CN106028315A - Data service transmission method, mobile communication device and server - Google Patents

Data service transmission method, mobile communication device and server Download PDF

Info

Publication number
CN106028315A
CN106028315A CN201610513588.XA CN201610513588A CN106028315A CN 106028315 A CN106028315 A CN 106028315A CN 201610513588 A CN201610513588 A CN 201610513588A CN 106028315 A CN106028315 A CN 106028315A
Authority
CN
China
Prior art keywords
demodulation module
communication network
card
tag card
modulation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610513588.XA
Other languages
Chinese (zh)
Other versions
CN106028315B (en
Inventor
郝壮壮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201610513588.XA priority Critical patent/CN106028315B/en
Publication of CN106028315A publication Critical patent/CN106028315A/en
Application granted granted Critical
Publication of CN106028315B publication Critical patent/CN106028315B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a data service transmission method, a mobile communication device and a server. The data service transmission method is applied to the mobile communication device. The mobile communication device comprises a terminal modulation and demodulation module. The terminal modulation and demodulation module can perform service transmission in a first communication network through a first identification card carried in the terminal modulation and demodulation module. The method comprises the steps that the terminal modulation and demodulation module obtains card information of a second identification card from a first server and registers the second identification card to a second communication network by employing the obtained card information, and the terminal modulation and demodulation module sends the card information of the first identification card to a second server, so that the second server determines a cloud modulation and demodulation module matched with the first identification card, and the first identification card can be registered to a target communication network through the cloud modulation and demodulation module.

