the corresponding name of the image data in accordance with the respective classified type
information;

obtaining a classified visual search result, the result including the classified type information and the corresponding name;
and

summarizing and sending, to the client, the classified visual search result of the corresponding classified visual search
service.

US Pat. No. 9,286,858

HIT TESTING METHOD AND APPARATUS

TENCENT TECHNOLOGY (SHENZ...

1. A hit testing method to identify a hit on an object displayed on a screen of a computing device, the method comprising:
replacing color values of pixels of objects displayed on the screen with corresponding identifier (ID) values of the objects;
storing the ID values in a bitmap array, wherein each element of the bitmap array corresponds to a plurality of pixels of
a respective object;

in response to capturing a hit event, acquiring a hit coordinate on the screen corresponding to the hit event;
determining a bitmap array element corresponding to the hit coordinate; and
identifying an object related to the hit event, according to the ID value associated with the bitmap array element,
wherein the steps of replacing color values of pixels of objects displayed on the screen with corresponding ID values of the
objects and storing the ID values in a bitmap array further comprise:

replacing color values of pixels of an object to be the identifier (ID) value of the object;
disabling at least one color characteristic rendering attribute of the pixels of the object;
storing the ID value of the pixels in the bitmap array; and
initiating only processes related to alpha channel operation during texture mapping to prevent the ID value of the object
from being modified.

US Pat. No. 10,111,263

METHOD AND SYSTEM FOR NETWORK INTERCONNECTION BETWEEN DEVICES

Tencent Technology (Shenz...

1. A method for network interconnection between devices comprising:establishing a connection between a current device and a remote device in at least one preset connection manner;
parsing operation data obtained by collection to obtain event information triggered in the current device, wherein the operation data is generated by an operation triggered in the current device; and
synchronizing the event information to the remote device via the established connection, so as to synchronize the operation triggered in the current device to the remote device;
wherein for the at least one preset connection manner comprising a direct device connection, the establishing a connection between a current device and a remote device in at least one preset connection manner comprises:
obtaining remote devices matching the current device according to the Simple Service Discovery Protocol (SSDP), and enumerating the remote devices matching the current device; and
directly connecting, according to a triggered device selection instruction, the current device and a remote device corresponding to the device selection instruction;
wherein for the at least one preset connection manner comprising an intranet penetration manner, the establishing a connection between a current device and a remote device in at least one preset connection manner comprises:
determining whether the current device is successfully connected to the remote device via the direct device connection, and if not,
initiating an intranet penetration request to a device server, so as to perform intranet penetration by using the device server, to establish a connection with the remote device;
wherein for the at least one preset connection manner comprising background transfer, the establishing a connection between a current device and a remote device in at least one preset connection manner comprises:
determining whether the intranet penetration succeeds, and if not,
scanning bar code information generated in the remote device, to obtain an identifier of the remote device, wherein the bar code information is generated by the remote device and registered to the device server; and
packing the identifier of the remote device and an identifier of the current device to obtain a connection request packet, and sending the connection request packet to the device server, so as to establish a communication forwarding channel between the current device and the remote device.

US Pat. No. 9,485,193

METHOD AND APPARATUS FOR ALLOCATING NETWORK MEDIUM DATA RESOURCES

TENCENT TECHNOLOGY (SHENZ...

1. A method of allocating network medium data resources, comprising:
at an apparatus having one or more processors and memory for storing programs to be executed by the one or more processors:
receiving and storing a set of virtual requests for the network medium data resources, each virtual request from the set of
virtual requests including a requested resource usage time range and at least one requested resource volume, the requested
resource usage time range including a plurality of unit time periods;

receiving an instruction selecting a virtual request from the set of virtual requests;
identifying a set of requests that have conflicts with the selected virtual request, the set of conflicting requests including
at least one virtual request from the set of virtual requests and at least one actual request from a set of existing actual
requests for the network medium data resources, each actual request from the set of existing actual requests including an
actual resource usage time range and at least one actual resource volume reserved for that actual request;

calculating, based on existing information of the network medium data resources and the identified set of conflicting requests,
a maximum allocatable resource volume for each unit time period within the requested resource usage time range for the selected
virtual request; and

determining, based on the calculated maximum allocatable resource volumes and the selected virtual request, an allocatable
resource volume for each unit time period within the requested resource usage time range for the selected virtual request.

US Pat. No. 9,454,467

METHOD AND APPARATUS FOR MINING TEST COVERAGE DATA

TENCENT TECHNOLOGY (SHENZ...

1. A computer-implemented method of mining test coverage data, comprising:
at a device having one or more processors and memory:
sequentially generating a plurality of coverage data files by executing a program using a respective test input of a plurality
of test inputs, wherein the program includes a plurality of code blocks, each code block being either executed as a whole
or not executed at all during the execution of the program;

after generating the plurality of coverage data files, processing a current coverage data file by extracting respective execution
counter data from the current coverage data file, wherein each code block has a counter for recording execution counter value
associated with the code block and the execution counter values associated with the plurality of code blocks collectively
form a counter value list;

after processing the current coverage data file, determining whether the respective execution counter data from a current
counter value list extracted from the current coverage data file includes a predetermined change relative to the respective
execution counter data from a previous counter value list extracted from previously processed coverage data files, further
comprising:

determining whether the respective test input used to generate the current coverage data file has caused a respective counter
for at least one code block in the program to change; and

in response to detecting the predetermined change for the current coverage data file:
including the respective test input used to generate the current coverage data file in a test input collection for testing
the program; and

updating the counter value list with the respective execution counter data extracted from the current coverage data file.

US Pat. No. 9,451,014

ACROSS-APPLICATION NETWORK COMMUNICATION METHOD AND DEVICE

TENCENT TECHNOLOGY (SHENZ...

1. An across-application network communication method, comprising:
loading and starting a plug-in module of a local application, and sending, by the plug-in module of the local application,
account information of a user to a server of an opposite application;

verifying, by a server of the opposite application, the user according to the account information of the user, and when the
verification is passed, allowing the plug-in module of the local application to obtain information of the user in the opposite
application; and

obtaining, by the plug-in module of the local application, the information of the user in the opposite application;
wherein when the local application and the opposite application belong to different account systems, the sending, by the plug-in
module of the local application, the account information of the user to the server of the opposite application comprises:

determining, by the plug-in module of the local application, whether a relationship between the account information of the
user in the local application and account information of the user in the opposite application is stored locally; if the relationship
is stored locally, obtaining the account information of the user in the opposite application according to the account information
of the user in the local application and the relationship, and sending the account information of the user in the opposite
application to the server of the opposite application; if the relationship is not stored locally, prompting the user to input
the account information of the user in the opposite application, receiving the account information of the user in the opposite
application that is inputted by the user, and sending the account information of the user in the opposite application to the
server of the opposite application.

US Pat. No. 9,442,897

SCREENSHOT METHOD AND DEVICE

TENCENT TECHNOLOGY (SHENZ...

1. A screenshot method, comprising:
after target software starts, determining whether a module with an image display function has been loaded by the target software;
when determining that the module with the image display function has been loaded by the target software, injecting a global
hook into the module with the image displaying function; and

after receiving a screenshot instruction, executing a screenshot with the global hook;
wherein after receiving the screenshot instruction, executing the screenshot with the global hook, comprises:
obtaining an image outputted by the module with the image display function by using the global hook, transmitting the image
to an Application Programming Interface (API), and displaying the image;

when receiving the screenshot instruction, intercepting the image obtained with the global hook.

US Pat. No. 9,395,785

METHOD AND DEVICE FOR CONTROLLING TERMINAL AND TERMINAL THEREOF

TENCENT TECHNOLOGY (SHENZ...

1. A method for controlling a terminal, comprising:
receiving and storing definitions of hardware operation modes, wherein each definition of hardware operation mode specifies
a preset relationship between hardware information of the terminal and hardware performance of the terminal;

receiving a user specification of a current hardware operation mode among the hardware operation modes;
checking hardware of the terminal to obtain current hardware information;
determining a hardware operation mode corresponding to the obtained current hardware information based on the preset relationship
between the hardware information of the terminal and the hardware performance of the terminal; and

in accordance with a determination that the user specified current hardware operation mode is inferior to the determined hardware
operation mode for optimizing the terminal's hardware performance, controlling the hardware of the terminal by performing
at least one of:

enabling the user to replace the user specified current hardware operation mode with the determined hardware operation mode
for the current hardware information such that the terminal achieves the hardware performance corresponding to the determined
hardware operation mode; and

recommending a list of currently running application programs for the user to adjust the current hardware information by closing
one or more of the recommended applications;

wherein the hardware comprises at least one of a central processing unit (CPU) and a graphic processing unit (GPU), and the
hardware information comprises at least one of voltage information and frequency information about the hardware.

US Pat. No. 9,378,724

METHOD AND SYSTEM FOR IMPLEMENTING NEAR FIELD COMMUNICATION

TENCENT TECHNOLOGY (SHENZ...

1. A method for implementing near field communication (NFC), the method comprising:
modulating a digital signal to generate an audio signal with a transmitting device by utilizing a binary frequency shift keying
(2FSK) modulation scheme;

playing the generated audio signal by the transmitting device;
receiving the audio signal by a receiving device;
sampling the audio signal by the receiving device, wherein a sampling frequency for sampling the audio signal by the receiving
device is 48 KHz, a channel number used by the receiving device is a single channel, and a quantization used by the receiving
device is an 8-bit quantization; and

demodulating the sampled audio signal for obtaining the digital signal by the receiving device, wherein a modulating frequency
of a binary bit “0” in the digital signal is set as 12 KHz, a modulating frequency of a binary bit “1” in the digital signal
is set as 16 KHz, and a modulating width is set to have 1000 sampling points in the 2FSK modulation scheme,

wherein the step of demodulating the sampled audio signal for obtaining the digital signal by the receiving device comprises:
transforming the sampled audio signal from a time domain signal to a frequency domain signal;
analyzing the sampled audio signal in the frequency domain by using 64 points as an analyzing period;
outputting “0” as an output result if a frequency of one point having a maximum power is closest to 12 KHz;
outputting “1” as an output result if a frequency of one point having a maximum power is closest to 16 KHz;
performing a statistical analysis on the output results by using a window with a length of 16 bits;
demodulating the digital signal as “1” if “1” in the output results within the windows occurs more;
demodulating the digital signal as “0” if “0” in the output results within the windows occurs more; and
shifting the window for continuing to performing the statistical analysis on the output results until obtaining the entire
digital signal.

US Pat. No. 9,330,310

METHODS AND DEVICES FOR OBTAINING CARD INFORMATION

TENCENT TECHNOLOGY (SHENZ...

