CN106937283A - Dual-card dual-standby terminal exempts from cipher authentication method and device - Google Patents

Dual-card dual-standby terminal exempts from cipher authentication method and device Download PDF

Info

Publication number
CN106937283A
CN106937283A CN201511017670.5A CN201511017670A CN106937283A CN 106937283 A CN106937283 A CN 106937283A CN 201511017670 A CN201511017670 A CN 201511017670A CN 106937283 A CN106937283 A CN 106937283A
Authority
CN
China
Prior art keywords
virtual
imei
client
ims
imsi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201511017670.5A
Other languages
Chinese (zh)
Other versions
CN106937283B (en
Inventor
单斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201511017670.5A priority Critical patent/CN106937283B/en
Publication of CN106937283A publication Critical patent/CN106937283A/en
Application granted granted Critical
Publication of CN106937283B publication Critical patent/CN106937283B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

What the application provided a kind of dual-card dual-standby terminal exempts from cipher authentication method and device.The method includes:Receive client identification, an IMEI, an IMSI and the first virtual IMEI and the first virtual ims I of current networking SIM that client sends;Judge whether an IMEI, an IMSI are identical with the 2nd IMEI, the 2nd IMSI that the client identification is bound;If incomplete same, judge whether the described first virtual IMEI and the first virtual ims I is identical with the second virtual IMEI and the second virtual ims I that the client identification is bound;If identical, confirmation is exempted from cipher authentication and is passed through;The first virtual IMEI and the first virtual ims I is generated and preserved by the client in initialization.The application dual-card dual-standby terminal is manually entered password again in switching networking SIM without user, lifts Consumer's Experience.