Description

Data business transmission method, mobile communication equipment and server
Technical field
The application relates to communication technical field, more particularly, to data business transmission method and employing number Mobile communication equipment and server according to business transmitting method.
Background technology
Along with development and the development of radio network technique of intelligent terminal, user expects to use same terminal to exist Different access the Internets, place.Different location may be covered by different communication networks, correspondingly, Terminal use may need to pay expensive services of roaming rate, particularly in the case of international roaming. In order to save rate, terminal use may need to buy the ID card of roaming place, i.e. user identity and know Do not block.When user arrives roaming place, will carry out roaming earth mat by the card information of roaming place tag card Industry business transmission of going forward side by side registered by network.
When user carries out business transmission by roaming place tag card, owing to roaming place tag card instead of use The local tag card used in this locality before family carries out network registry, thus causes local tag card off-grid And cannot normally perform the transmission of the business such as voice and short message, and due to the change of subscriber directory number, The contact person making user cannot get in touch with user in time.
Accordingly, it is desired to provide one is when roaming place tag card normally works, still enable to this terrestrial reference Know card and stay net the method performing business transmission.
Summary of the invention
Embodiments herein provides data business transmission method and uses the shifting of data business transmission method Dynamic communication equipment and server, it makes mobile communication equipment when roaming place tag card normally works, depends on So ensure that local tag card stays net so that user can pass through while saving services of roaming rate Local tag card performs business transmission.
First aspect, it is provided that a kind of data business transmission method, is applied to mobile communication equipment.Described Mobile communication equipment includes end modification demodulation module, and described end modification demodulation module can pass through its institute First tag card of carrying performs the business transmission under the first communication network, and wherein, described method includes: Described end modification demodulation module obtains the card information of the second tag card from first server, and utilizes and obtained Described second tag card is registered to the second communication network by the card information taken;Described end modification demodulation module The card information of described first tag card is sent to second server so that described second server determines it In the high in the clouds modulation /demodulation module mated with described first tag card so that described first tag card can lead to Cross described high in the clouds modulation /demodulation Module registers to target communication network.
Second aspect, it is provided that a kind of mobile communication equipment, including: end modification demodulation module, it is possible to Perform the business under the first communication network by its first tag card carried to transmit;Control module, joins It is set to control the information between described end modification demodulation module and the second communication network and target communication network Transmission, wherein, described end modification demodulation module according to the control of described control module from first server Obtain the card information of the second tag card, and described second tag card is registered to by the card information acquired in utilization Second communication network, and described end modification demodulation module according to the control of described control module by described The card information of the first tag card sends to second server so that described second server determine wherein with institute State the high in the clouds modulation /demodulation module of the first tag card coupling, so that described first tag card can be by described High in the clouds modulation /demodulation Module registers is to target communication network.
The third aspect, it is provided that a kind of data business transmission method, is applied to server, comprises determining that The high in the clouds modulation /demodulation that the first tag card carried with the end modification demodulation module of mobile communication equipment mates Module, described high in the clouds modulation /demodulation module is positioned in described server;Described high in the clouds modulation /demodulation module connects Receive described end modification demodulation module and send the card information of the first tag card to described server, and by institute State the first tag card and be registered to target communication network.
Fourth aspect, it is provided that a kind of server, comprises determining that unit, is used for determining and mobile communication The high in the clouds modulation /demodulation module of the first tag card coupling of the end modification demodulation module carrying of equipment, described High in the clouds modulation /demodulation module is positioned in described server;Described high in the clouds modulation /demodulation module is configured to receive institute State end modification demodulation module and send the card information of the first tag card to described server, and by described the One tag card is registered to target communication network.
According in the technical scheme of the embodiment of the present application, complete the situation of network registry at the second tag card Under, by by the card information of the first tag card via server registration to target communication network, it is ensured that One tag card is stayed net and is normally carried out business transmission, enables a user in the second normal work of tag card Make, saved roaming rate while, still can carry out business transmission by the first tag card.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present application, below will be to embodiment or existing skill In art description, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below It is only some embodiments of the application, for those of ordinary skill in the art, is not paying creation Property work on the premise of, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 schematically illustrates the application scenarios of the technical scheme of the embodiment of the present application;
Fig. 2 schematically illustrates the embodiment of the present application data business transmission method for mobile communication equipment Flow chart;
Fig. 3 schematically illustrates the block diagram of the mobile communication equipment of the embodiment of the present application;
Fig. 4 schematically illustrates the block diagram of another mobile communication equipment of the embodiment of the present application;
Fig. 5 schematically illustrates the embodiment of the present application flow process for the data business transmission method of server Figure;
Fig. 6 schematically illustrates the block diagram of the server of the embodiment of the present application;
Fig. 7 schematically illustrates the block diagram of another server of the embodiment of the present application.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is carried out Clearly and completely describe, it is clear that described embodiment be some embodiments of the present application rather than Whole embodiments.
Mobile communication equipment in the embodiment of the present application can be various mobile terminal, such as mobile phone, Tablet PC and notebook, it is also possible in being portable, pocket, hand-held, computer That put or vehicle-mounted mobile device.Mobile communication equipment can perform the wireless access under various communication network Net exchange voice and/or data.Typically, this communication network can be global mobile communication (GSM) net Network, CDMA (CDMA) network, WCDMA (WCDMA) network, Long Term Evolution (LTE) communication network etc..Different types of communication network may be runed by described in different operators. The type of communication network does not constitute the restriction to the embodiment of the present application.
Fig. 1 schematically illustrates the application scenarios of the technical scheme of the embodiment of the present application.In FIG, with Mobile communication equipment is to be described as a example by mobile phone.Typically, the user of mobile phone is positioned at the first communication network NW1 cover under permanent residence, but be likely to be due to the reason such as job demand, travelling and from described permanent residence Transfer to the roaming place under the second communication network NW2 covers.
In permanent residence, user may be capable to the end modification demodulation module by mobile communication equipment M1 performs the first tag card of the business transmission under the first communication network NW1, the such as first SIM. Business transmission can include voice, short message service transmission and/or data traffic transmission.Here SIM Being only example, ID card can also is that UIM card.The type of ID card can be according to communication The type of network and change.Mobile phone is communicated by the first SIM and the first communication network NW1.
Cellphone subscriber leaves permanent residence and arrives roaming place and be in roaming state.As a example by international roaming, hands Machine user uses the network of operator overseas under international roaming state, and international roaming expenses standard is Agreement between operators based on two countries determines, most countries or the world in area The service tariff of roaming is higher than domestic service tariff.In order to save rate, cellphone subscriber may need Buy the ID card of roaming place, the i.e. second tag card, the such as second SIM.When user arrives unrestrained During trip ground, register carrying out roaming place the second communication network NW2 by the card information of the second SIM Industry of going forward side by side business transmission.
After cellphone subscriber arrives roaming place, end modification demodulation module M1 can be utilized in mobile phone The card information of the second SIM under the second communication network NW2 of loading roaming place, and by the 2nd SIM Card is registered to the second communication network NW2 of roaming place.So, cellphone subscriber can utilize the second communication network The second SIM under network NW2 performs business transmission, especially data traffic transmission, thus saves Services of roaming rate.So, cellphone subscriber is after arriving roaming place, it is not necessary to obtain ID card Entity, it is only necessary to obtain its card information so that cellphone subscriber can be conveniently used the second of roaming place Communication network NW2 carries out business transmission.
The card information of the ID card under the second communication network NW2 of roaming place can be by dealing exclusively in The specific company of the ID card of roaming place is provided.This specific company obtains the second communication the most in advance Multiple ID cards under network N W2, and by first server S1 by an ID card Card information distributes to be determined the cellphone subscriber of roaming place to be arrived.