1. A method of obtaining card information, comprising:
at a server system with one or more processors and memory:
obtaining, from a client device, a card image, wherein the card image includes an image of a card;
identifying a card configuration type corresponding to the card in the card image based on a database of stored card configuration
types, each stored card configuration type having associated layout information regarding respective features and information
regions for the stored card configuration type;

in accordance with the identified card configuration type, determining one or more information regions of the card image,
wherein the one or more information regions contain respective card information of the card;

extracting at least a portion of the card information of the card from the one or more information regions of the card image;
and

transmitting, to the client device, at least the extracted portion of the card information,
wherein identifying the card configuration type includes:
extracting a first set of features associated with the card from the card image, the first set of features including one or
more first tier features;

determining a first pool of one or more reference card configuration types from the database of stored card configuration
types that include the one or more first tier features associated with the card; and

in accordance with a determination that the first pool of one or more reference card configuration types includes only a first
reference card configuration type, identifying the first reference card configuration type as the card configuration type
corresponding to the card in the card image.

US Pat. No. 9,262,287

COMPUTER INFORMATION SYSTEM AND DYNAMIC DISASTER RECOVERY METHOD THEREFOR

TENCENT TECHNOLOGY (SHENZ...

1. A computer information system, comprising:
a core user experience service cluster, a user experience degradable service cluster, and a user experience ignorable service
cluster, each service cluster including at least two service nodes, wherein each service node includes service processing
logic for processing service requests corresponding to multiple service categories and is configured to process only service
requests of a specific service category associated with the service cluster; and

a dynamic disaster recovery node configured to set a respective dynamic disaster recovery policy for each service cluster
based on the specific service category associated with service cluster, and monitor the operating state of the service cluster;
wherein:

if the service cluster operates normally, the dynamic disaster recovery node is configured to schedule a service request of
the specific service category associated with the service cluster to the service cluster, and if the service cluster operates
abnormally, the dynamic disaster recovery node is configured to dynamically adjust the processing of the service request according
to the dynamic disaster recovery policy;

if the core user experience service cluster operates abnormally, evenly distributing at least a subset of the service requests
among the service nodes of the user experience degradable service cluster and the user experience ignorable service cluster;

if the user experience degradable service cluster operates abnormally, evenly distributing at least a subset of the service
requests among the service nodes of the user experience ignorable service cluster; and

if the user experience ignorable service cluster operates abnormally, updating the dynamic disaster recovery policy of the
user experience ignorable service cluster so as to drop at least a subset of the service requests.

US Pat. No. 9,165,338

METHOD, DEVICE AND COMPUTER-READABLE STORAGE MEDIUM FOR PANORAMIC IMAGE COMPLETION

Tencent Technology (Shenz...

1. A method for panoramic image completion comprising:
acquiring a panoramic image;
obtaining a projected image by mapping each pixel coordinate of the panoramic image onto a polar coordinate system, wherein
a long side component of the pixel coordinate corresponds to a polar angle of the polar coordinate system and a short side
component of the pixel coordinate corresponds to a radial coordinate of the polar coordinate system;

acquiring an incomplete region of the projected image;
obtaining a completed image by completing the incomplete region; and
obtaining a completed panoramic image by inverse mapping each pixel coordinate of the completed image according to the polar
coordinate system.

US Pat. No. 9,106,698

METHOD AND SERVER FOR INTELLIGENT CATEGORIZATION OF BOOKMARKS

TENCENT TECHNOLOGY (SHENZ...

1. A computer-implemented method for intelligent categorization of bookmarks, comprising executing on a processor the steps
of:
acquiring by the processor a bookmark link address requested for categorization by a client;
categorizing by the processor the bookmark link address requested for categorization; and
returning a categorization result as a bookmark category to the client,
wherein the categorizing the bookmark link address requested for categorization specifically comprises:
performing by the processor link address matching in a link library for the bookmark link address requested for categorization,
wherein the link library is comprised of preset link addresses, the preset link addresses being link addresses corresponding
to preset network address categories; and

if a link address in the link library matches the bookmark link address requested for categorization, using the network address
category corresponding to the matched link address as the categorization result,

wherein a keyword is preset for the network address category correspondingly, and after performing link address matching in
a link library for the bookmark link address requested for categorization, the computer-implemented method further comprises
executing on the processor the steps of:

if no link address in the link library matches the bookmark link address requested for categorization, extracting by the processor
key information from the Web page corresponding to the bookmark link address requested for categorization, and performing
by the processor word segmentation for the key information to generate a keyword; and

performing by the processor a similarity comparison between the generated keyword and the preset keyword corresponding to
each network address category, and using by the processor the network category corresponding to the preset keyword with the
largest similarity as the categorization result.

US Pat. No. 9,081,486

METHOD, DEVICE AND SYSTEM FOR ACQUIRING VIRTUAL KEYBOARD

TENCENT TECHNOLOGY (SHENZ...

1. A method for acquiring a virtual keyboard, comprising:
receiving, by a terminal, layout of a universal virtual keyboard, and a mapping relationship between terminals and universal
virtual keyboard key value mapping tables from a server, the universal virtual keyboard being a virtual keyboard with the
same layout when being displayed in any model of terminal;

acquiring, by the terminal, a universal virtual keyboard key value mapping table of a terminal according to an identifier
of the terminal and the mapping relationship between terminals and universal virtual keyboard key value mapping tables; and

generating, by the terminal, a universal virtual keyboard according to the layout of the universal virtual keyboard and the
universal virtual keyboard key value mapping table of the terminal.

US Pat. No. 9,064,113

PERFORMING VIRUS SCAN DURING DECOMPRESSION OF AN APPLICATION INSTALLATION PACKAGE

TENCENT TECHNOLOGY (SHENZ...

1. A computer-implemented method, comprising:
at a device having one or more processors and memory:
identifying respective uncompressed sub-portions of data embodied in an application installation package in accordance with
a predetermined threshold size established for each uncompressed sub-portion;

partially decompressing the application installation package to acquire corresponding decompressed data for one of the identified
respective uncompressed sub-portions at a time;

before acquiring the corresponding decompressed data of all of the respective uncompressed sub-portions of the data embodied
in the application installation package, checking the corresponding decompressed data of a first respective uncompressed sub-portion
of the data embodied in the application installation package according to virus samples in a virus feature library; and

concluding that the application installation package is a virus-infected file or rogue software in accordance with a determination
that the corresponding decompressed data of the first respective uncompressed sub-portion includes respective features of
at least one of the virus samples

wherein each of the virus samples includes a respective offset address and a respective virus signature,
wherein checking the corresponding decompressed data of the first respective sub-portion according to the virus samples in
the virus feature library further comprises:

acquiring, from the corresponding decompressed data of the first respective sub-portion, respective virus checking data, wherein
the respective virus checking data starts from an offset address corresponding to the respective offset address of a first
virus sample, and has a length equal to a respective length of a respective virus signature of the first virus sample;

making a comparison of the respective virus checking data with the respective virus signature of the first virus sample; and
determining that the respective decompressed data of the first respective sub-portion contains the first virus sample when
the virus checking data is consistent with the respective virus signature of the first virus sample, and

wherein the acquiring further comprise:
identifying, from among the respective uncompressed sub-portions of the data embodied in the application installation package,
a next uncompressed sub-portion for which virus checking has not been performed;

determining whether the corresponding decompressed data of the identified next uncompressed sub-portion has a length greater
than or equal to the respective length of the respective virus signature of the first virus sample, starting from the offset
address corresponding to the respective offset address of the first virus sample; and

in accordance with a determination that the corresponding decompressed data of the identified uncompressed sub-portion does
not have a sufficient length starting from the offset address corresponding to the respective offset address of the first
virus sample, acquiring, the virus checking data from the corresponding uncompressed data of at least one additional uncompressed
sub-portion for which virus checking has not been performed, wherein the virus checking data includes decompressed data corresponding
to all offset addresses between a starting offset address and an ending offset address, wherein the starting offset address
is the respective offset address of the first virus sample, and the ending offset address is an offset address formed by the
starting offset address plus the respective length of the respective virus signature of the first virus sample.

US Pat. No. 9,417,833

METHODS AND DEVICES FOR DATA TRANSFER

TENCENT TECHNOLOGY (SHENZ...

1. A method for data transfer from mobile terminals to a display device, the method comprising:
at the display device having one or more processors and memory storing programs executed by the one or more processors,
connecting to a server based on a device identifier corresponding to the display device, wherein the display device is uniquely
identified by the device identifier at the server and the display device connects to the server through a default connection
setup embedded in the device identifier, and the device identifier is a barcode encoding display device information corresponding
to the display device;

receiving communication requests from the server, wherein each communication request includes a terminal identifier of a respective
mobile terminal at the server and the terminal identifier is a barcode encoding terminal information corresponding to the
mobile terminal;

in response to the communication requests:
establishing communication channels between the display device and the mobile terminals through the server;
adding the terminal identifiers of the mobile terminals to a contact list of the display device; and
designating different regions of the display device as corresponding to the mobile terminals;
receiving digital content from one of the mobile terminals; and
displaying the digital content at a designated region of the display device associated with the corresponding mobile terminal.

US Pat. No. 9,369,401

METHOD, SERVER AND COMPUTER STORAGE MEDIUM FOR LOGGING IN

TENCENT TECHNOLOGY (SHENZ...

1. A method for logging in comprising:
by at least one server:
receiving a login request of a user from a client device, the login request including identification of the user, the identification
of the user including a control field indicating whether or not multiple body identifications of the user are permitted to
exist simultaneously;

assigning, according to the login request, a body identification corresponding to the identification of the user and indicating
that the user is logging in from the client device;

querying whether there exists at least one body identification, other than said assigned body identification, corresponding
to the identification of the user and indicating, respectively, that the user is currently logged in from at least one other
client device;

if said querying determines that at least one body identification, other than said assigned body identification, exists, and
the control field included in the identification of the user indicates that multiple body identifications of the user are
permitted to exist simultaneously,

passing the assigned body identification to each of said at least one other client device,
generating a success login message including the assigned body identification, and
returning the success login message including the assigned body identification to the client device from which the login request
of the user was received;

if said querying determines that at least one body identification, other than said assigned body identification, exists, and
the control field included in the identification of the user indicates that multiple body identifications of the user are
not permitted to exist simultaneously,

automatically logging out said at least one body identification, other than said assigned body identification, that exists,
generating a success login message that includes the assigned body identification, and
returning the success login message including the assigned body identification to the client device from which the login request
of the user was received.

US Pat. No. 9,351,165

IDENTITY VERIFYING METHOD, ACCOUNT ACQUIRING METHOD, AND MOBILE TERMINAL

Tencent Technology (Shenz...

1. An identity verifying method, comprising:
receiving, by a first mobile terminal, a user operation of accepting identity verification on the first mobile terminal,
playing, by the first mobile terminal, voice information which is stored in the first mobile terminal and has a correspondence
relationship with a user account of a user of the first mobile terminal,

collecting voice data of the played voice information using voice receiving means,
sending, by the first mobile terminal, verification information comprising the user account and the voice data to a server
for determining whether the user passes the identity verification according to the verification information, and

receiving, by the first mobile terminal, an identity verification result returned by the server.

US Pat. No. 9,351,174

METHOD AND SYSTEM FOR ACQUIRING LOCATION INFORMATION

TENCENT TECHNOLOGY (SHENZ...

1. A method for acquiring location information, comprising:
at a server having memory and one or more processors:
receiving a wireless positioning request initiated by a first client running on a client device, wherein the wireless positioning
request includes a user-specified positioning manner of a location of the first client to be implemented by a wireless communication
client running on a mobile terminal, a user identifier shared by the first client and the wireless communication client, and
a network address identifying the client device;

acquiring the user identifier and the network address from the wireless positioning request initiated by the first client;
generating a positioning instruction according to the user identifier and the network address a wireless positioning request
initiated by a first client;

pushing the positioning instruction to the wireless communication client corresponding to the first client, wherein the mobile
terminal is adjacent to the client device;

receiving, from the mobile terminal, location information obtained when the wireless communication client running on the mobile
terminal performs positioning according to the positioning instruction using the user-specified positioning manner;

sending the location information and a plurality of search results associated with the location information to the first client;
and

receiving a download request initiated by the first client, and sending geographic location service information corresponding
to the location information to the first client according to the download request.

US Pat. No. 9,348,906

METHOD AND SYSTEM FOR PERFORMING AN AUDIO INFORMATION COLLECTION AND QUERY

TENCENT TECHNOLOGY (SHENZ...

1. A method of performing an audio information query, comprising:
at an electronic device with one or more processors, memory, and a display:
detecting a first trigger event;
in response to detecting the first trigger event, collecting an audio sample of environmental audio data with a microphone
of the electronic device, wherein the environmental audio data is associated with a media item;

transmitting information corresponding to the audio sample to a server;
in response to transmitting the information corresponding to the audio sample to the server, obtaining attribute information
corresponding to the audio sample, wherein the attribute information includes metadata corresponding to the media item, a
time indicator corresponding to a position of the audio sample relative to the media item, and stream information associated
with the media item;

displaying at least a portion of the attribute information on the display;
detecting a second trigger event; and
in response to detecting the second trigger event:
determining a last obtained time indicator for the media item;
streaming the media item based on the stream information in the received attribute information; and
presenting the media item from the last obtained time indicator.

US Pat. No. 9,317,135

METHOD AND SYSTEM FOR TRIGGERING AND CONTROLLING HUMAN-COMPUTER INTERACTION OPERATING INSTRUCTIONS

TENCENT TECHNOLOGY (SHENZ...

1. A method for triggering and controlling a human-computer interaction operating instruction, the method comprising the steps
of:
pre-storing a mapping relationship between a display mode of a light source in at least one photograph image frame and a human-computer
interaction instruction, wherein the display mode of the light source in the photograph image frame is selected from a group
consisting of a predetermined region, a movement trace, a color and a flashing pulse;

acquiring the photograph image frame generated by a photographing device;
detecting the light source in the photograph image frame for analyzing the display mode of the detected light source in the
photograph image frame, wherein the step of detecting the light source in the photograph image frame for analyzing the display
mode further comprises the steps of:

constructing a grid coordinate system in the photograph image frame for continuously identifying the light source in the photograph
image frame, and computing a plurality of grid coordinates of the grid coordinate system of the light source in the photograph
image frame for generating the grid coordinates of the movement trace of the light source; and

determining the movement trace of the light source within the photograph image frame by calculating a plurality of grids associated
with the grid coordinates along a direction formed by the grids; and

determining the human-computer interaction instruction corresponding to the display mode of the detected light source in the
photograph image frame for triggering the human-computer interaction instruction based on the pre-stored mapping relationship.

US Pat. No. 9,288,250

MOBILE MULTIMEDIA REAL-TIME TRANSCODING SYSTEM, APPARATUS, STORAGE MEDIUM AND METHOD

TENCENT TECHNOLOGY (SHENZ...

1. A mobile multimedia real-time transcoding method, comprising:
receiving, by a server side, an offline downloading and transcoding task request for a multimedia resource submitted by a
client, wherein the offline downloading and transcoding task request comprises a target mobile device type selected by a user
or a user designated target format; and

performing, by the server side, an offline downloading and transcoding task of the multimedia resource following scheduling
and in a manner of performing offline downloading and transcoding in parallel according to the target mobile device type selected
by the user or the user designated target format carried in the offline downloading and forwarding task request submitted
by the client, and providing an obtained multimedia resource to the client, wherein the multimedia resource comprises data
slices, and wherein the server side maintains the multimedia resource transcoded according to a plurality of target mobile
device types or target formats to provide in response to receiving other requests for the multimedia resource that each comprise
a target mobile device or a user designated target format of the plurality of target mobile devices or user designated target
formats;

reporting, by an offline downloading and transcoding server cluster at the server side, basic configuration information and
load information of the offline downloading and transcoding server cluster to a task scheduling and managing server; and

the scheduling comprises: allocating, by the task scheduling and managing server, the offline scheduling and transcoding task
to the offline downloading and transcoding server cluster according to the basic configuration information and the load information
submitted by the offline downloading and transcoding server cluster,

wherein the offline downloading and transcoding server cluster comprises an offline downloading server cluster and a transcoding
server cluster respectively performing the offline downloading and the transcoding, wherein after one data slice is downloaded
by the offline downloading server cluster, the transcoding server cluster starts transcoding the data slice, and the transcoded
data slice is transmitted to a storage server, and

wherein the providing the obtained multimedia resource to the client comprises:
providing by the storage server the transcoded data slice to the client for play.

US Pat. No. 9,264,246

SYSTEM, METHOD AND CLIENT FOR JOINING IN GROUP

TENCENT TECHNOLOGY (SHENZ...

1. A group communication system, comprising a group server and a plurality of clients, wherein,
a first client among the plurality of clients generates a request for recommending a first user of the first client to be
added to a first group, receives characters of the first group inputted by the first user, and transmits to a second client
among the plurality of clients the characters of the first group and the request for recommending the first user to be added
to the first group;

the first client receives from a third client among the plurality of clients characters of a second group inputted by a second
user of the third client and a first request for recommending the second user to be added to the second group, searches for
the second group matching to the characters of the second group received from the third client, generates a second request
for recommending the second user to be added to the second group, and transmits to the group server the second request for
recommending the second user to be added to the second group, an identifier of the second group searched out and an identifier
of the second user; and

the group server receives the second request for recommending the second user to be added to the second group, the group server
searching for the identifier of the second group, and the identifier of the second user, and adds the second user to the second
group in response to the second request for recommending the second user to be added to the second group;

generates a request for recommending a third user of a fourth client to be added to a third group, wherein the third user
is selected to be recommended to be added to the third group by a local user;

transmits to the fourth client of the third user the request for recommending the third user to be added to the third group
and an identifier of the third group;

receives from a fifth client a first request for recommending the local user to be added to a fourth group and an identifier
of the fourth group, and determines whether to join in the fourth group; and,

generates a second request for recommending the local user to be added to the fourth group, transmitting to the group server
the second request for recommending the local user to be added to the fourth group, an identifier of the local user, and the
identifier of the fourth group.

US Pat. No. 9,197,481

CLOUD-BASED TRANSLATION METHOD AND SYSTEM FOR MOBILE CLIENT

TENCENT TECHNOLOGY (SHENZ...

1. A cloud-based translation method for a mobile client on a mobile terminal, comprising:
receiving, by the mobile client, a translation instruction;
sending, by the mobile client, translation request information to a cloud server based on the translation instruction, where
the translation request information includes text information and translation type information; and

receiving, by the mobile client, a translation result returned from the cloud server, wherein:
when the cloud server detects that the mobile terminal of the mobile client logins to an account with a preset communication
type, and a cloud glossary of the account contains a word entry corresponding to the text information, the cloud server returns
the translation result in the cloud glossary of the account corresponding to the word entry; and

when the cloud server detects that the mobile terminal does not login to the account with the preset communication type, or
when the cloud server detects that the mobile terminal logins to the account but the cloud glossary of the account does not
contain the word entry corresponding to the text information, the cloud server translates the text information based on the
translation request information to obtain and return the translation result.

US Pat. No. 9,088,559

SYSTEM AND METHOD FOR SHARING LOGIN STATUS BETWEEN AN APPLICATION PLATFORM AND AN APPLICATION

TENCENT TECHNOLOGY (SHENZ...

1. A computer-implemented method, comprising:
at a computer having one or more processors and memory storing programs executed by the one or more processors,
receiving a login request from a client device;
analyzing the login request to determine whether the login request is associated with an application platform at the client
device or an application at the client device, wherein the application is managed by the application platform;

if the login request is associated with the application platform:
establishing a first connection with an application platform server;
forwarding the login request to the application platform server;
receiving a login key from the application platform server; and
returning the login key to the client device, wherein the login key is associated with the application platform;
if the login request is associated with the application:
establishing a second connection with an application server, wherein the application server is distinct from the application
platform server;

forwarding the login request to the application server;
receiving a login key from the application server; and
returning the login key to the client device, wherein the login key is associated with the application,
wherein analyzing the login request further includes:
extracting a header from a data packet carrying the login request;
identifying a login request type bit in the header; and
determining whether the login request is associated with the application platform or the application in accordance with the
login request type bit, and

the data packet carrying the login request associated with the application platform is in the format of one or more text frames
and the data packet carrying the login request associated with the application is in the format of one or more binary frames.

US Pat. No. 9,930,705

MOBILE TERMINAL CONTROL METHOD, APPARATUS AND SYSTEM

TENCENT TECHNOLOGY (SHENZ...

1. A mobile terminal control method, comprising:acquiring, by a mobile terminal, root-privileged system permission of an operating system installed on the mobile terminal;
receiving, by the mobile terminal, a connection request from a remote control device via a server that is communicatively coupled to the mobile terminal and the remote control device, wherein the connection request is to establish a direct connection to the mobile terminal;
in response to receiving the connection request, providing, by the mobile terminal, authentication information to the server, wherein the server is configured to authenticate the connection request based on the authentication information; and
in accordance with a successful authentication of the connection request performed by the server:
establishing, by the mobile terminal, a connection to the remote control device, wherein the connection grants the remote control device the root-privileged system permission of the operating system installed on the mobile terminal;
receiving, by the mobile terminal, a hardware parameter request from the remote control device after the mobile terminal establishes the connection to the remote control device, the hardware parameter request being used for requesting the mobile terminal to send a hardware parameter of the mobile terminal to the remote control device, wherein the hardware parameter includes a screen resolution of the mobile terminal;
sending, by the mobile terminal, the hardware parameter to the remote control device on the basis of the hardware parameter request, wherein the remote control device receives the hardware parameter and generates a virtual screen of the mobile terminal on the basis of the hardware parameter, and the remote control device sends a remote control instruction to the mobile terminal by triggering the virtual screen, and wherein a resolution of the virtual screen of the mobile terminal is the same as the screen resolution of the mobile terminal;
receiving, by the mobile terminal, the remote control instruction from the remote control device, the remote control instruction being an instruction recognizable to the operating system of the mobile terminal, and the remote control instruction being used for remotely controlling the mobile terminal; and
recognizing, by the mobile terminal, the remote control instruction by using the operating system, and executing an operation corresponding to the remote control instruction on the basis of the root-privileged system permission.

US Pat. No. 9,473,427

METHOD AND SYSTEM FOR DELIVERING REMINDER INFORMATION

TENCENT TECHNOLOGY (SHENZ...

1. A method of automatically delivering reminder information to a user-designated terminal, comprising:
at a computer system having one or more processors and memory for storing one or more programs to be executed by the processors:
running a first application that provides a first service to query a reminder information table for a reminder entry submitted
by a first user using a first account associated with the first application from a first terminal remote from the server system,
the reminder entry including a delivery schedule and multiple delivery destinations;

forwarding the reminder entry from the first application to a second application in accordance with a data exchange protocol
between the first application and the second application, wherein the second application is distinct from the first application
and provides a second service that is distinct from the first service, and in accordance with the data exchange protocol,
the second application is configured to display the reminder entry as a communication received from a contact representing
the first application in accordance with the second service;

running the second application to choose a second terminal corresponding to one of the delivery destinations and, in accordance
with a second user logging into the second application using a second account distinct from the first account, deliver the
reminder entry to the second terminal in accordance with the delivery schedule, wherein the second terminal is distinct from
the first terminal;

checking whether there is a response from the second terminal, the response indicating an acknowledgement of receiving the
reminder entry by the second user at the second terminal;

in accordance with a determination that there is no response from the second terminal:
substituting the second terminal with a new terminal corresponding to another one of the delivery destinations in accordance
with the delivery schedule; and

repeating the delivery of the reminder entry to the new terminal until receiving a response from the new terminal.

US Pat. No. 9,454,613

METHOD AND SERVER FOR SEARCHING INFORMATION

Tencent Technology (Shenz...

1. A method of searching information, comprising:
performing a searching request based on a searching request including one or more query words from a user terminal and initially
ranking all the searched items;

evaluating the position clicks ratio of each ranking position with respect to the query words;
calculating a compensation factor of respective ranking position by dividing the evaluated position clicks ratio of each ranking
position by the evaluated position clicks ratio of the first ranking positions;

obtaining a ranking score of each initially ranked item by dividing the item clicks ratio of each initially ranked item by
the compensation factor corresponding to the ranking positions of the initially ranked item; and

re-ranking all the initially ranked items in descending order based on the ranking scores and then returning the re-ranked
items to the user terminal,

wherein said evaluating the position clicks ratio of each ranking position with respect to each query words includes:
selecting characteristics for evaluating the position clicks ratio of each ranking position with respect to the query word
and obtaining a characteristic value corresponding to the characteristics; and

evaluating, by using a machine learning method, the position clicks ratio of each ranking position with respect to the query
word based on the obtained characteristic value and history clicks action information of the respective ranking positions.

US Pat. No. 9,442,645

METHOD AND APPARATUS FOR LOCATING PLAYING PROGRESS OF FILE

TENCENT TECHNOLOGY (SHENZ...

1. A method for locating playing progress of a file, comprising:
monitoring a location of a slider on a bottom progress bar;
obtaining a first locating result according to the location of the slider on the bottom progress bar and a total length of
the file;

determining a progress adjustment range of an upper layer progress bar according to the first locating result; the first locating
result being within the progress adjustment range of the upper layer progress bar;

monitoring a location of a slider of the upper progress bar; and
determining playing progress of the file according to the location of the slider on the upper layer progress bar and the first
locating result;

wherein determining the progress adjustment range of the upper layer progress bar according to the first locating result comprises:
when a progress range between the first locating result and an end of the file is larger than or equal to a maximum adjustment
range of the upper layer progress bar,

configuring the first locating result as a starting point of the progress adjustment range of the upper layer progress bar,
and

determining an end point of the progress adjustment range of the upper layer progress bar according to the maximum adjustment
range of the upper layer progress bar;

wherein determining the playing progress of the file comprises:
obtaining a second proportion via dividing a distance between the location of the slider of the upper layer progress bar and
a starting point of the upper layer progress bar by a length of the upper layer progress bar, and

obtaining a second locating result via multiplying the maximum adjustment range of the upper layer progress bar by the second
proportion; and

determining the playing progress of the file as a sum of the first locating result and the second locating result.

US Pat. No. 9,389,497

MICRO-PROJECTION-DISPLAY DEVICES AND ADJUSTABLE DISPLAY SCREENS

Tencent Technology (Shenz...

1. A micro-projection-display device comprising:
a projection lens;
an elastic projection screen;
a stretchable projection framework; and
a sliding block;
wherein:
at least one point of the stretchable projection framework is connected with the elastic projection screen, so that the stretchable
projection framework is configured to control the elastic projection screen to stretch or retract;

the sliding block is connected with the stretchable projection framework;
the sliding block is configured to cause the stretchable projection framework to stretch or retract, so as to cause the elastic
projection screen to stretch or retract; and

the projection lens is configured to project light onto the stretched elastic projection screen.

US Pat. No. 9,342,686

SYSTEMS AND METHODS FOR UPDATING SCANNING RULES

Tencent Technology (Shenz...

1. A processor-implemented method for updating one or more scanning rules for scanning contents to detect security risks,
the method comprising:
obtaining, using one or more data processors, one or more first operation records to extract scanning information related
to contents being scanned to detect security risks, the first operation records including one or more user selected operations
related to the contents being scanned;

obtaining, using the one or more data processors, one or more recommended operations corresponding to the scanning information
based on at least information associated with one or more scanning rules;

determining whether predetermined validation information corresponding to the scanning information exists;
in response to the predetermined validation information existing, determining whether the scanning information and the predetermined
validation information matches;

wherein the obtaining one or more recommended operations includes:
in response to the scanning information matching with the predetermined validation information, obtaining a removal operation
as the recommended operations; and

in response to the scanning information not matching with the predetermined validation information, obtaining a trust operation
as the recommended operations;

in response to the predetermined validation information not existing,
determining one or more first users selecting the trust operation;
determining one or more second users selecting the removal operation; and
obtaining the recommended operations based at least in part on the first users and the second users;
wherein the obtaining the recommended operations based at least in part on the first users and the second users includes:
obtaining one or more third users associated with a user type related to the first operation records;
obtaining one or more fourth users among the third users, second operation records related to the event users corresponding
to the scanning information;

calculating a first ratio between a first number of the first users and a fourth number of the fourth users;
calculating a second ratio between a second number of the second users and the fourth number;
applying one or more first weights to the first ratio to generate a first weight ratio;
applying one or more second weights to the second ratio to generate a second weight ratio;
calculating a difference between the first weight ratio and the second weight ratio; and
determining the recommended operations based at least in part on the difference between the first weight ratio and the second
weight ratio; and

calculating, using the one or more data processors, a matching degree between the first operation records and the recommended
operations based at least in part on a comparison between the user selected operations and the recommended operations; and

updating, using the one or more data processors, the scanning rules based on information associated with the matching degree.

US Pat. No. 9,333,431

METHOD, DEVICE AND COMPUTER STORAGE MEDIUM FOR CONTROLLING DISPLAYING

TENCENT TECHNOLOGY (SHENZ...

1. A method for controlling a display, comprising:
determining whether a registered first client terminal device and a registered second client terminal device are located at
a same scene;

obtaining a number of visual users of the first client terminal device and a number of client terminal devices currently displayed
in a visual list of the first client terminal device;

sending information of the second client terminal device to the first client terminal device if the first client terminal
device and the second client terminal device are located at the same scene and if the number of the client terminal devices
currently displayed in the visual list of the first client terminal device is less than the number of the visual users of
the first client terminal device, so that the first client terminal device displays the information of the second client terminal
device in the visual list of the first client terminal device; and

sending information of the first client terminal device to the second client terminal device, so that the second client terminal
device displays the information of the first client terminal device in a visual list of the second client terminal device;

wherein the scene is equally divided into multiple areas according to display pixels of the scene; the method further comprises:
prioritizing the client terminal devices displayed in the visual list of the first client terminal device according to a relationship
between an area into which each of the client terminal devices displayed in the visual list of the first client terminal device
registers, and an area into which the first client terminal device registers;

prioritizing client terminal devices displayed in the visual of the second client terminal device according to a relationship
between an area into which each of the client terminal devices displayed in the visual list of the second client terminal
device registers, and an area into which the second client terminal device registers.

US Pat. No. 9,330,291

METHOD AND DEVICE FOR PARSING IMAGES

TENCENT TECHNOLOGY (SHENZ...

1. A method for parsing an image, comprising:
processing, by a device, an image on the device;
obtaining, by the device, key characteristics of the image;
parsing, by the device, the image with a two-dimension decoding mode; and
obtaining, by the device, content information of the image;
wherein processing, by the device, the image on the device and obtaining, by the device, the key characteristics of the image
comprises:

converting, by the device, the image on the device into a Grayscale image;
detecting, by the device, the Grayscale image;
identifying, by the device, positioning images of the Grayscale image; and
taking, by the device, the positioning images of the Grayscale as the key characteristics of the image.

US Pat. No. 9,270,611

METHOD, RELATED DEVICE, AND SYSTEM FOR INTER-TERMINAL INTERACTIONS

TENCENT TECHNOLOGY (SHENZ...

1. An inter-terminal interaction method executed by a second terminal, the method comprising:
receiving a media resource insertion command entered by a user on a social networking platform,
inserting the user's social networking platform account information into the media resource insertion command,
sending the media resource insertion command carrying the user's social networking platform account information to a service
device, enabling the service device to search terminal identification information associated with the account information,
to generate prompt information, to send the prompt information to a first terminal based on the terminal identification information
associated with the account information, and to receive media resources from the first terminal,

receiving the media resources from the service device, and
inserting the media resources into the social networking platform,
wherein the prompt information prompts the first terminal to present media resources and to send media resources selected
by the user from the presented media resources to the service device.

US Pat. No. 9,154,309

METHOD AND SYSTEM FOR RUNNING ENCRYPTED FILES

TENCENT TECHNOLOGY (SHENZ...

1. A computer-implemented method for running an encrypted file, comprising:
at a computer having one or more processors and memory for storing programs to be executed by the one or more processors:
receiving an identity authentication instruction, the identity authentication instruction including a user identifier and
a password;

identifying a set of encrypted target files associated with the user identifier after the identity authentication succeeds,
each encrypted target file having corresponding key information that is machine-generated for the user identifier and unknown
to any end user;

receiving a file running instruction associated with one of the encrypted target files;
invoking the encrypted target file according to the file running instruction, the invoking further including retrieving key
information corresponding to the encrypted target file, performing decryption on the encrypted target file in the memory according
to the key information, and storing the decrypted target file in the memory;

running the decrypted target file on which the decryption is performed;
receiving a file closing instruction associated with the decrypted target file;
performing encryption on the decrypted target file in the memory according to the key information; and
deleting the decrypted target file from the memory.

US Pat. No. 9,129,395

GRAPHIC RENDERING ENGINE AND METHOD FOR IMPLEMENTING GRAPHIC RENDERING ENGINE

TENCENT TECHNOLOGY (SHENZ...

1. A method for implementing a graphic rendering engine, comprising:
extracting rendering function information of a first graphic processing interface and a second graphic processing interface;
encapsulating the first graphic processing interface and the second graphic processing interface as a graphic rendering engine
interface;

defining member functions of the graphic rendering engine interface according to the rendering function information;
implementing a rendering function corresponding to the member functions by calling the first graphic processing interface
or the second graphic processing interface with the graphic rendering engine interface;

determining whether the first graphic processing interface is abnormal when implementing the rendering function corresponding
to the member functions using the first graphic processing interface; and

rendering a graphic by calling the second graphic processing interface with the graphic rendering engine interface if the
first graphic processing interface used to implement the rendering function corresponding to the member functions is abnormal.

US Pat. No. 9,094,571

VIDEO CHATTING METHOD AND SYSTEM

TENCENT TECHNOLOGY (SHENZ...

1. A video communication method, comprising:
collecting a first facial video data of a user of a first client;
transmitting the first facial video data of the user of the first client to a second client;
collecting second facial video data and audio data associated with the user of the first client,. and interactive motion information
received by the first client from an interactive user-interface (UI) component library;

identifying facial vector data associated with the user of the first client according to the second facial video data;
transmitting the facial vector data and the audio data to the second client, wherein the second client renders a virtual profile
model corresponding to the user of the first client based on the first facial video data and the facial vector data, and wherein
the second client displays the virtual profile model of the user of the first client, and further the second client plays
the audio data of the user of the first client synchronously with the display of the virtual profile model of the user of
the first client; and

transmitting the interactive motion information to the second client, wherein the second client renders an animation corresponding
to the interactive motion information, wherein the animation comprises modifying an expression of the virtual profile of the
first client and an expression of a virtual profile model corresponding to a user of the second client, and wherein the second
client displays the animation that comprises an interaction between the virtual profile model of the user of the second client
synchronously with the display of the virtual profile model of the user of the first client.

US Pat. No. 9,065,788

METHOD, DEVICE AND SYSTEM FOR VOICE COMMUNICATION

Tencent Technology (Shenz...

1. A computer-implemented method for enabling voice communication between two terminals through instant messaging (IM) service,
the method comprising:
at a computer server having one or more processors and memory storing programs to be executed by the one or more processors:
receiving a message from a remote computer, the message including an IM identifier of a callee terminal user of the IM service
and a mobile device identifier of the callee terminal;

updating an entry for the callee terminal user of the IM service in a database at the computer server, the entry including
the IM identifier of the callee terminal user and the mobile device identifier of the callee terminal;

receiving a voice communication request from a caller terminal user of the IM service at a caller terminal to start voice
communication with the callee terminal user of the IM service, the request including the IM identifier of the callee terminal
user; and

in response to the voice communication request:
identifying the database entry that includes the IM identifier of the callee terminal user;
sending a voice communication request to a service control point in a switched telephone network, the voice communication
request including the mobile device identifier of the callee terminal, wherein the service control point is configured to
return an IP address and a port number of the callee terminal in accordance with the mobile device identifier of the callee
terminal and launch a call request against the callee terminal; and

establishing a voice communication channel between the caller terminal and the callee terminal using the IP address and the
port number of the callee terminal.

US Pat. No. 9,491,568

SYSTEM AND METHOD FOR MOBILE TERMINAL INTERACTIONS

TENCENT TECHNOLOGY (SHENZ...

1. A method for presenting information interactively by a mobile terminal, comprising:
acquiring a current sensor signal by a mobile terminal, wherein the mobile terminal includes at least a processor, memory,
a speaker, a display screen, and one or more sensors for collecting data from an external environment of the mobile terminal
and generating sensor signals;

comparing an amplitude of the current sensor signal with a set threshold associated with a type of the current sensor signal;
and

automatically producing, by the mobile terminal, a life emotion signal reflecting a current state of the mobile terminal corresponding
to the current sensor signal if an amplitude of the current sensor signal exceeds the set threshold,

wherein the life emotion signal is on the mobile terminal and comprises a sound imitating a human voice broadcasted by the
speaker and an emoticon shown on the display screen.

US Pat. No. 9,432,672

IMAGE COMPRESSION METHOD AND SYSTEM WITH IMAGE COMPRESSION TIME INFORMATION

TENCENT TECHNOLOGY (SHENZ...

1. An image compression method, comprising:
at an access server having one or more processors and memory for storing program modules to be executed by the one or more
processors:

receiving, by the access server, an image compression request submitted by a terminal, the image compression request comprising
multiple to-be-compressed images or uniform resource locator (URL) addresses corresponding to the to-be-compressed images,
and image compression time information corresponding to each of the to-be-compressed images;

selecting, by the access server according to the image compression time information, a size of the to-be-compressed images
and a target compression ratio, an image compression server whose load is lower than a preset threshold, and sending the image
compression request to the selected image compression server, so that the selected image compression server can compress the
images according to the image compression request and save the compressed images;

receiving, by the access server, URL addresses of the compressed images from the selected image compression server; and
forwarding, by the access server, the URL addresses of the compressed images to the terminal.

US Pat. No. 9,357,084

METHOD AND APPARATUS FOR MONITORING SERVICE USAGE OF A MOBILE TERMINAL

TENCENT TECHNOLOGY (SHENZ...

1. A method of monitoring service usage, comprising:
at a device of having one or more processors and memory for storing one or more programs to be executed by the one or more
processors:

acquiring respective service plan information of a first service plan and a second service plan for a service offered by one
or more service providers, the respective service plan information for each of the first and second service plans including
a respective set of service variables, the respective sets of service variables further including one or more circumstantial
variables and one or more historical variables;

acquiring respective values for the respective sets of service variables for the first and second service plans based on actual
service usage associated with a user;

in accordance with the acquired respective values of the corresponding one or more circumstantial variables and the corresponding
one or more historical variables, generating a first service score for the first service plan and a second service score for
the second service plan;

in accordance with the first service score and the second service score, selecting a respective one of the first and second
service plans for at least one of usage recommendation or fee calculation for subsequent use in a current service cycle; and

after selecting the respective service plan, automatically using the selected service plan to provide service according to
the selected service plan.

US Pat. No. 9,258,526

METHOD AND SYSTEM FOR AUDIO/VIDEO COMMUNICATION, AND CLIENT THEREOF

TENCENT TECHNOLOGY (SHENZ...

1. A method for audio/video communication comprising:
a client setting up a connection with a server for audio/video communication, the client opening multiple windows for the
audio/video communication;

obtaining an enabling instruction for enabling audio/video communication of one of the windows for audio/video communication
amongst the multiple windows for audio/video communication; and

in response to enabling audio/video communication of the one of the windows, automatically disabling audio/video communication
for other windows for audio/video communication amongst the multiple windows for audio/video communication.

US Pat. No. 9,230,541

KEYWORD DETECTION FOR SPEECH RECOGNITION

TENCENT TECHNOLOGY (SHENZ...

1. A method of recognizing a keyword in a speech, comprising:
on an electronic device:
receiving a sequence of audio frames comprising a current frame and a subsequent frame that follows the current frame;
determining a candidate keyword for the current frame using a predetermined decoding network that comprises keywords and filler
words of multiple languages,

associating the audio frame sequence with a confidence score that is partially determined according to the candidate keyword;
identifying a word option for the subsequent frame using the candidate keyword and the predetermined decoding network;
when the candidate keyword and the word option are associated with two distinct types of languages, updating the confidence
score of the audio frame sequence based on a penalty factor that is predetermined according to the two distinct types of languages,
the word option and an acoustic model of the subsequent frame; and

determining that the audio frame sequence includes both the candidate keyword and the word option by evaluating the updated
confidence score according to a keyword determination criterion.

US Pat. No. 9,154,910

TERMINAL LOCATION OBTAINING METHOD, DEVICE, AND SYSTEM

TENCENT TECHNOLOGY (SHENZ...

1. A terminal location obtaining method performed by a first terminal, comprising:
starting an application on the first terminal, the application comprising a function for obtaining, in a setting of the application,
location information of a second terminal;

when detecting that said function has been switched on, transmitting, by the first terminal, a location-obtaining request
to the second terminal, so that the second terminal can obtain current location information of the second terminal in response
to the location-obtaining request, and return the obtained location information of the second terminal to the first terminal;

receiving the location information of the second terminal, and using the location information of the second terminal as location
information of the first terminal, and

performing, by the first terminal, a location-based application operation in accordance with the location information.

US Pat. No. 9,377,959

DATA STORAGE METHOD AND APPARATUS

TENCENT TECHNOLOGY (SHENZ...

1. A data storage method, comprising:
storing a fixed-length key and a value thereof into a first data block, the storing a fixed-length key comprising: uniformly
storing a common prefix of each fixed-length key, and separately storing a remainder part of each fixed-length key after the
common prefix is removed; and

storing a variable-length key and a value thereof into a second data block, the storing a variable-length key comprising:
storing a variable-length key of a base-key type in a full storage manner, and performing prefix compression on a variable-length
key of a prefix-compressed key type;

wherein the performing prefix compression on a variable-length key of a prefix-compressed key type comprises:
for the variable-length key of the prefix-compressed key type, storing a length of a common prefix of the variable-length
key of the prefix-compressed key type and a current base key, and storing a remainder part of the variable-length key of the
prefix-compressed key type after the common prefix is removed.

US Pat. No. 9,332,405

SHORT MESSAGE BACKUP METHOD, MOBILE TERMINAL, AND SERVER

TENCENT TECHNOLOGY (SHENZ...

1. A short message backup method, comprising:
obtaining a local short message of a first mobile terminal in a first short message format supported by the first mobile terminal,
wherein the short message at least comprises content of the short message, sending time of the short message, a data amount
of the short message, and a phone number of a sender of the short message or a phone number of a receiver of the short message,
converting the local short message from the first short message format to a preset format supported by a remote server and
storing the local short message of the first mobile terminal in a local short message backup database file according to the
preset format supported by the remote server, wherein the preset format supported by the remote server is preselected by the
first mobile terminal among a plurality of formats that are known to be supported by the remote server and the first mobile
terminal, the storing further comprising storing the content of the short message, the sending time of the short message,
the data amount of the short message, and the phone number of the sender of the short message or the phone number of the receiver
of the short message in the local short message backup database file according to the preset format and based on a field;
and

sending the short message backup database file from the first mobile terminal to the remote server, wherein the remote server
stores the short message backup database file in association with a user account, so as to complete short message backup,
the sending further comprising encrypting the short message backup database file to obtain the encrypted short message backup
database file, and sending the encrypted short message backup database file to the remote server, so that the remote server
stores the short message backup database file and the user account after performing decryption, so as to complete the short
message backup, wherein:

after the short message backup is completed, the remote server receives a request for recovering the short message from a
second mobile terminal, the request for recovering the short message carrying information of the user account and a second
short message format supported by the second mobile terminal, and the second short message format is different from the first
short message format,

after receiving the request for recovering the short message, the remote server converts the short message backup database
file from the preset format to the second short message format and encrypts the converted short message backup database file
and sends the encrypted short message backup database file to the second mobile terminal, and

after receiving the short message backup database file encrypted and sent by the remote server, the second mobile terminal
performs a decryption operation on the short message backup database file encrypted and sent by the remote server and obtains
the content of the short message, the sending time of the short message, the data amount of the short message, and the phone
number of the sender of the short message or the phone number of the receiver of the short message by parsing according to
the preset format.

US Pat. No. 9,300,736

DISPLAY CONTROL METHOD AND DEVICE

TENCENT TECHNOLOGY (SHENZ...

1. A method for controlling a display on a first terminal connected to a server through a network, the method comprising:
at the first terminal having one or more processors and memory storing programs executed by the one or more processors,
receiving a seed random number from the server;
initializing a platform-independent random number generator based on the seed random number;
running an application program installed on the first terminal;
monitoring the operation of the application program;
when the application program invokes a first platform-dependent random-processing command, using the platform-independent
random number generator to generate a first random number based on the seed random number;

performing the first platform-dependent random-processing command using the first random number to generate display contents
corresponding to the first random number;

displaying the display contents;
when the application program invokes a second platform-dependent random-processing command, using the platform-independent
random number generator to generate a second random number based on the first random number;

performing the second platform-dependent random-processing command using the second random number to generate display contents
corresponding to the second random number; and

displaying the display contents.

US Pat. No. 9,235,713

METHOD, DEVICE, AND SYSTEM FOR ENCRYPTING AND DECRYPTING IMAGE

TENCENT TECHNOLOGY (SHENZ...

1. A method for encrypting an image performed at a handheld computer having a processor and memory for storing one or more
programs to be executed by the processor, comprising:
obtaining a size of header data of an image file;
encrypting the header data;
in the process of encrypting the header data, obtaining encrypted data corresponding to the header data;
dividing the encrypted data into a first part and a second part based on a size of the header data and a size of the encrypted
data; and

obtaining an encrypted image file for the image file based on the encrypted data, comprising:
replacing the header data in the image file with the first part of the encrypted data, a location information and an encryption
identifier; and

placing the second part of the encrypted data to the end of the image file.

US Pat. No. 9,232,371

METHOD AND SYSTEM FOR TRANSFERRING SPEECH INFORMATION

TENCENT TECHNOLOGY (SHENZ...

1. A method for transmitting voice messages, comprising:
receiving voice data collected by a first intercom terminal;
detecting whether the size of the voice data collected reaches a predefined threshold; and
uploading the voice data collected to a transit server via a predefined network when the size of the voice data collected
reaches the predefined threshold, or when the voice data collected contains a voice message terminator;

wherein the method further comprises
storing the voice data collected to a predefined upload queue after receiving the voice data collected by the first intercom
terminal and before detecting circularly whether the size of the voice data collected reaches the predefined threshold;

wherein uploading the voice data collected to the transit server via the predefined network comprises:
detect circularly whether the first intercom terminal is connected to the predefined network successfully; and
uploading the voice data in the upload queue to the transit server via the predefined network when the first intercom terminal
is successfully connected to the predefined network.

US Pat. No. 9,210,117

INVITATION INFORMATION PUSH METHOD AND SYSTEM

TENCENT TECHNOLOGY (SHENZ...

1. An invitation information push method comprising:
after receiving an invitation request sent by a microblog user, a server sending invitation information to clients corresponding
to a number of invited users carried in the invitation request, wherein the invited users are users who have not registered
microblog, and the number of the invited users N is greater than or equal to 1; and

upon receiving the invitation information, each client creating an invitation information guide to guide the user who has
not registered microblog to register microblog;

wherein the server sending the invitation information to the clients corresponding to the invited users comprises:
determining, by the server, whether one or more of the invited users carried in the invitation request are in a restricted
list; and

if none of the invited users carried in the invitation request is in the restricted list, sending the invitation information
to the clients corresponding to the invited users carried in the invitation request if microblogging operation is not in a
high-risk period;

wherein the sending the invitation information to the clients corresponding to the invited users comprises:
determining a level of an invitation qualification corresponding to the microblog user who sends the invitation request; and
according to a preset corresponding relation between the level of the invitation qualification and the number of invited users
determining whether the number of the invited users carried in the invitation request is less than or equal to the number
of invited users corresponding to the determined level of the invitation qualification; if yes, sending the invitation information
to the clients corresponding to the invited users carried in the invitation request.

US Pat. No. 9,501,680

METHOD AND DEVICE FOR BATCH SCANNING 2D BARCODES

TENCENT TECHNOLOGY (SHENZ...

1. A method for batch scanning 2D barcodes comprising:
in an image containing a plurality of 2D barcodes, using a 2D barcode positioning process, determining a barcode area corresponding
to each 2D barcode of the plurality of 2D barcodes;

according to the barcode area corresponding to the each 2D barcode, segmenting the image containing the plurality of 2D barcodes,
obtaining a plurality of barcode images with each barcode image corresponding to one 2D barcode of the plurality of 2D barcodes;
and

decoding the each barcode image of the plurality of barcode images corresponding to the plurality of 2D barcodes, obtaining
data contained in the each barcode image;

wherein the segmenting of the image containing the plurality of 2D barcodes, obtaining the plurality of 2D barcode images
comprises:

according to a regional growth method, correcting the barcode area based on the each segmented barcode image corresponding
to the each 2D barcode, obtaining a corrected barcode area of the each 2D barcode; and

using a convex hull calculation method, according to the corrected barcode area of the each 2D barcode, segmenting out the
plurality of barcode images corresponding to the plurality of 2D barcodes from the image.

US Pat. No. 9,350,546

METHOD AND SYSTEM TO DECRYPT PRIVATE CONTENTS

TENCENT TECHNOLOGY (SHENZ...

1. A method for decrypting encrypted private contents stored in a device, comprising:
at the device having one or more processors, memory for storing program modules to be executed by the one or more processors,
and a display:

receiving, at the device, a contents ID and a decrypting password from a first user of the device;
querying, at the device, a content database for an invited guest password associated with the contents ID;
comparing, at the device, the decrypting password with the invited guest password;
when the decrypting password is the same as the invited guest password:
displaying, on the display, first preset contents;
when the decrypting password is not the same as the invited guest password:
when the decrypting password is the same as an encrypting password associated with the encrypted private contents:
decrypting the encrypted private contents corresponding to the contents ID using the decrypting password; and
displaying, on the display, the decrypted private contents; and
when the decrypting password is not the same as the encrypting password associated with the encrypted private contents:
displaying, on the display, second preset contents.

US Pat. No. 9,329,752

METHOD AND DEVICE FOR DISPLAYING DETAILED MAP INFORMATION

TENCENT TECHNOLOGY (SHENZ...

1. A method of displaying detailed information on a map, comprising:
at a device having one or more processors and memory storing instructions for execution by the one or more processors:
displaying the map on a graphical user interface of the device, the displayed map including a plurality of building icons
each representing a respective building;

detecting a pointing input at a respective position in the displayed map;
identifying a first building icon associated with the respective position in the displayed map;
selectively obtaining a respective type of detailed information on the respective building represented by the first building
icon for display on the map, wherein the selectively obtaining is in accordance with a respective distance between a current
location of the device and a respective location associated with the respective building represented by the first building
icon; and

displaying a transparent layer over the displayed map, the transparent layer displaying the selected type of detailed information.

US Pat. No. 9,219,808

CONTACT INFORMATION SYNCHRONIZATION SYSTEM AND METHOD

TENCENT TECHNOLOGY (SHENZ...

1. A method for synchronizing between a first address book on a user terminal and a second address book on a social network
service (SNS) network maintained by an SNS server containing at least a processor, comprising:
determining, by the user terminal containing at least a processor, a synchronization target;
when the synchronization target is determined as the first address book, downloading contact information from the second address
book to the user terminal;

when the synchronization target is determined as the SNS network address book, uploading, by the user terminal, contact information
from the first address book to the SNS network;

matching, by one of the user terminal and the SNS server, contact information in the first address book against contact information
in the second address book;

identifying, by one of the user terminal and the SNS server, based on the matching, a contact person having same contact information
in the first address book and the second address book; and

after the contact person is identified, synchronizing, by one of the user terminal and the SNS server, information of the
contact person in the first address book and information of the contact person in the second address book;

wherein before matching contact information in the first address book against contact information in the second address book,
and when the contact information includes a phone number, the phone number is standardized according to one or more processing
rules, including:

setting a predefined number of digits n for standardized mobile phone numbers;
if the phone number has n digits, directly reading the phone number as a standardized mobile phone number;
if the phone number includes more than n digits, reading the last n digits as a standardized mobile phone number; and
if the phone number includes at least one of parenthesis and dashes, removing the parenthesis and dashes, and only reading
the n digits as a standardized mobile phone number

wherein the synchronizing further includes:
if the synchronization target is the SNS network address book, synchronizing the information of the contact person in the
terminal address book to the information of the contact person in the SNS network address book as a new addition; and

if the synchronization target is the terminal address book, synchronizing the information of the contact person in the SNS
network address book to the information of the contact person in the terminal address book as a new addition;

wherein when the synchronization target is the SNS network address book,
after receiving a user instruction for modification, modifying newly added information of the contact person, and storing
the modified information in the SNS network address book; and

after receiving a user instruction for deletion, deleting newly added information that is not modified from the SNS network
address book, and keeping original information of the contact person in the SNS network address book or newly added but modified
information in the SNS network address book; and

wherein when the synchronization target is the terminal address book,
after receiving a user instruction for modification, modifying newly added information of the contact person, and storing
the modified information in the terminal address book; and

after receiving a user instruction for deletion, deleting newly added information that is not modified from the terminal address
book, and keeping original information of the contact person in the terminal address book or newly added but modified information
in the terminal address book.

US Pat. No. 9,467,403

METHOD AND MOBILE TERMINAL FOR SPEECH COMMUNICATION

TENCENT TECHNOLOGY (SHENZ...

1. A method of providing multi-modal instant messaging communication, comprising:
at a mobile device having one or more processors and memory for storing one or more programs to be executed by the one or
more processors:

while displaying a conversation interface of a current dialogue session between a user of the mobile device and the user's
conversation partner:

detecting a change in a manner by which the mobile device is carried by the user, wherein the change indicates that the user
moves the mobile device to a proximity of an ear of the user;

in response to detecting the change:
obtaining a current conversation status dependent on a last message of the current dialogue session; and
in accordance with predetermined rules based on the current conversation status and the detected change, selectively activating
a respective conversation mode of a plurality of conversation modes available to the current dialogue session, wherein the
activated respective conversation mode is a speech communication mode;

processing a message under the activated respective conversation mode, further including:
automatically, without user intervention, starting recording the message from the user;
producing an alert at the end of the recording when the recording reaches a pre-set time range and determining whether the
recorded message includes the user's voice or not;

automatically sending the message to the user's conversation partner when the message includes the user's voice; and
discarding the message when the message does not include the user's voice; and
updating the current conversation status of the current dialogue session in accordance with the recorded message.

US Pat. No. 9,432,358

SYSTEM AND METHOD OF AUTHENTICATING USER ACCOUNT LOGIN REQUEST MESSAGES

TENCENT TECHNOLOGY (SHENZ...

1. A method for authenticating a login request from a remote terminal, the method comprising:
at a computer server having one or more processors and memory storing program modules to be executed by the one or more processors:
receiving a login request message sent by a remote terminal to access a user account, where the login request message includes
a first field for carrying a username, a second field for carrying a password and a third field for carrying a login key;

in accordance with a determination that there is a first login key found in the third field of the login request message:
generating a second login key by applying a preset key generation algorithm to the username; and
executing a user account login process using the username and the password after confirming that the second login key corresponds
to the first login key found in the third field of the login request message;

in accordance with a determination that there is no login key found in the third field of the login request message:
generating a verification code and returning the verification code to the remote terminal, wherein the remote terminal is
configured to prompt a user of the remote terminal to return the verification code to the computer server in a predefined
format;

executing the user account login process using the username and the password after confirming that the returned verification
code corresponds to the server-generated verification code;

generating a third login key by applying the preset key generation algorithm to the username; and
returning the third login key to the remote terminal, wherein the remote terminal is configured to store a correspondence
relationship between the username and the third login key.

US Pat. No. 9,392,081

METHOD AND DEVICE FOR SENDING REQUESTS

Tencent Technology (Shenz...

1. A method for sending requests, comprising:
determining, by a device comprising a processor, the requests and Transmission Control Protocol (TCP) connections between
a client and a proxy server; and

sending, by the device, the requests to the proxy server via idle TCP connections between the client and the proxy server
so as to forward the requests to a Web server by the proxy server, if the requests are serial requests and the idle TCP connections
exist between the client and the proxy server, and if the requests are serial requests and the number of idle TCP connections
between the client and the proxy server is larger than or equal to the number of TCP connections which are needed during sending
the requests; and

establishing, by the device, TCP connections between the client and the proxy server according to the number of idle TCP connections
between the client and the proxy server, and the number of TCP connections which are needed during sending the requests, if
the requests are parallel requests and the number of idle TCP connections between the client and the proxy server is smaller
than the number of TCP connections which are needed during sending the requests; and sending, by the device, the requests
to the proxy server via the idle TCP connections between the client and the proxy server and the established TCP connections
so as to forward the requests to the Web server by the proxy server,

wherein before sending the requests to the proxy server via the idle TCP connections between the client and the proxy server,
the method further comprises:

obtaining the identification of the idle TCP connection in a corresponding relationship between the identification of the
TCP connections and a TCP connection status locally stored in the client; and

obtaining the TCP connection corresponding to the obtained identification of the TCP connection, wherein the obtained TCP
connection is an idle TCP connection between the client and the proxy server.

US Pat. No. 9,377,316

METHOD AND DEVICE FOR PROVIDING LOCATION SERVICES

TENCENT TECHNOLOGY (SHENZ...

1. A method of providing navigation assistance, comprising:
at a mobile device having one or more processors and memory for storing programs to be executed by the one or more processors:
storing respective geographic positions for a set of points of interest (POIs);
while storing the respective geographic positions of the set of POIs, determining a current location and a current viewing
direction of the mobile device;

based on the stored geographic positions and the current location and viewing direction of the mobile device, identifying,
from the set of POIs, a subset of POIs within a current field of view associated with the mobile device; and

mapping the current location of the mobile device and the respective geographic positions of the subset of POIs onto a user
interface displayed on the mobile device, further including mapping each POI from the subset of POIs to a respective position
on the user interface based at least in part on the current location of the mobile device, the respective geographic position
of the POI, and a maximum distance between two POIs from the subset of POIs.

US Pat. No. 9,329,830

MUSIC PLAYBACK METHOD, THIRD-PARTY APPLICATION AND DEVICE

Tencent Technology (Shenz...

1. A music playback method for a third-party application in which a background music playback module is integrated, comprising:
receiving a music playing signal, the music playing signal including playlist identification, wherein the step of receiving
a music playing signal comprises receiving the music playing signal applied to a micro-area in an interface of the third-party
application, wherein the micro-area contains a first music control panel including at least one playlist signal receiving
area, each playlist signal receiving area corresponding to one playlist identification;

transmitting the music playing signal to the background music playback module through a predetermined port;
acquiring by the background music playback module a corresponding playlist based on the playlist identification of the music
playing signal;

randomly playing the music in the playlist by the background music playback module; and
receiving a dragging signal applied to the micro-area of the interface of the third-party application and, based on the dragging
signal, substituting some or all of the currently displayed content in the micro-area of the interface of the third-party
application with a first music control panel to be displayed.

US Pat. No. 9,332,267

METHOD AND TERMINAL FOR VIDEO ENCODING IN MULTI-PARTY VIDEO COMMUNICATION

TENCENT TECHNOLOGY (SHENZ...

1. A method for video encoding in a multi-party video communication, comprising:
after a terminal X joins in a multi-party video communication,
A, respectively determining a number of important video encoders in use and a number of common video encoders in use of the
terminal;

B, according to a processing capability of the terminal and a newest determining result, respectively determining an encoding
parameter for an important video and an encoding parameter for a common video, and informing each important video encoder
in use and each common video encoder in use to perform video encoding according to the newly determined encoding parameters,

wherein the encoding parameter comprises a highest encoding frame rate,
and wherein determining the encoding parameter for the important video and the encoding parameter for the common video comprises:
b1, according to the processing capability of the terminal and the determined number of the important video encoders and the
number of the common video encoders, respectively initializing a highest encoding frame rate fb of the important video and a highest encoding frame rate fs of the common video;

b2, increasing fb and decreasing fs, and determining a mean opinion score (MOS) of the important video according to the newly obtained fb, and determining an MOS of the common video according to the newly obtained fs; determining whether a difference between the MOS of the important video and the MOS of the common video meets a predefined
condition, if the difference between the MOS of the important video and the MOS of the common video meets the predefined condition,
repeating step b2, otherwise, determining the highest encoding frame rate of the important video according to the newly obtained
fb, and determining the highest encoding frame rate of the common video according to the newly obtained fs.

US Pat. No. 9,197,588

METHOD OF SUPPORTING THIRD-PARTY APPLICATIONS IN AN INSTANT MESSAGING SYSTEM AND A SYSTEM USING THE SAME

TENCENT TECHNOLOGY (SHENZ...

1. A data exchange method between an instant messaging open platform and a third-party application, the method comprising:
at the instant messaging open platform running on a mobile terminal having memory and one or more processors:
reading identifier data from a predefined location in the memory;
determining whether the identifier data read from the predefined location in memory includes an application identifier and
a logo icon of a newly registered third-party application;

in accordance with a determination that the identifier data read from the predefined location in memory includes a respective
application identifier and a respective icon of a first third-party application that is a newly registered third-party application,
adding the first third-party application to a user interface of the instant messaging open platform;

receiving a data exchange request from the first third-party application, the data exchange request including the respective
application identifier of the first third-party application and a data notification;

determining whether the first third-party application is authorized to exchange data with the instant messaging open platform
using the respective application identifier;

if the first third-party application is authorized to exchange data with the instant messaging open platform:
retrieving content data from the predefined location in the memory according to the data notification; and
forwarding the content data to a plurality of mobile terminals associated with the instant messaging open platform; and
if the first third-party application is not authorized to exchange data with the instant messaging open platform, denying
the data exchange request.

US Pat. No. 10,071,311

METHOD AND DEVICE FOR DISPLAYING FRAMES OF A GAME

TENCENT TECHNOLOGY (SHENZ...

1. A method of displaying a game performed at a computing device having one or more processors and memory for storing one or more programs to be executed by the one or more processors, the method comprising:receiving a first user input of pausing a game in progress;
in response to receiving the first user input of pausing the game in progress, causing the game to switch from a normal state to a pause state;
detecting a second user input of resuming the game from the pause state to the normal state;
in response to detecting the second user input of resuming the game from the pause state to the normal state:
causing the game to switch from the pause state to a transition state, wherein the game progresses at a gradually increasing rate as a function of an elapsed time since a start of the transition state; and
displaying the game at the gradually increasing rate until the game reaches a game progress rate associated with the normal state at or prior to the receipt of the first user input.

US Pat. No. 9,935,811

METHOD, WEB SERVER AND SYSTEM FOR REMOTE CONTROL

TENCENT TECHNOLOGY (SHENZ...

1. A method for remote control, the method comprising:receiving remote control information sent by a remote-controlling terminal;
executing a control instruction on a corresponding webpage in accordance with the remote control information, or sending information on the corresponding webpage back to the remote-controlling terminal and executing a control instruction selected or entered by a user at the remote-controlling terminal based on information on the corresponding webpage;
generating an execution result webpage using a result of executing the control instruction; and
returning the execution result webpage to the remote-controlling terminal.

US Pat. No. 9,361,277

METHOD AND APPARATUS FOR IMPLEMENTING MICROBLOG MESSAGE PAGES

TENCENT TECHNOLOGY (SHENZ...

1. A method for implementing a microblog message page comprising:
encapsulating a common logic of a plurality of types of message pages in a message page control base for a microblog, wherein
the plurality of types of message pages include a home page, a guest page, and an @ message page of the microblog, each type
of message pages being able to reuse the same common logic;

pulling content data of a message page control of one of the plurality of types of message pages, wherein the message page
control is a container to contain a plurality of types of controls;

enabling the message page control of the one of the plurality of types of message pages to inherit from the common logic encapsulated
in the message page control base; and

executing the common logic, based on the pulled content data of the message page control containing the plurality of types
of controls of one of the plurality of types of message pages, to load the message page control of the one of the plurality
of types of message pages and to display the plurality of types of controls contained in the message page control on the one
of the plurality of types of message pages;

wherein the plurality of types of controls contained in the message page control of the one of the plurality of types of message
pages includes one or more of: at least one message item control, at least one loading item control, at least one fault item
control, and a more item control;

the method further including: encapsulating other logics of the one of the plurality of types of message pages into an other
item control of the one of the plurality of types of message pages, according to the other logics, to load the other item
control of the one of the plurality of types of message pages and to display the other item control on the one of the plurality
of types of message pages,

wherein executing the common logic further includes:
acquiring timestamp and size information of the one or more of the at least one message item control, the at least one loading
item control, the at least one fault item control, the more item control, and the other item control by a public interface
of the message page control; and

sorting and managing layout of the one or more of the at least one message item control, the at least one loading item control,
the at least one fault item control, the more item control, and the other item control, based on the timestamp and the size
information;

wherein the one of the plurality of types of message pages is the guest page and the other item control includes a guest info
control,

wherein the acquiring of the timestamp and the size information of the other item control by the public interface of the message
page control includes:

acquiring timestamp and size information of the guest info control by using an interface of the guest info control that inherits
from the public interface of the message page control;

wherein the sorting and managing layout of the other item control according to the acquired timestamp and size information
includes:

arranging the guest info control at top of the guest page according to the acquired timestamp and size information of the
guest info control;

wherein the at least one loading item control includes at least one guest page loading item control, and the at least one
message item control includes at least one guest page message item control;

wherein the pulling of the content data of the message page control of the one of the plurality of types of message pages
includes pulling guest page message data; and wherein the loading and displaying of the message page control of the one of
the plurality of types of message pages includes:

displaying a corresponding guest page loading item control, before the guest page message data is returned; and
after the guest page message data is returned, according to the returned guest page message data, loading the at least one
guest page message item control and displaying the at least one guest page message item control by an order of timestamp,
and hiding a corresponding guest page loading item control; and

wherein the at least one fault item control is at least one guest page fault item control, the method further including:
when a newly posted guest page message needs to be added to the guest page, repeat executing loading and displaying the message
page control of the one of the plurality of types of message pages, and

if there is no posting time overlapping between the loaded newly posted guest page message and an already displayed guest
page message, displaying a corresponding guest page fault item control, wherein a timestamp of the corresponding guest page
fault item control equals to a timestamp of an above-posted guest page message item control subtracted by one.

US Pat. No. 9,285,431

METHOD FOR MONITORING AND MANAGING BATTERY CHARGE LEVEL AND APPARATUS FOR PERFORMING THE SAME

Tencent Technology (Shenz...

1. A method for monitoring and managing battery charge level, the method comprising:
acquiring a current charge level of a battery equipped in the electrical apparatus;
directing a coefficient of current battery power consumption in accordance with a user's operation habit concluded from a
power consumption history of the battery; and

estimating a battery remaining time of the battery in accordance with the current charge level of the battery and the coefficient
of current battery power consumption under the current operating status of the electrical apparatus; wherein

the process for estimating the battery remaining time comprises steps of:
estimating a current battery available capacity in accordance with the current charge level of the battery and the coefficient
of current battery power consumption;

acquiring a current operating status of the electrical apparatus at least including an idle state, a phone call state, an
internet connection state or a text display state; and

acquiring a current battery power consumption that indicates the amount of battery power consumed by the electrical apparatus
in a certain operating interval under the current operating status; and

estimating the current battery remaining time in accordance with the current battery available capacity and the current battery
power consumption under a certain operating status of the electrical apparatus;

wherein the process for acquiring the current operating status of the electrical apparatus comprises a step of applying a
predetermined call state interface to acquire the current operating status of the electrical apparatus.

US Pat. No. 9,237,460

TRAFFIC CONTROL METHOD AND DEVICE

TENCENT TECHNOLOGY (SHENZ...

1. A method of controlling network traffic from an application running on a client device, the method comprising:
at a client device:
determining whether the application is in a user-selected traffic control operating mode;
when the application is in the user-selected traffic control operating mode, performing traffic control on the application,
the traffic control including:

monitoring a user behavior status of the application, wherein monitoring the user behavior status includes determining that
the user behavior status is one of an active state and an inactive state, and wherein determining the user behavior status
of the application comprises:

monitoring a current operating status of the application;
when the application is currently in a foreground operating state, determining that the user behavior status of the application
is the active state; and

when the application is currently in a background operating state, determining that the user behavior status of the application
is the inactive state;

setting a traffic control threshold in accordance with the determined user behavior status of the application; and
controlling traffic of the application by using the traffic control threshold;
wherein:
when the user behavior status of the user is the active state, the traffic control threshold is set to a first traffic control
threshold; and

when the user behavior status of the user is the inactive state, the traffic control threshold is set to a second traffic
threshold that is less than the first traffic threshold

when the application is not in the user-selected traffic control operating mode, forgoing performing the traffic control on
the application.

US Pat. No. 9,104,520

METHOD AND APPARATUS FOR UPGRADING APPLICATION

Tencent Technology (Shenz...

1. A method for upgrading an application, comprising: obtaining a patch package corresponding to a current installation package
of an application; removing a customized information portion from the current installation package and obtaining a data portion
of the current installation package; generating a data portion of a new installation package according to the patch package
and the data portion of the current installation package; obtaining the new installation package by adding the customized
information portion to the data portion of the new installation package; and installing the new installation package.

US Pat. No. 9,814,162

DATA CENTER MICRO-MODULE AND DATA CENTER FORMED BY MICRO-MODULES

TENCENT TECHNOLOGY (SHENZ...

1. A data center, assembled by a plurality of data center micro-modules including a first data center micro-module enclosed
in a first enclosure, a second data center micro-module enclosed in a second enclosure, and a third data center micro-module
enclosed in a third enclosure, the plurality of data center micro-modules being connected to each other by using a cable wherein:
the first data center micro-module enclosed in the first enclosure comprises a first computing server that comprises a network
core switch, a firewall and a security server, and a first cooling system that is configured to provide cooling for the first
computing server using a combination of air conditioners and air deflectors;

the second data center micro-module enclosed in the second enclosure comprises a second computing server configured to accomplish
user access and data caching, and a second cooling system that is configured to provide cooling for the second computing server
using a respective plurality of air conditioner without using any air deflectors;

the third data center micro-module enclosed in the third enclosure comprises a third computing server configured as a storage
server, and a third cooling system that is configured to provide cooling for the third computing server using a respective
plurality of air conditioner without using any air deflectors; and

the second cooling system is configured to provides enhanced cooling compared to the first cooling system without using any
air deflectors, while the third cooling system is configured to provide reduced cooling compared to the first cooling system
without using any air deflectors.

US Pat. No. 9,241,242

INFORMATION RECOMMENDATION METHOD AND APPARATUS

TENCENT TECHNOLOGY (SHENZ...

1. An information recommendation method for a terminal, comprising:
obtaining at least one keyword;
obtaining geographical location information corresponding to the keyword;
within a range of a map interface display area, searching recommendation information relevant to geographical locations adjacent
to the geographical location corresponding to the geographical location information;

obtaining a user's history information with the user's interest;
obtaining recommendation information items described by information entity words;
when there are multiple recommendation information items found, sorting the multiple recommendation information items based
on similarity values, wherein an information entity word of a recommendation information item having the largest similarity
value with a user's interest is used as the similarity value of the recommendation information item;

displaying a preset number of recommendation information items based on similarity values; and
according to the range of the map interface display area, displaying geographical location information corresponding to the
keyword, as well as the map interface having the recommendation information.

US Pat. No. 9,166,998

METHOD AND APPARATUS FOR DETERMINING SECURITY INFORMATION OF AN UNKNOWN FILE IN A CLOUD SECURITY SYSTEM

Tencent Technology (Shenz...

1. A method for determining security information of an unknown file, comprising:
receiving, by a cloud security serving end, file security querying information reported by a cloud client end when a preconfigured
monitoring point is triggered, wherein the file security querying information comprises identifier information and behavior
information of a file; and

creating, by the cloud security serving end, a behavior sequence of the file within a lifecycle according to the file security
querying information of the file, analyzing the behavior sequence of the file within the lifecycle, and determining file security
information of the file according to an analyzed result;

wherein the analyzing the behavior sequence of the file within the lifecycle and determining file security information of
the file according to the analyzed result comprises:

analyzing the behavior sequence of the file within the lifecycle according to a file behavior sequence model created based
on at least one of file behavior sequences of safe files and file behavior sequences of unsafe files, to obtain a security
level of the file; if the security level is higher than a first threshold, determining the file security information of the
file to be a safe file; if the security level is lower than a second threshold, determining the file security information
to be an unsafe file;

if the security level is lower than the first threshold and higher than the second threshold, the cloud security serving end
inquiring a statistic information database to obtain a statistical result of feedback information of the file, and determining
the file security information of the file according to the security level and the statistical result of the feedback information.

US Pat. No. 9,444,806

METHOD, APPARATUS AND SERVER FOR IDENTITY AUTHENTICATION

TENCENT TECHNOLOGY (SHENZ...

1. A method for identity authentication, at a server side, the method comprising:
generating an access identification (access ID) based on a version character generation rule and a check character generation
rule, the step of generating an access ID comprising:

constructing an initialized character array, the initialized character array comprising digits 0-9, lower case letters a-z
and upper case letters A-Z, with a total of 62 characters;

confirming a numerical position for a version character and a numerical position for each of at least a check character in
the access ID;

selecting a plurality of characters from the initialized character array as secondary characters of the access ID, wherein
the secondary characters are characters in the access ID other than the version character and the at least a check character;

dividing the plurality of secondary characters into at least two character generation groups, the at least two character generation
groups comprising a version character generation group and at least a check character generation group, wherein the step of
dividing the plurality of secondary characters further comprises:

dividing the plurality of secondary characters to obtain the at least two character generation groups based on the number
of the secondary characters ‘a’, the number of version characters ‘b’, and the number of check characters ‘c’;

generating the version character based on the version character generation group and the version character generation rule,
wherein the step of generating the version character further comprises:

multiplying, in the version character generation group, the numerical position of each character and the American Standard
Code for Information Interchange (ASCII) code corresponding to the character to obtain a first-order version value;

performing modulus of 62 of a summation of the plurality of first-order version values to obtain a second-order version value;
performing modulus of 62 of a summation of the second-order version value and the version number of the check character generation
rule to obtain a third-order version value; and

searching for the character in the initialized character array having the same numerical position as the third-order version
value and using the character as the version character;

and
generating the at least a check character based on the at least a check character generation group and the check character
generation rule;

sending the access ID to a third party developer;
receiving an API calling request from the third party developer, the API calling request carrying the access ID generated
in advance by the server and assigned to the third party developer;

searching for the version character carried in the access ID, the version character being for marking a version number of
the check character generation rule;

verifying, based on the version character generation rule, whether the version number marked by the version character is the
same as a version number of the check character generation rule used by the server;

searching, when the version character being verified successfully, for the at least a check character carried in the access
ID; and

verifying, based on the check character generation rule, the at least a check character.

US Pat. No. 9,116,758

METHOD AND SYSTEM FOR SHARING A HOTKEY BETWEEN APPLICATION INSTANCES

TENCENT TECHNOLOGY (SHENZ...

1. A method for sharing a hotkey between application instances, comprising:
when there is a hotkey message of a first hotkey, receiving, by an application instance that registers the first hotkey, the
hotkey message;

determining whether there is an application instance that does not register a first hotkey and is to process the hotkey message;
distributing, by the application instance that registers the first hotkey, the hotkey message to an application instance that
does not register the first hotkey;

in response to determining that there is the application instance that does not register the first hotkey and is to process
the hotkey message, receiving feedback information about processing the hotkey message returned from the application instance
that does not register the first hotkey and is to process the hotkey message; and

in response to determining that there is not the application instance that does not register the first hotkey and is to process
the hotkey message, processing, by the application instance that registers the first hotkey, the hotkey message.