Description

Dual-card dual-standby terminal exempts from cipher authentication method and device
Technical field
The application is related to communication technical field, more particularly to a kind of dual-card dual-standby terminal exempts from cipher authentication side Method and device.
Background technology
With the development of mobile communication technology, increasing people possess two, even more than two SIM (Subscriber Identity Module, client identification module) blocks or UIM (User Identity Module, subscriber identification module) card, double card double standby mobile phone with its easily advantage obtained the green grass or young crops of people Look at.In double card double standby mobile phone, synchronization, generally only a SIM or UIM cards can connect Enter network.For in double card double standby mobile phone load client software for, the SIM of access network or It is configured to exempt to ensure safety when UIM cards switch, it is meant that facility environment there occurs change The client software of cipher authentication can carry out cipher authentication to user again.If continually switching access networks The SIM or UIM cards of network, it is necessary to which user is continually authenticated by way of inputing password, Reduce Consumer's Experience.
The content of the invention
In view of this, what the application provided a kind of double card double standby mobile phone exempts from cipher authentication method and device, with , it is necessary to user re-enters password is authenticated when solving in correlation technique SIM or the switching of UIM cards Problem.
Specifically, the application is achieved by the following technical solution:
A kind of dual-card dual-standby terminal exempts from cipher authentication method, it is characterised in that methods described includes:
Receive client identification, an IMEI of current networking SIM, an IMSI that client sends, First virtual IMEI and the first virtual ims I;
Judge an IMEI, an IMSI whether with the client identification bind second IMEI, the 2nd IMSI are identical;
If incomplete same, whether the described first virtual IMEI and the first virtual ims I is judged It is identical with the second virtual IMEI and the second virtual ims I that the client identification is bound;
If identical, confirmation is exempted from cipher authentication and is passed through;
Wherein, the described first virtual IMEI and the first virtual ims I is being initialized by the client Shi Shengcheng is simultaneously preserved.
Optionally, methods described also includes:
Receive client identification that the client sends in initialization, networked SIM in initialization The 2nd IMEI, the 2nd IMSI, the second virtual IMEI and the second virtual ims I;
When the client is by after cipher authentication, preserve the 2nd IMEI, the 2nd IMSI, The binding relationship of the second virtual IMEI and the second virtual ims I and the client identification;
Wherein, the described second virtual IMEI and the second virtual ims I is given birth to by client in initialization Into.
Optionally, methods described also includes:
If the first virtual IMEI and the first virtual ims I binds with the client identification The second virtual IMEI and the second virtual ims I are incomplete same, then confirm to exempt from cipher authentication not Pass through, send the information that password is provided to client.
A kind of dual-card dual-standby terminal exempts from cipher authentication method, applies in client, and methods described includes:
When act of authentication is detected, obtain that client generates and preserve in initialization is second virtual IMEI and the second virtual ims I;
Send client identification, an IMEI, an IMSI, described second of current networking SIM Virtual IMEI and the second virtual ims I to service end, so that service end carries out exempting from cipher authentication;
Receive service end return exempts from cipher authentication result.
Optionally, methods described also includes:
In initialization, the 2nd IMEI, the of networking SIM when sending client identification, initialization Two IMSI, the second virtual IMEI and the second virtual ims I to service end, for service end After confirming that cipher authentication passes through, the client identification and the 2nd IMEI, described second are preserved The binding relationship of IMSI, the second virtual IMEI and the second virtual ims I.
Optionally, methods described also includes:
It is that output password is defeated when providing the information of password when cipher authentication result is exempted from described in service end return Enter to be prompted to user.
A kind of dual-card dual-standby terminal exempts from cipher authentication device, applies in service end, and described device includes:
First receiving unit, receives client identification, the first of current networking SIM that client sends IMEI, an IMSI, the first virtual IMEI and the first virtual ims I;
First judging unit, judge an IMEI, an IMSI whether with the client The 2nd IMEI, the 2nd IMSI for identifying binding are identical;
Second judging unit, when incomplete same, judges the described first virtual IMEI and described first The the second virtual IMEI and the second virtual ims I whether virtual ims I binds with the client identification are complete It is exactly the same;
First confirmation unit, identical, then confirms that exempting from cipher authentication passes through;
Wherein, the described first virtual IMEI and the first virtual ims I is being initialized by the client Shi Shengcheng is simultaneously preserved.
Optionally, described device also includes:
Second receiving unit, receives client identification that the client sends in initialization, initial 2nd IMEI, the 2nd IMSI, the second virtual IMEI and second of networking SIM during change Virtual ims I;
First binding unit, when the client is by after cipher authentication, preserving the 2nd IMEI, institute State the 2nd IMSI, the second virtual IMEI and the second virtual ims I and the client identification Binding relationship;
Wherein, the described second virtual IMEI and the second virtual ims I is given birth to by client in initialization Into.
Optionally, described device also includes:
Second confirmation unit, in the described first virtual IMEI and the first virtual ims I and the client When the described second virtual IMEI and the second virtual ims I incomplete same of end mark binding, confirm Exempt from cipher authentication not pass through, send the information that password is provided to client.
A kind of dual-card dual-standby terminal exempts from cipher authentication device, applies in client, and described device includes:
Virtual acquiring unit, when act of authentication is detected, obtains client and generates and protect in initialization The the second virtual IMEI and the second virtual ims I for depositing;
First transmitting element, sends client identification, an IMEI, first of current networking SIM IMSI, the second virtual IMEI and the second virtual ims I to service end, so that service end is carried out Exempt from cipher authentication;
3rd receiving unit, receive service end return exempts from cipher authentication result.
Optionally, described device also includes:
Second transmitting element, in initialization, networking SIM when sending client identification, initialization 2nd IMEI, the 2nd IMSI, the second virtual IMEI and the second virtual ims I to service end, So that service end is after confirming that cipher authentication passes through, preserve the client identification and the 2nd IMEI, The binding relationship of the 2nd IMSI, the second virtual IMEI and the second virtual ims I.
Optionally, described device also includes:
Prompting output unit, when service end return described in exempt from cipher authentication result be provide password information When, output password input is prompted to user.
By above description as can be seen that the application client can initialization when generate virtual IMEI and Virtual ims I, and when act of authentication is detected, by the virtual IMEI and virtual ims I together with visitor Family end identifies, the IMEI and IMSI of current networking SIM are sent to service end carries out exempting from cipher authentication, What service end can bind in described IMEI, IMSI of current networking SIM and the client identification IMEI, IMSI are differed, but the virtual IMEI, virtual ims I bind with the client identification Virtual IMEI, IMSI it is identical when, confirmation is exempted from cipher authentication and is passed through so that dual-card dual-standby terminal is being cut When changing networking SIM, can carry out exempting from cipher authentication by virtual IMEI and virtual ims I, without User is manually entered password again, lifts Consumer's Experience.
Brief description of the drawings
Fig. 1 is that a kind of dual-card dual-standby terminal shown in the exemplary embodiment of the application one exempts from cipher authentication side The application scenarios schematic diagram of method.
Fig. 2 is that a kind of dual-card dual-standby terminal shown in the exemplary embodiment of the application one exempts from cipher authentication side The schematic flow sheet of method.
Fig. 3 is that another dual-card dual-standby terminal shown in the exemplary embodiment of the application one exempts from cipher authentication The schematic flow sheet of method.
Fig. 4 is that another dual-card dual-standby terminal shown in the exemplary embodiment of the application one exempts from cipher authentication The schematic flow sheet of method.
Fig. 5 is that a kind of password of exempting from for dual-card dual-standby terminal shown in the exemplary embodiment of the application one is recognized One structural representation of card device.
Fig. 6 is that a kind of cipher authentication of exempting from of the dual-card dual-standby terminal shown in the exemplary embodiment of the application one is filled The structural representation put.
Fig. 7 is that the another kind shown in the exemplary embodiment of the application one exempts from password for dual-card dual-standby terminal One structural representation of authentication device.
Fig. 8 is that another dual-card dual-standby terminal shown in the exemplary embodiment of the application one exempts from cipher authentication The structural representation of device.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following When description is related to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous Key element.Implementation method described in following exemplary embodiment does not represent the institute consistent with the application There is implementation method.Conversely, they are only with described in detail in such as appended claims, the application The example of the consistent apparatus and method of a little aspects.
It is the purpose only merely for description specific embodiment in term used in this application, and is not intended to be limiting The application." one kind ", " institute of the singulative used in the application and appended claims State " and " being somebody's turn to do " be also intended to include most forms, unless context clearly shows that other implications.Should also Work as understanding, term "and/or" used herein refers to and associated lists item comprising one or more Purpose any or all may combine.
It will be appreciated that though may describe various using term first, second, third, etc. in the application Information, but these information should not necessarily be limited by these terms.These terms only be used for by same type of information that This is distinguished.For example, in the case where the application scope is not departed from, the first information can also be referred to as Two information, similarly, the second information can also be referred to as the first information.Depending on linguistic context, as in this institute Use word " if " can be construed to " and ... when " or " when ... when " or " response In it is determined that ".
To solve during dual-card dual-standby terminal switching networking SIM, user exempts from the feelings of cipher authentication having set Still need to re-enter the problem that password is authenticated under condition, the application provides a kind of dual-card dual-standby terminal Exempt from cipher authentication method, refer to Fig. 1, the dual-card dual-standby terminal is exempted from cipher authentication method and can be divided Do not apply in the dual-card dual-standby terminal 11 and service end 12 shown in Fig. 1, the dual-card dual-standby terminal 11 can be the terminal that mobile phone etc. can install two SIM cards or UIM cards, in this application, with As a example by two SIM cards are installed in the dual-card dual-standby terminal 11, for ease of description, can described pair Two SIM cards installed in card double-standby terminal 11 are referred to as the first SIM and the second SIM, Wherein, per SIM card all to that should have unique IMEI (International Mobile Equipment Identity, mobile device international identity code) and IMSI (International Mobile Subscriber Identification Number, international mobile subscriber identity), in this application, can be by described One SIM corresponding IMEI and IMSI is referred to as an an IMEI and IMSI, by described Two SIMs corresponding IMEI and IMSI is referred to as the 2nd IMEI and the 2nd IMSI.The service End 12 is the server or clothes communicated with the client software loaded in the dual-card dual-standby terminal 11 Business device cluster, the service end 12 is usually the certificate server that authentication is carried out to client.
Fig. 2 is refer to, applies the password of exempting from of the dual-card dual-standby terminal in dual-card dual-standby terminal 11 to recognize Card method may comprise steps of:
Step 201, when act of authentication is detected, obtains what client was generated and preserved in initialization Second virtual IMEI and the second virtual ims I.
In the present embodiment, the client for being loaded in dual-card dual-standby terminal 11 can generate the in initialization Two virtual IMEI and the second virtual ims I, then preserve the described second virtual IMEI and the second virtual ims I. When having set the client for exempting from cipher authentication when act of authentication is detected, such as:Login, payment etc. are recognized Card behavior, client obtains the described second virtual IMEI and the second virtual ims I for preserving.
Step 202, send client identification, an IMEI of current networking SIM, an IMSI, The second virtual IMEI and the second virtual ims I to service end, so that service end carries out exempting from password Certification.
In the present embodiment, the client can be obtained when the act of authentication is detected, also and currently connected The IMEI and IMSI of net SIM.It is assumed that currently networking SIM is the first SIM, then client An IMEI and an IMSI of first SIM are obtained, then by client identification, described The described second virtual IMEI that one IMEI, an IMSI and abovementioned steps 201 get and The second virtual ims I is sent to service end, so that service end carries out exempting from cipher authentication.
Wherein, service end can first verify an an IMEI and IMSI whether with the client The IMEI of end mark binding is identical with IMSI, if identical, where illustrating client Dual-card dual-standby terminal currently networks SIM to be client networks in initialization SIM, client's end ring Border does not change, and exempts from cipher authentication and passes through, if incomplete same, can illustrate client place Dual-card dual-standby terminal currently network SIM not to be client network in initialization SIM, continue Verify the described second virtual IMEI and the second virtual ims I whether with the client identification bind Virtual IMEI is identical with virtual ims I, if identical, where can illustrating client The dual-card dual-standby terminal SIM that currently networks is another SIM card in the SIM card of user two, client End ring border does not change yet, and can confirm that exempting from cipher authentication passes through, if the second virtual IMEI The virtual IMEI and virtual ims I bound with the client identification with the second virtual ims I be not complete It is exactly the same, then can illustrate that client current environment there occurs change, have security risk, can be to visitor Family end returns to the information for providing password.
Step 203, receive service end return exempts from cipher authentication result.
In the present embodiment, when service end return exempt from cipher authentication by result after, client can permit Family allowable carries out associative operation, after service end returns to the authentication result of the information for providing password, client User can be prompted to output password input, and be entered by after cipher authentication, can just allow user in user Row associative operation.
Fig. 3 is refer to, the application applies the password of exempting from of the dual-card dual-standby terminal in service end 12 to recognize Card method may comprise steps of:
Step 301, the IMEI for receive the client client identification for sending, currently networking SIM, First IMSI, the first virtual IMEI and the first virtual ims I.
In the present embodiment, client can be generated in initialization and preserve virtual IMEI and virtual IMSI, the virtual IMEI sent for ease of description, the client that service end can be received and virtual IMSI is referred to as the first virtual IMEI and the first virtual ims I.
Step 302, judge an IMEI, an IMSI whether with the client identification 2nd IMEI, the 2nd IMSI of binding are identical.
In the present embodiment, for the client for having been provided with exempting from cipher authentication, to avoid security risk, Service end is receiving the client identification, an IMEI, an IMSI and described After first virtual IMEI and the first virtual ims I, an IMEI, described can be first judged Whether the first IMSI is identical with the 2nd IMEI, the 2nd IMSI that the client identification is bound, If identical, can confirm that and client currently network to be exactly client connect SIM in initialization The SIM of net, the environment of client does not change, and can confirm that exempting from cipher authentication passes through.
Step 303, if incomplete same, judges the described first virtual IMEI and described first virtual The second virtual IMEI and the second complete phases of virtual ims I that whether IMSI binds with the client identification Together.
Based on the judged result of abovementioned steps 302, if an IMEI, an IMSI with 2nd IMEI, the 2nd IMSI of the client identification binding are incomplete same, then illustrate that client is worked as Preceding networking SIM is not the SIM that client networks in initialization, and continuation judges that described first is virtual IMEI and the first virtual ims I whether with the client identification bind the second virtual IMEI and Second virtual ims I is identical, if incomplete same, can confirm that client environment becomes Change, there is security risk, the information that password is provided can be returned to client.
Step 304, if identical, confirms that certification passes through.
Based on the judged result of abovementioned steps 303, if the first virtual IMEI and first void Intend the described second virtual IMEI and the second virtual ims I that IMSI binds with the client identification Identical, then the dual-card dual-standby terminal where can illustrating client currently networks SIM for user two Another SIM card in SIM card, client environment does not change, and can confirm that exempting from password recognizes Card passes through, and is sent to client and exempts from the information that cipher authentication passes through.
By above description as can be seen that the application client can initialization when generate virtual IMEI and Virtual ims I, and when act of authentication is detected, by the virtual IMEI and virtual ims I together with visitor Family end identifies, the IMEI and IMSI of current networking SIM are sent to service end carries out exempting from cipher authentication, What service end can bind in described IMEI, IMSI of current networking SIM and the client identification IMEI, IMSI are differed, but the virtual IMEI, virtual ims I bind with the client identification Virtual IMEI, IMSI it is identical when, confirmation is exempted from cipher authentication and is passed through so that dual-card dual-standby terminal is being cut When changing networking SIM, can carry out exempting from cipher authentication by virtual IMEI and virtual ims I, without User is manually entered password again, lifts Consumer's Experience.
The implementation process of the application is described with reference to specific example.
Please further refer to Fig. 1, for dual-card dual-standby terminal 11, synchronization only has a SIM Card can access internet.The client that user loads in dual-card dual-standby terminal 11 can be with initialization Virtual IMEI and virtual ims I is generated, in the present embodiment, client can be generated in initialization Virtual IMEI and virtual ims I be referred to as the second virtual IMEI and the 2nd IMSI.Optionally, client The described second virtual IMEI and the second virtual ims I can be at random generated, client can also be based on equipment The information such as mark generate the second virtual IMEI and the second virtual ims I, this Shen by default algorithm Please this is not particularly limited.
In this example, it is assumed that in client initialization, networking SIM is the second SIM, User set exempt from cipher authentication, then client can by client identification, second SIM second IMEI, the 2nd IMSI, the second virtual IMEI and the second virtual ims I are sent to service End, if service end determines client by cipher authentication, service end can preserve the client mark Know and the 2nd IMEI, the 2nd IMSI, the second virtual IMEI and described second virtual Binding relationship between IMSI, when subsequent client carries out exempting from cipher authentication, can close according to the binding It is that the security risk of client is confirmed.Wherein, the client identification can be double-card dual-standby end MAC (Media Access Control, the medium access control) address at end 11, the client mark Know can also by client according to the 2nd IMEI, the 2nd IMSI, client generate it is random Number and the generating random number of service end generation, the application are not particularly limited to this.
Refer to Fig. 4, the dual-card dual-standby terminal that the application is provided exempt from cipher authentication method can include with Lower step:
Step 401, client when act of authentication is detected, send client identification, currently network SIM First IMEI, an IMSI, the second virtual IMEI and the second virtual ims I of card are to service end.
In this example, it is assumed that client is when act of authentication is detected, current networking SIM is the One SIM, then client can be by client identification, an IMEI, first of first SIM IMSI, the second virtual IMEI and the second virtual ims I are sent to service end.
Step 402, service end confirms an IMEI, an IMSI and the client mark The 2nd IMEI, the 2nd IMSI for knowing binding are incomplete same, perform step 403.
In the present embodiment, service end first according to the client identification can search the client mark Know the 2nd IMEI and the 2nd IMSI of binding, then judge an IMEI, an IMSI It is whether identical with the 2nd IMEI and the 2nd IMSI.In this step, service end determines Whether the first IMEI, an IMSI are complete with the 2nd IMEI and the 2nd IMSI Differ, continue executing with step 403.
Step 403, service end confirm the second virtual IMEI and the second virtual ims I with it is described Second virtual IMEI, the second virtual ims I of client identification binding are identical, and confirmation is exempted from password and recognized Card passes through.
In the present embodiment, service end can continue to search for the client according to the client identification Identify the second virtual IMEI and the second virtual ims I of binding, the second virtual IMEI due to receiving The the second virtual IMEI and the second virtual ims I bound with the client identification with the second virtual ims I Identical, it may be said that bright client current environment does not change, confirmation is exempted from cipher authentication and is passed through, Can be sent to client and exempt from the information that cipher authentication passes through, client and then can allow the user to carry out phase Close operation.
Optionally, in another embodiment of the application, to prevent security risk, client can be in unloading When delete the described second virtual IMEI and the second virtual ims I.When user is again at double-card dual-standby end When installing client in end 11, client is regenerated and preserves virtual IMEI and virtual ims I, is used Family re-starts cipher authentication, and after the cipher authentication of user passes through, service end can preserve client mark Know and the 2nd IMEI, the 2nd IMSI, the virtual IMEI and virtual ims I that regenerate Between binding relationship, this is no longer going to repeat them for the application.
By above description as can be seen that the application client can initialization when generate virtual IMEI and Virtual ims I, and when act of authentication is detected, by the virtual IMEI and virtual ims I together with visitor Family end identifies, the IMEI and IMSI of current networking SIM are sent to service end carries out exempting from cipher authentication, What service end can bind in described IMEI, IMSI of current networking SIM and the client identification IMEI, IMSI are differed, but the virtual IMEI, virtual ims I bind with the client identification Virtual IMEI, IMSI it is identical when, confirmation is exempted from cipher authentication and is passed through so that dual-card dual-standby terminal is being cut When changing networking SIM, can carry out exempting from cipher authentication by virtual IMEI and virtual ims I, without User is manually entered password again, lifts Consumer's Experience.
The embodiment for exempting from cipher authentication method with foregoing dual-card dual-standby terminal is corresponding, and the application is also provided The embodiment for exempting from cipher authentication device of dual-card dual-standby terminal.
The embodiment for exempting from cipher authentication device of the application dual-card dual-standby terminal can be applied double in double card respectively Treat in terminal and service end.Device embodiment can be realized by software, it is also possible to by hardware or soft The mode of combination of hardware is realized.It is logical as the device on a logical meaning as a example by implemented in software The processor of dual-card dual-standby terminal where it or service end is crossed by corresponding computer in nonvolatile memory Programmed instruction runs what is formed in reading internal memory.From for hardware view, as shown in figure 5, being this Shen Please dual-card dual-standby terminal a kind of hardware structure diagram for exempting from service end where cipher authentication device, except Fig. 5 Outside shown processor, internal memory, network interface and nonvolatile memory, device in embodiment The service end at place can also include other hardware, to this not generally according to the actual functional capability of the service end Repeat again.
Fig. 6 is that a kind of cipher authentication of exempting from of the dual-card dual-standby terminal shown in the exemplary embodiment of the application one is filled The structural representation put.
Refer to Fig. 6, the dual-card dual-standby terminal is exempted from cipher authentication device 500 and can be applied foregoing In service end shown in Fig. 5, include:First receiving unit 501, the first judging unit 502, second Judging unit 503, the first confirmation unit 504, the second receiving unit 505, the first binding unit 506 with And second confirmation unit 507.
Wherein, first receiving unit 501, receives the client identification of client transmission, currently connects First IMEI of net SIM, an IMSI, the first virtual IMEI and the first virtual ims I;
First judging unit 502, judge an IMEI, an IMSI whether with institute The 2nd IMEI, the 2nd IMSI for stating client identification binding are identical;
Second judging unit 503, when incomplete same, judges the described first virtual IMEI and institute Whether virtual with the second virtual IMEI of client identification binding and second state the first virtual ims I IMSI is identical;
First confirmation unit 504, identical, then confirms that exempting from cipher authentication passes through;
Wherein, the described first virtual IMEI and the first virtual ims I is being initialized by the client Shi Shengcheng is simultaneously preserved.
Second receiving unit 505, receive client identification that the client sends in initialization, The 2nd IMEI, the 2nd IMSI, the second virtual IMEI of networking SIM in initialization With the second virtual ims I;
First binding unit 506, when the client is by after cipher authentication, preserving described second IMEI, the 2nd IMSI, the second virtual IMEI and the second virtual ims I and the visitor The binding relationship of family end mark;
Wherein, the described second virtual IMEI and the second virtual ims I is given birth to by client in initialization Into.
Second confirmation unit 507, the described first virtual IMEI and the first virtual ims I with The described second virtual IMEI and the second virtual ims I of the client identification binding are incomplete same When, confirmation is exempted from cipher authentication and is not passed through, and sends the information for providing password to client.
Refer to shown in Fig. 7, be the application dual-card dual-standby terminal to exempt from double card where cipher authentication device double Treat a kind of hardware structure diagram of terminal, except the processor shown in Fig. 7, internal memory, network interface and Outside nonvolatile memory, the dual-card dual-standby terminal in embodiment where device is double generally according to the double card The actual functional capability of terminal is treated, other hardware can also be included, this is repeated no more.
Fig. 8 is that a kind of cipher authentication of exempting from of the dual-card dual-standby terminal shown in the exemplary embodiment of the application one is filled The structural representation put.
Refer to Fig. 8, the dual-card dual-standby terminal is exempted from cipher authentication device 700 and can be applied foregoing In double-card dual-standby end shown in Fig. 7, include:Virtual acquiring unit 701, the first transmitting element 702, 3rd receiving unit 703, the second transmitting element 704 and prompting output unit 705.
Wherein, the virtual acquiring unit 701, when act of authentication is detected, obtains client first The the second virtual IMEI and the second virtual ims I for being generated during beginningization and being preserved;
First transmitting element 702, transmission client identification, currently an IMEI of networking SIM, First IMSI, the second virtual IMEI and the second virtual ims I to service end, for service End carries out exempting from cipher authentication;
3rd receiving unit 703, receive service end return exempts from cipher authentication result.
Second transmitting element 704, in initialization, networks when sending client identification, initialization 2nd IMEI of SIM, the 2nd IMSI, the second virtual IMEI and the second virtual ims I To service end, so that service end is after confirming that cipher authentication passes through, preserve the client identification with it is described 2nd IMEI, the 2nd IMSI, the second virtual IMEI and the second virtual ims I are tied up Determine relation.
The prompting output unit 705, it is close to provide when cipher authentication result is exempted from described in service end return During the information of code, output password input is prompted to user.
The function of unit and the implementation process of effect specifically refer to correspondence in the above method in said apparatus The implementation process of step, will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part ginseng See the part explanation of embodiment of the method.Device embodiment described above be only it is schematical, It is wherein described as separating component illustrate unit can be or may not be it is physically separate, make For the part that unit shows can be or may not be physical location, you can with positioned at a place, Or can also be distributed on multiple NEs.Can select according to the actual needs part therein or Person whole modules realize the purpose of application scheme.Those of ordinary skill in the art are not paying creativeness In the case of work, you can to understand and implement.
The preferred embodiment of the application is the foregoing is only, is not used to limit the application, it is all at this Within the spirit and principle of application, any modification, equivalent substitution and improvements done etc. should be included in Within the scope of the application protection.

Claims (12)

1. a kind of dual-card dual-standby terminal exempts from cipher authentication method, applies in service end, it is characterised in that Methods described includes:
Receive client identification, an IMEI of current networking SIM, an IMSI that client sends, First virtual IMEI and the first virtual ims I;
Judge an IMEI, an IMSI whether with the client identification bind second IMEI, the 2nd IMSI are identical;
If incomplete same, whether the described first virtual IMEI and the first virtual ims I is judged It is identical with the second virtual IMEI and the second virtual ims I that the client identification is bound;
If identical, confirmation is exempted from cipher authentication and is passed through;
Wherein, the described first virtual IMEI and the first virtual ims I is being initialized by the client Shi Shengcheng is simultaneously preserved.
2. method according to claim 1, it is characterised in that methods described also includes:
Receive client identification that the client sends in initialization, networked SIM in initialization The 2nd IMEI, the 2nd IMSI, the second virtual IMEI and the second virtual ims I;
When the client is by after cipher authentication, preserve the 2nd IMEI, the 2nd IMSI, The binding relationship of the second virtual IMEI and the second virtual ims I and the client identification;
Wherein, the described second virtual IMEI and the second virtual ims I is given birth to by client in initialization Into.
3. method according to claim 1, it is characterised in that methods described also includes:
If the first virtual IMEI and the first virtual ims I binds with the client identification The second virtual IMEI and the second virtual ims I are incomplete same, then confirm to exempt from cipher authentication not Pass through, send the information that password is provided to client.
4. a kind of dual-card dual-standby terminal exempts from cipher authentication method, applies in client, it is characterised in that Methods described includes:
When act of authentication is detected, obtain that client generates and preserve in initialization is second virtual IMEI and the second virtual ims I;
Send client identification, an IMEI, an IMSI, described second of current networking SIM Virtual IMEI and the second virtual ims I to service end, so that service end carries out exempting from cipher authentication;
Receive service end return exempts from cipher authentication result.
5. method according to claim 4, it is characterised in that methods described also includes:
In initialization, the 2nd IMEI, the of networking SIM when sending client identification, initialization Two IMSI, the second virtual IMEI and the second virtual ims I to service end, for service end After confirming that cipher authentication passes through, the client identification and the 2nd IMEI, described second are preserved The binding relationship of IMSI, the second virtual IMEI and the second virtual ims I.
6. method according to claim 4, it is characterised in that methods described also includes:
It is that output password is defeated when providing the information of password when cipher authentication result is exempted from described in service end return Enter to be prompted to user.
7. a kind of dual-card dual-standby terminal exempts from cipher authentication device, applies in service end, it is characterised in that Described device includes:
First receiving unit, receives client identification, the first of current networking SIM that client sends IMEI, an IMSI, the first virtual IMEI and the first virtual ims I;
First judging unit, judge an IMEI, an IMSI whether with the client The 2nd IMEI, the 2nd IMSI for identifying binding are identical;
Second judging unit, when incomplete same, judges the described first virtual IMEI and described first The the second virtual IMEI and the second virtual ims I whether virtual ims I binds with the client identification are complete It is exactly the same;
First confirmation unit, identical, then confirms that exempting from cipher authentication passes through;
Wherein, the described first virtual IMEI and the first virtual ims I is being initialized by the client Shi Shengcheng is simultaneously preserved.
8. device according to claim 7, it is characterised in that described device also includes:
Second receiving unit, receives client identification that the client sends in initialization, initial 2nd IMEI, the 2nd IMSI, the second virtual IMEI and second of networking SIM during change Virtual ims I;
First binding unit, when the client is by after cipher authentication, preserving the 2nd IMEI, institute State the 2nd IMSI, the second virtual IMEI and the second virtual ims I and the client identification Binding relationship;
Wherein, the described second virtual IMEI and the second virtual ims I is given birth to by client in initialization Into.
9. device according to claim 7, it is characterised in that described device also includes:
Second confirmation unit, in the described first virtual IMEI and the first virtual ims I and the client When the described second virtual IMEI and the second virtual ims I incomplete same of end mark binding, confirm Exempt from cipher authentication not pass through, send the information that password is provided to client.
10. a kind of dual-card dual-standby terminal exempts from cipher authentication device, applies in client, it is characterised in that Described device includes:
Virtual acquiring unit, when act of authentication is detected, obtains client and generates and protect in initialization The the second virtual IMEI and the second virtual ims I for depositing;
First transmitting element, sends client identification, an IMEI, first of current networking SIM IMSI, the second virtual IMEI and the second virtual ims I to service end, so that service end is carried out Exempt from cipher authentication;
3rd receiving unit, receive service end return exempts from cipher authentication result.
11. devices according to claim 10, it is characterised in that described device also includes:
Second transmitting element, in initialization, networking SIM when sending client identification, initialization 2nd IMEI, the 2nd IMSI, the second virtual IMEI and the second virtual ims I to service end, So that service end is after confirming that cipher authentication passes through, preserve the client identification and the 2nd IMEI, The binding relationship of the 2nd IMSI, the second virtual IMEI and the second virtual ims I.
12. devices according to claim 10, it is characterised in that described device also includes:
Prompting output unit, when service end return described in exempt from cipher authentication result be provide password information When, output password input is prompted to user.
CN201511017670.5A 2015-12-29 2015-12-29 Password-free authentication method and device for dual-card dual-standby terminal Active CN106937283B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511017670.5A CN106937283B (en) 2015-12-29 2015-12-29 Password-free authentication method and device for dual-card dual-standby terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511017670.5A CN106937283B (en) 2015-12-29 2015-12-29 Password-free authentication method and device for dual-card dual-standby terminal

Publications (2)

Publication Number Publication Date
CN106937283A true CN106937283A (en) 2017-07-07
CN106937283B CN106937283B (en) 2020-03-10

Family

ID=59442220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511017670.5A Active CN106937283B (en) 2015-12-29 2015-12-29 Password-free authentication method and device for dual-card dual-standby terminal

Country Status (1)

Country Link
CN (1) CN106937283B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3755017A1 (en) * 2019-06-17 2020-12-23 T-Mobile USA, Inc. Targeted over-the-air updates
CN113709669A (en) * 2021-09-16 2021-11-26 珠海世纪鼎利科技股份有限公司 5G terminal double-card user identification method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002080499A1 (en) * 2001-04-02 2002-10-10 Motorola, Inc. Method and apparatus for anonymous network access in the absence of a mobile subscriber identity module
EP2043392A1 (en) * 2007-09-28 2009-04-01 Nokia Siemens Networks Oy Apparatus, method and identifier request message frame for providing a mobile user identifier
WO2011080636A2 (en) * 2009-12-30 2011-07-07 Turkcell Teknoloji Arastirma Ve Gelistirme Anonim Sirketi A system wherein costs of identifying sim cards to gsm systems is reduced
CN102149074A (en) * 2011-03-16 2011-08-10 中兴通讯股份有限公司 Method and device for locking or unlocking terminal and intelligent card
US20120039312A1 (en) * 2010-08-13 2012-02-16 Vishal Narkar Enhanced registration messages in internet protocol multimedia subsystems
CN103124440A (en) * 2011-11-18 2013-05-29 中兴通讯股份有限公司 Method and system for accessing terminal without SIM (Subscriber Identity Module) card to Internet of Things
US20150017962A1 (en) * 2013-07-15 2015-01-15 Gregory Howard Intelligent sim selection supporting rich context of input factors
CN104685935A (en) * 2012-09-27 2015-06-03 交互数字专利控股公司 End-to-end architecture, API framework, discovery, and access in virtualized network

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002080499A1 (en) * 2001-04-02 2002-10-10 Motorola, Inc. Method and apparatus for anonymous network access in the absence of a mobile subscriber identity module
EP2043392A1 (en) * 2007-09-28 2009-04-01 Nokia Siemens Networks Oy Apparatus, method and identifier request message frame for providing a mobile user identifier
WO2011080636A2 (en) * 2009-12-30 2011-07-07 Turkcell Teknoloji Arastirma Ve Gelistirme Anonim Sirketi A system wherein costs of identifying sim cards to gsm systems is reduced
US20120039312A1 (en) * 2010-08-13 2012-02-16 Vishal Narkar Enhanced registration messages in internet protocol multimedia subsystems
CN103155608A (en) * 2010-08-13 2013-06-12 T移动美国公司 Enhanced registration messages in internet protocol multimedia subsystems
CN102149074A (en) * 2011-03-16 2011-08-10 中兴通讯股份有限公司 Method and device for locking or unlocking terminal and intelligent card
CN103124440A (en) * 2011-11-18 2013-05-29 中兴通讯股份有限公司 Method and system for accessing terminal without SIM (Subscriber Identity Module) card to Internet of Things
CN104685935A (en) * 2012-09-27 2015-06-03 交互数字专利控股公司 End-to-end architecture, API framework, discovery, and access in virtualized network
US20150017962A1 (en) * 2013-07-15 2015-01-15 Gregory Howard Intelligent sim selection supporting rich context of input factors

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3755017A1 (en) * 2019-06-17 2020-12-23 T-Mobile USA, Inc. Targeted over-the-air updates
US11082831B2 (en) 2019-06-17 2021-08-03 T-Mobile Usa, Inc. Targeted over-the-air updates
CN113709669A (en) * 2021-09-16 2021-11-26 珠海世纪鼎利科技股份有限公司 5G terminal double-card user identification method

Also Published As

Publication number Publication date
CN106937283B (en) 2020-03-10

Similar Documents

Publication Publication Date Title
US11962616B2 (en) Protection against rerouting a communication channel of a telecommunication device having an NFC circuit and a secure data circuit
CN103249045A (en) Identification method, device and system
CN106850209A (en) A kind of identity identifying method and device
CN101964126A (en) Mobile terminal payment method and mobile terminal
CN107579966A (en) Control method, device, system and the terminal device of remote access to intranet
CN107104932A (en) Key updating method, apparatus and system
CN110266656A (en) Exempt from close authenticating identity recognition methods, device and computer equipment
CN107113613A (en) Server, mobile terminal, real-name network authentication system and method
CN105871796A (en) Router binding and controlling method and device
CN107484152A (en) The management method and device of terminal applies
CN106162641A (en) A kind of safe and efficient public's WiFi authentication method and system
CN106714171A (en) Network squatting preventing method and device, terminal and router
CN104009850B (en) A kind of method for authenticating user identity and system
WO2019123249A1 (en) Multifactor authentication
CN103051598B (en) Method, user equipment and packet access gateway for secure access to Internet services
CN102739629B (en) Method for safely logging in website
CN106856585A (en) Set up the method and device of short-distance wireless passage
CN106937283A (en) Dual-card dual-standby terminal exempts from cipher authentication method and device
CN106657034A (en) Service authentication method and authentication capability opening server
CN104869571B (en) A kind of method and apparatus of Portal rapid authentication
CN109429225A (en) Message sink, sending method and device, terminal, network functional entity
CN110418345A (en) Identity identifying method, device and computer equipment
EP2608478A1 (en) Method of protection of a device against denial of service attacks
US8353048B1 (en) Application digital rights management (DRM) and portability using a mobile device for authentication
CN106341374A (en) Method and device for restricting access of unlicensed user device to home gateway

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1238845

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.