Now, end modification demodulation module M1 is utilized to be loaded with the card of the second SIM due to cellphone subscriber Information also makes it have registered the second communication network NW2, then the first SIM of its former carrying can be caused to be in Off-grid state, it is impossible to normally receive calls or receive short message.And owing to subscriber phone number is (mobile Subscriber Number MSISDN) variation, the contact person that result in user cannot get in touch with it.In view of This, the card information of the first SIM can be sent to the high in the clouds the deploying multiple modulation /demodulation module by mobile phone Two server S 2, second server S2 selects modulation /demodulation module M2 in high in the clouds with by the first SIM note Volume is to target communication network, it is ensured that the first SIM is still stayed net and can carry out business transmission.Herein Target communication network can be the first local communication network NW1, it is also possible to be that the second of roaming place leads to Communication network NW2.
Fig. 2 schematically illustrates the flow chart of the data business transmission method 200 of the embodiment of the present application.Should Data business transmission method 200 can be applicable to mobile communication equipment.This mobile communication equipment includes that terminal is adjusted Demodulation module processed, described end modification demodulation module can perform the by its first tag card carried Business transmission under one communication network.
As in figure 2 it is shown, this data business transmission method 200 includes S201: described end modification solution mode transfer Block obtains the card information of the second tag card from first server, and the card information acquired in utilizing is by described the Two tag cards are registered to the second communication network.
Wherein, the first communication network can be local communication network, and the second communication network can be roaming place Communication network.In roaming place, first tag card corresponding with the first communication network is in roaming state, its Rate school is high.
In embodiments herein, obtain the second tag card at mobile communication equipment from first server Before card information, it is also possible to including: when mobile communication equipment enters the coverage of the second communication network, Disable the business transmission under described first communication network of the described end modification demodulation module.
The card obtaining the second tag card the second communication network from first server at mobile communication equipment is believed After breath, by this card information of the second communication network authentication the registration that completes this second tag card.For moving For dynamic communication equipment, this second tag card is virtual ID card, and mobile communication equipment is not Obtain the physical entity of the second tag card.Therefore, mobile communication equipment can only provide a slot to insert Enter the physical entity of the first tag card, the data traffic transmission under the first communication network is being switched to second During communication network, do not change the physical location of the first tag card.
Mobile communication equipment can be carried out data transmission by such as wifi via such as wireless router etc., and Can be controlled it by APP such as such as crawling software.Therefore, end modification demodulation module can be Network under the control of crawling software and obtain the card information of the second tag card in the second communication network.
The card information of the second tag card such as can include phone number, international mobile subscriber identity IMSI Deng.This IMSI be difference mobile subscriber mark, and such as can include mobile subscriber belonging country code name, Mobile network number, mobile identification number.Described card information is typically stored within tag card.As above institute Stating, the card information of the ID card under the second communication network can be by dealing exclusively under the second communication network The specific company of ID card provided.This specific company can be that the product of mobile communication equipment supplies Answer business, can also is that through the second communication network operator permit ISP.This specific company example As multiple ID cards that multiple communication network includes under the second communication network can be obtained in advance, from each ID card reads card information and transfers to described first server to manage, then can be according to network rings The card information of one ID card is distributed to user by the tenability of border and end modification demodulation module.
After networking, end modification demodulation module can send card request to first server, and this card please Seeking the ID card for applying under the second communication network, second server is according to described request distribution Two tag cards, and the card information of this second tag card is sent to end modification demodulation module.
End modification demodulation module, after receiving the card information of the second tag card, loads described second mark Know the card information of card.For example, it is possible to described card information is stored its memorizer or by this card information Storage is to the memorizer being coupled with it, as long as end modification demodulation module can use this second tag card Card information.
Afterwards, end modification demodulation module can be come by such as crawling software and the second communication Receive the authentication request for described card information.As example, end modification demodulation module identifies second The card information of card sends the second communication network to.Second communication network after receiving card information, in order to For the sake of safety, need to differentiate the right using this second tag card of mobile communication equipment, and therefore can be to End modification demodulation module sends authentication request.The effect of authentication is protection the second communication network, prevents it Illegally usurp, and refuse to palm off " invasion " this second communication network of legitimate client.
This authentication request such as can include a pseudo random number.Second communication network can store this pseudo random number, KI and the Authentication Response obtained based on described pseudo random number and KI of the second tag card are tied Really.The KI of the second tag card such as can strict protection in the physical entity of the second tag card, Can not illegally be obtained by third party, so only have the validated user of the second tag card to know described KI, And described Authentication Response result can be calculated after receiving described pseudo random number.When the second communication network Network judges that its Authentication Response result stored is consistent with the Authentication Response result received from mobile communication equipment Time, i.e. can determine whether that mobile communication equipment is the legitimate user of the second tag card.
As example, described authentication request can be packaged into data, and transmit by end modification demodulation module Give the first server for managing the ID card under the second communication network.Puppet is included in authentication request In the case of random number, first server such as can be to pseudo random number and the KI of the second tag card Performing pre-defined algorithm and draw a number of responses, this number of responses is i.e. described Authentication Response result.End modification Described Authentication Response, after receiving described Authentication Response result from first server, is tied by demodulation module Fruit is sent to the second communication network so that the second tag card is registered to the second communication network.
Second communication network, will after receiving described Authentication Response result from end modification demodulation module The Authentication Response result that Authentication Response result and its received is stored compares.If the two is identical, The most described checking equipment confirms the effectiveness of described second tag card.
After determining the effectiveness of the second tag card, end modification demodulation module performs this second communication Business transmission under network, wherein can include speech business transmission and/or data traffic transmission.Due to this Second tag card is the ID card in the second communication network, so saving services of roaming rate.
In step S202, the card information of described first tag card is sent to the by end modification demodulation module Two servers so that described second server determines the high in the clouds modulation wherein mated with described first tag card Demodulation module, so that described first tag card can be by described high in the clouds modulation /demodulation Module registers to target Communication network.
As it was previously stated, the second tag card is virtual ID card, not there is physical entity.Therefore, The physical location of the first tag card, still in the draw-in groove of end modification demodulation module, does not change, and End modification demodulation module the most still can read the card information of the first tag card.
In this step, end modification demodulation module reads the card information of the first tag card, and sends to Two servers.End modification demodulation module can read the first tag card under the control of such as crawling software Card information.And owing to now the second tag card is already attached to the second communication network, therefore can lead to Cross the second communication network and transmit the data of the first tag card card information.Certainly, wifi can still be passed through Or other networking modes transmit above-mentioned data.
Second server is arranged in high in the clouds, can include multiple modulation /demodulation module, and have loading void Intend the function of ID card.Second server after the card information receiving the first tag card, Ke Yixuan Select the high in the clouds modulation /demodulation module mated with the first tag card, and by high in the clouds modulation /demodulation module by first Tag card is registered to target communication network.This target communication network can be the first local communication network, It can also be the second communication network of roaming place.
The card information of the first tag card such as can include phone number, international mobile subscriber identity IMSI Deng.This IMSI be difference mobile subscriber mark, and such as can include mobile subscriber belonging country code name, Mobile network number, mobile identification number.Described card information is typically stored within the first tag card.
