Abstract:
The present disclosure provides a method for adding contact information, and user equipment. The method includes: receiving gesture information input by a user on a communication interface of an instant messaging application, recognizing contact information in communication information according to the gesture information, and adding the contact information to an address book of user equipment.
Abstract:
A method for exchanging information between in-vehicle terminals, and an in-vehicle terminal is provided. The method includes a first in-vehicle terminal that triggers, by sending a broadcast message, at least one surrounding second in-vehicle terminal to establish a first relationship with the first in-vehicle terminal, and establishes a second relationship with at least one third in-vehicle terminal. The first in-vehicle terminal separately exchanges information about a correspondence type with the at least one second or third in-vehicle terminal so that more vehicles can intelligently exchange in-vehicle information, and exchange different information with different in-vehicle terminals. This can properly protect privacy information.
Abstract:
A multimedia session call control method and an Application Server (AS). The multimedia session call control method includes these steps: a multi-UE party performs a multimedia session with a peer under control of an AS; a master UE of the multi-UE party establishes a session with a third party under control of the AS; and the AS binds a call leg between a slave UE of the multi-UE party and the AS to the session established with the third party.
Abstract:
A method includes receiving, by an embedded universal integrated circuit card (eUICC), first information from a local profile assistant (LPA), where the first information includes a first certificate issuer (CI) public key identifier, and the first CI public key identifier is a CI public key identifier that the eUICC does not have. The method further includes sending, by the eUICC, second information to an OPS, where the second information includes the first CI public key identifier. The method further includes receiving, by the eUICC, a patch package from the OPS, where the patch package includes at least a first CI public key corresponding to the first CI public key identifier. The method further includes updating, by the eUICC, a CI public key of the eUICC by using the first CI public key.
Abstract:
A method for authenticating and updating an eUICC firmware version includes: receiving first information from a terminal device, where the first information includes a target identifier; searching a currently stored event record for a target event record, where a group event identifier in the target event record matches the target identifier in the first information; sending the target event record to the terminal device, where the target event record is used to enable the terminal device to download an eUICC firmware version update package; and updating a firmware version of an eUICC of the terminal device based on the eUICC firmware version update package.
Abstract:
A method includes receiving, by an embedded universal integrated circuit card (eUICC), first information from a local profile assistant (LPA), where the first information includes a first certificate issuer (CI) public key identifier, and the first CI public key identifier is a CI public key identifier that the eUICC does not have. The method further includes sending, by the eUICC, second information to an OPS, where the second information includes the first CI public key identifier. The method further includes receiving, by the eUICC, a patch package from the OPS, where the patch package includes at least a first CI public key corresponding to the first CI public key identifier. The method further includes updating, by the eUICC, a CI public key of the eUICC by using the first CI public key.
Abstract:
A method for authenticating and updating an eUICC firmware version includes receiving first information sent by a terminal device, where the first information includes a target identifier. The method further includes searching a currently stored event record for a target event record, where a group event identifier in the target event record matches the target identifier in the first information. The method further includes sending the target event record to the terminal device, where the target event record is used to enable the terminal device to download an eUICC firmware version update package. The method further includes updating a firmware version of an eUICC of the terminal device based on the eUICC firmware version update package.
Abstract:
A first user equipment establishes a multimedia session with a second user equipment and receives a media stream adding request directed at the multimedia session of the first user equipment. The media stream adding request includes an identity of a third user equipment and the media type of the media flow requested to be added. The third user equipment is controlled to establish a media stream of the media type with the second user equipment.
Abstract:
A method includes: receiving, by an embedded universal integrated circuit card eUICC, first information sent by a local profile assistant LPA, where the first information includes a first certificate issuer CI public key identifier, and the first CI public key identifier is a CI public key identifier that the eUICC does not have; sending, by the eUICC, second information to an OPS by using the LPA, where the second information includes the first CI public key identifier; receiving, by the eUICC, a patch package sent by the OPS by using the LPA, where the patch package includes at least a first CI public key corresponding to the first CI public key identifier; and updating, by the eUICC, a CI public key of the eUICC by using the first CI public key.
Abstract:
A method is implemented by an embedded universal integrated circuit card (eUICC) installed in a terminal, where a profile is installed in the eUICC, and where the profile is locked according to a policy rule. The method includes determining, by the terminal, identifier information and verification information of the profile that needs to be unlocked, where the identifier information of the profile is used to identify the profile installed in the terminal, and sending, by the terminal, a first unlock message to the eUICC, where the first unlock message carries the identifier information and the verification information of the profile, and where the first unlock message is used to instruct the eUICC to determine the profile and unlock the profile according to the policy rule after verification performed according to the verification information succeeds.