Abstract:
This application is applicable to the field of terminal technologies, and in particular, relates to a photographing method, an electronic device, and a computer-readable storage medium. The electronic device includes a camera lens. The method includes: A camera application of the electronic device sends a photographing command to a hardware abstraction layer of the electronic device in response to a photographing operation. The hardware abstraction layer determines, based on a first image, a to-be-photographed image in response to the photographing command. The first image is an image that is captured by the camera lens and that is obtained by the hardware abstraction layer after the camera application is started. To be specific, when the camera application detects the photographing operation, the camera application does not detect a current focusing status, and does not wait for the HAL to report a focusing completion state.
Abstract:
A proxy-based encryption method includes generating, according to a private key of a sending end and a public key of a receiving end, proxy keys that correspond to at least two proxy servers, respectively. The number of the proxy keys is equal to the number of the proxy servers. The method further includes sending encrypted ciphertexts and the proxy keys that correspond to the at least two proxy servers respectively to the at least two proxy servers, respectively, so that the at least two proxy servers re-encrypt the encrypted ciphertexts according to the corresponding proxy keys.
Abstract:
A method for upgrading a network functions virtualization application includes creating, by a virtualized infrastructure manager (VIM), a network resource according to an upgrade plan for the network functions virtualization application; creating, by the VIM, a virtual machine for a new-version virtualized network function (VNF) according to the upgrade plan; configuring, by the VIM, the virtual machine on a test network according to the network resource; performing, by the VIM, upgrade configuration on the virtual machine according to an upgrade configuration script to obtain the new-version VNF; and switching, by an NFV orchestrator, an earlier-version VNF to the new-version VNF after determining that a function test of the new-version VNF on the test network is successful. In the embodiments of the present disclosure, an automated upgrade procedure and upgrade steps for a network functions virtualization application are defined, so that upgrading the network functions virtualization application can be automated.
Abstract:
Embodiments of the present invention disclose a ciphertext processing method, apparatus, and system. The method includes: selecting a random secret value; calculating a private key according to a partial private key acquired by the local end and the random secret value; calculating a proxy key according to the private key of the local end and a public key publicized by an opposite end, where the public key is calculated by the opposite end according to a random secret value selected by itself and a system public parameter; and sending the proxy key, so that the opposite end acquires a ciphertext obtained after a re-encryption operation is performed, according to the proxy key, on a ciphertext sent by the local end, and performs decryption. Therefore, information security is ensured better and the Public Key Infrastructure (PKI) is avoided, thereby having better extensibility.
Abstract:
A method for upgrading a network functions virtualization application includes creating, by a virtualized infrastructure manager (VIM), a network resource according to an upgrade plan for the network functions virtualization application; creating, by the VIM, a virtual machine for a new-version virtualized network function (VNF) according to the upgrade plan; configuring, by the VIM, the virtual machine on a test network according to the network resource; performing, by the VIM, upgrade configuration on the virtual machine according to an upgrade configuration script to obtain the new-version VNF; and switching, by an NFV orchestrator, an earlier-version VNF to the new-version VNF after determining that a function test of the new-version VNF on the test network is successful. In the embodiments of the present disclosure, an automated upgrade procedure and upgrade steps for a network functions virtualization application are defined, so that upgrading the network functions virtualization application can be automated.
Abstract:
A method for performing proxy transformation between a user and a server includes: selecting a first proxy relationship between a target user and a first user from a proxy relationship library; selecting a random value, and generating a second proxy relationship according to the random value and the first proxy relationship; and encrypting original information according to the public key of the first user and the random value to obtain the encrypted information, and transmitting the encrypted information and the second proxy relationship to the server, so that the server performs proxy transformation on the encrypted information according to the second proxy relationship to obtain the transformed information. The method for performing proxy transformation thoroughly solves the security hazard that the server performs proxy transformation without user permission. The present invention further discloses a user terminal and a system for performing proxy transformation.
Abstract:
A key generating method and apparatus, where the method includes acquiring complete picture data of a complete picture; displaying a partial picture of the complete picture in a display window; capturing a first picture from the partial picture, and generating first picture data of the first picture; and generating a key according to the first picture data.
Abstract:
A method, an apparatus and a system for downloading a file in a content delivery network are provided. A sending rate of a file fragment is determined according to a requirement for playing the file fragment, the sending rate of the file fragment is carried in a request message for downloading the file fragment, so that a content source server or an upper-level cache server can send the file fragment at the sending rate of the file fragment carried in the request message, which solves the problem in the prior art that, the upper-level cache server or the content source server fails to meet diversified downloading requirements of a lower-level cache server, and the lower-level cache server is capable of providing a flexible streaming service for a terminal apparatus, improving user experience.
Abstract:
A key generating method and apparatus, where the method includes acquiring complete picture data of a complete picture; displaying a partial picture of the complete picture in a display window; capturing a first picture from the partial picture, and generating first picture data of the first picture; and generating a key according to the first picture data.