Abstract:
A three-dimensional virtual image display method is provided for a terminal. The method includes obtaining a first model map and a second model map of a three-dimensional virtual image, and determining a target region of the three-dimensional virtual image. The three-dimensional virtual image comprises a first model and a second model, and the target region is a joining region of the first model and the second model. The method also includes setting brightness of each pixel point in the target region in a shader to be a same value, the shader being configured to set illumination environmental data of each pixel point in the three-dimensional virtual image and the illumination environmental data at least comprising the brightness; and rendering the first model map and the second model map through the shader, so that a brightness of each pixel point in the target region displayed after rendering is equal.
Abstract:
An operation recognition method includes obtaining a data sequence including n pieces of data reflecting a movement of a mobile terminal, performing high-pass filtering on the data sequence to obtain n pieces of filtered data, and generating a current shake recognition result indicating that a shake operation occurs on the mobile terminal when one of the n pieces of filtered data exceeds a preset threshold.
Abstract:
Aspects of the disclosure provide a terminal device including processing circuitry. The processing circuitry is configured to determine a first color configuration of a tab page, and a seem color configuration of an icon, determine a representative color of the icon from the second color configuration of the icon and a background color of the tab page from the first color configuration, determine whether the background color of the tab page and the representative color of the icon satisfy a first condition that indicates a lack of discernibility over the background color, adjust the second color configuration of the icon when the representative color is determined to lack discernibility over the background color of the tab page based on the first condition, and generate image data for displaying the icon having the adjusted second color configuration in the tab page of the first color configuration.
Abstract:
A method for connecting a network access device to a wireless network access point includes: initiating an access request to a wireless network access point, wherein when detecting that the network access device is not authenticated, the wireless network access point redirects the access request to an authentication portal, the access request carrying an authentication server address; obtaining, by an application client on the network access device, an authentication parameter after obtaining authentication authorization of a user on the authentication portal; encrypting the authentication parameter by using a wireless access key; initiating, according to the authentication server address, an authentication request carrying the encrypted authentication parameter to an authentication server; receiving the login address and the encrypted signature from the authentication server; accessing the login address on the authentication server; and connecting to the wireless network access point to access the Internet according to a pass-through result.
Abstract:
Disclosed is an automatic telephonic session initiation method performed at a telephone session server including: receiving a telephonic session reservation request from a telephonic session client of a first terminal, the telephonic session reservation request including an identifier of an instant messaging client of a second terminal and a telephonic session initiation condition; storing corresponding reservation information according to the telephonic session reservation request; sending the reservation information to the instant messaging client of the second terminal according to the identifier of the instant messaging client of the second terminal; receiving a telephonic session reservation feedback message from the instant messaging client of the second terminal; and sending a telephonic session initiation request to the telephonic session client of the first terminal and a telephonic session client of the second terminal according to the reservation information when the telephonic session initiation condition is satisfied.
Abstract:
A server receives, from a user terminal, the page operation data produced when a user performs operations on each page of a designated program, a user's identifier, and a page identifier operated by the user. The server conducts statistics for the page operation data and obtains a total number of the user operations on the page during a preset statistical period according to the identifier of the user and the identifier of the page that the user operated. The server generates a statistics tree corresponding to a sequential relationship among the pages according to the sequential relationship among the pages, the total number of user operations on each of the pages within the preset statistical period, and the page operation data.
Abstract:
The present disclosure provides a method for configuring a basic application function of an intelligent terminal. The method includes: replacing, in a system program, an original initialization subprogram of an application class in the system program with a new initialization subprogram; configuring an invocation pointer to the original initialization subprogram in the new initialization subprogram, the invocation pointer being used for invoking and executing the original initialization subprogram when the new initialization subprogram is executed; registering a global notification in the new initialization subprogram, the global notification being used for monitoring a trigger condition that is generated by a third-party application program with respect to the application class; and configuring an invocation pointer to the application class in a callback handler function of the global notification, the invocation pointer being used for invoking and executing the application class by using the callback handler function when the trigger condition is detected.
Abstract:
A method for updating software application includes: receiving version information that is uploaded by terminals; obtaining latest version information of the software application, and comparing the uploaded version information with the latest version information for obtaining added updating information; and distributing the added updating information to the terminal, the application on the terminal is updated according to the added updating information. A corresponding system for updating software application and computer storage medium is provided as well.
Abstract:
In a group chat-based instant messaging method, a message is received from a first messaging application of a first user in a first messaging group. The first messaging application is associated with a first messaging service. When the message is to be announced to all group members of the first messaging group, whether the first user is authorized to send the message is determined based on identity information of the first user. Based on the first user being authorized, protocol conversion on the message is performed based on a second messaging protocol of a second messaging service to output the message in a first preset announcement style for messages announced to all group members. The converted message is transmitted, via a second messaging server, to a second messaging application corresponding to one of the plurality of group members in the first messaging group.
Abstract:
Improved accuracy of data encryption can be achieved with dynamic expansion according to the traffic volume of a user. A processing server transmits a key identifier to a hardware security module server which obtains a root key corresponding to the key identifier and encrypts the root key to generate a master key. The master key is encrypted to generate a data key, and the to-be-encrypted data is encrypted using the data key to generate encrypted data. The processing server can accurately and effectively encrypt data, improving the accuracy of data encryption and the security of data processing.