-
公开(公告)号:USD1012056S1
公开(公告)日:2024-01-23
申请号:US29811139
申请日:2021-10-12
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Designer: Ting Xu , Fei Wang , Guang Cao , Zedong Zeng
Abstract: FIG. 1 is a front perspective view of a phone in an open position, showing our new
FIG. 2 is a front view thereof;
FIG. 3 is a back view thereof;
FIG. 4 is a top view thereof;
FIG. 5 is a bottom view thereof;
FIG. 6 is a right side view thereof;
FIG. 7 is a left side view thereof;
FIG. 8 is a back perspective view thereof;
FIG. 9 is a front perspective view of the phone in a closed position;
FIG. 10 is a front view thereof;
FIG. 11 is a back view thereof;
FIG. 12 is a top view thereof;
FIG. 13 is a bottom view thereof;
FIG. 14 is a right view thereof;
FIG. 15 is a left view thereof; and,
FIG. 16 is a back perspective view thereof.
The broken lines in drawings show portions of the phone that form no part of the claimed design.-
公开(公告)号:US20180067777A1
公开(公告)日:2018-03-08
申请号:US15559790
申请日:2015-03-20
Applicant: Huawei Technologies Co., Ltd.
Inventor: Fei Wang
CPC classification number: G06F9/5055 , G06F9/445 , G06F9/5011 , G06F11/368 , G06F21/44
Abstract: Embodiments of the present invention disclose an application protection method, a server, and a terminal. The application protection method includes: receiving an application download request that is for a target application and that is sent by a terminal, where the application download request carries terminal identification information of the terminal; compiling an application installation package of the target application according to the terminal identification information; and sending the compiled application installation package to the terminal, so that the terminal installs the target application in a running environment that is based on the terminal identification information, where the running environment is obtained by the terminal by compiling a preset intermediate file of the terminal according to the terminal identification information, and the preset intermediate file includes a runtime file and a framework file. Application security can be effectively improved and stability of a software industry chain ecosystem can be effectively improved.
-
公开(公告)号:US20250053830A1
公开(公告)日:2025-02-13
申请号:US18927818
申请日:2024-10-25
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Fei Wang , Jun Fan , Liangfeng Jin , Zhipei Jin , Zhao Yang , Yang Fu
IPC: G06N5/02 , G06Q30/0601
Abstract: A method for creating a configuration knowledge base, includes: determining a hierarchical structure between a plurality of modules in a product family based on the plurality of modules; determining a knowledge package of each module based on the hierarchical structure; and releasing the knowledge package of each module in the product family to a configuration knowledge base, to obtain a configuration knowledge base of the product family. The hierarchical structure indicates a hierarchical relationship between a parent module and a child module in the plurality of modules. Each parent module includes one or more child modules. A knowledge package of the parent module includes an input interface algorithm of the child module associated with the parent module.
-
公开(公告)号:USD982541S1
公开(公告)日:2023-04-04
申请号:US29704106
申请日:2019-09-01
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Designer: Joon Suh Kim , Joon Hyung Kim , Ting Xu , Jie Huang , Fei Wang , Zhiqiang Jiang , Guang Cao
-
公开(公告)号:US11579899B2
公开(公告)日:2023-02-14
申请号:US16820964
申请日:2020-03-17
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Qibin Yang , Fei Wang
IPC: G06F21/62 , G06F9/54 , G06F16/245 , G06F9/445 , G06F21/52
Abstract: A method and a device for managing a node includes: initiating, by an application program, a first request by calling an interface function, where the first request is used to perform an operation on a feature node in a kernel; searching, based on a keyword of the interface function, a table used for node management for an entry corresponding to the feature node, where the entry includes a node identifier of the feature node and a user handle identifier of the feature node; and performing, by the user program, the operation on the feature node based on the user handle identifier. A program running in user space can be prevented from directly accessing a feature node in kernel space, thereby improving system security.
-
公开(公告)号:USD959397S1
公开(公告)日:2022-08-02
申请号:US29724318
申请日:2020-02-14
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Designer: Ting Xu , Jie Huang , Guang Cao , Mengyao Xie , Fei Wang
-
公开(公告)号:US20200218816A1
公开(公告)日:2020-07-09
申请号:US16820964
申请日:2020-03-17
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Qibin Yang , Fei Wang
IPC: G06F21/62 , G06F9/54 , G06F16/245 , G06F9/445 , G06F21/52
Abstract: A method and a device for managing a node includes: initiating, by an application program, a first request by calling an interface function, where the first request is used to perform an operation on a feature node in a kernel; searching, based on a keyword of the interface function, a table used for node management for an entry corresponding to the feature node, where the entry includes a node identifier of the feature node and a user handle identifier of the feature node; and performing, by the user program, the operation on the feature node based on the user handle identifier. A program running in user space can be prevented from directly accessing a feature node in kernel space, thereby improving system security.
-
公开(公告)号:US20240414225A1
公开(公告)日:2024-12-12
申请号:US18808105
申请日:2024-08-19
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Fei Wang , Chenghui Peng , Jun Wang , Zhe Liu , Jianjun Wu
IPC: H04L67/1008 , G06F9/48 , H04L41/084 , H04L41/5019
Abstract: In a method for task execution, a first node receives from a second node a first message that includes first configuration information of a first task. The first node then executes the first task based on the first configuration information.
-
公开(公告)号:US11895713B2
公开(公告)日:2024-02-06
申请号:US17953070
申请日:2022-09-26
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Yuchi Ma , Fei Wang , Bifeng Tong
Abstract: A data sharing and instruction operation control method, and a system are provided. The method includes: a first terminal establishes a communication connection to a second terminal; the second terminal displays a user interface of a camera application, wherein the user interface includes a photographing parameter adjustment option; the second terminal sends the user interface including the photographing parameter adjustment option to the first terminal; the first terminal may tap the photographing parameter adjustment option on the user interface, and send a control instruction to the second terminal; and the second terminal adjusts a photographing parameter of the camera application based on the control instruction, and displays a user interface obtained after the parameter adjustment.
-
公开(公告)号:USD1011328S1
公开(公告)日:2024-01-16
申请号:US29821174
申请日:2021-12-28
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Designer: Ting Xu , Jie Huang , Fei Wang , Zedong Zeng , Guang Cao
Abstract: FIG. 1 is a front perspective view of a first embodiment of a mobile phone, showing our new design in an unfolded state;
FIG. 2 is a front view thereof;
FIG. 3 is a back view thereof;
FIG. 4 is a top view thereof;
FIG. 5 is a bottom view thereof;
FIG. 6 is a right side view thereof;
FIG. 7 is a left side view thereof;
FIG. 8 is a back perspective view thereof;
FIG. 9 is a front perspective view thereof, showing our new design in a folded state;
FIG. 10 is a back perspective view thereof, showing our new design in a folded state;
FIG. 11 is a front perspective view of a second embodiment of a mobile phone, showing our new design in an unfolded state;
FIG. 12 is a front view thereof;
FIG. 13 is a back view thereof;
FIG. 14 is a top view thereof;
FIG. 15 is a bottom view thereof;
FIG. 16 is a right side view thereof;
FIG. 17 is a left side view thereof;
FIG. 18 is a back perspective view thereof;
FIG. 19 is a front perspective view thereof, showing our new design in a folded state;
FIG. 20 is a back perspective view thereof, showing our new design in a folded state;
FIG. 21 is a front perspective view of a third embodiment of a mobile phone, showing our new design in an unfolded state;
FIG. 22 is a front view thereof;
FIG. 23 is a back view thereof;
FIG. 24 is a top view thereof;
FIG. 25 is a bottom view thereof;
FIG. 26 is a right side view thereof;
FIG. 27 is a left side view thereof;
FIG. 28 is a back perspective view thereof;
FIG. 29 is a front perspective view thereof, showing our new design in a folded state; and,
FIG. 30 is a back perspective view thereof, showing our new design in a folded state.
The broken lines in drawings show portions of the mobile phone that form no part of the claimed design.
-
-
-
-
-
-
-
-
-