Abstract:
A method, a mobile device, and system for transmitting files are disclosed. The method includes a first mobile device transmitting a file to a second mobile device in a first transmission mode when receiving a file transmission request for transmitting the file to the second terminal from a user. In transmitting the file, the first mobile device judges in real-time whether the size of the remaining part of the file is greater than or equal to a preconfigured threshold; and if yes, judges whether the first mobile device is able to establish a connection with the second mobile device with a higher transmission rate than that in the first transmission mode. The first mobile device may then switch the transmission mode and adopt the second transmission mode to transmit the remaining part of the file.
Abstract:
A method, a computer-readable medium, and a system for battery-charging management are provided. The method comprises: recording a respective time that previous trickle charging was carried out by a user; determining that a time interval between a current time and the respective time for the previous trickle charging has reached a preset charging cycle; and prompting the user to carry out next trickle charging in response to determining that the time interval between the current time and the respective time for the previous trickle charging has reached the preset charging cycle. The charging cycle is managed according to recorded charging actions of a user; therefore, the user can be prompted and guided in an intuitive and clear way to carry out charging cycle management, and be prompted intelligently and regularly, so as to extend the service life of a battery.
Abstract:
The present invention discloses a method and a mobile terminal for displaying an event notification. While running an application on a display of the mobile terminal, the terminal receives an event notification. If the event notification is compatible with the application, the terminal generates a user-interactive icon for the event notification on the display. In response to a user selection of the user-interactive icon, the terminal determines whether the event notification corresponds to a public or private event. If the event notification corresponds to a public event, the terminal replaces the application with a display of a list of public events including the public event. If the event notification corresponds to a private event, the terminal prompts a user to enter identity information for accessing private events and replaces the application with a display of a list of private events including the private event after verifying the user-entered identity information.
Abstract:
A method and system for acquiring and issuing a query instruction, a mobile terminal, a server, an information interaction system and a computer storage medium are provided. In the method, a mobile terminal transmits to a server a SMS message for acquiring a query instruction set; and the mobile terminal receives a query instruction set issued by the server. According to the disclosure, the mobile terminal acquires a query instruction set consisting of query instructions for querying various service information from a server of an operator, a user does not have to remember any query instructions and only has to select services to be queried according to the query instruction set so that query instructions corresponding to the services to be queried can be automatically transmitted.
Abstract:
An anti-theft protection method and device for a cellular phone is provided. The method includes: judging whether the cellular phone satisfies a pre-set condition for starting an anti-theft mode, if so, starting the anti-theft mode; and transmitting anti-theft protection information to a designated contact to instruct the designated contact to perform anti-theft processing for the cellular phone. The device comprises a judgment module, a starting module, and a transmission module.
Abstract:
Examples of the present disclosure provide a method and device for detecting virus of an installation package. The method includes: An installation package is unpacked, and description information obtained by unpacking the installation package is cached; after a virus detection startup instruction is received, the cached description information is read; the installation package is analyzed according to read description information, and whether there is a virus in the installation package is determined. Technical solutions of the present disclosure can increase the speed of installation package virus detection.
Abstract:
A software installation method, device and system are disclosed, which relate to computer technology. In the method, when a user requests software installation on a first mobile terminal, receive information of the user and identification info of the software sent from the first mobile terminal, look up corresponding relationships between user information and software information established in advance, and judge whether the corresponding relationships include the information of the user and the identification info of the corresponding software. If yes, find an installation package corresponding to the identification info of the software, and send the installation package found to the first mobile terminal for installing the software on the first mobile terminal. A server includes: a first receiving module, a judgment module, a lookup module and a sending module. A mobile terminal includes: a sending module, a receiving module, and an installation module.
Abstract:
A group user migration method includes: creating a target graphic code and a corresponding first group in a first application in response to a group user migration request, the group user migration request being used for requesting to migrate a user in any group in a second application to a group in the first application; sharing the target graphic code to a target group in the second application in response to a sharing request for the target graphic code; determining a group to which the user belongs in the second application in response to a request of any user in the second application for joining the first group; and joining the user to the first group of the first application in response to determining that the user belongs to the target group.
Abstract:
The present invention discloses a method and a device for displaying process information, which belongs to the field of computer technologies. The method may include: scanning a memory of a device for running processes; categorizing and ranking the scanned running processes according to a preset process display format; and displaying each process category after categorization and running processes within each process category, and displaying information related to the process category and the running processes within the process category; and/or displaying ranked running processes, and displaying related information corresponding to the ranked running processes. In the present invention, by presetting a process categorization format, the processes are displayed according to categorization and ranking when a user views the process information, thereby improving the user's understanding of the running processes in the device, making the management of the running processes more efficient, and further enhancing the security of the system.
Abstract:
The present disclosure discloses method and device for prompting program uninstallation and belongs to the field of the Internet. The method comprises: performing a security assessment of an application program installed on a mobile terminal, thereby obtaining a security assessment result; obtaining security identification information corresponding to the security assessment result based on pre-stored correlations between security assessment results and security identification information; establishing a correlation between the obtained security identification information and the application program, and displaying the correlation to a user. By performing a security assessment of an application program installed on a mobile terminal, obtaining security identification information, and establishing a correlation between the security identification information and the application program, a user can quickly uninstall and clean up malware with hidden security issues based on the security identification information, thereby safeguarding safe running of the mobile terminal.