CN107454660A - Network method and device are stayed after failed authentication - Google Patents
Network method and device are stayed after failed authentication Download PDFInfo
- Publication number
- CN107454660A CN107454660A CN201710669740.8A CN201710669740A CN107454660A CN 107454660 A CN107454660 A CN 107454660A CN 201710669740 A CN201710669740 A CN 201710669740A CN 107454660 A CN107454660 A CN 107454660A
- Authority
- CN
- China
- Prior art keywords
- network
- network formats
- formats
- authentication
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The disclosure is directed to stay network method and device after a kind of failed authentication, belong to electronic technology field.Methods described includes:During network insertion processing is carried out based on first network standard, when detecting that subscriber identification card enters disarmed state because of failed authentication, the second network formats in addition to the first network standard that terminal is supported are determined;Second network formats are switched to, network insertion processing is carried out based on second network formats.Using the disclosure, network insertion can be reattempted to after network formats switching, shorten the network insertion stand-by period.
Description
Technical field
The disclosure is directed to electronic technology field, and network method and device are stayed especially with respect to after a kind of failed authentication.
Background technology
Generally in UMTS (Universal Mobile Telecommunications System, universal mobile communications system
System) authentication operations that carry out in network and LTE (Long Term Evolution, Long Term Evolution) network are using two-way mirror
Power scheme, i.e. network side equipment need to authenticate terminal and terminal is also required to authenticate network side equipment.However,
During bi-directional authentification, it is possible that the phenomenon of terminal-pair network side equipment failed authentication.Relatively common authentication is lost
Lose including MAC (Media Address Control, network interface physical address) failures and synchronization failure (sync
failure)。
For synchronization failure, some failed authentications are temporary failure.But according to UMTS and LTE protocol, if
Network side equipment can be refused to be authenticated again in a short time after producing synchronization failure twice in succession.And then terminal can be SIM
(Subscriber Identification Module, subscriber identification card) card is set to disarmed state.If the attempt to access
The SIM card of LTE network, which is in disarmed state, can cause the situation of terminal off-grid.
In the related art, in order that terminal recover normal cluster state automatically from off-grid state, when run into due to even
Caused by synchronization failure caused by continuous during SIM card disarmed state, terminal can automatic start timer.Then, set by timer
Reattempted to after the time time-out put and network and SIM card is authenticated.It is because network side equipment is in short-term to set timer
The interior terminal that can refuse is authenticated again.
In the above art, although this mode can cause SIM card to network successfully, due to being advised in communications protocol
The authentication request of the terminal will not be reprocessed after terminal authentication failure by determining network side equipment in the short time, therefore timer is set
The time put can not be too short, can so cause the network insertion stand-by period long.
The content of the invention
In order to overcome problem present in correlation technique, present disclose provides stay network method after a kind of failed authentication.Institute
It is as follows to state technical scheme:
According to the first aspect of the embodiment of the present disclosure, there is provided stay network method after a kind of failed authentication, methods described includes:
Based on first network standard carry out network insertion processing during, when detect subscriber identification card because mirror
When power fails and enters disarmed state, the second network formats in addition to the first network standard that terminal is supported are determined;
Second network formats are switched to, network insertion processing is carried out based on second network formats.
The method provided by the embodiment of the present disclosure is invalid when detecting subscriber identification card because of failed authentication and entering
During state, the operation that first network standard is switched to the second network formats can be automatically initiated, and be based on the second network formats
Network insertion processing is carried out, so, network insertion is reattempted to after network formats switching, because the network of different network formats
Side apparatus is different equipment, thus after terminal handover network standard without waiting for can directly initiate network insertion processing, from
And the network insertion stand-by period can be shortened.
Alternatively, the first network standard is any of following network formats:5G、4G、3G;Second network
Standard is any of following network formats:5G、4G、3G、2G.
Optionally it is determined that the second network formats in addition to the first network standard that terminal is supported, including:
Determine the highest level network formats in addition to the first network standard that terminal is supported;
The highest level network formats are defined as the second network formats.
If first network standard is unavailable, the highest level network formats outside first network standard are chosen first,
To ensure that terminal can be communicated by the highest level network formats outside first network standard, communication quality is improved.
Alternatively, network formats by it is advanced to it is rudimentary be 5G, 4G, 3G, 2G successively.
Alternatively, network insertion processing is carried out based on second network formats, including:
Network insertion is sent to ask to base station corresponding with second network formats;
Receive the authentication information that base station is returned based on network insertion request;
Under second network formats, authentication operations are carried out based on the authentication information.
Different network formats are mounted in different base station, so if terminal have switched network formats, are then found and second
The corresponding base station of network formats is authenticated.