After modulation /demodulation module beyond the clouds obtains the card information of the first tag card by second server, cloud End modulation /demodulation module can receive the authentication for described card information with target communication network communication please Ask.As example, modulation /demodulation module in high in the clouds sends the card information of the first tag card to destinations traffic net Network also asks registered network.Target communication network is after receiving card information, for the sake of security, needs Differentiate the effectiveness of this first tag card, and therefore can send authentication request to high in the clouds modulation /demodulation module. The effect of authentication is protection target communication network, prevents it from illegally usurping, and refuses to palm off legitimate client " invade " this target communication network.
This authentication request such as can include a pseudo random number.Target communication network can store this pseudo random number, KI and the Authentication Response obtained based on described pseudo random number and KI of the first tag card are tied Really.The KI of the first tag card such as can strict protection in the physical entity of the first tag card, Illegally can not be obtained by third party, when end modification demodulation module reads the card information of the first tag card, KI is the most non-readable.When target communication network judges its Authentication Response result stored and from shifting When the Authentication Response result of dynamic communication equipment reception is consistent, i.e. can determine whether that mobile communication equipment is the first mark The legitimate user of card.
As example, described authentication request can be packaged into data, and pass through by high in the clouds modulation /demodulation module Second server sends end modification demodulation module to.In the case of authentication request includes pseudo random number, End modification demodulation module can utilize authentication close by the physical entity of the first tag card being positioned in draw-in groove Key performs pre-defined algorithm and draws a number of responses, and this number of responses is i.e. described Authentication Response result.Terminal is adjusted Demodulation module processed is after receiving described Authentication Response result from the first tag card, by described Authentication Response Result sends high in the clouds modulation /demodulation module to by second server, and returns target communication network with by One tag card is registered to target communication network.
Target communication network, will after receiving described Authentication Response result from high in the clouds modulation /demodulation module The Authentication Response result that Authentication Response result and its received is stored compares.If the two is identical, The most described checking equipment confirms the effectiveness of described first tag card.Determining the effective of the first tag card After property, high in the clouds modulation /demodulation module performs the business transmission under this target communication network, wherein can wrap Include speech business transmission, short message service transmission etc..Calling is had to access at the number for the first tag card Time, high in the clouds modulation /demodulation module is received this calling, and is accessed by technology such as VoIP, VOLTE mobile logical Letter equipment, it is achieved the forwarding of related voice communicating data, ensure that the first tag card stay net and can Normally receive calls.
In the technical scheme according to the above-mentioned data traffic transmission of the embodiment of the present application, at the second tag card In the case of completing network registry, by by the card information of the first tag card via server registration to target Communication network, it is ensured that the first tag card is stayed net and is normally carried out business transmission, enables a user to While normally working at the second tag card, having saved roaming rate, still can pass through the first tag card Carry out business transmission.
Fig. 3 schematically illustrates the block diagram of the mobile communication equipment 300 of the embodiment of the present application.
As it is shown on figure 3, this mobile communication equipment 300 includes: end modification demodulation module 310, it is possible to Perform the business under the first communication network by its first tag card carried to transmit.
Control module 320, is configured to control described end modification demodulation module 310 and the second communication network And the information transmission between target communication network, wherein, described end modification demodulation module 310 is according to institute The control stating control module 320 obtains the card information of the second tag card from first server, and utilizes and obtained Described second tag card is registered to the second communication network, and the demodulation of described end modification by the card information taken Module 310 according to described control module 320 control the card information of described first tag card is sent to the Two servers so that described second server determines the high in the clouds modulation wherein mated with described first tag card Demodulation module, so that described first tag card can be by described high in the clouds modulation /demodulation Module registers to target Communication network.
Wherein, the first communication network can be local communication network, and the second communication network can be roaming place Communication network.In roaming place, first tag card corresponding with the first communication network is in roaming state, its Rate school is high.
In embodiments herein, end modification demodulation module 310 is according to described control module 320 Control before first server obtains the card information of the second tag card, it is also possible at mobile communication equipment When entering the coverage of the second communication network, disable the business transmission under described first communication network.
Obtain from first server according to the control of described control module 320 at end modification demodulation module 310 After taking the card information of the second tag card under the second communication network, will believe at this card of the second communication network authentication Cease and complete the registration of this second tag card.For mobile communication equipment, this second tag card is empty The ID card intended, mobile communication equipment does not obtain the physical entity of the second tag card.Therefore, Mobile communication equipment can only provide a slot to insert the physical entity of the first tag card, by first During data traffic transmission under communication network switches to the second communication network, do not change the first mark The physical location of card.
The card information of the second tag card such as can include phone number, international mobile subscriber identity IMSI Deng.This IMSI be difference mobile subscriber mark, and such as can include mobile subscriber belonging country code name, Mobile network number, mobile identification number.Described card information is typically stored within tag card.As above institute Stating, the card information of the ID card under the second communication network can be by dealing exclusively under the second communication network The specific company of ID card provided.This specific company can be that the product of mobile communication equipment supplies Answer business, can also is that through the second communication network operator permit ISP.This specific company example As multiple ID cards that multiple communication network includes under the second communication network can be obtained in advance, from each ID card reads card information and transfers to described first server to manage, then can be according to network rings The card information of one ID card is distributed to user by the tenability of border and end modification demodulation module.
After networking, end modification demodulation module 310 can be to the under the control of control module 320 One server sends card request, and the request of this card is used for the ID card under application the second communication network, the Two servers are according to described request distribution the second tag card, and are sent to by the card information of this second tag card End modification demodulation module 310.
End modification demodulation module 310, after receiving the card information of the second tag card, loads described The card information of two tag cards.For example, it is possible to described card information is stored its memorizer or by this card Information stores the memorizer being coupled with it, if end modification demodulation module 310 can use this second The card information of tag card.
Afterwards, end modification demodulation module 310 can communicate with second under the control of control module 320 Network service receives the authentication request for described card information.As example, end modification demodulation module 310 send the card information of the second tag card to second communication network.Second communication network is receiving card After information, for the sake of security, need to differentiate the power using this second tag card of mobile communication equipment Profit, and therefore can send authentication request to end modification demodulation module 310.The effect of authentication is protection the Two communication networks, prevent it from illegally usurping, and refuse to palm off " invasion " this second communication of legitimate client Network.
After determining the effectiveness of the second tag card, end modification demodulation module 310 is in control module The lower business performed under this second communication network that controls of 320 is transmitted, and wherein can include that speech business passes Defeated and/or data traffic transmission.Owing to this second tag card is the ID card in the second communication network, So saving services of roaming rate.
Subsequently, end modification demodulation module 310 identifies described first under the control of control module 320 The card information of card sends to second server so that described second server determines wherein to be marked with described first Know the high in the clouds modulation /demodulation module of card coupling, so that described first tag card can be modulated by described high in the clouds Demodulation module is registered to target communication network.
As it was previously stated, the second tag card is virtual ID card, not there is physical entity.Therefore, The physical location of the first tag card, still in the draw-in groove of end modification demodulation module, does not change, and End modification demodulation module the most still can read the card information of the first tag card.
End modification demodulation module 310 reads the card letter of the first tag card under the control of control module 320 Breath, and send to second server.
Second server is arranged in high in the clouds, can include multiple modulation /demodulation module, and have loading void Intend the function of ID card.Second server after the card information receiving the first tag card, Ke Yixuan Select the high in the clouds modulation /demodulation module mated with the first tag card, and by high in the clouds modulation /demodulation module by first Tag card is registered to target communication network.This target communication network can be the first local communication network, It can also be the second communication network of roaming place.
The card information of the first tag card such as can include phone number, international mobile subscriber identity IMSI Deng.This IMSI be difference mobile subscriber mark, and such as can include mobile subscriber belonging country code name, Mobile network number, mobile identification number.Described card information is typically stored within the first tag card.
After modulation /demodulation module beyond the clouds obtains the card information of the first tag card by second server, cloud End modulation /demodulation module can receive the authentication for described card information with target communication network communication please Ask.As example, modulation /demodulation module in high in the clouds sends the card information of the first tag card to destinations traffic net Network also asks registered network.Target communication network is after receiving card information, for the sake of security, needs Differentiate the effectiveness of this first tag card, and therefore can send authentication request to high in the clouds modulation /demodulation module. The effect of authentication is protection target communication network, prevents it from illegally usurping, and refuses to palm off legitimate client " invade " this target communication network.
This authentication request such as can include a pseudo random number.Target communication network can store this pseudo random number, KI and the Authentication Response obtained based on described pseudo random number and KI of the first tag card are tied Really.The KI of the first tag card such as can strict protection in the physical entity of the first tag card, Illegally can not be obtained by third party, end modification demodulation module 310 is read under the control of control module 320 When taking the card information of the first tag card, KI is the most non-readable.When target communication network judges its institute When the Authentication Response result of storage is consistent with the Authentication Response result received from mobile communication equipment, can sentence Disconnected mobile communication equipment is the legitimate user of the first tag card.
As example, described authentication request can be packaged into data, and pass through by high in the clouds modulation /demodulation module Second server sends end modification demodulation module 310 to.The situation of pseudo random number is included in authentication request Under, end modification demodulation module 310 can be by being positioned in draw-in groove under the control of control module 320 The physical entity of the first tag card utilizes KI to perform pre-defined algorithm and draws a number of responses, this response Number is i.e. described Authentication Response result.End modification demodulation module is receiving described mirror from the first tag card After power response results, by described Authentication Response result by the second clothes under the control of control module 320 Business device sends high in the clouds modulation /demodulation module to, and returns target communication network to be registered to by the first tag card Target communication network.
Target communication network, will after receiving described Authentication Response result from high in the clouds modulation /demodulation module The Authentication Response result that Authentication Response result and its received is stored compares.If the two is identical, The most described checking equipment confirms the effectiveness of described first tag card.Determining the effective of the first tag card After property, high in the clouds modulation /demodulation module performs the business transmission under this target communication network, wherein can wrap Include speech business transmission, short message service transmission etc..Calling is had to access at the number for the first tag card Time, high in the clouds modulation /demodulation module is received this calling, and is accessed by technology such as VoIP, VOLTE mobile logical Letter equipment, it is achieved the forwarding of related voice communicating data, ensure that the first tag card stay net and can Normally receive calls.
In the technical scheme according to the above-mentioned data traffic transmission of the embodiment of the present application, at the second tag card In the case of completing network registry, by by the card information of the first tag card via server registration to target Communication network, it is ensured that the first tag card is stayed net and is normally carried out business transmission, enables a user to While normally working at the second tag card, having saved roaming rate, still can pass through the first tag card Carry out business transmission.
Fig. 4 schematically illustrates the block diagram of another mobile communication equipment 400 of the embodiment of the present application.Such as figure Shown in 4, this another mobile communication equipment 400 includes: end modification demodulation module 410, it is possible to by it The first tag card carried performs the business transmission under the first communication network;Memorizer 420, is used for depositing Storage program code;Processor 430, for performing described program code to realize the method that Fig. 2 describes.
End modification demodulation module 410 in Fig. 4 is identical with the end modification demodulation module 310 in Fig. 3. Memorizer 420 can include at least one in read only memory and random access memory, and to process Device 430 provides instruction and data.A part for memorizer 420 can also include non-volatile row random access memory Memorizer (NVRAM).
Processor 430 can be general processor, digital signal processor (DSP), special IC (ASIC), ready-made programmable gate array (FPGA) or other PLDs, discrete gate or Person's transistor logic, discrete hardware components.General processor can be microprocessor or any often The processor etc. of rule.
Can be embodied directly in conjunction with the step of the method disclosed in the embodiment of the present application and performed by processor Become, or complete with the hardware in processor and software module combination execution.Software module may be located at Machine memorizer, flash memory, read only memory, programmable read only memory or electrically erasable programmable storage In the storage medium that this area such as device, depositor is ripe.This storage medium is positioned in memorizer 420, place Reason device 430 reads the information in memorizer 420, completes the step of said method in conjunction with its hardware.
Correspondingly, the embodiment of the present application also includes for the data business transmission method of server end and suitable Server.
As it is shown in figure 5, the data business transmission method 500 being applied to server includes S501: determine with The high in the clouds modulatedemodulate mode transfer of the first tag card coupling of the end modification demodulation module carrying of mobile communication equipment Block, described high in the clouds modulation /demodulation module is positioned in described server.
Server is arranged in high in the clouds, can include multiple modulation /demodulation module, and have the virtual use of loading The function of family tag card.Server, after the card information receiving the first tag card, can select and first The high in the clouds modulation /demodulation module of tag card coupling.
In step 502, described high in the clouds modulation /demodulation module receives the transmission of described end modification demodulation module To the card information of the first tag card of described server, and described first tag card is registered to destinations traffic Network.Wherein, target communication network can be the first communication network, it is also possible to be the second communication network.
As it was previously stated, the physical location of the first tag card is in the draw-in groove of end modification demodulation module, terminal Modulation /demodulation module can read the card information of the first tag card.
In this step, end modification demodulation module reads the card information of the first tag card, and sends to clothes Business device.
The card information of the first tag card such as can include phone number, international mobile subscriber identity IMSI Deng.This IMSI be difference mobile subscriber mark, and such as can include mobile subscriber belonging country code name, Mobile network number, mobile identification number.Described card information is typically stored within the first tag card.
After modulation /demodulation module beyond the clouds obtains the card information of the first tag card by server, high in the clouds is adjusted Demodulation module processed can receive the authentication request for described card information with target communication network communication.Make For example, the card information of the first tag card is sent to target communication network and asks by high in the clouds modulation /demodulation module Seek registered network.Target communication network is after receiving registration request, for the sake of security, needs mirror The not effectiveness of this first tag card, and therefore can send authentication request to high in the clouds modulation /demodulation module.Mirror The effect of power is protection target communication network, prevents it from illegally usurping, and refuses to palm off " entering of legitimate client Invade " this target communication network.
This authentication request such as can include a pseudo random number.Target communication network can store this pseudo random number, KI and the Authentication Response obtained based on described pseudo random number and KI of the first tag card are tied Really.The KI of the first tag card such as can strict protection in the physical entity of the first tag card, Illegally can not be obtained by third party, when end modification demodulation module reads the card information of the first tag card, KI is the most non-readable.When target communication network judges its Authentication Response result stored and from shifting When the Authentication Response result of dynamic communication equipment reception is consistent, i.e. can determine whether that mobile communication equipment is the first mark The legitimate user of card.
As example, described authentication request can be packaged into data, and pass through by high in the clouds modulation /demodulation module Server sends end modification demodulation module to.In the case of authentication request includes pseudo random number, terminal Modulation /demodulation module the physical entity of the first tag card by being positioned in draw-in groove can utilize KI to hold Row pre-defined algorithm draws a number of responses, and this number of responses is i.e. described Authentication Response result.End modification solution Mode transfer block is after receiving described Authentication Response result from the first tag card, by described Authentication Response result Send high in the clouds modulation /demodulation module to by server, and return target communication network with by the first tag card It is registered to target communication network.
Target communication network, will after receiving described Authentication Response result from high in the clouds modulation /demodulation module The Authentication Response result that Authentication Response result and its received is stored compares.If the two is identical, The most described checking equipment confirms the effectiveness of described first tag card.Determining the effective of the first tag card After property, high in the clouds modulation /demodulation module performs the business transmission under this target communication network, wherein can wrap Include speech business transmission, short message service transmission etc..Calling is had to access at the number for the first tag card Time, high in the clouds modulation /demodulation module is received this calling, and is accessed by technology such as VoIP, VOLTE mobile logical Letter equipment, it is achieved the forwarding of related voice communicating data, ensure that the first tag card stay net and can Normally receive calls.
In the technical scheme according to the above-mentioned data traffic transmission of the embodiment of the present application, by marking first Know card card information via server registration to target communication network, it is ensured that the first tag card stay net and just Often carry out business transmission, so that user still can carry out business transmission by the first tag card.
Fig. 6 schematically illustrates the block diagram of the server 600 of the embodiment of the present application.
As shown in Figure 6, this server 600 comprises determining that unit 610, is used for determining and mobile communication The high in the clouds modulation /demodulation module 620 of the first tag card coupling of the end modification demodulation module carrying of equipment, Described high in the clouds modulation /demodulation module 620 is positioned in described server;Described high in the clouds modulation /demodulation module 620 It is configured to receive described end modification demodulation module and sends the card letter of the first tag card to described server Breath, and described first tag card is registered to target communication network.
Wherein, target communication network can be the first communication network, it is also possible to be the second communication network.
As it was previously stated, the physical location of the first tag card is in the draw-in groove of end modification demodulation module, terminal Modulation /demodulation module can read the card information of the first tag card, and sends to server.Server is arranged Beyond the clouds, multiple modulation /demodulation module can be included, and there is the function loading virtual subscriber identity card. Server, after the card information receiving the first tag card, can select the high in the clouds mated with the first tag card Modulation /demodulation module 620.
The card information of the first tag card such as can include phone number, international mobile subscriber identity IMSI Deng.This IMSI be difference mobile subscriber mark, and such as can include mobile subscriber belonging country code name, Mobile network number, mobile identification number.Described card information is typically stored within the first tag card.
After modulation /demodulation module beyond the clouds 620 obtains the card information of the first tag card by server, cloud End modulation /demodulation module 620 can receive the authentication for described card information with target communication network communication Request.As example, high in the clouds modulation /demodulation module 620 sends the card information of the first tag card to target Communication network also asks registered network.Target communication network is after receiving registration request, for safety For the sake of, need to differentiate the effectiveness of this first tag card, and therefore can be to high in the clouds modulation /demodulation module 620 Send authentication request.The effect of authentication is protection target communication network, prevents it from illegally usurping, and refuses " invasion " this target communication network of personation legitimate client.
This authentication request such as can include a pseudo random number.Target communication network can store this pseudo random number, KI and the Authentication Response obtained based on described pseudo random number and KI of the first tag card are tied Really.The KI of the first tag card such as can strict protection in the physical entity of the first tag card, Illegally can not be obtained by third party, when end modification demodulation module reads the card information of the first tag card, KI is the most non-readable.When target communication network judges its Authentication Response result stored and from shifting When the Authentication Response result of dynamic communication equipment reception is consistent, i.e. can determine whether that mobile communication equipment is the first mark The legitimate user of card.
As example, described authentication request can be packaged into data by high in the clouds modulation /demodulation module 620, and End modification demodulation module is sent to by server.In the case of authentication request includes pseudo random number, End modification demodulation module can utilize authentication close by the physical entity of the first tag card being positioned in draw-in groove Key performs pre-defined algorithm and draws a number of responses, and this number of responses is i.e. described Authentication Response result.Terminal is adjusted Demodulation module processed is after receiving described Authentication Response result from the first tag card, by described Authentication Response Result sends high in the clouds modulation /demodulation module 620 to by server, and returns target communication network with by One tag card is registered to target communication network.
Target communication network from high in the clouds modulation /demodulation module 620 receive described Authentication Response result it After, the Authentication Response result that the Authentication Response result and its that are received are stored is compared.If two Person is identical, and the most described checking equipment confirms the effectiveness of described first tag card.Determining the first mark After the effectiveness of card, high in the clouds modulation /demodulation module 620 performs the business transmission under this target communication network, Wherein can include speech business transmission, short message service transmission etc..At the number for the first tag card When having calling to access, high in the clouds modulation /demodulation module receives this calling, and by technology such as VoIP, VOLTE Access mobile communication equipment, it is achieved the forwarding of related voice communicating data, ensures that the first tag card Stay net and can normally receive calls.
In the technical scheme according to the above-mentioned data traffic transmission of the embodiment of the present application, by marking first Know card card information via server registration to target communication network, it is ensured that the first tag card stay net and just Often carry out business transmission, so that user still can carry out business transmission by the first tag card.
Fig. 7 schematically illustrates the block diagram of another server 700 of the embodiment of the present application.As it is shown in fig. 7, This another mobile communication equipment 700 includes: high in the clouds modulation /demodulation module 710, is positioned in described server, It is configured to receive described end modification demodulation module and sends the card letter of the first tag card to described server Breath, and described first tag card is registered to target communication network;Memorizer 720, is used for storing program Code;Processor 730, for performing described program code to determine that the terminal with mobile communication equipment is adjusted The high in the clouds modulation /demodulation module 710 of the first tag card coupling of demodulation module processed carrying, it is achieved Fig. 5 describes Method.
High in the clouds modulation /demodulation module 710 in Fig. 7 is identical with the high in the clouds modulation /demodulation module 620 in Fig. 6. Memorizer 720 can include at least one in read only memory and random access memory, and to process Device 730 provides instruction and data.A part for memorizer 720 can also include non-volatile row random access memory Memorizer (NVRAM).
Processor 730 can be general processor, digital signal processor (DSP), special IC (ASIC), ready-made programmable gate array (FPGA) or other PLDs, discrete gate or Person's transistor logic, discrete hardware components.General processor can be microprocessor or any often The processor etc. of rule.
Can be embodied directly in conjunction with the step of the method disclosed in the embodiment of the present application and performed by processor Become, or complete with the hardware in processor and software module combination execution.Software module may be located at Machine memorizer, flash memory, read only memory, programmable read only memory or electrically erasable programmable storage In the storage medium that this area such as device, depositor is ripe.This storage medium is positioned in memorizer 720, place Reason device 730 reads the information in memorizer 720, completes the step of said method in conjunction with its hardware.
Those of ordinary skill in the art are it is to be appreciated that combine each of the embodiments described herein description The unit of example and algorithm steps, it is possible to electronic hardware or computer software and the knot of electronic hardware Incompatible realization.These functions perform with hardware or software mode actually, depend on the spy of technical scheme Fixed application and design constraint.Professional and technical personnel can use not Tongfang to each specifically should being used for Method realizes described function, but this realization is it is not considered that exceed scope of the present application.
Those skilled in the art is it can be understood that arrive, and for convenience and simplicity of description, above-mentioned retouches Implementing of the information processing method stated, the corresponding description being referred in product embodiments.
In several embodiments provided herein, it should be understood that disclosed equipment and method, Can realize by another way.Such as, device embodiment described above is only schematically, Such as, the division of described unit, it is only a kind of logic function and divides, actual can have additionally when realizing Dividing mode, the most multiple unit or assembly can in conjunction with or be desirably integrated into another equipment, or Some features can be ignored, or does not performs.
The described unit illustrated as separating component can be or may not be physically separate, makees The parts shown for unit can be or may not be physical location.Can select according to the actual needs Select some or all of unit therein to realize the purpose of the present embodiment scheme.
The above, the only detailed description of the invention of the application, but the protection domain of the application does not limit to In this, any those familiar with the art, can be easily in the technical scope that the application discloses Expect change or replace, all should contain within the protection domain of the application.Therefore, the protection of the application Scope should described be as the criterion with scope of the claims.

Claims (20)

1. a data business transmission method, is applied to mobile communication equipment, described mobile communication equipment bag Include end modification demodulation module, the first mark that described end modification demodulation module can be carried by it Card performs the business transmission under the first communication network, and wherein, described method includes:
Described end modification demodulation module obtains the card information of the second tag card from first server, and utilizes Described second tag card is registered to the second communication network by acquired card information;
The card information of described first tag card is sent to second server by described end modification demodulation module, Described second server is made to determine the high in the clouds modulation /demodulation module wherein mated with described first tag card, So that described first tag card can be by described high in the clouds modulation /demodulation Module registers to target communication network.
The most the method for claim 1, wherein described first tag card is made to pass through described in Described high in the clouds modulation /demodulation Module registers includes to target communication network:
By described high in the clouds modulation /demodulation module, described first mark is sticked into by described target communication network Row authentication.
3. method as claimed in claim 2, wherein, described is made by described high in the clouds modulation /demodulation module Described target communication network carries out authentication to described first tag card and includes:
Marking for described first of described target communication network transmission is received from described high in the clouds modulation /demodulation module Knowing the authentication request of card, described authentication request uses described first in response to described high in the clouds modulation /demodulation module The registration request that the card information of tag card sends to described target communication network;
Described authentication request is utilized to obtain the Authentication Response result of described first tag card, and by described cloud Described Authentication Response result is sent to described target communication network by end modulation /demodulation module.
4. method as claimed in claim 3, wherein,
The card information of described first tag card does not include the KI in described first tag card;
The described Authentication Response result utilizing described authentication request to obtain described first tag card includes: make Described first tag card calculates Authentication Response result in response to described authentication request by described KI.
The most the method for claim 1, wherein at described end modification demodulation module from the first clothes Also include before the card information that business device obtains the second tag card:
When mobile communication equipment enters the coverage of the second communication network, disable described end modification solution The business transmission under described first communication network of the mode transfer block.
The most described method also includes:
After described second tag card is registered to the second communication network, described end modification demodulation module is held Data traffic transmission under described second communication network of row;
Making described first tag card can be by described high in the clouds modulation /demodulation Module registers to destinations traffic After network so that described high in the clouds modulation /demodulation module performs the speech business under described target communication network Transmission.
7. the method for claim 1, wherein
Described target communication network is described first communication network or described second communication network.
8. a mobile communication equipment, including:
End modification demodulation module, it is possible to perform the first communication network by its first tag card carried Under business transmission;
Control module, is configured to control described end modification demodulation module and the second communication network and target is led to Information transmission between communication network,
Wherein, described end modification demodulation module obtains from first server according to the control of described control module Take the card information of the second tag card, and described second tag card is registered to the by the card information acquired in utilizing Two communication networks, and
Described end modification demodulation module controlling the card of described first tag card according to described control module Information send to second server so that described second server determine wherein with described first tag card The high in the clouds modulation /demodulation module joined, so that described first tag card can pass through described high in the clouds modulatedemodulate mode transfer Block is registered to target communication network.
9. mobile communication equipment as claimed in claim 8, wherein
Described end modification demodulation module is according to the control of described control module and described high in the clouds modulatedemodulate mode transfer It is mutual that block carries out information, so that described high in the clouds modulation /demodulation module can pass through described target communication network Described first tag card is registered to described target communication network by the authentication of described first tag card.
10. mobile communication equipment as claimed in claim 9, wherein
Described end modification demodulation module is according to the control of described control module, from the modulation /demodulation of described high in the clouds Module receives the authentication request for described first tag card that described target communication network sends, described mirror Power request uses the card information of described first tag card to described mesh in response to described high in the clouds modulation /demodulation module The registration request that mark communication network sends;
Described end modification demodulation module, according to the control of described control module, utilizes described authentication request to obtain Take the Authentication Response result of described first tag card, and by described high in the clouds modulation /demodulation module by described mirror Power response results sends to described target communication network.
11. mobile communication equipments as claimed in claim 10, wherein
The card information of described first tag card does not include the KI in described first tag card;
Described end modification demodulation module makes described first tag card ring according to the control of described control module Authentication request described in Ying Yu calculates Authentication Response result by described KI.
12. mobile communication equipments as claimed in claim 8, wherein
Described end modification demodulation module, according to the control of described control module, is obtaining from first server Before the card information of the second tag card, when mobile communication equipment enters the coverage of the second communication network, Disable the business transmission under described first communication network of the described end modification demodulation module.
13. mobile communication equipments as claimed in claim 8, wherein,
Described end modification demodulation module is according to the control of described control module, at described second tag card note Volume performs the data traffic transmission under described second communication network after the second communication network.
14. mobile communication equipments as claimed in claim 8, wherein,
Described target communication network is described first communication network or described second communication network.
15. 1 kinds of data business transmission methods, are applied to server, including:
Determine the high in the clouds that the first tag card of the carrying of the end modification demodulation module with mobile communication equipment mates Modulation /demodulation module, described high in the clouds modulation /demodulation module is positioned in described server;
Described high in the clouds modulation /demodulation module receives described end modification demodulation module and sends to described server The card information of the first tag card, and described first tag card is registered to target communication network.
16. methods as claimed in claim 15, wherein,
Described high in the clouds modulation /demodulation module by with described end modification demodulation module and described destinations traffic net Information between network is mutual so that described first tag card is authenticated by described target communication network.
17. methods as claimed in claim 16, wherein,
Described high in the clouds modulation /demodulation module uses the card information of described first tag card to described destinations traffic net Network send registration request, and receive described target communication network in response to described registration request for described The authentication request of the first tag card;
Described high in the clouds modulation /demodulation module sends described authentication request extremely described end modification demodulation module, and Receive the described end modification demodulation module Authentication Response result in response to described authentication request, to be forwarded to Described target communication network.
18. 1 kinds of servers, including:
Determine unit, for determining the first mark of the end modification demodulation module carrying with mobile communication equipment Knowing the high in the clouds modulation /demodulation module of card coupling, described high in the clouds modulation /demodulation module is positioned in described server;
Described high in the clouds modulation /demodulation module is configured to receive described end modification demodulation module and sends to described clothes The card information of the first tag card of business device, and described first tag card is registered to target communication network.
19. servers as claimed in claim 18, wherein,
Described high in the clouds modulation /demodulation module by with described end modification demodulation module and described destinations traffic net Information between network is mutual so that described first tag card is authenticated by described target communication network.
20. servers as claimed in claim 19, wherein,
Described high in the clouds modulation /demodulation module uses the card information of described first tag card to described destinations traffic net Network send registration request, and receive described target communication network in response to described registration request for described The authentication request of the first tag card;
Described high in the clouds modulation /demodulation module sends described authentication request extremely described end modification demodulation module, and Receive the described end modification demodulation module Authentication Response result in response to described authentication request, to be forwarded to Described target communication network.
CN201610513588.XA 2016-06-30 2016-06-30 Data business transmission method, mobile communication equipment and server Active CN106028315B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610513588.XA CN106028315B (en) 2016-06-30 2016-06-30 Data business transmission method, mobile communication equipment and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610513588.XA CN106028315B (en) 2016-06-30 2016-06-30 Data business transmission method, mobile communication equipment and server

Publications (2)

Publication Number Publication Date
CN106028315A true CN106028315A (en) 2016-10-12
CN106028315B CN106028315B (en) 2019-08-27

Family

ID=57106199

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610513588.XA Active CN106028315B (en) 2016-06-30 2016-06-30 Data business transmission method, mobile communication equipment and server

Country Status (1)

Country Link
CN (1) CN106028315B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616869A (en) * 2018-03-22 2018-10-02 深圳市优克联新技术有限公司 Multi-card multi-standby system, method, apparatus, computer installation and computer readable storage medium
CN109977126A (en) * 2018-10-25 2019-07-05 阿里巴巴集团控股有限公司 Replacing options, device, electronic equipment and the storage medium of identity
CN112584372A (en) * 2019-09-30 2021-03-30 深圳市优克联新技术有限公司 Resource allocation method and device, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595376A (en) * 2011-01-04 2012-07-18 ***通信有限公司 Method, device and system for opening user identity identification card
US20120202470A1 (en) * 2010-04-06 2012-08-09 Research In Motion Limited System and method for in-band modem to modem communication
CN102647454A (en) * 2012-03-26 2012-08-22 常熟路车智能电子有限公司 Mobile-heterogeneity full-duplex communication van networking system
CN104780512A (en) * 2014-01-10 2015-07-15 华为终端有限公司 Instant application message processing method and modem
US9344885B2 (en) * 2013-03-14 2016-05-17 Intel Deutschland Gmbh Communication devices and cellular wide area radio base station
CN107205053A (en) * 2017-07-31 2017-09-26 努比亚技术有限公司 Data packet transmission system and method
CN108886751A (en) * 2016-03-30 2018-11-23 夏普株式会社 Terminal installation and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120202470A1 (en) * 2010-04-06 2012-08-09 Research In Motion Limited System and method for in-band modem to modem communication
CN102595376A (en) * 2011-01-04 2012-07-18 ***通信有限公司 Method, device and system for opening user identity identification card
CN102647454A (en) * 2012-03-26 2012-08-22 常熟路车智能电子有限公司 Mobile-heterogeneity full-duplex communication van networking system
US9344885B2 (en) * 2013-03-14 2016-05-17 Intel Deutschland Gmbh Communication devices and cellular wide area radio base station
CN104780512A (en) * 2014-01-10 2015-07-15 华为终端有限公司 Instant application message processing method and modem
CN108886751A (en) * 2016-03-30 2018-11-23 夏普株式会社 Terminal installation and method
CN107205053A (en) * 2017-07-31 2017-09-26 努比亚技术有限公司 Data packet transmission system and method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616869A (en) * 2018-03-22 2018-10-02 深圳市优克联新技术有限公司 Multi-card multi-standby system, method, apparatus, computer installation and computer readable storage medium
WO2019179492A1 (en) * 2018-03-22 2019-09-26 深圳市优克联新技术有限公司 Multi-sim multi-standby system, method and device, computer device, and computer readable storage medium
CN108616869B (en) * 2018-03-22 2020-06-09 深圳市优克联新技术有限公司 Multi-card multi-standby system, method, device, communication device and computer readable storage medium
CN109977126A (en) * 2018-10-25 2019-07-05 阿里巴巴集团控股有限公司 Replacing options, device, electronic equipment and the storage medium of identity
CN109977126B (en) * 2018-10-25 2023-08-15 创新先进技术有限公司 Method and device for replacing identity, electronic equipment and storage medium
CN112584372A (en) * 2019-09-30 2021-03-30 深圳市优克联新技术有限公司 Resource allocation method and device, electronic equipment and storage medium
WO2021063180A1 (en) * 2019-09-30 2021-04-08 深圳市优克联新技术有限公司 Resource allocation method and apparatus, electronic device, and storage medium
CN112584372B (en) * 2019-09-30 2022-05-03 深圳市优克联新技术有限公司 Resource allocation method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN106028315B (en) 2019-08-27

Similar Documents

Publication Publication Date Title
US10631160B2 (en) Apparatuses, methods and systems for virtualizing a reprogrammable universal integrated circuit chip
US10681010B2 (en) Establishing a connection between a user device and an access zone
CN108886683A (en) Use embedded user identification module(eSIM)Configuration process to provide the system and method with activation equipment configuration packet on a wireless communication device
CN105338515B (en) Data service transmission method and mobile communication equipment
CN103329091B (en) Cross access login controller
CN102625310B (en) Wireless network access method, authentication method and device
CN104185179B (en) It is a kind of for the control device of Subscriber Identity Module, method and Subscriber Identity Module
US20050003822A1 (en) Method and apparatus for automatically selecting a bearer for a wireless connection
CN109905237B (en) Method for communicating with cellular network by mobile station
CN107079236A (en) The system and method for the different types of registration of the IMS service on SIM for managing Wireless Telecom Equipment
CN104145449A (en) Method and apparatus for seamless delivery of services through a virtualized network
CN104144402A (en) Method and related device for achieving localized roaming of mobile terminal
CN105763464A (en) Data flow sharing method, device and system
US20190230496A1 (en) Apparatuses, methods, and systems for configuring a trusted java card virtual machine using biometric information
CN102685712B (en) Mapping server in a kind of identity position separation network and its implementation
WO2009063093A2 (en) Communications network
CN104618882A (en) Data service transmission method and mobile communication device
CN106028315A (en) Data service transmission method, mobile communication device and server
US11743724B2 (en) System and method for accessing a privately hosted application from a device connected to a wireless network
CN107528712A (en) The determination of access rights, the access method of the page and device
WO2015108453A1 (en) System, methods and apparatuses for providing network access security control
CN105530714B (en) MIFI communications service system and its MIFI and communication means
CN104581684B (en) Data business transmission method and mobile communication equipment
CN105592441B (en) Communication means and mobile communication equipment
CN105704646B (en) Communication means and mobile communication equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant