Abstract:
The present invention discloses a method for remotely controlling a mobile terminal and a mobile terminal, wherein the method comprises: receiving, by a first mobile terminal, a touch-screen operation to an interface to be controlled, wherein the interface to be controlled is sent by a second mobile terminal during a video call, and acquiring a first touch-screen coordinate of the operation; converting, by the first mobile terminal, the first touch-screen coordinate into an interface coordinate of the interface to be controlled; and sending, by the first mobile terminal, the interface coordinate to the second mobile terminal to control the interface to be controlled. By way of the present invention, the effect of remotely controlling mobile terminals is achieved, and the application of assisting others to solve problems or sharing a mobile terminal with others via videophones is achieved, which greatly enriches the contents of videophones and provides wider application space for the business application of videophones.
Abstract:
The disclosure provides a method and a terminal for locking/unlocking a screen of a terminal based on Radio Frequency Identification (RFID). The method includes: the terminal receives locking or unlocking information carrying authentication information from an external electronic tag via an RFID reader; user identity authentication is performed according to the authentication information; and the screen of the terminal is locked or unlocked according to the locking or unlocking information, after the authentication succeeds. With the method and the terminal, user experience can be achieved by waving a mobile phone and the screen can be opened while being unlocked, thus, the user experience of locking/unlocking screen is improved.
Abstract:
The present invention discloses a method for user position notification and a mobile terminal thereof. The mobile terminal includes: an acquisition module configured for acquiring videophone images and mobile terminal position information; a transmitter module configured for concurrently transmitting the video phone images and position information to the call opposite end of the mobile terminal. The present invention enables the user to acquire the position and video images of the opposite end at the same time, and therefore improves satisfaction of the user.
Abstract:
A video image sending method, device and system is provided, relating to a video image processing technology being used for reliably and effectively sending a 3D video with a bandwidth required by the existing H.263. The video image sending method is adapted to send a 3D video image between video players, comprising: comparing an acquired first video image and an acquired second video image to find out macro blocks in the second video image which are different from those in the first video image; and sending the first video image and the macro blocks, as an I-frame video image, to a network side.
Abstract:
The disclosure relates an information display method which comprises when editing information, a sending end marks, with a 3D display label, a content required by a user or a content designated by a system, encodes the information and sends the encoded information; a receiving end receives the information, parses the information to obtain the content with the 3D display label, pre-processes the obtained content to obtain a 3D view, and display the 3D view in 3D mode. Through the technical solution of the disclosure, the 3D display content is marked and the 3D display processing manner is performed, so that some contents in the information can be effectively displayed with a 3D effect with respect to other contents, thereby achieving the enhancement effect, raising concern of the user, and effectively improving the user experience when the user views the information.
Abstract:
A mobile terminal and an abnormal call processing method thereof relate to the field of communications. The method includes: in the process of a voice call, a mobile terminal detecting whether the mobile terminal is in an idle call state in real time, and when it is detected that the mobile terminal is in the idle call state, in accordance with a preset mode, prompting a user that the voice call has ended, or automatically hanging up the voice call, or hanging up the voice call after prompting the user that the voice call has ended. The present application also discloses a mobile terminal. The technical solution of the present application solves the problem of wasting the telephone expenses of a user caused by an ultra-long call because both sides on a call do not hang up the call in time, thereby improving the user experience.
Abstract:
A method for transmitting a three-dimensional (3D) picture in an MMS message is disclosed. The method includes: in a Synchronized Multimedia Integration Language (SMIL) file, a sender assigns a same Identifier (ID) for two different pictures, sets an attribute of each of the two pictures as a 3D display picture, and sends the two pictures to a receiver; or, a sender synthesizes two different pictures in the SMIL file into a file, assigns an ID for the synthesized file, sets an attribute of the ID as a 3D display picture, and sends the synthesized file to a receiver; and the receiver displays the two pictures in a 3D mode. A system for transmitting a 3D picture in an MMS message is also disclosed. With the technical solution of the disclosure, the problem that transmission of a 3D picture cannot be supported in an existing protocol can be solved.
Abstract:
A processing system configured for capacitive sensing comprises transmitter circuitry, a first internal diagnostic mechanism, and a determination module. The transmitter circuitry is configured to transmit during a first time period with a first transmitter path of a plurality of transmitter paths in an input device. Each transmitter path of the plurality of transmitter paths is configured for capacitive sensing. The first internal diagnostic mechanism comprises a selectable leakage path. The selectable leakage path is configured to be coupled with the transmitter circuitry. The determination module is configured to determine if a discontinuity exists within the first transmitter path based on a discharge rate for the first transmitter path. The discharge rate is acquired during a second time period via the selectable leakage path of the first internal diagnostic mechanism, wherein the second time period occurs after the first time period.
Abstract:
Circuits for the restoration of a drooped signal are disclosed. In the asynchronous mode circuit, the drooped signal can be restored by detecting the peak of the positive amplitude and the peak of the negative amplitude and take the difference between the two peaks. This difference signal is fed back the equalizer. In the synchronous mode circuit, the drooped signal is sliced and passed to a regeneration circuit. The regeneration circuit uses reference voltage signals and phase information from the slicer to generate a regenerated signal. The regenerated signal is compared with the equalized signal to generate a difference signal, again fed back to the equalizer. The sliced signal is also fed to a clock recovery circuit which recovers the clock signal embedded in the received signal. The two circuits can be combined to provide an optimal circuit for the restoration of a drooped signal.
Abstract:
A system, method, and apparatus for establishing communications with a secure network using a non-secure mobile device operating in a non-secure network are disclosed herein. The disclosed method involves communicating a mobile device identifier to the secure network. In one or more embodiments, the mobile device identifier is an Internet protocol (IP) address and/or a unique identification (ID) code. The method further involves verifying and/or validating, with a mobile device manager in the secure network, the mobile device identifier. Also, the method involves establishing a secure connection between the mobile device and the secure network. In addition, the method involves receiving, with the mobile device, encrypted secure data from the secure network. Further, the method involves decrypting, with the mobile device, the received encrypted secure data using previously downloaded mobile device security software.