Alternatively, second network formats is need the network formats authenticated, wherein it is desired to the second network system of authentication
Formula is the network formats beyond 2G;
Methods described also includes:
When detecting that carrying out network insertion processing based on second network formats occurs failed authentication, switch to default
Without authentication the 3rd network formats, based on the 3rd network formats carry out network insertion processing, wherein, the 3rd net
Network standard is 2G.
Greatly increased because the 3rd network formats are without authentication, therefore in the success rate of net.If the net of income second
Network under network standard also have failed, and can attempt income without the network under the 3rd network formats of authentication.
According to the second aspect of the embodiment of the present disclosure, there is provided the device in net after a kind of failed authentication, described device include:
Determining module, for during network insertion processing is carried out based on first network standard, when detecting user
Identification cacaine failed authentication and when entering disarmed state, determine the in addition to the first network standard that terminal is supported
Two network formats;
First handover module, for switching to second network formats, network is carried out based on second network formats
Access is handled.
Alternatively, the first network standard is any of following network formats:5G、4G、3G;Second network
Standard is any of following network formats:5G、4G、3G、2G.
Alternatively, the determining module includes:
First determining unit, the highest level network system in addition to the first network standard supported for determining terminal
Formula;
Second determining unit, for the highest level network formats to be defined as into the second network formats.
Alternatively, network formats by it is advanced to it is rudimentary be 5G, 4G, 3G, 2G successively.
Alternatively, first handover module includes:
Transmitting element, asked for sending network insertion to base station corresponding with second network formats;
Receiving unit, the authentication information returned for receiving base station based on network insertion request;
Authenticating unit, under second network formats, authentication operations to be carried out based on the authentication information.
Alternatively, second network formats is need the network formats authenticated, wherein it is desired to the second network system of authentication
Formula is the network formats beyond 2G;
Described device also includes:
Second handover module, detect that carrying out network insertion processing based on second network formats authenticates for working as
During failure, default the 3rd network formats without authentication are switched to, are carried out based on the 3rd network formats at network insertion
Reason, wherein, the 3rd network formats are 2G.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of terminal, the terminal include processor and memory, institute
State and at least one instruction, at least one section of program, code set or instruction set are stored with memory, at least one instruction, institute
State after at least one section of program, the code set or instruction set are loaded and performed to realize above-mentioned failed authentication by the processor
In network method.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of computer-readable recording medium, in the storage medium
At least one instruction, at least one section of program, code set or instruction set are stored with, described at least one instructs, be described at least one section
Program, the code set or instruction set are loaded by processor and performed stays network method to realize after above-mentioned failed authentication.
The technical scheme provided by this disclosed embodiment can include the following benefits:
The method provided by the embodiment of the present disclosure is invalid when detecting subscriber identification card because of failed authentication and entering
During state, the operation that first network standard is switched to the second network formats can be automatically initiated, and be based on the second network formats
Network insertion processing is carried out, so, network insertion is reattempted to after network formats switching, because the network of different network formats
Side apparatus is different equipment, thus after terminal handover network standard without waiting for can directly initiate network insertion processing, from
And the network insertion stand-by period can be shortened.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not
The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the disclosure
Example, and be used to together with specification to explain the principle of the disclosure.In the accompanying drawings:
Fig. 1 is the flow chart in network method after a kind of failed authentication according to an exemplary embodiment;
Fig. 2 is the flow chart in network method after a kind of failed authentication according to an exemplary embodiment;
Fig. 3 is the schematic diagram of the device in net after a kind of failed authentication according to an exemplary embodiment;
Fig. 4 is the schematic diagram of the device in net after a kind of failed authentication according to an exemplary embodiment;
Fig. 5 is the schematic diagram of the device in net after a kind of failed authentication according to an exemplary embodiment;
Fig. 6 is the schematic diagram of the device in net after a kind of failed authentication according to an exemplary embodiment;
Fig. 7 is a kind of structural representation of terminal according to an exemplary embodiment.
Pass through above-mentioned accompanying drawing, it has been shown that the clear and definite embodiment of the disclosure, will hereinafter be described in more detail.These accompanying drawings
It is not intended to limit the scope of disclosure design by any mode with word description, but is by reference to specific embodiment
Those skilled in the art illustrate the concept of the disclosure.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
The embodiments of the invention provide network method is stayed after a kind of failed authentication, this method can be realized by terminal.Wherein,
Terminal can be mobile phone, tablet personal computer, desktop computer, notebook etc..Terminal can include processor, memory,
The parts such as transceiver.Processor can be CPU (Central Processing Unit, CPU) etc., can be used for
Whether detection subscriber identification card because of failed authentication enters disarmed state, determine that terminal supports remove first network standard it
The second outer network formats, first network standard is switched into the second network formats and carries out network based on the second network formats
Access is handled, and waits processing.Memory can be that RAM (Random Access Memory, random access memory), Flash (dodge
Deposit) etc., it can be used for storing data generated in the data received, the data needed for processing procedure, processing procedure etc., such as net
Authentication information that network side apparatus returns etc..In addition, transceiver can include antenna, match circuit, modem etc..Transceiver
It can be used for carrying out data transmission with network side equipment such as base station, to carry out the authentication operations based on SIM card and voice call
Deng operation.
Terminal can also include input block, display unit, audio output part etc..Wherein, input block can be tactile
Touch screen, keyboard, mouse etc..Audio output part can be audio amplifier, earphone etc..
The exemplary embodiment of the disclosure one provides and stays network method after a kind of failed authentication, as shown in figure 1, this method
Handling process can include the steps:
Step S110, based on first network standard carry out network insertion processing during, when detect SIM card because mirror
When power fails and enters disarmed state, the second network formats in addition to first network standard that terminal is supported are determined.
Alternatively, first network standard is any of following network formats:5G、4G、3G;Second network formats be with
Any of lower network standard:5G、4G、3G、2G.
Because terminal is communicated safer under high level network formats, data transfer is quicker, terminal meeting
The network that prioritizing selection is accessed under high level network formats.It should be noted that high level network formats are as under 4G, 3G
Network can typically use bi-directional authentification scheme to carry out authentication operations.During bi-directional authentification, it is possible that terminal-pair net
The phenomenon of network side apparatus failed authentication, relatively common this failed authentication include MAC failures and synchronization failure.According to UMTS and
LTE protocol, if after producing synchronization failure twice in succession, network side equipment can refuse terminal and be reflected again in a short time
Power.And then SIM card can be set to disarmed state by terminal.
Wherein, SQN is included in the authentication parameter that reception network side equipment issues for synchronization failure, terminal
(sequence number, sequence number), terminal can carry out the authentication to network side equipment based on this sequence number:Terminal can base
SQN is verified whether in effective range in predetermined proof rule, if not in effective range, it is subsynchronous to occur one by SQN
Failure.Wherein, SQN setting be in order to prevent authentication parameter that other people pretend to be network side equipment to carry out hijack legitimate user terminal,
And the terminal of validated user is chained using intercepting and capturing, old authentication parameters.
In force, when detecting that SIM card enters disarmed state because of failed authentication, it may be determined that what terminal was supported removes
The second network formats outside first network standard.For example, one is supported 4G, the mobile phone of 3G network to carry out authentication behaviour after powering
Make, first, the mobile phone can select 4G networks automatically.Then, network insertion processing is carried out based on 4G networks, but may be in succession
Twice there occurs synchronization failure, and then SIM card is arranged to disarmed state.So it is invalid that mobile phone can detect that SIM card enters
State.The method provided based on the present embodiment, mobile phone may proceed to determine other networks in addition to 4G networks that it is supported
Standard such as 3G network.
Alternatively, can be with prioritizing selection terminal in the case of the network that first network standard can not be successfully accessed in terminal
The highest level network formats in addition to first network standard supported again attempt to carry out network insertion.Network formats are by advanced
To it is rudimentary be 5G, 4G, 3G, 2G successively.Correspondingly, as shown in Fig. 2 step S110 can include:Step S210, determine terminal branch
The highest level network formats in addition to first network standard held;Step S220, highest level network formats are defined as
Two network formats.
It should be noted that because terminal is communicated safer under high level network formats, data transfer is more
Accelerate speed, therefore when failure occurs for the network for accessing first network standard, can be based on other in addition to first network standard
Highest-ranking network formats are attempted to carry out network insertion again in network formats, to ensure mobile phone in the conceived case, fortune
Row is in the network environment of high quality.
For example, one is supported 4G, 3G, 2G, the mobile phone of GPRS network to carry out authentication operations after powering, it is based on when detecting
In the case that first network standard such as 4G carry out network insertion failure, it is determined that optional network formats are 3G, 2G, GPRS network.
Then, the mobile phone can be inquired about in default network formats levels list, compared, and determine net corresponding with 3G network
Network standard rank highest, it is thus determined that the highest level network formats in addition to first network standard that terminal is supported are 3G nets
Network.Finally, 3G network is defined as the second network formats.
Certainly, can be with prioritizing selection 4G networks if terminal carries out network insertion generation failure first under 3G network
Trial carries out network insertion again.
Step S120, the second network formats are switched to, network insertion processing is carried out based on the second network formats.
Alternatively, the concrete processing procedure for network insertion processing being carried out based on the second network formats can be as follows:Send net
Network access request extremely network side equipment corresponding with the second network formats;Receive network side equipment and be based on network insertion request return
Authentication information;Under the second network formats, authentication operations are carried out based on authentication information.
In force, when failure occurs for the network that terminal is accessed under first network standard, failure reporting can not be sent
The corresponding first network side apparatus of network of first network standard is given, can be directly on one's own initiative to the net with the second network formats
Corresponding second network side equipment of network sends authentication request, the network accessed with quick trial under the second network formats.When second
Network side equipment returns to encryption data to terminal after receiving authentication request, and terminal is after encryption data is received based on local
Authentication information in SIM card is parsed to encryption data, and analysis result is back into the second network side equipment.When the second net
After network side apparatus receives analysis result, the analysis result authorization data local with the second network side equipment is matched, such as
Fruit the match is successful then the second network side equipment to terminal authentication success.
In communication system, by taking 2G networks as an example, for terminal during network insertion is carried out, can generate authentication first please
Ask and be sent to MSC (Mobile Switching Center, mobile interaction center).Then, MSC is to AUC
(Authentication Center, AUC) asks authentication parameter.Then, AUC according to caused by randomizer with
Machine number (is used to enter the process of 2G communication transmission informations with KI (Key Identifier, KI) by A3 one-way algorithms
A kind of algorithm of row encryption) be calculated SRES (i), and by the authentication parameter for including random number and SRES (i) send to
MSC.Then, the SRES (i) in the authentication parameter received is stored in local by MSC, is authenticated based on generating random number user side
Ask and sent by base station to terminal.Terminal passes through still according to the random number received and in the KI locally pre-saved
RES (i) is calculated in A3 algorithms.Then, terminal is based on RES (i) generation subscription authentication response concurrents and gives MSC.Finally, MSC
By RES (i) compared with SRES (i), this time authenticated successfully if RES (i) is equal with SRES (i), if unequal this time
Failed authentication.
Alternatively, when still being failed based on the progress network insertion processing of the second network formats, it is possible to which selection is easy
Network insertion is carried out in authenticating successful network formats.Correspondingly, the network formats that the second network formats authenticate for needs, its
In, it is necessary to authentication the second network formats be 2G beyond network formats;The method that the present embodiment provides also includes:When detecting
When carrying out network insertion processing generation failed authentication based on the second network formats, default the 3rd network without authentication is switched to
Standard, network insertion processing is carried out based on the 3rd network formats, wherein, the 3rd network formats are 2G.
Wherein, 2G networks need not authenticate using unidirectional authentication scheme, terminal to network side equipment, and due to
It is that network side equipment authenticates to terminal, therefore terminal-pair network side equipment will not occur is authenticated just occur
Synchronization failure, and then, the unidirectional authentication scheme of 2G networks is easier to so that authenticating compared to the bi-directional authentification scheme of 4G, 3G network
Success.
The method provided based on the present embodiment, after authenticating successfully, can carry out the search of the network signal of cell base station
Operation, can carry out the operation of network selection after available network signal is searched, and then it is high to choose stable and signal intensity
Network signal carry out staying net.After success in net, terminal can is normally carried out communication.
The method provided by the embodiment of the present disclosure is invalid when detecting subscriber identification card because of failed authentication and entering
During state, the operation that first network standard is switched to the second network formats can be automatically initiated, and be based on the second network formats
Network insertion processing is carried out, so, network insertion is reattempted to after network formats switching, because the network of different network formats
Side apparatus is different equipment, thus after terminal handover network standard without waiting for can directly initiate network insertion processing, from
And the network insertion stand-by period can be shortened.
Disclosure further example embodiment provides the device in net after a kind of failed authentication, as shown in figure 3, the device
Including:
Determining module 310, for during network insertion processing is carried out based on first network standard, when detecting use
Family identification cacaine failed authentication and enter disarmed state when, determine terminal support in addition to the first network standard
Second network formats.
First handover module 320, for switching to second network formats, net is carried out based on second network formats
Network access is handled.
Alternatively, the first network standard is any of following network formats:5G、4G、3G;Second network
Standard is any of following network formats:5G、4G、3G、2G.
Alternatively, as shown in figure 4, the determining module 310 includes:
First determining unit 411, the highest level net in addition to the first network standard supported for determining terminal
Network standard;
Second determining unit 412, for the highest level network formats to be defined as into the second network formats.
Alternatively, network formats by it is advanced to it is rudimentary be 5G, 4G, 3G, 2G successively.
Alternatively, as shown in figure 5, stating the first handover module 320 includes:
Transmitting element 511, asked for sending network insertion to base station corresponding with second network formats;
Receiving unit 512, the authentication information returned for receiving base station based on network insertion request;
Authenticating unit 513, under second network formats, authentication operations to be carried out based on the authentication information.
Alternatively, second network formats is need the network formats authenticated, wherein it is desired to the second network system of authentication
Formula is the network formats beyond 2G;
As shown in fig. 6, described device also includes:
Second handover module, detect that carrying out network insertion processing based on second network formats authenticates for working as
During failure, default the 3rd network formats without authentication are switched to, are carried out based on the 3rd network formats at network insertion
Reason, wherein, the 3rd network formats are 2G.
The device provided by the embodiment of the present disclosure is invalid when detecting subscriber identification card because of failed authentication and entering
During state, the operation that first network standard is switched to the second network formats can be automatically initiated, and be based on the second network formats
Network insertion processing is carried out, so, network insertion is reattempted to after network formats switching, because the network of different network formats
Side apparatus is different equipment, thus after terminal handover network standard without waiting for can directly initiate network insertion processing, from
And the network insertion stand-by period can be shortened.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
It should be noted that:Above-described embodiment provide failed authentication after device in net in authentication in net, only more than
The division progress of each functional module is stated for example, in practical application, can be as needed and by above-mentioned function distribution by difference
Functional module complete, i.e., the internal structure of device is divided into different functional modules, with complete it is described above whole or
Person's partial function.In addition, the device in net after the failed authentication that above-described embodiment provides and the reality in network method after failed authentication
Apply example and belong to same design, its specific implementation process refers to embodiment of the method, repeats no more here.
The another exemplary embodiment of the disclosure shows a kind of structural representation of terminal.The terminal can be mobile phone, put down
Plate computer, desktop computer, notebook etc..
Reference picture 7, terminal 700 can include following one or more assemblies:Processing component 702, memory 704, power supply
Component 706, multimedia groupware 708, audio-frequency assembly 710, the interface 712 of input/output (I/O), sensor cluster 714, and
Communication component 716.
Processing component 702 generally controls the integrated operation of terminal 700, is such as communicated with display, call, data, phase
The operation that machine operates and record operation is associated.Treatment element 702 can refer to including one or more processors 720 to perform
Order, to complete all or part of step of above-mentioned method.In addition, processing component 702 can include one or more modules, just
Interaction between processing component 702 and other assemblies.For example, processing component 702 can include multi-media module, it is more to facilitate
Interaction between media component 708 and processing component 702.
Memory 704 is configured as storing various types of data to support the operation in terminal 700.These data are shown
Example includes the instruction of any application program or method for being operated in terminal 700, contact data, telephone book data, disappears
Breath, picture, video etc..Memory 704 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) are erasable to compile
Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash
Device, disk or CD.
Electric power assembly 706 provides electric power for the various assemblies of terminal 700.Electric power assembly 706 can include power management system
System, one or more power supplys, and other components associated with generating, managing and distributing electric power for audio output apparatus 700.
Multimedia groupware 708 is included in the screen of one output interface of offer between the terminal 700 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings
Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action
Border, but also detect and touched or the related duration and pressure of slide with described.In certain embodiments, more matchmakers
Body component 708 includes a front camera and/or rear camera.When terminal 700 is in operator scheme, such as screening-mode or
During video mode, front camera and/or rear camera can receive outside multi-medium data.Each front camera and
Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 710 is configured as output and/or input audio signal.For example, audio-frequency assembly 710 includes a Mike
Wind (MIC), when audio output apparatus 700 is in operator scheme, during such as call model, logging mode and speech recognition mode, wheat
Gram wind is configured as receiving external audio signal.The audio signal received can be further stored in memory 704 or warp
Sent by communication component 716.
I/O interfaces 712 provide interface between processing component 702 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 714 includes one or more sensors, and the state for providing various aspects for terminal 700 is commented
Estimate.For example, sensor cluster 714 can detect opening/closed mode of terminal 700, and the relative positioning of component, for example, it is described
Component is the display and keypad of terminal 700, and sensor cluster 714 can be with 700 1 components of detection terminal 700 or terminal
Position change, the existence or non-existence that user contacts with terminal 700, the orientation of terminal 700 or acceleration/deceleration and terminal 700
Temperature change.Sensor cluster 714 can include proximity transducer, be configured to detect in no any physical contact
The presence of neighbouring object.Sensor cluster 714 can also include optical sensor, such as CMOS or ccd image sensor, for into
As being used in application.In certain embodiments, the sensor cluster 714 can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 716 is configured to facilitate the communication of wired or wireless way between terminal 700 and other equipment.Terminal
700 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation
In example, communication component 716 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 716 also includes near-field communication (NFC) module, to promote junction service.Example
Such as, in NFC module radio frequency identification (RFID) technology can be based on, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,
Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal 700 can be believed by one or more application specific integrated circuits (ASIC), numeral
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of computer-readable recording medium including instructing is additionally provided, such as including referring to
The memory 704 of order, above-mentioned instruction can be performed to complete the above method by the processor 720 of terminal 700.For example, the calculating
Machine readable storage medium storing program for executing can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices
Deng.
The another embodiment of the disclosure provides a kind of computer-readable recording medium, the instruction in the storage medium
By terminal computing device when so that terminal is able to carry out:
Based on first network standard carry out network insertion processing during, when detect subscriber identification card because mirror
When power fails and enters disarmed state, the second network formats in addition to the first network standard that terminal is supported are determined;
Second network formats are switched to, network insertion processing is carried out based on second network formats.
Alternatively, the first network standard is any of following network formats:5G、4G、3G;Second network
Standard is any of following network formats:5G、4G、3G、2G.
Optionally it is determined that the second network formats in addition to the first network standard that terminal is supported, including:
Determine the highest level network formats in addition to the first network standard that terminal is supported;
The highest level network formats are defined as the second network formats.
Alternatively, network formats by it is advanced to it is rudimentary be 5G, 4G, 3G, 2G successively.
Alternatively, network insertion processing is carried out based on second network formats, including:
Network insertion is sent to ask to base station corresponding with second network formats;
Receive the authentication information that base station is returned based on network insertion request;
Under second network formats, authentication operations are carried out based on the authentication information.
Alternatively, second network formats is need the network formats authenticated, wherein it is desired to the second network system of authentication
Formula is the network formats beyond 2G;
Methods described also includes:
When detecting that carrying out network insertion processing based on second network formats occurs failed authentication, switch to default
Without authentication the 3rd network formats, based on the 3rd network formats carry out network insertion processing, wherein, the 3rd net
Network standard is 2G.
Those skilled in the art will readily occur to the disclosure its after considering specification and putting into practice disclosure disclosed herein
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or
Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledges in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claim is pointed out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
Claims (14)
1. stay network method after a kind of failed authentication, it is characterised in that methods described includes:
Based on first network standard carry out network insertion processing during, when detect subscriber identification card because authentication lose
When losing and entering disarmed state, the second network formats in addition to the first network standard that terminal is supported are determined;
Second network formats are switched to, network insertion processing is carried out based on second network formats.
2. according to the method for claim 1, it is characterised in that the first network standard is appointing in following network formats
It is a kind of:5G、4G、3G;Second network formats are any of following network formats:5G、4G、3G、2G.
3. according to the method for claim 2, it is characterised in that determine terminal support in addition to the first network standard
The second network formats, including:
Determine the highest level network formats in addition to the first network standard that terminal is supported;
The highest level network formats are defined as the second network formats.
4. according to the method for claim 3, it is characterised in that network formats by it is advanced to it is rudimentary be successively 5G, 4G, 3G,
2G。
5. according to the method for claim 1, it is characterised in that carried out based on second network formats at network insertion
Reason, including:
Network insertion is sent to ask to base station corresponding with second network formats;
Receive the authentication information that base station is returned based on network insertion request;
Under second network formats, authentication operations are carried out based on the authentication information.
6. according to the method any one of claim 1-5, it is characterised in that second network formats are to need to authenticate
Network formats, wherein it is desired to authentication the second network formats be 2G beyond network formats;
Methods described also includes:
When detecting that carrying out network insertion processing based on second network formats occurs failed authentication, default nothing is switched to
The 3rd network formats that need to be authenticated, network insertion processing is carried out based on the 3rd network formats, wherein, the 3rd network system
Formula is 2G.
7. the device in net after a kind of failed authentication, it is characterised in that described device includes:
Determining module, for during network insertion processing is carried out based on first network standard, when detecting user identity
When identification card enters disarmed state because of failed authentication, the second net in addition to the first network standard that terminal is supported is determined
Network standard;
First handover module, for switching to second network formats, network insertion is carried out based on second network formats
Processing.
8. device according to claim 7, it is characterised in that the first network standard is appointing in following network formats
It is a kind of:5G、4G、3G;Second network formats are any of following network formats:5G、4G、3G、2G.
9. device according to claim 8, it is characterised in that the determining module includes:
First determining unit, the highest level network formats in addition to the first network standard supported for determining terminal;
Second determining unit, for the highest level network formats to be defined as into the second network formats.
10. device according to claim 9, it is characterised in that network formats by it is advanced to it is rudimentary be successively 5G, 4G, 3G,
2G。
11. device according to claim 7, it is characterised in that first handover module includes:
Transmitting element, asked for sending network insertion to base station corresponding with second network formats;
Receiving unit, the authentication information returned for receiving base station based on network insertion request;
Authenticating unit, under second network formats, authentication operations to be carried out based on the authentication information.
12. according to the device any one of claim 7-11, it is characterised in that second network formats are to need to reflect
The network formats of power, wherein it is desired to which the second network formats of authentication are the network formats beyond 2G;
Described device also includes:
Second handover module, detect that carrying out network insertion processing based on second network formats occurs failed authentication for working as
When, default the 3rd network formats without authentication are switched to, network insertion processing is carried out based on the 3rd network formats, its
In, the 3rd network formats are 2G.
13. a kind of terminal, it is characterised in that the terminal includes processor and memory, is stored with least in the memory
One instruction, at least one section of program, code set or instruction set, at least one instruction, at least one section of program, the generation
Code collection or instruction set are loaded by the processor and performed to realize staying after the failed authentication as described in claim 1-6 is any
Network method.
14. a kind of computer-readable recording medium, it is characterised in that at least one instruction, extremely is stored with the storage medium
Few one section of program, code set or instruction set, at least one instruction, at least one section of program, the code set or the instruction
Collection is loaded by processor and performed stays network method to realize after the failed authentication as described in claim 1-6 is any.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710669740.8A CN107454660B (en) | 2017-08-08 | 2017-08-08 | Network residing method and device after authentication failure |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710669740.8A CN107454660B (en) | 2017-08-08 | 2017-08-08 | Network residing method and device after authentication failure |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107454660A true CN107454660A (en) | 2017-12-08 |
CN107454660B CN107454660B (en) | 2021-03-16 |
Family
ID=60489553
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710669740.8A Active CN107454660B (en) | 2017-08-08 | 2017-08-08 | Network residing method and device after authentication failure |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107454660B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108495300A (en) * | 2018-03-07 | 2018-09-04 | 龙尚科技(上海)有限公司 | Mobile network's mode switching method, device, terminal and storage medium |
CN108566661A (en) * | 2018-04-12 | 2018-09-21 | 宇龙计算机通信科技(深圳)有限公司 | A kind of access control method, device and mobile terminal |
WO2019196012A1 (en) * | 2018-04-10 | 2019-10-17 | Zte Corporation | Single radio voice call continuity for 5g wireless networks |
CN112738794A (en) * | 2021-01-07 | 2021-04-30 | 展讯半导体(成都)有限公司 | Network residing method, chip, mobile terminal and storage medium |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101541062A (en) * | 2009-03-06 | 2009-09-23 | 华为技术有限公司 | Roaming network access method and equipment |
CN101959190A (en) * | 2009-07-13 | 2011-01-26 | 华为技术有限公司 | Method, device and system for controlling access subdistrict |
CN102264058A (en) * | 2010-05-27 | 2011-11-30 | ***通信集团河南有限公司 | Subscriber identity card control method, device and system |
CN102857910A (en) * | 2012-06-01 | 2013-01-02 | 王鑫 | Wireless communication system based on a plurality of types of wireless networks |
CN103327514A (en) * | 2012-03-19 | 2013-09-25 | 华为技术有限公司 | Information recording method, information acquisition method, equipment and system |
CN103428793A (en) * | 2012-05-14 | 2013-12-04 | 中兴通讯股份有限公司 | Intersystem switching processing method, switching method and switching device |
CN104333856A (en) * | 2014-11-08 | 2015-02-04 | 北京握奇数据***有限公司 | Method for switching network of Java SIM card, SIM card, server and system |
CN105046132A (en) * | 2015-07-20 | 2015-11-11 | 深圳上高医疗电子科技有限公司 | Method for selecting mobile network or card and mobile terminal |
CN105554697A (en) * | 2015-09-29 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Network access method and terminal |
CN105939525A (en) * | 2016-06-22 | 2016-09-14 | 努比亚技术有限公司 | Mobile terminal and cell reselection control method |
CN106028331A (en) * | 2016-07-11 | 2016-10-12 | 华为技术有限公司 | Pseudo base station identifying method and device |
CN106210042A (en) * | 2016-07-11 | 2016-12-07 | 清华大学 | A kind of user based on end to end network section services request selection method |
EP3139665A1 (en) * | 2004-08-09 | 2017-03-08 | BlackBerry Limited | Apparatus, and associated method, for facilitating communications by a mobile node in a multiple network radio communication system having interworking capability |
US20170094512A1 (en) * | 2015-09-30 | 2017-03-30 | Apple Inc. | Authentication failure handling for access to services through untrusted wireless networks |
CN106899966A (en) * | 2017-03-25 | 2017-06-27 | 努比亚技术有限公司 | network mode automatic selecting method and device |
-
2017
- 2017-08-08 CN CN201710669740.8A patent/CN107454660B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3139665A1 (en) * | 2004-08-09 | 2017-03-08 | BlackBerry Limited | Apparatus, and associated method, for facilitating communications by a mobile node in a multiple network radio communication system having interworking capability |
CN101541062A (en) * | 2009-03-06 | 2009-09-23 | 华为技术有限公司 | Roaming network access method and equipment |
CN101959190A (en) * | 2009-07-13 | 2011-01-26 | 华为技术有限公司 | Method, device and system for controlling access subdistrict |
CN102264058A (en) * | 2010-05-27 | 2011-11-30 | ***通信集团河南有限公司 | Subscriber identity card control method, device and system |
CN103327514A (en) * | 2012-03-19 | 2013-09-25 | 华为技术有限公司 | Information recording method, information acquisition method, equipment and system |
CN103428793A (en) * | 2012-05-14 | 2013-12-04 | 中兴通讯股份有限公司 | Intersystem switching processing method, switching method and switching device |
CN102857910A (en) * | 2012-06-01 | 2013-01-02 | 王鑫 | Wireless communication system based on a plurality of types of wireless networks |
CN104333856A (en) * | 2014-11-08 | 2015-02-04 | 北京握奇数据***有限公司 | Method for switching network of Java SIM card, SIM card, server and system |
CN105046132A (en) * | 2015-07-20 | 2015-11-11 | 深圳上高医疗电子科技有限公司 | Method for selecting mobile network or card and mobile terminal |
CN105554697A (en) * | 2015-09-29 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Network access method and terminal |
US20170094512A1 (en) * | 2015-09-30 | 2017-03-30 | Apple Inc. | Authentication failure handling for access to services through untrusted wireless networks |
CN105939525A (en) * | 2016-06-22 | 2016-09-14 | 努比亚技术有限公司 | Mobile terminal and cell reselection control method |
CN106028331A (en) * | 2016-07-11 | 2016-10-12 | 华为技术有限公司 | Pseudo base station identifying method and device |
CN106210042A (en) * | 2016-07-11 | 2016-12-07 | 清华大学 | A kind of user based on end to end network section services request selection method |
CN106899966A (en) * | 2017-03-25 | 2017-06-27 | 努比亚技术有限公司 | network mode automatic selecting method and device |
Non-Patent Citations (1)
Title |
---|
ALCATEL-LUCENT, ALCATEL-LUCENT SHANGHAI BELL, AT&T, VERIZON: "Authentication Signalling Improvement with Backoff Timer for SCM", 《3GPP TSG-CT WG1 MEETING #95BIS C1-160127》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108495300A (en) * | 2018-03-07 | 2018-09-04 | 龙尚科技(上海)有限公司 | Mobile network's mode switching method, device, terminal and storage medium |
WO2019196012A1 (en) * | 2018-04-10 | 2019-10-17 | Zte Corporation | Single radio voice call continuity for 5g wireless networks |
CN108566661A (en) * | 2018-04-12 | 2018-09-21 | 宇龙计算机通信科技(深圳)有限公司 | A kind of access control method, device and mobile terminal |
CN112738794A (en) * | 2021-01-07 | 2021-04-30 | 展讯半导体(成都)有限公司 | Network residing method, chip, mobile terminal and storage medium |
CN112738794B (en) * | 2021-01-07 | 2022-09-27 | 展讯半导体(成都)有限公司 | Network residing method, chip, mobile terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107454660B (en) | 2021-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2975821B1 (en) | Network connection method and apparatus | |
US20160381629A1 (en) | Virtual sim card for accessing operator network | |
EP3068154A1 (en) | Method and apparatus for setting smart device management account | |
CN105517103A (en) | Network access method and device based on intelligent terminal device | |
CN109451817B (en) | Unmanned aerial vehicle access method and device | |
CN105656948A (en) | Account login method and device | |
CN104507034B (en) | Equipment connection method, device and terminal device | |
CN104079565A (en) | Authorization method and device | |
CN108288154B (en) | Starting method and device of payment application program and mobile terminal | |
CN105357742A (en) | Accessing method, device and system for wireless local area network | |
CN104933351A (en) | Information security processing method and information security processing device | |
CN107454660A (en) | Network method and device are stayed after failed authentication | |
EP3200421A1 (en) | Method, apparatus and system for accessing wireless local area network | |
CN104159218A (en) | Network connection establishment method and device | |
CN105678549A (en) | Payment method and device | |
CN105631254B (en) | Unlocking method and tripper | |
US20180146363A1 (en) | Identity verification method and apparatus, and storage medium | |
EP3407278A1 (en) | Method and apparatus for reporting loss of card or device associated with account number or stolen of account number | |
CN105120505A (en) | Method, apparatus and system for making intelligent equipment accessed to router | |
US20180146420A1 (en) | Method and apparatus for establishing network connection | |
CN107404723A (en) | A kind of method and apparatus of access base station | |
EP3086582B1 (en) | Method, devices and system for transmitting sim card information | |
CN105681261A (en) | Security authentication method and apparatus | |
CN104837133A (en) | SIM card authentication method and device | |
CN113407427A (en) | Verification information processing method and device, terminal equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |