android保存USIM卡上的联系人时,提示“不能保存电话号码为空的联系人”的问题

1.USIM卡上有一个联系人,有电话号码和名字
2.修改该联系人,将name删除
3.将电话字段中的“手机”替换为"其他"
4.保存时会提示“不能保存电话号码为空的联系人”
 
這是USIM卡的設計:Name 和 Number不能同時為空。
當把 Number 的 Type 改成 other 後,它會被改設到 "Additional number" 的欄位,而導致 Number 變為空。
所以無法存成功,這是正常的行為。
这个问题与平台无关,是USIM卡固定的设计
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Title: Python Hacking Essentials Author: Earnest Wish Length: 214 pages Edition: 1 Language: English Publisher: CreateSpace Independent Publishing Platform Publication Date: 2015-04-01 ISBN-10: 1511797568 ISBN-13: 9781511797566 Target Audience This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I have included many figures that are intuitively understandable rather than a litany of explanations. Therefore, it is possible to gain some practical experience while hacking, since I have only used examples that can actually be implemented. This book is therefore necessary for ordinary people who have a curiosity of hackers and are interested in computers. Organization of the Book This book is made up of five major parts, from basic knowledge to actual hacking code. A beginner is naturally expected to become a hacker while reading this book. Hacking Preparation: Briefly introduce the basic Python syntax that is necessary for hacking. Application Hacking: Introduce the basic skills to hack an application, such as Keyboard hooking, API hooking and image file hacking. Web Hacking: The Virtual Box test environment configuration is used for a Web Shell attack to introduce web hacking, which is currently an important issue. The techniques include SQL Injection, Password Cracking, and a Web Shell Attack. Network Hacking: A variety of tools and the Python language can be combined to support network hacking and to introduce the network hacking technique. Briefly, we introduce NMap with the Wireshark tool, and hacking techniques such as Port Scanning, Packet Sniffing, TCP SYN Flood, Slowris Attack are introduced. System Hacking:System hacking is difficult to understand for beginners, and in this section, figures are used to introduce difficult concepts. The hacking techniques that are introduced include a Backdoor, Registry Handling, Stack Based Buffer Overflow, and SEH Based Buffer Overflow. While reading this book, it is possible to obtain answers for such problems one by one. After reading the last chapter, you will gain the confidence to be a hacker. Features of this book When you start to study hacking, the most difficult task is to configure the test environment. There are many problems that need to be addressed, such as choosing from the variety in operating systems, obtaining expensive equipment and using complex technology. Such problems are too difficult to take in at once, so this book overcomes this difficulty by implementing a simple idea. First, systems will be described as Windows-based We are very familiar with Windows, so it is very easy to understand a description based on Windows. Since Windows, Linux, Unix, and Android are all operating systems, it is possible to expand the concepts that are discussed here. Second, we use a virtual machine called Virtual Box For hacking, it is necessary to connect at least three or more computers on a network. Since it is a significant investment to buy a few computers only to study these techniques, a virtual machine can be used instead to easily implement a honeypot necessary to hack by creating multiple virtual machines on a single PC. Finally, abstract concepts are explained using figures Rather than simply using words for descriptions, graphics are very effective in transferring information. An abstract concept can materialize through the use of graphics in order to improve the understanding on the part of the reader. Table of Contents Chapter 1 Preparation for Hacking Chapter 2 Application Hacking Chapter 3 Web Hacking Chapter 4 Network Hacking Chapter 5 System Hacking Chapter 6 Conclusion
Android NDK(Native Development Kit)是一个允许开发者使用C和C++语言编写Android应用程序的工具。使用NDK可以实现Android应用的部分或全部功能,特别是在性能要求较高或需要底层硬件操作的情况下。 操作USIM(Universal Subscriber Identity Module)是指通过NDK访问和控制手机SIM卡中嵌入式的智能芯片。USIM是一种具有更高性能和扩展性的SIM卡,用于存储和处理用户的个人信息、网络访问权限和加密密钥等。 Android平台上可以使用NDK来操作USIM,具体的步骤如下: 1. 首先,需要在Android源代码中增加USIM API的支持,以便NDK可以调用相关的函数和方法。 2. 编写C或C++代码来访问USIM。可以使用标准的SIM卡API(如PC/SC或ISO 7816)来与USIM进行通信,或者使用厂商提供的专门API。 3. 在代码中,我们可以调用NDK提供的函数来打开、关闭、读取和写入USIM上的数据。这些函数通过JNI(Java Native Interface)将C/C++代码与Java代码进行交互。 4. 在Java层面,可以编写对应的接口类,用于调用NDK代码。这些接口类可以封装NDK函数,提供更方便的调用方式。同,通过权限管理和安全检查等机制,确保应用程序合法地访问和操作USIM。 5. 最后,编译和打包Android应用程序,并在设备上安装和运行。 操作USIM需要对NDK和SIM卡的相关技术和知识有一定的了解,同还需要获取相应的访问权限和合作厂商的支持。在开发过程中,需要注意保护用户的隐私和数据安全,遵循相关法律法规和应用程序许可协议。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值