Abstract:
A method for establishing a Bluetooth® connection, where the method includes: establishing data connections with at least two Bluetooth® devices; obtaining a voice connection instruction, where the voice connection instruction includes identification information of a target Bluetooth® device selected by a user from the Bluetooth® devices; and establishing a voice connection between the mobile terminal and the target Bluetooth® device according to the voice connection instruction; and a mobile terminal, a Bluetooth® device, and a system. A voice connection is established with a Bluetooth® device selected by a user, so as to improve an extent to which a Bluetooth® connection is established intelligently and a capability of interacting with the user. Therefore, the user can, according to needs, freely select a Bluetooth® device with which a connection is established, thereby improving convenience of the user in using the Bluetooth® device.
Abstract:
An information processing method and apparatus, an information retrieval method and apparatus, a user terminal, and a server are provided. The retrieval method includes receiving, by a first user terminal, information from a second user terminal, about an address used to save an encrypted file of the second user terminal, acquiring, from a cloud server and a trusted server, privacy information, non-privacy information, and a shared key that correspond to the address information, obtaining address information of a to-be-accessed file by searching the privacy information and the non-privacy information, acquiring, from the cloud server, a first encrypted file corresponding to the address information of the to-be-accessed file, and decrypting the first encrypted file by using the shared key, to obtain the to-be-accessed file.
Abstract:
An information processing method, a trusted server, and a cloud server. The method includes acquiring user data of a user terminal, extracting summary information of the user data, where the summary information includes privacy information and non-privacy information of a user, generating a unique identifier (UID) for the privacy information, and transmitting the non-privacy information and the UID to a cloud server, so that the cloud server saves a correspondence between the non-privacy information and the UID.
Abstract:
A method includes receiving a request by a second user through a uniform resource locator (URL) for a user key of a shared file of a first user. The second user is a legitimate user authorized by the first user through a trust center to access the shared file. The shared file is a shared file encrypted by using the user key of the first user. A file description of the corresponding shared file is obtained from a cloud server according to the URL. The file description is a file description obtained by encrypting the user key by using a public key of the trust center. The file description is decrypted using a private key corresponding to the public key of the trust center to obtain the user key of the first user. The user key is sent to the second user.
Abstract:
A method for establishing a Bluetooth® connection, where the method includes: establishing data connections with at least two Bluetooth® devices; obtaining a voice connection instruction, where the voice connection instruction includes identification information of a target Bluetooth® device selected by a user from the Bluetooth® devices; and establishing a voice connection between the mobile terminal and the target Bluetooth® device according to the voice connection instruction; and a mobile terminal, a Bluetooth® device, and a system. A voice connection is established with a Bluetooth® device selected by a user, so as to improve an extent to which a Bluetooth® connection is established intelligently and a capability of interacting with the user. Therefore, the user can, according to needs, freely select a Bluetooth® device with which a connection is established, thereby improving convenience of the user in using the Bluetooth® device.
Abstract:
Embodiments of the present invention provide a method for sharing an application between terminals. The method includes: generating, by a first terminal according to an application that has been installed, a shared application installation package of the application; sending, by the first terminal, the shared application installation package to a second terminal; determining, by the first terminal, shared data of the application that has been installed, where the shared data is data that is from an application server and required for the application to run; and sending, by the first terminal, the shared data to the second terminal. In the embodiments of the present invention, when sharing an application, two terminals not only share an installation package of the application, but also share shared data of the application.
Abstract:
Embodiments of the present disclosure provide a method for sharing an application between terminals, and a terminal, so as to facilitate user operations at a receiving end. The method includes: generating, by a first terminal according to an application that has been installed, a shared application installation package of the application; sending, by the first terminal, the shared application installation package to a second terminal, so that the second terminal installs the shared application installation package; determining, by the first terminal, shared data of the application that has been installed, where the shared data is data that is from an application server and required for the application to run; and sending, by the first terminal, the shared data to the second terminal, so that the second terminal uses the shared data when running the shared application.
Abstract:
A certificateless multi-proxy signature method and apparatus, where the method may include computing, by a proxy signature device, a public key and a private key of the proxy signature device according to a public parameter, where the public key is corresponding to the private key, acquiring a verification result of a standard signature and determining, according to the verification result, whether the standard signature is valid, computing a partial proxy signature of the proxy signature device according to the private key if the verification result is used to represent that the standard signature is valid, and sending the partial proxy signature to a proxy signature device administrator, so that after the proxy signature device administrator obtains a multi-proxy signature through computation according to the partial proxy signature, a multi-proxy signature verification device verifies the multi-proxy signature.
Abstract:
An installation package authorization method implemented by a first terminal includes: acquiring an installation package of a target application and an identifier of the target application that are sent by a second terminal; generating an application authorization request according to the identifier of the target application, where the application authorization request includes: indication information indicating that the installation package does not need to be downloaded, the identifier of the target application, and user identity information of the first terminal; sending the application authorization request to an application server; receiving authorization information, which is sent by the application server, of the target application, where the authorization information includes the user identity information, and the user identity information is registration information of the first terminal on the application server; and updating usage permission for the target application by using the user identity information.
Abstract:
Embodiments disclosed herein relate to the field of computer technologies, and disclose a two-dimensional code processing method and a terminal, which can reduce time for a user to learn content indicated by a two-dimensional code, thereby improving a user experience effect. The method provided by the embodiments of the present invention includes: scanning a two-dimensional code using a camera to obtain two-dimensional code information; sending a first request message including the two-dimensional code information to a server, where the first request message is used to enable the server to determine description information corresponding to the two-dimensional code information; receiving the description information sent by the server; and outputting the description information, so that the user determines, according to the description information, whether to acquire detailed information corresponding to the two-dimensional code information.