Disclosed are a method and device for acquiring application information. The method comprises: when a mouse pointer is located on an application, monitoring an instruction for acquiring application information which is input by a user through a keyboard; matching the instruction input by the user with at least one pre-set instruction, and if the instruction input by the user is consistent with any one pre-set instruction among at least one pre-set instruction, then triggering a script program corresponding to the instruction input by the user to run in order to acquire the application information corresponding to the instruction input by the user; and converting the application information into text information, and inserting the text information into the clipboard.
A method and device for classifying webpages are provided. The method comprises: parsing a plurality of webpage elements from a webpage to be predicted; predicting a candidate webpage classification to which the webpage to be predicted belongs respectively according to respective webpage elements; and determining a final webpage classification of the webpage to be predicted by comparing the candidate webpage classifications predicted respectively based on the respective webpage elements.
G06F 3/038 - Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
3.
Display screen or portion thereof with animated graphical user interface
A method and system for loading page data, wherein the method comprises: loading a page in a client (101); acquiring, when an object identifier is read on the page, a business object corresponding to the object identifier from a server cache (102); extracting business data from the business object (103); and loading the business data onto the page (104). The invention thus avoids the need to establish a plurality of databases to support the business object, and with added advantages of complete consistency in operational behavior, no learning costs, and greatly improved simplicity and efficiency of development operations. In addition, since data is transmitted to the cache, data transmission by operation personnel can be performed after all data is allocated, avoiding the issue of online data shortage due to partial data allocation.
The present invention relates to a base station-based positioning method and a device, the method comprises: acquiring a current base station identifier of a base station to which a to-be-positioned terminal accesses; according to the current base station identifier, acquiring a common position information set corresponding to the current base station identifier; and according to the position information previously uploaded by the to-be-positioned terminal, selecting, from the acquired common position information set, the common position information conforming to a preset condition as the instant position information of the to-be-positioned terminal. The technical solution of the present invention can effectively improve the base station-based positioning preciseness by setting a common position set corresponding to the base station identifier, and by selecting, from the common position information set, the common position information conforming to the preset condition as the instant position information of the to-be-positioned terminal according to the position previously uploaded by the to-be-positioned terminal.
The present invention relates to a historical information display method and apparatus, the method comprising: acquiring historical information to be displayed corresponding to a historical information display instruction in response to the historical information display instruction triggered by a user; determining whether there is an information loss identification in the historical information to be displayed; if there is an information loss identification in the historical information to be displayed, determining whether to acquire the historical information corresponding to the information loss identification, if so, acquiring the historical information corresponding to the information loss identification; adding the acquired historical information to the corresponding position in the historical information to be displayed, and displaying the added historical information to be displayed. The technical solution of the present invention enables a user to review the complete historical information at the same terminal equipment and at the same time to save traffic that may occur due to downloading of all the historical information, thereby enhancing the user experience.
Provided are a data updating method and device. The method comprises: when an initiating trigger operation of an application program is detected, generating a data acquisition request including a plurality of pieces of identifier information and corresponding first data version information, based on stored local data, so as to acquire a part of the data needed by the application program; sending the data acquisition request and receiving data returned for responding to the data acquisition request; and performing an update operation on the stored local data according to the returned data. By means of the technical solution, a user may acquire in time, in different terminal devices, updated data from a server, so that the user experiencing lagging in acquiring the updated data can be avoided. Thereby, the timeliness of the user acquiring the updated data is ensured. Further, network traffic consumed in the process of data acquisition of the terminals is reduced.
The present invention relates to a data download method, comprising: detecting a data volume of data to be downloaded in a terminal and a first download speed of a network environment where the terminal is located; according to the first download speed and the data volume, calculating a download time required by the data to be downloaded; judging whether the download time is less than a pre-set time; and if so, downloading the data to be downloaded. By downloading data to be downloaded when a download time of the data to be downloaded is relatively short, it is possible to avoid a terminal running a download program for a long time due to downloading the data to be downloaded for a long time, which causes memory occupancy rate to be kept relatively high for a long time, and thus the terminal runs slowly.
A method and device for sorting news, comprising: with respect to a piece of target news to be sorted on a page, searching for relevant news of the target news on the basis of a preset rule (110); calculating the importance weight of the target news on the basis of one or more features that the relevant news have (120); and determining the sequence of the target news on the page on the basis of the importance weight of the target news (130). Per the present solution, when a piece of news contains important content, there would inevitably be other pieces of relevant news that also contain the important content; therefore, the relevant news can be found in the news to be sorted; when some features of the relevant news reflect the degrees of importance thereof, the degrees of importance of the news to be sorted can be determined on the basis of the features of the relevant news and the news can be sorted as such, thus implementing the degrees of importance of news being reflected in the sorting of the news.
A method and device for weighted article identification. The method comprises: parsing titles corresponding to articles to produce multiple terms (110); calculating the weights of the multiple terms, where the weights of the multiple terms reflect the degree of importance of the multiple terms in the articles (120); expanding, on the basis of the weights of the terms, the number of at least one term of the multiple terms in the titles corresponding to the articles, thus making the numbers of the multiple terms to correspond to the weights of the terms (130); and identifying the articles with the expanded titles (140). Per the method, the weights of the terms are calculated on the basis of the degree of importance of the terms in the article titles, and the corresponding terms in the article titles are expanded on the basis of the magnitude of the weights, the proportions accounted by the terms of greater weights are expanded in the expanded titles, this is equivalent to the expanded titles being able to reflect the degrees of importance of the multiple terms of the articles, thus when a problem needs to be analyzed on the basis of the degrees of importance of the multiple terms of the articles, the expanded titles can be used in place of the articles.
An ELF file protection method and system based on ARM instruction virtualization. The method comprises: converting an original function instruction into bytecodes; storing a register and stack information of the original function, adding a jump instruction, and deleting other instructions; executing the jump instruction, and jumping to an interpreting engine to interpret the bytecodes. In this way, converting an original function instruction into the bytecodes in a virtualization mode increases difficulty for a cracker, thereby improving the file protection strength.
A document protection method and device, wherein the method comprises: backing-up a document in a preset directory if modification of the document by an unauthorized program is detected, thereby acquiring a backup of the document being modified (101); if the number of documents being modified is greater than or equal to a preset value, then sending a popup dialog box to the terminal where the document in the preset directory is located, the popup dialog box enquiring of a user whether to prevent modification by the program of the document in the preset directory (102); and, according to the instruction sent by the user via the popup dialog box, determining whether to restore the document using the backup document (103), wherein the document in the preset directory is not stored in the directory to which the program belongs. The method enables the document to be restored and protected, with the restored document being the latest version of the document prior to it being modified, such that the situation often occurring in the prior art, whereby a large amount of memory is used by backup documents, is avoided.
A method and device for scheduling an updated chapter of an electronic book. The method comprises: determining, for a new uniform resource locator (URL) in a site related to an electronic book, a pattern of the URL according to a URL pattern dictionary of the site to which the URL belongs (S101); reversely identifying an electronic book corresponding to the URL from a preset electronic book pattern information library according to the pattern of the URL, and determining the identified electronic book as an updated electronic book (S102); and initiating scheduling of the chapter list page of the updated electronic book in the site to which the URL belongs to grab all updated chapters of the updated electronic book (S103). The scheduling method and device can quickly identify an updated electronic book, thereby improving the updated chapter grabbing speed and improving the updated chapter grabbing efficiency without performing frequent grabbing operations.
The invention discloses a camera-based monitoring method, apparatus, and system, and relates to the field of information technologies. The method comprises: sending to a client acquired monitoring image information, so that the client displays the monitoring image information and an area selection box corresponding to the monitoring image information, wherein the area selection box is used to configure information about a monitored area; receiving the information about the monitored area sent by the client; detecting whether there is an abnormality in the monitored area; and if so, sending warning information to the client, wherein the warning information is used in the client. By using the foregoing solution, a monitored area can be precisely positioned and monitored, thereby improving monitoring precision.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Disclosed are a method and device for posting chat information, relating to the field of information technologies. The method comprises: detecting whether an information transmission instruction is received in a text information entry area, wherein the information transmission instruction is used for instructing to transmit text information corresponding to the text information entry area; if the information transmission instruction is received, photographing image information by using a preconfigured camera; and establishing and storing a mapping relationship between the image information and the text information; and eventually posting the text information. By means of the solution, a process of collecting chat information can be simplified, such that the efficiency of posting chat information is improved.
Disclosed are a video transmission method and device. The method comprises: receiving a video stream of a collecting party, successively placing video frames in the video stream into a cache queue, and successively extracting the video frames from the cache queue and transmitting the video frames through a network; monitoring the length L of a video frame queue in the cache queue; if L is less than or equal to H, not deleting a frame, H being equal to a sum of a time length of one group of pictures (GOP) and a preset time offset value; and if L is greater than H and frames belonging to two GOPs exist in the cache queue, deleting one or more P frames starting from a last P frame of a previous GOP in the cache queue, until L is less than or equal to H. Compared with the prior art, the technical solution provides a more effective method for discarding a video frame, so that a user can watch more video contents more smoothly when the network condition is poor, thereby greatly optimizing watching experience of the user.
Disclosed are a method and device for realizing bandwidth sharing between routers. The method comprises: providing a first communication module and a second communication module in a current router; connecting the first communication module to a wide area network interface of the current router, connecting the second communication module with at least one other router connected with a wide area network, and connecting the wide area network interface with the wide area network; when the first communication module receives a data request from a terminal device accessing the current router, determining whether the data request needs to be processed in cooperation with other routers; if so, sending the data request to the one or more other routers connected with the second communication module via the second communication module; and receiving, via the second communication module, data corresponding to the data request and returned by the one or more other routers. The solution effectively utilizes the unused bandwidth of other routers, and can process a data request more efficiently.
Disclosed are a method and device for displaying a page entry icon, relating to the field of information technology. The method comprises: detecting whether a display instruction for a page entry icon hidden in a display interface is received; if so, then acquiring, according to the display instruction, the hidden page entry icon corresponding to the display instruction, and acquiring a display region corresponding to the hidden page entry icon; and displaying the hidden page entry icon in the display region of the display interface according to a pre-determined rule. The method can save the space on the homepage interface occupied by the page entry icon, and can display a hidden icon as necessary.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
19.
METHOD AND DEVICE FOR CONTROLLING AUTOMATIC SWEEPER
A method and device for controlling an automatic sweeper, relating to the technical field of sweepers. The method comprises: recording working route information corresponding to an automatic sweeper in a working process of the automatic sweeper (101); if the automatic sweeper encounters an obstacle, determining working route information within a preset period of time and respectively corresponding to moving directions adjusted according to different predetermined angles (102); detecting whether a predetermined angle that satisfies a preset condition between the working route information and the recorded working route information exists (103); and if the predetermined angle exists, adjusting the moving direction of the automatic sweeper in accordance with the predetermined angle (104). By means of the solution, the working efficiency of an automatic sweeper can be improved.
A terminal configuration adjustment method and apparatus. The method comprises: receiving a request instruction for configuration modification, and acquiring a configuration version identifier and personalized configuration adjustment information in the request instruction (101); according to the configuration version identifier, acquiring personalized configuration information corresponding to the configuration version identifier (102); and according to the personalized configuration adjustment information, adjusting the personalized configuration information, and pushing the adjusted personalized configuration information to a terminal to be adjusted (103). In the method, when a request instruction for configuration modification is received, a configuration version identifier and personalized configuration adjustment information are acquired, personalized configuration information corresponding to the configuration version identifier is adjusted via the personalized configuration adjustment information, and the adjusted personalized configuration information is pushed to a terminal to be adjusted, so that where a user does not upgrade firmware, a corresponding configuration can be adjusted according to user requirements, thereby improving the user experience.
The invention provides an automatic binding method, device and smart terminal. The automatic binding method comprises: receiving a message sent from a smart terminal through a communication server, wherein the message comprises an identifier of the smart terminal; determining a corresponding communication code according to the message; and establishing a relationship between the communication code and the identifier of the smart device, so as to realize automatic binding. The automatic binding method, device and smart terminal of the invention can automatically establish the relationship between the smart terminal communication code and the smart terminal identifier based on the message sent from the smart terminal, thereby realizing the automatic binding between the smart terminal identifier and the communication code.
The present invention provides a wireless network-based positioning method, device, and intelligent terminal, the wireless network-based positioning method comprising: receive wireless connection information sent by a terminal to be positioned, the wireless connection information comprising a network identifier of a wireless network detected by the terminal to be positioned, and a hardware identifier of the terminal to be positioned; acquire, on the basis of the hardware identifier, a mapping relationship of the terminal to be positioned, the mapping relationship comprising the network identifier and a corresponding relationship between positioning data; and search, on the basis of the received network identifier, the mapping relationship and obtain positioning data corresponding to the received network identifier, then set the positioning data as current positioning data of the terminal to be positioned. The positioning method based on a wireless network of the present invention can, on the basis of wireless connection information sent by the terminal to be positioned, implement accurate positioning.
An application program update method and system. The method comprises: judging whether there is an application program to be updated in a terminal (S1); if there is an application program to be updated, judging whether there is an available WiFi network in a network environment where the terminal is located (S2); and if there is an available WiFi network, connecting the terminal to the available WiFi network, and downloading update data of the application program to be updated to the terminal by means of the available WiFi network (S3). By means of the method, update data can be automatically downloaded in a WiFi environment, and the consideration of network environment is decreased when a user updates an application program, so that the update of the application program is more intelligent, thereby improving the user experience.
A geographical position monitoring method and device. The geographical position monitoring method is applied to a geographical position monitoring device. The method comprises: determining a current time point (S110); determining the geographical position of a geographical position monitoring device (S130); determining whether the current time point is comprised in a specific time period related to a safe region image, the safe region image comprising information of a safe region in the specific time period (S150); and if the current time point is comprised in the specific time period related to the safe region image, determining whether the geographical position is in the safe region according to the safe region image (S170).
G01S 3/02 - Direction-finders for determining the direction from which infrasonic, sonic, ultrasonic, or electromagnetic waves, or particle emission, not having a directional significance, are being received using radio waves
25.
METHOD AND DEVICE FOR CORRECTING ZOOM TRACKING CURVE
The present invention relates to the technical field of camera surveillance, and particularly relates to a method and device for correcting a zoom tracking curve. The method comprises: according to a zoom direction and corresponding preset rules thereof, selecting a reference zoom tracking curve from at least two pre-stored zoom tracking curves with different focus distances, thereby driving a zoom motor and a focus motor to rotate synchronously according to the reference zoom tracking curve; selecting N number of collection points corresponding to different zoom values on the reference zoom tracking curve; on the basis of a preset auto-focus algorithm, respectively obtaining an actual focus position value of any collection point from among the N number of collection points when a focus estimate value, at the corresponding zoom value, reaches a maximum value; according to the obtained actual focus position values corresponding to the N number of collection points, finishing correcting the reference zoom tracking curve. Thus, the present application is able to obtain the actual zoom tracking curve of each lens, and ensure that the subsequent zoom and auto focus are carried out synchronously with the corrected actual reference zoom tracking curve, such that images are focused and clear throughout the entire zoom process.
A system and method for collecting and analyzing data. The system comprises a collection control server, a data analysis server, a report generation server, and at least one data terminal. A collection tool is mounted in the data terminal. The collection control server is used for allocating collection configuration information to the data terminal and delivering the collection configuration information to the corresponding data terminal. The data terminal is used for invoking the collection tool when an application runs, collecting parameter information of collection parameters according to the collection configuration information, and uploading the collected parameter information to the data analysis server. The data analysis server is used for analyzing the uploaded parameter information corresponding to each of the collection parameters, so as to obtain the data analysis result, and sending the data analysis result to the report generation server. The report generation server is used for generating a data report according to the data analysis result. Demands, habits and the like of users are obtained by means of the data report, so as to adjust a service to make the service better satisfy users.
Disclosed are a method and apparatus for upgrading a data node of a distributed system. In a distributed system, with regard to one piece of data, a plurality of data nodes are respectively used for backing up primary copy data and multiple secondary copy data of this piece of data. The method comprises: receiving an upgrade instruction, and selecting, from a plurality of data nodes, a first data node to be upgraded; transferring a service load of the first data node to at least one second data node, and the second data node backing up secondary copy data corresponding to primary copy data in the first data node; and performing offline processing on the first data node, so as to complete the upgrade of the first data node offline.
A method and device for image storage. The method comprises: determining a globally unique identifier of an image, where the globally unique identifier is mapped one-to-one to a storage address of the image (S110); establishing and storing a multilevel index of the image on the basis of affiliation information of the image, where each upper-level index comprises a value used for determining an adjacent lower-level index, the value used for determining the adjacent lower-level index is used for dividing the image to which the upper-level index pertains to the corresponding adjacent lower-level index, and the lowermost-level index comprises the globally unique identifier of the image (S120); and storing the image to the storage address of the image to which the globally unique identifier is mapped (S130).
A method for using a mobile terminal without traces, and the mobile terminal. The method comprises: creating a trace-free account of a mobile terminal (S110); in response to an operation of a user for logging in to the trace-free account of the mobile terminal, switching the mobile terminal from a non-trace-free environment to a trace-free environment, and temporarily storing trace information generated by an application on the mobile terminal to a specified storage region (S120); and in response to an operation of the user for exiting the trace-free account of the mobile terminal, switching the mobile terminal from the trace-free environment to the non-trace-free environment, and deleting the trace information temporarily stored in the specified storage region (S130). According to the method, a user can log in to a trace-free account of a mobile terminal as required, so that after the user exits the login, the user does not leave any trace generated after the user logs in to the account and operates an application on the mobile terminal, accordingly privacy security and information security of the user can be effectively protected, and demands of the user are satisfied.
A data searching method and apparatus. The data searching method comprises: receiving a data acquisition request, and searching a buffer of a corresponding database for data requested by the data acquisition request (S102); when the requested data is not found from the buffer of the corresponding database, acquiring a token corresponding to the requested data from the buffer of the corresponding database (S104); and when the token is acquired, assessing the corresponding database to search for the requested data (S106). The problem of over-large pressure of access to a database resulting from too many concurrence requests can be resolved.
A terminal, and text information display method for a terminal. The method comprises: if text information at a preset location is displayed and has been displayed for a preset waiting duration, then triggering output of interactive content, wherein the interactive content is used to enhance a level of expression of the text information at the preset location. The interactive content can enhance the level of expression of the text information at the preset location, and for example, can be triggered at a desired text location to highlight expressed emotions or further develop an atmosphere, thereby adding the interactive content as a mode of expression to text information display, such that the text information display is no longer monotonous, and readers do not feel bored. In addition, upon display of a page containing the text information at the preset location, the waiting duration can be set according to an estimated time needed for a reader needs to reach the text information at the preset location to better combine the output of the interactive content and reading of the text information at the preset location, thus improving user experience for readers.
A method for compressing and decompressing data comprises: analyzing original transmission data, and determining data characteristics information comprising a data structure and a data size of the original transmission data (S110); determining whether the original transmission data is to be compressed or not according to the data characteristics information (S120); if the determination result is to execute compression, converting a key of an original key-value pair in the original transmission data to generate a corresponding compressed key based on a predetermined key compression technique in a key compression matching list (S130); and generating compressed transmission data comprising corresponding compression key-value pairs based on the compressed key (S140). By the method, network bandwidth can be saved in the data transmission, and the present method can save network bandwidth, avoid undesirable data loss caused by a large amount of data, and achieve efficient transmission of the data; moreover, the data processing response time of a computer is improved, so that the subsequent efficient processing of received transmission data is ensured, and user experience is improved.
A software installation method and device for use in a second terminal, and a method and device facilitating software installation at a server. The software installation method and device for use in the second terminal comprises: transmitting, to a server, a software installation request comprising user identifier information (S310); receiving recommended software installation information returned from the server and matching the user identifier information (S320), wherein the recommended software installation information is obtained according to software installation associated information of a first system transmitted by a first terminal; and downloading, according to the recommended software installation information, corresponding recommended software and installing the same (S330). By employing the above method, the embodiment implements installation, for a user requiring replacing old terminal equipment with new one or using a plurality of terminal equipment, according to user identification information, of the same set of user frequently-used software on several terminal equipment used by the same user and according to user identification information, ensuring preferable user experience.
Disclosed in the present invention are a method and a server for implementing control of a smart device by a master device. The method comprises, with respect to the smart device: according to a device identifier of the smart device, obtaining the device identifier of the master device corresponding to the smart device from a control relation database, and obtaining the device identifier of the smart device from a first association database; according to the device identifier, obtaining the device identifier of the master device corresponding to an associated smart device from the control relation database, and; establishing an association relation between the master device corresponding to the associated smart device and the master device corresponding to the smart device. According to the foregoing solution, the association information between master devices is passively established on the basis of the association information between smart devices, such that the control of a smart device by a master device is no longer limited to a one-on-one individual control, but rather, a master device is able to monitor and control the association information between corresponding smart devices by means of the association information between master devices.
A vehicle interior environment monitoring method and terminal, the method comprises: if it is detected that a vehicle terminates operating, determining whether an operation of the vehicle door satisfies a preset activation policy (S101); if the vehicle door is determined to satisfy the preset activation policy, then activating a vehicle interior environment monitoring mode, and in a preset time, acquiring a current environment image in the vehicle as an initial image (S102); performing a similarity comparison between the initial image and a prestored comparison image, determining whether the similarity is less than a preset similarity threshold, the prestored contrast image being an environment image of the inside of the vehicle previously acquired when no living body was inside the vehicle (S103); if it is determined that the similarity between the initial image and the contrast image is less than the preset threshold, transmitting alarm information to a preset terminal so that the preset terminal reminds the user that a living body is inside the vehicle of the user (S104). The method and terminal can monitor whether a living body exists inside the vehicle, preventing a situation in which a child or pet is left in the vehicle.
G08B 21/02 - Alarms for ensuring the safety of persons
B60R 21/015 - Electrical circuits for triggering safety arrangements in case of vehicle accidents or impending vehicle accidents including means for detecting the presence or position of passengers, passenger seats or child seats, e.g. for disabling triggering
36.
INTELLIGENT VEHICLE-MOUNTED CAMERA AND METHOD FOR ADJUSTING FRAME RATE THEREOF
Disclosed are a method for adjusting a frame rate of an intelligent vehicle-mounted camera, and an intelligent vehicle-mounted camera. The method comprises: acquiring, by an intelligent vehicle-mounted camera installed in a motor vehicle, a driving speed of the motor vehicle via an on-board diagnostic system (OBD) interface; and monitoring, by the intelligent vehicle-mounted camera, a variation of the driving speed of the motor vehicle, and adjusting, according to the variation of the driving speed of the motor vehicle, a frame rate of the intelligent vehicle-mounted camera. In the above technical solution, the intelligent vehicle-mounted camera acquires driving speed information of the motor vehicle via the OBD interface, and performs the corresponding adjustment on the frame rate according to the variation of the driving speed, thereby adapting the frame rate of the intelligent vehicle-mounted camera to the driving speed of the motor vehicle in which the intelligent vehicle-mounted camera is installed so as to achieve an improved image effect, accurately recording images at each moment the motor vehicle is running, and providing a meaningful driving reference for a user.
A method and a system for a positioning device to switch positioning mode. The method comprises: predicting a next dotting position based on one or more positioning information, wherein the positioning information comprises a movement trajectory, a speed and/or an acceleration (S101); switching the positioning mode (S103); calculating the difference between a first actual dotting position and the predicted dotting position after the first switching of the positioning mode (S105); and when the difference is less than a predetermined threshold, using the first actual dotting position for positioning, and switching to an actual dotting method for dotting; and when the difference is greater than the predetermined threshold, positioning according to the position of the predicted dotting (S107). In this method, when the positioning mode needs to be switched by a user using the positioning device, the positioning method combining the actual positioning information with the predicted positioning information is adopted, which effectively avoids the inaccuracy of the positioning due to the drift of the dotting position when switching the positioning mode.
G01S 19/48 - Determining position by combining or switching between position solutions derived from the satellite radio beacon positioning system and position solutions derived from a further system
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
Disclosed are a method for realizing network broadcast and a server. The method comprises: on an anchor page, providing a push flow content distribution network (CDN) address and key to a corresponding anchor user, so that the anchor user can upload multimedia data flow to a CDN according to the push flow CDN address and key, wherein different anchor pages correspond to different anchor users; on a main page, displaying relevant information about the multimedia data flow uploaded by various anchor users; and when an audience user selects a multimedia data flow displayed on a front end main page, jumping to an anchor page corresponding to the multimedia data flow, and providing a pull flow CDN address and key of the multimedia data flow to the audience user on the anchor page, so that the audience user acquires the multimedia data flow from the CDN in real-time according to the pull flow CDN address and key of the multimedia data flow. The technical solution constructs a good multimedia data flow transmission and presentation manner to realize network broadcast.
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
39.
METHOD AND APPARATUS FOR LOCATING IMAGE EDGE IN NATURAL BACKGROUND
A method and apparatus for locating an image edge in a natural background. The method comprises: extracting a central color feature serving as a comparison standard for an image located in a natural background (S102); comparing with the central color feature, and extracting multiple candidate points for each edge of the image according to a comparison result (S104); grouping the multiple candidate points corresponding to the edge according to a distance and/or a direction, so as to obtain multiple candidate point groups (S106); fitting a corresponding fit line by using a candidate point in each candidate point group (S108); and selecting a fit line close to most candidate points of the edge, and locating the fit line as the edge (S110). The method reduces the calculated amount of an executive body, increases the locating speed of an image edge, avoids interference with the edge in a natural background, and improves the locating accuracy of the image edge.
The present invention relates to the technical field of communications, and in particular to an encryption mechanism-based IPC service implementation method and system. The method comprises: receiving a connection and registration request of an IPC terminal to complete the registration thereof; generating an encryption key and a decryption key, and respectively and correspondingly transmitting same to the IPC terminal and an APP client bound with the IPC terminal; and receiving a playing request of the APP client, and controlling the APP client so that same establishes a connection with the IPC terminal, so as to enable the IPC terminal to transmit an audio and video stream encrypted using the encryption key to the APP client which can use the decryption key for decryption to perform decryption and playing. In the present solution, a server controls processes of an APP client being bound with and establishing a connection with an IPC terminal, and generating an encryption key and a decryption key and respectively transmitting same to the APP client and the IPC terminal, etc., thereby preventing an illegitimate user from acquiring and/or decrypting a user's audio and video stream information, ensuring the security of audio and video stream information transmission, and further improving the security of the user's privacy.
A driving information restoring method and system. A driving recorder (100) collects driving information; a smart terminal (200) transmits the driving information to a server (300); the server (300) combines information in basic information and information in event information of the driving information according to screening conditions to form an information set. The basic information comprises at least one of time information and positioning information; the event information comprises at least one of speed information, acceleration information, angular movement information, alcohol information, smoke information, and vehicle horn information. By combining the basic information and the event information, the time and location of a particular event occurred in a driving process can be restored, and one can know and restore more details in the driving process by means of the event information. By means of the screening conditions, desired details can be screened from the driving information as far as possible. Also provided are a server and a method for restoring driving information by the server.
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
42.
IDENTIFICATION METHOD AND DEVICE FOR MALICIOUS CALL
An identification method and device for a malicious call. The method comprises: collecting opposite-side voice in a certain duration during a call answering process (201); sending the opposite-side voice to a cloud server, enabling the cloud server to perform voice analysis on the opposite-side voice, obtaining a voice feature point of the opposite-side voice, matching the voice feature point of the opposite-side voice with a pre-established voice feature point in a malicious call voice feature database, and returning a prompt of the malicious call when matching succeeds (202); and displaying the prompt of the malicious call on a call interface according to the prompt of the malicious call fed back by the cloud server (203).
Disclosed are a configuration method and device for a voice feature database of malicious calls. The method comprises: when, during a call answering process, it is detected that a user selects a malicious call option, marking a caller call as a malicious call according to a user command, and recording a certain duration of the voice of the malicious call; then sending the voice of the malicious call to a cloud server, enabling the cloud server to perform voice analysis on the voice of the malicious call, obtaining voice feature points of the malicious call, and saving the voice feature points of the malicious call in a malicious call voice feature database.
The present invention relates to the technical field of Internet, in particular to a network novel chapter list evaluation method and device. The method comprises the steps of: determining the similarity between a plurality of chapter list pages of the same body, and classifying a plurality of chapter list pages with the similarity higher than a pre-set threshold value into the same set, wherein each chapter list page corresponds to one site; acquiring an authoritative value of each site in the same set, and taking a set with the maximum sum value of the authoritative values as a first set, wherein the authoritative values are determined according to scores given by users to the sites; acquiring at least one feature amount value of each chapter list page in the first set; and calculating a comprehensive weight value of at least one feature amount value of each chapter list page according to a pre-set rule, and acquiring a chapter list page with the maximum comprehensive weight value. The present invention solves the problem of low efficiency caused by judging a chapter list page by means of manually configuring a template in the prior art, and can flexibly and rapidly evaluate a chapter list page best meeting the requirements, and the evaluation result is accurate and objective.
The method provides a method of mining and cleaning up similar books in a book database, and a device utilizing the same. The method comprises: determining, according to book titles of all of electronic books in a book database, a group to which each of the electronic books belongs; with respect to each of groups, computing, according to a chapter list of each of electronic books in each of the groups, similarity between electronic books in each of the groups; if similarity between two electronic books in each of the groups exceeds a preconfigured threshold, determining that the two electronic books is a pair of similar books in the book database; constructing, by employing similar books in all of the groups in the book database, a graph model of the book database, wherein each pair of similar books are two mutually connected vertices in the graph model; with respect to each of connected components in the graph model, selecting one electronic book to be kept from the connected components, and deleting the other electronic book. Applying the invention can increase a speed of mining similar books from a book database, and reduce a size of the book database.
Disclosed are a method and apparatus for processing a request from a client. The method comprises: receiving a request sent by a client, and obtaining a unique request identifier based on the request; matching the unique request identifier of the request and a unique request identifier in a database; and if the matched unique request identifier exists in the database, directly returning a processed result corresponding to the matched unique request identifier in the database to the client without performing corresponding processing based on the request. The technical solution successfully avoids situations in which time and resource waste and generation of data operation errors caused by repeated operations performed by a request executing device such as a server according to repeated requests sent by the client when request timeout appears, effectively improves the request executing efficiency, saves resources, and avoids generation of error operating caused by needless request execution on data.
The present application discloses a processing method and system for adaptive unwanted call identification. The method comprises: upon detection of an answer button being triggered, automatically turning on a built-in recorder of a terminal, and recording audio during the call; determining whether a current caller number read from a screen of the terminal is a potential unwanted caller number; if so, then analyzing text corresponding to the audio recorded by the recorder, and extracting multiple keywords from the text; sequentially matching the keywords with pre-collected history words in a database; and terminating matching and determining the current caller number to be an unwanted caller number when a match hit rate of the keywords exceeds a threshold. The present application identifies and configures whether an unknown number is an unwanted caller number by recording a call and extracting keywords from the recording to be matched.
Disclosed is a method and device for webpage zooming on an electronic apparatus. The method comprises: constructing a custom zooming processor object and replacing an original zooming processor object with it; inheriting a webpage display control to construct a custom touch event method; detecting an operation of touching an electronic apparatus as an operation of releasing n−1 touch points in n touch points; judging whether a zooming processor object is supported; if supported, the zooming processor object performs operations, in the zooming ending method a webpage text zooming scale is set to be a display zooming scale of the webpage display control, and executing the zooming ending method; and if not supported, setting the webpage text zooming scale to be the display zooming scale of the webpage display control, reflectively setting and enabling a zooming scale method, and executing a touch event method of the inherited webpage display control.
G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 9/44 - Arrangements for executing specific programs
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
G06F 9/451 - Execution arrangements for user interfaces
51.
METHOD AND DEVICE FOR PREVENTING MALICIOUS ACCESS TO LOGIN/REGISTRATION INTERFACE
Disclosed are a method and a device for preventing malicious access to a login/registration interface. The method comprises: monitoring login/registration activity on the login/registration interface of a designated platform and, by statistically analyzing the monitoring results, determining whether malicious access to the login/registration interface has occurred; if so, then by analyzing the logs of the designated platform, identifying the source IP address of said malicious access to the login/registration interface; blocking said source IP address. The present technical solution provides effective countermeasures to malicious access to the login/registration interface of a platform. Blocking the source IP addresses of malicious access to login/registration interfaces ensures malicious attackers cannot continue to maliciously access the platform login/registration interface from the source IP address, thereby stopping malicious access at the source.
Provided are an upgrade method and device for an account of a designated platform. The method comprises: when a user uses a first type of account on a terminal device to log in to a designated platform, determining whether a second type of account exists on the terminal device (S110); if the second type of account exists, displaying the existing second type of account as an option for the user (S120); if no second type of account exists, displaying a login page for a second type of account so that the user can input the existing second type of account or register a new second type of account (S130); and performing mapping between the second type of account selected, inputted or newly registered by the user and user data of the first type of account of the user so that the user can use the second type of account to log in to the designated platform subsequently (S140). When an upgrade is to be performed on an account used to log in to a designated platform, the solution of the invention minimizes manual operations for a user, thereby providing the user with a highly efficient, convenient and intuitive account upgrade experience.
The present invention provides a method and device for mining Android system vulnerabilities: obtaining a function relevant to any Android service port, and parameter information corresponding to said function; on the basis of the parameter information, generating a random parameter corresponding to said function; on the basis of the function and said random parameter, executing a call process by means of the android system service port, and extracting a log of the execution results; on the basis of said log of execution results, determining whether any system vulnerabilities are present at the Android system port. The present invention actively simulates Android system service port execution of call processes, and checks for a system crash after call processing is complete, and accurately predicts which call process executed by an Android system service port will cause a crash in a real operating setting, thus providing a reliable basis for repair solutions for mined vulnerabilities.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
54.
SECURITY DOMAIN NAME SYSTEM AND FAULT PROCESSING METHOD THEREFOR
The present invention provides a security domain name system and a fault processing method therefor. The security domain name system comprises: a first node, suitable for providing a domain name resolution service for a DNS request initiated by a client side; a second node used as an agent node of the first node, suitable for requiring a third node to answer the DNS request when the first node is in a DNS resolution fault; an authorization information database, suitable for storing all DNS requests in a designated area and corresponding authorization information; and the third node, suitable for receiving the DNS requests from the second node, calling the corresponding authorization information in the authorization information database, and answering the DNS requests. In embodiments of the present invention, a third node only answers a DNS request forwarded by a second node, thereby ensuring the response capability and speed of the third node when a domain name resolution service is provided, and increasing the security and stability of domain name resolution.
The present invention provides a data sharing method and system for a terminal, in which a user can send, via an input device, a control instruction to a vehicle traveling data recording terminal, such that the vehicle traveling data recording terminal can generate image data in real-time, instruct a third-party terminal to acquire the image data in real-time, and share the image data via a remote interface, such that the user can share the image data captured and generated by the vehicle traveling data recording terminal in real-time to achieve better real-time sharing. The user can share data in real-time just by performing a simple operation on the input device (for example, one-click sharing), and the input device is connected to the vehicle traveling data recording terminal via a Bluetooth wireless connection; therefore, convenience and security can be effectively ensured. Also provided are an input device and vehicle traveling data recording terminal.
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
56.
SYSTEM AND METHOD FOR TRIGGERING SMART VEHICLE-MOUNTED TERMINAL
A system and method for triggering a smart vehicle-mounted terminal, wherein an input device (100) sends broadcast information after recognizing an input event, and a smart vehicle-mounted terminal (200) which communicates with the input device (100) by means of the Bluetooth low energy technology receives the broadcast information and generates image data in response to the broadcast information. Therefore, a user can operate the input device (100) to enable the smart vehicle-mounted terminal (200) to generate image data by itself, for example, generating a picture or a small video, thereby improving use convenience. Because the input device (100) and the smart vehicle-mounted terminal (200) are connected by means of the Bluetooth low energy technology and the input device (100) sends related instructions by using broadcast information, the communication between the smart device (100) and the smart vehicle-mounted terminal (200) consume low energy and the smart vehicle-mounted terminal (200) can quickly obtain and respond to instructions, thereby greatly improving user experience and use convenience.
A processing method and device for an emoji string. The method comprises: adding, with respect to picture emoticons having a first mapping relationship between the picture-emoticons and emoji strings and on the basis of the first mapping relationship, a second mapping relationship between the emoji strings and Unicode code points (S302); combining the first mapping relationship and the second mapping relationship to establish a correspondence mapping relationship between the picture emoticons and the Unicode code points (S304); upon reception of a processing message for a specific picture emoticon, querying the Unicode code point corresponding to said picture emoticon by using the established correspondence mapping relationship between the picture emoticons and the Unicode code points (S502); and performing a processing operation carried in the processing message on the found Unicode code point (S504). By employing the above method and device, the present invention addresses the problem in which multiple operational steps need to be executed to complete a picture emoticon processing operation.
A physical position-based terminal monitoring method and system in a local area network, the terminal monitoring method comprising: creating a monitoring physical layer according to a physical location map, and defining an information point corresponding to a terminal in the monitoring physical layer; establishing the correlation between the terminal and the information point; and displaying a trigger event at the location of the corresponding information point in the monitoring physical layer when the trigger event occurs at the terminal. With the terminal monitoring method and system in the embodiment of the invention, various events that may occur at the terminal are displayed in real time on the monitoring physical layer, so that the monitoring process of terminals in an intranet is more visual and simpler, which reduces the requirement for professional background of related staffs so that the monitoring of intranet terminals tends to be administrative participation, and may improve the user experience.
The invention relates to the technical field of computer technology. Disclosed are an asynchronous login method and device. The method comprises: receiving a login request, wherein the login request comprises user identification information; performing, according to the user identification information, a login operation asynchronously; after a successful login, asynchronously uploading, according to the user identification information, to a game server, game data of a flash component in a current state in a web page; updating, by the game server, and according to current game data, personalized data corresponding to the user identification information; and acquiring, from the game server, partial rendering data, and performing, according to the partial rendering data, partial rendering on the web page to save the current state of the flash component, wherein the partial rendering data comprises the personalized data. The invention ensures that a state of a flash component remains unchanged, and is favorable for synchronously rendering game data, obtained by a user playing as a guest in a flash game, on a display region of a non-flash component in a flash game web page.
The present invention relates to the technical field of information, and disclosed are a multimedia data encryption method and apparatus. The method comprises: firstly acquiring multimedia data to be transmitted; then dividing the multimedia data into a plurality of multimedia data units; then respectively encrypting the plurality of multimedia data units through pre-set encryption rules; and finally sending the encrypted plurality of multimedia data units to a client. According to the above-mentioned method and apparatus, the transmission security of the multimedia data can be guaranteed, and network system resources occupied by the encrypted multimedia data in the transmission process can be reduced.
H04N 21/2347 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
61.
DATA COMMUNICATION METHOD, APPARATUS AND SYSTEM IN COMMUNICATION PROCESS
Disclosed are a data communication method, apparatus and system in a communication process. The method comprises: during a call between a first user equipment and a second user equipment, detecting a request for activating a first instant communication plug-in on a call interface of the first user equipment; requesting a server to establish an instant communication data channel between the first instant communication plug-in and a second instant communication plug-in via the first instant communication plug-in, wherein the second instant communication plug-in is an instant communication plug-in on a call interface of the second user equipment; displaying the instant communication data channel on the call interface via a data interactive window; and sending data to be sent to the second user equipment via the data interactive window. The present invention satisfies people's increasing personalized and convenient communication demands.
A method for recognizing a hijacked browser and a browser. A browser acquires a web page access request and operation information corresponding thereto (S101); the browser detects whether the operation information satisfies a pre-set rule, wherein the pre-set rule comprises an operation request allowed by the browser (S102); when detecting that the operation information does not satisfy the pre-set rule, the browser recognizes that the browser has been hijacked (S103); and when detecting that the operation information satisfies the pre-set rule, the browser recognizes that the browser is not hijacked (S104). By means of the method for recognizing a hijacked browser and the browser, the technical problem of low accuracy of the method for determining whether a browser is hijacked in the prior art is solved, and the technical effect of improving the accuracy of determining whether a browser is hijacked is realized.
A method and device for processing a hijacked browser. Whether a browser is hijacked is recognized (S101); when the browser is recognized to be hijacked, identification information about an original web page, which is not hijacked and corresponds to the hijacked web page, loaded on the browser is acquired (S102); address information about the original web page is acquired from a local storage device according to the identification information about the original web page (S103); a page content of the original page is acquired based on the address information (S104); and the page content is loaded in the browser, so as to display the page content (S105). By means of the method and device for processing a hijacked browser, the technical problem in the prior art that, when a browser is hijacked, the processing method is long in processing time is solved, thereby achieving the technical effects of shortening the processing time and improving the utilization rate of the browser during the processing of a hijacked browser.
Disclosed are an information search method and device. The method comprises: receiving a first search result which is obtained by means of a search engine initiating a search regarding a query (S102); calling an interactive session application, and establishing an interactive session interface for an interactive session between the search engine and a user making the query (S104); and in the interactive session interface, creating a session box corresponding to the search engine, inputting a first search result into the session box and displaying same (S106). The method reduces operation steps, increases search efficiency and improves the user experience.
Disclosed are a page loading method and apparatus. A page to be loaded contains a structure code and a script code. The script code contains information about a first file for exhibiting on the page. The method comprises: loading the structure code; loading the script code after the structure code loading is finished, and loading the first file for exhibiting on the page according to the information about the first file contained in the script code when loading the script code. According to the technical solution of the present invention, because file information is recorded in a script code, the speed of loading a structure code is relatively quick, so the structure of a web page can also be displayed to a user more quickly, making the user able to view the web page earlier.
A data storage processing method and device, the method comprising: store data respectively in a database, a first-level cache and a second-level cache (S110); upon receiving a data query request, first query the first-level cache (S120); if the requested data exists in the first-level cache, then return the queried data to the requester, if it is impossible to obtain a query result from the first-level cache then query the second-level cache (S130); if the requested data exists in the second-level cache, then return the queried data to the requester, if it is impossible to obtain a query result from the second-level cache then query the database (S140); if the requested data exists in the database, then return the queried data to the requester, if the requested data does not exist in the database then return a query fail result to the requester (S150). The method reduces database access pressure, reducing equipment loss, and decreasing staff and maintenance costs.
A security state identifying and alarming method for an intelligent terminal. The method comprises: an intelligent terminal receives sensing data used for representing startup of a vehicle, and activates a security protection and control process according to the sensing data; driven by the security protection and control process, the intelligent terminal establishes a trusted communication connection with a target object according to preset communication connection configuration information; the intelligent terminal sends alarm information when the establishment of the trusted communication connection fails. In said method, whether to transmit alarm information is determined according to whether a trusted communication connection is successfully established, so that false alarming can be effectively avoided. The intelligent terminal may be independent of a vehicle electronic control system and can be simply placed on a vehicle when in use. The intelligent terminal can be repaired without touching the vehicle electronic control system, so that the costs for maintenance are low. Even if the intelligent terminal is damaged and requires repair, the vehicle can still be used, and no inconvenience is caused. Also provided are a system for implementing the method and an intelligent terminal.
B60R 25/102 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
A parent task progress update method and apparatus, wherein a parent task contains a plurality of sub-tasks. The method comprises: respectively calculating the maximum execution time of each sub-task of a plurality of sub-tasks (S100); dividing the progress of a parent task according to the maximum execution time of each sub-task to determine the progress percentage corresponding to each sub-task (S101); and during a sub-task execution process, if it is detected that the execution of any of the sub-tasks has finished, adding the progress percentage corresponding to the sub-task to the parent task progress to update the parent task progress (S102).
A terminal locating frequency regulating method and system and a locating interval regulating method and system. The terminal locating frequency regulating method specifically comprises: performing locating according to a known locating frequency (S110); reading induction data of an acceleration sensor (S120); after the induction data meets a preset condition, correspondingly regulating the locating frequency according to increment or decrement, relative to a standard displacement value, of a displacement value of a terminal between two successive times of locating, and increasing or decreasing the locating frequency relative to the standard locating frequency (S130). Terminal locating not only can ensure locating accuracy, but also can ensure low power consumption.
A method for handling a conflict between slide events comprises: monitoring a loaded webpage; when a slide event occurring between tabs having switching properties within the webpage is monitored, performing a corresponding switch between the tabs having the switching properties within the webpage; and when a slide event occurring between tabs other than the tabs having the switching properties is monitored, performing a switch between different webpages. Alternatively, when a slide event occurring on a webpage is monitored, if a switching identifier can be acquired reflexively, a corresponding switch is performed, according to the switching identifier, between tabs having switching properties within the webpage, or between different webpages, or, if a switching identifier cannot be acquired reflexively, and a slide event occurring between the tabs having the switching properties is monitored, a corresponding switch is performed between the tabs, otherwise a switch is performed between different webpages. Either of the above two methods can distinguish different purposes to be achieved by slide events performed by a user, thereby preventing an erroneous response.
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
73.
Display screen with an animated graphical user interface
The present invention relates to the technical field of safety. Provided is a method for obtaining a picture by means of remote control. The method for obtaining a picture by means of remote control comprises the steps of: receiving a picture obtaining instruction comprising geographic information; searching for multiple mobile terminal communication interfaces matching the geographic information; broadcasting a snapshot instruction to the mobile terminal communication interfaces; and receiving a snapshot picture in response to the snapshot instruction. Correspondingly, the present invention also provides a server using the method. In the present invention, a movable mobile terminal is used as camera device, the mobile terminal is remotely controlled to obtain a target picture, illegal behaviors are monitored and checked in a comprehensive manner, illegal destruction is prevented, the construction cost of a monitoring system is reduced, the reliability is high, and the maintenance is facilitated.
Disclosed are a method and apparatus for accessing an intelligent device based on instant messaging. The method comprises: acquiring, in an instant messaging client end, a first instant messaging account configured for an intelligent device, wherein a second instant messaging account is logged in the instant messaging client end; requesting an instant messaging server to establish a binding relationship between the first instant messaging account and the second instant messaging account; and loading information about the first instant messaging account in an interface of the second instant messaging account according to the binding relationship. The embodiments of the present invention realize the instant communication of an intelligent device, thereby avoiding the installation of a large number of independent applications, and greatly improving the convenience of a control operation. A decrease of the number of applications also results in a decrease of the occupation of terminal resources. Moreover, each manufacturer does not necessarily need to configure an independent application for each intelligent device, and therefore development costs for the intelligent device are reduced.
Disclosed are a method, apparatus and system for performing configuration setting between devices, which relate to the field of intelligent hardware, and solve the problem of a cumbersome operation during performing configuration setting between devices. The method comprises: a portable device monitoring a state of a hardware interface itself; when monitoring that an external device accesses the hardware interface, the portable device establishing a communication connection with a terminal; the portable device sending state activation information to the terminal via the communication connection; the portable device receiving data information about an application program sent by the terminal via the communication connection; and the portable device outputting the data information via the external device. The present invention is mainly used for configuration setting between intelligent hardware devices.
Disclosed are a method and device for image display. The method comprises: acquiring an image to be displayed; acquiring information of a display area that corresponds to the image; processing the image on the basis of the display area information and displaying the processed image in the display area, the dimension of the processed image in a first direction being the same as the dimension of the display area in the first direction, the dimension of the processed image in a second direction being larger than the dimension of the display area in the second direction, and the first direction being perpendicular to the second direction; upon receiving a corresponding slide instruction, the displayed processed image slides correspondingly in the second direction so as to display a partial image not displayed before the corresponding slide instruction is received.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
80.
VOICE RECOGNITION METHOD APPLICABLE TO INTERACTIVE SYSTEM AND DEVICE UTILIZING SAME
A voice recognition method applicable to an interactive system and a device utilizing the same. The method comprises: predetermining, according to an interaction state and an expected answer with respect to the interaction state, from a voice recognition sample database, a plurality of expected samples corresponding to the interaction state and the expected answer (S110); dividing the plurality of expected samples corresponding to the expected answer into two or more sample sets, wherein each of the two or more sample sets comprises at least one of the expected samples (S120); collecting a voice signal of a user in the interaction state (S130); matching the voice signal and an expected sample in one of the two or more sample sets (S140). The technical scheme can enhance a speed and accuracy of voice recognition in the interactive system.
The present invention discloses a method of modifying calling number display and a device utilizing the same. The method comprises: modifying a contact list of a second terminal by receiving an input real number and number or name of a first terminal and wishing to be displayed, to store the real number of the first terminal in the contact list of the second terminal and store the number or name wishing to be displayed as a corresponding contact name in the contact list; and when calling the number of the second terminal using the first terminal, displaying, according to the contact list, the number or name wishing to be displayed on the second terminal. The embodiment of the invention provides an effect of modifying a calling number display, and can be used in an exhibition of network security education, as well as providing entertainment among families and friends, having a favorable educational value and interactive entertaining value.
H04M 1/2745 - Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time using static electronic memories, e.g. chips
82.
CLASSIFICATION-BASED STORAGE METHOD FOR TARGET PICTURE, AND CORRESPONDING TERMINAL
A classification-based storage method for a target picture, and a corresponding terminal. The classification-based storage method for a target picture comprises steps of: capturing, in response to a capturing instruction with classification information, a target picture by using a camera (S11); adding the classification information to attribute information of the target picture (S12); and saving the target picture to a target folder corresponding to the classification information (S13). Also provided is a classification-based storage terminal for a target picture using the foregoing method, comprising: a capturing module (11), an attribute setting module (12), and a storage module (13). A target picture is stored, based on classification, in a corresponding target folder on the basis of classification information, and a user only needs to directly access the corresponding target folder when the user searches for the target picture, thereby facilitating the searching and improving the operability of the user.
The invention relates to the technical field of communications. Disclosed are an application internal page processing method and device. The invention uses a second IP address returned by a second DNS server to verify a first IP address returned by a first DNS server, and transmits to the verified first IP address a page access request generated in an application according a page access command. Moreover, a sign-on function can be called to determine whether a jump in a first response page in the application occurs, thereby timely and accurately determining whether a jump in the first response page occurs. Further, a scan script embedded in the first response page can be loaded to detect whether the first response page in the application has been tampered with, thereby timely and accurately determining whether the first response page has been tampered with, improving user experience, and guaranteeing information and property security for a user.
The present invention relates to the technical field of picture transmission of an intelligent terminal, and provides a tachograph picture transmission control method. The method comprises: a tachograph obtains a target picture in response to a user capturing instruction and stores the target picture to a local storage medium; the tachograph automatically uploads the target picture to a mobile terminal by using a first channel; at the same time, the mobile terminal automatically uploads the target picture that is automatically obtained from the first channel to a cloud end by using a second channel; and the tachograph deletes, according to a comparison result list that is obtained from the first channel and fed back by the mobile terminal, a target picture, specified to be stored in the local storage medium, in the comparison result list. The present invention also relates to a picture security protection and transmission method and a corresponding terminal. The present invention realizes the security protection and automatic real-time transfer of picture files, and avoids a picture loss that is caused when pictures are stored in a tachograph end and are covered due to a limited storage capacity.
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
85.
METHOD AND APPARATUS FOR GENERATING SIMULATED EVENT RESULT SET ACCORDING TO PRESET TEMPLATE
A method and apparatus for generating a simulated event result set according to a preset template, and an electronic device. The method comprises: acquiring reference data of a plurality of correlated events (S100); importing the reference data of the plurality of correlated events in the preset template, and generating simulated event results of the plurality of correlated events corresponding to original data of each simulated user using original data of a plurality of simulated users recorded in the preset template and a preset algorithm (S101); and gathering the simulated event results of the plurality of correlated events corresponding to the original data of all simulated users, so as to obtain a simulated event result set (S102).
Disclosed are a method and apparatus for downloading a file. The method comprises: downloading various blocks of a designated file, wherein the designated file is split into a plurality of blocks; after a block has been downloaded each time, judging whether a neighbouring relationship exists between the block and other blocks and/or synthetic blocks which have already been downloaded, and if so, combining the block with other blocks and/or synthetic blocks having a neighbouring relationship therewith, so as to obtain a synthetic block; and after the last block has been downloaded, combining the last block with blocks and/or synthetic blocks which have already existed, so as to obtain the designated file. Therefore, the problems that the processing speed is slow and the resource occupancy rate is large due to the fact that all the blocks are uniformly combined after having been downloaded when performing block downloading on a file are solved, thereby achieving the beneficial effects of combining the file which is divided into blocks while downloading same and saving download time for a user and device resources.
A game acceleration method and device. The method specifically comprises: in the running process of a game, clearing a first clearing object unrelated to a running effect of the game inside the game, wherein the first clearing object comprises: at least one of a functional module, a game resource, a memory resource and a network access. By means of the method, system resources and network traffic can be provided for a game as many as possible, so that the fluency of the game can be improved.
A method and device for recommending Apps to a mobile terminal during search. The method comprises: a first terminal receiving a search word from a user, and acquiring, according to the search word, at least one to-be-recommended App associated with the search word (102); generating a recommendation identifier for each to-be-recommended App according to the client environment in the first terminal (S104); and pushing each to-be-recommended App to a mobile terminal associated with the first terminal by utilizing the recommendation identifier (S106). The method and device for recommending Apps to a mobile terminal during search fulfills the objective of recommending Apps to a mobile terminal during search. Since the search word can reflect the search intention of a user directly, the user can be provided with more abundant search results by recommending to the user the to-be-recommended Apps associated with the search word of the user; thus extra help can be provided to the user, and such a situation is avoided where the user may be bothered by such App recommendation modes as window popup and hover advertising.
Disclosed are an enriched uniform resource locator (URL) identification method and apparatus. The method comprises: extracting one or more URLs; selecting candidate URLs from the one or more URLs; correlating each candidate URL with an anchor text; calculating the similarity between the anchor texts; and identifying an enriched URL from the candidate URLs according to the similarity. The embodiments of the present invention can prevent a search engine from grabbing spam and repeated web pages during web page grabbing, thereby greatly reducing the bandwidth waste during grabbing, and further reducing the burden of the search engine due to the reduction in the grabbing amount; and meanwhile, the search engine can additionally grab other good-quality web pages, thereby improving the coverage rate of the search engine during web page collection is increased and the timeliness of the search engine during web page collection.
Disclosed are a file sharing method, apparatus, and system based on cloud storage. The file sharing method based on cloud storage comprises: obtaining a selection for selecting a to-be-shared file and a sharing target; extracting information about the to-be-shared file and an identifier of the sharing target according to the foregoing operation; generating a cloud storage file sharing request according to the information about the to-be-shared file and the identifier of the sharing target; and uploading the cloud storage file sharing request to a cloud storage server. Using the solution of the present invention improves the transmission efficiency and reliability of a cloud storage file.
A method and apparatus for obtaining a resource on a cloud disk, and a method and apparatus for sorted storage of cloud resources. The method for obtaining a resource on a cloud disk comprises: entering private cloud space of a first user (S102); when the first user triggers a resource request event, generating a resource obtaining link carrying an address and a resource upload permission of the private cloud space (S104); and sending the resource obtaining link to a second user that is a resource provider, so that the second user uploads a resource (S106). A generated resource obtaining link carries an address and a resource upload permission of a private cloud space; therefore, a second user as a resource provider can upload a resource to the private cloud space of a first user by using the resource obtaining link.
A multicast transmission method for information to be transmitted, comprising the steps of: dividing a coding sequence of information to be transmitted into a plurality of code strings, and defining each code string and a corresponding index string allocated thereto and representing an index sequence as a coding unit; constructing a reference frame based on a multicast data frame format; constructing an information frame based on the multicast data frame format, so as to enable a destination address domain thereof to contain the first part content of the coding unit, and enable the difference between the frame length thereof and the frame length of the reference frame to contain the remaining part of the content of the coding unit; and transmitting the reference frame and the information frame. Also disclosed is a multicast data frame information extraction method according to a principle in the inverse of the method. In addition, also disclosed are implementation schemes for corresponding intelligent control terminals and intelligent devices corresponding to the two methods. By means of the present invention, information transmission is conducted using a multicast data frame without depending on a pre-established connection between the two transmission parties, thereby simplifying the communication process, and making the effect of communication between devices quick and efficient.
A webpage classification method and apparatus. The method comprises: parsing a plurality of webpage elements from a webpage to be predicted (101); according to each webpage element, respectively predicting a candidate webpage classification to which the webpage to be predicted belongs (102); and by comparing the candidate webpage classification respectively predicted by each webpage element, determining a final webpage classification of the webpage to be predicted (103). Thus, a fully automated classification process is realized, without the need for manual involvement, and the webpage classification efficiency is greatly improved. Especially for massive webpages of a whole network and a webpage newly generated on the Internet, rapid and effective classification can be realized, and the timeliness of webpage classification can be ensured.
A method and device for generating indication information in a search result page. The method comprises: monitoring a trigger event of a link corresponding to a search result item in a search result page (S102); and upon detection of the trigger event of the link corresponding to the search result item, generating indication information representing, at a designated location of the search result item, that a webpage corresponding to the link has been visited (S104). In the above technical solution, the generated indication information can clearly and visually mark that a webpage corresponding to a link has been visited, such that showing the indication information to a user can help the user to clearly distinguish a visited link from an unvisited link in a search result page, thus improving the search experience for the user.
Disclosed are a proxy gateway server, an authorization method thereof, and a game access system. The proxy gateway server comprises: a communication interface, applicable to receive a service providing request, sent by a game provider, comprising an authorization level and/or proxy service information of the game provider; a storage module, applicable to store a pre-configured authorization policy; and an authorization module, applicable to search the storage module for a matched authorization policy according to the authorization level and/or proxy service information of the game provider, and determining, according to the authorization policy, whether to provide proxy services to the game provider.
The present invention provides a subtitle-of-motion-picture loading method and apparatus for online playing. The subtitle-of-motion-picture loading method for online playing comprises: obtaining an online playing request of a video and audio file stored in the Cloud; extracting file information of the video and audio file; obtaining a subtitle-of-motion-picture file corresponding to the video and audio file according to the file information; and playing the video and audio file online in response to the online playing request, and loading the subtitle-of-motion-picture file corresponding to the video and audio file in the playing process. By means of the solution of the present invention, a corresponding subtitle-of-motion-picture file can be obtained by means of matching using file information of a played video and audio file, and the subtitle-of-motion-picture file is automatically loaded when the video and audio file is played online in the Cloud, thereby making it convenient for a user to watch content stored in the Cloud online; and the subtitle-of-motion-picture matching degree is high and user operations are omitted, thereby improving the use experiment of the user.
H04N 21/254 - Management at additional data server, e.g. shopping server or rights management server
H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/239 - Interfacing the upstream path of the transmission network, e.g. prioritizing client requests
99.
CLIENT TERMINAL DATA COLLECTION METHOD AND APPARATUS
A client terminal data collection method and apparatus, for compressing data parsing volume, greatly increasing the efficiency of character string checking, said method comprising: receiving a data upload request sent by a client terminal (101); calculating a first feature value for first data (102); looking up whether feature information produced on the basis of second data corresponding to identification information (103) is stored; when finding said feature information, determining whether the length of a first character string is the same as the length of the character string (104); when the length of the first character string is the same as the length of a second character string, determining whether the first feature value is the same as the second feature value (105); if so, then refusing to write the first data (106); if not, then writing the first data to cover the second data (107).